Verified Document

Challenges Of Protecting Personal Information Research Paper

¶ … Protecting Personal Information When considering the ever-changing and highly competitive global landscape of business today, large firms must be able to effectively globalize their operations in order to reach a greater potential client base, stay at the cutting edge of their respective fields and sustain profitability in the long-term. With the current exponential growth of technology and computerization of business and learning, consumers have become much more connected to the businesses they patronize (Kurzweil, 2001). Accordingly, companies are faced with the continuous task of finding new ways to understand and subsequently accommodate the needs of those customers, while simultaneously securing lucrative business models and job environments. In accomplishing the aforementioned objectives, firms must also be able to supply a secure environment in which clients can feel safe in accessing the products and services of the business. Knowing that many organizations are utilizing the highly effective means of online systems construction as a way to access the global market, security issues have become increasingly important considerations. And noting the vast necessity for the involvement of personal information in computerized commerce, the scope of such information and its industrial effects are massive. Therefore, data protection mechanisms must be effectively instilled in order to secure the safety of all global citizens. In fact, the United Kingdom recently passed "The Data Protection Act " in 1998 in order to legally protect and control the processing of personal data . Though while many consider "personal information" to be strictly financial in nature, recent leakages have also included health records and even government documents. Thus even with legislation in place to protect personal privacy, its effectiveness could be called into question as a result of insecure government internet systems .

Even though crimes like identity theft are relatively archaic (beginning even before the advent of credit cards, with the robbery of passports and social security numbers), the ease with which one can now obtain such vital, and potentially very profitable, information is astonishing . Lax security standards on behalf of any business attempting to engage in online commerce can quickly result in informative breaches and subsequent losses. Also, considering the increasing proclivity of social media networks in the business world, many firms have chosen to utilize such sites as advertising and sales devices. This has been shown to present a very attractive environment for fraudulent activity. By simply posing as an employee in the social media platform, a dishonorable individual can easily discredit, damage and potentially destroy a company's reputation . As a result of this reality, companies must diligently monitor the activities and member lists of their social media operations . Firms should also only place limited amounts of information on such sites, as these arenas are available for public viewing. Moreover, with the increased publicity of identity theft and online security, many companies have allocated massive amounts of capital for security systems and the prevention of external invasions. Though most firms fail to consider the threat of insider identity theft . This can often be an even greater source of potential destruction because insiders possess large amounts of privileged corporate information . To protect themselves from this type of attack, firms should implement at least one of the many types of employee-monitoring software. Such tools can control and limit access to sensitive company information .

From the perspective of the customer, identity protection requires a great deal of individual initiation. The ease with which one can live vicariously through the internet is certainly convenient, though it also presents a slew of potential threats. For instance, when a thief acquires an individual's social security number and/or credit card information, he or she is free to utilize this information to make costly purchases and diminish credit lines, both of which are extremely difficult for the average citizen to bounce back from financially . This is because corrective action after the fact is often very costly and victims usually find themselves in dire financial straits almost immediately . Knowing that online commerce is an ever-growing industry, many online retail agencies allow for the customer to save his or her credit card information as a means of assuring future purchasing expediency . Membership to this kind of system forces the consumer to commit the horrific blunder of permanently storing credit card information via the internet. By saving one's vital credit card data in a retail company's database, he or she puts his or her financial security in the hands of strangers . Being that online retailers are usually high on the target lists of...

And with the immense global capacity of the internet, once a violation has been determined, it is often extremely difficult to pinpoint and apprehend the culprit . The mechanism of personal data-saving is becoming increasingly utilized in modern ecommerce, yet it presents just one example of the many threat structures consumers face in the online marketplace. And in knowing that countless other threats exist, customers must be knowledgeable and thoroughly able to utilize any and all protective mechanisms at their disposal before entering this threatening forum. Such defensive techniques are often as simply as not using the same password for all retail accounts, continuously updating anti-virus programs and even simply turning off the computer after continuous use . However, in order to provide oneself with truly sufficient levels of protection, it is often advantageous to become educated about more sophisticated protective devices. Such items can include encryption, anonymous browsing and virtualization software . The encrypting of one's sensitive data ultimately amounts to the encoding of such information . This means that if a hacker were to stumble upon an individual's personal info, he or she would likely have to spend a significant amount of time trying to break the code. As a result of this labor-intensive task, most identity thieves will simply pass over encrypted information in search of easier targets. The tool known as virtualization software can also be very useful in that such software allows customers to be alerted to viruses and potentially fraudulent activity in a virtual environment before it actually affects their computer or their actual personal information . Thus, in knowing that an individual is solely responsible for protecting himself or herself, and contemplating the devastating aftermath associated with the loss of one's financial identity, becoming educating about all the available protective measures seems like quite a profound necessity.
Regrettably, an individual's financial information is not the only vulnerable data in the world of computerization. Rather, health records are now at risk in the electrified age of patient documents . Assuming that one's health is their most vital asset, such misconduct can be ultimately life-threatening in some cases. While the advent of electronic health records certainly has its advantages in that it "enables the electronic exchange of patient data, which yields cost and quality of care benefits," many potential threats also arise from this systematic approach (Smith, et al., 2010, p. 1). In fact, according to a study done at North Carolina State University which involved an extensive exploratory security analysis of current structural components of the electronic health records system, there are many gaping holes that allow for extraordinarily destructive action (Smith, et al., 2010). Some examples of such unfortunate potential consequences include, "the exposing of all users' login information, the ability of any user to view or edit health records for any patient, and the ability to deny service for all users" (Smith, et al., 2010, p. 1). Therefore, with the essentiality of information-sharing in the healthcare field, the ease with which one can tamper with such critical data is striking and disheartening. The healthcare system itself relies on patient histories in order to ensure that patients receive the proper treatments and medications. Hence, the corruption of such materials can result in mistaken procedures, failures to accommodate a patient's allergies or predispositions and the exposition of embarrassing personal health data (Terry & Francis, 2007). With such horrifying potential consequences, one would naturally assume that the Certification Commission for Health Information Technology (the entity responsible for overseeing the integration of electronic health records) would implement a vast cornucopia of high-level security measures. However, this is not in fact the case. Instead, researchers have been able to infiltrate this system and its patient pool using elementary hacking techniques such as "phishing" (Smith, et al., 2010, p. 8). Phishing is often described as, "a form of social engineering in which an attacker attempts to fraudulently acquire sensitive information from a victim by impersonating a trustworthy third party" (Jagatic, Johnson, & Jakobsson, 2007). The conductors of the aforementioned exploratory analysis performed at North Carolina State University, were able to acquire patients' login information through the use of phishing and the creation of false login templates (Smith, et al., 2010). The simplicity with which these researchers were able to access sensitive information superbly illustrates the scope of the shortcomings of this system. Consequently, these experts recommend several revisions to the current structure.…

