Premium Essay

How Will the Advancement of Cyber Security Affect Communication on Social Media?

In:

Submitted By beerloverme
Words 2159
Pages 9
1

ENC1102 CMB
Final Research Proposal

Introduction and Articulation of Problem or Topic:
I selected a Cyber Security topic because it is a big concern for me how my information
(the data) is stored online. This is a topic that everybody worries about because nobody knows where the cloud is or who has access to it. It seems to me that every week there are new headlines about hackers bringing an organization to its knees by doing things such as stolen funds, bad publicity, and embarrassing revelations that are on the front page news. Then I ask myself, how can we protect ourselves from these issues? I guess the best protection is for both ends to implement plans and procedures or maybe the best way to demonstrate the needs for those procedures is to perform a Cyber Security audit and implement the resulting recommendations. Moreover, work in conjunction with IT departments can ensure that implementing the resulting recommendations will make both sides of the social media communication more secure. Like most criminals, hackers look for easy targets. If your media has simple security issues that are easy to exploit, hackers will dive right in. If your infrastructure is strong on your end, hackers will become frustrated and move on to the next easy mark.
Furthermore, in these days it is almost impossible to be in an online business with an organization that does not collect or hold personal identifying information like names, addresses,
Social Security numbers, credit card numbers, or other account numbers. So, how comprehensive is Cyber Security if it cannot protect us? Would it be better if we do not exist online?

2

Research Question:
My research will be guided by the following question: How will the advancement of Cyber
Security affect communication on social media?

Literature Review
Social media encompasses a variety of online

Similar Documents

Premium Essay

Cyber Forensics

...and Their Applications (IJNCAA) 2(1): 127-137 The Society of Digital Information and Wireless Communications, 2012 (ISSN: 2220-9085) Cyber Forensics: Computer Security and Incident Response Virginiah Sekgwathe1, Mohammad Talib2 1 Directorate on Corruption and Economic Crime, Gaborone, BOTSWANA veesek@gmail.com 2 Department of Computer Science, University of Botswana, BOTSWANA talib@mopipi.ub.bw ABSTRACT The intensification of Information and Communications Technology usage in all facets of life exceedingly amplify the incidents of information security policy breaches, cyber crimes, fraud, commercial crimes, cyber laundering etc, hence require a well developed approach to tackle these incidents in order to realize legally defensible digital evidence. Since electronic evidence is fragile and can easily be modified, finding this data, collecting, preserving, and presenting it properly in a court of law is the real challenge. There is a need for use of semantic analysis to discover underlying security policy requirements and internal power structures and institutionalization of anti cyber attack, antimoney-laundering and regulatory schemes. The first responders to cyber security incidents often than always are an organization ICT personnel who are technically sound though may be deficient in investigative skill. The scientific standards of cyber forensics dictates the procedure as it promotes objectivity, a precise and well documented analysis...

Words: 5129 - Pages: 21

Premium Essay

Blackberry

...Business Interests and Host Nations’ Security Concerns MUHAMMAD FAIZAL RUSLAN 62361214009 Module 2 Question 1 Research in Motion (RIM), the maker of the Blackberry smartphone enjoys huge success in its US, UK and Canada market. Strong encryption built into the design of the Blackberry system that guaranteed customer privacy has been its forte and main strength among business entities and government agencies in the UK, US and Canada. However, despite the strong security unmatched by rivals such as Apple Inc, Google Inc and Nokia Corp, controversies surrounding its security soon emerge prominently from its Asia and Middle East market. The main reason for this can be related to the number of terrorist attack on that region. Due to the strong security of Blackberry system, it provides a perfect communication medium for terrorists or any parties with malicious intent to communicate, plan and execute their ploy without fear of the their emails, text messages or phone calls being tapped by the government or intelligence body. Thus, due to a number of terrorist attack that was investigated to be planned via Blackberry (due to Blackberry being found in the possession of the terrorist), it is a legitimate concern regarding to Blackberry’s security system from the governments of the region. Second reason as to why the Western countries where Blackberry has large customer base such as US, UK and Canada doesn’t seem to care much about the security concern of Blackberry system is...

Words: 1354 - Pages: 6

Premium Essay

Cyber Liability

...2013 7/15/2013 ORGANISATIONAL PROFILE History New India Assurance India Limited, incorporated on July 23rd 1919 was founded Sir Dorab Tata who was a founding member of The House of Tata’s. I got further nationalized in the year 1973 with merger of Indian companies. Present Position New India Assurance India Limited has vast presence all over the country and it is also doing remarkably high business. The company’s gross premium (in India) has increased tremendously over the years 2010-2012. It was Rs. 8542.86 crores in the year 2011-2012, as against Rs. 7097.14 crores in the year 2010-2011. Also, the company’s total assets are as high as Rs. 42162.74 crores as on 31st March 2012. The company has an extensive network of offices covering each and every state and other regions of India as shown in Figure1. . Figure 1.New India Assurance India Limited presence all over the country. Such large and extensive network makes NIA Rank No. 1 in the Indian market. Not only this, the company is also the largest Non-Life insurer in Afro-Asia excluding Japan. It is infact also the first Indian non-life company to reach Rs. 10073.88 crores Gross Premium. International Presence NIA also provides global Re-insurance facilities. It has its over-seas presence in countries like Japan, U.K, Middle East, Fiji and Australia. Overseas operations commenced in 1920. The company has operations in 20 countries in the year 2011-12 which spans through a...

Words: 14892 - Pages: 60

Premium Essay

Criminolgy in the Future

...Criminology in the Future Taylor Strong CJS/231 September 21, 2015 Jacqueline Waltman Criminology in the Future Future directions of crime fighting and its role in social policy implication would be the advancement of technology and its impact that it will potentially have on crime fighting in the future. Technology is ever changing and it something that we have all witnessed advance over the course of time, whether that is the progression of a tape recorder, to a CD, a CD to a Mp3, and Mp3 to iPods and iPhones. The only difference is that with criminal justice technology takes them much further than to just being able to listen to music but rather to get ahead of crime and to get a grasp on the criminals who are committing the acts. Technology is insightful in every aspect of the criminal justice system, from the examination to the trial of crimes. The advancement of technology is already in its most profound stage of conformity. It is allowing us to be visually able to see individuals from space via satellite and target their intellect by viewing what it is they are arranging criminally and for us to use that information to our advantage. Other directions of crime fighting and its role in social policy implications suggest that we are also setting up to not only visually be ahead of the game and criminals in the future but also that we are asking it possible for us to listen more openly to conversations that are being exchanged between criminals. This alone is substantial...

Words: 2184 - Pages: 9

Premium Essay

Information Technology Strategic Plan

...focused on the format of a Business Plan strategy. It provides an overview of the company, financial, and other aspects of the business plan. The main components of business plan are: executive summary, company, products and services, market, strategy and implementation, financial plan, and financial plan. This article will show the plan for a successful corporate finance strategy, corporate finance and strategy functions that will work together and illustrate how to create shareholder value. Keywords: Writing Business Plans, SWOT analysis, Strategy plans, financial plans, sample business plans Introduction Many companies are using mobile (tablets, smartphones, and blackberries) technologies to enhance their customer service experience and internal job satisfaction for their employees. Companies like Delta Airlines, PayPal, a medical company, and a software security company, has shown that using mobile/wireless technologies are reaping its benefits. They’ve also have shown that they are in touch with social media platform and engaged customers to increase their understanding of what is needed to provide better products and services. “Indeed, many good business ideas have flopped before getting off the ground because they were not thought through fully” (Tusin, J, 2006, p. 226). A business plan enables an entrepreneur or new business starter an opportunity to fully think through their ideas through. The opening of a business plan should grab, entice and hold its readers...

Words: 3765 - Pages: 16

Premium Essay

Internet Regulation, Legal and Ethical Issues Concerning

...businesses v. The defense of our nation’s assets 3. Leaders in Internet regulation f. Efforts at home g. Efforts abroad 4. The challenges of regulation ii. Why broad regulation has proven difficult 5. Technology meant for other purposes 6. Grew too quickly c. Present iii. Structure 7. Present-day regulations h. How ongoing Internet regulation works 8. Who controls the Internet? i. Who enforces regulation? 9. How infractions are punished iv. Problem areas 10. Intellectual Property/Copyright Infringement 11. Provision of service issues j. Network Neutrality 12. Predatory crimes 13. Distribution of illicit material v. Challenges 14. What cultural differences challenge global Internet regulation? k. How does method of governance...

