How can information be misused




















Another negative effect is cell phones disconnect us from the social world. School districts have taken a stand with cell phones in the classroom.

Cell phones have enabled us to do various tasks all at the same time. If your car breaks down, you automatically call for help instead of having to walk to find a pay phone. Cell phones have certainly made our lives much more convenient. Cell phones have also changed the way that people interact with each other.

Studies show that people addicted to mobile phones often are linked to depression, anxiety, and other mental disorders. Most of the time people just check their phones for no good reason. Recent studies report two types of brain cancer may occur — glioma and acoustic neuroma. Apart from cancer risk, mobile phones influence our nervous system.

They may cause headaches, decreased attention, shortness of temper, sleep disorders and depression, mostly among teenagers. Begin typing your search term above and press enter to search. Press ESC to cancel. Skip to content Home Philosophy How personal information can be misused?

Ben Davis July 14, How personal information can be misused? What precautions should be taken to avoid its misuse? How do you stop Internet misuse? Which of the following are key controls to protect against the misuse of information? What is minor misuse of ICT? What is misuse and abuse of computer? What are the 3 principles of the Computer Misuse Act? Making insiders aware of these threats is an important part of mitigating the risk of insider misuse as we discuss later in the full study.

Admittedly, there is sometimes a fine line between malicious intent and mere misuse. For example, an employee downloading music or video files to a desktop computer would not usually be doing so with intent to harm the organization. But if the files being downloading are pirated, the employee is putting the organization at risk. Furthermore, if the employee is using a peer-to-peer file-sharing program to download music, his behavior could inadvertently give outsiders access to confidential files on the computer.

The employee may not intend to harm the organization, but his actions put the organization at risk. Nevertheless, we find it useful to separate threats from insider misuse from threats by insiders with malicious intent.

Furthermore, many of the countermeasures against insider misuse are also useful to counter malicious insiders. Before delving into our analysis of each threat, it is useful to examine them in total.

For this analysis, we look at all types of insider misuse and rank them according to the perceived seriousness of each threat. We recognize that the word seriousness has no formal definition in risk management. We believe the seriousness level provides a useful measure of the perceived importance of each threat, while being mindful that perception and reality are not always consistent. In assessing the seriousness of each category, we asked respondents to consider all forms of potential damage to the organization, such as effect on system availability or integrity, network performance, legal liability, disclosure of confidential information, loss of worker productivity, and damage to the organization's reputation.

In addition, we asked respondents to evaluate these threats without consideration of any countermeasures their organizations were taking to deter misuse. Productivity Loss Interestingly, the 14 categories of insider misuse fall into two distinct groups. The first group includes unauthorized copying of files to portable storage devices; downloading unauthorized software; use of unauthorized P2P file-sharing programs; remote access programs; rogue wireless access points; unauthorized modems; downloading of unauthorized media; and use of personal computing devices for business purposes.

What do these forms of misuse have in common? They all pose a threat primarily in terms of loss of information, security breaches, and legal liability. For example, unauthorized copying of files is a threat as it may lead to loss of confidential information.

An employee using his own laptop for business purposes may inadvertently take confidential information home at night or retain this information when he leaves the organization.

Some of them include planning for criminal activities, harassing people, accessing unauthorized databases and so much more. WikiAnswers will not provide information that can be misused for illegal purposes. Marketing information can be misused by your competitors, that's why very important. All knowledge can be misused. Hypnotism is misused in many ways, one way is by covertly "secretly" using hypnosis methods without the other person's awareness, the target will fall into trance but not be aware of it.

Things like sky boxes are misused by leaving it on standby. Only when they have a well being based upon a lie. Misused means something used incorrectly or someone treated unfairly. You can get personal credit scores online.

But you need to make sure that they are credible and not taking and using your personal information. Alchohol is misused because people drink to much of it and then they drink more and more and more. Numerical ways of expressing information are called statistics.

The ways the author gives information by adding captions under the picture. Alfred nobel invented dynamites which were misused by human beings in wars. Log in. See Answer. Best Answer. Study guides. More answers. Ways in which information is misused? Q: Ways in which information is misused?

Write your answer Related questions.



0コメント

  • 1000 / 1000