Sources used in this document:
Bibliography

Allen, C., & Morris, C. (2007). Information Sharing Mechanisms to Improve Homeland Security. Retrieved March 28, 2011, from http://www.whitehouse.gov/omb/expectmore/issue_summary/issueDetailedPlan_24.pdf

Berghel, H. (2000). Identity Theft, Social Security Numbers, and the Web. Communications of the ACM, 43 (2).

Chou, N., Ledesma, R., Teraguchi, Y., & Mitchell, J.C. (2004). Client-Side Defense Against Web-Based Identity Theft. 11th Annual Network and Distributed System Security Symposium. San Diego, CA.

Jagatic, T.N., Johnson, N.A., & Jakobsson, M. (2007). Social Phishing. Communications of the ACM, 50 (10), 94-100.
Kurzweil, R. (2001, March). The Law of Accelerating Returns. Retrieved March 16, 2011, from http://www.kurzweilai.net/the-law-of-accelerating-returns
Ritzer, G. (2005). Expressing America: A Critique of the Global Credit Card Society. Retrieved March 28, 2011, from https://www1067.ssldomain.com/afcpe/doc/Vol7B1.pdf
Scola, N. (2010, November). Clearing the Cache: Turning Cables into Charts. Retrieved March 28, 2011, from http://techpresident.com/blog-entry/clearing-cache-turning-cables-charts
Smith, B., Austin, A., Brown, M., King, J., Lankford, J., Meneely, A., et al. (2010). Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected. Retrieved March 28, 2011, from http://bensmith.zapto.org/papers/spimacs2010.pdf
Stutzman, F. (2006). An Evaluation of Identity-Sharing Behavior in Social Network Communities. Retrieved March 28, 2011, from http://www.units.muohio.edu/codeconference/papers/papers/stutzman_track5.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Systemic Challenges That Choicepoint Is
Words: 3320 Length: 10 Document Type: Research Proposal

As all these challenges pervaded not only ChoicePoint but all the companies comprising the industry, privacy advocates began to dissect the processes, systems and approaches that data providers were using to collect, analyze and sell information. What they found quickly became the foundation for congressional attention and focus on imposing heavy regulations on an industry that was suffering from a lack of process integration and no oversight or governance

Information System on Ethical and
Words: 6479 Length: 15 Document Type: Research Paper

They have a moral obligation to the South African people in this area for many reasons. First, they have an obligation to make certain that they can participate in the global economy to give their citizens the same chances for advancement as other nations. Secondly, they have a moral obligation to do everything possible to keep their citizens safe. When one discusses the topic of security in Information and Communication

Protecting Against Cyberthreats During a Global Covid 19 Pandemic
Words: 4298 Length: 14 Document Type: Research Paper

New Solutions to New Threat: Optimizing the Remote Work Environment during a Global COVID- PandemicGiven the continuous political turmoil emanating from the nation’s capital for the past three and a half years, few observers would likely have regarded 2019 as “the good old days,” but the multiple crises of an ongoing global COVID-19 pandemic combined with a devastated economy, massive unemployment and growing unrest over racial disparities underscore just how

Information Security Ethical Situation
Words: 1200 Length: 4 Document Type: Essay

Ethical Scenario Ethics is a term used to refer to the set of rules that help in determining right and wrong behavior during moral decision making. One of the major issues in Information Technology and Information Systems is computer ethics. This is primarily because the rapid technological advancements seem to enhance the likelihood of unethical use of computer devices and information systems. As these advancements continue to occur, it is expected

Protecting Against Phishing
Words: 1949 Length: 6 Document Type: Essay

Phishing Problem in Internet Security The number of people browsing the net across the world is increasing with each passing day. There are numerous new internet users each day, and these new users are not aware of the challenges or security issues of the internet. Any online user is vulnerable to numerous security risks like viruses, worms, Trojan horses, hackers, phishing, and pharming. All these are well-documented risks that users face,

Protecting Customer Rights Compliance Research Paper Compliance
Words: 4463 Length: 14 Document Type: Research Paper

Protecting Customer Rights Compliance research paper Compliance Research Paper: protecting customer rights The most significant aspect of any business organization or venture is the data constituting its intelligence. Consequently, the procedure of planning the business venture and accessing required data and maintaining that data is a priority to any business or industry. A business cannot operate without customers, as the core aim of any business is to make remarkable profits. Customer satisfaction dictates

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now