Reflections and Evaluations on Key Issues Concerning Computer Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Security, Ethics, and Privacy

Introduction

Computer networks enable people to communicate and this has created some places that never existed before as this is just a place created in the mind. It is popularly called cyberspace (Mather et al., 2001, p. 55). Ethics is a very philosophical subject where people can determine right or wrong actions. It defines moral codes of certain field of work besides; computer security and privacy have been the main issues that are addressed under this subject.

Security

Even thought the terminology ‘computer security’ is often used, the content in a computer is vulnerable to very few risks except when an individual is connected to a wider network. Since the use of computer has grown over the past few years and more networks are being developed every day, the use of computers and networks has posed greater risks to computer users. This has made the use of the term very common (Mather et al., 2001, p. 55).

The main technical areas that are addressed in computer security concerns are availability, integrity, confidentiality and authenticity (Pfleeger, 2006, p. 700). Confidentiality – this is a factor that addresses privacy or secrecy of information that one has on the computer or computer networks. This concept demands that information should not be accessed by unauthorized person. It is illegal to breach confidentiality since the consequences could be detrimental.

Integrity is a concept that requires information to be safeguarded from unauthorized changes which the official user cannot detect. Hacking is one of the computer crimes that compromise integrity of computer and computer networks (Foxman & Kilcoyne, 1993, p. 106). Authentication is a concept of computer security and ethics in which the user is identified to be exactly who he/she says he/she is.

This concept is very important because sometimes unauthorized users can access the information by stealing identity (Foxman & Kilcoyne, 1993, p. 106). Availability on the other hand is the concept that requires the free unrestricted access to the information by the authorized user (Molie, 2009, para. 2).

Breach of this is often denial of services. Serious issues that are often addressed under this include non repudiation and access control. Access control is a situation whereby legal users are not only denied access to some resources, but also some vital services they are legitimately entitled to. Non repudiation is when a person cannot deny having sent information when he/she actually sent it or vice versa.

Besides the technical aspects, the concept of computer security is very wide and it is greatly embedded in disciplines like privacy and ethics. Under these disciplines, computer crimes are described in terms of things that prevent, detect and remedy attacks and anonymity and identity in computer world.

Cyberspace is a very important aspect of life and many people depend on it for school work, professional works and communication (Molie, 2009, para. 3). For computer users, authenticity, integrity and confidentiality are the commonest problems they have to deal with, while internet users are more prone to issues of privacy invasion and identity problems (Caudill & Murphy, 2000, p. 12).

People often store information on internet as they assume that some of the information they are keeping is not very sensitive or that it is safe (Pfleeger, 2006, p. 701). It is important to note that on the internet, most of the information is easily shared among companies and small pieces of information can be put together to connect the dots and then form something bigger about an individual (Molie, 2009, para. 3). This requires good control over information in that who, how and when to use it is restricted.

Ethics and Privacy

In the current world of technology, information and computer technologies have become central in the fields of industry, healthcare, government and entertainment (Bynum & Rogerson, 2004, p. 63). There are numerous social and economic benefits that have come with these technologies.

However, unlike other types of technologies, computer technology has a number of problems that are unique to it, some which could be very serious and negatively affect individuals and the society at large (Stallings, 2008, p. 83). This creates and poses ethical concerns and there are basically three issues that are the core of this subject.

  1. Personal privacy when working on computers
  2. Harmful activities of the computer
  3. Access rights

Personal Privacy: this allows exchange of information on a large scale among a number of different people, from different places and any time (Deguzman, 2010, para. 2). This situation causes increased possibility of disclosing person information or accessing other people’s private information therefore causing potential of violating privacy (Bynum & Rogerson, 2004, p. 63).

It is a challenge for the common users of the computers or cyberspace to maintain great level of privacy and integrity of information concerning individuals (Mather et al., 2001, p. 55). This means that users should take precautions to make sure that the information is always accurate and also protected from unauthorized access, or disclosure (whether accidental or intentional) to unsuitable users. Concerning ethical usage in computer systems, the access right is highly sensitive issue.

The cyberspace has become very popular in commerce, entertainment, school and government as already stated and this causes ‘access right’ issues to be of great concern. In fact it is a top priority among companies and government departments. The issue is further heightened by computer break-ins in high security places like NASA and US security systems.

There are several reports of attempted illegal access to the US government agencies and military security systems. Hackers pose a major threat to security, identity theft and other cyber crimes (Caudill & Murphy, 2000, p. 12). Harmful activities on the computer system refer to negative impact or injurious consequences like property damage, loss of data, loss of property and other unwanted consequences (Stallings, 2008, p. 83).

This principle therefore prohibits use of computer systems in ways that leads to harm to other people or the government. Some of the unethical actions include modification of other people’s information or programs leading to loss of data and unwarranted expanses like time and money, destruction of people’s information on the computer or network systems and introducing computer virus to systems (Deguzman, 2010, para. 2)

Conclusion

A computer security threat includes any action that might lead to loss of information, data, and damage to the computer hardware, hamper the processes, or cause incompatibility. Many of such actions are usually premeditated and the international infringement of the computer security is a computer crime punishable by law and it should not be confused with cybercrime.

Cybercrime is mainly perpetrated through the internet and of course a computer is mostly used. These crimes are top priorities for law enforcers because of the importance of information in the modern world and also the imminent danger of terrorism. Computer security, ethics and privacy deal mainly with computer crime, how these crimes can be prevented, how to detect them and solution to such unethical attacks.

Besides, privacy also deals with anonymity and identity issues in the cyberspace, and area that has lately made personal information for users vulnerable. For daily internet users, privacy and identity is major concerns however for managers, issues of integrity, authenticity and confidentially are the main concerns and their regulation has to be effective not to compromise any of them.

Reference List

Bynum, T.W & Rogerson, S. (2004). Computer Ethics and Professional Responsibility, Oxford: Wiley-Blackwell.

Caudill, E.M., & Murphy, P.E., (2000). Consumer Online Privacy: Legal and Ethical Issues, Journal of Public Policy & Marketing Vol. 19, No. 1, pp. 7-19.

Deguzman, V., (2010) Computer Security Ethics and Privacy. Web.

Foxman, E.R., & Kilcoyne, P., (1993). Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues, Journal of Public Policy & Marketing Vol. 12, No. 1 (Spring, 1993), pp. 106-119.

Mather, T., Kumaraswamy, S., & Latif, S., (2009). Cloud Security and Privacy, an Enterprise Perspective on Risks and Compliance, O’Reilly Media.

Mollie, C., (2009) Computer Security – What Exactly Is It? Web.

Pfleeger, CP. (2008) Security in Computing, Fourth Edition, Safari Books Online.

Stallings, W., (2008). Computer Security: Principles And Practice, Sydney: Pearson Education.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, March 14). Reflections and Evaluations on Key Issues Concerning Computer. https://ivypanda.com/essays/reflections-and-evaluations-on-key-issues-concerning-computer/

Work Cited

"Reflections and Evaluations on Key Issues Concerning Computer." IvyPanda, 14 Mar. 2019, ivypanda.com/essays/reflections-and-evaluations-on-key-issues-concerning-computer/.

References

IvyPanda. (2019) 'Reflections and Evaluations on Key Issues Concerning Computer'. 14 March.

References

IvyPanda. 2019. "Reflections and Evaluations on Key Issues Concerning Computer." March 14, 2019. https://ivypanda.com/essays/reflections-and-evaluations-on-key-issues-concerning-computer/.

1. IvyPanda. "Reflections and Evaluations on Key Issues Concerning Computer." March 14, 2019. https://ivypanda.com/essays/reflections-and-evaluations-on-key-issues-concerning-computer/.


Bibliography


IvyPanda. "Reflections and Evaluations on Key Issues Concerning Computer." March 14, 2019. https://ivypanda.com/essays/reflections-and-evaluations-on-key-issues-concerning-computer/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1