Thesis on "Information Security Legal and Ethical Implications"

Thesis 5 pages (1471 words) Sources: 4 Style: APA

[EXCERPT] . . . .

Security It

Security, Privacy and Ethics in it

The field of Information Technology is unique among professional disciplines due to its high-paced atmosphere. The quick change of technology, particularly within the context of systems design and electronic information data-basing means that management in this field must be prepared to acclimate to security demands, practice obstacles and ethical requirements which relate to the handling of consumer privacy and the personal information of users.

Technological advance is creating a highly integrated standard for organizational culture which demands a balance between full-fledged investment in such evolving markers of effectiveness and the continuation of human intuition as a major contributor to decision-making. With risk-management, this is especially true, given both that this is a function which has increasingly fallen under the purview of Information Technology progress and that such a function requires a careful and deliberate comprehension of qualitative rather than strictly quantitative realities of risk-oriented decisions.

Indeed, even given the proper software tools, "identifying risk for an it system requires a keen understanding of the system's processing environment." (Stoneburner et al., 10) This means that the availability of diagnostic it tools for measurement of risks does not alone stand to provide a meaningful outlook for an organization's risk index. Proper interpretation and action upon information yielded by risk-management tools will be heavily dependent upon an organization's adherence to its specific industry, mission and goals. This means that the human elemen
Continue scrolling to

download full paper
ts of risk-management efficiency must be in place to effectively integrate into a strategy of it-based risk measurement.

This is something which is important to bear in mind today as so many identifiable risks are themselves based in the growing use of open-source technology. Thus, many risk management software packages are intended as "diagnostic and decision-making tool that enable the identification, analysis, tracking, mitigation, and communication of risks in software-intensive programs." (CMU, 1) the intertwining of risk-management tools with business-operation software may seem to imply an exclusion of the human element for measuring vulnerabilities and long-term concerns, but in fact, this relationship fails to achieve any actionable meaning without human mediation.

The open-source realities of the Internet mean that though there is a concerted intent to use public forum as a means to refining the effectiveness of various systems, there is also a wide accessibility to software applications for those with only a modest understanding of security debugging. There is, thus, a pervasive vulnerability to both client and server that online hackers will exploit holes in the security apparatus of the server in order to hijack the interaction with the user. Enabled by a communicational interception called cross-site scripting, this is perhaps the most common security threat on the internet today, making private biographical and account oriented information accessible to potentially malicious users.

Another repercussion of the open-source nature of the Internet is one that may directly impact merchant or retail capabilities. A threat to effective e-commerce operations, the 'denial-of-service' attack is a security breach in which the legitimate user's access to resources such as information, purchase items or pay-services may be obstructed by a malicious 'flooding' of the server network with irrelevant transactions or by the direct disruption of connectivity between a server and client. This type of security breach can be costly to online business enterprising.

Beyond that are the ethical concerns related to it security shortcomings and individual privacy. From the user's perspective, open source networking is creating an enormous opportunity for individual privacy invasion. Web browsers can be identified by IP addresses and by the content of transmitted data, much of which is widely available to Internet merchants, emails hosts and search engine desktop systems such as the ever-more operationally integrated Google package. This makes connecting an individual to a virtual identity increasingly easy for those with aspirations of credit card fraud and identity theft. The growing presence of unsecured wireless hotspots means that there is ever more free-floating private information on public channels.

In addition, the permeation of practical uses for internet access have increasingly placed individuals in a position of disclosure with respect to sensitive personal, private or commercial information. For instance, online retailing and banking have increasingly become a standard practice. To the latter, for instance, online banking is a service now offered by all major banks. This allows bank customers to view account balances, make fund transfers, approve payments and conduct myriad business engagements from the home, office or mobile communication… READ MORE

Quoted Instructions for "Information Security Legal and Ethical Implications" Assignment:

Ethical and Legal Implications in IT

- Evaluate the ethical and legal impact of information technology on society, especially in regard to information assurance and security.

- Identify relevant IT industry regulations and standards for information security

- Identify the legal implications of collecting electronic consumer data

- Identify relevant privacy rules and their impact on businesses

- Identify commonly practiced business ethics that impact information assurance and security

How to Reference "Information Security Legal and Ethical Implications" Thesis in a Bibliography

Information Security Legal and Ethical Implications.” A1-TermPaper.com, 2009, https://www.a1-termpaper.com/topics/essay/security-privacy/589533. Accessed 4 Oct 2024.

Information Security Legal and Ethical Implications (2009). Retrieved from https://www.a1-termpaper.com/topics/essay/security-privacy/589533
A1-TermPaper.com. (2009). Information Security Legal and Ethical Implications. [online] Available at: https://www.a1-termpaper.com/topics/essay/security-privacy/589533 [Accessed 4 Oct, 2024].
”Information Security Legal and Ethical Implications” 2009. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/security-privacy/589533.
”Information Security Legal and Ethical Implications” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/security-privacy/589533.
[1] ”Information Security Legal and Ethical Implications”, A1-TermPaper.com, 2009. [Online]. Available: https://www.a1-termpaper.com/topics/essay/security-privacy/589533. [Accessed: 4-Oct-2024].
1. Information Security Legal and Ethical Implications [Internet]. A1-TermPaper.com. 2009 [cited 4 October 2024]. Available from: https://www.a1-termpaper.com/topics/essay/security-privacy/589533
1. Information Security Legal and Ethical Implications. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/security-privacy/589533. Published 2009. Accessed October 4, 2024.

Related Thesis Papers:

Security Issues of Online Communities Term Paper

Paper Icon

Security Issues of Online Communities

Online communities have emerged in recent years as a result of the rapid growth of the Internet, arousing intrigue in citizens, policy-makers and government officials.… read more

Term Paper 60 pages (15576 words) Sources: 1+ Topic: Computers / IT / Internet


Ethical Branding Fairtrade Literature Review

Paper Icon

Ethical Branding: Case of Divine Chocolate

UK consumer attitudes

Purchasing fair trade chocolate (Divine Chocolate)

USA consumer attitudes

Purchasing fair trade chocolate (Divine chocolate)

Comparison of attitudes

USA and UK… read more

Literature Review 8 pages (3560 words) Sources: 10 Style: Harvard Topic: Advertising / Marketing / Sales


Counseling Although Counselors Work Thesis

Paper Icon

Counseling

Although counselors work in a wide range of treatment settings, including healthcare institutions, organizations of all types and sizes in both the private and public sectors and even academia,… read more

Thesis 13 pages (3758 words) Sources: 8 Style: APA Topic: Psychology / Behavior / Psychiatry


Knowledge Concerning Ethical Issues Involved in Counseling Research Paper

Paper Icon

knowledge concerning ethical issues involved in counseling teenagers with alcoholism, including informed consent contents in psychotherapeutic settings, dual relationships and psychological testing considerations in personnel selection in organizational settings. In… read more

Research Paper 11 pages (4963 words) Sources: 10 Topic: Psychology / Behavior / Psychiatry


Ethical Issue With Nanomedicine Term Paper

Paper Icon

Ethics in Nanomedicine

The term "nanomedicine" is mainly a reference to the scientific technology called nanotechnology which is used to enhance or sustain health at a small level. This technology… read more

Term Paper 40 pages (10726 words) Sources: 10 Style: APA Topic: Environment / Conservation / Ecology


Fri, Oct 4, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!