StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Business: Information Technology Malware - Research Paper Example

Cite this document
Summary
One of the prominent technological concerns that small businesses must become cognizant of is malware infecting Internet systems. When examining this issue one of the overarching concerns is the intention of the technicians involved in the creation of the malware…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful
Business: Information Technology Malware
Read Text Preview

Extract of sample "Business: Information Technology Malware"

Business: Information Technology Malware One of the prominent technological concerns that small businesses must become cognizant of is malware infecting Internet systems. When examining this issue one of the overarching concerns is the intention of the technicians involved in the creation of the malware. In these regards, it’s noted that in large part these individuals are motivated not out financial concern, but out of a desire to embarrass the entities they are targeting (Vance 2011). Indeed, one group, Anonymous, have even implemented malware in an organized and concerted effort to attempt to enact political change (Landers 2008).

There are a variety of concerns related to the future of malware. One of the overarching concerns is the means by which potential businesses and individuals will become infected. With rapid advances in technology, prior means of computer security are becoming antiquated. Organizations need to become increasingly aware not simply of malware within the organizational context, but even in contexts that are adjacent to this environment, such as cell phones and home computers. While no panacea exists that completely secures an organizations technology, implementation of Macintosh over PCs has demonstrated effectiveness because of the lack of malware specifically targeted towards the Apple platform.

In addition, a number of added security measures have been developed as a means of guarding against malicious malware. In these regards, it’s necessary for all computers to be outfitted with a anti-virus software; Norton has been noted to be particularly effective (‘Malware’ 2011). For highly confidential information, it’s necessary that organizations secure specialists and advanced technology to guard against the rapidly shifting malware enterprise. References Landers, C. (2008). Serious Business: Anonymous Takes On Scientology (and Doesnt Afraid of Anything).

Baltimore City Paper. Malware. (2011). Retrieved from http://us.norton.com/security_response/malware.jsp Vance, J. (2011). Future of malware. Retrieved from http://www.cio.com/article/691042/The_Future_of_Malware?page=2 eHealth Our province has recently spent over $1 billion on eHealth measures, attempting to computerize all health information for Ontario citizens. There are a number of concerns related to the ethical, social, and policy issues of the computerization of health records. Some of the most pervasive ethical concerns have emerged in terms of patient privacy rights.

For instance, Mearian (2009) notes that eHealth poses a concern for many individuals with sensitive health records. One of the primary policy concerns within this context of understanding is the Personal Health and Information Protection Act, 2004 (PHIPA) regulatory amendment. Passed in 2004 this amendment indicates that Ontario can both undergo computerized documentation of health records, as well as maintain privacy for the patients involved. Other policy concerns involved the significant price of converting to eHealth technology over written records.

In terms of social concerns, some of the major notable elements are the understandings that eHealth technology, while in part privacy invasive, nonetheless poses a strong and substantial contribution to the medical community. In these regards, Gibbons (2005) has noted that efficiency and improved quality of care are direct benefits of eHealth technology. Another benefit that may not be readily apparent to some is that eHealth technology is also empowering to the patient. While medical records had long been the domain of the medical professional, increasing digitization now allows the patient direct access to their records through computer accounts.

Ultimately, it’s clear that while eHealth technology has ethical and cost concerns, its benefits in terms of medical efficiency and patient empowerment make it a needed approach to health care in the 21st century. References ehealth ontario. (2011). Retrieved from http://www.ehealthontario.on.ca/ Gibbons, M.C. (2005). A historical overview of health disparities and the potential of eHealth Solutions. Journal of Medical Internet Research, 7(5). Mearian, L. (2009). Report: Lack of ehealth standards, privacy concerns costing lives.

