2 replies each 100 words

Learning Goal: I’m working on a humanities question and need guidance to help me learn.

Discussion

Technology’s Impact on Data Security

Technology shows a lot of impact on data security and ethics in data analytics. For every organization, data has become a necessity where the amount of data is rapidly increasing but not reducing every day. Technology evolution generates some better methodologies, especially for data security in companies. Generally, data security is completely dependent on technology in a way to generate reliable and effective data security for organizations. For enhancing the data security system, the data encryption technology, along with motion detectors, facial recognition, fingerprints, sensors, etc., plays an eminent role, especially for accessing the information only by authorized users. This shows that data security is developed because of technology (Fernando, Chidambaram, & Sari, 2018). The best example is email, where communication can be done effectively between multiple business entities. But the email communication has become an easy target for most hackers who can easily gain access and use it to capture unauthorized information. Hackers employ some phishing activities, especially for accessing information. To overcome this type of unauthorized activity, it is eminent that companies need to use encryption techniques that allow only authorized users to access the information (Fernando, Chidambaram, & Sari, 2018).

Data ethics is one of the critical approaches which mainly focuses on improving data security effectively. Data ethics is a process that is used to recommend the correct or wrong ways of accessing or using restricted information. The main data ethics approach is to perform close monitoring and guide the users regarding the ethical use of information. Data ethics always maintains higher integrity and privacy through which it allows only authorized members to access the available information. Technology plays an important role which generates a better and more reliable security measure for confidential information against hackers or malicious users (White, Ariyachandra, 2016).

Bottom of Form

Rithwick Kumar Marru

Discussion week 5

COLLAPSE

Top of Form

Technology advancement has brought different challenges in data security because as technology advances, other people get access to data irrespective of location. The improvement in technology that has brought computing devices such as mobile phones has enhanced the possibility of a data breach as people get access to information without practicing necessary measures to ensure data protection (Nemati, 2007). With multiple devices accessing data from different devices, it exposes database to vulnerability as attackers may access user account through unprotected Wi-Fi. Continuous advancement in technology has resulted to continuous struggled between data users and attackers. In that data, users have to seek constant improvement of technology to defend data against attackers who continuously improve their mechanism and model to attack the database quickly. This has forced the need for organization to constantly improve database to ensure they keep a better pace against attacker improvement. Despite the continuous improvement on measures that provide data security, technological advancement has also exposed data security, hence the need to keep looking for better ways of protecting sensitive data (Nemati, 2007). Technology advancement has led to modern data protection methods such as encryption, cloud computing, and deceptive technology.

Technology has enabled an exponential increase in data making, and it uses. With more data being generated, there is a need for its security and ethical usage. Technology advancement has led to the need to formulate policies that will protect the use of personal data and its collection. All this is due to the interconnectivity of various data, with some being sensitive and requiring necessary precautions to see to it that users and owners are not exposed to insecurities. Technology has changed who is responsible for the data, unlike traditionally, where data security and protection were the roles of data handlers, archivists and IT specialties. Today is the responsibility of every individual with access to data to protect it hence the improvement in ethical handling of information (Ash et al., 2018). Employees have to be on their best behavior a trustworthy to ensure data security. Ethics in handling data has to be adhered to and observed. In contemporary society, data security and ethics have become everyone’s responsibility.

References

Ash, J., Kitchin, R., & Leszczynski, A. (Eds.). (2018). Digital geographies. Sage.

Nemati, H. (Ed.). (2007). Information security and ethics: concepts, methodologies, tools, and applications: concepts, methodologies, tools, and applications. IGI Global.

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

mahjong ways 2