IT/CYSE 200T

Discussion Board: Ethical Considerations of CRISPR Gene Editing

Based on your readings related to the BioCybersecurity section of this course, identify possible ethical considerations and explain your position.

DNA provides individuals with a personalized identity that no one else has. CRISPR, however, offers the power to create specialized embryos based on various preferences. I believe there are ethical considerations in “playing God” in this way.

First, designing babies the way we want them, from their height to the color of their hair, may negatively impact their futures as individuals in society. For example, it can cause tensions between parents and outside viewers as it’s not the natural route of procreation—such intricate selections through ground-breaking technology may be met with hostility. Further, children who look significantly different from their parents may experience bullying during child development.

Another serious concern is accessibility to this technology—with more research and use of high technology, it is likely to only be accessible to wealthy individuals. The wealthy could create societies among which genetically similar groups could be responsible for driving even more social inequalities. The wealthy have a lot of power in this country already, and having this availability could realistically solidify certain power struggles.

From your readings of pages 1 – 21 of the NIST Cybersecurity Framework Links to an external site., what benefit can organizations gain from using this framework, and how would you use it at your future workplace?

The National Institute of Standards and Technology (NIST) Cybersecurity Framework has many benefits that could add structure and clarification on needs. One of the notable benefits it offers is that it can be used not only for an existing organization but innovative start-ups. It provides an outline of what users should look for as each individual organization is different on what needs to be protected and kept private. It can also be used as a Tier system that will allow from CEO down, how the system in place is ranked from it not being that important to how adaptive an organization is when new cyber-attacks happen and how users adjust their structure.

I would use it as a steppingstone because there are new attacks that come every day—being adaptive to these new attacks is vital. Outside resources, such as Information Sharing and Analysis Organization and Information Sharing and Analysis Center, can be used to provide a guide on which Tier to strive for depending on what type of critical infrastructure the user needs to protect. It helps to have this so I can use it as a reference on where we are at as a whole in the organization.

How has cyber technology created opportunities for workplace deviance?

Technology has ushered in numerous opportunities for workplace deviance, where deviance is the violation of company policies and standards. The proliferation of technology in business has presented individuals with novel avenues to engage in behaviors contrary to organizational norms. For instance, the adoption of online clock-in and clock-out systems has made it more convenient for employees to manipulate their working hours, allowing some to leave early while appearing logged in. This misuse of technological tools contributes to a form of time theft within the workplace.

Additionally, the anonymity afforded by online communication platforms, such as Microsoft Teams, e-mail, and Instagram, has given rise to cyberbullying as employees exploit these channels to target their colleagues from behind a computer screen. This form of misconduct can have severe consequences on the well-being of individuals within the organization. The variety of communication platforms further compounds this issue, creating diverse avenues for inappropriate behavior.

Moreover, the easy accessibility of the internet has introduced opportunities for workplace deviance, with employees succumbing to distractions like online shopping and gambling during work hours. Not only does this result in decreased productivity, but it also poses a risk of exposing the organization to security threats. Engaging with non-secure gambling sites, for instance, may pave the way for malware intrusion, potentially incurring significant financial costs for the organization in terms of remediation.