SlideShare a Scribd company logo
1 of 3
Cheap Assignment Help UK Page 2
Anuj Mathur a 35 year male is an immigrant from India who is residing in Sydney, Australia
since last 7 years. He came to Australia for his post graduation in business management and
after completion of his course he joined a brokerage firm and become a resident of the country.
Eventually he got married and now he is one the verge of become a citizen of Australia. He and
his wife are law abiding residents and they applied for their resident status and citizenship duly
when they cleared the criteria for the same and they were expecting to get citizenship in a
period of 6 months. It was very important for them to be a citizen so that they can enhance their
family, they will have stability in job and both of them would be able to switch to other jobs
easily.
One month after his application of citizenship he received a call from a investigation agency
officer who told him that he is handling his case and he is verifying all the details. He provided a
snapshot of all personal, family, financial and educational history of Anuj Mathur and also
informed him about some areas of concern. He indirectly hinted to Anuj that his application
might get rejected if he does not do something about some missing information or come up with
a workable solution. After 2-3 calls in consecutive days he finally offered to provide a clear
verification for a fee of 5000 AUD. Anuj being an educated and law abiding resident realized
that something is fishy and he started asking questions regarding his department and his formal
rank. He also done some background check on the process of verification for citizenship and
realized that no verification officer is allowed to contact with the subject in any way. As soon as
Anuj started asking questions and inquiring about him, he initially tried to threaten and then
stopped calling. On further research Anuj realized that it was just a phishing call from fraudsters
who gain all the information about a applicant either by hacking or gaining data access and then
try to fleece them out of money.If we look at the entire incident it can be said that the problem
arise because data of Anuj was leaked into wrong and this data was the base on which
fraudster created the entire story. They target only those people who are in a vulnerable position
and try to threaten them into giving money and sometimes people who are not fully aware fall
into these traps and become victim of data theft.
RECOMMENDATIONS
In government organization an enterprise wide solution to the problem is required. Filters and
gauntlets can stop this as well and a V2F system can also be added in the Enterprise wide
solution providing computer systems. U2F or universal second factor is also integrated with the
Browser and keys which are generated by U2F are appearing to be much stronger against
spam and phishing which is sometimes generated by the Big Data service providers only to
confuse and misguide the Enterprise and charge them without giving an actual and tangible
service (Liftman, 2004).Training and development of the employees is off course and obvious
part of all strategies of the company in implementing information governance. This training
program should also cover the importance of keeping the communication two way and reaching
out to each employee explaining the need of information governance system and its benefit for
the company. Information governance system and data management plan should be made
mandatory for all the government organizations irrespective of their interaction with people on a
day to day basis. Information governance can be explained as the set of policies and measures
Cheap Assignment Help UK Page 3
which are employed by a corporate entity or a organization to ensure that information is well
managed and processed at an enterprise level before being used for decision making process.
Information governance does not just mean data management; it includes data protection, risk
management, information security, information recovery, business intelligence and Big Data
(Freeman and Peace, 2004).
CONCLUSION
In conclusion it can be said that IT is an emerging technology and its users are growingly rapidly
all over world. Since it is still an emerging technology, its rules and regulations are in a formative
stage and many users are not fully aware of the ethical, moral and legal implications while using
IT. In IT services a lot of personal information and data is managed from one source to another
and there is a possibility that someone might misuse that information or leak it unknowingly.
REFERENCES
Schultz, R. A. (2010). Information technology and the ethics of globalization: transnational
issues and implications. Hershey, PA : Information Science Reference.
Delone, W.H., & McLean, E.R.(2003), The DeLone and McLean Model of Information Systems
Success: A Ten-Year Update, Journal of Management Information Systems, vol.19, no.4, pp.9-
30
Freeman, L and; Peace, G (2004). Information Ethics: Privacy and Intellectual Property. Hersey,
Pennsylvania: Information Science Publishing. ISBN 1-59140-491-6.
Kantor, M.; James H. B. (1996), “Electronic Data Interchange (EDI)” National Institute of
Standards and Technology p. 79-86
Liftman, J.N.(2004), Managing the Information Technology Resource: Leadership in the
Information Age, Stevens Institute of Technology; Publisher: Prentice Hall;
Westfall, J. (2010), “Privacy: Electronic Information and the Individual.” Santa Clara University
Markkula Center for Applied Ethics, 2010

More Related Content

Recently uploaded

Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 

Recently uploaded (20)

FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 

Featured

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

Government organization

  • 1.
  • 2. Cheap Assignment Help UK Page 2 Anuj Mathur a 35 year male is an immigrant from India who is residing in Sydney, Australia since last 7 years. He came to Australia for his post graduation in business management and after completion of his course he joined a brokerage firm and become a resident of the country. Eventually he got married and now he is one the verge of become a citizen of Australia. He and his wife are law abiding residents and they applied for their resident status and citizenship duly when they cleared the criteria for the same and they were expecting to get citizenship in a period of 6 months. It was very important for them to be a citizen so that they can enhance their family, they will have stability in job and both of them would be able to switch to other jobs easily. One month after his application of citizenship he received a call from a investigation agency officer who told him that he is handling his case and he is verifying all the details. He provided a snapshot of all personal, family, financial and educational history of Anuj Mathur and also informed him about some areas of concern. He indirectly hinted to Anuj that his application might get rejected if he does not do something about some missing information or come up with a workable solution. After 2-3 calls in consecutive days he finally offered to provide a clear verification for a fee of 5000 AUD. Anuj being an educated and law abiding resident realized that something is fishy and he started asking questions regarding his department and his formal rank. He also done some background check on the process of verification for citizenship and realized that no verification officer is allowed to contact with the subject in any way. As soon as Anuj started asking questions and inquiring about him, he initially tried to threaten and then stopped calling. On further research Anuj realized that it was just a phishing call from fraudsters who gain all the information about a applicant either by hacking or gaining data access and then try to fleece them out of money.If we look at the entire incident it can be said that the problem arise because data of Anuj was leaked into wrong and this data was the base on which fraudster created the entire story. They target only those people who are in a vulnerable position and try to threaten them into giving money and sometimes people who are not fully aware fall into these traps and become victim of data theft. RECOMMENDATIONS In government organization an enterprise wide solution to the problem is required. Filters and gauntlets can stop this as well and a V2F system can also be added in the Enterprise wide solution providing computer systems. U2F or universal second factor is also integrated with the Browser and keys which are generated by U2F are appearing to be much stronger against spam and phishing which is sometimes generated by the Big Data service providers only to confuse and misguide the Enterprise and charge them without giving an actual and tangible service (Liftman, 2004).Training and development of the employees is off course and obvious part of all strategies of the company in implementing information governance. This training program should also cover the importance of keeping the communication two way and reaching out to each employee explaining the need of information governance system and its benefit for the company. Information governance system and data management plan should be made mandatory for all the government organizations irrespective of their interaction with people on a day to day basis. Information governance can be explained as the set of policies and measures
  • 3. Cheap Assignment Help UK Page 3 which are employed by a corporate entity or a organization to ensure that information is well managed and processed at an enterprise level before being used for decision making process. Information governance does not just mean data management; it includes data protection, risk management, information security, information recovery, business intelligence and Big Data (Freeman and Peace, 2004). CONCLUSION In conclusion it can be said that IT is an emerging technology and its users are growingly rapidly all over world. Since it is still an emerging technology, its rules and regulations are in a formative stage and many users are not fully aware of the ethical, moral and legal implications while using IT. In IT services a lot of personal information and data is managed from one source to another and there is a possibility that someone might misuse that information or leak it unknowingly. REFERENCES Schultz, R. A. (2010). Information technology and the ethics of globalization: transnational issues and implications. Hershey, PA : Information Science Reference. Delone, W.H., & McLean, E.R.(2003), The DeLone and McLean Model of Information Systems Success: A Ten-Year Update, Journal of Management Information Systems, vol.19, no.4, pp.9- 30 Freeman, L and; Peace, G (2004). Information Ethics: Privacy and Intellectual Property. Hersey, Pennsylvania: Information Science Publishing. ISBN 1-59140-491-6. Kantor, M.; James H. B. (1996), “Electronic Data Interchange (EDI)” National Institute of Standards and Technology p. 79-86 Liftman, J.N.(2004), Managing the Information Technology Resource: Leadership in the Information Age, Stevens Institute of Technology; Publisher: Prentice Hall; Westfall, J. (2010), “Privacy: Electronic Information and the Individual.” Santa Clara University Markkula Center for Applied Ethics, 2010