Research Paper: Protecting Personal Information

Pages: 9 (2593 words)  ·  Bibliography Sources: 14  ·  Level: College Senior  ·  Topic: Business  ·  Buy This Paper

SAMPLE EXCERPT:

[. . .] For instance, the storing of patient files should be done in a .pdf format because this type of presentation does not utilize the easily-penetrable JavaScript format (Smith, et al., 2010). Also, administrators should integrate software that prevents users from being redirected to new URL's that are not within the healthcare firm's stated domain (Smith, et al., 2010). Similarly to the aforeposed preventative mechanisms, the researchers at North Carolina State University recommend a multitude of security test programs to be implemented as soon as possible (Smith, et al., 2010). In an industry where people's lives are at stake, security should be of the utmost importance.

Furthermore, government documents are yet another source of vital information that has proven to be vulnerable to computerized attacks . With the highly publicized case involving Wikileaks, the gaping failure of government protection systems became apparent to the entire world . Therefore, in realizing the vast and potentially devastating consequences that can appear as a result of this kind of criminal activity, immediate corrective action is once again highly necessary. With reference to the aforeposed high profile Wikileaks case, this occurrence has shed lots of light upon the fact that the United States Government is not nearly as secure in its data protection systems as it claims to be. This fact becomes strikingly obvious when comparing the amounts of data leaked from homeland operations to that leaked from the smaller (yet presumably more vulnerable) satellite embassies around the world:

As exemplified above, what was previously thought to be one of the most secure government entities (The Office of the Secretary of State) is actually responsible for divulging the largest amounts of sensitive government information. This is often considered to be a result of the promulgation of insider identity theft within governments . With many competing interests working "cooperatively" within any given governmental organization, the possibility for the damaging or discrediting of others (including those in the general public) grows exponentially . This reality is compounded by the fact that almost all governmental employees only occupy their positions on a temporary basis. The fact that government officers are always coming and going makes any permanent corrective measures extremely difficult to truly enforce . Though most citizens can appreciate the need to protect sensitive government documents (especially in a nation at war), this issue presents quite the controversy. Continuing to use the Wikileaks situation as a template, the judge in this case initially ordered the site to be shut down, noting that he (as well as the United States Government) did not want sensitive military documents to fall into the hands of enemies or terrorist organizations . However, after this ruling was passed down many protestors began to conspire and claim that this ruling was unconstitutional, as it was in direct conflict with one's First Amendment rights concerning freedom of speech and freedom of the press . Accordingly, and after much deliberation, the judge reversed his ruling about a week later citing its unconstitutional nature . Therefore, while corrective action is certainly a tricky obstacle for a government to overcome, the only feasible solution seems to be the creation of a truly reliable data protection system; one that will protect against internal as well as external breaches . And while the precise intricacies of such a system will not likely be disclosed for obvious reasons, its general cornerstones should be clear. Knowing that government entities are typically separated geographically, infrastructurally and technically, an extremely comprehensive system is required . Such a system must target specific information as well as identify the specific channels through which such data is passed . Additionally, it is vital to construct reliable and exclusive lines of communication that can facilitate only the absolutely necessary and relevant data to any interested private sector stakeholders . By constructing a system that fits such parameters and creating a permanent government body to monitor systematic progress and effectiveness, governments will hopefully be able to significantly reduce the possibility of sensitive document leakage in the future.

Ultimately, the crime of identity theft and robbery of personal information is far-reaching and extremely hazardous. While the many affected industries must organize and come up with a way to fend of such unwanted intrusions, consumers must be equally diligent in protecting themselves from fiscal injury in online marketplaces. With industries like healthcare and military operations under fire, the life-threatening potential of this type of criminal activity can be exquisitely elucidated. Knowing the great potential for damage, such issues need to be prioritized and given immediate attention. If any nation wants to prosper in the future, it must first be able to protect its own citizens and its own assets (whether they are stored in a bank, a bunker, a house or a computer).

Bibliography

Allen, C., & Morris, C. (2007). Information Sharing Mechanisms to Improve Homeland Security. Retrieved March 28, 2011, from http://www.whitehouse.gov/omb/expectmore/issue_summary/issueDetailedPlan_24.pdf

Berghel, H. (2000). Identity Theft, Social Security Numbers, and the Web. Communications of the ACM, 43 (2).

Chou, N., Ledesma, R., Teraguchi, Y., & Mitchell, J.C. (2004). Client-Side Defense Against Web-Based Identity Theft. 11th Annual Network and Distributed System Security Symposium. San Diego, CA.

Jagatic, T.N., Johnson, N.A., & Jakobsson, M. (2007). Social Phishing. Communications of the ACM, 50 (10), 94-100.

Kurzweil, R. (2001, March). The Law of Accelerating Returns. Retrieved March 16, 2011, from http://www.kurzweilai.net/the-law-of-accelerating-returns

Linnhoff, S., & Langenderfer, J. (2004). Identity Theft Legislation: The Fair and Accurate Credit Transactions Act of 2003 and the Road Not Taken. Journal of Consumer Affairs, 38 (4), 204-216.

Mart, S.N. (2007). Documents, Leaks, and the Boundaries of Expression: Government Whistleblowing in an Over Classified Age. Documents to the People, 35 (2), 30-38.

Meier, D. (2008). Changing With the Times: How the Government Must Adapt to Prevent the Publication of Its Secrets. The University of Chicago Review of Litigation, 28 (203).

Mercuri, R.T. (2006). Scoping Identity Theft. Communications of the ACM, 49 (5).

Ritzer, G. (2005). Expressing America: A Critique of the Global Credit Card Society. Retrieved March 28, 2011, from https://www1067.ssldomain.com/afcpe/doc/Vol7B1.pdf

Scola, N. (2010, November). Clearing the Cache: Turning Cables into Charts. Retrieved March 28, 2011, from http://techpresident.com/blog-entry/clearing-cache-turning-cables-charts

Smith, B., Austin, A., Brown, M., King, J., Lankford, J., Meneely, A., et al. (2010). Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected. Retrieved March 28, 2011, from http://bensmith.zapto.org/papers/spimacs2010.pdf

Spitzner, L. (2003). Honeypots: Catching the Insider Threat. 19th Annual Computer Security Applications Conference. Las Vegas, NV.

Strobl, J., Cave, E., & Walley, T. (2000). Data Protection Legislation: Interpretation and Barriers to Research. Journal of… [END OF PREVIEW]

Four Different Ordering Options:

?
Which Option Should I Choose?

1.  Buy the full, 9-page paper:  $28.88

or

2.  Buy + remove from all search engines
(Google, Yahoo, Bing) for 30 days:  $38.88

or

3.  Access all 175,000+ papers:  $41.97/mo

(Already a member?  Click to download the paper!)

or

4.  Let us write a NEW paper for you!

Ask Us to Write a New Paper
Most popular!

Personal Security and the Internet Term Paper


Information Technology a Home Network Essay


Information Systems and Information Technology Essay


Information System on Ethical and Moral Issues Research Paper


How Social Norms Transforms as a Result of Information Age Research Paper


View 999 other related papers  >>

Cite This Research Paper:

APA Format

Protecting Personal Information.  (2011, March 28).  Retrieved May 19, 2019, from https://www.essaytown.com/subjects/paper/protecting-personal-information-considering/8031668

MLA Format

"Protecting Personal Information."  28 March 2011.  Web.  19 May 2019. <https://www.essaytown.com/subjects/paper/protecting-personal-information-considering/8031668>.

Chicago Format

"Protecting Personal Information."  Essaytown.com.  March 28, 2011.  Accessed May 19, 2019.
https://www.essaytown.com/subjects/paper/protecting-personal-information-considering/8031668.