MANAGEMENT INFORMATION SYSTEMS XXXXXXXXXX1
CYBER SECURITY FOR PERSONAL INFORMATION 2
Tarek Ben Fehri
Department of Business, California Miramar University
MIS 6110: Management Information Systems
Instructor: Maryam Hassanlou, PhD
Cyber security for personal information
2. Problem Statement under Investigation
Cyber security is concerned with preventing unwanted access to and manipulating your internet and network-based digital devices and information (Callen-Naviglia & James, XXXXXXXXXXThe internet has established itself as a channel through which we do business in addition to being a source of knowledge. The internet was never designed to track and record user activity.
Because the internet provides many advantages, it also gives equal opportunity for cyber-te
orists and hackers (Demirkan, Demirkan & McKee, XXXXXXXXXXIt is frequently used to enhance communication inside te
orist groups and information collecting and distribution for te
3. Importance of the Study
Cyber threats may impact community policing (CP), just as they do on the citizens, it is designed to protect. Traditional fraud and cybercrime have many similarities, but cybercrime has two distinct advantages: scale and anonymity (Callen-Naviglia & James, XXXXXXXXXXJust as a computer has improved the efficiency of legitimate firms, it has also improved the efficiency of illegal enterprises.
Huge-scale cybercrime is now feasible because the internet has changed a cybercriminal's motive from merely targeting a limited number of high-value targets to many low-value targets. This, in turn,
ings with it additional problems (Park & Lee, 2019).
Cybercrime will only grow more common and damaging as society continues to integrate and rely on the online realm in their daily lives. Because of the scalability that computers and the internet enable, cybercriminals may have a greater influence. Society is growing increasingly reliant on the integrity and confidentiality of computer systems without even recognizing it. Cybercrime attacks on people's online privacy and security can have real-world consequences for their reputations, job security, identity, and income.
Protecting our essential infrastructure (financial markets, energy, healthcare, government, and transportation) against cyber-attacks is thus a national issue that, as we will see, necessitates an international response. This chapter describes the many features of cyberspace and some of the technology that may be utilized for both right and wrong within it (Park & Lee, 2019)."
4. Purpose of the Study
Governments, military organizations, financial institutions, colleges, and other enterprises acquire, process, and store personal data and information on computers. They then transfer it to other computers across networks. The study goes into great length regarding the nature of cyberspace and demonstrates how insecure the internet is for transmitting private and financial data (Valeriano & Maness, 2018).
We show how hacking has become more widespread and dangerous to global security and defense and the numerous types of cyber assaults used throughout the world. Understanding the fundamental ideas of cyber security is critical and the cu
ent and upcoming risks that it poses (Demirkan et al., XXXXXXXXXXThis chapter examines the origins of cybercrime and the shifting incentives and obstacles that come with tackling it.
5. Main Participants in Study
Cyber security personnel
Callen-Naviglia, J., & James, J XXXXXXXXXXFintech, Regtech and the Importance of Cybersecurity. Issues in Information Systems, 19(3)
Demirkan, S., Demirkan, I., & McKee, A XXXXXXXXXXBlockchain technology in the future of business cyber security and accounting. Journal of Management Analytics, 7(2), XXXXXXXXXX
Park, J. W., & Lee, S. J XXXXXXXXXXProbabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants. Nuclear Engineering and Technology, 51(1), XXXXXXXXXX
Valeriano, B., & Maness, R. C XXXXXXXXXXInternational relations theory and cyber security. The Oxford handbook of international political theory, 259