Presentation is loading. Please wait.

Presentation is loading. Please wait.

Trends in my profession, Information Technology

Similar presentations


Presentation on theme: "Trends in my profession, Information Technology"— Presentation transcript:

1 Trends in my profession, Information Technology
Presented By: [ ] Instructor’s Name: [ ] Date: [ ]

2 Introduction. What is Information Assurance?
Information assurance (IA), they are the steps or procedures that are required in protecting IT systems, such as computers and networks. IA is one of the most growing area in IT security. Major Trends in Information Assurance Big Data. Mobile phone security. Ethical Considerations. Organizations face the risk of their information being tampered with during such processes as production, storage or retrieval. Such threats have raised the need to have IA approaches, which incorporates best practices used to protect data from cybercriminals and from other damages.

3 1. Big Data Big data refers to extremely large volume of data, which is either structured and unstructured, that can be used to give information. Big data is characterized by four major elements (4V’s); 1), Volume, value, velocity, and variety. Advantages of Big Data Making informed decisions Strategic advertising Promotes good management and customer satisfaction Preventing online theft Some of the key sources of big data include, social media and web data, organizational significant transactions, structured and unstructured human-generated, Internet of Things data as well as biometrics. Advantage: For example, use of market metric data such as commonly purchase goods can help marketing department prioritize on these goods Big Data help in prevention of online theft by identifying and reporting the patterns that criminals use as well as the best approach to detect and prevent such activities from happening.

4 Disadvantages of Big Data.
Big Data, (Continued) Disadvantages of Big Data. Poses privacy concerns as data is collected from many sources and some might be personal and confidential data. It is a complex technology that can overwhelm organization’s infrastructures Demands sophisticated analysis Privacy concerns emerge due to lack of advanced technologies to handle the data. As a result big data is way too complex for most organizations’ infrastructures. The complexity of big data especially due to the enormous size that is constantly growing can pose threats to organizations which do not have adequate infrastructures. Big data requires sophisticated algorithms, and experts to conduct analysis, those who fail to do the analyses correctly are in risk of implementing incorrect strategies or making the wrong decision for the organization.

5 2. Mobile Phone Security Mobile security refers to the processes that are used to protect the information that is sent, stored, or received by mobile phone devices. IA in mobile phone is important because currently, the daily usage of mobile phones globally has dramatically increased. People use mobile phones as their day-day devices for transacting money, sending confidential information, and storing personal files and communication. Advantages of Mobile phone security Protection of user information from third party applications Enables development of tools to validate a third party application’s certification and security Supports the development of modern security techniques, such as encryption, authentication and authorization Enck et al. (2009, p.10) outline that small mobile devices carried on a daily basis is the home to next generation open source operating system.

6 Mobile Phone Security (Continued)
Disadvantages of Mobile Phone security Poses high risk of exposing personal data. Outdated security tools such as antiviruses present a security threat to a smartphone. Requires purchasing of protection tools, such as antivirus applications, which might be expensive, or used by cybercriminals as gateway to their activities. The need for mobile phone security is exponentially growing due to the variety of personal data contained on smartphones, the fact that mobile phones contain a lot of users personal data makes them a target by many malicious cyber criminals.

7 3. Ethical Issues An ethical dilemma in IA arises when organizations enhance practices for data privacy, which then limit employees from accessing valuable information required for informed decision-making. For effective IA, there is a need for organizations to establish a framework through which people act. Advantages of Ethical considerations They promote good workplace behavior They help in data security as employees become aware of how to handle data and they are only allowed to access the necessary data They improve organizational management The need arises as organizations collect huge volumes of data, some that are valuable and require a high level of confidentiality. Ethics enable employees to behave accordingly, relate with their superiors as well as clients.

8 Ethical Issues (Continued)
Disadvantages of Ethical dilemma Ethics limit organizational operation, as there is a limitation to the data that can be accessed therefore making it hard to use the limited data to make effective decisions. Pose a threat to higher management as there are no clear lines for ethical behavior. Employees have to make the choices when tasked with a moral dilemma. Organizational measures as well as technical measures such as establishing standards ought to be created to adequately address the ethical concern in an organization

9 Conclusion Big data, Mobile phone security and ethical concerns continue to be important factors of Information Assurance. More research in big data, mobile phone security, and ethics is necessary to ensure that there is quality in information assurance and people and organizations are protected from the various security threats.

10 References Enck, W., Ongtang, M., & McDaniel, P. (2009). Understanding android security. IEEE security & privacy, 7(1), Information Assurance for Network-Centric Naval Forces. (2010) Jiang, X. (2015). Reflection on Quality Assurance System of Higher Vocational Education under Big Data Era. MacLeod, A. (2015). Effective information management and assurance for a modern organisation during a crisis. Journal Of Business Continuity & Emergency Planning, 9(1), 52-59 NAEEM, S., & ISLAM, M. H. Information Assurance for Enterprise Resource Planning Systems: Risk Considerations in Public Sector Organizations. SIIS Lab. (2010). Mobile Phone Security. Retrieved February 17, 2017, from SHIM, J. P., KOH, J., FISTER, S., & SEO, H. Y. (2016). Phonetic Analytics Technology and Big Data: Real-World Cases. Communications Of The ACM, 59(2), doi: / Stahl, B. C. (2004). Responsibility for Information Assurance and Privacy: A Problem of Individual Ethics?. Journal Of Organizational & End User Computing, 16(3), 59

11 ---------------------------------------------
QUESTIONS?? THANK YOU!-


Download ppt "Trends in my profession, Information Technology"

Similar presentations


Ads by Google