AllFreePapers.com - All Free Papers and Essays for All Students
Search

Summary of Learning Team Collaborative Discussion

Autor:   •  October 18, 2016  •  Essay  •  529 Words (3 Pages)  •  867 Views

Page 1 of 3

Ethics and Privacy in Information

BIS/221

Arrette Harvey

Week 2

Mary Robbins

University of Phoenix

Summary of Learning Team Collaborative Discussion 

With the increased trend of computer technology, there are too many crimes against consumers, that could be attributed to the latest attacks by “hackers”. This could be seen related to information security since there are vast number of computer systems used to store the information. With the capabilities to retrieve, modify, edit, and delete a few other operations with data that has been stored on servers that you may forget about. It’s important to understand the information protection or data privacy that can help to prevent the data theft, data loss, misuse or abuse. There are computer securities methods and enforcement laws are targeted in with computer crimes, even more so battling to control the intentional security crimes. However, intentional breaches in computer security is a running trend and becoming more and more common.  The act by attackers or hackers to obtain personal information illegally “cyber crime”, is now a common thing we are no longer surprised when you hear of a breach or several hundred thousand people are affected. Although, cybercrime is also a part of data theft and require priorities of security agencies to monitor and control such internet based activities. 

Apart from the privacy laws and security prevention I believe there should be some ethical regulations which must be followed in understanding the depth study of computer security by each individual. 

As discussed in the weekly discussion, everyone discussed about their experiences in computer security in different areas of work. We all come from different parts of the world, we all come from different career background and different cultures but in today’s globalized business practices it requires to use computer systems in order to manage the information and its organizational responsibility to secure the stakeholders information. Number of organizations have been following different types of computer security practices and there is different level of layers across the security system which ensure data is secure which we discussed in learning discussions like; few manages through password protection, few allow token system, few restrict through security system, and many more but most importantly, to understand the computer security needs. As discussed in this week’s lessons, for a company it’s important to protect its employee’s information. For each individual, it requires to protect to their own information by keep changing passwords timely and don’t share with anyone and log-off the system in case, you aren’t at workstation.  Healthcare records also require to protect all the patients, and doctor’s information. 

...

Download as:   txt (3.5 Kb)   pdf (93.9 Kb)   docx (7.1 Kb)  
Continue for 2 more pages »