Campbellsville How Technology Influences Security & Privacy of Information Research

User Generated

xcnina

Computer Science

Campbellsville University

Description

How technology influences the security and privacy of information 

INTRODUCTION

  • State the topic you are attempting to cover
  • State the issues involved
  • State why we should be concerned with resolving whatever issues are involved
  • State how answering the issues will help us
  • State the implications and consequences of dealing with or resolving the issues involved

REVIEW OF THE LITERATURE (5 sources minimal, at least 3 needs to be peer-reviewed)
Identify who has tried to answer the question before by doing the following:

  • Summarize how each of the sources presents and deals with the subject
  • Explain how each source presents and deals with its findings or results
  • Explain the relevancy of each source to your topic
  • State what you learned from each of your sources
  • State in what way(s) each source contributes to answering your issues

DISCUSSION

  • State your answer to your issue
  • State how and elaborate on how, explain how, illustrate how each of the sources you previously reviewed help you answer your issue
  • State what questions about your topic you still have that your sources may not have answered

CONCLUSIONS

  • Indicate how each of the sources have contributed to your conclusions (and clearly, accurately, correctly document those sources within your text)
  • State the implications of your conclusions
  • State what might be the possible consequences of your conclusions
  • State the significance these implications and consequences might have in the information technology / information security realm.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: HOW TECHNOLOGY INFLUENCES SECURITY AND PRIVACY OF
INFORMATION
1

How technology influences the security and privacy of information

Name of student

Name of institution

HOW TECHNOLOGY INFLUENCES SECURITY AND PRIVACY OF INFORMATION
2
Abstract
Business management is dependent on good and quality information that assures high-quality
services to the customers and also to the existence of the organization. However, with an
increase in technological advancements, the survival of most business organizations is threatened
because it is increasingly difficult to keep information private and secure. Most business
organizations rely on digital technology to keep information and to offer services to their
customers (Mamonov and Benbunan-Fich 2018) However; it may seem to be good although data
breaching through hacking is becoming a perennial problem due to advancements in technology.
Most business organizations are in competition and therefore seeking information from rival
organizations is becoming a common trend, and that is why the security and the integrity of
business information are not guaranteed. In most organizations, privacy is becoming a
fundamental issue in measuring trustworthy between the users in a business organization and the
users of the systems (Weber, 2010) This is because they are the main determinants in ensuring
that information is kept safe from external interference and also in ensuring that the integrity of
the data is maintained. The issue of security and privacy in business organizations have made
more business organizations more resilient in ensuring that their information is kept as private as
possible. Most business organizations have introduced more stringent measures which aim at
improving IT security in business operations. These measures include privacy analysis within the
business organization, implementing privacy detection measures and policies, information
security exchange measures (Van den Hoven et al. 2014).

How technological change influences the security and privacy of business organizations
Introduction
Security and privacy are not a new concept in business management. Many organizations have
been working tirelessly at ensuring that their information is kept as secure as possible. Although
this may be the case, the recent advancements in technology are posing a threat to the safety of
information (Ching and Singh, 2016). Most business organizations have been victims of
information loss through hacking, cybercrimes and also virus attacks For information to be kept
as secure as possible, most business organizations usually go for the most recent technology in
storing their data and offering training to their employees on how to ensure that information is
kept as secure as possible. Information security and privacy may also require a lot of

HOW TECHNOLOGY INFLUENCES SECURITY AND PRIVACY OF INFORMATION
3
trustworthiness from all the stakeholders within a business organization. Integrity means that the
organization has to make sure that the vulnerabilities in the use and exchange of information are
kept as low as possible (Gupta and Dhami 2015) It also involves the users of data within a
business organization implementing a security policy model describing their various interests in
the use of data. The information security policy model within a business organization helps to
protect the goal of information within a business organization, promote accountability of data,
and to enhance integrity in the use of data. This paper aims at identifying the problems that
organizations face in protecting their information, strengths, weaknesses, threats, and
opportunities in using technology in securing information. The article will also focus on how
technology has solved the problem of data security and privacy in the business organization, and
it will conclude by analyzing the future trend of security and privacy of information in a business
organization (Appari and Johnson, 2010)
.
Problem statement
Modern technologies have created problems in the privacy of information, and nowadays, it
requires responsibility from individuals. However, modern technology has created platforms
where information can be shared with a large group of people on social media platforms. The use
of mobile phones, laptops, iPad, etc. has made this possible. The problem is that people can use
this information for an illegal purpose (Bitner, 2001). Traditionally, information that was shared
could not be easily leaked or traced, and it was only shared with a small group of individuals.
Still, with the invention of the new technology, it is possible to share or even trace information
...


Anonymous
Just what I was looking for! Super helpful.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags