Challenges and Biblical Principles in Managing Information Assignment
Module 2: Week 2—Challenges and Biblical Principles in Management Information
Good Monday morning to all. I trust your learning this past week was of value to you. This week’s topics are critical to your wise, ethical, and secure use of technology and information.
Suggestion—please review the Assignment resources listed below and include in those in your paper in some way. But I would focus more on timely news reports on uses and misuses of IT. I have provided some of those below….feel free to use those and add others.
Learning Outcomes
Upon successful completion of this module, you will be able to:
· Identify the major legal and ethical challenges and risks related to the use and abuse of corporate, personal, or private information.
· Describe the technology-related, cybersecurity risks and how those can be reduced.
· Articulate Biblical principles that inform how we should use information.
Please review the Module assignment instructions, resources, and scoring rubric carefully.
Here are some coaching suggestions to help shape your learning and paper.
Module 2: Week 2—Challenges and Biblical Principles In Managing Information
This is a very important topic—so much so that we positioned it early in the course. IT and IM must be grounded in Biblical principles to guide us in ethical and wise uses. As mentioned above, technologies and information have equal potential for evil uses as benevolent ones. Wise public administrators need to know those risks—which are constantly changing and escalating—and constantly be vigilant to prevent misuse of information by themselves, organizations, or external forces. We also know that information is a major source of power in organizations and can be used for good (or not for good).
Cybersecurity and several other IT challenges and risks have increased significantly due to work-from-home, go-to-school from home, and other uses and locations. I encourage you to search recent news reports–and include in your paper—the changes and challenges of the cyber world—cyber warfare, bullying, trafficking, cyber terror…..
For example, I have worked with many K-12 and Higher Education CIOs. They describe how virtual learning has required major changes in both device security and network security—from ‘clicks in bricks’ (accessing the school’s secure network from within the school on school-approved devices) to ‘clicks outside bricks’ (accessing unsecured or ‘secured, private networks’ from any device and location).
Watch the news on ways cybersecurity threats and now even cyberwarfare are impacting all our lives. We are seeing cyberwarfare every day: Russia-Ukraine, what China has done and is doing to Taiwan, etc. And recent news reports are highlighting benevolent and malevolent uses of Artificial Intelligence—so much to that national political and technologies are demanding actions to prevent abuses. Do you think they can keep up with the development and growth of AI??
In this module, you will learn:
1. Major cybersecurity and ethical challenges as well as the ever present risks of how personal or private information can be misused and abused.
2. Biblical principles that inform how we should use information.
Learn:
· Read:
· Valacich: Chapter 10 Securing Information Systems
· In addition, please review the Ethics in IS discussion in Valacich starting in Chapter 1, page 31.
· We need to understand the cybersecurity, cyberterrorism, cyberwar, etc.
· And how to minimize those—personally as well as at work.
· And ethical and unethical uses of IT and IM.
· Watch:
Technology and the Biblical Story
Some persons have had difficulties access the Technology and Biblical Story video. My apologies. Here is another link to access it.
https://canvas.liberty.edu/courses/201093/pages/watch-technology-and-the-biblical-story?module_item_id=25235249
The Module 2 deliverable is a research paper utilizing 8-10 resources, inclusive of the 2 Reads and 1 Watch assigned resources above.
These additional resources and any others in the current news will be helpful in your work and family life—be certain to review them:
· Here is an article on the Cyber threats predicted for 2023—look for newer sources to see what has changed.
https://www.foxnews.com/us/top-five-cybercrimes-watch-out-for-2023Links to an external site.
· Look up the ransomware attack on the Colonial oil pipeline and its far-reaching impact on millions of lives. Done by Russia. There have been several other threats and attacks on our utility (SCADA) infrastructures. What do you think?
· Here is another ransomware attack on higher education.
https://www.zdnet.com/article/university-of-california-sf-pays-ransomware-hackers-1-14-million-to-salvage-research/ (Links to an external site.)
· Anatomy of Cyber Attack—two ways to access it.
https://www.youtube.com/watch?v=668mc-_kJBM&ab_channel=JimStackhouse(Links to an external site.)
https://www.youtube.com/watch?v=yVZ8uga_1uU&ab_channel=NetworkSolutions%2CInc.NetworkSolutions%2CInc (Links to an external site.)
· Ransomware explained
https://www.youtube.com/watch?v=Vkjekr6jacg&ab_channel=Kaspersky(Links to an external site.)
· Schools hacked
https://www.freep.com/story/news/education/2020/10/12/hackers-targeting-local-school-districts-walled-lake/5965647002/ (Links to an external site.)
· Social Engineering data breaches
https://www.idtheftcenter.org/how-identity-thieves-use-social-engineering/ (Links to an external site.)
· DDOS is another threat
https://www.csoonline.com/article/3222095/ddos-explained-how-denial-of-service-attacks-are-evolving.html (Links to an external site.)
· And so is Spear Phishing. You and your children are vulnerable to this as well.
https://www.trendmicro.com/vinfo/us/security/definition/spear-phishing (Links to an external site.)
· Employee engagement is, in my opinion, critical to ethical actions. Please check out the latest Gallup survey on employee engagement. Do you think actively disengaged employees pose an additional risk to uses of IT and IM? Research social loafing.
https://www.gallup.com/workplace/352949/employee-engagement-holds-steady-first-half-2021.aspx (Links to an external site.)
· Here are some additional news reports that provide some context on cyber warfare and risks to our SCADA systems. Be thinking about the implications for our lives. You will need to copy and paste into your browser. If blocked because you don’t subscribe to these newspapers do a search on the topic for other sources.
https://www.nytimes.com/2021/11/27/world/middleeast/iran-israel-cyber-hack.html
https://www.latimes.com/world-nation/story/2021-12-23/iran-israel-hacking-heightens-fears-cyberwar
Overview
Technology brings significant risks and challenges along with its benefits. Wise public administrators need to know about those risks and constantly be vigilant to prevent misuse of information by themselves, their organizations, or external forces.
Instructions
This paper focuses on the stakeholders in public sector information management—who are they, what are their roles and impacts, and why is each important to me as a public servant or citizen?
It consists of 3 parts (below) plus an introduction and references sections. To make it easier for readers to follow your thinking, please discuss the topics in the order presented below, with appropriate heading.
· 8 – 10 pages of content, double-spaced
· Current APA format
· Must include citations from all readings, videos, and presentations for the assigned Module: Week plus additional, relevant scholarly articles (published within the last five years) you select—for a total of 12 – 15 sources.
Research Paper: Challenges and Biblical Principles in Managing Information
Apply: Research Paper: Challenges and Biblical Principles in Managing Information
Please organize your content around and use these headings.
Introduction: briefly engage readers and tell them what the paper is about. FYI, no need to do both an abstract and an introduction. A brief introduction telling readers what is in the paper will work well.
Part 1: Ethical/Legal Issues and Challenges:
· From your perspective what are the major ethical and legal challenges and risks for abuse that we must keep top of mind in the collection, management, and use of information and technologies overall—and in the public arena specifically?
· Suggest guidelines to help prevent unethical uses of data in general and especially in the public sector.
Part 2: Technology-related Threats and Challenges, e.g., Cybersecurity:
· Briefly describe the major technology-related threats, risks, and challenges to protecting data. What are the major threats and risks? Several are listed above. The “dark web” is big business—it is actually a business. Learn as much as you can about it.
· The “dark web” is big business.
· What is the “dark web”?
· What threats does it pose to your personal/family use and/or your organization’s use of technology and information?
· How do we minimize the risks you discussed above? E.g., what are some best/next cybersecurity practices for protecting information and technology assets? If you recommend more training do you think ‘sit and git’ training works? How should training be developed and delivered so genuine learning and application will occur? How are you helping your family and colleagues minimize risks and threats?
Part 3: Biblical Principles:
· Which Biblical principles can help inform and shape your collection, management, and ethical use of information and technologies?
· Make this knowledge personal and actionable–how will you and how will you help those around you:
· Prevent the misuse or abuse of information and
· Wisely use information and technology for the benefits of all?
Summary: what are the key takeaways of importance or value to you?
Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.