Tuesday, May 14, 2019

Social, legal and ethical aspects of IS security and privacy Research Paper

Social, judicial and ethical aspects of IS security and privacy - Research Paper ExampleThis study looks into an data system as a combination of hardw be, packet, procedures, policies, people, information and data which is involved in the management of organisational military control functions with an locate of meeting organizational objectives and goals with efficiency and effectiveness. The hardware within information systems includes the physical aspects of the system such as computer components and the related equipment. The software is a set of applications alongside the hardware to effectively perform organizational or business functions. The software applications include information processing systems, finance and accounting packages, anti malware applications, statistical tools and word processing packages. Policies comprise of the set standards for proper management of the information system according to the intimate and universal norms of organizational functioning. P rocedures are the steps through which various activities and processes in within the systems should follow to realise that efficiency is enhanced and thusly achievement of high productivity. In an information system, the people are the humankind resource and expertise who are involved in various organizational activities and processes. These include the clients, staff, management, suppliers and distributors. Data or information is one of the significant aspects of an information system because it helps organization to function and survive in the business environment through its application to enhance all business processes and to compete favorably within the market. (Qing, Zhengchuan, Tamara and Hong, 2011, p. 54). Examples of information systems include transaction processing systems which include as set of applications for the processing of the daily activities and processes of an organization. Decision supports systems are other examples of information systems that are importa nt in the decision making process of organization and thus serve as an essential tool for the management team. Management information systems are commonly utilise technologies which facilitate the management process of all functional areas of an organization (Skupsky, 1994, p. 40). Other information systems such as expert systems are used to perform specialized functions such as the application of technology and software applications in the diagnosis of various conditions by medical practitioners. Information System Security and Privacy at bottom information systems, individuals desire to have data or information about them be kept expert from unwarranted, unauthorized access and use for malicious intentions. Additionally, organizational data must be safeguarded from business rivals or malicious system attackers who would take advantage of vulnerabilities within the information system to gain access with intentions of create damage to the system or accessing sensitive informatio n without proper authority (Mingers and Walsham, 2010, p. 833). The continuity of business activities and pr

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.