Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
The paper “Security, Privacy, IP, Governance and Ethics” is an intriguing example of an information technology annotated bibliography. In this article " Respecting people and respecting privacy. Communications of the ACM", Camp, L. is expressing his views regarding upholding privacy. …
Download full paperFile format: .doc, available for editing
Extract of sample "Security, Privacy, IP, Governance and Ethics"
Security, Privacy, IP, Governance and Ethics
Name
Date
Security, Privacy, IP, Governance and Ethics
Camp, L. (2015). Respecting people and respecting privacy. Communications of the ACM, 58(7), 27-28.
In this article, the author is expressing his views regarding upholding privacy. Designers have the primary responsibility to protect people’s data and privacy by minimizing data collection. Camp bases his argument on results of a previously done study, which revealed that several people including professionals do not have adequate information about security and privacy. Reducing the amount of data that systems collect reduced the risk data loss or access by unauthorized personnel. This article is worth including in writing on the topic at hand because it offers suggestions on improving security and privacy now that data plays a core part in modern organisations.
Mann, D., Travis, C. L., & Cook, L. D. (2015). Data security and privacy: More than the IT department’s concern. The Computer & Internet Lawyer, 32(12), 8-11.
Contrary to Camp (2015) who believes that IT departments and designers are primarily responsible in securing data privacy and security, Mann, Travis, and Cook (2015) are of the view that this is a collective responsibility with users being required to take a core part. The authors acknowledge that users present the weakest link on the protection system primarily because of their lack of knowhow and sometimes ignorance. Laws and policies have been put in place, which if properly used will help in promoting data privacy and security by ensuring that data handlers do so responsibly. This informative article presents different methods to fighting global cyber security risk. Its proposal of a collaborative approach makes it to have a major contribution to the topic.
Federal Trade Commission. (2016). Mobile health App developers: FTC best practices. Retrieved from https://www.ftc.gov/tips-advice/business-center/guidance/mobile-health-app-developers-ftc-best-practices
Federal Trade Commission (FTC) is an American public organisation that seeks to protect consumers. It has offered useful tips that developers for healthcare apps can use to ensure high levels of privacy and security of consumer data. In agreement with Camp (2015), FTC advices institutions to limit the amount of data they collect. Limitation of permission and access to stored data reduces risk of data loss. Other best practices to consider include using evidenced-based practices already in use such as authentication, considering data security during system design, considering increased use of mobile platforms, and reviewing all the applicable laws during design and operation of data collection and storage system. This article is useful in the topic because it offers different strategies to promoting security and privacy.
Robichau, R. (2014). Healthcare information privacy and security: Regulatory compliance and data security in the age of electronic health records. New York, NY: Heinz Weinheimer. ISBN: 978-1-4-4302-6676-1.
The author is an electronic medical records (EMR) consultant and he thus writes authoritatively out of experience and advanced knowledge in the field. The book serves as a manual for executives of healthcare organisations, IT managers and directors, technical staff and analysts, EMR vendors, information security officers and staff, consultants, and ancillary compliance officers. The author notes that there is a dire need to move from manual to electronic systems of handling and managing patient data and medical information. However, this must not be at the expense of privacy and security of patient data. Robichau presents a wide approach of protecting data, which, in accordance with Mann, Travis, and Cook (2015), should be multidisciplinary. The author introduces the concepts of responsibility and ethics as a strategy for protecting patient data stored in EMRs. This resource is useful because it approaches the issue from an all-round perspective.
Salomon, D. (2003). Data privacy and security: With 122 illustrations. New York, NY: Springer-Verlag New York, Inc.
This book focuses on the technical aspects of protecting data particularly data encryption and data hiding. The author provides an in-depth discussion of these two strategies including specific methods of each of the two broad topics. The book is useful in the topic because it gives a comprehensive explanation of two commonly used methods of protecting data stored in and transferred within electronic systems.
Weise, J., Brunette, G., & Dennedy, M. (2009). Data protection. In C. W. Axelrod., J. L. Bayuk & D. Schutzer (Eds.). Enterprise information security and privacy (21-41). London: Artech House.
