Free Essay

Focus Paper on Cyber Ethics

In: English and Literature

Submitted By ashiscool60
Words 871
Pages 4
Definition: When the technology gets out ahead of us, then we have to work hard on our policies and ethical guidelines to catch up with this new technology.
Data: The area of computer ethics covers a wide range of topics, many of the specific issues fall into one or more of several major categories: privacy, ownership of information, and security. The distinction between public and private is central to the American democratic tradition, for the private domain has long been consider the domain within which individuals freedom is most fully exercised. Computer-based technologies allow governments, corporations, and even individuals to collect certain amount of information about people. Using computers at home and work, individuals leave a huge amount of information about themselves, their reading and buying habits, their business dealings, their personal likes or dislikes. Several people ask if there should be a limit on the power of individuals, corporations, and governments to acquire such information. The growth of computer power and storage, coupled with the vast increase in the amount of information stored in databases, has opened the door to powerful database searches that reveal more about individuals than they would have believed possible. Encryption plays an important role as well. If criminals and terrorists can use encryption they can effectively prevent the government from monitoring their communications. Since digital media can be shared so easily and cheaply and without diminishing the original and without loss of quality, who has the right to copy such items like music and video. In the age of internet, responsibility has become more diffused in several ways. Who has the responsibility to protect customers from cyber stalkers or pornography or unwanted advertisements? Computers systems often decide who gets credit for a loan, in some cases they even decide when a missile is to be fired. To whom do we attribute the responsibility when something goes wrong? As computer-driven systems become increasingly independent responsibility becomes more and more elusive. Computers have also benefited our education with the software such as PowerPoint. Medicine has largely been reshaped into a computer-based technology of testing and this too has had an impact of the relationship between physician and patient. Increasing, we are turning to computerized voting machines, but then there is no original ballot against which to check votes but computer checks assure us that there has been no tampering. Will computers reach the point where they are in charge?
Position: I consider privacy to be an important aspect when it comes to cyber ethics. I wouldn’t want a stranger to find out everything about me and try to do harmful things to me. Although I think it would be handy for the government to try to track down someone who committed a crime, but to have someone actually stalk a person is really unethical. The use of databases should only be used for storage and safety of people. For example, people shouldn’t just search for someone just to stalk them. I don’t like the idea of criminals and terrorists using encryption and effectively prevent the government from monitoring their communications. In my opinion the use of digital media shouldn’t be prohibited but I think people should just buy the right to use that video or song. It’s like going to a store and stealing a c-d People shouldn’t go online and illegally download music that they didn’t pay for. The way I see things are that everyone has a responsibility of how they conduct themselves whether it is online or in person. People should be respectful and conducted themselves in polite way. Computers shouldn’t be making life threatening decisions like when a missile should be fired. I do like the way computers have changed the way we learn things. The new software PowerPoint has really changed the way children learn topics. I think the idea of using computers when testing medicine is better than using animals.
Consequences: The consequence of letting the government using database systems to track down criminals would be if the database got into the wrong hands and that person started tracking down innocent people. Of course everyone has different opinions on how digital media should be used, but people should just think if they were the one who created that song or picture wouldn’t you want someone to pay for that if there are going to use it. The idea of using computers to set off a missile is okay, but again what if you made a mistake you would be killing several innocent people. Using computers for school is a great thing, but some kids still don’t have computers or internet access yet due to their families income. Although using computers can also be problem for some schools because kids would be getting on sites they shouldn’t be on or just messing around playing games all the time.
Plan of Action: Honestly, I can’t do anything about the way people conduct themselves online or prevent people from stealing information from companies databases because I don’t even know how people do it. Perhaps, if I was one of those people who knew a lot about computers I could possibly help companies out so their information wouldn’t get stolen.

Similar Documents

Premium Essay

Cybersecurity

...EXECUTIVE SUMMARY This paper details the importance of cyber security in the face of evolving cyber threats and the ever-increasing attacks on government and businesses alike. We live in a globally connected world and globally distributed cyber threats. Not restricted by geographical boundaries these threats target all technologies, service providers, and consumers. The threats are at an all-time high, in terms of sophistication and volume, and continue to trend upwards. WHAT IS CYBERSECURITY? Twenty years ago businesses did not think twice about cyber security. In a world of mainframes and dumb terminals with no connectivity to anything outside, viruses, malware, and hacking was unheard of, however, with the introduction of the Internet things have now changed. The term cyber security is getting more and more mixed usage lately, so much so that it is almost as ambiguous as the term "cloud". Cyber security, referred to as information technology security, is the focus on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction. Cyber security also encompasses ten different security domains. The following domains provide a foundation for security practices and principles: • Access Control - to maintain information confidentiality, integrity, and availability, it is important to control access to information. Access controls prevent unauthorized users from retrieving, using, or altering information. They are...

