Journal #2

  1. Privacy and confidentiality
    1. Every citizen has the innate right to having personal information about themselves hidden from others. The citizen’s personal information should only be shared with whom they give access to with clear consent. In instances where the citizen is unable to give clear consent, whether that be from lack of presence/communication, mental inability, etc.., consent should only be given by the citizen’s legal guardian or representative.
  2. Security breaches
    1. Security breaches threaten the citizen’s right to privacy when given information is accessed by those who are not given specific permission to do so. This violates the inalienable rights of the citizen and decreases confidence and conviction the given cybersecurity methods. Proper security measures must be in place to protect data integrity.
  3. System Implementation
    1. In order for the citizen’s personal data to be implemented into the system, it must be known and understood by the user doing the data implementation. This often proves an issue because often issues occur during the process of entering the information. It also necessitates the involvement of many other individuals in order to develop and sustain the citizens information. The involvement of so many other factors and individuals leads to a higher risk of the information being breached or tampered with.
  4. Data inaccuracies
    1. It is necessary that the company or organization to whom the citizen is surrendering their personal information will ensure that it has not and will not been tampered with and will remain accurate. Inaccurate representations will lead to a domino effect of problems for the citizen and increased speculation about the validity of said business’ or organization’s reliability.

While the United States has the most issues with phishing attacks, involving when an attacker sends a fraudulent message designed to trick the recipient into revealing personal information, China seems to be one of the countries that are internationally leading in being the source for these phishing attacks. Simultaneously, China seems to be one of the countries having the most cybersecurity issues within their own network as opposed to the United States whose issues mostly come from outward sources.

Leave a Reply

Your email address will not be published. Required fields are marked *