Wednesday, May 6, 2020

Ethics and Information Security Essay - 1125 Words

Ethics and Online Source Information What is Ethics? In my opinion, ethics give people free will to make right choices. People have free will to make choices that are governed with responsibility, accountability, and liability. We have a responsibility to perform in an ethical manner and be accountable for our choices or actions. Regardless of the circumstances and choices we make, there are consequences if we make the wrong choice. The question of whether an action or choice is ethical or not is fundamentally based on whether something is right or wrong. From an ethical standpoint, unethical choices and risky behavior can lead to increased liabilities. The liabilities result in the loss or damage sustained by a company or other party†¦show more content†¦A majority of the problems we face today can be traced back to use of the internet regardless of whether it was for work or personal use. Crimes such as identity theft can be considered as data breaches because they are unauthorized, sabotage, manipulation, an d fraud. How we deal with ethical dilemmas when confronted with decisions about how to treat confidential and personal information are the basis for business ethics. We should never hurriedly make decisions and lessen the severity of ethical dilemmas. Instead we should carefully to consider the facts, values, stakeholders involved, options available, and the potential loss or profit that will result from your choices or actions. Why is regulation needed? The current legislation exists because a large percentage of the population has exhibited unethical behavior that warrants legal intervention to prevent this behavior from reoccurring and to punish repeat offenses. Regulations such as The Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA) have recently made headlines. My interpretation of the Stop Online Piracy Act (SOPA) is that it protects the original owner of content or intellectual property from online piracy and theft. The online content or intellectual property is protected by copyright laws to prevent others from claiming it as original work. The Protect IP Act (PIPA) is an act which prevents someone from stealing the original owner’s content or intellectual property and profitingShow MoreRelatedEthical Issues Of Securing Data Security1682 Words   |  7 PagesName: Yesu Devendra Kumar Meruvu CUW ID: F00439850 Assignment: Term Project - Project 3 1. Topic: Data Security 2. Working Title: Ethical issues in Securing Data 3. Thesis Statement: In this paper the primary motive is to provide the ethical issues related to data security. This paper provides the ethical issues facing by the individuals even the security of the applications is so high. 4. Abstract: Ethical issues are the major concern in todays secured data communication and electronic commerceRead MoreThe Ethics And Ethics, Prevention And Protection1459 Words   |  6 PagesThe Security professional is a must to understand the law and ethics, prevention and protection, security issues and controlling the risk associated with the programs. The report would present the governance, policies, the implementation and procedures and the standards ensures the security of the organization. The main aim is to control the risk to an extent, so the organization can withstand and protect the organization assets from being attacked are very crucial and while working with the sensitiveRead MoreEssay about Solution for the IT Security Banking and Ethics807 Words   |  4 Pagesthe IT security banking and ethics There are several solutions for the Islamic banking, IT security and ethics in where their practices should not contradict with the teaching of al-Quran but at the same time implement the technology to improve banking service to the society. Below are the solutions that might be suitable for the banking services to implement Islamic ethics in the business and their security perspectives. What you should do and don’t during practices ethics and security in banking:Read MoreEthics And The Enhanced Interrogation Techniques1726 Words   |  7 PagesETHICS AND THE ENHANCED INTERROGATION TECHNIQUES Introduction The military and the government security organs normally apply numerous methods in obtaining critical information about criminal activities. Some of these techniques are considered acceptable by the human rights and other non-governmental organizations while others are considered as violating the human rights as stated by the constitution of major countries and states. There has been a strong debate on the use of these techniques and manyRead MoreInformation Systems : Computer Ethics1525 Words   |  7 PagesBIS- 601 INFORMATION SYSTEMS COMPUTER ETHICS Submitted by Lakshmi Gajjarapu Student id: 665584 Global Id: gajja1l Email:gajja1l@cmich.edu INTRODUCTION: As the use of Computers have increased now-a-days with improvements in the technology which brings both advantages and disadvantages. Advantages comes with technological developments and disadvantages are like frauds happening using technology. These frauds using technology are called â€Å"Cyber-attacks† where intruders or hackersRead MoreAn Effective Information Security Program1289 Words   |  6 Pageson information security, by making them take the initiative in protecting information. This creates an information security culture in which everybody undertakes accountability for security. Chen, Ramamurthy, and Wei-Wen support the idea that while building the mindset of a security consciousness culture may be a long-term process SETA programs offer substantial support building a security culture within organizations (Chen, Ramamurthy, Wei Wen, 2015, p. 18). A decent information security programRead MoreEthics : Ethical And Ethical Values1591 Words   |  7 Pages1. Wha t is ethics? How are ethical values formed? Can ethics be taught or changed? Explain why ethics are important to MIS. How do ethics relate to laws and to codes of conduct? What are Kohlberg’s Six Stages of Moral Development and how does that relate to ethics in MIS? Ethics is defined as the branch of philosophy that involves organizing, defending and endorsing the concepts of right and wrong behavior. Several factors contribute to the formation of ethical values of an individual including familyRead MoreEthical Concerns Of Computer Technology1440 Words   |  6 Pagesconcerns in computing. However there is a constant change in nature and in technology. Therefore, change creates a difficulty in what specific moral codes are to be followed when viewing the region of computer technology, moreover it is a necessity that ethics be considered when making decisions in this specific region. Computing or in other words the use or operation of computers (Bowles, M. D. 2013). Has created a whole new set of ethical concerns, different in its own way. For example, Software TheftRead MoreLegal Ethical and Regulatory Issues1479 Words   |  6 PagesWebsites. Business ethics examines ethical rules and principles within a commercial context involved in e-comme rce are faced with the same if not more legal issues as any other business; these issues include, but are not limited to jurisdiction, contract, and legitimacy in the banking. Banks such as Wells Fargo, Wachovia, and Bank of America using Websites to conduct electronic commerce should adhere to the same ethical standards that other businesses follow. (Schneider, 2004). Ethics play an integralRead MoreCyber Crimes, Moral And Ethical Implication1664 Words   |  7 Pagesindustry. According to Richard Power (editorial Director of the computer Security Institute, San Francisco CA), the â€Å"love bug† virus is estimated at a billion of dollars. There are a lot of viruses causing damages in companies everyday so we cannot undoubtedly single out one crime because all kind of crimes are posing serious threat to people and businesses. Most of computer crimes are committed by professional who know the computer ethics. This work seeks to underline the moral and ethical implication of

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.