Research Paper On Information Security Management Systems

Click on any of the term papers to read a brief synopsis of the research paper. The essay synopsis includes the number of pages and sources cited in the paper.

  • IA AND IS IN A HEALTHCARE INFORMATION SYSTM

    This 7-page paper investigates the need for information assurance and information security in a healthcare organization's information system. Bibliography lists 4 sources.

  • Electronic Commerce Trading Accessibility and Security Dichotomy

    This 10 page paper considers the following statement. "Security in the world of e-commerce is focused on protecting information - information about accounts, credit card numbers, social security numbers, and identities. It is not about hardware or physical access. But there is a built-in paradox; e-Commerce systems must be open enough to be inviting to customers and users, and at the same time the systems must be difficult to penetrate to those who would steal the information. Achieving the balance that satisfies those opposing needs is the challenge of security in the e-Commerce world. Too much security pushes away the people you have invited; too little and valuable information can be stolen". The bibliography cites 7 sources.

  • Personal Home Information and Risk Management

    An 11 page paper discussing the risk to which personal information is subjected at home. Home is the primary repository for personal information for most people. The paper provides an inventory of the types of personal information held in a single home that also houses a business and a graduate student, followed by assessment of the risks to that information and a security plan intended to control those risks. The plan follows that of the “Risk Management Guide for Information Technology Systems,” Special Publication 800-30 of the National Institutes of Standards and Technology (NISTA), identifying information assets; assigning a loss value to each; and identifying vulnerabilities and the likelihood of each to arrive at a risk-rating factor for each item. The paper concludes with a security plan for those items at greatest risk. Bibliography lists 2 sources.

  • Information Management at Sony

    This 11 page paper looks at the use of information management systems by Sony. The paper examines the company background before looking at the way information is used, including management information systems and the creation of a division to deal specifically with information issues. The bibliography cites 4 sources.

  • Information Technology Security, Web Services and Database Management Systems

    This 14 page paper is written in three parts. Each part of the paper looks at a different type of technology, outlining the purpose and the motivation for it's' existence, how it functions, how it is used by organizations, the market and the way it may evolve in the future. The technologies discussed include information technology security, focusing on cryptography, web services and database management systems. The bibliography cites 15 sources.

Copyright © 2000-2024 The Paper Store Enterprises, Inc. & Fast Papers On-line.
All rights reserved. Search for your essay here.

U.S. based premium essay, research and
term papers service since 2000.