Thursday, August 8, 2019
Cyber security Coursework Example | Topics and Well Written Essays - 750 words
Cyber security - Coursework Example An example of how cultural values impact on the moral legitimacy can be drawn on the norms regarding theft in society. The golden rule concerning ethical behavior stresses on treating other as you would wish for them to treat you (Cavalier, 2005). Consequently, the cultural norm pertaining to theft is that, it is a vice and a morally illegitimate behavior. On the other hand, if oneââ¬â¢s cultural values ascribe to the ethics that justifies an action is morally right so long as it results to personal interest, the moral legitimacy is granted (Spinello, 2004). The implication, resulting here is that theft is morally justified since it serves to benefit the thief. The linkage between the effect cultural values and cyber ethics is intricate and drawn from the moral legitimacy of oneââ¬â¢s actions (Spinello, 2000). For, example in the case of content piracy, it is a form of theft yet based on the actorââ¬â¢s different points of view, issues pertaining to legitimacy arise. Foremos t, there is one individual who views content piracy as illegal and a violation of cyber ethics. His/her logic is drawn from the tenets of the Golden rule. However, on the flip side, there is one internet user who justifies his/her action based on the personal benefit derived from the action. His or her logic arguments include; why pay for expensive, when I can freely download it from the piracy sites? Besides, I am not harming anyone by my actions? Consequently, the different perspective regarding oneââ¬â¢s cultural values and legitimacy of moral actions are the major challenges about the regulation of cyber ethics. Topic 2 Ethics refers to the prescribed set of laws that govern the precincts of right or wrong behavior or actions in society (Averweg, 2006). The contemporary society is rapidly developing into a global village due to increased access and growth of information technology. Furthermore, companies have integrated information technology in facilitating their day to day functions. Beneath the growing fascination with internet use, there lies the need for developing a code of ethics that guides the behavior and actions of employees in the use of information and communication technologies. There are several practices that can be integrated in the acceptable internet use policy of a company. Foremost, guidelines should specify that data must be strictly used for the satisfaction of the companyââ¬â¢s business objectives. Furthermore, access to the internet can only be done via the companyââ¬â¢s authorized firewall, router and content scanning software. Moreover, any employee accessing data should respect and comply with the legal protection accorded to it by the relevant licenses and copyrights. In addition guidelines regarding security of both data collected and user should be addressed. Consequently, security measures such as encryptions and firewall software are to be applied in the companyââ¬â¢s computer server system (Criddle). In relatio n to the acceptable conduct policy, a specific guideline for inclusion pertains to disclosure of data use information. Consequently, all employees are obligated to disclose any information regarding the type of data they store and their plans for usage. Furthermore, company staff should only access and collect data in a manner that is not deemed as illegal or unfair. Another guideline pertains to the accuracy of data collection and retention policy. In light of this policy, all employees
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.