Internet Explosion/Protecting Our Future.

Through these methods, end users are identified by. imaging, eye retina recognition and in most cases voice recognition as well as finger prints. This has not eliminated all security gaps though, as criminals have also been exposed to the ever growing technology. These gaps may include the replication of the finger prints as well as manually recording the voices of the legitimate users through devices like mobile phones.

For the image recognizing technologies, camcorders and digital cameras are used to breach the systems settings. Another gap is the duplication of the electronic cards through their magnetically enabled strips.

Don't use plagiarized sources. Get Your Custom Essay on
Internet Explosion/Protecting Our Future.
For as little as $15/Page
Order Essay

It is obvious that as technology advances so does the challenge of managing it. This may result to the braking of the professional ethics as one tries to manage emerging challenges. These challenges may include. Control, meaning to what degree do employees behavior is to be monitored, Ownership, what part of an information belongs to the firm and what is for the employees or what is expected by employer from their employees with regards to nondisclosure while working with other companies, Privacy, these may involve the efforts and expenses incurred by managers while questioning data access and privacy as well to what extent does the availability of information justifies its utilization, Accuracy, this heavily engages in the explicit part of a persons responsibility and the implications of possible errors that are anticipated and lastly, Security itself, that relies on the reviewing of security breach vulnerability and liability of exposure by the firm and its employees (Hongladarom & Ess, 2007).

National Research Council. (U.S.). Committee on Advances in Technology and the Prevention ofTheir Application to Next Generation Biowarfare Threats. (2005). An internationalperspective on advancing technologies and strategies for managing dual-use risks: reportof a workshop.

Order your essay today and save 50% with the discount code: MANGO

Order a unique copy of this paper

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
Top Academic Writers Ready to Help
with Your Research Proposal
Live Chat+1(978) 822-0999EmailWhatsApp

Order your essay today and save 25% with the discount code THANKYOU