Hi, I am looking for someone to write an article on information security management Paper must be at least 2250 words. Please, no plagiarized work! However, with the increase in social networking, this form of cyber harassment is now widely being used in the dissemination of false or misleading information that is primarily targeted at negatively impacting the ability of individuals or business enterprises to conduct their operations (Worksman, Phelps & Gathegi, 2013, p. 472-473).In his sustained attack against EZ company, it can be noted that The, the blogger, seems to have differences in the company and this has resulted in the development of a situation where he is out to try and tarnish the overall reputation and credibility of the company. This attack is a result of a dispute that had begun years earlier between himself, and some of the company’s principals. In a bid to get at the company’s principals, the blogger’s online campaign is attempting to try and discredit the new information integration and visualization technology that is being offered by the company. In the social engineering cyberattack, the blogger touts himself as an expert on information integration and visualization technology. However, he only has a degree in communications and religious studies. The supposition that the blogger is only out to try and tarnish the reputation of the company is amply supported by the fact that although an EZ Company public relations representative once attempted to try and request the blogger to provide the company with direct feedback to help the company in improving its product, the blogger did not provide this feedback and continued with tarnishing the company’s name: To do this, the blogger took bits of the email he had received from the company out of context and after grossly manipulating the fabrication in a “newsletter”, he went on to post it online along with his stated intention of attempting to try and prevent the company from being attacked.&nbsp.