Sign In
Not register? Register Now!
Pages:
5 pages/β‰ˆ1375 words
Sources:
7 Sources
Style:
APA
Subject:
Technology
Type:
Case Study
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 30.38
Topic:

ITM517 MOD3: Polictics and Legislation, Development of Technology and Law

Case Study Instructions:

ITM 517_Module 3 - Case
Politics & Legislation 
Case Assignment
"History informs our future." Let us start by knowing the history. The last page of Appendix C shows a nice picture of the development of technology and law.
White House. (2009) Appendix C: Growth of Modern Communications Technology in the United States and Development of Supporting Legal and Regulatory Framework. Cyberspace Policy Review.
Next, read the following article which also contains a list of legislations and standards. Moreover, the article discusses why it is difficulty and ineffective to execute certain legislations.
Bono, S., Rubin, A., Stubblefield, A., & Green, Matthew. (2006) Security Through Legality. Communications of the ACM, Jun2006, Vol. 49 Issue 6, p41-43. 
An in-depth analysis of the difficulty in compliance can be found in the article below, where the author focuses on CAN-SPAM Act of 2003.
Grimes, G. A. (2003). Compliance With the CAN-SPAM Act of 2003. Communications of the ACM, Feb2007, Vol. 50 Issue 2, p56-62. 
The enforcement of a legislation and standard is also difficult. The following article uses the organizational context and emphasizes the need for development processes that facilitate enforcement.
Siponen, M. (2006). Information Security Standards Focus on the Existence of Process, Not Its Content. Communications of the ACM, Aug2006, Vol. 49 Issue 8, pp. 97-100. 
Security legislations are not only made for organizations but also for individuals. On a personal level, it is also difficult to fully understand the implications of a legislation and we often times ignore the details. Read the following article to understand what risks you will be exposed to if you don't understand fully about a legislation.
Desautels, E. Software License Agreements: Ignore at Your Own Risk. US-Cert. http://www(dot)us-cert(dot)gov/reading_room/EULA.pdf.
Now I hope you have grasped the major concepts and understood what I want to come across regarding security legislations after following the background information. As mentioned in this module's homepage, politics is naturally involved in making a legislation and in its enforcement, even when the word "politics" does show up.
After you have "strategically" read the above materials, and, more importantly, thought about them critically and interconnectively, please compose a 4- to 6-page paper on the topic:
Why is it difficult to make security legislations and standards? And what factors need to be considered when making and enforcing security rules and regulations?
You may think that you are not a lawmaker, hence you don't need to know how to make a legislation. But as a future security officer in the company, you have to come up with a list of rules and regulations that the organization's employees should follow. You will also be responsible for following and enforcing existing legal requirements. Look at the various laws across countries as you weave the international issues into your discussion.
In preparing your paper, you need to discuss the following issues, and support with arguments and evidences:
• What are the major legislations and standards in information security?
• Are these legislations and standards serving their purposes?
• How to enforce these legislations and standards? Is it easy? Why?
• How to make security rules and regulations? Who are involved? What factors need to be considered?
Assignment Expectations
Length: Minimum 4–6 pages excluding cover page and references (since a page is about 300 words, this is approximately 1,200–1,800 words).
Assignment-driven criteria (25 points): Demonstrates clear understanding of the subject and addresses all key elements of the assignment.
Critical thinking (10 points): Demonstrates mastery conceptualizing the problem. Shows analysis, synthesis, and evaluation of required material.
Scholarly writing (5 points): Demonstrates writing proficiency at the academic level of the course; addresses the Learning Outcomes of the assignment.
Quality of references (4 points) and assignment organization (3 points): Uses relevant and credible sources to support assertions. Assignment is well organized and follows the structure of a well-written paper.
Citing sources (3 points): Uses in-text citations and properly formats references in APA style.
• Please use original writing (No Plagerism)
• Please use American URLs than can be easily verified on the web on the reference page.
• Please include the page numbers in the references
• Read then background material in the attachment titled Background
• Include a table to give a comparison to the different Frameworks

Case Study Sample Content Preview:

Politics and Legislation
Name
Institution
Politics and Legislation
Development of Technology and Law
Cyberspace is the latest platform that has provided innovation touching everything and everyone. Cyberspace platform has further improved general welfare of people globally. Technology keeps on transforming the global economy connecting people and markets in unimaginable ways. The broader coverage of technology has resulted to lightly regulated digital infrastructures, posing greater risks to individuals and also threatening nations. The architectures of digital infrastructures argue that the internet is no longer secure meaning that threats like cyber-crimes, state-sponsored intrusions, and operations have lead to severe loss of intellectual property and other sensitive military information (White House, 2009, 7). They are some of the issues undermining the confidence citizens have on the information systems.
To counter such threats in the U.S, the president ordered a clean slate review aiming at assessing US policies and structures for cyber security. The review focuses on strategies, standards, and policy on operations of cyberspace to reduce cyber threats. For the U.S to realize the full benefits of digital technology uses, the country needs to build confidence among its citizens by assuring them that sensitive information will be safe, and infrastructure will not be infiltrated. A report after the assessment states that the U.S has failed to protect cyberspace, making cyberspace the most urgent national security threat of the twenty first century that the Obama administration has to overcome. The process requires a bigger vision and good leadership that needs drastic changes in policies, education, technologies, and change in laws (White House, 2009, 9).
If quick action is not taken, the U.S stands to lose economic competitiveness and military technological advantage because of the growing levels of connectivity between information systems, the internet, and other infrastructures. Such infrastructures are the avenues that provide opportunities for cyber space attackers to disrupt various sectors like communication, energy pipelines, financial networks, and electric power among others (White House, 2009, 11).
Why It Is Difficult To Make Security Legislations and Standards
With advanced technology, criminal activities have become more sophisticated and uncontrollable affecting the US competitiveness. Criminal activities have degraded privacy and civil liberties causing mistrust among citizens towards the national security systems. The government has promised to revolutionalize technology guaranteeing heightened security. To increasing protection, the government introduced various legislations especially after the terrorist attack of September 11, 2001. One of the recent legislation that have been introduced including Uniting by Providing Appropriate Tools Required to Intercept and Obstruct terrorist Act commonly known as the USA Patriotic Act and the foreign intelligence surveillance Act (FISA) (Bono, Rubin, Stubblefield & Green, 2006, 73 ).
The introduction of these laws is an example of some of the efforts that have opened up effective collaboration with private commercial enterprises. Such effor...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Case Study Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!