Task 1. You are the expert Management Consultant of the Creating and Managing Digital Systems department in the Crown Digital Systems Ltd. (CDS-Ltd) A new company with over 60 new clients around the...

1 answer below »
Task 1. You are the expert Management Consultant of the Creating and Managing Digital Systems department in the Crown Digital Systems Ltd. (CDS-Ltd) A new company with over 60 new clients around the UK, Canada and mostly the United States. CDS-Ltd despite being a new company in the Contemporary Digital Innovation and Enterprise business sector, it has quickly grown its reputation to be among one of the best knowledge based organisations in the sector. It has a very wealthy, E-Commerce and Online Start-Up clienteles who take information systems and privacy of their customers seriously. The CEO of CDS-Ltd has asked you to prepare a report for one of your company’s new clients on “Why do contemporary information systems technology and the internet pose challengesto the protection of individual privacy and intellectual property” The report should be of 2700 words The report ideally should include: 1. Introduction: Define privacy and fair Information Practices (6) 2. Main body: include: 2a. Describe why all organisations have become dependent and vulnerable because of using Information Systems. (12.5) 2b. Explain how the internet challenges the protection of individual privacy and intellectual property. (12.5) 2c. Explain how informed consent, legislation, industry self–regulation and technology tools help protect the individual privacy of internet users. (12.5) 2d. Discuss two ways that protect intellectual property rights. (12.5) 3. Conclusion: (7) 4. Recommendation: (7) Total Marks: 70% Canvas / Web Services: Submission Deadline – Tuesday 31st August 2021 by 2pmTask 2 – (30%) : Weekly Reflection Sheet: LUBM305 Project Management Student Name: Student ID: Wk. No Date: Learning Outcome Learner reflection Introduction 4. 7. What did you learn? 8. What activity or part of the lecture did you enjoy most and why? Describe in few words when and where you could apply the knowledge you gained this week. 5. 9. What did you learn? 10. Briefly state one skill you do need as a project manager and why? Describe in few words when and where you could apply the knowledge you gained this week. 6. 11. What did you learn? 12. What one new skill(s) did you develop in this unit? Describe in few words when and where you could apply the knowledge you gained this week. Conclusion: Total word count 880 words (including 10%) What is something you need to work on after this unit? *Editable copy of the above template is on the Canvas in Weeks 1 and 3 lecture materialsTask 2 - Criterion Available Mark (%) Introduction: • Introduction to the reflective journal • Students must identify at least two objectives each week to demonstrate understanding of project management basic practice. 2.5 2.5 Content and Analysis: • At least 6 objectives (2 each week) are to be identified and analysed and strategies of their application presented in a logical manner • Personal feelings and thoughts are presented • Strategies, application and analysis are presented based on good practices and with references to current literature where possible 5 5 5 Presentation: Organisation and clarity: • Logical ordering of ideas, arguments and with clear transition and distinction from one major point to the other. • Conclusion 5 Reference: Harvard format. • Quality of writing, grammar, spelling, expression style, presentation, legibility, citations, referencing and bibliography. 5 • No of words on template = 270 words • No of worlds for Reflection = 880 words Total word count excluding references = 1150 words 30% NB. You are to submit both Tasks 1 and 2 as one document. Assignment presentation and assessment Task 1. Is a report (-2700 words +/- 10%) to be completed as an individual task - 70% Task 2. Write a three –week reflective journal (800 words +/- 10%) to be completed as an individual task. – 30% Please submit both Tasks (1 and 2) together as a single document.Categories Grade Relevance Knowledge Analysis Argument and
Answered 8 days AfterJun 30, 2021

Answer To: Task 1. You are the expert Management Consultant of the Creating and Managing Digital Systems...

Abhinaba answered on Jul 09 2021
140 Votes
INTERNET AND PRIVACY
Table of Contents
Introduction    3
Vulnerability of Organisations    3
Protection of Individual Privacy    5
Ways to Protect Intellectual Property Rights    7
Conclusion    8
Recommendation    9
References    10
Introduction
Privacy and Fair information practices are very important concerning the present times business scenario. In the organization’s privacy is one of the most prioritised and focused thing. Fair information practices is particularly a general term for a set of standards governing the collection and use of personal data and addressing the issues of privacy and acc
uracy. In different countries and organization they have particularly their own terms for these concerns like in UK it is termed as Data Protection in the European Union it is termed as personal data privacy. Privacy is concerned with the protection and safeguarding of the information and the data that are used by the organizations for several purposes. The data include the company related information and the information related to the clients that need to be preserved and kept confidential.
The fair information practice implies that personal data should be relevant for the purpose and would be accurate. The purpose for the use of personal data should also be specified during the data collection. The fair information practice also channelizes that the personal data should not be disclosed or made available for the use of any purpose other than the listed ones and it should be protected by reasonable security safeguards.
Vulnerability of Organisations
In the present time all the organizations have become dependent and vulnerable because of using information system. Information system have become a vital and important part of the organization in any of the work as well as the decision making. The information system contributes to the increase in the concentration of access to information, decision making as well as control, it has become one of the basic and mandatory things in every organization for every little and big things the organization relies on the information system for extensive help (Adams et al., 2017).
The organizations have become much dependent due to the use of information system as it helps the businesses in customisation of the data to help them with a specific tasks and decision making. Due to the ease they get in accessing and extracting the data from the information system they became completely dependent and reliable the involvement and the effort of the humans in the process declined gradually. The dependency can also be acknowledged by the fact that in the present time at least 90 percent work of the organization’s is dependent on the verge of the use of the information system the presence of the manual work in the organization has become negligible. The use of the information system in the organization is spread to almost every aspect and the departments of the organization whether it is operations, management or the decision making. The dependency of the organization’s has also increased die to the accurate and fast information’s conceived from the use of information systems and in this fast paced world each and every organization wants to excel it’s performance in most minimum time possible (Suharti & Sulistyo, 2018).
Along with being dependent the organizations have also become vulnerable because of using the information system. The vulnerability of the organization’s come with the information system as the information system is directly related to the internet and the internet is designed to be an open system which makes the internal corporate system of the organizations more vulnerable from the actions of the outsiders. Through the use of information system the organizational data are linked to the internet which gives a prominent chance to the hackers to accomplish the denial of services attacks and penetrate corporate networks to cause serious disruption to the systems (Ajibola et al., 2020).
The vulnerability in the organization also come with the stances if the information extracted from the information system is incomplete or is not inherited correctly by the employees or the clients. Because of using the information system the organizations are vulnerable to several threats whether it is related to their data stealing or the information mishandling. The information security threats are the major reasons why the organizations have become more vulnerable to different aspects of the crimes and threats. There is not a single organisation in the present time that is not using the information system and that is the reason why all the organization’s ae generally felt vulnerable and dependent.
Challenges Associated with Privacy
Internet challenges the protection of individual privacy in several ways among which the most prominent is spying and snooping. Through spying and snooping one can gather and misuse any information of an individual from residing in any part of the world without coming in the knowledge of that individual. There are many such information both personal and professional which an individual have on social accounts that when comes to someone who have destructive mind-set can use against them. If someone got any individual’s personal stuffs they can mishandle them through making it viral or by spreading it throughout the world without moving from their respective places and that can harm an individual mentally. Similarly if someone get into your professional space and get such information that are very confidential can affect an individual in many ways (Bican, Guderian & Ringbeck, 2017).
As it is well known that through spying and snooping one can easily track an individual’s locations which leaks information of an individual’s and their loved ones movements and one can easily keep their eye on an individual through this which now a days no one wants as all of them wants their personal space. Now this threats an individual...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here