Thursday, October 17, 2019
How to stop data warehousing and mining before they become more Essay - 1
How to stop data warehousing and mining before they become more trouble than they are worth - Essay Example y service, promote efficient business operations and maintain the organizational productivity, avoiding disclosure of sensitive information and fraud and complying with the legislation. It is essential that the organizations understood the major principles of secure information systems implementation. Jeff Angus (2005) clearly demonstrates that the wrong and excessive security practices do nothing but harm the work, causing losses of money, time, and human labor, without providing the security the organization wanted to reach. He explains that very often the complexity of the initiatives overcomes the efforts, while there comes a moment when people and systems simply cannot cope with it, weakening the stability of system and protection. Angus points to the major error that can be committed by an organization concerned with its security: its concentration on ââ¬Å"what might go wrongâ⬠instead of on ââ¬Å"how to cope with the inevitable changes to their operations and business modelâ⬠. While the organization spends money, energy and time overhead, it can be undercut by the changes in the market, so that it may lack the resources as a result. Mark Miller (2005) tries to highlight the reasons of the erroneous practices taking place. To his mind, the major problem is that computer security field is building ââ¬Å"perpetual motion machinesâ⬠, without distinguishing possible and impossible goals. Permanent frustration caused by such practices leads to the perception that ââ¬Å"true computer security is impossibleâ⬠, the breeches in protection are inevitable. This, Miller warns, may result in decrease of demand for the security information systems. First of all, Miller explains, it is necessary to understand that the security issue in the pattern of commerce cooperation is ââ¬Å"how to safely obtain the benefits of interacting with the entities you do not trustâ⬠. It is also important to realize which of numerous and various models fits the best for achieving the purposes of the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.