You have been invited to participate in a round table discussion on the above topic at a conference on Best Practices for IT Security Management . For this activity you must prepare a 3 to 5 paragraph...

1 answer below »

You have been invited to participate in a round table discussion on the above topic at a conference onBest Practices for IT Security Management. For this activity you must prepare a 3 to 5 paragraph briefing statement which answers the following questions. You must use and cite information from the weekly readings.



  1. What is stakeholder theory? How does it drive requirements to spend money on cybersecurity products & services?

  2. How does social contract theory apply to purchasing requirements for cybersecurity products & services?

  3. Name and briefly describe 3 ethics issues that IT Security managers and staffmay encounter when selecting and evaluating cybersecurity products & services. (Use examples to drive home your points.)


Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

Answered 4 days AfterOct 27, 2021

Answer To: You have been invited to participate in a round table discussion on the above topic at a conference...

Kumar answered on Nov 01 2021
94 Votes
Response to the Questions        5
RESPONSE TO THE QUESTIONS
Table of Contents
Question 1    3
Question 2    3
Question 3    
4
References    5
Question 1
The stakeholder perspective is an alternative way of knowing how agencies create costs and trade with every other (2018, Cambridge University Press). In other words, it is capable of assuming withinside the way of the stakeholder and understanding what their needs, hobbies, and values are. The stakeholder principle drives necessities to spend cash since they want to guard assets. Data breaches have come to be a common theme, this chance on my own drives stakeholders to spend on cybersecurity products. Information safety breaches are an increasing number encouraged by fraudulent and crook motives. Reducing their vast charges has come to be an urgent issue. Although cybersecurity has robust public precise characteristics, most data safety choices are usually taken by stakeholders who are individually engaged (Gunduz & Das, 2020). Due to the interconnected aspect that prevails in the field of cyberspace, leads to decentralized choices that are usually associated with externalities that could bring...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here