country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

IT Ethics: Sensitive And Proprietary

tag 0 Download6 Pages 1,467 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss about the IT Ethics for Sensitive and Proprietary.

 

Answer:

“Internet is World's 'Greatest Spying Machine'”

According to the statement made by the Wikileak founder, Julian Assange internet has been speculated as the most threatening tool that deprives a person of their fundamental human rights and freedom of expression by means of spying actions (smh.com.au, 2017). The practice of procuring confidential and personal information without the knowledge and permission of the holder of the information consists of the act of cyber espionage. Data types comprising of the sensitive, proprietary, classified and personal nature are usually obtained from the individuals, competitors, governments and enemies for gaining advantage under suitable circumstances by virtue of utilizing the cracking strategies and deploying malicious software through internet usage. The perpetration is normally carried out online by computer trained professional spies or by criminal offences by software programmers and amateur malicious hackers. Recent evidences has provided an insight into the National Security Agency initiatives to expand its internet spying at the U.S. borders as a measure to track down the hackers thereby offering the scope for mitigating the internal threats (Savage et al., 2015). Many across the globe have condemned the large-scale surveillance of the Americans carried out by the U.S. government, thereby suggesting that encryption is not sufficient to prevent the unauthorized circulation of data. There have been efforts coming from the powerful web browsers like that of Mozilla that aimed to abate the interception due to information being sent to and from the servers to the third party. The data are generally scrambled to avoid such actions. Thus, the internet and inequality has garnered attention in the recent years as part of the spying process (Gilreath, 2014). With the advent of technology and the rampant usage of internet, the issue of spying has gained even more relevance as the line between disclosure of personal and public information is gradually blurring.

The breach of personal space in one’s life has been argued in the context of cyber crime. The threats are ever increasing with the changing times and scenarios This trend has been attributed to the changing scenarios that drive the alarming threats in the internet. The heightened sophistication of these changing patterns of threats has majorly influenced the social and political governance in the context of various nations. The increased use of the social networking sites such as those of Facebook, Twitter in the virtual world have threatened the safekeeping of the data. Analysis of the public activity by these platforms have thwarted the maintenance of the safekeeping and confidentiality of the data obtained. The increased dependence of the information and communication technology by the users of the modern times has further paved the way for increasing the cyber spying. The business and entrepreneurships management strategies have further suggested the performance of standard risk analysis to highlight the cyber risk issue for the sake of filling in the gap of the research undertaken (Vande Putte & Verhelst, 2014). Further, the exponential growth in the domain relevant to the cyberspace has been explicitly discussed in recent works whereby the issue pertaining to the access to information for all parties involved has been raised. This has raised the threats even more for the professionals and individuals working with the information technology based industry to protect and handle the data in a deft manner. Minimization of the damage and recovery time is also done by means of taking measures appropriate to reduce the vulnerability of cyber attacks. Crimes against individuals, properties, governments or organizations are analyzed by definite means of contemporary preventive techniques through catering to the continuing trends and practices (Arora, 2017). Hence, mitigation of the spying issue calls for greater intervention.

 

In the era of the internet, the breach of privacy has gained even more prominence whereby the various ethical and legal implications of such misuse have been exposed. In this connection, the case of Edward Snowden, former employee of the Central Intelligence Agency may be cited as a prime example who disclosed many of the classified documents from the National Security agency database without authorization. His revelations brought to the forefront numerous global surveillance programs by the US and British intelligence agencies. This exposed the measures adopted by this organization to crack the online encryption trusted by millions of people across the globe in an effort to protect the privacy of the personal data, emails, online transactions. The most threatening part of these revelations was that the documents came with warnings over the maintenance of absolute secrecy and decryption capabilities. The violation of the online data protection as followed  by the various super powers were revealed that in later times prompted the foreign targets to change to newer forms of encryption or communications (Ball, Borger & Greenwald, 2013). The collaboration of the AT&T company, and the U.S. government harbored productive outputs in terms of working in coalition with the American telecommunications companies. This further threatened the internet security of the information provided in the virtual platform by individuals and the governments. However according to the AT&T spokesperson, information is not disclosed unnecessarily to any third party or investigating organization without any proper reason. A vast expanse of the internet communications via the internet cables further strengthens the foreign-to-foreign traffic (Angwin et al., 2015). The hacker, hoaxer, whistleblower and spy issue have been further highlighted in other studies. Thus, the network surveillance programs has been found to monitor the illegal activity by means of noteworthy measures and prudent policies (Coleman, 2015).

Following the stringent measures and policies that were in vogue in the pre-Snowden phase, significant modifications underwent that aimed to address the internet governance. Elevation of internet governance in the realm of high politics has been a debatable topic that requires strict guidelines and competing governance developments. Thus, the incident following the Snowden case has opened up newer avenues for participating in the internet regulatory policy. In this regard, the national governmental regimes adopted by countries like China, Russia, Syria, turkey, Venezuela and Pakistan is of importance as they have asserted stringent national controls (West, 2014). Further studies have highlighted the influence and transformation in information security that revealed the recent measures adopted by the relevant countries to safeguard and protect the rights of the citizens from any foreign surveillance. Furthermore, lessons have been derived from the Snowden incident that the companies must not rely on the internet providers for the management of their data and efforts must be taken to enhance the security systems (Mahmoud & Zeki, 2016). Thus, the recommendations made in order to curb the internet spying issues needs to be confronted in an effective manner with setting up of global consensus to mitigate the issue. The justification behind the government measures and regulations are debated where the concerns over privacy has been overruled. Thus, the question of internet freedom is shrouded in controversy. The notion of confidentiality through anonymity has now been questioned whereby the protection has been designated as a thwarting matter. The efforts and measure of the internet giants like that of Google and Yahoo must come up with novel technologies and strategies to protect the rights of its users without causing any harm. The true purpose of the internet can only be felt if the regulation is properly executed to suit the demands and needs of its clients.

 

References

Angwin, J., Savage, C., Larson, J., Moltke, H., Poitras, L., & Risen, J. (2015). AT&T helped US spy on Internet on a vast scale. The New York Times.

Arora, B. (2016). Exploring and analyzing Internet crimes and their behaviours. Perspectives in Science, 8, 540-542.

Ball, J., Borger, J., & Greenwald, G. (2013). Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian, 6.

Coleman, E. G. (2015). Hacker, hoaxer, whistleblower, spy: The many faces of Anonymous.

Gilreath, S. (2014). The Internet and Inequality: A Comment on the NSA Spying Scandal. Wake Forest L. Rev., 49, 525.

Mahmoud, F. Z. M., & Zeki, A. M. (2016). Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security. Journal of Theoretical and Applied Information Technology, 83(2), 173.

Savage, C., Angwin, J., Larson, J., & Moltke, H. (2015). Hunting for Hackers, NSA Secretly Expands Internet Spying at US Border. The New York Times, 4.

Smh.com.au. (2017). Internet is world's 'greatest spying machine': Assange. The Sydney Morning Herald. Retrieved 11 May 2017, from https://www.smh.com.au/technology/technology-news/internet-is-worlds-greatest-spying-machine-assange-20110316-1bwoz.html

Vande Putte, D., & Verhelst, M. (2014). Cyber crime: Can a standard risk analysis help in the challenges facing business continuity managers?. Journal of business continuity & emergency planning, 7(2), 126-137.

West, S. M. (2014). Globalizing Internet governance: negotiating cyberspace agreements in the post-Snowden era. 

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). IT Ethics: Sensitive And Proprietary. Retrieved from https://myassignmenthelp.com/free-samples/it-ethics-sensitive-and-proprietary.

"IT Ethics: Sensitive And Proprietary." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/it-ethics-sensitive-and-proprietary.

My Assignment Help (2018) IT Ethics: Sensitive And Proprietary [Online]. Available from: https://myassignmenthelp.com/free-samples/it-ethics-sensitive-and-proprietary
[Accessed 07 April 2020].

My Assignment Help. 'IT Ethics: Sensitive And Proprietary' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/it-ethics-sensitive-and-proprietary> accessed 07 April 2020.

My Assignment Help. IT Ethics: Sensitive And Proprietary [Internet]. My Assignment Help. 2018 [cited 07 April 2020]. Available from: https://myassignmenthelp.com/free-samples/it-ethics-sensitive-and-proprietary.


