Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

The charity scenario introduced in assignment 4. This assignment looked at the practice of Governments divesting some of their administrative functions to NGOs (Non Government Organisations). This practice often, but not always, includes paying the NGO a sum of money to process and administer clients on behalf of the Government.  This assignment saw the NGO process members of society, who they would normally help and support, on behalf of the Government for various support services. This also included identifying the client and assisting them to create a digital ID to access these services.

But, any approach to divestment comes with risks to information security and privacy and may also have an ethical effect.   

Tasks:  

  1. Discuss what you see as the personal and ethical implications for the privacy of individual clients of an NGO that has adopted the MySupport approach. Will these personal implications lead to possible behavioural changes?
  2. Discuss what you see as the personal and ethical implications for the security of individual clients of an NGO that has adopted the MySupport approach. 
  3. Discuss what you would recommend to a client of an NGO that has adopted the MySupport approach in order to protect their individual privacy and the security of their information and digital ID. 

Discussion

There are several NGO’s who normally provides support and help by providing various supportive services. NGO’s are very much essential sometimes to divest some of the functions for the Government to run the other functions smoothly (Ngo, Teoh & Hu, 2015). It is because sometimes handling many practices at the same time becomes problematic. The Government divests the tasks to the NGO’s and in many cases, the Government pays a sum of money to the NGO’s for performing the practice behalf of the Government but it is not assured that the payment will always come (Bossuet et al., 2014). In this cases the Government partners with the NGO’s to divest the task. The NGO’s helps the Government to identify the clients by creating a digital id in many cases. In this discussion, ethical implications about the divesting technique will be discussed thoroughly (Manogaran, Thota & Kumar, 2016). How this ethical implication is creating privacy-related issues for each individual client will be discussed for the NOG’s which have adopted the approach of the My Support. 


The upcoming pages of the report provides an overview regarding the personal and ethical implication of privacy. After that, ethical implication for the security of individual clients has been discussed in details. The last section of report mainly deals with security of individual clients of NGO which has implemented My Support approach. It mainly deals with privacy and security of information and digital identity.

Personal and ethical implication of privacy

The major risks that are there in the processing of the implementation of the data management system include the processing of the data correspondence includes unauthenticated access of the data that will be stored in the database of the organization (Chang & Ramachandran, 2016). His will affect the clients of the NGO systems in a negative manner. This will make the unauthenticated personnel to gain the data that are stored in the database if the NGO system (O'Dwyer & Boomsma 2015). To avoid this kind of problems the NGOs have been implementing the platform of the support system. This implementation of the platform of my support helps in protecting the data and this is the main reason that the projection of the management of the personal information of the clients that have subscribed to the platform of the NGO (Hashem et al., 2015). In case the implementation of my support is implemented the projection of the data management can be processed as the barrier of the entire database can be performed with the help of the projection. This is the reason that the projection of the management of the entire data is well protected and this helps in maintaining the ethical dilemma of the project (Mir & Bala 2015). This is the main reason that the projection of the data management gets better with time and thus the projection of the ethical dilemma maintenance and this is the sole reason that the proclamation of the project management gets better with time and this is the sole reason that the implementation of the support technology has been gaining a better recognition in the projection of the database management system. 

Methods to adopt the My Support approach for protecting the privacy and security


After the implementation of my support system, the main effect that the clients enjoy is that they can trust the entire project completion system and they can stay assured that the data that they want to store will be stored with utmost proficiency (Almorsy, Grundy & Müller, 2016). This aspect will help the clients to open up as an organization. (Ali, Khan & Vasilakos, 2015) This gaining of data from the clients will help the NGO organization to gain the data that are required for the completion of the duty that they need to perform. In case the clients do not feel safe in the providing data that are private in nature it gets hard for the NGO organization to perform their duty and this might reduce the efficiency of the business system of the organization (AbouAssi & Trent 2016). In case the projection of the data management is performed with the help of the support the client will not hesitate in providing the details and this is the main reason that the projection of the data proclamation will get better and the functioning of the NGO system will gain efficiency. This aspect of gaining the projection of data management includes the fact that the ethical problems that are present in the course of the data management of the clients will be reduced. Another efficient aspect of the implementation of the support system is that the clients will have access to the projection of the data that are shared by the client (Zhang et al., 2017). In case the clients want to change the data that are present in the database of the NGO they can do that themselves as the implication of the support provides them the instance of the projection of the data procurement. This is the reason that the NGOs cam stay updated without much hard work. This also helps in gathering the most updated data (Edwards & Hulme 2014). This gathering of updated data helps the organization to function accordingly. In case the NGO get the data that are updated and are recent and they work in accord to that the projection functioning of the NGOs will get more efficient and this will be performed in a better way and the time that will be consumed in this process will help in procuring time.
Personal and ethical implication for the security of individual clients 


This part of the report is all about principal consult for the community-based charity (Shaikh & Sasikumar, 2015). The charity is all about locating and giving accommodation, support services and lastly mental health services. At present, the charity is running a small data center which comes up with 50 x86 64 bit servers that are running on windows server 2008.  It can be used for desktop service, database and lastly file services. It comes up with 20 red HAT enterprise which runs on Linux server for providing public service to web pages, web support, and services. Clients of NGO can easily put certain number of procedure which is needed to be built for harden parameter (Wei et al., 2014). It is mainly used by the infrastructure and data which they want to secure. The configuration can be considered to be very easy for managing as the application as the NGO can easily have control on the given server location (Sun et al., 2014). It can easily make use of physical hardware for themselves only. In both private and public cloud, the perimeter which can blur and control over the security which can easily diminish on the application. It can easily move dynamically and the given organization can easily share the same remote application. 


