Wednesday, October 16, 2019

How to stop data warehousing and mining before they become more Essay - 1

How to stop data warehousing and mining before they become more trouble than they are worth - Essay Example y service, promote efficient business operations and maintain the organizational productivity, avoiding disclosure of sensitive information and fraud and complying with the legislation. It is essential that the organizations understood the major principles of secure information systems implementation. Jeff Angus (2005) clearly demonstrates that the wrong and excessive security practices do nothing but harm the work, causing losses of money, time, and human labor, without providing the security the organization wanted to reach. He explains that very often the complexity of the initiatives overcomes the efforts, while there comes a moment when people and systems simply cannot cope with it, weakening the stability of system and protection. Angus points to the major error that can be committed by an organization concerned with its security: its concentration on â€Å"what might go wrong† instead of on â€Å"how to cope with the inevitable changes to their operations and business model†. While the organization spends money, energy and time overhead, it can be undercut by the changes in the market, so that it may lack the resources as a result. Mark Miller (2005) tries to highlight the reasons of the erroneous practices taking place. To his mind, the major problem is that computer security field is building â€Å"perpetual motion machines†, without distinguishing possible and impossible goals. Permanent frustration caused by such practices leads to the perception that â€Å"true computer security is impossible†, the breeches in protection are inevitable. This, Miller warns, may result in decrease of demand for the security information systems. First of all, Miller explains, it is necessary to understand that the security issue in the pattern of commerce cooperation is â€Å"how to safely obtain the benefits of interacting with the entities you do not trust†. It is also important to realize which of numerous and various models fits the best for achieving the purposes of the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.