Preview

Information Use

Good Essays
Open Document
Open Document
726 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Use
It is very important to protect the information of organizations today due to the high levels of fraud that is being committed out there. Imagine going to a bank and someone left their computer unlocked for others to gain information to. If your personal information was on that screen and someone else took down or noted your social security number or date of birth, it would make you feel really leery about doing business with that bank. At my employer we are forced to lock our computers before we leave our desks. It is being monitored by video review and we can lose points on our audit if we are caught leaving our workstations unlocked. When people provide information, especially personal information, they trust that the organization will protect that information that is given so that it does not get into the wrong hands.

The basic elements to protect information today is firewalls, and security software programs that help prevent intruders from attaching companies private information. Firewalls help protect connections on local devices where information may be retrieved. Control Alt and delete also help lock our workstations from people possibly gaining access to personal or business information.
I believe it 's important for organizations to protect their information because network security threats are becoming more eminent with the dramatic evolution of technology. Old methods take new form; I read not too long ago that there 's a new method of pickpocketing called "electronic pickpocketing"--which exploits the RFID card embedded within newer credit cards. This allows the thief to access private account information and process transactions. Now this is just example is on a smaller scale, so try and imagine the same type of security breach but with sensitive company documents. Company 's like Sony suffered a major breach not too long ago causing the PSN network to shutdown for fear of further attacks. Customer information was obtained leading



References: Laudon, J. P., & Laudon, K. C. (2008). Essentials of management information systems (8th ed.). Upper Saddle River, NJ: Prentice Hall.

You May Also Find These Documents Helpful

  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    As with any other system, all data needs to be kept secure. Employee confidentiality is of paramount importance, particularly in a system that hold and utilizes potentially sensitive personal employee information. Moreover, seemingly innocuous information such as standards and procedures within the company also need to be kept secure. Any secure, sensitive, or proprietary information should be encrypted and password…

    • 793 Words
    • 3 Pages
    Good Essays
  • Better Essays

    References: O 'Brien, J., & Marakas, G. (2008). Management information systems (8th Edition ed.). The McGraw-Hill Companies.…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It/205 Week 8 Checkpoint

    • 339 Words
    • 2 Pages

    References: Laudon, J. P., &Laudon, K. C. (2011).Essentials of management information systems (9th ed.). Upper Saddle River, NJ: Prentice Hall.…

    • 339 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Let’s look at confidentiality which is one of the most important measures to maintain safety and security. Not following procedures according to Data Protection Act 1998, which objectives aim at secure data processing and storage, may result in legal action against employers. These procedures may vary depend on the nature of the business. Nowadays vast majority of the business relay on computerised filling system, therefore, employers must take every necessary measure to protect that system from for example, hackers. Employees, on the other hand must follow all procedures to ensure they use system correctly and legally. Consequently, not following health, safety and security procedures may also lead to economic crises of an organisation, for example, court may order to pay very high fine or close down the business and loss of the customers. Moreover, an employer who failed to follow health, safety and security procedures where as a result employees are getting harmed at work is highly likely to be exposed to organisational grievance or disciplinary procedures. For example, in a care home failure to provide moving and handling training to induction staff would have catastrophic consequences such as: spine injuries acquired by using incorrectly equipment or by not using it at all when necessary or even a death of a care taker if handled inappropriately using unsecured hoist. This scenario would not…

    • 335 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    References: O 'Brien, J. A. & Marakas, G. M. (1999). Management Information Systems (9th edition). 190-…

    • 4105 Words
    • 17 Pages
    Best Essays
  • Satisfactory Essays

    Laudon, Kenneth C., and Jane Price Laudon. Essentials of management information systems. 10th ed. Boston: Pearson, 2013. Print.…

    • 332 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    MIS in your pocket

    • 3127 Words
    • 13 Pages

    Efficiency; that’s the name of the game in today’s business world. Why would a business want to waste time trying to uncover some buried information when it can just pull it up with the click of a button? Many companies have answered this question by adapting to a more technological and modernized world. One company, whose name has become synonymous with technological advancements, is Apple. Their newest products, the iPad and the iPhone, have revolutionized the way people approach everyday business. These Apple products are easy to use and have many features, such as calendars, E-mail, web browsing, and notepads that allow for a more organized and efficient workplace. Also, iPhone and iPad owners have an online market available to them that is constantly updating with helpful new applications.…

    • 3127 Words
    • 13 Pages
    Better Essays
  • Powerful Essays

    Healthlite Yogurt Company

    • 3138 Words
    • 13 Pages

    • Examples of what our plan will enable the company to do in the form of data entry and reports…

    • 3138 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    British Telecom Case Study.

    • 5146 Words
    • 23 Pages

    O 'Brien,J.A. 1998, Management Information Systems [online]. 4th ed, McGraw Hill. Retrieved January 5,2005 from: http://www.mhhe.com/business/mis/obrien/obrien4e/student/olc/index.htm…

    • 5146 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Information Use

    • 951 Words
    • 4 Pages

    Information can be used in an assortment of ways in today’s business world. Companies can use it to track profits and losses while others use it to forecast future industry trends so they can make informed decisions about what markets they should focus on. According to Opara (2003) “Information is the life blood of modern organizations.” Without this information, organizations would be making uninformed decisions.…

    • 951 Words
    • 4 Pages
    Good Essays
  • Good Essays

    References: Laudon, J. P., & Laudon, K. C. (2008). Essentials of management information systems (8th ed.). Upper Saddle River, NJ: Prentice Hall.…

    • 851 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    At work, I expect them to have some of the best internet security because if ever there is a problem they will have so much more too loose than an average person. Most businesses have things such as financial records and information that should not be accessed by outsiders. With there being a lot of business and organizations that compete they should be careful to make sure their private information cannot be stolen or viewed by anyone other than the people that the information is intended for.…

    • 354 Words
    • 1 Page
    Satisfactory Essays