ePortfolio #2

  1.  Describe four ethical issues that arise when storing electronic information about individuals. There are many ethical issues that arise when storing an individual’s information in online systems. Four main ethical issues that come to light when discussing this topic are privacy and confidentiality, security breaches, system implementation, and data inaccuracies. Privacy and confidentiality acknowledge that individuals have a right to keep their information and data confidential. When storing massive amounts of data into a system, people have a right and trust that they are the only ones allowed to access the data. Security breaches refer to the issue that people’s data stored online is at a potential security risk. Storing people’s private information in an online system could possibly be compromised putting those individuals at risk so it is best to have a strong security network protecting all of the data. There are constant attempts to breach online systems around the world so maintaining a strong and secure network is imperative in order to protect people’s information. System implementation discusses the emphasis that organizations must put on developing a proper data implementation process. If an organization lacks this, it could face wasted resources, frustrated providers, and loss of confidence in its users so it’s very important that organizations establish efficient data implementation processes. The last issue is Data inaccuracies. Data inaccuracies are the act of storing incorrect data in the system. This can be extremely harmful to people so organizations should do everything to avoid this. 
  2. Compare cybersecurity risks in the U.S. and another country. When comparing cybersecurity threats around the world, the United States is the highest with china at second place. The US has become the main target around the world because of its industries, tech companies, data storage, ect which really appeals to cybercriminals. China is also a popular cybercrime target due to its fast-growing technological systems. This shows how it is essential for the US to develop extremely secure networks to protect from the vast number of cybercriminals.

Leave a Reply

Your email address will not be published. Required fields are marked *