Explain the issues of privacy in detail

Assignment Help Computer Engineering
Reference no: EM132085350

Question: It is true that information management is key for confidentiality of any organization's information but the irony at once is that serious ethical challenges have constantly followed the information management. It is again quite unfortunate as technology advances, IT experts are not able to tell the kind of challenges that are being send into the system by the malware developers. From the reviewed academic articles, I noted that among the ethical issues that arise in the course of information management include: copyright infringement, reduced privacy and computer crimes. The similarity from all the articles was that nearly all businesses risk cyber victims since most of them have embraced digital networking. The one single difference is that how these business handle their problems is varied by the skills of their IT experts.

Based on the premise of chapter 14 of our text book, the articles support the theme of the materials in chapter 14 in that cybercrimes have become inevitable and what can only save organizations and businesses is having qualified IT personnel on board to save the situation in case it happens.

From the articles, I have learned that to a greater degree, harmful employees engage in dubious activities to harm the organization for their personal gains. Among the ethical challenges that can make information management a tall order include:

i Security: hackers use the internet to hack organization's systems using the Internet protocol address to collect data that they may use against the business organization.

ii Issues of privacy: due to the existence of webcams, many experienced users have popped into the private life of celebrities and caused havoc to their private life.

iii Copyright infringement: since internet users can access artifact, they access information of musicians and share the information with their friends hence creators of the music lose credibility of their work.

iv In p-principle, digital divide is another issue in information management as the company embraces technology, it has to first train its workforce on how to use the technology.

Please respond to the above post in 150 words.

Be sure to support your work with specific citations using APA format

Read a selection of your colleagues' postings using one or more of the following ways:

• Share an insight from having read your colleagues' postings, synthesizing the information to provide new perspectives.

• Offer and support an alternative perspective using readings from the class materials or from your own research.

• Validate an idea with your own experience and additional research.

• Make a suggestion based on additional evidence drawn from readings or after synthesizing multiple postings.

• Expand on your colleagues' postings by providing additional insights or contrasting perspectives based on readings and evidence.

Reference no: EM132085350

Questions Cloud

Head that damaged the auditory nerve : ?What if you suffered brain damage due to a blow to the head that damaged the auditory nerve? Again, what kind of deafness, and what is normal/abnormal?
What is the average outgoing quality level : Lots of 1,000 units are produced at a time, with 100 of each lot sampled randomly. What is the average outgoing quality level?
Describe the major components of cyber defense laws : Discuss the ethical implications of monitoring user compliance with secure transmission activities as components of a framework for a secure enterprise.
Nodes of ranvier in a myelinated nerve : What would happen if you lost the nodes of Ranvier in a myelinated nerve? Would the message travel faster
Explain the issues of privacy in detail : It is true that information management is key for confidentiality of any organization's information but the irony at once is that serious ethical challenges.
Unobtrusively observe group of people : Identify a place where you can unobtrusively observe a group of people as they go about their work. Identify at least few of timeless themes in management study
Greenhouse gas compared with carbon dioxide : How many more times hazardous is methane as a greenhouse gas compared with carbon dioxide? (Enter just the number; for example, if the answer is twice as hazard
Discuss the strategy of organization : E-Business Management - BUS302 - Discuss the strategy of your organization according to the specificities of your business environment
Adapt to the feel of clothes : What would it feel like if skin did not adapt to the feel of clothes?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd