1. Describe four ethical issues that arise when storing electronic information about individuals.
2. Compare cybersecurity risks in the U.S. and another country.
1. When one is storing personal information of users there can be a multitude of possibilities and problems, of these problems the ones I think are of biggest concern are privacy concerns. Collecting information from individuals would require the system to collect and store the information that they make available. The problem with storing personal information is that cyber criminals can see this as an opportunity to make money off individual’s personal details. To combat this, professionals should ensure that the information they are being provided is properly stored/protected and follows regulations regarding privacy. The next concern of storing information would be data security and breaches. When receiving vital information, it is the organization’s responsibility to ensure protection against breaches of security and unauthorized access. The issue when companies do not focus on this is that it leaves it users or customers vulnerable to crimes like identity theft, fraud, etc. This is why having set rules and guidelines is essential to cyberspace protection and cybercrime deterrence. The third ethical issue that is concerning is consent and ownership. When large corporations or companies allow people to enter sensitive details, they can be financially motivated to sell these details whether it’s to find statistics on what works and what doesn’t or how to appeal to a larger group of potential buyers. Rarely do companies openly explain how and where this data is going. This is the ethical dilemma due to the fact that users may not fully understand or comprehend where their information is going. We often see EULA agreements before we play a game or download software but how often do, we actually read that whole agreement? In this agreement it common to see companies put in small text “this information may be used for statistic and data analysis purposes. There we can see and decide if we want our information shared but we need more expressive language and text to let the user know the importance of the EULA agreement. The fourth ethical concern would be accuracy of data. Using the internet its usually as simple as I think of a question and type it, then I get multiple answers and sources giving me answers. The problem with the internet is that anyone can publish information they see fit for example: I heard a story of a teacher assigning a paper on space and history and a student used an edited Wikipedia source retelling the story of starwars. That is why we use reputable sources and try to confirm our hypotheses, because if even the most realistic sounding website can be filled with bias and misinformation. All of these ethical concerns may seem miniscule but in the grand scheme of things all it takes is one person to incorrectly handle your information and you could be the next victim of a cybercrime.
2. The risks involving cybersecurity, the u.s. and many other countries are not as different as we think. The United States has a large sector for cybersecurity and have been working on making our online activities safer since before the 2000’s. Due to our complex and large online presence the United States are often target of cyberattacks domestically and internationally. A country like Israel is often under attack not only due to its presence in the online world but also for religious reasons. Nonetheless Israel is one of the top countries in technology information, which may be accredited to the constant adversity they have to face. A prime example is the need for an arial protective dome against missiles and other projectiles. Where these countries are the same is the potential and ability to perform against cyberthreats and respond diligently to foreign and domestic attacks. Where they differ is the nature of attacks and motives, for the U.S. I would assume that most attacks are politically or financially based. While Israel has been at constant conflict, cyberwarfare is only a part of the diversity they face. In all the biggest similarities would be the focus on innovation to the cybersecurity field, complex and interdisciplinary reasoning behind attacks, and political turmoil. Where they differ, the most is the size of infrastructure, basic guidelines to security and protection, and proximity to threats involving cyberwarfare/attacks.