Kindly ADD to CART and Purchase an editable Word file at $5.99 ONLY
Interrogating Technology: Improving Cyber Security for Hospitals in Australia
TITLE of Policy Position Paper:
The proposed topic focuses on enhancing Cyber security for hospitals in Australia by the end of 2018. The stakeholder represented in this case is the hospitals in Australia. Currently hospitals are integrating technology in their daily activities. Therefore, their goal is to ensure that they enhance customer services and at the same time make sure that the patients’ information are safe.
Technology is a significant aspect of the human conditions. Today, people rely on technology for their basic needs. Whether for good or ill purposes, technology is intertwined into people’s lives (MacKenzie & Wajcman, 1999). Technologies are always changing either due to scientific advances or logic of their own. They can have effects on the society as they change (Vanderburg, 2005). The defining rule of the current world involves the revolution of information and communication technology. Cybersecurity refers to a wide range of information technology that deals with security of computer systems by protecting them from theft and damage to both hardware and software components as well as preventing the information stored in them from being disrupted. (Daniel et al 2017). With increasing use of the internet, wireless networks, and smart devices in Australia, computer systems ought to be protected from malpractices by users whether intentional or accidental. For instance, there increase in the number of successful email scams. Using machine learning tools has facilitated the sending of scam emails and makes them appear as legitimate as the real email. This has resulted in instances where some individuals are lured into transferring funds to fraud bank accounts (Davis, M. &Lyons 2010).
Activity theory will be used to investigate the issue of cyber security in hospitals in Australia. The approach is a theoretical framework for the assessment and understanding of human connection through the utilization of tools (Murphy, 2014). It can be used to support qualitative and interpretative study.
Authentication schemes have consistently remained to be a weak link posing danger to businesses and individuals. Passwords are weak links on many systems (Davison, 2004). Using the same password for various accounts is a common practice and makes it easy for cybercriminals to access your information based on previous records (Davis, M. &Lyons 2010). The impact of these security breaches has caused major financial losses to individuals and businesses. Computing firms have connected these losses to hostile digital acts, virus and worm attacks.
Notably, there are conflicting global policies in cyberspace which causes a major concern for computer security community stakeholders such as government agencies and internet users. The antivirus industry lacks web regulations in Australia and also globally leading to complaints about information breach and damage from affected stakeholders (Lim, Joo S., et al. 2015). To this end, there are no common global rules which are used to judge and punish cybercrimes. Local authorities are unable to initiate appropriate actions to prosecute cybercriminals due to lack of guiding laws and policies.
To combat this issue, the government should enact into legislation policies and regulations which forces companies and organizations to significantly protect their computer systems from any threats from cyber-attacks (Agre, P.E. & Rotenberg 1998). Users of the internet in Australia should agree to allow the government to intervene in regulating cyberspace which has always existed as a virtual space. Cybersecurity has become a national issue that all involved stakeholders should allow the government to address (Wynne, Eds.). Many officials and experts within the government think that the government should take action by stepping in and addressing the crucial need to regulate this cybersecurity since the private sector has failed to solve the issue effectively.
The United States adopted a policy to enhance cybersecurity through Computer Fraud and Abuse Act enacted in 1986 which prohibits any unauthorized access to computer systems (Daniel et al 2017). Developing appropriate policies and agencies to prevent cybercrimes, and to punish incriminated culprits would act as the first step towards promoting a better and safer online community that guards the safety of all stakeholders.
The current research will take six months whereby, it will focus on enhancing cyber security in hospitals in Australia. First, the collection of data will be conducted for one month. The timeline will allow to identify the significant resources that focus on the research topic. Sources that will be used in the research include journals, books, and necessary articles that focus on the topic. The books that are significant for the research include technological books. Other resources that will be used include journal of applied research and technology and international journal of Cyber criminology. After collecting data, the research will be drafted. Drafting will take two months to ensure that every information is included in the research paper. Next, the editing process will take two weeks together with proofreading.
Agre, P.E. & Rotenberg, M. (eds.) 1998, Technology and Privacy: The New Landscape, MIT
Press, Cambridge, MA.
Bauchspies, W.K., Croissant, J. & Restivo, S. 2006, Science, Technology, and Society: A
sociological approach, Blackwell, Oxford.
Daniel, Schatz; Rabih, Bashroush; Julie, Wall, 2017, “Towards a More Representative Definition of Cyber Security”. Journal of Digital Forensics, Security, and Law. 12 (2). ISSN 1558 7215. Archived from the original on 30 April 2018.
Davison, A., 2004, ‘Sustainable Technology: Beyond fix and fixation’, in White, R. (Ed.),
Controversies in Environmental Sociology, Cambridge University Press, Cambridge, UK, pp. 132 – 149.
Davis, M. &Lyons, M. (eds.) 2010, Ideas Australia Needs Now, Centre for Policy Development,
Lim, Joo S., et al. 2015 “Exploring the Relationship between Organizational Culture and
Information Security Culture.” Australian Information Security Management Conference.
MacKenzie, D. & Wajcman, J., 1999, ‘Introductory Essay: the social shaping of technology’, in
MacKenzie, D. & Wajcman, J. (Eds.) The Social Shaping of Technology, 2nd ed., Open University Press, Buckingham, pp. 3 – 27.
Top of Form
Murphy, E. (2014). Activity theory perspectives on technology in higher education.
Vanderburg, W.H., 2005, ‘Introduction: Where are we going with technology?’, in Living in the
Labyrinth of Technology, University of Toronto Press, Toronto, pp. 3 – 14.
Bottom of Form
Wynne, B. (Eds.), Misunderstanding science? The public reconstruction of science and
technology, Cambridge University Press, Cambridge, UK, pp. 19 – 46.