Briefly describe the history, products and services of ibm

Assignment Help Management Information Sys
Reference no: EM131047008 , Length: word count:2500

Assessment: Information Security and Privacy of Information

Privacy of information about customers, employees, suppliers and business partners is critical to information security which is the foundation of information systems reliability. Inevitably, large companies that retain information about customers and others have responsibility to protect privacy of their personal information. Relevant regulations, information security framework and privacy principles provide detailed guidelines about privacy of personal information. However, research unfolds enormous concerns about privacy of information. International Business Machines, popularly known as IBM, has a history of its development, growth and reputation. Recently, IBM became headlines of the media due to accusation of disregarding privacy of its foreign customers' personal information. The revelations of such privacy concerns have had significant impact on the financial results of IBM and business of other large US IT firms.

Required:

(i) Describe the concept and importance of privacy of personal information in accordance with the relevant information security framework, privacy principles and available literature. Refer to at least 3 journal articles.

(ii) Briefly describe the history, products and services of IBM.

(iii) Using your knowledge of information security and privacy of personal information as developed in (i) above, analyse in detail the privacy issues raised against IBM and their impact on the financial results of IBM and business of other large US IT firms. Refer to at least 6 media, web and journal articles.

Reference no: EM131047008

Questions Cloud

Select a publicly listed company to analyse : Write a 250-word paper on why you selected this company. Expound upon four reasons. These reasons should not be personal. They should relate to attributes of the company that you are familiar with. Make a claim and then provide evidence for your c..
Prepare a powerpoint presentation about hazcom training : Prepare a PowerPoint Presentation about HAZCOM Training Presentation The 2012 revision to the Hazard Communication Standard requires that employers train workers on the GHS-compliant hazard warning labels and safety data sheets.
Coverage for damage to your auto : Coverage for Damage to Your Auto (Part D) in the PAP also covers the insured while driving a nonowned auto.a. Define the meaning of a nonowned auto.
National economy and national government fiscal activity : Discuss the relationship between the national economy and national government fiscal activity. Include in your discussion the government's role as a distributor of scarce public resources.
Briefly describe the history, products and services of ibm : ACCT19066 - Accounting Systems and Assurance. Privacy of information about customers, employees, suppliers and business partners is critical to information security which is the foundation of information systems reliability. Briefly describe the hi..
The pap provides for two optional coverages : Coverage for Damage to Your Auto (Part D) in the PAP provides for two optional coverages: (1) collision coverage, and (2) other-than-collision coverage.
How noise and vibration hazards can affect the human body : Describe how noise and vibration hazards can affect the human body. What are some methods for mitigating these hazards?
Public pensions are still marching to their death : After reading the Dorfman  article, "Public Pensions are Still Marching to Their Death", respond to the following questions:
How have job market conditions changed in your lifetime : How have job market conditions changed in your lifetime? should you expect to experience a job market similar to that your parents or grandparents experienced?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Depreciation using the revised amounts and straight

depreciation using the revised amounts and straight linecomputer equipment was acquired at the beginning of the year at

  Describe potential risks to the information

Describe what techniques and processes you would use to identify the vulnerabilities and threats to the organization you have chosen. Describe potential risks to the information and the related vulnerabilities within the organization when utilizing..

  Logistics networkwhat are the main steps for designing a

logistics networkwhat are the main steps for designing a logistics network? specifically what data would you

  Network administratorwhat aspects of information technology

network administratorwhat aspects of information technology interests you and what career aspirations you have in the

  What techniques can be used to prevent unauthorized access

what techniques can be used to prevent unauthorized access to the companys information system resources?how can

  Develop a logical work breakdown structure

Develop a logical work breakdown structure (WBS) showing the items of work necessary to accomplish this project. You will need to create some summary tasks to define a structure for your project work in addition to describing the work activities t..

  Student query information systemsthink of your ideal

student query information systemsthink of your ideal company. it can be anything you want but you must assume the

  Briefly describe the supply chain management system

Briefly describe the supply chain management system. Review the product procurement process (product flow). Describe the activities used to coordinate key players in the product procurement process.

  Analyze nibcos project staffing strategy

Analyze NIBCO's project staffing strategy? Evaluate NIBCO's Big Bang strategy? How did they execute it? What are the potential problems with such an approach

  Discuss the benefits and risks involved in cloud computing

Discuss the benefits and risks involved in using "cloud computing". Although similar to SaaS, it is different and offers advantages and disadvantages to businesses.

  Briefly describe the enterprise

Briefly describe the enterprise, in terms of its operations, products/services, markets, competitors etc.

  Role and function of the inventory types

Role and function of the inventory types that exists within the supply chain and explain the role and function of each inventory type

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd