Abstract
The paper explains the topic that I will cover in my research paper which is, Operation Segregation between Information Technology and Information Security. The article describes my aim which is to explain the boundary in information technology and information security. Another aim is to come up with principals that will help solve data issues that organizations face. The conclusion explains the primary purpose of the paper. There is also a list of resources to be used during the research.

Order Now
Use code: HELLO100 at checkout

Introduction
I chose this topic because there is a research gap since there is no clear foundation on the two issues. I also want to determine the risk involved when operating Information security.

Information Technology and Information Security
Information technology is a digital way of storing information in a way that one can manipulate, transfer study and retrieve it in future (Elefterie, & Badea, 2016). Information security, on the other hand, aims at ensuring that there is no unauthorized access to the information stored in an automated way (Tretten, & Karim, 2014). The system prevents any modification, recording, and disclosure of information, use and destruction of data from any unauthorized party (Ungureanu, 2013). Also, I want to research on a clear boundary of operation by information technology and information security. Many users combine the two as one department making the work complex thus it is not easy to secure information.

My main interest in this topic is to raise issues that different organizations have in handling information (Carina-Elena, 2013). Many business people and individuals have complained of people secrecy issues in digital information Hackers attacks emails and manipulate the information for their benefits (Efremova, & Agapov, 2016). I aim at coming up with high-level principals that can help to solve the issues. I also want to give information technology more focus in the government, monitoring and threat incidents. I have a prior experience in this field as I have worked in the security tools transformation exercise that involved moving the security tools operation from information technology to information security.

Conclusion
Information technology and information security are interrelated yet have boundaries. The aim of my research is to determine these limits. I also aim at identifying the data issues that organization faces and come up with principals that will help to solve them.

    References
  • Carina-Elena, S. (2013). Auditing the Security of Information Systems within an Organization. Annals of ‘Constantin Brancusi’ the University Of Targu-Jiu. Economy Series, (1), 315-319.
  • Efremova, M. A., & Agapov, P. V. (2016). Crimes against Information Security: International Legal Aspects of Fighting and Experience of Some States. Journal of Internet Banking & Commerce, 21(S3), 1-11.
  • Elefterie, L., & Badea, G. (2016). The Impact of Information Technology on the Audit Process. Economics, Management & Financial Markets, 11(1), 303-309.
  • Tretten, P., & Karim, R. (2014). Enhancing the usability of maintenance data management systems. Journal of Quality in Maintenance Engineering, 20(3), 290-303. doi:10.1108/JQME-05-2014-0032
  • Ungureanu, M. (2013). Information Security as Part of the Overall Corporate Governance – It Governance. Centre for European Studies (CES) Working Papers, 5(2), 300-310.