Verified Document

Securing The Electronic Frontier The Paradox Of Essay

Securing the Electronic Frontier The paradox of how to secure individuals and organizations' right to access the Internet vs. securing personal and corporate data and identities is a particularly complex and challenging issue. The ethicacy of this paradox is most present in the differences between encryption and Pretty Good Privacy (PGP). Too open of standards and governance policies on these areas will often lead to large scale data breaches, as many organizations presume they have greater security over their data than is actually the case (Mikko, 2010). When security guidelines and initiatives are too restrictive, organizations cannot accomplish their objectives either. Making this paradox complex is the ethicacy of asking people and organizations for passwords and access to their accounts (Spinello, 2004). The ethics of trespass vs. legitimate access becomes all the more critical when the complexity, pace and severity of computer fraud perpetrated by globally-based gangs that are well-financed (Mikko,...

Parts of this document are hidden

View Full Document
svg-one

This is dangerous and is one of the strongest catalysts for global governments increasingly attempting to get password access to user's accounts globally. Crime syndicates and gangs, in addition to unscrupulous marketers all attempt to also gain access to potential customers' account through the use of spam and spiders. Both of these forms of communication are clearly forms of electronic trespass. They violate the ethical boundaries of individual freedoms as defined by Kantian, Utilitarian, and Social Contract Theories (Spinello, 2004). Bots, spiders and spam are also unethical from the standpoint of deliberately changing the context of value exchanged and the intentional misuse of the Internet to defraud…

Sources used in this document:
References

Hypponen, Mikko. (2010). Fighting Viruses Defending the Net. Retrieved on June 16, 2012 at http://www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net.html

Miller, A.R., & Tucker, C.E. (2011). Encryption and the loss of patient data. Journal Of policy analysis & management, 30(3), 534-556.

Spinello, R.A. (2011).Cyberethics - Morality and Law in Cyberspace (4th ed.). (4th Ed.). Sudbury, MA: Jones and Bartlett Learning. Chapter 6

Spinello, R.A. (2004). Reading in Cyber ethics (2nd ed.). (4th ed.). Sudbury, MA: Jones and Bartlett Learning. Chapter 5
Cite this Document:
Copy Bibliography Citation

Related Documents

Released by the FBI and
Words: 17274 Length: 65 Document Type: Research Proposal

" Human development- behavioral shifts in human being that tae place during the course of an entire lifespan ("Human Behavior"). Risk Analysis- the activity of determining and analyzing the dangerous natural and human caused negative events. This analysis takes into consideration the risks these event pose to businesses individuals and governments. Within the domain of information technology risk analysis reports are utilized to tailor technology-related objectives with a an organization's business objectives.

Trade Theories to Enhance International Trade
Words: 2044 Length: 6 Document Type: Essay

International Trade Theories International trade may be classified as the trade of capital, goods, and services across international boundaries or areas. In many nations, such trade signifies a substantial share of the country's gross domestic product (GDP). While international trade continues to be present throughout a lot of significant research for trade history (see Silk Road, Amber Road), the fact remains that the over societal, economic and political importance for international

Scholarly Study Edits and Corrections
Words: 26314 Length: 13 Document Type: Multiple Chapters

……Pre-diabetes and Diabetes Early Awareness Education and Its Effects on BMISubmitted by:Nancy L. Gee Comment by Pamela Love: Looks like an interesting project, Nancy.Very good start! Be sure whenever you submit your manuscript that you change wording from �study� to �project� and avoid referring to the project as research. Review carefully for grammar, punctuation, sentence structure, format, or APA errors. Pay close attention to the reviewer�s comments as you continue

Market Orientation and Worldview from Cultural Perspective
Words: 43735 Length: 146 Document Type: Dissertation

Dissertation ManuscriptBySedric K. MorganGeopolitical Awareness and Understanding of the Current Monetary Policies: A Quantitative Study� Northcentral University, 2019 Comment by Author: Sedric � NOTE: take a look at the Turnitin Analysis report. Consider the areas that are closely related to student paper(s) from University of Maryland. I highly suspect this is a matter of improper paraphrasing (by you as well as these other student(s)). The areas are sourced and the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now