RESEARCH PAPER - PART III

Siemen's, Inc.

IX.  CONCLUSION

From the data gathered from the interview, the researchers have concluded that, yes, their means of securing data and keeping information confidential is effective, and in the future will be even more effective as newer innovations is applied. On the other hand, the instruments for access to the Intranet is literally held by the employees and it is still possible that they share their access to the Intranet to unauthorized users by possibly giving out their user name and password and lending their future Key Cards. Therefore, despite having all the technological innovations to ensure privacy and confidentiality in the information world, the choice to expose valuable data for access to confidential information, at the same time endanger the security of the Intranet, is still in the hands of the beholder, the liable authorized users. In other words, there is still no guarantee that the confidentiality of the Intranet is secured.




Research Paper Part I Part II Part III
Martina's E-MAIL Paolo's E-MAIL

HOME PAGE ALL ABOUT ME! FAMILY BONG & TINA FRIENDS COMTECH A52