Wednesday, February 26, 2020
Social, legal and ethical aspects of IS security and privacy Research Paper
Social, legal and ethical aspects of IS security and privacy - Research Paper Example This study looks into an information system as a combination of hardware, software, procedures, policies, people, information and data which is involved in the management of organizational business functions with an aim of meeting organizational objectives and goals with efficiency and effectiveness. The hardware within information systems includes the physical aspects of the system such as computer components and the related equipment. The software is a set of applications alongside the hardware to effectively perform organizational or business functions. The software applications include information processing systems, finance and accounting packages, anti malware applications, statistical tools and word processing packages. Policies comprise of the set standards for proper management of the information system according to the internal and universal norms of organizational functioning. Procedures are the steps through which various activities and processes in within the systems sho uld follow to ensure that efficiency is enhanced and thus achievement of high productivity. In an information system, the people are the human resource and expertise who are involved in various organizational activities and processes. These include the clients, staff, management, suppliers and distributors. Data or information is one of the significant aspects of an information system because it helps organization to function and survive in the business environment through its application to enhance all business processes and to compete favorably within the market. (Qing, Zhengchuan, Tamara and Hong, 2011, p. 54). Examples of information systems include transaction processing systems which include as set of applications for the processing of the daily activities and processes of an organization. Decision supports systems are other examples of information systems that are important in the decision making process of organization and thus serve as an essential tool for the management t eam. Management information systems are commonly used technologies which facilitate the management process of all functional areas of an organization (Skupsky, 1994, p. 40). Other information systems such as expert systems are used to perform specialized functions such as the application of technology and software applications in the diagnosis of various conditions by medical practitioners. Information System Security and Privacy Within information systems, individuals desire to have data or information about them be kept safe from unwarranted, unauthorized access and use for malicious intentions. Additionally, organizational data must be safeguarded from business rivals or malicious system attackers who would take advantage of vulnerabilities within the information system to gain access with intentions of causing damage to the system or accessing sensitive information without proper authority (Mingers and Walsham, 2010, p. 833). The continuity of business activities and pr
Subscribe to:
Post Comments (Atom)
If you're trying to burn fat then you have to jump on this brand new custom keto diet.
ReplyDeleteTo create this service, licensed nutritionists, personal trainers, and professional chefs united to develop keto meal plans that are powerful, decent, economically-efficient, and fun.
Since their grand opening in early 2019, thousands of people have already transformed their body and health with the benefits a good keto diet can offer.
Speaking of benefits: clicking this link, you'll discover 8 scientifically-proven ones offered by the keto diet.