Verified Document

Identify And Describe The Important Ethical Issues In Computer Security Term Paper

¶ … Ethical Issues in Computer Security The ubiquity of information systems, more particularly those that are internetworked, has provided for better personal lives and enabled business to operate more efficiently and effectively ever than before. Congruent to the rise of various information systems and the information technologies that drive thereto is the challenges posed by these emerging and constantly evolving technologies and systems particularly in the milieu of ethics in computer security. Thus, these modern innovations, while requiring protection to ensure the confidentiality, integrity and availability of which, need to balance the requirements of security and ethical issues. Numerous ethical issues abound when it comes to computer security or implementing information security. Information systems raise new ethical questions for both individuals and societies because they create opportunities for intense social change, and thus threaten existing distributions of power, money, rights, and obligations (Laudon & Laudon, 2008, p. 128). These ethical issues in computer security range from privacy rights, acceptable use of computer resources, ownership...

Organizations nowadays, whether public or private, hold not only personal and confidential information of various individuals or entities but also corporate proprietary information. By having information of this nature, there are concerns as to who accesses the information and to whom the organization grants the access. Fortunately, there are legislations that govern how the information will be disseminated and to whom. From these legislations, organizations developed policies aligned therein to ensure that only identified and authorized individuals and entities can have access or can be provided the information. For instance in the United States, medical records and other health related information are "covered by HIPAA, and so any breach will be first considered a legal issue, not an ethical one (Pfleeger & Pfleeger, 2007, p. 701)." However, if the person misusing or misappropriating…

Sources used in this document:
Bibliography:

Laudon, K.C. & Laudon, J.P. (2008). Management information systems: Managing the digital firm, 10th ed. New York: Prentice-Hall.

Pfleeger, C.P. & Pfleeger, S.L. (2007). Security in computing, 4th ed. Upper Saddle River, NJ: Pearson Education, Inc.
Cite this Document:
Copy Bibliography Citation

Related Documents

Ethical Problem of Personally Identifiable
Words: 1417 Length: 5 Document Type: Term Paper

Nonetheless, internet breach occurs routinely; further steps need to be taken. Options for resolving these issues Part of the issue revolves around ambivalent ways of defining PII as well as the fact that the constructs of identity are still in flux. PII, at one moment, can become non-PII during the next, and the reverse is the case, too. Moreover, computer science has shown that, in many instance, data that is consider

Security Management the Role of a Security
Words: 4672 Length: 15 Document Type: Essay

Security Management The role of a security manager varies widely according to the particular organization and its needs, but despite this variety, there remain certain best practices and policies that can help maintain security and stability. This is nowhere more true than in the case of organizational loss, because while loss can mean widely different things depending on the field, the underlying theoretical concepts which inform attempts to minimize loss are

Ethics of Computing
Words: 6467 Length: 20 Document Type: Term Paper

Copyright Infringement & the Digital Millennium Copyright Act (DMCA) of 1998 This paper looks into the issues of copyright infringement and circumvention of technology with reference to Digital Millennium Copyright Act of 1998. The author of this paper has carefully studied the law in question and has focused on various issues connected with this legislation. DMCA is a highly controversial law that has been staunchly opposed and actively supported by different

Thematic Analysis of Security Issues
Words: 20201 Length: 78 Document Type: Dissertation

Security Study Travel and tourism are major industries in European countries such as Greece. The hotel industry is dedicated to making the accommodations for their patrons as enjoyable as possible. This means ensuring that hotel guests, visitors, and staff have a safe and secure environment. It is for this reason that many of the larger hotel chains have their own private security personnel who are entrusted to maintain the safety of

Computer Law
Words: 1015 Length: 3 Document Type: Term Paper

Computer Fraud and Abuse Act was enacted into law in 1986 to deal with the hacking of computer systems operated by the American government and certain financial institutions. Through its enactment, the legislation made it a federal offense to access a protected computer without authorization or to an extent that is beyond the authorized access. However, since it was passed into law, the act has been amended severally in attempts

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Document Type: Term Paper

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now