Describe four ethical issues that arise when storing electronic information about individuals.
Due to the multiple cybercrime attacks that are targeted at organizations on a daily basis, ethical issues will always be a concern when it comes to storing electronic information about individuals. Four main ethical issues that I see as problems are: privacy, confidentiality, fraud and misuse, and sabotage. Ethical issues will continue to be a concern for people because of the sensitive and vital information that they relay on the internet every day.
Privacy
Privacy has become a major issue due to the fact that multiple users do not have control over how their data is being used. Companies are now gathering people’s data at an alarming rate with policies that force the consumer to give up their personal information without declining unless they do not want to use their services. Once an individual has consented to their data being comprised by an organization, it is now on the web for any individual with malicious intent to seize. Consumers should have the choice of how their data is being used and should educate themselves on the risk that they assume by providing their personal information on the internet.
Confidentiality
Confidentiality issues are central to ethics in cyberspace. Because of the nature of their work, security professionals come into contact with a wide range of sensitive information, including personal, private, and proprietary information. A virus check on a hard drive can yield tasty tidbits about someone’s personal or professional life, but revealing them could jeopardize their career or personal life. Because of the critical information they have at their fingertips, cybersecurity workers should all be professionals.
Fraud and misuse
It’s possible for a computer to generate a unique atmosphere conducive to illicit activity. Traditional titles for these crimes include theft, fraud, embezzlement, extortion, and so on. Forgery on a computer system, theft of money, theft of financial instruments, and theft of services are all examples of computer-related fraud. Theft also involves stealing valuable information.
Sabotage
Computer crimes, such as unlawful use of computer facilities, information alteration or destruction, data file sabotage, and computer system vandalism, can target the computer as a target of assault. Computer sabotage violates the security of your computer and involves altering, damaging, or destroying data, hardware, or software. Short-circuits and bombs have been used to attack computers. Ethical difficulties are difficult to address when these themes are sensationalized with real-life horror stories.
References
- (III) Ethical Issues. (n.d.). 03. (III) Ethical Issues; www.niatec.iri.isu.edu. https://doi.org/03. (III) Ethical Issues
Ethical Issues in Cybersecurity: CompTIA’s Future of Tech. (n.d.). CompTIA’s Future of Tech; www.futureoftech.org. https://doi.org/Ethical Issues in Cybersecurity: CompTIA’s Future of Tech
Chukwube, J. (2022, February 11). Information Security Next-Generation – Infosecurity Magazine. Infosecurity Magazine; www.infosecurity-magazine.com. https://doi.org/Information Security Next-Generation – Infosecurity Magazine