Information Technology Security and Risk Management
Verified
Added on  2023/04/21
|11
|2686
|70
AI Summary
This report conducts research on organizational information security and ethics, discussing due care and due diligence, analyzing the role of policy, and identifying methods for preventing unethical and illegal behavior.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Runninghead:INFORMATIONTECHNOLOGYSECURITYANDRISK MANAGEMENT Information Technology Security and Risk Management Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1INFORMATION TECHNOLOGY SECURITY AND RISK MANAGEMENT Table of Contents Introduction:...............................................................................................................................3 Research Method and Approach:...............................................................................................3 Methodology:.........................................................................................................................3 Approach:...............................................................................................................................4 Results:.......................................................................................................................................7 Discussion:.................................................................................................................................8 Conclusion:................................................................................................................................8 Reference:................................................................................................................................10
2INFORMATION TECHNOLOGY SECURITY AND RISK MANAGEMENT Abstract: The main aim of this report is to conduct a research on organizational information security and ethics. For conducting this research a vast literature review discussion has been utilised in this case, thus all of secondary data has been used in this case form the previous researches. For conducting this research some specific areas of organizational context has been discussed in this case. First of all due care and the due diligence has been discussed briefly and this discussion has provided the idea how much important the due diligence and the due care is for the organizations. Policy and laws are discussed in this case and the best methods for prevention of unethical and illegal activity is identified.
3INFORMATION TECHNOLOGY SECURITY AND RISK MANAGEMENT Introduction: The information security is considered as the practice of the unauthorised access prevention to a particular computer system (Siponen, Mahmood and Pahnila 2014). The source of this data can be various which can be physical and electronic. The main focus of the information security is protecting integrity of data, confidentiality of data and availability of data.Theinformationsecuritycanbeachievedbysomemultistepprocessofrisk management which identifies the vulnerabilities, sources of threat and the potential impact of this risk and the efficiency of the risk management plan. In this information security ethical concern are widely recognised. In the context of information there are several ethical consideration of it. In the ethical consideration there are mainly some privacy concerns regarding data collection in large scale. In some recent cases the information security is discussed exclusively in the terms risk mitigation which is associated with technical and organizational infrastructure. In this essay a research will be done on ethics and the information security. In this context due care will be analysed within the organizational context. Also, in this case difference between doe due and due care will be analysed. Following that the role of policy in the organizational context will be researched. Further, illegal and unethical behaviour will be analysed and this activities can be prevented within the organization will be discussed. Research Method and Approach: Methodology: In this context of ethics and information security for conducting a research the selected method is the literature review. Thus by conducting the literature review this research will be a secondary type of research. The main focus of this research is analysing the important ethics regarding the information security.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4INFORMATION TECHNOLOGY SECURITY AND RISK MANAGEMENT Approach: The approach of the research is based on the secondary data analysis. In this type of research approach no data is collected directly from a primary sources. Instead of it the data is collected from the previous researches and from secondary type of data sources. For the further research some research questions has been developed which will be addressed in this research approach. The main research regarding the ethics and information security will be done on the basis of due care. Thus first in this case due care will be analysed in the organizational context. According to the author Schwenkenbecher (2014), due care can be considered as effort that is made by some reasonable party or some ordinarily prudent for avoid harming to others and for taking circumstances in account. The due care is referred to the judgement level, prudence, care, activity and determination that a normal person would be expecting within some particular circumstances. The author also explained that it is some type of features that informs the client about an insurance policy that mainly describes the risks involved with the possible future purchases. In a broader explanation of the due care the author explained it as the law for organizations while selling some policies. This law is capable of disclosing the truths while an agent of the organization is busy with selling some policy. This law describes that the seller must not represent something falsely about the product. That means the seller must not claim some feature that is actually not delivered by theproduct(Schwenkenbecher2014). Also, thesellershould nothideanydownside regarding the project which might can be a decisive factor for purchasing the product and this is the main factor of due care. While an organization is failed to perform the due care the client maybe unhappy with the organization and this can result in closure of the organization and can create damage to the organization. This can also terminate the licence of the
5INFORMATION TECHNOLOGY SECURITY AND RISK MANAGEMENT organization due to the malpractice done by the organizational agent. These are the main reasons that an organization should practice the due care in usual course of operations. As per the authors Mullins, Thornton and Adams (2011), due diligence might be considered as similar with the due care but actually those are different from each other. As per the authors these two terms are actually not interchangeable. Rather than these two terms are equally important for an organization. Comparing with the due diligence the author stated the due care as reasonable care of protecting interest of the organization. The due diligence is practicing or revision of that particular activities which maintains the effort regarding the due care. As an example the author stated the due care as the development of formalised security structure that contains some security policies and polices. Due diligence is the considered as continuousapplicationregardingsecuritystructurewithintheITinfrastructureofthe organization(Mullins, Thornton and Adams 2011). The due diligence performssome importantexaminationbeforestartinganaction.Inshort,duecareisconsideredas performing important actions from the due diligence while the other one is due diligence is performing some necessary research. Thus as per the authors both due diligence and the due care are important for the organization. Regarding the information security, the author Vedung (2017), has elaborated that it is a deliberate system of some group of principles which guide to decision making process and in achieving some rational outcomes. This is considered as intent statement and it is considered as some structured protocol. The policies are very much important which is generally used by the organizational governance body. Policies can be both objective and subjective in the process of decision making. In the subjective decision making polices usually assists the senior management of the organization while the objective decision making policies are operational in nature. The author has also elaborated that the policies are different from the laws and it is very much important to understand the difference in
