Verified Document

Identify And Describe The Important Ethical Issues In Computer Security Term Paper

¶ … Ethical Issues in Computer Security The ubiquity of information systems, more particularly those that are internetworked, has provided for better personal lives and enabled business to operate more efficiently and effectively ever than before. Congruent to the rise of various information systems and the information technologies that drive thereto is the challenges posed by these emerging and constantly evolving technologies and systems particularly in the milieu of ethics in computer security. Thus, these modern innovations, while requiring protection to ensure the confidentiality, integrity and availability of which, need to balance the requirements of security and ethical issues. Numerous ethical issues abound when it comes to computer security or implementing information security. Information systems raise new ethical questions for both individuals and societies because they create opportunities for intense social change, and thus threaten existing distributions of power, money, rights, and obligations (Laudon & Laudon, 2008, p. 128). These ethical issues in computer security range from privacy rights, acceptable use of computer resources, ownership...

Organizations nowadays, whether public or private, hold not only personal and confidential information of various individuals or entities but also corporate proprietary information. By having information of this nature, there are concerns as to who accesses the information and to whom the organization grants the access. Fortunately, there are legislations that govern how the information will be disseminated and to whom. From these legislations, organizations developed policies aligned therein to ensure that only identified and authorized individuals and entities can have access or can be provided the information. For instance in the United States, medical records and other health related information are "covered by HIPAA, and so any breach will be first considered a legal issue, not an ethical one (Pfleeger & Pfleeger, 2007, p. 701)." However, if the person misusing or misappropriating…

Sources used in this document:
Bibliography:

Laudon, K.C. & Laudon, J.P. (2008). Management information systems: Managing the digital firm, 10th ed. New York: Prentice-Hall.

Pfleeger, C.P. & Pfleeger, S.L. (2007). Security in computing, 4th ed. Upper Saddle River, NJ: Pearson Education, Inc.
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now