Write review on given article

Assignment Help Computer Engineering
Reference no: EM131978609

Write review on this article with reference in APA format.

Privacy policy is a statement that declares a party's policy on how it collects, stores, and releases personal information it collects. It informs the client what specific information collected and whether it is kept confidential, shared with partners, or sold to other firms or organizations.

The exact contents of a certain privacy policy will depend upon the applicable law and may need to address requirements across geographical boundaries and legal jurisdicitons ( Halboob & al, 2015).

Therefore, privacy policy controls and counter measures must use to comply with laws and regulations. For instance, Acceptable use policy (AUP) is used to mitigate risk between the organization and its employees. According to Anderson, the Chinese Wall model is used by the intelligence community to describe the proposed mechanism to avoid any conflict of interest and the BMA model is to show the information flows approved by the medical ethic (2010). The Chinese Wall model offers a mix of free choice and allow the concept of separation of duty.

For example, a person can patch a system for any vulnerability but he/she can test the system, but someone else will test the system to see if he/she broke any functionality when the system was patched.

I think It will be a good idea to combine the Chinese Wall model and BMA because both are striving to reach a common goal which is protecting data integrity and ethics.

The evolving of the software and technology prices, differential pricing is economically efficient but increasingly resented. Therefore, the system operator is the one who is controlling the information and desiminate the information when needed. On the other hand, the stakeholder is the one who make sure that the system is efficiently secure and the data is flowing in an ecrypted way without any compromise.

George Loewnstein, points out that people are more sensitive if things suddenly got worse, but not if they get worse gradually (Anderson, 2008). "Whatever you do, work heartily, as for the Lord and not for men." Colossians 3:23. Everything we do has to be done with integrity and willingly.

References

Halboob, Waleed, Ramlan Mahmod, Nur Izura Udzir, and Mohd Taufik Abdullah. 2015. Privacy policies for computer forensics. Computer Fraud & Security 2015 (8): 9-13. Anderson, R.J. (2008).

Security Engineering: A Guide to Building Dependable Distributed Systems. Hoboken, NJ: Wiley. ISBN: 9780470068526. BT

Verified Expert

The article briefly describes the importance of privacy and security policies in todays generic systems, reviews shortly the 4 security models and what can be taken into account to ensure data encryption and privacy is not compromised.

Reference no: EM131978609

Questions Cloud

Implement a time-based compensation : Do you think it is more beneficial for a JIT organization to implement a time-based compensation compared to a salaried approach?
Raw materials inventory journal entries : The balance in Sedona Company's raw materials inventory account was $110,000 at the beginning of September. Raw materials purchased during the month
Determining the organizational performance : Discuss the processes that your organization has in place to "support" organizational performance. Does your firm make use of intrinsic or extrinsic motivators?
What is one thing as the biggest takeaway : What is one thing as the biggest takeaway that you can commit to incorporating into your day to day work style.
Write review on given article : Write review on given article - combine the Chinese Wall model and BMA because both are striving to reach a common goal which is protecting data integrity
Maintaining regulatory compliance during mergers : Given OSHA is so important to health care organizations what are the challenges with maintaining regulatory compliance during mergers, acquisitions
Why are men more likely to start businesses than women : Why aren't more (or less) people involved in starting a business? Why are men more likely to start businesses than women?
What is nechmentin before tax cost of debt : The risk free rate in the market is 8% and the market rate of return is 14%. The company has a beta of 1.1.
Calculate the irr for the above project for coveauklaooglu : CoveAuklaOoglu, Inc. is considering a project which has net cash flows (the same as free cash flows) given below:

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd