Explain the issues of privacy in detail

Assignment Help Computer Engineering
Reference no: EM132085350

Question: It is true that information management is key for confidentiality of any organization's information but the irony at once is that serious ethical challenges have constantly followed the information management. It is again quite unfortunate as technology advances, IT experts are not able to tell the kind of challenges that are being send into the system by the malware developers. From the reviewed academic articles, I noted that among the ethical issues that arise in the course of information management include: copyright infringement, reduced privacy and computer crimes. The similarity from all the articles was that nearly all businesses risk cyber victims since most of them have embraced digital networking. The one single difference is that how these business handle their problems is varied by the skills of their IT experts.

Based on the premise of chapter 14 of our text book, the articles support the theme of the materials in chapter 14 in that cybercrimes have become inevitable and what can only save organizations and businesses is having qualified IT personnel on board to save the situation in case it happens.

From the articles, I have learned that to a greater degree, harmful employees engage in dubious activities to harm the organization for their personal gains. Among the ethical challenges that can make information management a tall order include:

i Security: hackers use the internet to hack organization's systems using the Internet protocol address to collect data that they may use against the business organization.

ii Issues of privacy: due to the existence of webcams, many experienced users have popped into the private life of celebrities and caused havoc to their private life.

iii Copyright infringement: since internet users can access artifact, they access information of musicians and share the information with their friends hence creators of the music lose credibility of their work.

iv In p-principle, digital divide is another issue in information management as the company embraces technology, it has to first train its workforce on how to use the technology.

Please respond to the above post in 150 words.

Be sure to support your work with specific citations using APA format

Read a selection of your colleagues' postings using one or more of the following ways:

• Share an insight from having read your colleagues' postings, synthesizing the information to provide new perspectives.

• Offer and support an alternative perspective using readings from the class materials or from your own research.

• Validate an idea with your own experience and additional research.

• Make a suggestion based on additional evidence drawn from readings or after synthesizing multiple postings.

• Expand on your colleagues' postings by providing additional insights or contrasting perspectives based on readings and evidence.

Reference no: EM132085350

Questions Cloud

Head that damaged the auditory nerve : ?What if you suffered brain damage due to a blow to the head that damaged the auditory nerve? Again, what kind of deafness, and what is normal/abnormal?
What is the average outgoing quality level : Lots of 1,000 units are produced at a time, with 100 of each lot sampled randomly. What is the average outgoing quality level?
Describe the major components of cyber defense laws : Discuss the ethical implications of monitoring user compliance with secure transmission activities as components of a framework for a secure enterprise.
Nodes of ranvier in a myelinated nerve : What would happen if you lost the nodes of Ranvier in a myelinated nerve? Would the message travel faster
Explain the issues of privacy in detail : It is true that information management is key for confidentiality of any organization's information but the irony at once is that serious ethical challenges.
Unobtrusively observe group of people : Identify a place where you can unobtrusively observe a group of people as they go about their work. Identify at least few of timeless themes in management study
Greenhouse gas compared with carbon dioxide : How many more times hazardous is methane as a greenhouse gas compared with carbon dioxide? (Enter just the number; for example, if the answer is twice as hazard
Discuss the strategy of organization : E-Business Management - BUS302 - Discuss the strategy of your organization according to the specificities of your business environment
Adapt to the feel of clothes : What would it feel like if skin did not adapt to the feel of clothes?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Craft a five pages paper on artificial intelligence

craft a 4-5 page paper on Artificial Intelligence with 4 or more new references (that you find). Choose a particular style for your references.

  Explain what is a parametric machine learning algorithm

Explain what is a parametric machine learning algorithm and how is it different from a nonparametric machine learning algorithm.

  Create application that enables user to select from calendar

Create a Web application that enables users to select from a Calendar control object the date of their next exam.

  How to implementation using a minimal size multiplexer

One logic function that is used for various  of purposes (including with adders and to compute parity) is exclusive OR. The output of a two imput exclusive OR function is true only if exactly one of the inputs is true. Show the table for a two-inp..

  Determine which type of cache memory is the most efficient

Examine the primary manner in which the type of cache memory that you have identified interfaces. Determine which type of cache memory is the most efficient.

  Create logic for a program that calculates amount of money

Create the logic for a program that calculates and displays the amount of money you would have if you invested $1000 at 5 percent interest for one year.

  Entity-relationship diagrams

The process of starting with the world objects and modelling utilizing the entity-relationship diagrams is known to as a top-down process.

  Draw the hierarchy chart and then plan the logic for a

draw the hierarchy chart and then plan the logic for a program needed by the sales manager of the henry used car

  Discuss how storage is allocated for class instances in cpp

Write a short report comparing variant records in Pascal, C++, and Ada. Discuss how storage is allocated for class instances in C++ and in Eiffel.

  Which is more efficient keeping the terminals and polling

Which is more efficient: keeping the terminals and polling, or using workstations and asynchronous connections?

  Describe the four steps of a typical plc processor scan

The actual scan time, or time it takes the PLC to complete a four-step scan, decreases as the number of program words increases.

  Design implement and test the not gate

Design, implement, and test the following logic gates. For parts 1-4, your code must reside on the EEPROM (ROM). For parts 5 and 6, your code must be in program section of RAM (PROG)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd