{"id":281,"date":"2022-10-30T17:02:08","date_gmt":"2022-10-30T17:02:08","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/rwigg004\/?p=281"},"modified":"2022-10-30T17:02:10","modified_gmt":"2022-10-30T17:02:10","slug":"journal-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/rwigg004\/2022\/10\/30\/journal-2\/","title":{"rendered":"Journal #2"},"content":{"rendered":"\n<p><strong>Describe four ethical issues that arise when storing electronic information about individuals.<\/strong><strong><\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp; The four ethical issues that arise when storing electronic information about individuals are Security Breaches, System Implementation, Data Inaccuracies, and Privacy and Confidentiality.<\/p>\n\n\n\n<p><strong>Security Breaches<\/strong> \u2013 Occurs when someone that isn\u2019t authorized breaks into a system to obtain information.<\/p>\n\n\n\n<p><strong>System Implementation<\/strong> \u2013 Maintain your system with upgrades to help protect consumers from predators who want their information<\/p>\n\n\n\n<p><strong>Data Inaccuracies<\/strong>&#8211; Having information stored and there is an error with the data, which cause confusion between two parties. An example of this is a service member benefits being stopped because the system says this person is dead and the person that this is affecting must jump through hoops to prove they are alive.<\/p>\n\n\n\n<p><strong>Privacy and Confidentiality<\/strong> \u2013 This comes down to once your information is collected, what rights do you have when someone wants to sell it or use to conduct social research with it.<\/p>\n\n\n\n<p>Compare cybersecurity risks in the U.S. and another country.<\/p>\n\n\n\n<p>\u00a0\u00a0\u00a0\u00a0 As one of the worlds super-powers, The United States isn\u2019t ranked No.1 in cybersecurity. That title resides with Denmark. Studies show that Denmark as a society embraces the concept that cybersecurity is the responsibility of everyone in the country and with this cooperation, they can maintain a low percentage of risk. On the other hand, the United States of America which was No.3 on the list has an abundance of cyber-attacks geared toward them, just because of who they are and what they represent in the world. Not only does the U.S receive attacks from other countries, but a lot of their attacks are also from within the country. Even though the U.S. isn\u2019t rated No.1, that doesn\u2019t mean that Demark security is that much better, it just means Denmark has better legislation in place compared to America. Our government has taken the steps to combat this issue, which will help clarify exactly what the punishment for committing these crimes are or could be.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Describe four ethical issues that arise when storing electronic information about individuals. &nbsp;&nbsp;&nbsp;&nbsp; The four ethical issues that arise when storing electronic information about individuals are Security Breaches, System Implementation, Data Inaccuracies, and Privacy and Confidentiality. Security Breaches \u2013 Occurs when someone that isn\u2019t authorized breaks into a system to obtain information. System Implementation \u2013&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/rwigg004\/2022\/10\/30\/journal-2\/\">Read More<\/a><\/div>\n","protected":false},"author":24844,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/rwigg004\/wp-json\/wp\/v2\/posts\/281"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/rwigg004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/rwigg004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rwigg004\/wp-json\/wp\/v2\/users\/24844"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rwigg004\/wp-json\/wp\/v2\/comments?post=281"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/rwigg004\/wp-json\/wp\/v2\/posts\/281\/revisions"}],"predecessor-version":[{"id":282,"href":"https:\/\/sites.wp.odu.edu\/rwigg004\/wp-json\/wp\/v2\/posts\/281\/revisions\/282"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/rwigg004\/wp-json\/wp\/v2\/media?parent=281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rwigg004\/wp-json\/wp\/v2\/categories?post=281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rwigg004\/wp-json\/wp\/v2\/tags?post=281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}