Retrieved from https://studentshare.org/business/1631686-case-5-information-security-and-ethics
https://studentshare.org/business/1631686-case-5-information-security-and-ethics.
Because it is unfortunate that a leakage of information committed by an internal employee who accesses almost every details of the valuable information daily. This issue no doubt harms the ethical bonding between the employees and the organizations. But in the case of external trespassing into the organization’s confidential information zone, the blame would directly go to its security system which basically shows the loopholes of its security protocols. But, this is another issue.
The organization should make the employees of all levels signed into the document where policies have been stated transparently after distributing and describing the issues about information security. Definitely, an organization containing three employees would differ from the organization with manpower of thousand people in the sense of organizational information policy. The implementation of the e-business framework has led many organizations into serious threat about information security. From the very commencement of the internet, rather say the from the beginning the internet has came with complications and vulnerabilities that is- its basic communications as well as the nodes, norms about its protocols, authentication of its network and host frameworks etc.
Dissatisfied employees, hackers, opponents and other stakeholders destroyed the internet’s vulnerabilities which caused damages of privacy, financial damages, loosing of customers, interruption in the activities and unpredictability. Many employees were allowed to access internet for authentic business purpose but actually the result went to misuse of information either from lack of compassion for uncertainty, or lack of consciousness of authentic usage of internet in the organization or exactly by the wicked intension.
For these reasons, some protocols are generally set inside an organization to make the information security system more
...Download file to see next pages Read More