Journal Entry #3

on

Four ethical issues that arise when storing electronic information about individuals are using individuals’ information, information getting deleted, information can be stolen, and there can be a breach. Individuals’ information is used by websites like Google to enhance two-way interaction and services. Users get convenience and customization while utilizing a software solution. By obtaining their confidential info and enhancing their system, the firm gains from customers. The issue arises, though, when they use that data for improvement. The individual is unaware of the source of the information. They are only aware of the advantages a corporation offers, not its disadvantages. An individual may decide that they want to deactivate their account with a corporation. An individual believes that they have deleted their account, but it may not be deleted. Oftentimes online, users would not be aware if their account was removed or not. One can get an understanding of the possibility of developing an application by learning development. When a user deletes their account, a single field in the database may offer them a false feeling of security. In such cases, the business provides a function that aids users in recovering their accounts. The issue arises when users believe what they see online, yet anything may be believed online if it is not thoroughly checked. Businesses insert adverts on their internet sites, which are frequently operated by a third party, to generate cash. The third party makes use of data to market to consumers potential products. Cookies on websites are responsible for it. Cookies only serve to identify visitors when they visit a website frequently enough to receive customized advertisements. Although blocking cookies is an advantage, certain sites rely on them to keep logged-in users on their sites. Organizations that provide things that users enjoy may profit from the sale of the information, which also makes a smart investment for such businesses. Customers are unaware of network breaches that businesses experience. The issue with data breaches is that businesses must choose between prioritizing the customer’s data by closing the server down and allowing the attack to occur to obtain evidence and/or the locations of the malicious attacker. Exploits and weaknesses in an organization might occur due to a variety of circumstances. Not every cyber-attack is disclosed. The difficulty is that businesses have problems that also require care, and their choices may have an impact on the lives of their customers.

Leave a Reply

Your email address will not be published. Required fields are marked *