Regulation of IT Risk
In order to regulate the IT risk, governments work to address threat to computer crime. For example, representatives of 29 countries - including Canada, Japan and the U.S. – signed the Council of Europe Cybercrime convention in 2001. The convention deals with substantive and procedural cybercrime law. The substantive defines the following activities as crimina
2. What business risks does Blue Nile face that may threaten its ability to satisfy stockholder expectations? What are some examples of control activities that the company could use to reduce these risks? Are some of the risks faced by Blue Nile difficult to reduce through control activities? Explain.
There are so many risk factors for Blue Nile, but main risk factors a
, to spread information rapidly and to provide the wrong information.
The reason of out of risk about absolutism in U.S
because broader guarantee freedom of expression and freedom of assembly in media than any other countries.
Mass media has never appointed to the inspection agency by people.
if the mass media gets out of their own function, it should be changed new power or vested rights
Recent Situation
“ internal information security attacks are outgrowing external
attacks at the world’s largest financial institutions”
(The Global Security Survey): Only 20% of the respondents in security survey strongly
believed that Information security should be a CEO-level priority
Ernst and Young(2004)
2) IT liability risk management
: The corporations should install f
The reinforced citizen's role for keeper
The reason of out of risk about absolutism in U.S
because broader guarantee freedom of expression and freedom of assembly in media than any other countries.
Mass media has never appointed to the inspection agency by people.
if the mass media gets out of their own function, it should be changed new power or vested rights