6INFORMATION TECHNOLOGY SECURITY AND RISK MANAGEMENT organizational context (Vedung 2017). As per the author the policy is the outline of hopes of the government. It actually elaborates the goals of government. Policy document is not set of laws but the policies are very much important achieving new laws with the aim of achieving organizational goals. Considering the laws, it is set of standards, principles and procedures which need to be followed. If a law is not followed then it can be prosecuted in the court. Thus the policy is used for setting the goals and planned activities of an organizational department. The law is enabled by a government and it is necessary to pass the law for its effectiveness.It isalsoconsideredasthelegalframeworkofachievingtheaimsof government.Theselawsmustbeguidedbythepresentpolicesmaintainedbythe government. The authors Chatterjee, Sarker and Valacich (2015), stated that the three general categories of unethical and illegal behaviour is infringement of the software licencing, misuse of the corporate resources and illicit use. The author stated the software license infringement as unauthorised duplication, use or distribution of the computer software and this is a huge concern in the software industry. This illegal copying of software is considered as the act of copyright infringement and it can lead to penalties due to criminal activities. As per the concern of information security using the illegal copy of software can be also dangerous for the user itself. This type of copy of the software can create vulnerability within the system of the user which can create financial loss to the user (Chatterjee, Sarker and Valacich 2015). Misuse of the organizational assets is also a huge concern in the organization aspects. This assets can include organizational computer systems, confidential documents and violation of employee permissive use policy. As per the authors this can cause a real harm to the organization and its assets. It has been found that many employees of different organizations has used organizational assets for their personal uses which was completely unethical and hugepercentageoftheemployeeshasbeenfiredduetothisreason.Illicitusesin
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7INFORMATION TECHNOLOGY SECURITY AND RISK MANAGEMENT organization is another unethical and illegal behaviour. The author has explained it as one of the common problem that is faced by almost every organizations all over the world. The common illicit activities include drug, smoking and alcohol usage in the workplace of the organization. This not only disturbs the work environment of the organization but also it creates health problem of the other employees within the organization. Thus it must be handled by the organization in a proper way. For this reason organizations creates their own policies but in many cases its got violated. Penalty or termination from the employment can be done in this type of circumstances. As per the authors Askew, Beisler and Keel (2015), the main methods for prevention of illegal and unethical activity is deterrence. The author has identified that the deterrence can be very much useful and effective when the affected parties is having fear of penalties. In organizational scenario employees expect that they will be penalised in the case when they will be apprehended. Thus there must be expectation of detection in this case. As per the author this fear of penalization is the main aspect of deterrence. The author has elaborated that the theory of deterrence is the idea which can considered as an inferior force. In virtually it is destructive power of a force’s weapon. This is able to deter a stronger and more powerful adversary (Askew, Beisler and Keel 2015). This is also known as the penology and uses punishment as a fear that restricts the peoples from offending. As per the author this deterrence has mainly two types of key assumptions. The first one is the imposing the penalty after the offender has done something offensive and that will resist them on performing some further offensive things. The second one is the fear of penalty that will prevent the peoples fromdoingsomeoffensivethings.Thisdeterrenceismanytimescontrastedasthe retributivism.
8INFORMATION TECHNOLOGY SECURITY AND RISK MANAGEMENT Results: From the above research of the ethics and information security it has been assessed that the due care and the due diligence can be considered as most important aspects of the information security and the organizations should consider the due care within their daily operational course. Form this research it is also founded that there are some similarity and some difference between the due diligence and due care but both of them are equally important for the organizations. Policies and laws are also very much important for the organizations to ensure the proper ethics and information security within the organization. Unethical and illegal behaviours is also a big concern which must be taken care off and with that unethical and illegal must be prevented. Discussion: The main scope of this research is that it can help the organization on ensuring their information security and can resist the unethical and illegal behaviours of the employees within the organization. One and a big limitation of this research is that the data is based on the secondary type of sources and no primary type of sources is not used for the research purpose. This is currently based on the previous published research thus the used data is relatively old and no present source of data has been used. Conclusion: From the above discussion it can be concluded that information security and ethics is very much important for the organization and it must be managed within the organization on highest priority. Thus in this report a brief research has been done on ethics and information security. In this context of the ethics and information security first the due care has been analysed and the role of due care has been also analysed in this case. The main reasons for which the organizations must exercise the due care in its daily operations has been analysed.
9INFORMATION TECHNOLOGY SECURITY AND RISK MANAGEMENT This research has also discussed how the due diligence and the due care is different from each other and how both are different from each other has been analysed. The policy for the organizations has been also analysed in this case and what a policy actually is has been analysed. Following that how the policy is different from the laws has been discussed within this research. In the following evaluation of the research general categories of illegal behaviour and unethical behaviour has been identified and described briefly. Also, the best methods for preventing unethical and illegal behaviour within the organization has been identified. In this case the identified method is the deterrence.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10INFORMATION TECHNOLOGY SECURITY AND RISK MANAGEMENT Reference: Askew, O.A., Beisler, J.M. and Keel, J., 2015. Current trends of unethical behavior within organizations.International Journal of Management & Information Systems (Online),19(3), p.107. Chatterjee, S., Sarker, S. and Valacich, J.S., 2015. The behavioral roots of information systems security: Exploring key factors related to unethical IT use.Journal of Management Information Systems,31(4), pp.49-87. Mullins, T., Thornton, B. and Adams, M., 2011. The Role Of Due Diligence In The Business Valuation Process.Journal of Business & Economics Research (JBER), 5(5). Schwenkenbecher, A., 2014. Collateral damage and the principle of due care.Journal of Military Ethics,13(1), pp.94-105. Siponen, M., Mahmood, M.A. and Pahnila, S., 2014. Employees’ adherence to information security policies: An exploratory field study.Information & management,51(2), pp.217-224. Vedung, E., 2017.Public policy and program evaluation. Routledge.