Retrieved from http://www.computerworld.com/s/article/9138791/Report_Lack_of_eHealt h_standards_privacy_concerns_costing_lives

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Business: Information Technology Malware Research Paper”, n.d.)
Retrieved from https://studentshare.org/business/1584833-business-information-technology-malware
(Business: Information Technology Malware Research Paper)
https://studentshare.org/business/1584833-business-information-technology-malware.
“Business: Information Technology Malware Research Paper”, n.d. https://studentshare.org/business/1584833-business-information-technology-malware.
  • Cited: 0 times

CHECK THESE SAMPLES OF Business: Information Technology Malware

Information Technology Security

The case study 'information technology Security' demonstrates that computers came in and finally the Internet.... In the 1970s, there was an increase in the usage of information technology.... hellip; information technology can perform countless tasks for the organization like capturing, storing, processing, exchanging, and using information for the company.... This essay is about the project management of an information technology application....
8 Pages (2000 words) Case Study

Analyze the impact of technology on a field of study of your choice

This practice increases the chances of malware attacks on the company networks and subsequently the malware-affected network may cause to lose the valuable business information stored in the company's mobile devices.... Evidently, data theft by individuals would more harmfully affect an organization than data loss due to malware attacks.... In addition, fraud employees can easily copy sensitive company information to their personal mobile devices within seconds and such issues can challenge the firm's cyber security....
5 Pages (1250 words) Essay

E-Commerce Website That Allows You to Listen to Audio Books Online

This critical niche provides a whole range of untapped potential in this era of technological advancement where merely all businesses are adopting information technology for the purposes of their operations.... Trading and information exchange is faster and the traditional business mode has had a complete revolution because of the e-business.... Trading and information exchange is faster and the traditional business mode has had a complete revolution because of the e-business....
14 Pages (3500 words) Essay

Server Malware Protection Policy

It is thus significant for a company to develop a server malware protection… The thesis of this paper is to look at ways of dealing with the various forms of malware that corrupt data. ... alware refers to a malicious software that is designed to infiltrate, do wrong or unwanted Examples of such malware are Viruses, Worms, Trojan horses, Spyware, and Rogue security software.... he server malware protection policy requires that all the mail servers being utilized by the company to have an anti-virus installed in them....
4 Pages (1000 words) Assignment

Investigating Dynamic Malware Analysis Tool

The paper "Investigating Dynamic malware Analysis Tool" describes certain possible ways through which such malicious programs can be terminated.... hellip; malware is a type of malicious software, which has been major software through which intruders steal crucial information out of organizations.... The continuous evolutionary patterns of the malware designs have raised difficult for the analysts in terms of identifying and terminating such programs from slipping into systems in an undetected manner....
27 Pages (6750 words) Case Study

Information Assurance and Computer Security

There are a variety of risks that a business organization faces when it comes to the implementation of a secure information technology system.... This report "information Assurance and Computer Security" discusses protecting the internet and computer system of an organization as essential for the survival of the organization.... This is because the computer system contains so much information about the company.... This includes loss of information, an attack by internet or computer viruses and malwares, authorized use of data, etc (Vladimirov, Gavrilenko and Michajlowski, 2010)....
6 Pages (1500 words) Report

Entifying Information Assets, Threats, and Vulnerabilities in Top Information Security Breaches of the Decade

Five of information security breach that occurred in the last decade include are: insider misuse, unauthorized access by insiders, spam, malware, and unauthorized access by outsiders. ... Five of information security breach that occurred in the last decade include are: insider misuse, unauthorized access by insiders, spam, malware, and unauthorized access by outsiders.... malware is an infection to an organization's network or system by worms, viruses, adware, Trojans or spyware....
2 Pages (500 words) Assignment

Malware Analysis Plan

This paper ''malware Analysis Plan'' looks into the possible methods, techniques, skills, and knowledge through which the malware are handled and computing experiences are made safe.... The malware is a designated computer program in its own created for the sole purpose of negatively impacting the program, network, system, firewall, or other security encrypted sources.... nbsp;… As a result of the attacks of malware, large amount of losses are incurred every year....
10 Pages (2500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us