Words: 1611 - Pages: 7

Premium Essay

Ethical Issues Facing Information Technology

...always ethical. If we were all always ethical, there would be no need to discuss ethical matters. Rather, we sometimes do things that are not fair, not right, and not in the best interest of humanity or sometimes, ourselves. This research paper focuses on the ethical issues facing information technology. I will be identifying examples of those ethical issues, situations in which they occur, and helpful ways in which organizations can avoid abuse and catastrophes. Introduction Ethics is defined as moral principles that govern a person or group’s behavior. (insert reference) Now that we know the definition of ethics, then what are ethics in information technology? Ethics in information technology are a set of moral principles that police the use of computers and all forms of telecommunications used to receive, send, and store information. With the rise of information technology, more and more professionals have encountered ethical issues in the workplace and finding out there are situations in which ethical problems are becoming more prevalent. Some examples include; (1) problems with privacy and confidentiality, (2) computer security, and (3) computer crimes and computer related crimes. This paper will focus on these examples. Problems With Privacy and Confidentiality Information privacy is the right of an individual to determine what information is collected about them and how it is used. Some people are not......

Words: 1562 - Pages: 7

Free Essay

Cyberspace

...Affiliation A Different Word: Subcultures in Cyberspace The way people organize, govern and create meaning in their lives is associated with social patterns that link to other cultures. This describes the study of sociocultural anthropology. This brief essay will examine: Egao, cyberpunk, queer and ethnic cyber-subcultures and relate them to sociocultural anthropology. This field of study as several concerns from the environment to health issues, however, the main in terms of cyber-subcultures deals with social change. Social change can be described as any event that causes a dramatic change immediately or over time. The presence of the Internet and cyberspace has already caused several changes in society. Facebook (FB), Twitter and other social media sights have made it possible to connect with people from different states and countries in seconds. It also makes it possible to find lost friends and reconnect with distant family members. There are opportunities to play games, exchange video files and stream live footage. The possibilities are seemingly endless. Within this new frontier of freedom along with social media Egao can be found. Egao Egao can be defined as a cyber-subculture in satire with the mainstream (Zhang, 2010). It can be accessed from mobile phones and other electronic devices. There are several forms which include: text, audio, image, or video. This particular sub-culture has become a means of free expression for the younger generation......

Words: 1018 - Pages: 5

Premium Essay

Most Important Cybersecurity Vulnerability Facing It Managers Today: You and I

...Most Important Cybersecurity Vulnerability Facing IT Managers Today: You and I Cybersecurity vulnerabilities in the early years generally revolved around problems with computer hardware and software with no solid definition of what a vulnerability really was, much less which vulnerability would take home the “Most Important Vulnerability” title. In his thesis proposal on “Computer Vulnerability Analysis”, Krsul (1997, p. 2) starts his “Definition of Vulnerability” section by delving into the fact that there was no industry accepted definition that precisely defines “computer vulnerability.” Krsul goes on to ask us to review three of the most commonly accepted definitions of the day—remember, this is 1997!—that he will use to form the basis of this thesis (Krsul, 1997, pp. 2-3): 1. Bishop and Bailey define a vulnerability as “a characterization of a vulnerable state which distinguishes it from all non-vulnerable states.” (Bishop & Bailey, 1996, p. 2). Their report focuses on computer vulnerabilities from a state configuration view where computers are state devices, and a vulnerability is any flaw in software that allows a user (whether authorized or unauthorized) to transition the system from an “authorized state” to an “unauthorized state.” We commonly reference these types of vulnerabilities today as buffer overflow vulnerabilities, input validation vulnerabilities, improper system configuration, etc. 2. Longley and Shain define a vulnerability using several......

