Issues in Information Technology Ethics essay

Jane Williams Abstract Computer security and identity theft affects everyone, from businesses, commerce, and our personal information. The article, Even Ralph Ender and Grover Enormous Agree that Government should be more open, explore how the Data Act, which was recent legislation passed to establish government standards and quality control over the transparency of information and how its used.

At a recent Data Act Summit, Republican Politician Grover Enormous ND Democratic Politician Ralph Ender agreed on how government should be more transparent in their efforts regarding surveillance of U. S. Citizens. Primarily, on how the information is obtained on citizens and what information about a person is published on the Internet. Introduction In this writing we will explore the ethical and political viewpoints of information on the Internet, information security and whether the current trends regarding information security go far enough to protect the public.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

In contrast, we will look at if the government is transparent enough regarding its information gathering practices for the general public to feel comfortable enough to trust the government in light of recent events regarding personal e-data breaches on the Internet. The Argument in the Article The primary argument that the politicians were covering in this article; was that information in many instances already exist in the public domain in print.

In regards to real estate sales, public court records, and general consumer data pertaining to buying trends in commerce. The real argument that is coming to light is the accessibility factor of that information and how people n the Internet maliciously use it. The Internet, being an open source of information without any real restrictions as to how it’s used or the information that’s posted on it. Additionally, since information posted on the web is essentially there forever.

I surmise, that on paper, information is somewhat restricted and therefore more secure in its usage, distribution and publication. To support this assertion, Mr.. Enormous makes this statement regarding court documents, “… Information is already biblically available on paper, putting it online is just a way to democratic the process… It’s not a secret that’s being exposed. It’s an open secret… The thing is, people are all for information being biblically available until ‘openness’ comes too close to home” (Howard, 2015).

The interesting aspect of this article was tattoo have two political leaders that are usually on opposite sides of an issue that are actually in agreement on the same topic. They both view the topic from this aspect, in that government should have more secure methods of securing information it’s entrusted to keep. Mr.. Ender had this to say on this issue that coincided with Mr.. Marquis’s views, “The tragedy is that if we don’t find a better word than privacy, which has a kind of luxurious connotation, like ‘get over it’.

You can’t get people really upset about it unless they’re burned by it, and a lot of times, they don’t even know they’re being burned by it (Howard, 2015). Findings It’s quite apparent that information security is an ever growing issue since and the main topic of this article. Policing the usage of information and how it’s obtained is fuzzy and ambiguous at best. Many times people don’t know when their information has been compromised and hacked.

And with each passing year there are new software packages developed to aid even the most rudimentary hacker to access data systems and people’s personal files. In a Potash on our university of Phoenix website, there was a transcript for week 2 reading on Information Systems Security, that supports this assertion, “l think there are a lot of issues that we need to look at. One is the value of information. So as the value of information continues to increase, more people, then, want to get at that information to use it, perhaps, for fraudulent r unlawful purposes” (Sardonic, 2013).

Conclusion In conclusion, the ethics surrounding the usage of information and of the methods of gathering that information from the Internet is never truly addressed legally in my opinion. In the article reviewed here and with the potash outlines legal ramifications on identity theft and computer hacking however the issue of ethics regarding information obtained on the Internet is not clearly defined. Idyllically speaking, believe that if people are properly educated regarding Internet etiquette than they may behave better in their equines and personal practices on the Internet.

Leave a Reply

Your email address will not be published. Required fields are marked *