Words: 3196 - Pages: 13

Free Essay

Information Technology in India

...Information Technology in India 1 Information Technology in India: A look into how the Information Technology in India has come about over the Years Jessica Majeski, Lindsey Pavilonis, Mantsane Rantekoa, Long Nguyen, Miriam Moore DeVry University Online February 13, 2011 Information Technology in India 2 Contents Introduction to Information Technology in India………………………………………………...4 The Culture of India….....................................................................................................................5 Government……………………………………………………………………………….....5 Political Structure Government structure Economy……………………………………………………………………………………..6 Economic situation post Independence Economic crisis and impact of introduced reforms Education and Religious System of India……………………………………………….......7 History of Information Technology In India and it’s Development….........................................7 Four Periods of Information Technology…...........................................................................7-9 Pre-mechanical Mechanical Electromechanical Electronic Information Technology history in India..............................................................................9-10 No separate IT industry in 60’s and 70’s Tata Consulting Services (TCS) Indian IT professionals in U.S. Corporations sourcing IT services to India IT companies Leading growth engine for India The Specific Impact That Technology Has Had Upon the Culture of India…………………...10...

Words: 6995 - Pages: 28

Premium Essay

Social Networking

...Online Social Networks and Adolescents Social networking has become more popular with adolescents and young adults today. Facebook is one of the many social network high school students have. Parent and teachers have concerns about social networking effects on adolescent social development. Everyone is using online social networking sites. Today, more and more adolescents are already using social media to maintain relationships and connect to new groups. Also known as, the rich get richer hypothesis. Many more adolescents are less socially adept using social networking websites to make new friends when they might be too shy to do so in real life. Second, how are relationships forming online? Evidence shows that young people maintain already formed friendships and build new friendships online. Social media has taken away face-to-face social skill development. The constant growth in technology has resulted in the creation of over five online social networks for people to sign up for and be members. Research shows that almost every teenager is an active member in one social media site, at least. Further research into the time that people spend online in these social networks per day is even alarming. The connection between teenagers and online social networks is a cause if concern. Adolescents use the social networks as a platform for creating friends and getting to know each other. However, despite the strong relation between teenagers and social networks, better...

Words: 2982 - Pages: 12

Free Essay

Energy Savings

...operations in the future, and for the U.S. military services to be on the lookout for revolutionary ways in which to employ those technologies in warfare. This report examines the history of past RMAs, to see what can be learned from them regarding the challenge confronting the DoD today, when it has set out on a concerted effort to bring about a technology-driven transformation of the U.S. military to achieve the operational goals outlined in Joint Vision 2010. Among its many findings are three of particular note: * RMAs are rarely brought about by dominant players (such as the U.S. military is today). * For a dominant player to bring about an RMA requires a receptive organizational climate, fostering a continually refined vision of how war may change in the future and encouraging vigorous debate regarding the future of the organization; senior officers with traditional credentials willing to sponsor new ways of doing things and able to establish new promotion pathways for junior officers practicing a new way of war; mechanisms for experimentation, to discover, learn, test and demonstrate new ideas; and ways of responding positively to the results of successful experiments, in terms of doctrinal changes, acquisition programs, and force structure...

Words: 3503 - Pages: 15

Premium Essay

Cyber Crime

.....................................................6 3.1 Cybercrime Legislation ............................................................................7 3.1.1 Federal Laws .................................................................................7 3.1.2 State Laws ......................................................................................9 3.2 Cybercrime Law Enforcement Agencies ................................................11 3.3 Classifying Cybercrime ............................................................................16 3.4 National Levels of Cybercrime ................................................................19 3.4.1 Business Cyber Victimization ......................................................20 3.4.2 Individual Cyber Victimization ...................................................22 4. A REVIEW OF THEORIES..........................................................................26 4.1 Self-control Theory ...................................................................................27 4.2 Routine Activity Theory ...........................................................................33 5. AREAS FOR FUTURE RESEARCH ...........................................................38 6. CONCLUSION ...............................................................................................44 7. ACKNOWLEDGEMENTS...

Words: 13816 - Pages: 56

Premium Essay

This Paper Provides an Overview of the Growing Cybercrime Problem and Reviews Two Criminological Theories That Have Been Applied to the Study of Cybercrime and Cybercrime Victimization. Legislation Which Defines

......................................................................6 3.1 Cybercrime Legislation ............................................................................7 3.1.1 3.1.2 Federal Laws .................................................................................7 State Laws ......................................................................................9 3.2 Cybercrime Law Enforcement Agencies ................................................11 3.3 Classifying Cybercrime ............................................................................16 3.4 National Levels of Cybercrime ................................................................19 3.4.1 3.4.2 Business Cyber Victimization ......................................................20 Individual Cyber Victimization ...................................................22 4. A REVIEW OF THEORIES..........................................................................26 4.1 Self-control Theory ...................................................................................27 4.2 Routine Activity Theory ...........................................................................33 5. AREAS FOR FUTURE RESEARCH ...........................................................38 6. CONCLUSION ...............................................................................................44 7. ACKNOWLEDGEMENTS...

