Key Issues Concerning Computer Security, Ethics, and Privacy Essay
Computer networks that enhance communication crossways the globe have created a world that never existed before. It is tricky to describe the experience since it merely exists in the minds of users referring to them as cyberspace.
Computers have also made daily tasks uncomplicated as most information is exchanged from one region to the next. Around the globe, people contend with fabricating, saving, and handling crucial data on computers (Shelly, Vermaat, & Quansey et al., 2008).
The issues facing computer use such as defense, ethics, and privacy continue to rise with the advent of extra ways of information exchange.
More importantly, insecurity cases of laptop use have in-depth outcomes on corporate, governments, and individuals. The safety risks of computer use arise from availability of the internet.
This enables attacks via networks and intranets, processor hardware pilfering, unlawful contact and abuse of computer, software thievery, scholarly property theft, and systems malfunction (Shelly et al., 2008).
The above incidences call for rigorous PC maintenance applications capable of safeguarding users against despair from the consequences of risks.
Ethical issues also crop up when people use computers. Morley and Parker note that some moral issues of computer use as utilizing copyrighted materials unethically obtained, principled uses of collaterals and intelligence materials, immoral utilization of digital controls and moral corporate activities and judgments (Morley and Parker, 2009).
Furthermore, computer use raises questions on the right of users to conceal their details from other people. Baldauf and Stair observe the ability of individuals to create several classified and unrestricted databases showing facts about their existence anecdotes including daily behaviors, private hobbies, present locations, and movements.
The accessibility of individuals’ particulars and the occurrence of monitoring technology-utilizing computers raise real concerns regarding individual’s secrecy (Baldauf and Stair, 2010).
Key Computer Security Issues
Issues pertaining to computer security receive great mention in several literatures due to its effects on users including governments, local, global organizations, as well as corporate, and citizens of various countries.
According to Salomon, computer security is a broad knowledge area including PC protection methods against exposure to physical damage elements (Salomon, 2010). In a later literature, other authors observe that computer safety exists since they are quick, truthful, and superior in performing tasks yet lacks acumen (Lehtinen, Russell, & Gangemi, 2006).
They note that this predisposes processors to individuals’ operation in undertaking transgressions. Human beings as well are clever but cannot spot computer-based plots created to defraud them.
Computers are used to propagate identity theft, where persons use identity of others for monetary achievement purporting to be the real individuals. There are also issues of intellectual property pilferage advanced by using computers.
Another issue is organizational information safeguard. Baldauf and Stair note that valuable organization data and documents can be compromise just by hackers thereby resulting into serious losses. They go ahead to cite hacking of Twitter as an example (Baldauf and Stair, 2010).
There is computer crime where information transfer through mysterious electronic way leads to committing fraud. Another security issue is computer crackers or hackers; this is where people intrude by surfing net to find valuable information or program, yet not for fiscal of opinionated rewards (Lehtinen et al., 2006).
Organizations’ outsiders contribute to computer security issues whenever they gain entrée to IT rooms unlawfully to seize valuable information. Physical threats of CPU use such as rush in electrical power; thus ensuing from lightning could spoil processor components. Computer viruses, which conceal itself in an executable file in the computers cause security concerns.
Furthermore, viruses can damage computers, software, alter data, and impede user from effecting tasks. Disclosure threats also take place whenever secretive data hoarded or transferred via a network spread to unofficial receiver.
Email communication also face security problems when unauthorized persons gain access to passwords, spam messages forced people. In addition, hacking social networking account details is more problematic (Belousov).
Other people also advance cyber terrorism where they use computers to bully government or organizations for political or social advantages via the processors, networks, or internet.
To respond to computer security issues users put in place effective defensive capabilities able to protect valuable information. Using passwords, creating backups to protect data, legal expertise and instituting bylaws and policies are applied.
It is certain that computer applications rip off people of their privacy. Computers publicize information of users, which is a colossal attack on confidentiality (Lehtinen et al., 2006).
Key Computer Ethical Issues
Moral values guide every aspect of human life and computer ethics tends to spell out the moral expectations of users. Hacking is one of the ethical issues. Hacking refers to using individual’s computer knowhow to gain access to unauthorized data for malicious reasons (Pollach, 2011). Hacking undermines the efforts of maintaining privacy.
Three aspects of hacking include cyber trespass, vandalism, and piracy. They all qualify as forms of computer crimes. Computer users face ethical dilemmas while performing tasks.
