Hire The Best Tutors at Expertsminds To Get Management Information System Assignment Help Service!!

Home   Course  
Previous << || >> Next

Management Information System Assignment -

Write an essay answering the questions - Some real world example of misuse and abuse of technology (Information Systems in particular).

EXPERTSMINDS.COM GIVES ACCOUNTABILITY OF YOUR TIME AND MONEY - AVAIL TOP RESULTS ORIGINATED MANAGEMENT INFORMATION SYSTEM ASSIGNMENT HELP SERVICES AT BEST RATES!

Introduction -

The use of technological support in the modern business arena comes with advantage increase the efficiency and timely management of projects. According to Liang et al. (2018), aspect of globalization proliferates mainly because of advancement in communication and ease of information sharing. The major advantage in this consideration is linked with the internet and associated tools. Matter of fact, this technological prospect enables sharing of information, exchange of data from a remote location, storage and retrieval, and time effective data management system. On the other hand, technological advancement also comes with tactics and usage which are unethical and can be referred to as abuse or misuse. The scope of the present report is this based on the consideration of real-world example technological abuse, risks the linking of usage within the UAE region.

Raised ethical issues in UAE

The ethical issues related to technology usage in UAE ensure that data processing and management are performed within the network of the authorized person, with appropriate concern. For example, reading any organization, the provision of using the computer, internet, associated electronic tools such as hard-drive, pen-drive, email system, and messengers, must adhere to the organizational objectives and practice scope. In other words, this indicates that the person using the technological tools must orient be objective that falls within the scope of assigned responsibilities. However, it also signifies that the exchange of information, handling management system, and retrieval of data must not create a threat with reference to the organizational positioning (Nair & Ibrahim, 2015). Similarly, within the context of the healthcare system and medium to large scale enterprises, it is essential that the patient or employer information must not be shared with the third-party agency, which can be used irrespective of the consent or for any other commercial purpose.

Other issues which are of high concern in UAE, include the accountability and transparency within the scope of the information management system. Particularly in areas of copyright, defamation, freedom of information, internet and online services, and privacy of information.

Privacy laws in UAE

Relevant legislation and Privacy Law in UAE can be classified into two categories, viz. (i) Onshore laws; and (ii) Free-zone specific laws. The data protection provision is mainly regularized by focused protection laws but is included in free-zone laws applicable in areas including Dubai Healthcare City, Dhabi Global Market, International Financial Center, and Mainland UAE (Sarabdeen & Moonesar, 2018).

ENROL WITH MANAGEMENT INFORMATION SYSTEM ASSIGNMENT HELP AND HOMEWORK WRITING SERVICES OF EXPERTSMINDS.COM AND GET BETTER RESULTS IN MANAGEMENT INFORMATION SYSTEM ASSIGNMENTS!

The legislation which addresses data protection provision in Dubai, is the law number 26, within regulating data Dissemination and Exchange Act of 2015. This law is applicable only to federal government entities, local government agencies, and person who is involved in the exchange of data within the province of Dubai, article 378 of federal law number 34, 2005 describes the penalties that are associated with violation of private life by recording or transmitting private communication (Rajan, Ravikumar & Al Shaer, 2017). Similarly, article 31 of UAE Constitution, 1971, General information within the scope of the right to privacy, in conjunction with communication activities. The cybercrime related issues were handled within Article 2, Federal law number 5, 2012, which prohibits the disclosure of publication, information exchange, and channelizing information through the network are electronic site. The telecommunication law in this consideration is also included reading the article, by the amendment in 2014 that addresses customer protection regulation and authorized the sharing of information. The privacy information of the patient, the health authority of Abu Dhabi has amended data standards and procedural law, 2014, which handles the confidentiality and authorized access to information (Sarabdeen & Moonesar, 2018).

UAE directive on data protection

In recent years, the authority of the UAE has paid Tension towards the overview of data protection rules and principles which include the obligation on the data controller, consent for authorized sharing, rights to assess for information, and related security issues. The amendment has been done in conjunction with cookies that are used for sharing of information through the website, how to party authorized transaction related to financial matters, data protection act across the province.

According to Wang & Jiang (2017), UAE has a recently amended revelation in conjunction with e-commerce as well as data protection act. The Commerce and transactional law number 16 of 2016, is mainly based on the UN model laws related to e-commerce and electronic signature. In this consideration, the government have implemented the regulations for proper documentation, the privacy of consumer information policy, regulatory authorities for confidentiality and privacy of beneficiary data, and general laws for the protection of intellectual property rights. The provision is also linked with maintaining the framework of financial reporting, authorized personnel appointed for reviewing these statements and enforce policies with all organizations of UAE to ensure solicited marketing communication and transparency in information for consumers.

Furthermore, the initiatives were also directed towards the use of computer network and cloud computing in the business sector. This includes data security act where the management policy and transaction of data between parties will be compliant and agreed to General regulations of UAE.

24/7 AVAILABILITY OF TRUSTED MANAGEMENT INFORMATION SYSTEM ASSIGNMENT WRITERS! ORDER ASSIGNMENTS FOR BETTER RESULTS!

Intellectual property law in UAE200

The official portal of the UAE government has declared that intellectual property rights (IPR) are one of the basic frameworks that strengthen the future of technological integration. As a matter of fact, UAE is a member and signatory part of TRIPS Agreement, 1996. In order to preserve the IPR issues, the legislation of UAE includes industrial design and patent law, number 44 of 1992, and trademark law number 37 of 1992, and copyright law 40 of 1992. This regulatory framework not only ensures the protection of technological advancement within the UAE but also ensures that expatriate investors and corporations can also a real benefit, by establishing their firms in the UAE.

Importantly, the World Trade Organization Also acts as a key player in the field of global governance that helps in regularizing medium and long-term planning in the business sector. As a result, UAE becomes a member of Bern Convention as well as a member of Gulf Cooperation Council, which ensures that the patent and intellectual property will be preserved and authorized person linked with the ideology, can maximize their benefits.

Examples of cyber attack

The above section describes the regulatory measures that are implemented in UAE, for the protection of information and authorized access of data. However, it is also noted that recent cases of cyber-attack in UAE-based firms have been increased since the last decade. According to the report of (Rajan et al., 2017), digital transformation has been a common approach in the majority of firms worldwide. The issues of a cyber-attack are more common in companies, where the employees and higher authorities are least concerned about data security issues. Plays that the firms in UAE must be entitled to a cybersecurity lifecycle that should include a multi-stage approach of planning, prevention, protection, and response to cyber-attack related issues. Furthermore, it is also important that employees, as well as managers, must be aware of security gaps, provisions, and safe usage of data management.

Example of recent cyber attacked can be found with respect to an Emirati government official that declares that intelligence group have targeted UAE and Lebanon's financial Ministry call Mom Middle East Airlines and a Sysco company in UAE. As a consequence, data loss accounts for more than $3 billion equivalence. Similarly, the Telecommunication Regulatory Authority have indicated that hacking groups were in the process to infiltrate and private agencies, which include more than 34 hack incidents on websites, since January 2018 (Kshetri, 2016).

Recommendation

Overall, it is learned that despite a strong regulatory framework, the incidence of hacking and cybercrime are common in UAE. These consequences resulting in loss of financial as well as private information. However, according to the report of Jaradt (2018), the scope of improving cyber provision and data protection act in UAE is it modifiable risk. Following are the recommendations, which have the opportunity to improve the cybersecurity and information management system in the UAE.

GET ASSURED A++ GRADE IN EACH MANAGEMENT INFORMATION SYSTEM ASSIGNMENT ORDER - ORDER FOR ORIGINALLY WRITTEN SOLUTIONS!

The models from the European Union and the UN must be adopted for Designing and amending the existing laws related to data protection. Models have been tested extensively and are proved to be beneficial for several decades, thus they could play an effective role in managing the data provisions.

The employees and managers of private and public firms must be provided with adequate Education and Training for data security provision. The beneficial aspect from these approaches will include improved policy measures, effective data sharing approach, and optimum awareness for data related risk.

Previous issues related to cyber-attack and hacking must be analyzed thoroughly. This information must be utilized in the future strategic framework for designing data protection provisions and regulations.

Conclusion

In summary, it is learned that the UAE has a strong regulatory framework in conjunction with the data security and protection of information. However, there have been issues related to cyber-attack and data hacking, which denotes misuse or inappropriate use of technology. In the present report, related laws and regulations that protect intellectual property rights, data management, and secured a transaction have been discussed. However, it is also noted that the future scope of related regulation must be tightened, such that strong protective framework can be implemented to prevent misuse and abuse of technology.

NO PLAGIARISM POLICY - ORDER NEW MANAGEMENT INFORMATION SYSTEM ASSIGNMENT &AMP; GET WELL WRITTEN SOLUTIONS DOCUMENTS WITH FREE TURNTIN REPORT!

Tag This :- EM19113SAL2004MIS Management Information System Assignment Help

get assignment Quote

Assignment Samples

    Criminology Assignment Help

    criminology assignment help - repressive practices of domination, inequality, and inhumanity found within the structure of power in society.

Get Academic Excellence with Best Skilled Tutor! Order Assignment Now! Submit Assignment