Preview

Societal Issues Related to the Software Industry

Good Essays
Open Document
Open Document
500 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Societal Issues Related to the Software Industry
Societal Issues Related to the Software Industry

The software industry contributes to the world’s information driven society. The sharing of information worldwide created a need for security in software and technology to protect businesses and customers. Every time a company conducts business with another business or customer and information is shared or traded, it is assumed information is kept private. It is the ethical responsibility of a company to ensure the security of personal information, just as it is ethical for an employee to protect the trade secrets of their employer. Society has come to expect certain protection and securities in software. The control of personal information is of great importance not only for businesses but also for consumers who employ the same software at home. When software first made an appearance in the 1950’s, internet was not of the global use seen today (Kubie, 1994). The rise of internet changed how the world communicated and how companies did business. Companies find that monitoring employee’ computers, external, and internal traffic necessary to ensure a secure network. Intrusions through the internet affect software and when a business grows more computers and software is deployed for use. The software industry because of the demand for security is continuously updating program codes through patches, while also seeing opportunity and creating a secondary industry for the monitoring of software through networks and creation of security software. Businesses have also added to the organizational structure Information Technology (IT) managers and departments for the handling of internal and external software, hardware, and network business needs. IT managers and department heads form policies and contingency plans to handle and instruct employees on proper usage of software in a business. According to the Pew Research Center, more than 50% of employees surf the internet for personal usage at work (Pew,



References: Kubie, Elmer C. (1994). "Recollections of the first software company". Annals of the History of Computing (IEEE Computer Society) 16 (2): pp. 65–71. Research Center. (2008, April 1). Pew Research Center 's Internet & American Life Project . Networked Workers. Retrieved August 12, 2010, from http://www.pewinternet.org/Reports/2008/Networked-Workers.aspx?r=1

You May Also Find These Documents Helpful

  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Corporation Tech will face many security risks with their current network. The user domain is the single most vulnerable part of any network and as such poses the most obvious security risk. To mitigate risks involving the users is to implement policies and training to educate the user on proper use and security best practices. By educating the user on security practices such as secure passwords, safe web surfing, and securing their workstations, many potential attacks can be avoided. Policies and training are also necessary because they can be used as evidence when taking administrative action against a user or intruder in the event the system or data information is compromised.…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 697 Words
    • 3 Pages

    Some employees are using the company networks to access the Internet. Some expect the company to provide this type of access. This presents a number of challenges to company network management. Identify three challenges and suggest strategies for a company to address these challenges.…

    • 697 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4

    • 1878 Words
    • 8 Pages

    Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them.…

    • 1878 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    As mentioned in our text, there are two ways to address security issues. First, the technical approach in which computer software and monitoring is used to monitor and control websites being visited or information being copied. Second, the communication methods and partnership and control by the Human Resources department. Because not all possible risks could be addressed by the use of technology there is also a great need to control the flow of information and proprietary technology by implementing policy. A bank for example could implement a security access policy following a “need to know” plan where only if necessary an employee could have access to data or information. The bank could also create an expectation of zero privacy where all files or devices on a company network whether owned or provided by the employee are subject to scanning or monitoring, and finally the automatic acceptance that devices such as peripheral blockers may be in place in order to avoid data extraction or movement. In regards to a new employee versus an employee who has given notice, a new employee could have restricted access that is only opened slowly as they acquire responsibilities and an employee leaving the firm depending on his level of access, the firm may opt to take his termination effective immediately.…

    • 592 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Security is a business issue because companies have very valuable information assets to protect. Business must protect not only their own information assets but also those of customers, employees, and business partners. Failure to do so may open the firm to costly litigation for data exposure or theft. Systems often hold confidential information about customers information( social security, date of birth, credit card information, taxes), corporate operations, new product development plans, marketing strategies. These information assets have tremendous value for the companies and can be devastating if they are lost, destroyed, disturbed or placed in wrong hands.…

    • 280 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    As a multinational organization, Briargrove has an extensive computer system network. However, due to too many locations globally, Briargrove only thought of data back-ups and lab test network without implementing administrator accesses or an information Technology (IT) policy and procedure. Because they failed to implement Information Systems (IT) administrative controls, many of the management personnel downloaded unknown software and has caused a complete system failure, affecting negatively the entire organization’s network. Following their…

    • 1283 Words
    • 6 Pages
    Better Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    Mba 590 Final Assignment

    • 8802 Words
    • 36 Pages

    the world (after Microsoft and Oracle). The company had expanded beyond mainframe utilities into PC software,…

    • 8802 Words
    • 36 Pages
    Powerful Essays
  • Better Essays

    Lack of user awareness - solution - conduct security awareness training, display security awareness posters, insert reminders in banner greeting, and send email reminders to employees. Security policy violation- solution - place employee on probation, review AUP and employee Manuel, discuss during performance review. Employee blackmail or extortion- solution - track and monitor abnormal employee behavior and use of IT infrastructure during off hours. Alarms and alerts programmed within an IDS/IPS help identify abnormal traffic and can block IP traffic as per policy definition.…

    • 686 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    References: Bott, F. (2005), Professional Issues in Information Technology, The British Computer Society, Wiltshire. Data Protection (n.d.), http://www.bcu.ac.uk/health/research/ethics-and-indemnity/ethicsapplications/data-protection. Accessed: 05/01/2013. Lee, M. (2012), ‘Professional Computing module’, http://www.cs.bham.ac.uk/ mgl/profcomp/lectures/. Filetype: Pdf, Accessed: 02/01/2013.…

    • 434 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The boundaries of technology are limitless as it is constantly conforming to the demands of the company. Businesses can communicate with employees, business partners, and more importantly, the customer in real time. The majority of businesses rely on technology as an essential tool to maximize daily functions. We have concluded that it is imperative for companies to research their business by monitoring processes, collecting data, evaluating the data and reviewing every process to ensure that the company can operate at full capacity. The usefulness of technology in the workplace outweighs the…

    • 906 Words
    • 4 Pages
    Better Essays
  • Best Essays

    White Paper

    • 1119 Words
    • 5 Pages

    All small private businesses have confidential information about their customers, employees, researches, products and financial status. This confidential information is now collected, processed and saved on computers and by the help of efficient networks they are transmitted to other computers. Following problems that may be faced by those business companies which do not make efforts to secure their data and information:…

    • 1119 Words
    • 5 Pages
    Best Essays
  • Good Essays

    With the various customization of web applications, security is gradually improving, many project managers, implementation partners, and IT developers are still unaware of vulnerabilities that can expose sensitive and institutional data, data loss, or poor data quality. Combining security with the Software Development Life Cycle sometimes requires additional practical training, an overview of existing practices, and might require a transformational change. An organization-wide focus, where every employee/contractor participating in a software development needs to put in a collective effort and moral responsibility to deploy the code and securing web…

    • 787 Words
    • 4 Pages
    Good Essays