question archive Write an essay (minimum of 300 words) must include two scholarly sources (1)Will concern for individual privacy affect the growth and expansion of social networks? Why do you think social engineering attacks are particularly difficult to prevent? Write a narrative essay (minimum of 1200 words excluding references) that addresses the questions and statements below
Subject:ManagementPrice:16.86 Bought3
Write an essay (minimum of 300 words) must include two scholarly sources
Write a narrative essay (minimum of 1200 words excluding references) that addresses the questions and statements below. When finished, the essay should demonstrate a thorough understanding of the READ and ATTEND sections. A minimum of three scholarly sources are required, and all sources should be cited and referenced in APA format.
Why do contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property?
One of the capabilities of Internet communication is the ability of the individual to appear essentially anonymous by using made-up usernames. Is anonymity the same thing as privacy, and should it be a right? What ethical issues are raised by increased anonymity?
Distinguish between cloud computing, green computing, and quantum computing.
Describe four services that comprise IT infrastructure, beyond physical devices and software applications.
Refer to the case study at the end of chapter six, How Reliable Is Big Data? Should all organizations try to collect and analyze big data? Why or why not? What management, organization, and technology issues should be addressed before a company decides to work with big data?

Information Managing systems
Many people and businesses have moved from the traditional ways of connecting and sharing information to social network websites where they can easily interact with other people across the globe. With the rise in technology and easy access to the internet, many people and businesses can connect to a wide range of people worldwide. Technology has transformed the way businesses operate, but there are rising concerns over the privacy of online users
How contemporary information technology and the internet pose a challenge to individual privacy and intellectual property
Many businesses have turned to contemporary information technology to analyze and store data. Companies can quickly gather information about individuals through the internet, the fastest way of connecting to people across the globe. Still, it is not the safest, and there are many security risks when using the internet. Many people have underestimated the importance of online privacy, but concerns about individual privacy and intellectual property have risen in recent years. There are reported cases of infringement of privacy reported that have made some social network users stop using or reduce the usage of the social network sites (Masur et al., 2021). Not all social network websites have strong privacy protection policies.
Data flowing over the internet is monitored at many points through browsing and using social media platforms. Copyright laws protect intellectual property, but they are insufficient since the material can be easily copied or transmitted over the internet. The EU addressed the online privacy concerns by passing a set of laws intended to protect data privacy. But even with these laws in place, there are still issues concerning individual privacy. There are trackers created to spy activities of people on the internet, which gives clear information about an individual. In addition to spying, there are internet sites that ask for personal information to access their sites, and in most cases, the information can be accessed by anyone.
Anonymity and privacy
Invasion of privacy does not cause direct harm to an online user. People and companies have protected their data by prioritizing privacy when using services that access personal information such as location, email address, or phone number. Privacy means an individual or organization can keep private data and control who will access data or information (Masur et al., 2021). The amount of information an individual shares on the internet or social networking platforms determines the level of privacy.
Communication technology has brought people much closer to each other, but some hide their identities by using usernames. People hide their identities in the online world to prevent their data from being collected or identifying them. Anonymity is important, particularly in areas where having certain viewpoints could endanger a person's life. Using anonymity, it becomes difficult for a person to be traced.
Although there are concerns about using anonymity on social network sites, anonymity helps protect the privacy and give freedom of expression to online users. However, without accountability for one's actions, anonymity can encourage immoral and criminal activities.
Cloud computing, green computing, and quantum computing
The world is going through a revolution where there are computing models that perform complex tasks in ways that were previously complicated. Computing technology is relevant in the careers and lives of many people. Cloud computing technology delivers services over a network, typically via the internet, to offer faster and flexible resources (Gupta,2017). The three models of cloud computing are infrastructure-as-a-Service, platform-as-a-service, and Software-as-a-Service.
With the increase in the use of computing devices, it is crucial to design energy-efficient electronics. Appropriate disposal of obsolete computing devices is vital in creating a green environment. Green computing is the eco-friendly use of computers. It involves reducing the negative impact of technology on the environment (Gupta, 2017). The techniques in green computing are energy efficient and e-waste, which is the proper disposal of electronic waste.
Quantum computing involves computers performing tasks that classical digital computers cannot do. The quantum computers host a quantum processor where particles are isolated for engineers to manipulate. Data is recorded and stored in qubits rather than binary bits.
Services that comprise IT infrastructure
A firm's IT infrastructure provides the foundation for managing the business processes (Wang et al., 2020). IT infrastructure is the component required to manage IT environments. They comprise both human and technical capabilities. The services that comprise IT infrastructure are computing platforms, data management services, IT standard services, and telecommunication services, among others.
The computing platforms offer services that connect the suppliers and in the digital environment. The data management services aim at storing and organizing data and provide capabilities for analyzing the data created by a firm. IT standards of services equip an organization with the policies that determine the IT technology used by a firm and when and how it will be used. The telecommunication service offers employees access to data and video connectivity to customers.
Big data
Today, people live in a digital world, connecting globally through social network sites to transacting businesses. Big data refers to large and complex data that cannot be processed through traditional methods. Each decision-maker has to know what they are dealing with before going big data. Big data is described by volume, value, variety, velocity, and veracity.
Big data can transform organizations in numerous ways. With many users in social media platforms connecting and sharing information, companies can use big data to achieve growth and defeat their competitors. Organizations use big data to know their customers more by understanding the trends in purchasing. When a company knows its customer's preferences, it can become more competitive. Big data helps organizations to identify and employ effective wars of doing business which saves on costs (Hariri et al., 2019). In addition, businesses can understand the market conditions and produce products that will help the company get ahead of their customers. With tools like Hadoop that analyze data immediately, companies can save more time.
One of the biggest challenges in using big data technology is finding a skilled workforce to operate the big data. Many significant data initiatives fail because of unskilled people. The management needs to organize workshops and training for the IT department. Security in big data technologies tends to be neglected. It is vital to put security first at the initial stage of designing the organization's solution architecture (Hariri et al., 2019). Before working with big data, management should address the challenge of data integration. Data comes from different sources, and in different formats, the organization needs to match records and merge related items. Setting up big data is costly. Organizations can waste a lot of money if they do not have strategies to use big data. The management should always plan before deploying the big data system. The education sector also uses big data analytics to enhance students' performance and make teaching easier for tutors.
Conclusion
The world has moved from the traditional way of communicating and operating business to the digital ways. Some innovations in this digital world have made businesses reach a wide range of potential customers. Cloud computing has made it easy for businesses and people to connect with other people worldwide. Electronic companies designing computers now consider conserving the environment by producing eco-friendly electronic gadgets and offering proper waste disposal mechanisms. But with this digital era, privacy issues are still the primary concern to many people. The social networking website should put in place security measures to ensure there is privacy for its users.

