StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Security Informatics - Essay Example

Cite this document
Summary
Why do firms share information that could be embarrassing about their security state? There are obvious costs, but even when some firms lie, there are obvious benefits. What dimensions of uncertainty exist in vulnerabilities? What strategies do different organizations, both software producers and consumers apply to deal with these uncertainties?…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
Security Informatics
Read Text Preview

Extract of sample "Security Informatics"

Download file to see previous pages

Sine examples of well known companies that have suffered huge losses due to cyber attackers corrupting or manipulating their data resources are Yahoo, AOL, E-bay, Citibank and Egghead.com. This effectively brings us to the first reason why firms share information regarding their security state. To strengthen one’s information security numerous organizations recognized a key factor being the gathering, analysis and sharing of information related to the actual, as well as all unsuccessful attempts at, computer security beaches.

This very notion lead to the formation of the industry- based Information Sharing and Analysis Centers (ISACs) which aimed at enhancing protection of the cyber infrastructure of various firms. By this mutual collaboration, despite the fact that various companies reveal information that could be considered embarrassing regarding their security state, they benefit greatly in other ways. These being on receiving end of various security practices and solutions which would result in the production of much more secure products and an increase in the overall market demand for security enhancing software and hardware.

True there are several benefits if the firm chooses not to disclose information about their security state in terms of financial costs incurred post disclosure, the negative publicity that might result in loss of market shares and an increase in the likelihood of leakages by increasing the number of holder’s of the information regarding sensitive security flaws. However the firms after a cost-benefit analysis chose to share security information due to two key advantages. The first is the private firm specific benefit which aims at preventing further security breaches and future fraud losses.

By spending on identifying and repairing existing vulnerabilities the firm cuts costs in terms a prevention of future security threats. Furthermore the increased amount of sales due to an acquisition of a better security reputation and goodwill as a result of these measures more than covers up the initial financial cost invested. By reporting a security breach to central monitoring the firm effectively sends a strong message to the customer that portrays them as responsible, committed to developing rigorous security procedures designed to protect and take care of the customer and a company more reliable as well as secure.

This positive image does wonders for the company in terms of profitability and market share. The industry benefits are the other reason for information sharing by companies. As there is an increase in the overall customers’ trust in transacting with a particular firm it directly affects the overall market size within the industry. This increase in the customer base simply by addressing their fears of privacy and information security related issues leads to more cross selling and upsellling by companies.

B2C e-commerce is also positively impacted for the very same reason. Look at the wonders Amazon’s efforts in terms of protecting the integrity of customers’ data and increasing confidence in online purchases has paved way for numerous online businesses to initiate operations and be acceptable to consumers. There are three dimensions of uncertainty that exist in vulnerabilities. Firstly there is representativeness, which is mainly applied in order to assess the probability that an object or an event A belongs another process B.

Availability of

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Informatics Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1409376-security-informatics
(Security Informatics Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/environmental-studies/1409376-security-informatics.
“Security Informatics Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/environmental-studies/1409376-security-informatics.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Informatics

Examination of Major Epistemological Constraints

The main aim for this secrecy was to intensify operational security and eliminate any prospects of external... Examination of Major Epistemological Constraints Name: Instructor: Task: Date: Examination of Major Epistemological Constraints Epistemology is one of the most discussed areas in terms of learning and development....
12 Pages (3000 words) Essay

Privacy and Misuse of Private Information

Course Instructor Institution Name Date In regard to the case of Melinda, there is breach of human rights according to the privy law.... This is due to the posting of photos to the public as well as the demeaning of Baking!... Magazine by foregoing its initial plan of posting the photos which were decent, under the privy law, for there to be breach, the information should have the right quality of confidence where the question, which is underlying, is under disclosure to the public....
6 Pages (1500 words) Essay

Information Sensitivity and Protection of Data (SLP)

Hence, it can be stated that this measures or approaches of the company strengthen information security and sensitivity altogether by facilitating data disbursement and simultaneously, preserving information security (informatics Corporation of America, 2013; OSF Healthcare, n.... Information Sensitivity and Protection of Data (SLP) Effectiveness of Information security Policies of OSF Healthcare and its developed nature OSF Healthcare is one of the renowned healthcare organizations operating in the US for a considerable time period now....
3 Pages (750 words) Essay

The Value Of The Internet For Terrorists - Case Study Al-Qaeda

Since 9/11, public awareness of, and government concern with, Internet security issues has mushroomed.... The study "The Value Of The Internet For Terrorists - Case Study Al-Qaeda" aims to understand how the terrorists use the internet with particular reference to the Al-Qaeda and its associates....
8 Pages (2000 words) Research Proposal

Details on 2001 DC Sniper

Numerous people have fell victims of serial killers from time to time, with the state and federal governments intensifying their efforts to curb this criminal act.... Diverse and dynamic undertakings have been pursued in… One of the most shocking acts of serial killing is the 2001 D.... .... Sniper Case....
7 Pages (1750 words) Case Study

Students Self-Service Website for Mobile Devices

The paper "Students Self-Service Website for Mobile Devices" highlights that security of the application should be ensured in order to avoid any intrusion and postage of unwanted and offensive material.... This may include such things as malware and virus.... hellip; The rapid introduction of new devices into the market may render the application useless if care is not taken to address these changes....
10 Pages (2500 words) Essay

Fighting Cyber-crimes

This paper ''Fighting Cyber-crimes'' tells that with the increase in the widespread use of the internet, cybercrime rose massively from 2005, draining billions of dollars.... To fight against it, technical, ethical, and juridical challenges in efficiently reducing the crime started being identified....
5 Pages (1250 words) Report

The Deep Web Performance

But, it is the content and the services that are a big issue for the security of the community and the protection of the people (He, Patel, & Zhang, 2007).... This deep web software provides an independent platform for the security of the data.... These commercial sites need information about the user's location and, in some cases, other personal details like the security codes and the passwords (Paganini, 2012)....
5 Pages (1250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us