Essay Available:
You are here: Home → Essay → Technology
Pages:
1 page/≈550 words
Sources:
3 Sources
Level:
MLA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:
Methods Used By Organizations To Prevent Misuse Of Information (Essay Sample)
Instructions:
Research the Internet for methods used by organizations to prevent misuse of information and write an essay (250 words) on your research
source..Content:
Name
Instructor
Course
Date
Information systems
Research the Internet for methods used by organizations to prevent misuse of information and write an essay (250 words) on your research.
Information is a crucial instrument in any organization and hence its confidentiality is paramount. A good situation where misuse of information system has occurred is Cambridge Analytica organization that has been accused of manipulating voter data in Brexit campaigns in the United Kingdom (Siponen et al, 300). This discussion focuses on the methods that organizations use to avoid misuse of information.
User training is one of the most popular mechanisms that many organizations have embraced to curb misuse of information. When a user in the organization has the know how to operate on the data, then chances of misappropriation of the data are low. In the case of Cambridge Analytica, the executives disclosed sensitive information to other staff of the organization leading to manipulation of information.
Moreover, securing information systems is among those methods that organizations feel attractive to avoid misuse of information (Ahmad et al, 20). For instance, databases which contain information of a company are secured with passwords such that end users can only login to the sections entitled to them. It remains questionable how staff in the analytics group access data from the information systems of the organization. Maybe the information systems have not been secured as the case is still under investigation.
Furthermore, many organizations create a centrally managed information systems to deal with misuse of information. For example, the management of the information systems can be able to track any weird activities occurring to the stored information precipitated by the executives, operation systems, technical support persons or other parties within the organization (Sommestad, et al, 16).
In conclusion, organizations can train their users, secure t...
Instructor
Course
Date
Information systems
Research the Internet for methods used by organizations to prevent misuse of information and write an essay (250 words) on your research.
Information is a crucial instrument in any organization and hence its confidentiality is paramount. A good situation where misuse of information system has occurred is Cambridge Analytica organization that has been accused of manipulating voter data in Brexit campaigns in the United Kingdom (Siponen et al, 300). This discussion focuses on the methods that organizations use to avoid misuse of information.
User training is one of the most popular mechanisms that many organizations have embraced to curb misuse of information. When a user in the organization has the know how to operate on the data, then chances of misappropriation of the data are low. In the case of Cambridge Analytica, the executives disclosed sensitive information to other staff of the organization leading to manipulation of information.
Moreover, securing information systems is among those methods that organizations feel attractive to avoid misuse of information (Ahmad et al, 20). For instance, databases which contain information of a company are secured with passwords such that end users can only login to the sections entitled to them. It remains questionable how staff in the analytics group access data from the information systems of the organization. Maybe the information systems have not been secured as the case is still under investigation.
Furthermore, many organizations create a centrally managed information systems to deal with misuse of information. For example, the management of the information systems can be able to track any weird activities occurring to the stored information precipitated by the executives, operation systems, technical support persons or other parties within the organization (Sommestad, et al, 16).
In conclusion, organizations can train their users, secure t...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Other Topics:
- Harvesting Water From Air Research Assignment PaperDescription: Explaining how it is possible to harvest water from the air using technology especially by those desert regions...1 page/≈275 words| 2 Sources | MLA | Technology | Essay |
- Video Games and Esports in South Korea Technology AssignmentDescription: The Sample Required Me To Write About The South Korean E- Sport Culture With Relation To Their Economy...8 pages/≈2200 words| 6 Sources | MLA | Technology | Essay |
- Compare Modern Technology Versus Written MaterialsDescription: Evidently, if one needs to know something in current times, it is imperative that they analyze and read more information regarding it....1 page/≈275 words| 1 Source | MLA | Technology | Essay |