Ethical awareness among the management personnel

This preview shows page 4 - 5 out of 5 pages.

ethical awareness among the management personnel. Discussion in part A2 was potential unethical uses of the company technology by the external parties. Two issues have drawn attention in the above discussion. One is supplier unethical breach of policies to the competitors and other is business parties’ unethical work. For the mitigation of both the unethical activities by the external parties, an updated policy should be formulated. Building long term relationship with the supplier should be one potential solution. If this can be maintained, suppliers will be satisfied and they will work for the best of the company. This policy is equally important to maintain a strong corporate relationship with the business partners and parties. Company should focus on the best interest of the business partner so that they can help the company keeping secret of the privacy of sensitive information of the company. 2. Explain how your changes would mitigate the security threats discussed in parts B1 and B2.
References: Abrams, M. D., Jajodia, S. G., & Podell, H. J. (1995). Information security: an integrated collection of essays . IEEE Computer Society Press.
Bertino, E., & Sandhu, R. (2005). Database security-concepts, approaches, and challenges. Dependable and Secure Computing, IEEE Transactions on , 2 (1), 2-19. Johnson, Erik J. "Method and system for maintaining a MAC address filtering table." U.S. Patent Application 10/185,064. Liu, Y. (2007). U.S. Patent No. 7,257,095 . Washington, DC: U.S. Patent and Trademark Office.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture