Key Issues Concerning Computer Security, Ethics, and Privacy

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Introduction

Computer networks that enhance communication crossways the globe have created a world that never existed before. It is tricky to describe the experience since it merely exists in the minds of users referring to them as cyberspace.

Computers have also made daily tasks uncomplicated as most information is exchanged from one region to the next. Around the globe, people contend with fabricating, saving, and handling crucial data on computers (Shelly, Vermaat, & Quansey et al., 2008).

The issues facing computer use such as defense, ethics, and privacy continue to rise with the advent of extra ways of information exchange.

More importantly, insecurity cases of laptop use have in-depth outcomes on corporate, governments, and individuals. The safety risks of computer use arise from availability of the internet.

This enables attacks via networks and intranets, processor hardware pilfering, unlawful contact and abuse of computer, software thievery, scholarly property theft, and systems malfunction (Shelly et al., 2008).

The above incidences call for rigorous PC maintenance applications capable of safeguarding users against despair from the consequences of risks.

Ethical issues also crop up when people use computers. Morley and Parker note that some moral issues of computer use as utilizing copyrighted materials unethically obtained, principled uses of collaterals and intelligence materials, immoral utilization of digital controls and moral corporate activities and judgments (Morley and Parker, 2009).

Furthermore, computer use raises questions on the right of users to conceal their details from other people. Baldauf and Stair observe the ability of individuals to create several classified and unrestricted databases showing facts about their existence anecdotes including daily behaviors, private hobbies, present locations, and movements.

The accessibility of individuals’ particulars and the occurrence of monitoring technology-utilizing computers raise real concerns regarding individual’s secrecy (Baldauf and Stair, 2010).

Key Computer Security Issues

Issues pertaining to computer security receive great mention in several literatures due to its effects on users including governments, local, global organizations, as well as corporate, and citizens of various countries.

According to Salomon, computer security is a broad knowledge area including PC protection methods against exposure to physical damage elements (Salomon, 2010). In a later literature, other authors observe that computer safety exists since they are quick, truthful, and superior in performing tasks yet lacks acumen (Lehtinen, Russell, & Gangemi, 2006).

They note that this predisposes processors to individuals’ operation in undertaking transgressions. Human beings as well are clever but cannot spot computer-based plots created to defraud them.

Computers are used to propagate identity theft, where persons use identity of others for monetary achievement purporting to be the real individuals. There are also issues of intellectual property pilferage advanced by using computers.

Another issue is organizational information safeguard. Baldauf and Stair note that valuable organization data and documents can be compromise just by hackers thereby resulting into serious losses. They go ahead to cite hacking of Twitter as an example (Baldauf and Stair, 2010).

There is computer crime where information transfer through mysterious electronic way leads to committing fraud. Another security issue is computer crackers or hackers; this is where people intrude by surfing net to find valuable information or program, yet not for fiscal of opinionated rewards (Lehtinen et al., 2006).

Organizations’ outsiders contribute to computer security issues whenever they gain entrée to IT rooms unlawfully to seize valuable information. Physical threats of CPU use such as rush in electrical power; thus ensuing from lightning could spoil processor components. Computer viruses, which conceal itself in an executable file in the computers cause security concerns.

Furthermore, viruses can damage computers, software, alter data, and impede user from effecting tasks. Disclosure threats also take place whenever secretive data hoarded or transferred via a network spread to unofficial receiver.

Email communication also face security problems when unauthorized persons gain access to passwords, spam messages forced people. In addition, hacking social networking account details is more problematic (Belousov).

Other people also advance cyber terrorism where they use computers to bully government or organizations for political or social advantages via the processors, networks, or internet.

To respond to computer security issues users put in place effective defensive capabilities able to protect valuable information. Using passwords, creating backups to protect data, legal expertise and instituting bylaws and policies are applied.

It is certain that computer applications rip off people of their privacy. Computers publicize information of users, which is a colossal attack on confidentiality (Lehtinen et al., 2006).

Key Computer Ethical Issues

Moral values guide every aspect of human life and computer ethics tends to spell out the moral expectations of users. Hacking is one of the ethical issues. Hacking refers to using individual’s computer knowhow to gain access to unauthorized data for malicious reasons (Pollach, 2011). Hacking undermines the efforts of maintaining privacy.

Three aspects of hacking include cyber trespass, vandalism, and piracy. They all qualify as forms of computer crimes. Computer users face ethical dilemmas while performing tasks.

For example, a user may be contemplating whether to copy a program or not. Moral issues also arise on using computer to enhance supervision, observation, recording relating to database exploration, which can be done decently (UCAN, 2011).

Another ethical concern is about privacy, where people wonder whether it is moral for databases to register personal details of people. People also question the morality in using computers to advance criminal activities.

Ethical questions raised on the use of group network sites to put personal details public as it has contributed to private information into the public domain.

Key Computer Privacy Issues

Invasion of people’s privacy through computer use is on the rise and it is upsetting every person. Other people such as hackers, employers, and marketing corporate, could access personal and confidential information (Debatin, Lovejoy, Horn et al., 2009).

Sending email messages is the key way through which assault of people’s privacy flourish. Databases including those of institutions, marketing agencies require users to key in their details including where they live, contacts, names, occupation, and credit card facts. Failure to protect such data amounts to breach of privacy (Morley & Parker, 2009).

The installation of public monitoring techniques aided by computers has improved security a great deal. However, using the technology including video surveillance, CCTV cameras, and convex lenses also contributes to invasion of privacy.

Conclusion

Addressing privacy concerns would be tenable when using a screening technology, which protect users from websites that do not maintain higher standards of privacy.

Users need to be very critical on their credit card details while purchasing items from the websites. It is a warning to computer users against posting excess information about their personal details on the social sites. In addition, users to beware of websites demanding their personal information in exchange of free bees.

Businesses should endear to protect clients’ privacy through establishing precautionary measures for avoiding employees’ accidental or intentional breach of privacy. Finally, implementation of policy legislations on privacy protection, security, and moral concerns on the use of computers needs to take place.

References

Baldauf, K. & Stair, R. (2010). Succeeding with Technology, 4th ed. Massachusetts, MA: Cengage Learning.

Belousov, A. (ND). . Computer Research Crime Center. Web.

Debatin, B., Lovejoy, P., Horn, A., & Hughes, B. (2009). Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences. Journal of Computer Mediated Communication, Vol. 15: 83–108.

Lehtinen, R., Russell, D. & Gangemi, G. (2006). Computer security basics, 2nd Ed. California, CA: O’Reilly Media, Inc.

Morley. D. & Parker, C. (2009). Understanding Computers: Today and Tomorrow, Comprehensive, 12th ed. Massachusetts, MA: Cengage Learning.

Pollach, I. (2011). Online privacy as a corporate social responsibility: an empirical study. Business Ethics: A European Review. Vol. 20, Is.1: 88–102.

Salomon, D. (2010). Element of Computer Security. London: Springer.

Shelly, G., Vermaat, M., Quansey, J., Sebok, S., and Webb, J. (2008). Discovering Computers 2009: Complete. Massachusetts, MA: Cengage Learning.

UCAN. (2011). Fact Sheet 7: . Web.

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!