Introduction
As a new generation of computing systems, cloud computing faces ethical issues transitioning from traditional ones. While resolving problems such as the high costs of operation and scalability, the way cloud systems operate leads to ethical issues. Ethics in cloud computing is influenced by T&C, an agreement that defines the rights and responsibilities of users, cloud providers, and third parties (Sargolzaei & Nikbakht, 2017). This paper will look at possible ethical issues, such as personal privacy violations, abuse of personal data, access rights, and harmful actions (Sargolzaei & Nikbakht, 2017). Problems are considered from the perspective of different ethical theories: deontology, utilitarianism, and virtue ethics.
Background Analysis
Each ethical theory provides a different perspective on the best way of dealing with data ethics. Herschel and Miori (2017) conducted an exercise and effectively analyzed the ethics of data security according to selected views, including Virtue Ethics, Deontological Ethics, and Utilitarianism. Kantian ethics or deontological theory tells how people are to act in a situation from the concept of duty. In contrast, virtue ethics is the theory where the morality of the virtues is placed into the limelight. Thus, it tells people what virtues they should hold. Utilitarianism suggests that actions are determined to be right or wrong based on consequences (Roby, 2018). It considers achieving the profit of the highest number of people possible as the right side.
Respective solutions about paying explicit attention to ethics must be provided by all main stakeholders of the cloud computing industry. De Bruin and Floridi (2017) mention the governments, investors, and private and business cloud users as critical stakeholders. In general, the parties concerned can be divided into a cloud service provider (CSP) and a cloud user (CU) (Verma & Adhikari, 2020). From deontological theory, CUs are interested in improving consent practices for data collection and use and implementing legal penalties related to data leakage (Faragardi, 2017). For CSPs, from a practical perspective, the analysis of the ethics of data would be challenging to perform. Due to the difficulty of determining all the advantages and disadvantages of using data.
The ethical values that unite CUs and CSPs should include transparency, responsiveness, and accountability. Accountability provides information about how data is processed within the cloud, and the appropriation of responsibility is key to enforcing ethics rules in cloud computing. Despite the ethical complexities, cloud technologies have a significant social impact, accelerating the exchange of information, reducing costs and barriers for businesses, and increasing opportunities for ordinary users and organizations.
Legal Recourse Available in Australia
Australia-wide IT legislation covers various topics, including content regulation, gambling, e-commerce, and Internet privacy. Concerning data collection, relevant documents include the industry code on “the Protection of Personal Information of Customers of Telecommunications Providers” and the Privacy Commissioner’s “National Principles for Fair Handling of Personal Information” (Razaque & Rizvi, 2017). In addition, there are Notified Data Breach Laws that oblige businesses and CSPs to report the incident to the government and all users of the service and customers in the event of a data breach. Responsibility for the violation of private information rests with the offender and CSPs, except for disclaimers certified by customers (Watts & Casanovas, 2019). However, each economic area has industry-specific regulations that differ in severity, distribution of responsibility, and compliance process.
Proposed Solutions
IT data security is a complex and controversial topic because the Internet provides an open environment for information exchange. It is challenging to create solid barriers, so every CSP and CU bears the risk of using cloud storage. Mamonov and Benbunan-Fich (2018) propose to create a system for educating ordinary Internet users, starting from school. Their research shows that the behavior of trained users improves private data protection levels and reduces the likelihood of a security breach (Mamonov & Benbunan-Fich, 2018). Thus, one of the possible solutions to the problem is thorough and systematic preparation of CUs and shifting part of the responsibility to them.
Another area is working with CSPs to improve the quality of cybersecurity. It is possible that if a company stores personal data, it may be legally required to ensure that they are maintained by cybersecurity specialists (Creese et al., 2021). Many businesses skimp on this option by bringing the situation to a data breach and only then taking steps to improve data protection. The existence of a data protection department, protocols, and special measures must be verified and certified before a company can collect personal data.
Case Study
Each person during his life gives personal information to different structures. Imagine College H, which has electronic records of students, including their medical and mental status. It is unlikely that someone will attack the college database, but a negligent employee, K, mistakenly publishes student data in the public domain. While the school is not working, all this information is in the public domain and available for download to any Internet user. That can prevent this situation by having a permanent or visiting cybersecurity specialist. Usually, in this case, an access encryption system is set up, making it difficult to transfer and publish information and radically reducing user error likelihood.
Conclusion
The IT sphere in general and cloud computing are new areas of social interaction in which the interests of different stakeholders intersect. This situation raises ethical problems associated with collecting, processing, and storing personal information. Most often, IT companies and businesses bear all the costs of compliance with the privacy policy, which is partly a fair requirement. However, modern Internet users must learn the basics of cybersecurity, as their behavior on the Internet affects the likelihood of a security break.
References
Creese, S., Dutton, W. H., Esteve-Gonzalez, P., & Shillair, R. (2021). Cybersecurity capacity-building: Cross-national benefits and international divides.Journal of Cyber Policy, 6(2), 214-235. Web.
De Bruin, B., & Floridi, L. (2017). The ethics of cloud computing.Science and Engineering Ethics, 23(1), 21-39. Web.
Faragardi, H. R. (2017). Ethical Considerations in Cloud Computing Systems.Proceedings, 1, 166. Web.
Herschel, R., & Miori, V. M. (2017). Ethics & Big Data.Technology in Society, 49, 31-36. Web.
Mamonov, S., & Benbunan-Fich, R. (2018). The impact of information security threat awareness on privacy-protective behaviors.Computers in Human Behavior, 83, 32-44. Web.
Razaque, A., & Rizvi, S. S. (2017). Privacy preserving model: A new scheme for auditing cloud stakeholders. Journal of Cloud Computing, 6(1), 1-17.
Roby, B. (2018). Virtue Ethics, Deontology, and Consequentialism. Student Research Submissions. 292. Web.
Sargolzaei, E., & Nikbakht, M. (2017). The ethical and social issues of information technology: A case study. International Journal of Advanced Computer Science and Applications, 8(10), 138-146.
Verma, G., & Adhikari, S. (2020). Cloud computing security issues: a stakeholder’s perspective. SN Computer Science,
Watts, D., & Casanovas, P. (2019). Privacy and Data Protection in Australia: a critical overview. In W3C Workshop on Privacy and Linked Data. World Wide Web Consortium.