Discuss about the international cyber security laws

Assignment Help Management Information Sys
Reference no: EM132136638

Please responds to student ..do you agree or disagree

I agree with the author that cybercriminals are rational, strategic and that international cyber security laws helps slows down or prevent cyber -crimes.

They operate the same way as other criminals. For example, burglars won't break into a house which is equipped with the latest state of the art security system.

They will break into a house where the probability of them being caught is less than the probability of walking away.

I also agree with the author that there is a motive behind every cyber -attack. Some of the main motives are;

• Disrupt business operations

• Disrupt or distract businesses while other attack take place

• Use attack to hold a company at ransom

• Competitors seeking to benefit from the attack

• Political motivations

It was interesting to read about the two important theories in criminology-General Deterrence Theory (GDT)and Routine Activity Theory(RAT).

General deterrence theory is basically reactive approach to tackling crime while routine activity theory is a proactive approach to curbing or controlling crime.

Reference

Hui, k., Kim, S. H., & Wang, Q. (2017). Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks.MIS quarterly, 41(2), 497-524.

Reference no: EM132136638

Questions Cloud

Describe the ongoing maintenance that will be required : Explain the costs involved in the creation of the system. Describe the ongoing maintenance that will be required.
Qualitative analysis for managers : Can either Influence Diagrams, Influence Tables, and Decision Trees or all of these techniques better structure the decision making process?
Dedication of efforts to the organization : There are many aspects to fulfilment within a job and the dedication of efforts to the organization. Job satisfaction, commitment and involvement are all parts.
Define the legal words-phases : Be sure to: 1) use and define the legal words/phases that apply; 2) include a minimum of two [2] internet references; 3) properly cite and reference.
Discuss about the international cyber security laws : I agree with the author that cybercriminals are rational, strategic and that international cyber security laws helps slows down or prevent cyber -crimes.
Explain the difference between managing and leading : How will you explain the difference between managing and leading, to set the stage to help Theresa and Mike focus on leading?
Employee recognition and providing meaningful explanations : Another way to help increase intrinsic motivation is to ensure that employees are assigned to tasks that they are drawn to and are most likely to thrive.
Identify three of the most recognized risk categories : Identify three of the most recognized risk categories and then explain why risk is a difficult topic for many organization leaders to discuss.
Briefly define enterprise risk management : Read "NIST Cybersecurity Framework Aims to Improve Critical Infrastructure," by Mustard, from Power (2014).

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe rapid application development

Describe rapid application development in your own words. In your answer, include key terms, advantages, and disadvantages.

  What will happen to work tickets once the issue is resolved

Can the end user create the ticket? Or will they have to email, call, and/or chat with tech support, who will then create the ticket?

  Important in the creation of a database

Why do we build databases with multiple-related tables rather than one single big table and why is the use of metadata so important in the creation of a database?

  Discuss about the political terrorism

You are to prepare a portfolio on an assigned topic related to Political Terrorism. Treat your portfolio as if it were a briefing to the President of the United States.

  What new equipment and software are necessary

What new equipment and software are necessary? What training and support will the staff need? How will staff complete their work during the transition period?

  Write an application that meets list of provided functional

ITECH2100 Assignment: Processing Log Files of a Computer Management System. This assignment requires you to write an application that meets a list of provided functional and design requirements, utilising the concepts and techniques taught in this ..

  Explain three ways you believe that social networks have

From this week's video, examine three ways you believe that social networks have "leveled the playing field" between major corporations and small businesses.

  The effect of payment methods on strategic managementwhat

the effect of payment methods on strategic managementwhat is the impact of various payment methodologies and structures

  Differentiate the software concepts of operating system

Differentiate between the software concepts of operating systems, application programs, utility programs, and programming languages

  Create a wbs for one of introducing self-checkout registers

Create a WBS for one of the Introducing self-checkout registers at your school's bookstore and Updating 50 laptops from Project 2003 to Project 2007.

  Design of data input screens and report and queries produced

Designs of data input screens and reports and queries produced. A brief description of how the system is operated and the commands used to undertake each task.

  Explain the process implementation competitive strategies

Explain the process implementation competitive strategies. Use examples as needed. Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd