StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Intro to Mgt Syst - Assignment Example

Cite this document
Summary
Lucey (2005) notes that there is need to protect personal information such as financial data, medical records, political record,…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.9% of users find it useful
Intro to Mgt Syst
Read Text Preview

Extract of sample "Intro to Mgt Syst"

Ethical Issues in Information Systems YourFirst YourLast Information or data privacy is an ethical issue in information systems that refer to the aspect of protecting an individual’s personal information. Lucey (2005) notes that there is need to protect personal information such as financial data, medical records, political record, criminal records, website data, and business related information from access by unauthorized persons who may be ill-motivated. I believe that it is important to protect personal information of a person because vulnerabilities of personal information have significantly increased with the advancement of the digital age.

By instituting privacy policies in information systems, organizations can safeguard personal information of their employees and customers from access and manipulation by ill-motivated individuals. There are several human and technological protective measures that can be used to safeguard and enforce privacy in information systems. Some of the most operative and widely used mechanisms include encryption, data masking, and authentication. Kim and Solomon (2012) define encryption as the process of encoding information and/or messages in such a manner that only the authorized parties can access or read it.

The process involves encrypting plaintext with an encryption algorithm to generate the cipher text that is only readable if decrypted. Therefore, any interceptor of the message cannot access it unless they provide the encryption key which is provided by the originator of the information (Kim & Solomon, 2012). Data masking, on the other hand, refer to the process of hiding the original data with random characters to prevent classified personal data from access by unauthorized persons (Rainer & Cegielski, 2012).

Data masking aims at protecting the actual data by having a functional substitute when the real data is not required. Authentication is another measure that can be taken by determining whether something or someone is what he or she declares to be. Authentication in information systems is attained through the use of logon passwords and pin numbers (Kim & Solomon, 2012).There are several problems related to management information systems that arise from privacy of information. One of the most common problems is security breaches, which emanate as a result of hackers and viruses.

Today, most organizations store their data on remote cloud servers accessible with a username and the appropriate password (Kim & Solomon, 2012). However, there is a higher risk of losing the data through viruses, hijackers, and wrong-minded knowledge workers. Another problem is the difficulty in ensuring internet security. Primarily, when customers are shopping online, they are required to provide their financial details (Rainer & Cegielski, 2012). However, hackers can use these loopholes to their advantage and channel this information for their own needs.

There is also the problem of data mining and use of personal information by unauthorized persons. Organizations can take several measures prevent these problems caused by information privacy. First, backing up data or information which involves copying, and archiving data can be used to store data for retrieval in the event of data loss through hackers or attack by viruses. Second, installing an anti-virus in an information system will protect data from attack by viruses (Lucey, 2005). Third, using Secure Sockets Layer (SSL) authentication in online transactions ensure that there is secure communication between a merchant, customer, and the server.

The use of firewalls is also an excellent way to solve the problem of data hacking and loss (Kim & Solomon, 2012).ReferencesKim, D., & Solomon, M. (2012). Fundamentals of information systems security. Sudbury, MA: Jones & Bartlett Learning.Lucey, T. (2005). Management information systems. London: Thomson Learning.Rainer, R. K., & Cegielski, C. G. (2012). Introduction to information systems: Supporting and transforming business. Hoboken, NJ: Wiley.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Intro to Mgt Syst Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Intro to Mgt Syst Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1662919-intro-to-mgt-syst
(Intro to Mgt Syst Assignment Example | Topics and Well Written Essays - 500 Words)
Intro to Mgt Syst Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1662919-intro-to-mgt-syst.
“Intro to Mgt Syst Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1662919-intro-to-mgt-syst.
  • Cited: 0 times

CHECK THESE SAMPLES OF Intro to Mgt Syst

Analysis of the TV Shows Friends and How I Met Your Mother

The author of the following essay provides an analysis of the TV shows “Friends” and “How I Met Your Mother”.... Reportedly, in every generation, there is a program about a group of friends and how those people create relationships within their circle.... hellip; In 1994, when our parents were the teenagers in their formative years, the television program that influenced them the most was the show about a group of people who had an uncanny love for coffee and sitting around a coffee shop long before Starbucks turned hanging out in coffee shops a lifestyle....
5 Pages (1250 words) Essay

Mirrlees Review Recommendations on Taxation

‘The Mirrlees Review' was a project conducted by the Institute for Fiscal Studies that aimed at “identify[ing] the characteristics that would make for a good tax system in an open economy in the 21st century” (Mirrlees, Adam, Besley, et al.... 2012: v).... The Review aimed at… closing a crucial loophole within the UK tax system, by presenting a comprehensive analysis of the right direction for the UK tax policy, encompassing specific reforms proposals coupled with suggestions for broad strategic reforms....
8 Pages (2000 words) Essay

Relational Database Design for Local College

In this paper, this design principle in used to describe a database project for a local college using 3 key entities (Churcher, 2012).... Attached to this paper is the… This paper aims to show that the diagram reflects the true nature of how the database will be implemented. For an educational institution such as a college, we must first identify the key entities within the institution and translate them Relational Database Design for Local College Relational Database Design for Local College Rational Database Design enables entities in the database to be linked to each other through relationships....
1 Pages (250 words) Essay

Intro to Rel Dbase Mgts Syst

For example, a sales company's sales department stores the name of a salesman as Bill Brown while same name in personnel department is… Price of the product is shown as $45.... 0 in the sales office while product of the same product is displayed as $43.... 0 in another department. Response 1: Constraint like Candidate key Yours Teacher's 29th October, Introduction to Relational Database Management System Normalization and Redundancy" Please respond to the followingQuestion number 1:Response 1: Data inconsistency is one the main problem that exists in different versions of the same data, which appears in different places....
2 Pages (500 words) Assignment

Information System and Enterprise Systems

The firm should ensure that the system creates unique processes different from its competitors in order to stay ahead.... Hence, the… The cost of the system is a key factor in making building or renting a system.... The choice taken must be cost effective for the firm.... For Introduction to Management Information System al Affiliation Introduction to Management Information System Information System and Enterprise Systems1....
4 Pages (1000 words) Assignment

Should international non-governmental organizations (iNGO) be allowed to act anywhere, at any cost

Over 60 years after the establishing of the United Nations (UN), multinational associations, which are generally referred as international non-governmental organizations or INGOs, have emerged as major actors on the global platform.... The rapid growth of these organizations during… Although yet partially approved by few scholars of international relations, INGOs have evolved into a dominant 3rd force in global systems, paralleling, but still t equaling, the enlarging role of inter-governmental associations in the political field and the expeditious globalization of commerce in the economic sphere....
4 Pages (1000 words) Essay

Ratan Tata: Leading the Tata Group into the 21st Century

The author of this essay critically discusses the leadership of Ratan Tata and evaluate his successes and failings by setting them in the right context.... The author also attempts to identify areas where the Tata group lags behind and propose measures to improve those  … This also means that the shareholders in Tata Motors can only hope to see moderate returns on their investment in the medium term....
6 Pages (1500 words) Research Paper

Investment Proposal of the All-Natural Extreme Energiser

This report “Investment Proposal of the All-Natural Extreme Energiser” aims to present the financial background to an investment proposal in a new energy drink – Extreme Energy.... The proposal will be supported through the use of marginal costing and breakeven analysis.... hellip; The author states that sports drinks are being refocused to target serious athletes due to the competition from alternatives such as functional juices....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us