WEEK 6 part 1
Discussion 1: Shared Practiceâ€”How Secure Is Your Data, Information, and Information Systems Technology?
Imagine the following scenario:
You come home from work one evening, turn on the lights, and notice someone has ransacked your office area and has stolen a lot of your personal information and professional documents, including the final design for your organizationâ€™s new marketing campaign. A month later, you read in the paper that another company just came out with the very marketing campaign your organization designed months before.
It sounds like a scene right out of a movie, but it does happen, and itâ€™s a scenario that can happen quite dramatically on an organizational level, both domestically and globally.
For this weekâ€™s Discussion, conduct a search using the Internet or Walden Library for 2â€“3 current and credible articles that focus on trends in security issues affecting todayâ€™s information systems/information technology world. You should focus on articles that describe trends that affect or could potentially affect global and domestic business operations.
By Day 3
Post the following:
- Provide a brief description of two or more trends related to data, information, information systems, or information technology, security.
- Analyze how the security issues you identified are challenging businesses, including your organization.
- Describe how you, as a manager, will ensure that you protect the data and information you use, communicate, or manage.
Please be specific, and use citations and references as appropriate and necessary.
Read a selection of the posts submitted by your colleagues.
BÃ©langer, F., Van Slyke, C., & Crossler, R. (2019). Information systems for business: An experiential approach, 3e. Burlington, VT: Prospect Press.
- Chapter 3: Evaluating Information
- Chapter 8: Securing Information
- Chapter 9: Protecting the Confidentiality and Privacy of Information
Ashford, W. (April 2, 2013). Putting security in context. Computer Weekly, 17-20.
Brooks, R. (2010). The development of A code of ethics: An online classroom approach to making connections between ethical foundations and the challenges presented by information technology. American Journal of Business Education, 3(10), 1-13.
This article identifies the need for ethics in information management given the rapid expansion of information technology. In it, you will explore the role that higher education can play in preparing students to apply ethics to the usage of information and information systems, and you will step through a research investigation conducted by the authors where students of an online Ethics and Technology course developed a code of ethics specifically for information technology.
De George, R. T. (2000). Business ethics and the challenge of the information age. Business Ethics Quarterly, 10(1), 63-72.
This journal article, written in 2000, investigates how ethical issues within all areas of business, from marketing to management and beyond, began transforming with the dawn of the information age.
Hui, K., Hui, W., & Yue, W. T. (2013). Information Security Outsourcing with System Interdependency and Mandatory Security Requirement. Journal Of Management Information Systems, 29(3), 117-156.
This paper analyzes the proliferation of information security standards and how system interdependency risks interact with a mandatory security requirement to affect the equilibrium behaviors of an MSSP and its clients.
Martucci, W. C., & Oldvader, J. K. (2010). Workplace privacy and data security. Employment Relations Today, 37(2), 59-66.
This article discusses laws and policies involving privacy and data security in U.S. workplaces. The authors describe the fundamental elements of state laws and summarize the recent efforts of several states to address security and maintenance issues pertaining to private employee information.
Mingers, J., & Walsham, G. (2010). Toward ethical information systems: The contribution of discourse ethics. MIS Quarterly, 34(4), 833â€“854.
This paper explores the role of ethics in the IS field. In particular, the authors emphasize the practical potential of the discourse theory of ethics.
Richardson, R. (2013). Surveying todayâ€™s security risks. Information Security, 15(1), 21-28.
This article discusses the results of a survey of plans, concerns, and priorities for security initiatives in 2013.