For example, a user may be contemplating whether to copy a program or not. Moral issues also arise on using computer to enhance supervision, observation, recording relating to database exploration, which can be done decently (UCAN, 2011).
Another ethical concern is about privacy, where people wonder whether it is moral for databases to register personal details of people. People also question the morality in using computers to advance criminal activities.
Ethical questions raised on the use of group network sites to put personal details public as it has contributed to private information into the public domain.
Key Computer Privacy Issues
Invasion of people’s privacy through computer use is on the rise and it is upsetting every person. Other people such as hackers, employers, and marketing corporate, could access personal and confidential information (Debatin, Lovejoy, Horn et al., 2009).
Sending email messages is the key way through which assault of people’s privacy flourish. Databases including those of institutions, marketing agencies require users to key in their details including where they live, contacts, names, occupation, and credit card facts. Failure to protect such data amounts to breach of privacy (Morley & Parker, 2009).
The installation of public monitoring techniques aided by computers has improved security a great deal. However, using the technology including video surveillance, CCTV cameras, and convex lenses also contributes to invasion of privacy.
Addressing privacy concerns would be tenable when using a screening technology, which protect users from websites that do not maintain higher standards of privacy.
Users need to be very critical on their credit card details while purchasing items from the websites. It is a warning to computer users against posting excess information about their personal details on the social sites. In addition, users to beware of websites demanding their personal information in exchange of free bees.
Businesses should endear to protect clients’ privacy through establishing precautionary measures for avoiding employees’ accidental or intentional breach of privacy. Finally, implementation of policy legislations on privacy protection, security, and moral concerns on the use of computers needs to take place.
Baldauf, K. & Stair, R. (2010). Succeeding with Technology, 4th ed. Massachusetts, MA: Cengage Learning.
Belousov, A. (ND). Definition of Computer Piracy, Carrying Out Expert Examination. Computer Research Crime Center. Retrieved from http://www.crime-research.org/articles/Belousov0604/
Debatin, B., Lovejoy, P., Horn, A., & Hughes, B. (2009). Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences. Journal of Computer Mediated Communication, Vol. 15: 83–108.
Lehtinen, R., Russell, D. & Gangemi, G. (2006). Computer security basics, 2nd Ed. California, CA: O’Reilly Media, Inc.
Morley. D. & Parker, C. (2009). Understanding Computers: Today and Tomorrow, Comprehensive, 12th ed. Massachusetts, MA: Cengage Learning.
Pollach, I. (2011). Online privacy as a corporate social responsibility: an empirical study. Business Ethics: A European Review. Vol. 20, Is.1: 88–102.
Salomon, D. (2010). Element of Computer Security. London: Springer.
Shelly, G., Vermaat, M., Quansey, J., Sebok, S., and Webb, J. (2008). Discovering Computers 2009: Complete. Massachusetts, MA: Cengage Learning.
UCAN. (2011). Fact Sheet 7: Workplace Privacy and Employee Monitoring. Retrieved from https://www.privacyrights.org/consumer-guides/workplace-privacy-and-employee-monitoring
And in spite of myself, a prayer formed inside me, a prayer to this God in whom I no longer believed. Oh God, Master of the Universe, give me the […]
Romanticism is a form of art that contains many types. It started in the late 18th century inside Europe. Romanticism had a certain influence on politics. In order to pursue […]
Everyone’s life is extremely valuable. However, a person who does not believe in himself or herself, is doomed and needs to keep his or her honor, or is being forced, […]
Trauma survivors often cope by investing their entire energy into silencing and suppressing the harrowing events of the past. One such survivor is Anton Steenwijk, the protagonist of Harry Mulisch’s […]
It is perfectly natural to put yourself first. In Macbeth’s case he maybe takes this to the extreme. Digging into the future is a dangerous game; this story is a […]
Emily Dickinson was acclaimed as one of the greatest poets of the nineteenth century. She got popularity only after her death when her sister found her poems and got them […]
What defines one as innocent? Innocence is often supplementary to youth, ignorance, and naivety; and the loss of innocence occurs when exposed to the evils of the world. Corruption can […]
Humanity is best known for confusing one thing for another and doing things in the name of following cultural guidelines or social expectations. But, is that action justified? Is it […]
A comedy is a play, script or a live performance meant to entertain the audience and make people laugh. Comedy comprises of jokes and satirical lines. Subversive comedy and social […]
Introduction Computer networks that enhance communication crossways the globe have created a world that never existed before. It is tricky to describe the experience since it merely exists in the […]