Hit The Order Button To Order A **Custom Paper**

>> CLICK HERE TO ORDER 100% ORIGINAL PAPERS FROM AustralianExpertWriters.com <<

24 Aug
2019

Information Security Management | Good Grade Guarantee!

Enhancing Organizational Level Privacy Programs Based on Ethical
Reasoning. Information privacy is one of the important information security management
issues that continue to pose significant challenges to organizations. In this project, you will
undertake literature review on how ethics can enhance organizational privacy. Based on your
literature review of the prior work in information ethics, you will develop a framework for
enhancing organizational level privacy programs based on ethical reasoning. You will argue
that organizations can enhance their privacy programs by moving beyond merely complying
with laws and other regulations and creating a culture of integrity that combines a concern for
the law with an emphasis on managerial responsibility for the organization’s privacy
behaviors. You will use two real-life high-profile data breaches experienced by
organizations to illustrate your arguments for enhancing organizational level privacy
programs based on ethical reasoning. You will conclude with recommendations for ways
organizations can improve their privacy programs by incorporating moral responsibility.
Topic 2: Harnessing social media applications in raising information security awareness
Studies show that as much as 85% of information security breaches are due to the actions of
a benevolent intentions yet uninformed users. The aim of this project is to investigate the
utility of social media (SM) for its potential as an effective information security awareness
delivery method. You will analyze the potential issues and concerns when leveraging social
media tools and technologies for information security awareness program and propose
ways to mitigate the issues and concerns. You will provide a sample case study to
demonstrate the potential of SM by using one or more current social media technologies
to develop and deploy SM‐based security awareness about phishing attacks (or any others).
You will compare the SM‐based information security awareness delivery method with the
standard security awareness delivery methods in terms of participant engagement,
effectiveness in imparting basic understanding of security practices, potential change of
behavior and investment required in terms of participant time and development cost.
Topic 3: Security implications of social networking in the corporate environment
The rise of social networking websites (e.g., MySpace, Facebook and Twitter) has enabled
ordinary people to have instant messenger accounts, contact old friends or long‐lost
2
schoolmates. Anecdotal data shows that social network use at workplaces can have far
reaching security implications for the organizations network security. The data also shows
that as more companies allow employees to access social networking sites, fears about
possible negative ramifications are also growing. This suggests that an understanding of the
security implications and ramifications of social networking in the corporate environment is
very important. This project will investigate security implications, identify the root causes
and where possible, suggest steps to safeguard organizational assets and information. Note
that the focus is on security implications for the organizations and not individuals. The
project involves comprehensive literature review, survey and analysis of the results and
writing a complete report.
Topic 4: Leveraging Web 2.0 technology for information security disaster management The
aim of this project is to survey, analyze and develop an international best practice grade
information security disaster management (i.e., crises preparedness, response, and recovery)
practices using Web 2.0 technology. At the time of emergency, concise, timely and reliable
communication amongst the disaster preparedness and disaster recovery teams is critical
for success. Web 2.0 technology such as social media techniques can prove valuable and vital
for a successful disaster management practices. You will survey and analysis literature
on information security disaster management and the current use of Web 2.0 technologies
for disaster management approaches. Based on the results, you will synthesis an approach
that harnesses the power of Web 2.0 technology for information security disaster
management. You will also analyze the potential issues and concerns when leveraging Web
2.0 tools and technologies in information security disaster management and propose ways
to mitigate the issues and concerns. You will use one or more current Web 2.0 tools and
technologies to analyze the possible impact/benefits of deploying Web 2.0 technology
for information security disaster management in one or more business sectors, and
provide a simple case study and discuss the cost benefit analysis. Your investigation and
analysis must be executed to the proper technical department

QUALITY: 100% ORIGINAL – NO PLAGIARISM.

  • **REMEMBER TO PRECISE PAGE NUMBER**
  • Hit The Order Button To Order A **Custom Paper**

>> 100% ORIGINAL PAPERS FROM AustralianExpertWriters.com <<