Stratified Custom Manufacturing

Submitted by: Submitted by

Views: 455

Words: 744

Pages: 3

Category: Other Topics

Date Submitted: 05/23/2013 09:47 AM

Report This Essay

1

The International landscape is comprised of two principal segments: nation-states and everyone else. Non-nation-state parties must obey the law of the land wherever they are, or they may be in violation of civil or criminal statutes. Sovereign nations or countries, operate with less restriction, establishing the rules by which they will govern themselves. (Whitman, 2005)

Differences in cultures, languages, currencies, customs, values, and legal systems, are all areas where problems and concerns regarding information security may arise. Concepts regarding computer crime, intellectual property, and ethical use of technology appear to vary widely across the world. In a culturally diverse world that has increasingly become smaller through technology, the potential for conflicts revolving around these areas has increased.

Ethics is one major issue. In the United States, most states have laws against software piracy and unauthorized system access. Similar laws exist in other countries as well. However, many users pay little or no attention to these laws. While it may cost millions of dollars to develop the initial copy of the software, it costs virtually nothing to produce a pirated copy. This is especially true for countries where the per capita income is low, and where the legitimate piece of software is prohibitive in local currency.

Another issue is cybercrime. As data flooding increases far faster than prevention technology develops, the whole industry faces information security challenges. Common issues include illegal access, illegal interception, data interference, system interference, the misuse of

devices, computer related forgery, computer-related fraud, offenses related to child pornography, and again issues related to copyright.

2

There are many security challenges presented when an organization has multiple directors leading information technology departments. Often times multiple directors do not understand that information security is in...