Information Systems Infrastructure

 

Research, identify and briefly describe the evolution of information systems infrastructure.

Sample Solution

Information Systems Infrastructure

An information system is a set of computerized components that are used to collect, create and store data. It is also used to process data into information and distribute it to the desired destinations. It includes five major components: hardware components, software components, the data itself, system users and the procedures of manipulating the data into information (Peppard, 2016). Information system infrastructure has seen increasing change in technology. It has gone through a rapid rate of evolution. In the 1960s evolution started from mainframes to today`s world of variety of laptops, computers, and phones with individual identity recognition, voice commands and so on. It has completely changed the face of systems infrastructure in terms of size, features, processing, and speed. Systems around have become completely depended on the computer these days.

security issues and weaknesses are that this theory makes narrow assumptions. These strengths and weakness will be further evaluated in the essay.

The main aim of this essay is to examine and evaluate the strengths and weaknesses of the securitisation theory. The Copenhagen School of International Relations will be discussed throughout this essay; they will be defining security using the traditional position on security of Realism, the Aberystwyth School (CSS) and view of the second-generation scholars. The constructivist thought on security is the strength of the securitisation theory as it provides a more extensive and deeper point of view on security issues. Security plan will therefore be considered as a conception of security that forms a threat to the military as well political financial, societal and ecological divisions. Military threat is the security that securitising actors give most importance to, military issue is above all issue. Deepening will be considered as a development of the security idea where people, social groups and humankind overall “have a legitimate claim to survival” (Buzan et al, 1998) the state is therefore considered a referent object of the securitisation process. This essay will then go onto discuss the weaknesses of the securitisation theory; narrow assumptions of epistemology undermines the role of logical factors in the development of security issues. (Stritzel and Schmittchen, 2011) Therefore to get a better understanding of the securitisation theory it will critically evaluated.
The Copenhagen School defines securitization as a process that is socially constructed, an object in society is considered important and thus deemed worth protecting; securitising actors in society decided which process or object in society is important and must be protected. Ole Wæver in his book Securitization and Desecuritization proposes a theoretical explanation of securitization. To understand the security process Wæver writes about national security and threats to it, his argument composes a threat-defence model, he formulates this models from his observation of operations conducted in the field of security. (Wæver, 1995) Weaver regarded security as a “speech act”, a person with authority can voice a situation to be a security issue and thus giving it special status and allowing measures to be taken to deal with the issue. ‘It is by labelling something a security issue that it becomes one.” (Weaver, 1995) The Copenhagen School defines securitization as “Based on a clear idea of the nature of security, securitization studies aim

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.