This essay will be evaluating the strengths and the limitations of the human reliability analysis and the SWOT analysis in the context of the challenges posed by surveillance technologies to the privacy of individuals. What this written response aims to discover is which of the two analytical techniques mentioned above will be better to employ in the context of surveillance technologies.
The strengths that the human reliability analysis technique has in identifying the specific threats on the selected security challenge is that it is an effective and systematic way of identifying potential human errors, making sure all credible errors are considered as well as identifying risk control measures in relation to the reliability on surveillance
…show more content…
It brings information in a framework and provides a good starting point for further analysis to improve surveillance in an environment. It lists specific actions that can or should be taken. Another strength in this technique that it lists the strengths and weaknesses of surveillance in an organisation as well as broader opportunities and threats in the environment. It also helps with prioritising strengths and weaknesses in the organisations surveillance and helps lists possible vulnerabilities so that they can circumvent threats they face. Limitations to this technique include the fact that it only focuses on a single goal without weighing the costs and benefits of employing new surveillance technology to the privacy of individuals. As it is only one state of a business planning process, this technique provides limitations for complex issues and would require more in-depth analysis and research to make decisions. As the SWOT analysis covers strengths and weaknesses , opportunity or threat, it can make it difficult to address factors that could be neither a strength or weakness or …show more content…
In doing this, the organisation would need to examine possible consequences to either avoid or reduce the impact of a surveillance breach and recommend safeguards and contingency plans to prevent errors or detect and correct them. Analysts that use this technique can examine historical data on previous accidents and near miss records in surveillance to find out what happened or what could go wrong and establish if it is currently under better control. By also using a quantitative assessment in this technique, analysts are able to estimate the likelihood of such consequences occurring. What this analytical technique does not cover for organisations in terms of surveillance technology is the consideration of the privacy of individuals. The data analysts collect is strongly dependant on the assumptions they make. Analysts must gather and make sure all credible errors are considered to list all possible predictions. Lack of data can provide a limitation in quantitative assessment if there is lack of data regarding the performance of surveillance technology. This can also affect privacy to individuals if analysts do not take into consideration of their
The SWOT analysis is commonly known as a tool for business analysis. Its main use is for looking at strengths and weaknesses to do with the organisation, current or future opportunities and possible internal and external threats. These can then be dealt with to make them into a positive.
The use of surveillance is becoming increasingly evident around the world. Surveillance is carried out in many different forms from simple methods such as video surveillance to more complex methods such as call and browser monitoring. Although it might seem that surveillance is undeniably convenient when pursuing a criminal or preventing a terrorist attack, it is often misused and many are beginning to question why there
The periodic assessment of risk to agency operations or assets resulting from the operation of an information system is an important activity. It summarizes the risks associated with the vulnerabilities identified during the vulnerability scan. Impact refers to the magnitude of potential harm that may be caused by successful exploitation. It is determined by the value of the resource at risk, both in terms of its inherent (replacement) value, its importance (criticality) to business missions, and the sensitivity of data contained within the system. The results of the system security categorization estimations for each system, is used as an aid to determining individual impact estimations for each finding. The level of impact is rated
Although technology has provided tools to enhance our capabilities in things such as finding a missing person, solving murder cases based on technological assets etc.., this technology also leaves us vulnerable in many ways to slowly losing our privacy (Burten, C., 2012).
Risk assessment and threat assessment should go hand-in-hand.The outcome of the risk assessment and threat assessment should provide recommendations that maximize the protection of confidentiality, integrity and availability while still providing functionality and usability. The purpose of a risk assessment is to ensure sensitive data and valuable assets are protected. An organization should take a hard look at who has access to sensitive data and if those accesses are required. The security audit should monitor the companies systems and users to detect illicit activity.The security audit should
Many will argue that the security measurements the government are taking are going too far, so far that it is being questioned whether privacy is being invaded, Bailey Nunn investigates. T he on-going intractable nature of the “privacy vs. security” debate has, for numerous years, been unresolved. Those who believe in security over privacy intend to make a safer city, whilst others believe that their privacy is being unnecessarily invaded, nevertheless, this topic is argued globally. In many countries, the use of surveillance cameras has become very prevalent, inevitably leading to more privacy issues being raised by citizens. The use of surveillance devices has become so common that it has affected our way of living, we are no longer able
SWOT analysis is a study of the Strengths and Weaknesses (internal factors) of an organization as well as, the study of the Opportunities and Threats (external factors) of an organization (Mind Tools, 2016). After learning the strengths and defining the weaknesses of an organization, the threats can be eliminated making for more opportunities. A strength of CVS is the “pharmacy segment has a diverse network with 7,152 Long drug stores and pharmacy stores generating 68% of the total revenue (Kasi, 2017).” If CVS could team with Wal-Mart pharmacy, the revenue would increase. A weakness of the company is the security. Many robberies have been reported due to the organization and security measures (Kasi, 2017). If the reorganization of the
Liginlal, D., Sim, I., & Khansa, L. (2009). How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management. computers & security, 28(3), 215-228.
Ball, K.S.(2001). Surveillance Society: Monitoring everyday life. Information Technology & People, 14(4), 414-419. Retrieved from http://search.proquest.com/docview/222415193?accountid=32521
Specific Purpose: My purpose of this presentation is to inform listeners about the dangers of government surveillance and why it should be stopped.
4. Apply the strengths, weaknesses, opportunities, and threats analysis (SWOT analysis) on behalf of police
Workplace surveillance has become a controversial issue in the workplace environment. The technological surveillance has developed as a necessity, it doesn’t only help in monitoring what the workers’ do, but it also helps to know how they do it. The modern technological development may have helped the employers’ to have an aerial view of the workplace environment, but it has created a controversy between the employees’ and the employer about the employees’ right to privacy being violated. The employees’ believe the act of workplace surveillance to be hateful that violates their right to privacy and liberties. The surveillance at the workplace often effects workers mental health, productivity, future success in their work and their relationship with the employer, despite being a necessity for the employers’ to protect themselves against the liability, many employers’ in the process of achieving efficiency through surveillance mistakenly ruin their relationship with their employees. The workplace surveillance is helpful in improving the performance of workers or it is contributing towards degrading the performance of workers and their work relationships.
The process of SWOT analysis is a universal method widely approached in corporations to scan the internal and external environment so that companies can deploy relevant countermeasures to make improvements. It contains four elements, they are strengths, weaknesses, opportunities, and threats (Helms & Nixon, 2010).
Information security professional’s job is to deploy the right safeguards, evaluating risks against critical assets and to mitigate those threats and vulnerabilities. Management can ensure their company’s assets, such as data, remain intact by finding the latest technology and implementing the right policies. Risk management focuses on analyzing risk and mitigating actions to reduce that risk. Successful implementation of security safeguards depends on the knowledge and experience of information security staff. This paper addresses the methods and fundamentals on how to systematically conduct risk assessments on the security risks of information systems.
SWOT analysis basically entails identifying and outlining the organization’s strong attributes that are helpful to achieving the objectives(strengths); weak attributes of the organization that are harmful to achieving its objectives (weaknesses); external opportune conditions that are helpful to achieving the organization’s objectives (Opportunities); external conditions that are harmful to achieving the organizations objectives(threats). Basically the organization identifies and strategizes on how to use each strength, stop each weakness, exploit each opportunity and defend itself against each threat in order to maximally achieve their objectives.