Contents
This article is based on the following requirement -
Description
Increasing computing power, storage, and networking capabilities provide easy ways for information access. The ease and anonymity with which information is now communicated, copied, and manipulated in online environments pose new challenges to the protection of privacy and intellectual property. The main ethical, social, and political issues raised by information systems centre around information rights and obligations, property rights and obligations, accountability and control, system quality, and quality of life.
In this context, you are required to select a topic of interest and conduct a detailed study and submit the research article consisting 2000 words in MOVE. Selection of a topic is restricted to six members which are on first come first serve basis. The link for selecting the topic will be available in MOVE. Students can also come up with their own topic related to their workplace environment which needs prior approval by the module lecturer.
List of Topics:
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
11.
Majan University College
Page 2 of 11
Impacts of identity theft
Effects of Government data leakage
Privacy concerns of medical data
Email fraud: types and impacts
Consequences of academic fraud
Copyright infringement issues
Software piracy in Oman: An analytical study
Profiling in social networking sites: impacts
Impacts of Hacking
Effects of unethical behavior:(creating and spreading virus, malware and spam
ware)
Ransomware and its impacts
Consumer privacy issues of RFID tracking
Mobile games: Business Value Vs Ethical Issues
Anonymous posting of comments in public websites
Social impacts of social media
Description
The increasing use of computers for carrying out different processes has led to growing threats in cybersecurity. Ransomware has become one of the fastest growing threats wherein the cybercriminals block access to the data or a system until a certain amount is paid by the user. It is carried out by encrypting files or folders and blocking system access to hard drive. Ransomware are categorized as locker ransomware, which prevents access to computer interface and the crypto ransomware encrypts files or data of the user (Axelson, 2017). In both the categories, the cybercriminal demands money from the user to provide access to system and/or files. Ransomware is widely spread across the globe including Oman. In Oman, the larger companies have adequate protection, but the smaller companies get infected by ransomware more easily as they lack infrastructure and use VPNs to access sites, which are blocked through which their systems and files get infected. Ransomware can be controlled and avoided by installing best security suite, backing up data and filtering the spams in the email.