MyAssignmenthelp.com has appointed best assignment experts who are wizards of words. Our writers know every trick of crafting high quality write-ups within a short period. With years of experiences, we have become one of the most prolific assignment help services in the USA. We deliver custom-made help to students with writing different types of assignments. We guarantee total need-based and timely service, and this is why increasing numbers of students prefer to buy assignment online.

Latest Management Samples

HC1031 Managing People And Organisation For Leadership And Control

Download : 0 | Pages : 5

  Answer: Introduction Early management theory composed of several efforts to know ways which can be employed in order to achieve profits for new business people in the industry. This was between the 19th and 20th century. There are two theories that are discussed in this review and they include the traditional or the conventional management theory and behavioural theory. The first management theory, that is the conventional ma...

Read More arrow

ENGL140 Closer Analysis For The Presence And Inter Connections

Download : 0 | Pages : 5

Answer: Introduction Aiming to generate a fair and comprehensive view about the intrinsic theme of place and belonging, this essay strives to delve into a closer analysis of literary texts that appease the temperament of children all over the world. This essay endeavors to provide an in-depth analysis of the three texts, namely, Tan’s Joy Luck Club, Dickens’ Great Expectations and Winch’s Swallow the Air. The following parag...

Read More arrow

HI5017 Managerial Accounting For Fourth Largest Monetary Institutions

Download : 0 | Pages : 15
  • Course Code: HI5017
  • University: Holmes Institute
  • Country: Australia

Answer: Introduction  The aim of the report is to understand the concept of the budgeted income statement of the selected ASX listed company which include the National Australia Bank. An income statement for the business reports about its earning and expenditures for the set period of time that can be naturally by the month, quarter or for a year. An accounted income announcement is basically a prediction related to the income statement ...

Read More arrow

PSY307e Recruitment Process For Attracting And Generating Interest

Download : 0 | Pages : 8

Answer: Recruitment refers to the process in which a company or an organization searches and hires the best and highly qualified applicant for a job advertisement according to Born, Hiemstra & Oostrom, (2018). However, the recruitment process goes through a certain circle which comprises of attracting and generating interest, maintaining applicant interest and lastly post offer closure. Consequently, Dipboye, (2017) says that, technolog...

Read More arrow

7101NRS Acting Clinical Facilitator For Proper Communication

Download : 0 | Pages : 3
  • Course Code: 7101NRS
  • University: Griffith University
  • Country: Australia

Voice over: I would like to thank the respectable panel member for the excellent opportunity that had been provided to me and would like to inform you of how ecstatic I am for this opportunity. First and foremost I would like to inform the panel members of my professional qualifications and skills. I have been working as a registered nurse for 11 years and a clinical nurse for 5 years. I am a very pro-active, honest, punctual and vigilant nurs...

Read More arrow
Next
watch

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,246,550

Orders

4.9/5

Overall Rating

5,067

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2109 Order Completed

99% Response Time

Emma Zhong

Ph.D in Project Management with Specialization in Project Communications Management

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1592 Order Completed

96% Response Time

Jane Sima

Ph.D in Psychology with Specialization in Industrial-Organizational Psychology

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1758 Order Completed

99% Response Time

William Martinez

MS in Biology

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

752 Order Completed

100% Response Time

Hugh Cleave

Masters in Human Resource Management (MMgt, HRM)

Wellington, New Zealand

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

Great job , quick response. Will call back again , highly recommend ...............

flag

User Id: 5475 - 07 Apr 2020

Australia

student rating student rating student rating student rating student rating

Great help. This website saved my life because I was behind in submitting and I have a jobwhich prevented me from completing the assignment. Thank you My Assignment

flag

User Id: 376077 - 07 Apr 2020

Australia

student rating student rating student rating student rating student rating

I passed this particular course with very good. I hope to pass the other ones too. I am very happy

flag

User Id: 347880 - 07 Apr 2020

Australia

student rating student rating student rating student rating student rating

The assigment u have sent me I think it’s fine but instead of I believe or I u can write student believe or like this it’s should not be I

flag

User Id: 399433 - 07 Apr 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?