Words: 3201 - Pages: 13

Premium Essay

Wk5 - Final Journal Assignment

...Week 5: Final Paper Journal Assignment Carol Hickman PHI445: Personal & Organization Ethics Instructor: Kristine Ouzts June 15, 2015 Thesis statement for the Boys & Girls Club of America (BGCA) Not-for-Profit Company This paper will evaluate how the BGCA honor their commitment to assist young people at reaching their potential of becoming productive, caring responsible citizens using motivation, education and encouragement. The ethical issue that BGCA faces is maintaining the virtues and image of the BGCA and the challenges related to disenfranchised youth of today. The ethical theories of deontology, utilitarian and relativism will be examined to resolve how BGCA will honor their mission statement with an ethically proper solution. Background The BGCA is a 501(c) 3 (nonprofit) organization and their donations are tax deductible. The BGCA’s mission is to ‘To enable all young people, especially those who need us most, to reach their full potential as productive, caring responsible citizens.’ The BGCA has over 4000 youth affiliated clubs throughout the U.S., Native lands and military installations worldwide. The BGCA started in 1860 in Hartford, Connecticut with three women and for more than 150 years, BGCA has been helping kids grow and thrive. The moral character of the three women whom started BGCA is a great example of the virtue theory. Taking boys off the streets into their homes to provide a positive alternative is a selfless act of kindness.......

Words: 2676 - Pages: 11

Premium Essay

Media and Its Responsibilities

...demoralizing, desensitizing, and false. Young people and adults alike are trying to navigate through their lives and through the world with a broken compass. The role media plays in issues such as self-worth, bullying, and suicide need to be addressed and revised. I will discuss media and its role and responsibility through the perspective of both a classical and contemporary ethical theory. The classical theory that will be discussed is virtue ethics, which is the study of the virtuous character of a person (Mosser, 2010, p.1.7). The contemporary theory that will be discussed is emotivism, which is basing one’s moral decisions on one’s feelings and emotions (Mosser, 2010, p.1.8). Concluding, I will discuss which theory is closer to my own personal view and why I chose that particular theory. While freedom of speech and personal connection are very important, age appropriate moral standards should be upheld in the media because media plays a significant role in suicide, bullying, and self-worth. According to Mosser (2010), virtue ethics seeks to find “not what makes an act good but what makes a person virtuous” (p.1.7). Indeed, a virtuous person has and shows high moral standards. So if media plays the role of a super peer in multiple realms, shouldn’t media also exemplify these same high moral standards? Healthy balances with proper limits need to be enforced with mass media and society. One way to do this...

Words: 2617 - Pages: 11

Premium Essay

Cybercrime Law, Regulation, Effects on Innovation

...Cybercrime Law, Regulation, Effects on Innovation Human Aspects in Cybersecurity: Ethics, Legal Issues, and Psychology CSEC 620 9024 Summer Semester May 18, 2015 Table of Contents Introduction 1 The Role of the Government in Protecting National Security 1 Acceptance of Government Intervention on Protecting National Security 2 Reaction to the Security Intervention on the Private Sector 3 Impacts/Effects of Government Regulations to Private Industries 4 Compliance Measures to Protect National Security 5 Responsibility to Protect National Security 5 Conclusion 6 Introduction Government has the responsibility to protect its national security and citizen. This could be done by providing policies and procedural guidance to private industries. This relationship between government and private industry are not conflict immune as the balance between protecting the national interest and invading privacy is in question. Senior management from the private industry caught in between making the right decision to protect their customer or investing in cyber security. This research paper covers the impact of government regulations, security laws, and legal concepts on the private sector to protect national security and its interpretation and acceptance by the public. The Role of the Government in Protecting National Security The US government invested a lot to protect its critical infrastructure from cyberattack by creating and implementing......

Words: 1899 - Pages: 8

Free Essay

Strategic Communications

...Running head: Strategic Communications Strategic Communications its implications in Corporate Social Responsibility, especially as it relates to the United States Military Social Responsibility and Ethics Management MGMT 325 1 November 2008 Abstract The purpose of this paper is to inform the readers of Strategic Communications and its implications in corporate social responsibility especially as it relates to the United States Military and specifically how the United States Air Force is utilizing Strategic Communications to decisively influence worldwide audiences in efforts to either diffuse or prevent aerospace crisis. Strategic Communications, its implications in Corporate Social Responsibility, especially as it relates to the United States Military Wow, now if that is not a mouthful, it is no wonder why today and in the future we are going to rely more and more heavily on what we say versus what we actually accomplish. I reiterate we must remember it is what and how we say things that are most remembered not how we acted. The ability to affect change in a memorable voice is accomplished through an ever growing medium known as Strategic Communications, which is defined by the Defense Science Board (2004) as “a vital component of U.S. national security. It is in crisis, and it must be transformed with strength of purpose that matches our commitment to diplomacy, defense, intelligence, law enforcement, and homeland security.” It is also......

Words: 2346 - Pages: 10

Free Essay

No Title

...increasingly complex tools and technologies. These ethical challenges can be managed by Islamic code of life. In this paper, we have studied and tried to identify, how computer affects the ethical issues of the society. In this regards, we have traced some highly related issues to the ethics of computer usage, namely – misuse of time, honesty and integrity, privacy, security, intellectual property right, and computer crime. We have also tried to explain these issues in the light of Qur’an and Hadith. At the end of this paper, we have also suggested some measures that can help in promoting proper use of computer facilities by the Muslim masses without compromising the Islamic principles. Keywords : islamic ethics, computer ethics, privacy, security, computer crime. GJCST-G Classification: K.8.m Ethical Issues in Computer use A Study from Islamic Perspective Strictly as per the compliance and regulations of: © 2013. Abdul Kadar Muhammad Masum. This is a research/review paper, distributed under the terms of the Creative Commons Attribution-Noncommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/), permitting all non-commercial use, distribution, and reproduction inany medium, provided the original work is properly cited. Ethical Issues in Computer use: A Study from Islamic Perspective Keywords : islamic ethics, computer...

Words: 5242 - Pages: 21

Premium Essay

Profit vs Freedom of Speech

...or broken. On the small scale, such as a local grocery, ethics of the owners and employees can be easily maintained because the area they are operating in shares the same values. This, however, is not the case with global businesses. Instead of a local community for profits large businesses rely on the global market, thus exposing and challenging their original ethics for the sake of continued profits. This cross-cultural perspective will examine a recent example of this challenge when the company Google began to expand into the Chinese and other Asian markets. Google is a multi-billion dollar company that was started in the garage of two Stanford students in 1997 (Google, 2012). The initial goal was to produce an internet search engine that would be able to find and provide access to an immeasurable amount of information. Since its inception, Google published several values that were believed to be the essence of the company. Among them were that all focus should be on the user of the product and that any ad revenue should not come at the users cost, examples include pop-up advertising and manipulated searches (Google, 2012). Google also started with a relaxed approach to business, believing that employees worked better when comfortable, and that information should be shared. As Google expanded from its humble beginning, the company took on a larger and larger role in the community as a role model for business ethics. The company stayed true to their initial objectives,......

Words: 1206 - Pages: 5

Premium Essay

The Importance of Network Security to Safeguard Organizational Proprietary Data

...Running head: Network Security The Importance of Network Security to Safeguard Organizational Proprietary Data Donald Shipman Strayer University Dr. Kwang Lee June 10, 2012 Abstract Cyber-criminal activity is on the rise in a world that thrives on the use of technology in everyday living. The close-minded thought process of simple theft of a credit card number or a social security number are long gone. Crimes in today’s business are much more extreme to include attacks that disable key functions of major operations such as public transportation and utilities, to the major financial records of customer information being exposed and stolen. In this paper I will focus on the latter. It is important that companies make significant investment in network security in order to protect its proprietary data from hackers and other criminals. I will address current attitudes toward network security, the rise in and recent increase in criminal activity, existing counteractive measures along with their effectiveness and the direction of network security for organizations in the future. Ultimately, the paper will show the importance of network security in organizations and the immediate change is needed to restore the consumer confidence about their information being safe. Introduction The Internet has become a staple of the business world today. One might find it impossible to be current on the latest world events without being able to effectively use it, navigate it, and......

