Bring Your Own Deviance Analysis

Decent Essays
Bring Your Own Device (BYOD) Policy for Healthcare Organization In the past, traditional way of connecting to work networks from the workplace was common and believed to be a secured and most convenient practice. The ever evolving and rapid growth of technology has offered several options to corporates and businesses with innovative products allowing employees to access enterprise networks remotely. Cell phones, tablets, Desktop computers, laptops & remote connecting devices have provided greater flexibility and improvement in employee morale. However the risk of exposing secured data and PII (Personal Identifiable Information) to the outside world beyond the boundaries of secured environments such as office or work spaces is posing risk and

Related Documents

  • Improved Essays

    Information privacy is the major issue in the current generation. People are more concerned about their convenience along with security. For example if the car breaks downs, one can push a button and the On-star operator will provide help by tracking the location of the car. This situation explains how conveniently one get the service immediately. On the other hand, we are not sure who is tracking our car location and is there any harm caused by that person.…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    5. Physical Security Devices a) Employee Identification Badges / Smart Cards: The company should provide employees with picture identification badges with a smart chip and magnetic strip. The company will provide unique public-key infrastructure (PKI) certificates on the employee’s smart chip, which will allow user access to the company network. Radio Frequency Identification (RFID) capable cards should not be used. While they are more convenient for access control than swipe cards, an attacker can scan and capture the identification information provided by the RFID chip without having to have any physical contact with the ID card, and use that information to gain access [43].…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    associate screening, insider employee theft, and failure to update information security methods (Matwyshyn, 2009, p. 584). A breach incident is the unauthorized access to confidential or sensitive information which can result in the compromise or probable compromise of this data. This Information which could be confidential, protected, or sensitive can include personal identity information, health information, intellectual property or professional trade secrets of an organization, and financial data of the organization, customers or individuals. As the use of technology to collect, filter, process, and distribute data becomes more increased so do breaches. Data breaches are increasing among businesses and individuals with considerable financial…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Tale Of Deviance Analysis

    • 947 Words
    • 4 Pages

    Cadence, a now seventeen year old girl, who has suffered a traumatic brain injury during her fifteenth summer ( Lockhart 4 ) on Beechwood Island in Massachusetts finally remembers everything after she “recovers” from her accident. She remembers her group of friends called, “The Liars” which consisted of her friends: Mirren, Gat, Johnny, and herself ( Lockhart 7 ). She remembers Clairmont, the house that everyone in her family fought over. She remembers the entire Beechwood estate and who would take it over once her Grandfather passed. Overall, she remembers everything but now she resides in Burlington, Vermont with her Mother and three dogs( Lockhart 4 ).…

    • 947 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Double Deviancy Theory

    • 668 Words
    • 3 Pages

    much outside the local press. This supports the overriding conceptions of appropriate and ideal victims. The young girls were archetypal ‘ideal victims’, as they were bright, young girls from devoted, middle-class domestic backgrounds, each holding model school records. Whereas, ‘David’ and ‘Patrick’ were both ‘working class young boys who had grown up on a rough West Midlands council estate’, the boys had been troublesome within school and ‘David’, had been caught stealing. While ‘Holly’ and ‘Jessica’ grasped the hearts of a nation, being noted in such widespread news reports, ‘Patrick’ and ‘David’’ did not appeal the same media or public interest.…

    • 668 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Micro-level and Macro-level are two different levels of analysis of deviant behavior. Micro-level analysis deals with social processes and personal characteristics such as labeling, social bonding, self-control or derogation, which may account for a person's criminal or deviant behavior. Macro-level is used to consider ways in which structural and cultural characteristics of social collectives such as societies, subcultures, and social groupings that affect the rates of crime and acts of social deviance. Rates of crime and deviant behavior generally refer to the number of offenses that occur for a specific number in a given population (Humphrey & Schmalleger, 2012). In a society where crime appears to be a normal act, it is almost impossible…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Deviance Examples

    • 884 Words
    • 4 Pages

    Our book states that deviance is the violation of norms, rules, or expectations. Some of the ones that I am familiar with is speeding, breaking of the gender barrier, not partaking all of your roles in life. There are many other deviances that I can think of hearing about, seeing, or being a part of. Howard S. Becker said “it is not the act itself, but the reactions to the act, that make something deviant”. This important because just breaking a norm is not the only important factor but how others will react to it too.…

    • 884 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Deviance Experiment

    • 673 Words
    • 3 Pages

    Society tells us that talking to yourself period, let alone in public, is not acceptable. It is associated with psychosis, dementia, and many other mental illnesses. My experiment shows that deviance is a combination of the action of the deviant person as well as the reaction of the audience. People appear to talk to themselves all the time as earpieces to cell phones get smaller and smaller with the technological breakthroughs that we see. My behavior was acceptable until people saw that there was no earpiece.…

    • 673 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Hippa Importance

    • 1089 Words
    • 5 Pages

    Cell phones have significantly modified the route in which we speak with each other, access the web, conduct business issues, and now even manage medical conditions. Innovation has dependably been a main thrust behind upgrades in the medical field and the production of Smartphones and tablet PCs has empowered application and program designers to make some stunning creations to push us forward yet again. Notwithstanding the majority of the positive progressions at we've made due to the cell phone, everyday basic HIPPA rules are violated as health care specialists act with amazing carelessness while utilizing their smart phones on the hospital floor. Healthcare professionals have the obligation to ensure a patient's secrecy. At the point when…

    • 1089 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In our daily lives, we relinquish some of our private information ignorantly. As human beings, many of us tend to simply hand out our information in exchange for other items or free services. Many times, online shopping offers better prices but at what cost? Sometimes, better prices means relinquishing your private information that could be obtained by anyone at anytime. In the article, The Convenience-Surveillance Tradeoff, the author makes compelling points on how our society is unaware of the repercussions that come with relinquishing our…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Deviance in Institutions I have had many roles in my life: daughter, friend, employee, and student. Though being a daughter, a friend, and an employee have get meaning in my life, I find being a student is the most important role I have attained thus far. This is not only because I have been a student since three or four years old, but because it is being a student that will get me to be the woman I want to be in the future. However, with this role has come with many titles by family, friends, and especially school administrations. In an institution such as school, no matter what academic level, there will be teachers that label the students in some way: class clown, honors student, teacher’s pet, failure, deviant, et cetera.…

    • 1705 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Deviance is found in all types of societies. Some sociologists such as, Emile Durkheim, believe that deviance is universal and not abnormal in a society. Durkheim puts his ideas of deviance into a structural-functional theory, which sees society as a complex system whose parts work together to promote solidarity and stability. Whereas other sociologists, such as Alexander Liazos, believe that deviance is a result of social inequality. Liazos ideas fit into a social-conflict theory, which sees society as an arena of inequality that generates conflict and change.…

    • 937 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Throughout these last few weeks I have learned a lot in this class. What I have learned has made me think more about the world around me, broadening my mindset. I was very excited to take this course because my favorite course in high school was sociology. I knew I would like this course because I am interested in the material and it allows me to think outside of the box. I really like how it isn’t as cut and dry as other subjects may be; sociology allows you to have an open mind.…

    • 2209 Words
    • 9 Pages
    Superior Essays