Site icon Tutor Bin

IT 210 Southern New Hampshire University Business Systems Analysis Discussion

IT 210 Southern New Hampshire University Business Systems Analysis Discussion

Description

Module Overview

In this module, we will focus on information security and the ethical methods and strategies organizations have to consider when selecting and implementing technology. We will also briefly look at security threats, security controls, ethical issues, and the privacy of security and ethics.

Before we can examine the issues related to information security and ethics, it is very important to understand the relationship between those concepts and business. You need to know that information security measures and good business ethics are not used to block business but rather to help business. For example, Aflac, GE, Starbucks, and UPS are just a few of the companies that have been consistently ranked by Forbes as the world’s most ethical companies (Adams, 2014; Smith, 2012; Strauss, 2016). On the other hand, the poor security and ethical practices can lead to public-relations nightmares that are very costly. Consider, for example, the Volkswagen emissions cheating scandal that affected 11 million cars worldwide, cost the company more than $20 billion, and led to six employees facing criminal charges (Gates, Ewing, Russell, & Watkins, 2017). Toshiba’s accounting scandal revealed it inflated its earnings by as much as $2 billion and later agreed to pay a $60 million fine imposed by Japan’s Securities and Exchange Surveillance Commission (Financier Worldwide, 2015; Kollewe, 2016). A Goldman Sachs employee who used stolen confidential information to benefit a client later cost the company $50 million, and the employee faced a voluntary three-year ban from related consulting jobs (del Castillo, 2015). The U.S. Department of Veterans Affairs agreed to pay $20 million to settle a class-action lawsuit after a laptop with veterans’ personal data was stolen (Conn, 2009). Unfortunately, there are countless other examples of businesses that have dealt with ethical issues and information security breaches. These companies not only lost money because of security breaches or their poor ethical practices—but they also lost the trust of consumers.

In the module readings, you will also become familiar with privacy and its role in decision-making. Be sure that you understand the relationship between ethics, information security, and privacy, as well as how to make technology-related decisions. These concepts will help you make your technology recommendations. When analyzing the case scenario and making your final recommendations, include your prior research of the technical requirements needed to support the business, your analysis of competitor websites, and the completed decision matrix. Your recommendations will also address the basic security considerations that the owner of your business must take into account if they choose to adopt your recommendations.

References

Adams, S. (2014). The world’s most ethical companies 2014. Retrieved from http://www.forbes.com/sites/susanadams/2014/03/20/…

Conn, J. (2009). VA to pay $20 million for 2006 laptop data breach. Retrieved from http://www.modernhealthcare.com/article/20090128/N…

del Castillo, M. (2015). A scheming employee just cost Goldman Sachs $50 million. Retrieved from http://www.bizjournals.com/newyork/news/2015/10/28…

Financier Worldwide. (2015). Toshiba: Behind the numbers. Retrieved from https://www.financierworldwide.com/toshiba-behind-…

Gates, G., Ewing, J., Russell, K., & Watkins, D. (2017). How Volkswagen has grappled with its diesel scandal. Retrieved from https://www.nytimes.com/interactive/2015/business/…

Kollewe, J. (2016). Toshiba confirms SEC investigation as accounting woes spread to US. Retrieved from https://www.theguardian.com/business/2016/mar/18/t…

Smith, J. (2012). The world’s most ethical companies. Retrieved from http://www.forbes.com/sites/jacquelynsmith/2012/03…

Strauss, K. (2016). The world’s most ethical companies 2016. Retrieved from http://www.forbes.com/sites/karstenstrauss/2016/03…

  • 7-1 Discussion: Final Project Questions: Security (Non-graded)

Discussion TopicTop of Form

Bottom of FormTake a moment and post any questions or concerns you may have on issues related to security concerns. Be sure to use the information learned from the required reading for this module to develop part VI of your final project. Be sure to post your questions/concerns early in the week.

  • 7-3 Final Project Submission: Business Systems Analysis

Assignment

In your final project, you will propose recommendations for the technology solution that best meets the needs of your business, including what your business owner must consider in regard to the security and privacy of company data.

Additionally, you will incorporate the feedback you received on Milestone One and Milestone Two.

To complete this assignment, review the attached Final Project Template Word Document and Final Project Guidelines And Rubric PDF documents.

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Exit mobile version