Discuss about the international cyber security laws

Assignment Help Management Information Sys
Reference no: EM132136638

Please responds to student ..do you agree or disagree

I agree with the author that cybercriminals are rational, strategic and that international cyber security laws helps slows down or prevent cyber -crimes.

They operate the same way as other criminals. For example, burglars won't break into a house which is equipped with the latest state of the art security system.

They will break into a house where the probability of them being caught is less than the probability of walking away.

I also agree with the author that there is a motive behind every cyber -attack. Some of the main motives are;

• Disrupt business operations

• Disrupt or distract businesses while other attack take place

• Use attack to hold a company at ransom

• Competitors seeking to benefit from the attack

• Political motivations

It was interesting to read about the two important theories in criminology-General Deterrence Theory (GDT)and Routine Activity Theory(RAT).

General deterrence theory is basically reactive approach to tackling crime while routine activity theory is a proactive approach to curbing or controlling crime.

Reference

Hui, k., Kim, S. H., & Wang, Q. (2017). Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks.MIS quarterly, 41(2), 497-524.

Reference no: EM132136638

Questions Cloud

Describe the ongoing maintenance that will be required : Explain the costs involved in the creation of the system. Describe the ongoing maintenance that will be required.
Qualitative analysis for managers : Can either Influence Diagrams, Influence Tables, and Decision Trees or all of these techniques better structure the decision making process?
Dedication of efforts to the organization : There are many aspects to fulfilment within a job and the dedication of efforts to the organization. Job satisfaction, commitment and involvement are all parts.
Define the legal words-phases : Be sure to: 1) use and define the legal words/phases that apply; 2) include a minimum of two [2] internet references; 3) properly cite and reference.
Discuss about the international cyber security laws : I agree with the author that cybercriminals are rational, strategic and that international cyber security laws helps slows down or prevent cyber -crimes.
Explain the difference between managing and leading : How will you explain the difference between managing and leading, to set the stage to help Theresa and Mike focus on leading?
Employee recognition and providing meaningful explanations : Another way to help increase intrinsic motivation is to ensure that employees are assigned to tasks that they are drawn to and are most likely to thrive.
Identify three of the most recognized risk categories : Identify three of the most recognized risk categories and then explain why risk is a difficult topic for many organization leaders to discuss.
Briefly define enterprise risk management : Read "NIST Cybersecurity Framework Aims to Improve Critical Infrastructure," by Mustard, from Power (2014).

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe it steering committee and the role each member play

The definition IT Governance and why it is important in the IT industry. Describe IT steering committee and the role each member plays.

  Describe briefly the software package called pgp

State four reasons why physical security is needed. Discuss briefly the benefits and limitations of asymmetric key encryption. Explain briefly the fivesteps undertaken in risk analysis.Describe the procedure involved in automatic password cracking al..

  What types of limits are likely being placed on shelly

If AutoDoc's non - compete agreement was legally challenged, what would a court consider in determining whether it is enforceable or not?

  Describe the logical sequence of planned activities required

Determine the factors that must be considered and observed throughout the WBS development process and explain why.

  Describe what job security means to you personally

Take a piece of closed source software that you or your BOI uses. Research to find if there is an open source alternative.

  Analyze the methods for establishing key risk indicators

Recommend to management the approach that they need to take to implement an effective ERM program.

  Explain the role that security standards play

Describe an effective process that organizations should follow to ensure proper configuration management of operating systems and applications.

  Explain the four basic elements of a contract

Explain the four basic elements of a contract, not specific to any organization and the concept of breach in regard to contracts. What policies does your organization have in place to resolve a contract issue?

  Analyze and evaluate interface design models

Analyze and evaluate interface design models.Explain each stage of the management plan and justify your rationale.

  Describe how the five-stage search framework shared

Your company has been hired to design a product that will provide searches of textual documents and database querying. Your design team has not developed a product like this before. Examine the challenges associated with searching in textual docum..

  Major issue within the united states

Is the digital divide a major issue within the United States or across the globe?

  Purchase of a new computerassume you are considering the

purchase of a new computer.assume you are considering the purchase of a new computer. use the internet to access the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd