Verified Document

Securing The Electronic Frontier P. Research Paper

Part 2 - Reflective Diary

The security of customer's data is very critical in the contemporary business environment because of the increase in the data breach that could make organizations to face bad publicity within and outside the United States. Essentially, organizations are required to secure employees' and customers' data to enhance Pretty Good Privacy (PGP) within the IT environment. One of the strategies to enhance customers' privacy is to implement data encryption. Encryption is a strategy of encoding data file where only authorized user can only have access to a secret "key' in order to read the data. The major impact of encryption is that it will prevent unauthorized access to organizational data, which will consequently enhance data protection and privacy. Moreover, securing information will make organization to be in line with the IT ethical standard, which will consequently enhance organizational public image.

Despite the security platform implemented by many organizations, there is still an issue of trespass of IT asset. The trespass occurs when an unauthorized individual is having access to IT assets. An example of a trespass is an issue of a hacker trying to have access to customer's data. On the other hand, legitimate access occurs when an authorized individual get access to an organizational IT assets. Typically, trespass and legitimate access have a real world application in cyber ethics. The trespass is contrary to the IT ethics, however, the legitimate access is ethical within the IT and business environment. Organizations need to design an effective IT policy to guide employees on the ethical use of IT assets in order not to be...

One of the effects of encryption code is that it assists in enhancing electronic privacy. No customers will be ready to submit their personal data to organization if they believe that organization will be not be able to protect their personal data. Thus, employers are required to protect customers' personal data as well as allowing employees to enjoy free speech within an organization to enhance employees' efficiencies. The survey findings presented by American Management Association in 2000 revealed that increasing number of business implemented surveillance on employees during the working hours. Typically, employee's surveillance grew from 45% to 66% in 1999. Some employers even go to the extent of monitoring employee's email communication using the Mail Marshal making some employers to fire many employees for misusing email within the workplace. This issue led to a conflict between employer's rights and employee's privacy. This paper suggests that there is a need for mutual understanding between employee and employers on the use of the internet within a workplace to prevent a potential conflict.
Reference

McEvoy, S.A.(2002). Email and Internet Monitoring and the Workplace: Do Employee has the Right to Privacy. Communication and Law.

Miller, A.R. & Tucker, C.E.(2011). Encryption and the Loss of Patient Data. Journal of Policy Analysis and Management, 30 (3):534-556.

Lugaresi, N.(2010).Electronic Privacy in the Workplace: Transparency and Responsibility. International Review of Law, Computers & Technology. 24( 2):163-173

Sources used in this document:
McEvoy, S.A.(2002). Email and Internet Monitoring and the Workplace: Do Employee has the Right to Privacy. Communication and Law.

Miller, A.R. & Tucker, C.E.(2011). Encryption and the Loss of Patient Data. Journal of Policy Analysis and Management, 30 (3):534-556.

Lugaresi, N.(2010).Electronic Privacy in the Workplace: Transparency and Responsibility. International Review of Law, Computers & Technology. 24( 2):163-173
Cite this Document:
Copy Bibliography Citation

Related Documents

Securing the Electronic Transfer Securing
Words: 976 Length: 3 Document Type: Research Paper

Essentially, securing the electronic frontier is very critical because of the potential harms that cyber crime and fraud cause to individual, businesses and nations as a whole. One of the effective strategies that could be employed to secure the electronic frontier is the collaboration of the government with the private and public organizations. Increasing number of governments has implemented method to secure the electronic frontier without success. Since corporate organizations

Hacktivism Securing the Electronic Frontier Consider How
Words: 591 Length: 2 Document Type: Essay

Hacktivism Securing the Electronic Frontier Consider how cybercrime is defined and how it relates to the issue Internet vulnerabilities. Cybercrime is any illegal or illicit activity which is mediated by internet usage and which is aimed at accessing, stealing or destroying online data. This may include hacking of government websites, phishing scams, disruption of commercial service sites or penetration of privately held databases containing personal information about private citizens. The presentation given by

Released by the FBI and
Words: 17274 Length: 65 Document Type: Research Proposal

" Human development- behavioral shifts in human being that tae place during the course of an entire lifespan ("Human Behavior"). Risk Analysis- the activity of determining and analyzing the dangerous natural and human caused negative events. This analysis takes into consideration the risks these event pose to businesses individuals and governments. Within the domain of information technology risk analysis reports are utilized to tailor technology-related objectives with a an organization's business objectives.

U.S. Patriot ACT: We Deserve
Words: 3590 Length: 10 Document Type: Thesis

" (Lindsey, 2004, p.1) it is interesting to note that one of the young protestors stated: "[the world leaders] are sitting over there on Sea Island having their little party only talking about how to fix things, but we are over here actually doing something to make things better" -- Laurel Paget-Seekins (Lindsey, 2004, p. 1) the U.S.A. Patriot Act has been touted to do just this - or to

Distinction and Need for Governance at All Three Levels Corporate...
Words: 3850 Length: 13 Document Type: Term Paper

Corporate governance, IT Governance and Information Security Governance IS 8310 Governance, Risk Management and Compliance Governance is the process of empowering leaders to implement rules that are enforceable and amendable. For comprehensive understanding of the term' governance' it is essential to identify the leaders and the set of rules, and various positions that leaders govern. Corporate governance, IT Governance and Information Security Governance embraces a linkage with certain acquiescence system while

Adults on Secured Online Environments
Words: 12910 Length: 50 Document Type: Term Paper

Next, the researcher will conduct a query of the computer awareness of education administrators, teachers, parents, and students in the New Orleans school district, then evaluation of documented data will provide a research base of the required elements needed to consider while developing a framework that can be used as a guide by educational leaders and parents for the protection of children at school and at home. Research areas

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now