Verified Document

Securing The Electronic Frontier P. Research Paper

Part 2 - Reflective Diary

The security of customer's data is very critical in the contemporary business environment because of the increase in the data breach that could make organizations to face bad publicity within and outside the United States. Essentially, organizations are required to secure employees' and customers' data to enhance Pretty Good Privacy (PGP) within the IT environment. One of the strategies to enhance customers' privacy is to implement data encryption. Encryption is a strategy of encoding data file where only authorized user can only have access to a secret "key' in order to read the data. The major impact of encryption is that it will prevent unauthorized access to organizational data, which will consequently enhance data protection and privacy. Moreover, securing information will make organization to be in line with the IT ethical standard, which will consequently enhance organizational public image.

Despite the security platform implemented by many organizations, there is still an issue of trespass of IT asset. The trespass occurs when an unauthorized individual is having access to IT assets. An example of a trespass is an issue of a hacker trying to have access to customer's data. On the other hand, legitimate access occurs when an authorized individual get access to an organizational IT assets. Typically, trespass and legitimate access have a real world application in cyber ethics. The trespass is contrary to the IT ethics, however, the legitimate access is ethical within the IT and business environment. Organizations need to design an effective IT policy to guide employees on the ethical use of IT assets in order not to be...

One of the effects of encryption code is that it assists in enhancing electronic privacy. No customers will be ready to submit their personal data to organization if they believe that organization will be not be able to protect their personal data. Thus, employers are required to protect customers' personal data as well as allowing employees to enjoy free speech within an organization to enhance employees' efficiencies. The survey findings presented by American Management Association in 2000 revealed that increasing number of business implemented surveillance on employees during the working hours. Typically, employee's surveillance grew from 45% to 66% in 1999. Some employers even go to the extent of monitoring employee's email communication using the Mail Marshal making some employers to fire many employees for misusing email within the workplace. This issue led to a conflict between employer's rights and employee's privacy. This paper suggests that there is a need for mutual understanding between employee and employers on the use of the internet within a workplace to prevent a potential conflict.
Reference

McEvoy, S.A.(2002). Email and Internet Monitoring and the Workplace: Do Employee has the Right to Privacy. Communication and Law.

Miller, A.R. & Tucker, C.E.(2011). Encryption and the Loss of Patient Data. Journal of Policy Analysis and Management, 30 (3):534-556.

Lugaresi, N.(2010).Electronic Privacy in the Workplace: Transparency and Responsibility. International Review of Law, Computers & Technology. 24( 2):163-173

Sources used in this document:
McEvoy, S.A.(2002). Email and Internet Monitoring and the Workplace: Do Employee has the Right to Privacy. Communication and Law.

Miller, A.R. & Tucker, C.E.(2011). Encryption and the Loss of Patient Data. Journal of Policy Analysis and Management, 30 (3):534-556.

Lugaresi, N.(2010).Electronic Privacy in the Workplace: Transparency and Responsibility. International Review of Law, Computers & Technology. 24( 2):163-173
Cite this Document:
Copy Bibliography Citation

Related Documents

Securing the Electronic Transfer Securing
Words: 976 Length: 3 Document Type: Research Paper

Essentially, securing the electronic frontier is very critical because of the potential harms that cyber crime and fraud cause to individual, businesses and nations as a whole. One of the effective strategies that could be employed to secure the electronic frontier is the collaboration of the government with the private and public organizations. Increasing number of governments has implemented method to secure the electronic frontier without success. Since corporate organizations

Hacktivism Securing the Electronic Frontier Consider How
Words: 591 Length: 2 Document Type: Essay

Hacktivism Securing the Electronic Frontier Consider how cybercrime is defined and how it relates to the issue Internet vulnerabilities. Cybercrime is any illegal or illicit activity which is mediated by internet usage and which is aimed at accessing, stealing or destroying online data. This may include hacking of government websites, phishing scams, disruption of commercial service sites or penetration of privately held databases containing personal information about private citizens. The presentation given by

Electronic Medical Records Documentation and the Role of the Nurse...
Words: 3320 Length: 10 Document Type: Research Paper

Nursing Electronic Medical Records, Documentation, and the Role of the Nurse Efficient use of time is one of the primary methods healthcare professionals use to save lives. When there is very little time available, and decisions have to be made with acute accuracy, it is of primary concern to have access to all necessary information immediately. Nurses and other healthcare professionals have long enjoyed this access due to charting procedures implemented by

Adults on Secured Online Environments
Words: 12910 Length: 50 Document Type: Term Paper

Next, the researcher will conduct a query of the computer awareness of education administrators, teachers, parents, and students in the New Orleans school district, then evaluation of documented data will provide a research base of the required elements needed to consider while developing a framework that can be used as a guide by educational leaders and parents for the protection of children at school and at home. Research areas

Stressful Organizations and Worker Morale
Words: 8734 Length: 10 Document Type: Essay

Occupational Stress and Scientific MonitoringElena Georgiou*AbstractThe aim of this project was to review evidence available on occupational stress and how it can be monitored scientifically. Closed-ended questionnaires were used to obtain data from 150 participants. Data was analyzed using OLS (Ordinary Least Squares) regression analysis. Data included the demographic background of participants: age, sex, and their occupational background. From the demographic background, all participants (150) were literate where more than

E-Commerce Communications
Words: 6773 Length: 20 Document Type: Term Paper

E-Commerce Communications Electronic commerce or e-commerce is the term used to describe all forms of information exchange and business transactions based on information and communication technologies. There are different types of formal definitions of e-commerce, but the wide scope involved has resulted in many definitions focusing on only certain aspects. A fairly comprehensive definition covers e-commerce from four different perspectives (Kalakota and Whinston, 1997, p.38) - communications, business process, service and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now