{"id":294,"date":"2024-03-08T01:28:48","date_gmt":"2024-03-08T01:28:48","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/?p=294"},"modified":"2024-04-22T16:39:38","modified_gmt":"2024-04-22T16:39:38","slug":"journal-entry-3","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/2024\/03\/08\/journal-entry-3\/","title":{"rendered":"Journal Entry #3"},"content":{"rendered":"\n<p><strong>Describe four ethical issues that arise when storing electronic information about individuals.<\/strong><\/p>\n\n\n\n<p>Four ethical issues that arise when storing electronic data for individuals include privacy, accuracy, security, and accessibility. Privacy is the right of individuals to control their personal data. Issues with privacy can arise when certain companies and applications either go against our wishes or never ask individuals beforehand when they are collecting personal data. In the event where consent to collect data is given by an individual, these companies may withhold crucial information on what they will use the data for. There is even a possibility of them selling an individual&#8217;s personal information. Accuracy is important because it can be beneficial in determining whether something is reliable and good to use or inaccurate and causing serious problems. For example, if someone was writing a research paper on a specific U.S. President, they would have to use other sources of information because they don\u2019t know everything about that president. They decide to use Google, instead of a more scholarly search engine, and click on the best looking articles, then type up an excellent research paper and publish it. They are then bombarded with comments on the misinformation about that president within the paper and discover that their sources were inaccurate. This is why it is important to maintain accuracy when it comes to anyone\u2019s information. Security is how individuals keep their information protected from those with malicious intentions. Unfortunately, there are times when security is not reliable or when it is breached, resulting in an individual&#8217;s information being leaked out to anyone. This is why it is important to have layers of security and, if possible, a backup plan in case security breaches occur. For example, if an individual&#8217;s credit card information is exposed, fraud protection is a good tool they could have as a backup plan. Accessibility determines who can and cannot have access to certain information. This can be an ethical issue within a company if an employee grants the access of critical information to a non-employee.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Describe four ethical issues that arise when storing electronic information about individuals. Four ethical issues that arise when storing electronic data for individuals include privacy, accuracy, security, and accessibility. Privacy is the right of individuals to control their personal data. Issues with privacy can arise when certain companies and applications either go against our wishes&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/safcybersecurity\/2024\/03\/08\/journal-entry-3\/\">Read More<\/a><\/div>\n","protected":false},"author":27461,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/posts\/294"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/users\/27461"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/comments?post=294"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/posts\/294\/revisions"}],"predecessor-version":[{"id":322,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/posts\/294\/revisions\/322"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/media?parent=294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/categories?post=294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/tags?post=294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}