Ethical Issues in Information Technology Student’s Name Institutional Affiliation Ethical Issues in Information Technology Cybercrime and security breaches have been on the increase each year. The rise and overreliance of technology in recent years have made this possible. Since Edward Snowden released classified information on the NSA the country was alert and raised many questions. Snowden’s actions were impactful and severely changed the relationship between the U.S. government and its citizens. Hackers seemed to have evolved too and shifted from personal hacking to corporate hacking. Some major organizations that have been victims include yahoo Deloitte uber some fast food chains and intercontinental among others. Such breaches have adverse effects on business for the concerned and impact not only on their way of doing business but also the clientele. The intercontinental hotels group runs some hotels among them Crowne Plaza Intercontinental Holiday Inn Express Holiday Inn Candlewood Suites and Kimpton governments for malicious people. Each government ought to stipulate guidelines to protect the citizens and ensure that people’s right are protected. Corporates and institutions cannot avoid technology so more knowledge and information need to be given to protect people and help them safeguard themselves. The school should invest in protecting the students and faculty and this way they will protect their credibility and the reputation will take care of itself. References A Study of Cyber Crime Awareness for Prevention and its Impact. (2017). International Journal Of Recent Trends In Engineering And Research 3(10) 240-246. dx.doi.org T. (2012). Reporting data breaches. Computer Fraud & Security 2012(7) 5-10. dx.doi.org Caldwell T. (2014). The true cost of being hacked. Computer Fraud & Security 2014(6) 8-13. dx.doi.org vulnerabilities are opening the door to cyber-attacks on corporates. (2015). Network Security 2015(4) 1-2. dx.doi.org human impact of cybercrime. (2010). Computer Fraud & Security 2010(9) 3-20. http://dx.doi.org/10.1016/s1361-3723(10)70117-2 [...]
You have been hired as a consultant in the IT Department at Northcentral University. One of the University’s current goals is to minimize security threats and prevent breaches. To accomplish this, you have been asked to research last year’s “major hacks” to understand technology, information security measures, and issues in security management. Prepare a report for the IT supervisor that includes the following: Select one major incident to research regarding technological breaches. Identify the company that was affected, and then describe this incident and why you selected it. Explain the implications associated with this breach, specifically in terms of privacy laws and violations of the law. Analyze the impact that these technological breaches have on consumer safety and well-being. What recommendations would you make to this organization to further protect the privacy of clients? Support your report with a minimum of five scholarly resources. In addition to these specified resources, other appropriate scholarly resources, including older articles, may be included. Length: 5-7 pages, not including title and reference pages Your paper should demonstrate thoughtful consideration of the ideas and concepts presented in the course by providing new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards.