Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Report on Data leakage by Unethical employees

Category: Business & Management Paper Type: Report Writing Reference: APA Words: 2450

Abstract of Data leakage by Unethical employees

This study will mainly discuss the information leak which has been taken as an event when an ethical and confidential knowledge is leaked out the form an unauthorized person or group. In this regard, some of the consequences can also be seen which is reacted with the aspect of data leakage and it has been claimed that this unethical work has been done by the unauthorized employee which is work within the environment. For this purpose, some of the previous studies will include in this to review that what factors are leading the organization toward this. There is no way to cry over spilled, once the data of the customer has been leaked then it would not be reverse able. In this study, it has also be mentioned that the sanctioned users can have the access to the internet and database to attain the data or a copy of the data and it has been said that in this some of the unauthorized employees can hack the data from there. in dilapidation and contextualization among previous data and the latest data directly affect the sympathetic of cracks that the law must pay emphasis on protective.

Table of Contents

1.      Introduction. 4

2.      Literature Review.. 5

2.1.       Human Factors in Data Breaches. 5

2.2.       Unethical Behavior of Employees. 8

3.      Conclusion. 9

4.      References

Figure 1: Information about 5 fears to businesses. 6

Figure 2: Nature of an incident 7

Figure 3: Businesses that are not protected by inappropriate IT. 8

Figure 4: Annual number of data breaches record in USA from 2005 to 2014. 9

 Data leakage by Unethical employees

1.    Introduction of Data leakage by Unethical employees

In this report, there is proper information about how the unethical employees are involved in data leakage process in their organization. Having information leaks which have been taken as an event when an ethical and confidential knowledge is leaked out from unauthorized persons or groups. A news source has been revealed that the process of data leakage has been begun in an alarming situation. As well as it can also be defined as a process, in which the transmission of data has been completed unethically or unauthorized. As well as the transferring of data can be done physically or electronically. Despite form this, it can also be known as theft of data slowly and on a low level. As well as data leakage is one of the most significant and wide issues for the security of data.

In some of the cases, it may be said that data leakage can always not happen firmly and did not hinder one’s business. Although there are some of the indirect consequences still presented. The leakage of confidential data may affect the reputation of the company as well as it also affects the business and their place in the market. moreover, there are some of the causes that have been presented which can mainly lead the organization (Frankel, Yair, & Lee, 2020)toward this in which the first one is the information that may be shared without utilizing any security equipment for this purpose. Furthermore, employees may involve in the leaking the data. Moreover, it might be said that employees may send significant data accidentally or mistakenly. Or it might have happened that the information may not be sent to the right person. There is no way to cry over spilled, once the data of the customer has been leaked then it would not be reverse able. For this purpose, the organizations have to take some essential and significant steps or precautions to avoid these types of hazards for happening furthermore.

 Literature Review of Data leakage by Unethical employees
         Human Factors in Data Breaches

As it has been stated by Wong, Hwee Chin, and Ming-Lang (2019), information leakage can be developed in the transferring in usage and at rest. This is quite a significant study in which it has been mentioned that some of the inherent complexities of the internal threat influencing information leakage and the truthfulness of sharing the data from the perspective of human factors. Despite this, the actions and attitudes of employees are mainly essential in the security of information and security solutions have been (Peng, Tan, & Ming, 2019)depend on the individual component on a large proportion. In this study, it has also be mentioned that the sanctioned users can have the access to the internet and database to attain the data or a copy of the data and it has been said that in this some of the unauthorized employees can hack the data from there. Despite form this, it can be said that no user instead of the human-computer interface can steal the information and then they transfer the information to the unauthorized one. Human aspects would be first deliberated surveyed by unintended and intended leakages. The graph below is discussing the survey in which business are worried regarding the use of data by the employees.


Figure 1: Information about 5 fears to businesses

Source: (Kaspersky, 2020).

Putri, Murhandini Lutfi, and Ayu Chairina Laksmi (2019) suggested that over the last ten years the problem of having fraud is the increased frequency and spreading broadly and nowadays it is mainly attentive in mass media. Attribution theory has been presented here in which it has been mentioned that leadership attitude has been affected by the attributes. Moreover, it can also be said that the behavior of the leaders mainly and highly affects the actions, behavior, mentality, and attitudes of the employees. As well as it can also be said that some of the harsh that has been taken by the leader of the organization will also lead the employees toward (Lutfi & Laksmi, 2019) unethical behavior and doing fraud as in the form of leakage of data within the company or business. The vulnerability of reporting data leakage can be influenced by the existence and absenteeism of opportunities and it has been seen that lake of having various opportunities is the cause behind the leakage of data by the unethical employees. As well as it can also be said that the effectiveness of inner control pays a negative effect on the unethical behavior of employees. The below pie chart has discussed the nature of incidents regarding data breaches.


Figure 2: Nature of an incident

Source: (Sher-Jan, 2018)

Draper, Chris, and Anjanette (2020) said that the protection of data is essential for every business. Most of these possibilities have been introduced by the catastrophe and as well as it is also be stated that how most of the individuals who are using technologies are related to the measure of securities. Moreover, it has been mentioned that the password policies and security consultants were not be followed by the employees of the organization. To apply this some of the steps have been taken by the organization. As it has been stated that once the data of the customer has been stolen cannot be retrieved (Draper, Chris,, Anjanette, & Raymond, 2020). The business and individuals can be used the framework of cloud which facilitates the association to depiction to responsibility. Furthermore, it has also be mentioned in this study the data which is stolen within the company has been done by the unauthorized workers who have been working in the same company. These alterations in dilapidation and contextualization among previous data and the latest data directly affect the sympathetic of cracks that the law must pay emphasis on protective.


Figure 3: Businesses that are not protected by inappropriate IT

Source: (Kaspersky, 2020).

          Unethical Behavior of Employees

Ge, Yijiu (2018), Review that the ethical climate is mainly obvious to recognize the ethical and unethical behaviors between the members of the company. As well as it essentially involves the opinions of the where the attitude of employees has been confirmed according to the moral standards which have been developed on the moral standards as well as to handle the unethical behaviors.  Despite this, it has been stated that having a negative ethical climate many causes the employee in violating and ignoring the moral norms which have been presented in the environment which will lead toward the unethical behavior of the employees. According to the theory of social information, it has been said that some of the senior employees allow the employees to learn and attain the values, beliefs and norms pf the company. According to this supervisor is responsible for the change in the behavior of employees. ( Yijiu, 2018)Despite this, it has also been stated in this study that the ethical climate is the most significant factor which mainly affects the moral decision making of the workers. Moreover, it is also mentioned that the supervisor or authority of the organization considers being powerful and he is playing the guiding role in accomplishing the working behaviors of employees and this also affects the ethical climate of the company according to the research.

                                            


Figure 4: Annual number of data breaches record in USA from 2005 to 2014

Source: (Groot, 2019).

The above graph is giving information about the annual data breaches that are recorded between the years 2005 to 2014.  According to the given graph it can be noted that the graph is gradually increases after each year. This shows that the data breaches problems are increasing after each year. According to the research, as it has been mentioned in the digital world a concept has been presented which is associated with the growth in the technologies which mainly deals with the wide range of data. As t has been seen that utilization of the massive data and their chances which is related to the information leakage or variations. As it has been known that each of the enterprises was mainly re-laid on the transaction which has been made daily. Moreover, according to the main aim of the study is the security issues of the data which has been presented in the working environment. As well as the other purpose of the study to save the data from unauthorized or unethical employees. As it has been known worldwide that information leakage is one of the most significant and complex problems for any of the organizations. (Koti, Raja, Kumar, & Srinivas, 2017)The security apprehensions rise due to the accessibility amount of web possessions developed due to the development of computer networks. Moreover, information security is also be categorized and based on the three approaches mechanism of security, Attacks related to security and security services. Despite this authentication is one of the most significant approaches of which has been used while securing the data.

    Conclusion of Data leakage by Unethical employees

Summing up all the discussion from above, I can say that the data leakage is one of the most important issue of different organizations of the world. In this study, I have covered the information leak which has been taken as an event when an ethical and confidential knowledge is leaked out the form of unauthorized persons or groups. A news source has been revealed that the process of data leakage has been beginning in an alarming situation. In this, a brief discussion has been done. In this study, it has been said that the data leakage has bene happen due that employees of the firms are involved in this which has been considered unethical. As well as the study also enhances value by highlighting its literature review, along with the significance of data leakage by nurturing the ethical climate and data security environment in justifying the data leakage to attain knowledge by spreading honesty, mainly when the organizations hold weedy inner control while transferring the knowledge. This study improves value to the prevailing literature by rising the human factors such as the interactive viewpoint of the malevolent internal and intellectual viewpoint of unintentional inner, connected to suitable extenuation or ascendancy strategies to anticipate data leakage.

Moreover, I have also evaluated the latest study also includes that different companies hold various ethical climate and culture to transferring information. Moreover, in my point of view, it is also necessary for the enterprises that they will have to identify that administrator attitude and behavior plays a significant role for their workers. Although in this regard the findings of the informational procedure would be used as the guideline in the upcoming behavior which may be presented in the company. The security apprehensions rise due to the accessibility amount of web possessions developed due to the development of computer networks. Moreover, information security is also be categorized and based on the three approaches. authoritative of the organization consider to be powerful and he is playing the guiding role in accomplishing the working behaviors of employees and this also affects the ethical climate of the company according to the research. Moreover, it can also be said that the behavior of the leaders mainly and highly affects the actions, behavior, mentality, and attitudes of the employees. As well as it can also be said that some of the harsh that has been taken by the leader of the organization will also lead the employees toward unethical behavior and doing fraud as in the form of leakage of data within the company or business.

    References of Data leakage by Unethical employees

Yijiu, G. (2018). Supervisor Bottom-Line Mentality, Instrumentalism Ethical Climate and Employee’s Unethical Behavior: The Moderate Effect of Moral Identity. In 2018 2nd International Conference on Education, Economics and Management Research.

Draper, Chris, Anjanette, & Raymond, H. (2020). Building a risk model for data incidents: A guide to assist businesses in making ethical data decisions. Business Horizons, 9-16.

Frankel, Yair, & Lee, J. (2020). Data Leakage and Information Security Using Access Control. U.S. Patent Application.

Groot, J. D. (2019). The History of Data Breaches. Retrieved from https://digitalguardian.com/blog/history-data-breaches

Kaspersky. (2020). The Human Factor in IT Security: How Employees are Making Businesses Vulnerable from Within. Retrieved from https://www.kaspersky.com/blog/the-human-factor-in-it-security/

Koti, Raja, B., Kumar, R., & Srinivas. (2017). Identification of Guilt Agent and Leaked Data by Using MAC-IP. International Journal of Applied Engineering Research, 12237-12245.

Lutfi, M., & Laksmi, A. C. (2019). analysis of the Effect of Internal Control Effectiveness, Appropriateness of Compensation, and Apparatus Morality toward Unethical Behavior and Tendency of Accounting Fraud. Proceeding UII-ICABE, 237-250.

Peng, W., Tan, H., & Ming. (2019). Human factors in information leakage: mitigation strategies for information sharing integrity. Industrial Management & Data Systems.

Sher-Jan, M. (2018). Data indicates human error prevailing cause of breaches, incidents. Retrieved from https://iapp.org/news/a/data-indicates-human-error-prevailing-cause-of-breaches-incidents/

 

 

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Rated Expert

ONLINE

Top Rated Expert

1869 Orders Completed

ECFX Market

ONLINE

Ecfx Market

63 Orders Completed

Assignments Hut

ONLINE

Assignments Hut

1428 Orders Completed