Chapter two by Weise, Brunette, and Dennedy is about data protection. After discussing important concepts on data and protection, the writers provide recommendations on ensuring utmost data protection. In agreement with previously reviewed sources, this book chapter supports the importance of having a holistic approach to data protection, which makes it the responsibility of every stakeholder in the respective electronic system to take part. The authors introduce a new concept, corporate governance, whereby they argue that plays a pivotal role data protection by overseeing the development and implementation of a holistic data protection program. This book chapter presents crucial information on data security and privacy, and it will come in handy when writing about the topic under consideration.
Salido, J. (2010). Data governance for privacy, confidentiality and compliance: A holistic approach. ISACA. Retrieved from http://www.isaca.org/Journal/archives/2010/Volume-6/Pages/Data-Governance-for-Privacy-Confidentiality-and-Compliance.aspx
Salido writes for ISACA, a reputable, professional, international institution that focuses on IT governance. In his article, Salido notes that moving into electronic data management systems is inevitable for contemporary businesses. However, the primary challenge facing institutions today is ensuring data privacy and security especially with the rise in cyber crime. The article presents a new approach to data management for privacy and security known as Data Governance for Privacy, Confidentiality, and Compliance (DGPC). The framework gives a holistic approach to data protection that identifies security and privacy threats and then uses appropriate methods to counter them. Its primary components include people, process, and technology. This article presents a new and interesting approach that might help healthcare institutions deal with data privacy and security risks better than before.
Razaeibagha, F., Win, K. T., & Susilo, W. (2015). A systematic literature review on security and privacy of electronic health record systems: technical perspectives. Health Information Management Journal, 44(3), 23-38.
The authors conducted a literature review on security and privacy technical features of electronic health record systems (EHRs) that are frequently adopted. The analysis outlined 13 common features, which include cryptography techniques, compliance with security requirements, consent and choice mechanism, applicability and scalability, integration and sharing, policies and regulation, system and application access control, and interoperability. This article contributes to data protection for privacy and security by presenting some technical features that designers and system analysts should consider including in EHR and other electronic systems. The article also present an in-depth discussion of each of the features, which enhances the understanding of the whole issue.
Kerstein, S. (2013). Moving the needle toward a data-driven health care system: Optimizing the EHR through information governance. Journal of Health Care Compliance, 15(3), 45-62.
In this article, the writer argues that information governance (IG) will be helpful in helping healthcare organizations to optimize their technology resources by making them data driven. IG will therefore move EHR systems from mere implementation to optimization. It will not only promote effective use of data, but will also promote responsible use by setting out procedures and policies and then ensuring that they are followed. IG will also promote accountability, which will in turn increase data privacy and security. This article appears to suggest that before any institution decides to shift from manual to electronic system, it must put in place a robust IG system. Those organizations that have already moved should consider establishing an IG structure that will optimize data use. The article contributes to the topic by shinning some light on the role of information governance on data privacy and security as well as ethical use.
Brey, P. (2007). Ethical Aspects of Information Security and Privacy. In M. Petkovic & W. Jonker (Eds.) Security, privacy, and trust in modern data management (21-38). Springer-Verlag Berlin Heidelberg.
This book chapter deals with the ethics around security and privacy of computer and information. The author outlines and explains various aspects of ethics in computer security including an explanation of cybercrime. The resource provides crucial information on issues affecting data security and privacy, which aids in designing data protection systems. Information security personnel and any person involved in designing data systems as well as those who handle data are morally responsible to protect customer’s privacy and security by protecting collected data. This book chapter contributes to writing on the topic at hand by easing the understanding of how data is lost or stolen. Further, it reminds people directly involved in system design and implementation that they must act ethically when dealing with data or designing systems for collecting, storing, and sharing data.
References
Brey, P. (2007). Ethical Aspects of Information Security and Privacy. In M. Petkovic & W. Jonker (Eds.) Security, privacy, and trust in modern data management (21-38). Springer-Verlag Berlin Heidelberg.
Camp, L. (2015). Respecting people and respecting privacy. Communications of the ACM, 58(7), 27-28.
Federal Trade Commission. (2016). Mobile health App developers: FTC best practices. Retrieved from https://www.ftc.gov/tips-advice/business-center/guidance/mobile-health-app-developers-ftc-best-practices
Kerstein, S. (2013). Moving the needle toward a data-driven health care system: Optimizing the EHR through information governance. Journal of Health Care Compliance, 15(3), 45-62.
Mann, D., Travis, C. L., & Cook, L. D. (2015). Data security and privacy: More than the IT department’s concern. The Computer & Internet Lawyer, 32(12), 8-11.
Razaeibagha, F., Win, K. T., & Susilo, W. (2015). A systematic literature review on security and privacy of electronic health record systems: technical perspectives. Health Information Management Journal, 44(3), 23-38.
Robichau, R. (2014). Healthcare information privacy and security: Regulatory compliance and data security in the age of electronic health records. New York, NY: Heinz Weinheimer. ISBN: 978-1-4-4302-6676-1.
Salido, J. (2010). Data governance for privacy, confidentiality and compliance: A holistic approach. ISACA. Retrieved from http://www.isaca.org/Journal/archives/2010/Volume-6/Pages/Data-Governance-for-Privacy-Confidentiality-and-Compliance.aspx
Salomon, D. (2003). Data privacy and security: With 122 illustrations. New York, NY: Springer-Verlag New York, Inc.
Weise, J., Brunette, G., & Dennedy, M. (2009). Data protection. In C. W. Axelrod., J. L. Bayuk & D. Schutzer (Eds.). Enterprise information security and privacy (21-41). London: Artech House.
Read
More
Read
More
Share:
CHECK THESE SAMPLES OF Security, Privacy, IP, Governance and Ethics
… The paper "Business ethics and CSR in International Business" is a good example of business coursework.... nbsp;The general consensus is that Business ethics and Corporate Social Responsibility are separate, but not exclusive fields: Coupled with the fact that both the extent and the nature of Business ethics and Corporate Social Responsibility, have characteristic variances, which is an operational sense, prompts each organization to either react or actin the application of one or the other....
Each NPO mandated by the council of nonprofits to draft its own appropriate code of ethics depending on its operations.... Among the laws that NPOs must comply with include those set by the Internal Revenues Service (IRS) and the code of ethics.... … The paper “Marketing Professional Practice - Ethical Issues Facing Non-Profit Making Organizations" is an intriguing version of the literature review on marketing....
… The paper "Australian Exchange security" is a wonderful example of a term paper on macro and microeconomics.... This paper's purpose is to examine, consider, compare and contrast, and critically analyze laws governing insider trading within the context of the Australian exchange security and Australian Securities and investment commission as a stock market regulators and exchanges in Australia.... The paper "Australian Exchange security" is a wonderful example of a term paper on macro and microeconomics....
… The paper "Corporate governance in Different Theoretical Models, Vodafone's Corporate governance" is a perfect example of a business case study.... In simple terms, corporate governance refers to a framework of practices as well as rules used by the board of directors to ensure accountability, transparency, and fairness in the firm's relationship with the stakeholders.... The paper "Corporate governance in Different Theoretical Models, Vodafone's Corporate governance" is a perfect example of a business case study....
… The paper "Corporate governance - Apple, Siemens, LG Company" is a perfect example of a business case study.... Corporate governance is an essential aspect in the understanding of organizational behavior and consumer behavior.... The paper "Corporate governance - Apple, Siemens, LG Company" is a perfect example of a business case study.... Corporate governance is an essential aspect in the understanding of organizational behavior and consumer behavior....
In addition, tea per will also determine the most appropriate theory in understanding matters of corporate governance and behaviour.... The definition of the conception of corporate governance necessitates the addition to the professional code of ethics, standards, transparency, responsibility and fairness (Brink 2011).... … The paper "Corporate governance Issues " is a good example of business coursework.... nbsp;Organizations in contemporary society are faced with the need to streamline corporate behaviour and governance because they have been considered more significant with regard to the operationalization of different companies....
… The paper "Collusion between BP and the Government to Commit Environmental Crimes" is a perfect example of a business case study.... The corporations have become too powerful thus presenting a threat to the global economies, civil societies, and the environment.... Some of the companies that have proven to be a threat include Apple, BP, and Volkswagen....
… Generally speaking, the paper "Risk Analysis Assessment of Need for Speed Pty Ltd " is a perfect example of a business case study.... In the current fast-developing world business models are changing rapidly.... In the past ten years, huge shifts have been witnessed particularly in the automobile industry....
29 Pages(7250 words)Case Study
sponsored ads
Save Your Time for More Important Things
Let us write or edit the annotated bibliography on your topic
"Security, Privacy, IP, Governance and Ethics"
with a personal 20% discount.