Words: 2112 - Pages: 9

Premium Essay

Annotated Bibliography

...to use artificial intelligence agents to help identify persons of interest and allow local law enforcement, along with the companies, to monitor these agents. Annotated Bibliography Dulek, R., Motes, W., & Hilton, C. (1997), Executive Perceptions of Superior and Subordinate Information Control: Practice versus Ethics. Journal of Business Ethics Vol. 16, pgs.1175-1184 This entry examines the ethical practices of leaders in a business and their employees involving information control within a business. Specifically it examines whether these executives know if control is being performed and if they deem it ethical. The statement “…executives are generally drawn to those command activities they deem to be "proper and right." but shy away from those that are iniquitous.” R. Dulek has authored six books and publishes more than forty journal articles. He is currently a professor at John R. Miller School of Business at the University of Alabama. W. Motes is a Marketing professor at the same university and has had articles appear in twelve business journals. C. Hilton is...

Words: 1878 - Pages: 8

Free Essay

Assignment

...Cyber and Traditional Bullying Victimization as a Risk Factor for Mental Health Problems and Suicidal Ideation in Adolescents Rienke Bannink1, Suzanne Broeren1, Petra M. van de Looij – Jansen2, Frouwkje G. de Waart2, Hein Raat1* 1 Department of Public Health, Erasmus University Medical Center Rotterdam, Rotterdam, the Netherlands, 2 Municipal Public Health Service Rotterdam area, Rotterdam, the Netherlands Abstract Purpose: To examine whether traditional and cyber bullying victimization were associated with adolescent’s mental health problems and suicidal ideation at two-year follow-up. Gender differences were explored to determine whether bullying affects boys and girls differently. Methods: A two-year longitudinal study was conducted among first-year secondary school students (N = 3181). Traditional and cyber bullying victimization were assessed at baseline, whereas mental health status and suicidal ideation were assessed at baseline and follow-up by means of self-report questionnaires. Logistic regression analyses were conducted to assess associations between these variables while controlling for baseline problems. Additionally, we tested whether gender differences in mental health and suicidal ideation were present for the two types of bullying. Results: There was a significant interaction between gender and traditional bullying victimization and between gender and cyber bullying victimization on mental health problems. Among boys, traditional and cyber bullying......

Words: 6925 - Pages: 28

Premium Essay

Information Technology

...for disaster recovery. Ethics, Privacy, and Information Security LEARNING OBJECTIVES rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 71 WEB RESOURCES Student Web site www.wiley.com/college/rainer • Web quizzes • Lecture slides in PowerPoint • Author podcasts • Interactive Case: Ruby’s Club assignments WileyPLUS • All of the above and... • E-book • Manager Videos • Vocabulary flash cards • Pre- and post-lecture quizzes • Microsoft Office 2007 lab manual and projects • How-to animations for Microsoft Office • Additional cases CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources What’s in IT for me? ACC FIN MKT OM HRM MIS rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 72 72 Chapter 3 Ethics, Privacy, and Information Security Opening Case NASA Loses Secret Information for Years The Business Problem Over the past decade, U.S. government agencies have been the victims of an unprecedented number of cyber-attacks. One government official noted, “It is espionage on a massive scale.” Government agencies reported almost 13,000 security incidents to the U.S. Homeland Security Department during fiscal year 2008, triple the number from two years earlier. The National Aeronautics and Space Administration (NASA) (www.nasa.gov) is one of the hardest-hit agencies. The government agency responsible for the nation’s public space program, NASA, has been the target of cyber-espionage dating back......

Words: 25389 - Pages: 102

Free Essay

Internet

...N Gene A Cooks EDCI 573 Instructional Lesson Plans On Digital Citizenship Content: Digital Citizenship Grade level: 9-12 Introduction: The lesson plans that I have created here will be designed to educate students about digital citizenship. The lesson will help students learn how to Interact with others online in an ethical manner. These lessons are established for high school students. The main idea in these seven lessons is to bring awareness to the seven of nine elements to digital citizen. The seven elements that will be taught are: Digital Commerce, Digital Communication, Digital Literacy, Digital Etiquette, Digital Law, Digital Rights and Responsibilities, Digital Health and Wellness Digital Security. The lessons are meant to examine and discuss the ethical approach to all these elements. Each activity, game, reading, quiz and video will help students make better choices while engaged in the world of digital citizenship. It is very important that students in the 21st century and beyond be taught these concepts, so they are protected and make appropriate decisions online. There are thirty-five students in my class with the addition of one English Learner; one special needs student and two GATE students. The duration of each lesson will be approximately forty-five minutes. The student diversity in my class will be accommodated through cooperative learning activities, peer coaching, and feedback and checking for understanding. The formative......

Words: 4102 - Pages: 17