Follow the attach instructions to complete this work. Ethical Practices for Cybersecurity Investments & Purchases   Must post first. Subscribe

Follow the attach instructions to complete this work.

Ethical Practices for Cybersecurity Investments & Purchases

 

Must post first.

Subscribe

Moral and ethical requirements should serve as drivers which encourage a business to 
invest in or 
spend money on cybersecurity products, services, and programs.

You have been invited to participate in a round table discussion on the above topic at a conference on 
Best Practices for IT Security Management. For this activity you must prepare a 3 to 5 paragraph briefing statement which answers the following questions. You must use and cite information from the weekly readings.

1. What is stakeholder theory? How does it drive requirements to spend money on cybersecurity products & services?

2. How does social contract theory apply to purchasing requirements for cybersecurity products & services?

3. Name and briefly describe 3 ethics issues that IT Security managers and staff may encounter when selecting and evaluating cybersecurity products & services. (Use examples to drive home your points.)

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Capstone 2408906454 Design and Analysis of a Simple Computer System Objective:

Capstone 2408906454 Design and Analysis of a Simple Computer System Objective: Students will design, simulate, and analyze the architecture of a simplified computer system, applying concepts from Stephen D. Burd’s materials such as the CPU, memory hierarchy, I/O, and instruction set architecture (ISA). Components: 1. System Design: . CPU Design:

Capstone 2408906454 Design and Analysis of a Simple Computer System Objective:

Capstone 2408906454 Design and Analysis of a Simple Computer System Objective: Students will design, simulate, and analyze the architecture of a simplified computer system, applying concepts from Stephen D. Burd’s materials such as the CPU, memory hierarchy, I/O, and instruction set architecture (ISA). Components: 1. System Design: . CPU Design: