Chat with us, powered by LiveChat I want a summary paper about Information Retrieval an | Coms Paper
+1(978)310-4246 credencewriters@gmail.com
  

 

I want a summary paper about Information Retrieval and its correlation with Blockchain. 

The review paper should be from 15 resources.

All the resources should be from published papers or trusted journals only.

No textbook at all.

should be in 4-8 pages in double columns.

Also, I need 5 presentations for the most 5 relevant published papers or journals resources that you used in this review paper.

I want you to follow the table of contents in the attached file. 

Intellectual Property Information Security

Abdullah Alshathri

442105936

IS536

Abstract – Intellectual property is a term

used to define intangible assets with the

advancement in technology and

innovation, concerns for the security of

intellectual property information increase.

Intellectual property rights are the legal

rights that individuals used to protect their

concepts, ideas, formulas, trade secrets,

and other forms of intangible property. In

order to protect these rights from online

thefts and hacking, it is important to

design an information security system.

Issues to the intellectual property can be

mitigated through the increase in user

security awareness because there are

numerous individuals and organizations

that lack awareness of security threats in

the form of viruses and Trojans. This

paper will use the qualitative research

method approach to figure out the security

awareness needs of contemporary e-

businesses. Different areas that need

security will be evaluated to understand

the quality of security, and then new

strategies will be proposed to enhance

awareness about the security system.

Key Words – Intellectual Property,

Intangible, Online Theft, Hackings,

Mitigation.

I. INTRODUCTION

All the intangible properties or assets that a

person owns and have rights over them are

known as intellectual property. A few years

ago, along with the increase in technological

development and advancement, Intellectual

property had become a systematic threat to

the national security of the United States. The

scope of the threat because of intellectual

property includes trade secrets theft, hacking,

foreign student enrollment information theft,

and hacking (Halbert, 2014). Although it is

about the intellectual property rights of the

country, it serves as a threat to the whole

national security of the United States, along

with its economic competitiveness. In the

modern world, more than half of the

organizations are shifting towards e-business

and ensuring their presence on online

platforms to increase sales and business

growth. In these researches, security is

becoming the major concern of organizations,

mainly those who are dealing with customer

information. But the problem occurs when

the organizations don’t have information

about security concerns and how much

security is required while operating online

businesses (Koushanfar, 2010). Every

organization should have an understanding of

security concerns that might confront

anytime, such as viruses, stolen passwords,

worms, and authority concerns.

Augmentations are also needed to understand

that information security threats can be

originated Internally or externally. It can also

be caused by humans or non-human factors.

The only factor that is beyond human control

is natural disasters; thus, hacking and other

online misshapenness can be controlled by

strengthening the internal information

security system. The internal information

security system includes security negligence,

security errors, security attacks, and security

carelessness. And the system can be

prevented by detecting, preventing, and

managing internal threats. These threats

cannot be solved unless the organization has

awareness about security threats, either

internal or external. All the organizations,

regardless of that size, have developed some

protection systems, both hardware, and

software-based, such as proxy servers,

antivirus software, and numerous low-quality

password management systems, but they

need to know that these are very weak

security management systems in the

digitalized world. According to a computer

crime and security survey in 2005, the

computer security Institute and the Federal

Bureau of investigation, one of the most

common security risks is virus infection

(73%). After the virus infection, insider

abuse has become the second most occurring

security risk (47%) (Charlie C. Chen, 2018).

And the majority of organizations are facing

these risks because of the lack of various

information security. The role of humans in

starting the security factor is more important

and prominent than technology.

Businesses that are operating online through

E-Commerce websites should evaluate all

types of possible information security risks

that could happen to them. Because in online

businesses, most of the operations including

sensitive information of the organization,

users’ good customer’s information,

employee records, and other important data

will be stored own online portals that can be

hacked anytime. Thus, strong information

security systems should be insured for data

thefts.

In the process of development of

technological solutions and strategies for the

organization, it should be ensured that all the

security risks are measured and evaluated in

order to improve the level of security and

awareness among employees and employers.

Information security awareness is crucial to

keep the workforce ready to face these

challenges or risks that might confront

anytime and to come up with substantive

solutions without compromising the only

value of the organization (Charlie C. Chen,

2018). Functions should be aligned with the

need for the security and safety of the

organization. Although it is imperative to

keep the functions and operations of the

organization as a priority at the same time,

considerations for security and safety are also

crucial. The quality-tested the offer existing

literature regarding the importance of

information security in the protection of

intellectual property. Fifteen valid research

articles will be reviewed to enhance the

knowledge of business organizations

operating through Online platforms and for

the collection of information to propose a

strategy effective for all levels of our

positions to take care of intellectual property

rights while operating online and targeting

international customers.

II. LITERATURE REVIEW

Intellectual property right (IPR) Is considered

as defective to protect and develop

innovation and strategic competitiveness

business. The emergence of globalization and

increased collaboration in international

businesses Raises the concerns of increase

intellectual property protection (IPP)

(Hyungjin Lukas Kim, 2019). Increased

collaboration increases the risks of theft and

hacking that is the reason businesses are

advised to keep their property protected

under strict information security systems to

avoid any conflict and theft (Trappey, 2015).

As the world is developing rapidly and

exchange of information becomes easy

alongside making data theft an easy and

convenient process. It is easy to exchange

data virtually over large distances, but there

are enormous threats of falling prey to

hackers and unauthorized users (Johnston,

2009). Researches also say that an

organization’s information security system

needs internal protection to avoid intellectual

property thefts and to keep the user

information secure (Trappey, 2015). The

establishment of Information Security

Policies (ISP) also helps in the management

of intellectual property by limiting the

actions of employees and restricting them

towards the policies of the security system.

Researches reveal that employees

comply with information security policies

affects by their beliefs, values, and normative

attitudes (Burcu Bulgurcu, 2010). E-

commerce organizations are not only

threatened by internal thefts, but international

data hackers are also involved in the process

that is the major threat, and organizations

should be beware of them because

international thefts are considered as national

insecurity (Halbert, 2014). Researches say

that the implementation of an Information

Security Program is an easy and convenient

approach to take care of the intellectual

property of an organization instead of

looking for individual solutions and

implementation (CISSP, 2007). The only

three requirements for the implementation of

an information security program include

awareness, education, and training.

Awareness is required to stimulate, motivate

and remind the information of the

organization that needs protection. Education

means specialized skills required for the

motivation to achieve positive skills. And

training to enhance management and

observation skills required to detect and

observe thefts to the property (Stefan Bauera,

2017). Research says that compliance with

the information security policies (ISP) Is

important to integrate within the organization

to minimize threats to information security. It

means Prevention is better than queued. Thus,

every organization should have information

security policies established on the place to

avoid the happening offer online theft and

hacking of data. Regardless of the size and

the nature of the organization, these policies

should be established at every level to ensure

that the information security system is safe

and secure (Siponen, 2000). information

security managers of every business

operating through eCommerce platforms

must design effective information security

well. This is a program by analyzing

prevailing threats and severity (Rezgui,

2008). Previous studies discuss the problem

at a different level to communicate the

effectiveness of information security

programs and policies to address the problem.

The literature on the role of awareness of

information security for organizations

promotes learning and training for employees

(Lacey, 2012). Studies (Balakrishnan, 2015)

also reveal that the leadership styles of an

organization perform a crucial role in the

enhancement of employee’s awareness of

information security systems and protect the

organization from internal and external

threats. Research is also highlighting that an

employee of the organization must be the real

culprit of threats to better security with the

organization. It also argues that 80% of

security breaches are done by internal

members of the organization (Balakrishnan,

2015). Previous studies also emphasize the

importance of education and training of

employees at the workplace and to enable

them to understand the information security

programs and the need for these programs at

work. Studies are incorporating social

psychology techniques to integrate with the

organizational behavior heard and states that

tagged awareness programs are neglected in

many organizations that results in the theft of

intellectual property. There are numerous

fraudulent activities happening breaching

copyrights, trademarks, and other intangible

property rights of individuals (M.E. Thomson,

1998).

III. METHODOLOGY

The research about the importance of the

awareness of possible threats to the

intellectual property will be conducted

through the qualitative research on the

previous studies and the effectiveness of the

Information Security Program (ISP) on the

management of data online and protection of

online property of businesses. A qualitative

approach integrated with the observation of

the effectiveness of the program will be

helpful to extract results and provide a path

for future researches. Security awareness and

its concerns are emerging; thus, a detailed

overview of the problem should be provided

to enable readers about the severity of the

issue, and they will understand that there is a

need to take immediate action. By analyzing

research studies and previous literature about

intellectual property rights and the need for

protection in this field, observation will be

made on a practical location to evaluate

whether the ISP is effective practically or not,

results are composed.

IV. RESULTS

After the analysis of the fifteen reputable

types of research and literature and one-week

observation over the practical observation on

the healthcare organization having

Information Security Program (ISP)

implemented, results are in favor of the

proverb that prevention is better than cure.

Research studies reveal that the information

security systems should be strong enough to

stop and limits unauthorized access towards

the intellectual property of any person. With

the emergence of technology, the need for

security instruments has increased. Now

along with technological innovation,

organizations should think for protection

strategies as well. Because the transfer of data

online is not threat-free. The implementation

of ISP on the organizational data portals

proves an effective solution. The information

security program helps in the management of

information from different locations by

detecting the identity. The second emphasis

of previous studies is on the role of internal

members of the organization to protect

information (Aloul, 2012). That can be

achieved through the implementation of

information security properties and

limitations to access the intellectual

properties of individuals.

V. DISCUSSION

Intellectual properties are intangible rights

and property of an individual that is at risk

because of the investment in technology and

the emergence of innovative devices. The

research aims to suggest organizations

operating only economist level take care of

their information on open portals to avoid

data theft and user information. The

integration of information security programs

helps in the protection of user data and

sensitive information of an organization.

Organizations ensure that every employee

and employer have an awareness of

information security, and they are willing to

protect user information in all circumstances.

Research says that 80% of information thefts

happened because of the internal members of

the organization. Thus, policies should be

implemented to restrict practices of

employees and internal protection

(Balakrishnan, 2015). Researches also state

that the leadership style of an organization

also helps in the production of online data and

eliminates possibilities of data breaches.

VI. CONCLUSION

In conclusion, intellectual property rights are

important property of individuals that cannot

behold and own by any second-person

without their consent. And those who

breached that data through different means,

online and physical, are known as hackers.

The people were discussing the causes of

information security threats and suggested

solutions to avoid these threats. Such as

training of employees and spreading

awareness about information security, and

the second one is the implementation of

information security program if you for

efficient management of the organization.

VII. FUTURE RESEARCHES

This paper is focuses on the qualitative side

of the problem and lows future research is to

focus on the quantitative measure of the

importance of the awareness of information

security to protect intellectual property right.

VIII. REFERENCES

1. Aloul, F. A. (2012). The Need for

Effective Information Security

Awareness. JOURNAL OF

ADVANCES IN INFORMATION

TECHNOLOGY, VOL. 3, NO. 3, 1-20.

2. Balakrishnan, N. H. (2015).

Leadership Styles and Information

Security Compliance Behavior: The

Mediator Effect of Information

Security Awareness. International

Journal of Information and

Education Technology, Vol. 5, No. 4,

311-350.

3. Burcu Bulgurcu, H. C. (2010).

Information Security Policy

Compliance: An Empirical Study of

Rationality-Based Beliefs and

Information Security Awareness.

JSTOR,

https://doi.org/10.2307/25750690.

4. Charlie C. Chen, R. S. (2018).

Mitigating Information Security

Risks by Increasing User Security

Awareness: A Case Study of an

Information Security Awareness

System. Information Technology,

Learning, and Performance Journal,

Vol. 24, No. 1 , 1-30.

5. CISSP, T. R. (2007). Implementing

an Information Security Awareness

Program. Tylaor & Frances Online,

https://doi.org/10.1201/1086/45241.1

4.2.20050501/88292.6.

6. Halbert, D. (2014). Intellectual

property theft and national security:

Agendas and assumptions. An

International Journal Volume 32,

Issue 4,

https://doi.org/10.1080/01972243.20

16.1177762.

7. Hyungjin Lukas Kim, A. H. (2019).

Protecting intellectual property from

insider threats: A management

information security intelligence

perspective. Journal of Intellectual

Capital,

https://www.emerald.com/insight/co

ntent/doi/10.1108/JIC-05-2019-

0096/full/html.

8. Johnston, A. C. (2009). Improved

security through information security

governance. ACM,

https://doi.org/10.1145/1435417.143

5446.

9. Koushanfar, Y. M. (2010). Active

Hardware Metering for Intellectual

Property Protection and Security.

USENIX Security Symposium, 292-

310.

10. Lacey, G. S. (2012). Death by a

thousand facts: Criticising the

technocratic approach to information

security awareness. Information

Management & Computer Security,

https://www.emerald.com/insight/co

ntent/doi/10.1108/096852212112191

82/full/html.

11. M.E. Thomson, a. R. (1998).

Information security awareness:

educating your users effectively.

Information Management &

Computer Security,

https://www.emerald.com/insight/co

ntent/doi/10.1108/096852298102276

49/full/html.

12. Rezgui, Y. (2008). Information

security awareness in higher

education: An exploratory study.

Computers & Security Volume 27,

243-253.

13. Siponen, M. T. (2000). A conceptual

foundation for organizational

information security awareness.

Information Management &

Computer Security,

https://www.emerald.com/insight/co

ntent/doi/10.1108/096852200103713

94/full/html.

14. Stefan Bauera, E. W. (2017).

Prevention is better than cure!

Designing information security

awareness programs to overcome

users’ non-compliance with

information security policies in banks.

Computers & Security Volume 68,

https://doi.org/10.1016/j.cose.2017.0

4.009.

15. Trappey, H. L. (2015). Intellectual

Property Protection. SpringerLink,

https://link.springer.com/chapter/10.

1007/978-3-319-13776-6_18.

error: Content is protected !!