Thesis on "Information Security Legal and Ethical Implications"
Thesis 5 pages (1471 words) Sources: 4 Style: APA
[EXCERPT] . . . .
Security ItSecurity, Privacy and Ethics in it
The field of Information Technology is unique among professional disciplines due to its high-paced atmosphere. The quick change of technology, particularly within the context of systems design and electronic information data-basing means that management in this field must be prepared to acclimate to security demands, practice obstacles and ethical requirements which relate to the handling of consumer privacy and the personal information of users.
Technological advance is creating a highly integrated standard for organizational culture which demands a balance between full-fledged investment in such evolving markers of effectiveness and the continuation of human intuition as a major contributor to decision-making. With risk-management, this is especially true, given both that this is a function which has increasingly fallen under the purview of Information Technology progress and that such a function requires a careful and deliberate comprehension of qualitative rather than strictly quantitative realities of risk-oriented decisions.
Indeed, even given the proper software tools, "identifying risk for an it system requires a keen understanding of the system's processing environment." (Stoneburner et al., 10) This means that the availability of diagnostic it tools for measurement of risks does not alone stand to provide a meaningful outlook for an organization's risk index. Proper interpretation and action upon information yielded by risk-management tools will be heavily dependent upon an organization's adherence to its specific industry, mission and goals. This means that the human elemen
download full paper ⤓
This is something which is important to bear in mind today as so many identifiable risks are themselves based in the growing use of open-source technology. Thus, many risk management software packages are intended as "diagnostic and decision-making tool that enable the identification, analysis, tracking, mitigation, and communication of risks in software-intensive programs." (CMU, 1) the intertwining of risk-management tools with business-operation software may seem to imply an exclusion of the human element for measuring vulnerabilities and long-term concerns, but in fact, this relationship fails to achieve any actionable meaning without human mediation.
The open-source realities of the Internet mean that though there is a concerted intent to use public forum as a means to refining the effectiveness of various systems, there is also a wide accessibility to software applications for those with only a modest understanding of security debugging. There is, thus, a pervasive vulnerability to both client and server that online hackers will exploit holes in the security apparatus of the server in order to hijack the interaction with the user. Enabled by a communicational interception called cross-site scripting, this is perhaps the most common security threat on the internet today, making private biographical and account oriented information accessible to potentially malicious users.
Another repercussion of the open-source nature of the Internet is one that may directly impact merchant or retail capabilities. A threat to effective e-commerce operations, the 'denial-of-service' attack is a security breach in which the legitimate user's access to resources such as information, purchase items or pay-services may be obstructed by a malicious 'flooding' of the server network with irrelevant transactions or by the direct disruption of connectivity between a server and client. This type of security breach can be costly to online business enterprising.
Beyond that are the ethical concerns related to it security shortcomings and individual privacy. From the user's perspective, open source networking is creating an enormous opportunity for individual privacy invasion. Web browsers can be identified by IP addresses and by the content of transmitted data, much of which is widely available to Internet merchants, emails hosts and search engine desktop systems such as the ever-more operationally integrated Google package. This makes connecting an individual to a virtual identity increasingly easy for those with aspirations of credit card fraud and identity theft. The growing presence of unsecured wireless hotspots means that there is ever more free-floating private information on public channels.
In addition, the permeation of practical uses for internet access have increasingly placed individuals in a position of disclosure with respect to sensitive personal, private or commercial information. For instance, online retailing and banking have increasingly become a standard practice. To the latter, for instance, online banking is a service now offered by all major banks. This allows bank customers to view account balances, make fund transfers, approve payments and conduct myriad business engagements from the home, office or mobile communication… READ MORE
Quoted Instructions for "Information Security Legal and Ethical Implications" Assignment:
Ethical and Legal Implications in IT
- Evaluate the ethical and legal impact of information technology on society, especially in regard to information assurance and security.
- Identify relevant IT industry regulations and standards for information security
- Identify the legal implications of collecting electronic consumer data
- Identify relevant privacy rules and their impact on businesses
- Identify commonly practiced business ethics that impact information assurance and security
How to Reference "Information Security Legal and Ethical Implications" Thesis in a Bibliography
“Information Security Legal and Ethical Implications.” A1-TermPaper.com, 2009, https://www.a1-termpaper.com/topics/essay/security-privacy/589533. Accessed 4 Oct 2024.
Related Thesis Papers:
Security Issues of Online Communities Term Paper
Security Issues of Online Communities
Online communities have emerged in recent years as a result of the rapid growth of the Internet, arousing intrigue in citizens, policy-makers and government officials.… read more
Term Paper 60 pages (15576 words) Sources: 1+ Topic: Computers / IT / Internet
Ethical Branding Fairtrade Literature Review
Ethical Branding: Case of Divine Chocolate
UK consumer attitudes
Purchasing fair trade chocolate (Divine Chocolate)
USA consumer attitudes
Purchasing fair trade chocolate (Divine chocolate)
Comparison of attitudes
USA and UK… read more
Literature Review 8 pages (3560 words) Sources: 10 Style: Harvard Topic: Advertising / Marketing / Sales
Counseling Although Counselors Work Thesis
Counseling
Although counselors work in a wide range of treatment settings, including healthcare institutions, organizations of all types and sizes in both the private and public sectors and even academia,… read more
Thesis 13 pages (3758 words) Sources: 8 Style: APA Topic: Psychology / Behavior / Psychiatry
Knowledge Concerning Ethical Issues Involved in Counseling Research Paper
knowledge concerning ethical issues involved in counseling teenagers with alcoholism, including informed consent contents in psychotherapeutic settings, dual relationships and psychological testing considerations in personnel selection in organizational settings. In… read more
Research Paper 11 pages (4963 words) Sources: 10 Topic: Psychology / Behavior / Psychiatry
Ethical Issue With Nanomedicine Term Paper
Ethics in Nanomedicine
The term "nanomedicine" is mainly a reference to the scientific technology called nanotechnology which is used to enhance or sustain health at a small level. This technology… read more
Term Paper 40 pages (10726 words) Sources: 10 Style: APA Topic: Environment / Conservation / Ecology
Fri, Oct 4, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!