Friday, February 14, 2020
Blakley and Johnson Revised Essay Example | Topics and Well Written Essays - 1500 words
Blakley and Johnson Revised - Essay Example It can be justifiably asserted therefore that a combination of digital technologies and internet usage enables millions of people in the world rapid access of various information than any historical library, allowing people to be an innovative and creators in their own perspective. The collaborative and shared platform brought about by digitization elicits different reactions. On one hand, proponents of the idea strongly suggest that it has transformed how people share and create information, creating a platform for product innovation and how people ââ¬Å"ownâ⬠and ââ¬Å"copyâ⬠information. On the other hand however, Governments and technological companies view low restrictions placed on IP as a potential threat to cloud computing and mobile technologies. Blakleyââ¬â¢s model of open copyrights provides enlightening information on IP rights from a business perspective. Her elaborate ideas of the phases of technology in determining the information to be copyright protect ed and subsequent elements in ownership from a fashion industry offers additional insights into technological innovations and the kind of ownership required in a digitized economy. (Blakely) At the same time, Johnson Stevenââ¬â¢s ââ¬Å"Where Good Ideas come fromâ⬠examines the origin of innovative ideas from a historical perspective. In his analysis of the origin of great innovative ideas, Stephen starts his journey from Londonââ¬â¢s Coffee House ââ¬Å"Liquid Networksâ⬠through Darwinian slow ideas of the revolution towards todayââ¬â¢s highly technological creations brought about by the internet and the world wide web. (Johnson) The concept of ownership infers having control over any form of a thing, or an idea. Sharing on the other hand implies that other persons have access to the idea or object, and can even incorporate new ideas into the existing idea to come up with a modified version. Usually, the association between ownership and balancing is often achiev ed when a person has the ability to appreciate an object or an idea without having to ask who controls the idea or object. It therefore implies that both parties derive benefits from the shared item and non existence of role confusion while enjoying that idea or creation. The balance and concept of ownership are often easily understood when referring to tangible assets like objects and things as opposed to intangible issues like ideas. There exist various issues surrounding the sharing of information and innovation and pragmatic issues of copyrights. In essence, proponents of the open creation or low IP suggests that the success of an innovation depends whether an innovation is shared by the creator, and the achievement of equilibrium is largely dependent on voluntary sharing by the owner of the idea. While supporting this theory, Johana Blakely offers insightful information into the sharing of ownership ideas. She relates the success stories from the fashion industry where the sect or has recorded tremendous gains from sharing of fashion ideas. She further argues that the sharing platform as witnessed in the fashion industry enables all fashion designers to share and enable them to incorporate other peopleââ¬â¢s ideas into their creations. The fashion industry does not have any copyright law for these ideas. The success in this approach presents high gross sales in sectors that have low IP protection as
Sunday, February 2, 2020
Security Risk Assessment and Audit into the connection of the internal Essay
Security Risk Assessment and Audit into the connection of the internal network with the Internet - Essay Example Information confidentiality is maintained by preventing unauthorized persons from accessing vital system information. Integrity handles an aspect that prevents that information from being manipulated by other external sources. Data should also be available for use when required by the relevant parties and not hoarded by other system resources. It is thus fundamental to protect these aspects of data in order to ensure that information within an organization is secure. In order to ensure appropriate security management of information within an organization, it is vital that the mission statement and the charter be defined for reference. The mission statement outlines the overall goals that the information security program within the organization seeks to achieve and provides guidelines necessary for strategic direction. The charter, on the other hand, avails provisions for the specific rights and privileges granted to the security team members from the organization. 1.2 Justification f or use of a security metrics program A security management program cannot be complete without the use of security metrics (Dexter, 2002). These are used to show the changing maturity of an information security program over time. The combination of metrics and reporting tools can be used to display the results and outcomes of past investments in information security and guide decisions for future information systems. 2.0 IT Security Management It security risk management is considered a series of steps that are undertaken to ensure the safety of information within an organization. It is a continuous process that begins from the process of assessment right down to implementation. And even after implementation, the process loops back to assessment because risks to information networks are diverse and constantly change necessitating the iterative process (Sennewald, 2011). This process is detailed below: Figure 1: An iterative process to IT security Management Risk assessment is the ini tial step that involves the identification of potential threats to the information networks ((Boyce & Jennings, 2002). Based on the results of this assessment, an appropriate policy is developed to maintain a secure protection framework. This includes the development of security guidelines, assigning security responsibilities to members of staff and implementing total technical security protections. Once this has been achieved, a series of compliance reviews and re-assessment activities are conducted to provide assurance that the security controls have been properly implemented. This information is collected through a process of periodic audits on the system (Purser, 2004). 3.0 Differences between a Security Risk Assessment and Security Audit 3.1 Security Risk Assessment This is conducted at the beginning of the process of security management to identify areas of change. It is often referred to as the baseline study that will be used to depict the amount of change that the organizat ion has gone through since the last assessment (Snedaker & McCrie, 2011). It includes an analysis of all the assets and processes that relate to the system. It also identifies all the threats that could affect
Subscribe to:
Comments (Atom)