Contents
- This article is based on the following requirement -
- Description
- Increasing computing power, storage, and networking capabilities provide easy ways for information access. The ease and anonymity with which information is now communicated, copied, and manipulated in online environments pose new challenges to the protection of privacy and intellectual property. The main ethical, social, and political issues raised by information systems centre around information rights and obligations, property rights and obligations, accountability and control, system quality, and quality of life.
- In this context, you are required to select a topic of interest and conduct a detailed study and submit the research article consisting 2000 words in MOVE. Selection of a topic is restricted to six members which are on first come first serve basis. The link for selecting the topic will be available in MOVE. Students can also come up with their own topic related to their workplace environment which needs prior approval by the module lecturer.
- List of Topics:
- 1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
- 11.
- Majan University College
- Page 2 of 11
- Impacts of identity theft
- Effects of Government data leakage
- Privacy concerns of medical data
- Email fraud: types and impacts
- Consequences of academic fraud
- Copyright infringement issues
- Software piracy in Oman: An analytical study
- Profiling in social networking sites: impacts
- Impacts of Hacking
- Effects of unethical behavior:(creating and spreading virus, malware and spam
- ware)
- Ransomware and its impacts
- Consumer privacy issues of RFID tracking
- Mobile games: Business Value Vs Ethical Issues
- Anonymous posting of comments in public websites
- Social impacts of social media
Description
The increasing use of computers for carrying out different processes has led to growing threats in cybersecurity. Ransomware has become one of the fastest growing threats wherein the cybercriminals block access to the data or a system until a certain amount is paid by the user. It is carried out by encrypting files or folders and blocking system access to hard drive. Ransomware are categorized as locker ransomware, which prevents access to computer interface and the crypto ransomware encrypts files or data of the user (Axelson, 2017). In both the categories, the cybercriminal demands money from the user to provide access to system and/or files. Ransomware is widely spread across the globe including Oman. In Oman, the larger companies have adequate protection, but the smaller companies get infected by ransomware more easily as they lack infrastructure and use VPNs to access sites, which are blocked through which their systems and files get infected. Ransomware can be controlled and avoided by installing best security suite, backing up data and filtering the spams in the email.