1. Describe four ethical issues that arise when storing electronic information about individuals.

2. Compare cybersecurity risks in the U.S. and another country.

  1. When it comes to storing electronic information about individuals, four major ethical issues arises from it. a) privacy and confidentiality, b) security breaches, c) selling customer’s information to third-party companies, and d) long holdings of an individual’s information. When it comes to privacy and confidentiality, it is defined “as the right of an individual to keep information about themselves from being disclosed to others; the claim of individuals to be let alone, from surveillance or interference from other individuals, organizations or the government.” So let alone information of an individual should only be released with the individual’s consent or by law’s demand. Security breaches threatens the exposure and leakage of individual storage informations, therefore, those who has your information right now, has all the power to your personal information and can be released without any consent. Selling customer information to third-parties for money profit is another ethical issues when storing electronic information mainly due to the fact that people can become greedy and proceeds to crossing the line in order to benefit themselves. Lastly, holding onto someone’s stored information longer than necessary also becomes a problem because overtime, people tend to forget they stored such information without knowing that the storage unit they stored in, still have access to it. this would later lead to data leakage and the unethical approach in using the stored information.
  2. As of 2022, cybersecurity risks in the US compared to another country is far more worse. It is also said to believe that the US continues to decline in cyber security and its firewalls continue to thin. According to Nextgov, the US ranks fifth among 60 nations. Even those countries likes Japan, France, Canada and Denmark all scored higher than the US. The Global Cybersecurity Index research is weighted upon:
    • The percentage of mobile devices infected with malware—software designed to gain unauthorized access to, destroy or disrupt a device’s system.
    • The percentage of computers infected with malware.
    • The number of financial malware attacks used to steal a user’s money from the bank account on their computer system.
    • The percentage of telnet attacks by originating country.
    • The percentage of attacks by cryptominers—software that’s developed to take over a user’s computer and use its resources to mine currency without the user’s permission.
    • The best-prepared countries for cyberattacks.
    • The countries with the most up-to-date legislation.

sources:

https://www.nextgov.com/cybersecurity/2019/02/which-country-has-best-cybersecurity-it-isnt-us/154794/

https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4394583/#:~:text=%5B8%5D%20There%20are%20four%20major,system%20implementation%2C%20and%20data%20inaccuracies.