Tuesday, May 14, 2019

Discussion 1 Essay Example | Topics and Well Written Essays - 250 words

questionion 1 - Essay Example14). People opting to make purchases be hesitant to use the Internet or wireless technology due to security concerns since some electronic sites do not provide appropriate security and protection for shoppers and compromise details of personal information, oddly those that necessiate divulging bank account numbers or credit card details. These concerns are warranted, since according to the information provided by Buenaventura (2011), 130,000,000 credit card numbers was compromised 2 years ago, which still holds the record for the largest security breach on the Internet (par. 11). These are potentially influenced by age, educational background and profession since those who are prolific users of the profits are mostly the young generation and those who unsuspectively divulge personal information.Discussion 2 Potential Consequences Discuss what the consequences should be for not adhering to security form _or_ system of government guidelines. Where or h ow should these consequences be communicated to employees? Do you think there should be stronger and better-defined government-specified policies/laws for the general public? Organizations that define security policy guidelines should clearly indicate infractions and penalties for violations. These should be communicated to the employees through their policy manuals and code of discipline. One strongly believes that stronger and better-defined government-specified policies and regulations as well as stiffer penalties for those found to be violating security protocols and standards on privacy and confidentiality should be imposed to minimize and ultimately eliminate security breaches.Discussion 3 ensure me what is on your mind about Information Systems and operating systems? What good articles have you read lately? say me what you think about this discussion question. Information systems (IS) are used to capture, create, store,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.