Sunday, May 5, 2019

Information Studies Essay Exams Example | Topics and Well Written Essays - 1250 words

Information Studies Exams - Essay ExampleThe propensity for documents to be written and commented upon, an another(prenominal) medical prognosis that Brown discusses, has been greatly facilitated by the new generation of electronic documents.An electronic document is amenable to creation processed and transmitted by electronic means. One of the major difficulties in moving away from somatic to electronic documents stems from security concerns. In the case of physical documents, there is usually only one reproduction of metier education. This copy can be physically protected. In the case of electronic documents, theft of sensitive information is on the rise due to many reasons. The security of the documents and information are challenged by the proliferation of hackers and other forms of attack. Moreover, even where tight security measures are applied, these are, in many cases, restricted to storage and transmission of the documents only. Recipients of the information may unwitt ingly form breaches in the security system. At the same time, legislation such as the HIPAA makes it mandatory for organizations to take effective measures to protect the privacy of those dealing with them.Easy availability of information has excessively raised questions almost governmental accountability against privacy of individuals. Government can access information about individuals more easily in the electronic age, and under certain circumstances officials of the government are pass to do so. This creates a dilemma because it is very difficult to judge what constitutes essential intrusions into privacy.There are several(prenominal) social and ethical issues that arise as a result of increasing use of Information systems. The ethical issues broadly cover areas such as Information rights and obligations, property rights and obligations, and accountability. Cultural issues such as soaking up of technologies and development of trust, security issues that concern misuse or th eft of information, and fraud, are some of the other

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.