Multitenancy: Cloud computing user that is the individual client of NGO can easily share their physical sources (Zhao, Li & Liu, 2014). It can easily work with the help of some of virtualization application layer. The given environment can easily provide user with some resource stack. The cloud consumer can easily complete the neighbor identity, intention and lastly securing profile. Virtual machine tends to work almost next consumer environment which can be malicious. It can easily look into another kind of hypervisor tenant or communication that move through the system. 
Data mobility and control: Moving the required data from physical server into virtual volumes can easily make it more mobile in nature. Data of client which is stored on cloud can be accessed from any location (Chang, Kuo & Ramachandran, 2016). Storage administrator will make use of reassigning or replication of the client data center which can facilitate the server maintenance. Capacity planning comes up no kind of service interruption to owners of data. It can easily create a large number of complication in terms of legal for the cloud users that is client of NGO. 
Data remanence: Cycle storage is considered to be one of the common practice which is seen in cloud. No clear idea is provided regarding the cloud service provider which comes up with cycle memory and low disk space (Botta et al., 2016). Vacated hardware is considered to be of single purpose which comes up with little regard with respect to secure hardware. Cloud tenant is not being able for having piece of information when the resources are not securely recycled. Understanding and solving the issue of data remanence can be frequently considered by negotiation the time (Li et al., 2018). 

Digital identity can be stated as a body of information which is all about organization, device which can exit on online platform (Sookhak et al., 2017). Unique identifier can be used for understanding the pattern which makes it difficult for detecting individual or another kind of devices. A digital can be used for analyzing the use of various personal information. There is large number of security problems in cloud computing which can easily lead to privacy issues (O'Dwyer & Boomsma, 2015). Privacy is considered to be a complex topic which has different output with respect to culture, communities and lastly context.  There is large number of methods which can be used are staying away from public Wi-Fi, tech updating, checking all the credit reports and lastly two-factor authentication. 


Two-factor authentication: No matter how the good the client of NGO is good for coming up with unique, the fact should be taken into account that the current computer system algorithm can be easily broken (AbouAssi & Trent 2016). With the help of two-factor authentication, the client does not only need enter password but also need to provide password. It can be easily used in the method of entering password but the second form can be ID verification (Mir & Bala 2015). It does not have fingerprint or text message. It is much harder for various hackers to easily get into the cloud infrastructure. 


Staying away from public Wi-Fi: The client of NGO should remain away public Wi-Fi and hotspot which can be beneficial for reducing the data charges (Edwards & Hulme, 2014). This mode of communication can be considered too insecure and criminals can easily make use of flaws in understanding what is done on online platform for accessing the account of client (Hashem et al., 2015). If the client is accessing the files on the cloud storage, then making use of cellular connection is the most suitable option. 


Keeping tech update: There are many kinds of issues which are encountered in updating any software, but the downloading of latest version can be done on computer system (Almorsy, Grundy & Müller, 2016). It mainly checks certain number of security measures which can be used for tackling the best security measures. 


Checking the credit reports: The client of this NGO should check the fact of three credit reports on each year basis. It is considered to be most suitable way for analyzing the credit profile which is being used without the any knowledge of the user (Ali, Khan & Vasilakos, 2015). The victims of new account fraud can easily detect new account in the name of the client. 


Sign up for credit monitoring in case of data breach: If the cloud provider notifies the breach of data of the given system then the service provider will provide free credit monitoring services. 


Data integrity security: It mainly checks the change in information which is needed for the transmission of data (Zhang et al., 2017). It mainly makes use of data for checking the fact whether the provided information tends to occur or not. It is mainly done when the transmission of data takes place. In this, the user mainly checks the hash value of given message. After this, user can easily receive own private keys and encryption of hash value can be done. Cloud providers mainly check the hash which is sent over the given data or message (Shaikh & Sasikumar, 2015). If the calculated hash is not matched, then the appended hash with not match. Cloud provider will not make any kind of appended hash which is not matched. Cloud will not accept data and send the query which is needed for transmission of previous data. 


Confidentiality: In this particular method, both firewall and intrusion detection can be considered to be detecting any unconscious activity (Sun et al., 2014). It can be done from the side of attacker and servers. It comes up with stored which is separated from the server. The user of private data is mainly stored on the server (Wei et al., 2014). Proxy firewall helps in avoiding any kind of direct connection with internal servers on the cloud.

Conclusion

From the above report, it can be concluded that the projection of the entire implementation of my support tends to project terminology. This is the biggest cause behind the implantation of the projection of the data management includes the processing of the data protection and accessing of the data is better prosecuted. It behaves as one of the reason that proclaims the fact that the management of the data that are stored in the digital platform that provides data alteration and this helps in better maintenance of the data projection. This discussion regarding the divesting technique also helps in understanding the fact that the security issue that is present in the projection of the data management of the clients that are present in the prosecution of the data commencement. It is the sole reason that the task that requires projection of the given data management which is done with high effectiveness. This process of divesting the practices is very much effective for handling many practices at the same time but with the benefit this comes with various type of risks also. The main risk associated with the technique is related to the information privacy and security and this might have an ethical effect on the technique of divesting. The process of investigating the process of man management will inquire the fact that the projection of data security and the ethical implication is well managed with the help of better technology implementation. Further, some recommendation will be given to a particular client about an NGO which has successfully adopted the approach of my Support approach. Also, how this approach protects the privacy and the security of the individuals will be discussed in the context of protecting the digital id and the information of the clients.

References

AbouAssi, K. & Trent, D.L., 2016. NGO accountability from an NGO perspective: Perceptions, strategies, and practices. Public Administration and Development, 36(4), pp.283-296.

Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information sciences, 305, 357-383.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Bossuet, L., Thuy, N. X., Jouini, Z. C., & Fischer, V. (2014). A PUF based on transient effect ring oscillator and insensitive to locking phenomenon. IEEE Transactions on Emerging Topics in Computing, 2(1), 30-36.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Chang, V., & Ramachandran, M. (2016). Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Services Computing, 9(1), 138-151.
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 57, 24-41.
Edwards, M. & Hulme, D., 2014. Non-governmental organisations-performance and accountability: Beyond the magic bullet. Routledge.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115.
Li, J., Zhang, Y., Chen, X., & Xiang, Y. (2018). Secure attribute-based data sharing for resource-limited users in cloud computing. Computers & Security, 72, 1-12.
Manogaran, G., Thota, C., & Kumar, M. V. (2016). MetaCloudDataStorage architecture for big data security in cloud computing. Procedia Computer Science, 87, 128-133.
Mir, M .& Bala, S.K., 2015. NGO accountability in Bangladesh: Two contrasting cases. VOLUNTAS: International Journal of Voluntary and Nonprofit Organizations, 26(5), pp.1831-1851.
Ngo, D.C.L., Teoh, A.B.J. & Hu, J. eds., 2015. Biometric security. Cambridge Scholars Publishing.
O'Dwyer, B. & Boomsma, R., 2015. The co-construction of NGO accountability: Aligning imposed and felt accountability in NGO-funder accountability relationships. Accounting, Auditing & Accountability Journal, 28(1), pp.36-68.
Shaikh, R., & Sasikumar, M. (2015). Data Classification for achieving Security in cloud computing. Procedia computer science, 45, 493-498.
Sookhak, M., Gani, A., Khan, M. K., & Buyya, R. (2017). Dynamic remote data auditing for securing big data storage in cloud computing. Information Sciences, 380, 101-116.
Sun, Y., Zhang, J., Xiong, Y., & Zhu, G. (2014). Data security and privacy in cloud computing. International Journal of Distributed Sensor Networks, 10(7), 190903.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371-386.
Zhang, Y., Chen, X., Li, J., Wong, D. S., Li, H., & You, I. (2017). Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Information Sciences, 379, 42-61.
Zhao, F., Li, C., & Liu, C. F. (2014, February). A cloud computing security solution based on fully homomorphic encryption. In Advanced Communication Technology (ICACT), 2014 16th International Conference on (pp. 485-488). IEEE.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2020). Personal And Ethical Implications Of Privacy And Security In NGO Support Systems. Retrieved from https://myassignmenthelp.com/free-samples/itc568-cloud-privacy-and-security/implication-of-privacy.html.

"Personal And Ethical Implications Of Privacy And Security In NGO Support Systems." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/itc568-cloud-privacy-and-security/implication-of-privacy.html.

My Assignment Help (2020) Personal And Ethical Implications Of Privacy And Security In NGO Support Systems [Online]. Available from: https://myassignmenthelp.com/free-samples/itc568-cloud-privacy-and-security/implication-of-privacy.html
[Accessed 30 May 2024].

My Assignment Help. 'Personal And Ethical Implications Of Privacy And Security In NGO Support Systems' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/itc568-cloud-privacy-and-security/implication-of-privacy.html> accessed 30 May 2024.

My Assignment Help. Personal And Ethical Implications Of Privacy And Security In NGO Support Systems [Internet]. My Assignment Help. 2020 [cited 30 May 2024]. Available from: https://myassignmenthelp.com/free-samples/itc568-cloud-privacy-and-security/implication-of-privacy.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close