Tuesday, December 3, 2019
Reflections and Evaluations on Key Issues Concerning Computer
Security, Ethics, and Privacy Introduction Computer networks enable people to communicate and this has created some places that never existed before as this is just a place created in the mind. It is popularly called cyberspace (Mather et al., 2001, p. 55). Ethics is a very philosophical subject where people can determine right or wrong actions. It defines moral codes of certain field of work besides; computer security and privacy have been the main issues that are addressed under this subject.Advertising We will write a custom essay sample on Reflections and Evaluations on Key Issues Concerning Computer specifically for you for only $16.05 $11/page Learn More Security Even thought the terminology ââ¬Ëcomputer securityââ¬â¢ is often used, the content in a computer is vulnerable to very few risks except when an individual is connected to a wider network. Since the use of computer has grown over the past few years and more networks are being develope d every day, the use of computers and networks has posed greater risks to computer users. This has made the use of the term very common (Mather et al., 2001, p. 55). The main technical areas that are addressed in computer security concerns are availability, integrity, confidentiality and authenticity (Pfleeger, 2006, p. 700). Confidentiality ââ¬â this is a factor that addresses privacy or secrecy of information that one has on the computer or computer networks. This concept demands that information should not be accessed by unauthorized person. It is illegal to breach confidentiality since the consequences could be detrimental. Integrity is a concept that requires information to be safeguarded from unauthorized changes which the official user cannot detect. Hacking is one of the computer crimes that compromise integrity of computer and computer networks (Foxman Kilcoyne, 1993, p. 106). Authentication is a concept of computer security and ethics in which the user is identified t o be exactly who he/she says he/she is. This concept is very important because sometimes unauthorized users can access the information by stealing identity (Foxman Kilcoyne, 1993, p. 106). Availability on the other hand is the concept that requires the free unrestricted access to the information by the authorized user (Molie, 2009, para. 2). Breach of this is often denial of services. Serious issues that are often addressed under this include non repudiation and access control. Access control is a situation whereby legal users are not only denied access to some resources, but also some vital services they are legitimately entitled to. Non repudiation is when a person cannot deny having sent information when he/she actually sent it or vice versa. Besides the technical aspects, the concept of computer security is very wide and it is greatly embedded in disciplines like privacy and ethics. Under these disciplines, computer crimes are described in terms of things that prevent, detect a nd remedy attacks and anonymity and identity in computer world.Advertising Looking for essay on computer science? Let's see if we can help you! Get your first paper with 15% OFF Learn More Cyberspace is a very important aspect of life and many people depend on it for school work, professional works and communication (Molie, 2009, para. 3). For computer users, authenticity, integrity and confidentiality are the commonest problems they have to deal with, while internet users are more prone to issues of privacy invasion and identity problems (Caudill Murphy, 2000, p. 12). People often store information on internet as they assume that some of the information they are keeping is not very sensitive or that it is safe (Pfleeger, 2006, p. 701). It is important to note that on the internet, most of the information is easily shared among companies and small pieces of information can be put together to connect the dots and then form something bigger about an individual (Molie, 2 009, para. 3). This requires good control over information in that who, how and when to use it is restricted. Ethics and Privacy In the current world of technology, information and computer technologies have become central in the fields of industry, healthcare, government and entertainment (Bynum Rogerson, 2004, p. 63). There are numerous social and economic benefits that have come with these technologies. However, unlike other types of technologies, computer technology has a number of problems that are unique to it, some which could be very serious and negatively affect individuals and the society at large (Stallings, 2008, p. 83). This creates and poses ethical concerns and there are basically three issues that are the core of this subject. Personal privacy when working on computers Harmful activities of the computer Access rights Personal Privacy: this allows exchange of information on a large scale among a number of different people, from different places and any time (Deguzm an, 2010, para. 2). This situation causes increased possibility of disclosing person information or accessing other peopleââ¬â¢s private information therefore causing potential of violating privacy (Bynum Rogerson, 2004, p. 63). It is a challenge for the common users of the computers or cyberspace to maintain great level of privacy and integrity of information concerning individuals (Mather et al., 2001, p. 55). This means that users should take precautions to make sure that the information is always accurate and also protected from unauthorized access, or disclosure (whether accidental or intentional) to unsuitable users. Concerning ethical usage in computer systems, the access right is highly sensitive issue. The cyberspace has become very popular in commerce, entertainment, school and government as already stated and this causes ââ¬Ëaccess rightââ¬â¢ issues to be of great concern. In fact it is a top priority among companies and government departments. The issue is furt her heightened by computer break-ins in high security places like NASA and US security systems.Advertising We will write a custom essay sample on Reflections and Evaluations on Key Issues Concerning Computer specifically for you for only $16.05 $11/page Learn More There are several reports of attempted illegal access to the US government agencies and military security systems. Hackers pose a major threat to security, identity theft and other cyber crimes (Caudill Murphy, 2000, p. 12). Harmful activities on the computer system refer to negative impact or injurious consequences like property damage, loss of data, loss of property and other unwanted consequences (Stallings, 2008, p. 83). This principle therefore prohibits use of computer systems in ways that leads to harm to other people or the government. Some of the unethical actions include modification of other peopleââ¬â¢s information or programs leading to loss of data and unwarranted expanses li ke time and money, destruction of peopleââ¬â¢s information on the computer or network systems and introducing computer virus to systems (Deguzman, 2010, para. 2) Conclusion A computer security threat includes any action that might lead to loss of information, data, and damage to the computer hardware, hamper the processes, or cause incompatibility. Many of such actions are usually premeditated and the international infringement of the computer security is a computer crime punishable by law and it should not be confused with cybercrime. Cybercrime is mainly perpetrated through the internet and of course a computer is mostly used. These crimes are top priorities for law enforcers because of the importance of information in the modern world and also the imminent danger of terrorism. Computer security, ethics and privacy deal mainly with computer crime, how these crimes can be prevented, how to detect them and solution to such unethical attacks. Besides, privacy also deals with anony mity and identity issues in the cyberspace, and area that has lately made personal information for users vulnerable. For daily internet users, privacy and identity is major concerns however for managers, issues of integrity, authenticity and confidentially are the main concerns and their regulation has to be effective not to compromise any of them. Reference List Bynum, T.W Rogerson, S. (2004). Computer Ethics and Professional Responsibility, Oxford: Wiley-Blackwell. Caudill, E.M., Murphy, P.E., (2000). Consumer Online Privacy: Legal and Ethical Issues, Journal of Public Policy Marketing Vol. 19, No. 1, pp. 7-19.Advertising Looking for essay on computer science? Let's see if we can help you! Get your first paper with 15% OFF Learn More Deguzman, V., (2010) Computer Security Ethics and Privacy. Web. Foxman, E.R., Kilcoyne, P., (1993). Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues, Journal of Public Policy Marketing Vol. 12, No. 1 (Spring, 1993), pp. 106-119. Mather, T., Kumaraswamy, S., Latif, S., (2009). Cloud Security and Privacy, an Enterprise Perspective on Risks and Compliance, Oââ¬â¢Reilly Media. Mollie, C., (2009) Computer Security ââ¬â What Exactly Is It? Web. Pfleeger, CP. (2008) Security in Computing, Fourth Edition, Safari Books Online. Stallings, W., (2008). Computer Security: Principles And Practice, Sydney: Pearson Education. This essay on Reflections and Evaluations on Key Issues Concerning Computer was written and submitted by user Ahmad Q. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.