Friday, June 21, 2019

Discussion 1 Essay Example | Topics and Well Written Essays - 250 words

Discussion 1 - Essay Example14). People opting to make purchases are hesitant to use the net or wireless technology due to auspices concerns since some electronic sites do not provide appropriate security and protection for shoppers and compromise lucubrate of personal information, especially those that necessiate divulging bank account verse or credit card details. These concerns are warranted, since according to the information provided by Buenaventura (2011), 130,000,000 credit card numbers was compromised 2 years ago, which still holds the record for the largest security breach on the Internet (par. 11). These are potentially influenced by age, educational background and profession since those who are prolific users of the internet are mostly the young generation and those who unsuspectively divulge personal information.Discussion 2 Potential Consequences Discuss what the consequences should be for not adhering to security policy guidelines. Where or how should these consequ ences be communicated to employees? Do you think there should be stronger and better-defined government-specified policies/laws for the general public? Organizations that define security policy guidelines should clearly indicate infractions and penalties for violations. These should be communicated to the employees through their policy manuals and code of discipline. One strongly believes that stronger and better-defined government-specified policies and regulations as well as stiffer penalties for those found to be violating security protocols and standards on privacy and confidentiality should be obligate to minimize and ultimately eliminate security breaches.Discussion 3 Tell me what is on your mind about Information Systems and operating systems? What good articles have you record lately? Tell me what you think about this discussion question. Information systems (IS) are used to capture, create, store,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.