Words: 13816 - Pages: 56

Premium Essay

Ethical Issues in Digital Media

...Ethical Issues with Digital Media Introduction Ethics in digital media involves the moral problem that is associated with the adoption of new communication technologies in daily activities. New advancement of technology has resulted in different techniques that have altered the manner in which business and other activities are undertaken in the world. Examples of digital media are online journalism, blogging sites, and social media. The major concern in the ethics of digital media is the effect of information that is transmitted through these channels. Ordinarily, the role of digital media is to act as a medium of communication. However, in the case that the accuracy of the information is not controlled, it can lead to various impacts to the society. The digital media played a very significant role in the financial crisis through the spread of information. As such, this paper analyses digital media ethics in relation to the global financial crisis and its effects to the society. The World Financial Crisis The global economic crisis has caused many problems nearly to all the sectors of the economy in the world. Many countries have suffered deep in their growth domestic product while recession has a common experience all over the world. The severity of the crisis has persisted to the recent times, but this can be attributed to the debts incurred by some developed economies like Greece even after strong support from other countries. As a result, the world’s financial system...

Words: 2967 - Pages: 12

Free Essay

Paul

...PREVENTION 22 CHAPTER 3 3.0 ANALYSIS CYBERCRIME CASES 26 SUMMARY OF CYBERCRIME CASES 38 CONCLUSION AND RECOMMENDATION 43 REFERENCES 44 ABSTRACT The 21st century has brought about certain influences in the lives of everyone including the way we do business transactions, the way we gain education and the way we communicate; these influences are mostly revolutionized through the use of modern day technology and though these technologies have been proven to be beneficial to the entire society, it also carries with it aspects that can be worrying for everyone. Certain professionals in the said field use their expertise to illegally develop ways on how to take advantage of others with of course the use of technology hence cybercrime. This study aims to provide an overview of the said topic and depict real life incidents with major companies and also discuss ways of avoiding them. CHAPTER 1 1.0 INTRODUCTION At early times the word computer was first conceived in the late 1600s and was originally used to describe a human being who performed calculations, computations and the like but it was only until the end...

Words: 7997 - Pages: 32

Free Essay

Accounting Tech

...How Technology is Changing Accounting Accounting 525 Melissa Holland-Mitchell December 20, 2014 Professor Jones K. Kasonso Computer technology is always changing, so fast that many companies will simply update their current computer system continuously. Technology and the computer are a part of our lives; it helps managers make decisions to improve business operations, allows for faster transfer of information, and is simply a basic necessity to do business in many professions including accounting. There are technological trends that will have a tremendous impact on the accounting profession: cyber security, cloud, mobile devices, and big data. The Cloud and mobile technology available today is transforming the job of the tax and accounting professionals (Proformative.com, 2012). Where technology used to be behind the scenes at the office, its use is increasingly extended beyond internal use and out to the client. Mobile accountants work remotely between 5.8 to 8.6 hours per week. By 2015 the number of mobile workers is in North America and Latin America is to exceed 212 million (Proformative.com, 2012). More accountants are using smart phones for work; mobile access allows firms to connect with clients outside of regular business hours, and other locations. Smartphone’s are quickly being adopted by the accounting professional, many still think of the Smartphone as just a mobile phone with additional features such as texting and music player. However with the...

Words: 2332 - Pages: 10

Free Essay

Argument Essay

...We Are Detrimentally Dependent on Technology October 13, 2010 Abstract Technology comes in many forms and no aspect of our lives is untouched by some form of technology or another. Technology is defined as “the practical application of science to commerce or industry”. Technological development into present day has been meteoric to say the least. With the advancements of nearly every aspect of human life having some tie with technology, one might start to see a synergistic relationship between humans and technology. However, while some would believe this relationship has been beneficial for us, we believe there have been detrimental effects from our growing dependence on technology. 1 Introduction No one can argue against the fact that the human race has made enormous bounds in advancements in the last century. From developments in technology which affect society, how we communicate, the field of medicine and education. Technology has not left any aspects of our lives untouched. There will be no shortage of people who would argue that the technological advancements of the 21st century have been beneficial to society. While beneficial, we believe that, as a society, we must realise the magnitude of our dependence on technology and the ramifications if it were to be taken away from us. This paper argues that humans have formed a detrimental symbiotic relationship with technology in its many forms. This paper will investigate the changes that technology has affected, and show that...

Words: 4964 - Pages: 20