Identify And Describe The Important Ethical Issues In Computer Security Term Paper

¶ … Ethical Issues in Computer Security The ubiquity of information systems, more particularly those that are internetworked, has provided for better personal lives and enabled business to operate more efficiently and effectively ever than before. Congruent to the rise of various information systems and the information technologies that drive thereto is the challenges posed by these emerging and constantly evolving technologies and systems particularly in the milieu of ethics in computer security. Thus, these modern innovations, while requiring protection to ensure the confidentiality, integrity and availability of which, need to balance the requirements of security and ethical issues. Numerous ethical issues abound when it comes to computer security or implementing information security. Information systems raise new ethical questions for both individuals and societies because they create opportunities for intense social change, and thus threaten existing distributions of power, money, rights, and obligations (Laudon & Laudon, 2008, p. 128). These ethical issues in computer security range from privacy rights, acceptable use of computer resources, ownership...

...

Organizations nowadays, whether public or private, hold not only personal and confidential information of various individuals or entities but also corporate proprietary information. By having information of this nature, there are concerns as to who accesses the information and to whom the organization grants the access. Fortunately, there are legislations that govern how the information will be disseminated and to whom. From these legislations, organizations developed policies aligned therein to ensure that only identified and authorized individuals and entities can have access or can be provided the information. For instance in the United States, medical records and other health related information are "covered by HIPAA, and so any breach will be first considered a legal issue, not an ethical one (Pfleeger & Pfleeger, 2007, p. 701)." However, if the person misusing or misappropriating…

Sources Used in Documents:

Bibliography:

Laudon, K.C. & Laudon, J.P. (2008). Management information systems: Managing the digital firm, 10th ed. New York: Prentice-Hall.

Pfleeger, C.P. & Pfleeger, S.L. (2007). Security in computing, 4th ed. Upper Saddle River, NJ: Pearson Education, Inc.


Cite this Document:

"Identify And Describe The Important Ethical Issues In Computer Security" (2011, August 16) Retrieved April 23, 2024, from
https://www.paperdue.com/essay/identify-and-describe-the-important-ethical-44010

"Identify And Describe The Important Ethical Issues In Computer Security" 16 August 2011. Web.23 April. 2024. <
https://www.paperdue.com/essay/identify-and-describe-the-important-ethical-44010>

"Identify And Describe The Important Ethical Issues In Computer Security", 16 August 2011, Accessed.23 April. 2024,
https://www.paperdue.com/essay/identify-and-describe-the-important-ethical-44010

Related Documents

The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010). C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it

Now that people interact with social media on their wireless phones, that opens up a whole new series of issues, hence those involved in the law and with the ethical issues will "need to abandon some of the presumptions we once made in e-contracting in light of peoples' changing behavior" (Moringiello). Meanwhile, what exactly constitutes Internet abuse in the workplace and what role does ethics play? There are some working

Computer Security People, process and technology are three things which are involved in information security. Biometrics, passwords and firewalls are some of the technical measures and these are not enough in justifying threats to information. In order to protect information from destruction and to secure systems, a blend of different procedures is required. While deploying information security some factors need to be considered for instance processes like de-registration and registration

Social, Legal and Ethical Issues of Social Networking Website Facebook There has been an amazing growth of the social networking sites and their impact in the lives of the users is phenomenon. Facebook which has over 250 million users has influenced the lives of many users in meaningful ways allowing them to connect and stay in touch while socializing through innovative platforms. Facebook is therefore raised several social, ethical and legal

Polish Companies Reacted to Ethical Issues and Changes in Business Standards Since the Fall of Communism in 1989? Poland's Economy Pre-Communism's Fall Poland's Natural Resources Minerals and Fuels Agricultural Resources Labor Force The Polish Economy Under Communism System Structure Development Strategy The Centrally-Planned Economy Establishing the Planning Formula Retrenchment and Adjustment in the 1960s Reliance on Technology in the 1970s Reform Failure in the 1980s Poland's Economy After the Fall of Communism Poland After the Fall of Communism Fall of Communism Marketization and Stabilization Required Short-Term Changes Section

Security in Cloud Computing
PAGES 10 WORDS 3274

Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination