This website uses cookies to ensure you have the best experience. Learn more

Ethics And Information Security Essay

1074 words - 4 pages

Ethics and Online Source Information
What is Ethics?
In my opinion, ethics give people free will to make right choices. People have free will to make choices that are governed with responsibility, accountability, and liability. We have a responsibility to perform in an ethical manner and be accountable for our choices or actions. Regardless of the circumstances and choices we make, there are consequences if we make the wrong choice. The question of whether an action or choice is ethical or not is fundamentally based on whether something is right or wrong. From an ethical standpoint, unethical choices and risky behavior can lead to increased liabilities. The liabilities result in the loss or damage sustained by a company or other party as result of an unethical and sometimes illegal decision. Although we exercise free will on a continuous basis, we are governed by the decisions we make and my belief is that the decisions we make daily do not just affect us. These decisions affect other people, such as family, friends, coworkers, instructors, neighbors, etc. The most prominent example of ethics can be recognized in the field of technology based on the growing amount of rapidly changing legislation and acts that under consideration in order to protect people from unethical practices.
One of the most recent examples of ethics and technology conflicts in the United States are privacy issues and how we cite, distribute and publish intellectual property on the internet. For instance, many corporations and people take advantage of the open access of the internet and the lack of legislation governing the right to post and upload information to the internet. Today, nearly every household in the United States has a computer with internet access and faces the challenge of ethical or unethical choices about the information they view and download. A majority of the problems we face today can be traced back to use of the internet regardless of whether it was for work or personal use. Crimes such as identity theft can be considered as data breaches because they are unauthorized, sabotage, manipulation, and fraud. How we deal with ethical dilemmas when confronted with decisions about how to treat confidential and personal information are the basis for business ethics. We should never hurriedly make decisions and lessen the severity of ethical dilemmas. Instead we should carefully to consider the facts, values, stakeholders involved, options available, and the potential loss or profit that will result from your choices or actions.
Why is regulation needed?
The current legislation exists because a large percentage of the population has exhibited unethical behavior that warrants legal intervention to prevent this behavior from reoccurring and to punish repeat offenses.
Regulations such as The Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA) have recently made headlines. My interpretation of the Stop Online Piracy Act (SOPA) is that it protects...

Find Another Essay On Ethics and Information Security

Information Security and Clout Testing Challenges

893 words - 4 pages availability is major concern. Security challenges: Information Security takes a whole new dimension when it goes out of the customer’s in-house location and becomes a part of external domain space shared with multiple customers. As cloud supports multi-tenancy, the test team needs to do an extensive set of security testing to make sure data is secured not only from internet attack but also from other customers sharing same cloud. Data security

An Evaluation of Information Security and Risk Management Theories

2183 words - 9 pages An abundance of information security and risk management theories are prevalent; however, it can be difficult to identify valid and applicable theories. In the reading to follow, several information security and risk management theories are evaluated. These theories are presented and employed via various frameworks, models, and best practice guidelines. An assessment of sufficient research pertaining to these theories is addressed, along with

Security and Consumer Protection in the Information Age

3706 words - 15 pages in a very long time. But thanks to the hard work, good will and a whole lot of people trying to make some money we have come up with ways to defend ourselves from those individuals attempting to use the Internet as a channel to prey on your personal information from afar. Within the research, analysis and implementation of a system of defense from these "criminerds" lays the very heart of information technology policy as it applies to security

The National Security Agency and its Access to Private Information

2417 words - 10 pages By simply looking at a computer screen, it has the ability to track her people’s familial, political, professional, and religious associations. Does this statement sound like a line from a cheap science fiction book written by a paranoid author? Unfortunately, “it” already exists. This entity is the United States Government’s National Security Administration. (Rubenfeld) Through programs codenamed Prism (Edward Snowden), Dishfire, and Prefer

Solution for the IT Security Banking and Ethics

911 words - 4 pages , and an e-commerce site you are registered at gets hacked, there’s a good chance someone will be reading your email soon. Literature review There are several issues related to the IT security, banking, and the ethics while handling the IT computing related. IT has brought a huge change to the humanity state whether in term of how the information being stored, the security of how the information being protected and how the ethics while handling

Code of Ethics in Computing and Information Systems

1400 words - 6 pages Ethics are the moral principles by which we govern our lives. Ethics are an important part society because without them the general population that we call society would behave no better than the general population in prison. With this said, Ethics in computing and information systems are the behaviors that are considered acceptable by users and the functionality of the system being used. The information that passes through an information

Computer Security, Defines encryption and explain how it is used to protect transmission of information

886 words - 4 pages computer, minicomputer, microcomputers or some combinations?Ø What information technologies might be useful for this application?Some of the security issues, are consist of the level of security required and the cost involved in this conversion. A database system is vulnerable to criminal attack at many levels. Typically, it is the end user rather the programmer who is often (but not always) guilty of the simple misuse of applications. Thus

Information Security: The Strength and Vulnerabilities of The Trusted Platform Module

1318 words - 5 pages Progressive technological development has paved the way for the ever increasing addition of multiple disparate devices. Devices which have the capability to connect to each other over a network affording them the ability to communicate with ease. Unfortunately the improved proficiency for communication carries with it a negative impact on information security. This detriment comes through the increased possibility of data loss and vulnerability

An analysis of strategic role of information systems, specific social, ethical and legal issues, IT infrastructure and emerging technologies, and information systems security within FedEx Corporation

5469 words - 22 pages Date: 4 April, 2010To: Mr. WillsonFrom: Wang Qin and Xin Jun FangSubject: Strategic role of information systems, specific social, ethical and legal issues, IT infrastructure and emerging technologies, and information systems security within FedEx CorporationEnclosed you will find my analysis with regard to four sections of this report, namely strategic role of information systems, specific social, ethical and legal issues, IT infrastructure and

BYOD in the Enterprise and Health Organizations and  The Affection in Personal and Organizational Privacy Security Information

1413 words - 6 pages implement BYOD, organizations need to establish a chain of infrastructural systems for information and technological software to operate effectively and securely. In the meanwhile, privacy security issues emerge to the surface for both personal and organizational information. The utilization of BYOD increased sharply for all profit and non-for-profit organizations within the past few years. The data collected by Cisco company and The International

the identification and analysis of information system in the business enterprise at each management level, the suitability of information system for the chosen firm, the security of the information...

3968 words - 16 pages REPORT INTRODUCTION: In this modern time, it is impossible to run a business without any information system. Whether the business is small or large, information system is very much needed for the survival of the business. This report will deal with the identification and analysis of information system in the business enterprise at each management level, the suitability of information system for the chosen firm, the security of the

Similar Essays

Information Security: Security Acts And Effectiveness

2438 words - 10 pages rely and have increasingly become reliant on technology to conduct business operations (Herath, Herath, & Bremser, 2010). Consequently, security measures are necessary to protect organizational information from both inside and outside entities of an organization. The protection and security of organizational information is under constant threat and mitigation measures are necessary to ensure information is protected from unauthorized users

Information Security In America And Sweden

1583 words - 6 pages and professional implications of information security, we will compare the United States of America to Sweden and identify and differentiate between the two countries major national laws, regulations and ethics. Identification of Major National American Laws and regulations affecting the practise of information security The objective of having information security is to guarantee an effective policy which is imposed through various

New Hire Onboarding And Information Security Essay

1179 words - 5 pages New employees, full-time or non-employee contractors, present a number of risks in regards to information security. These risks can be mitigated with well-designed and thorough interview and onboarding processes. An organization’s human resources department must have guidelines in place for interviewers and hiring managers to follow to allow for high-risk potential candidates to be filtered out prior to hiring. The importance of information

Internet And A Business' Information Security

1945 words - 8 pages Ensuring the security of a businesses’ information and assets is a critical part of a company’s success. The many facets of the World Wide Web have made protecting data a critical function for companies world-wide. Companies owe it to their customers to maintain proper security regarding sensitive information obtained when processing services or storing sensitive data. Electronic commerce, or E-Commerce for short, is a type of industry where