Tuesday, June 11, 2019

Cyber security Coursework Example | Topics and Well Written Essays - 750 words

Cyber security - Coursework ExampleAn example of how cultural values impact on the moral legitimacy can be emaciated on the norms regarding thieving in society. The golden rule concerning ethical behavior stresses on treating other as you would wish for them to treat you (Cavalier, 2005). Consequently, the cultural norm pertaining to theft is that, it is a vice and a morally illegitimate behavior. On the other hand, if ones cultural values ascribe to the ethics that justifies an action is morally right so long as it results to personal interest, the moral legitimacy is granted (Spinello, 2004). The implication, resulting here is that theft is morally justified since it serves to benefit the thief. The linkage amid the effect cultural values and cyber ethics is intricate and drawn from the moral legitimacy of ones actions (Spinello, 2000). For, example in the case of content piracy, it is a form of theft yet based on the actors different points of view, issues pertaining to legiti macy arise. Foremost, there is one individual who views content piracy as illegal and a violation of cyber ethics. His/her logic is drawn from the tenets of the Golden rule. However, on the flip side, there is one internet user who justifies his/her action based on the personal benefit derived from the action. His or her logic arguments include why pay for expensive, when I can freely download it from the piracy sites? Besides, I am non harming anyone by my actions? Consequently, the different perspective regarding ones cultural values and legitimacy of moral actions argon the major challenges about the regulation of cyber ethics. Topic 2 Ethics refers to the prescribed set of laws that govern the precincts of right or wrong behavior or actions in society (Averweg, 2006). The contemporary society is rapidly ontogenesis into a global village due to increased access and growth of information technology. Furthermore, companies have integrated information technology in facilitating the ir daytime to day functions. Beneath the growing fascination with internet use, there lies the need for developing a code of ethics that guides the behavior and actions of employees in the use of information and chat technologies. There are several practices that can be integrated in the acceptable internet use policy of a company. Foremost, guidelines should specify that data moldiness be strictly used for the satisfaction of the companys business objectives. Furthermore, access to the internet can only be done via the companys authorized firewall, router and content scanning software. Moreover, any employee accessing data should respect and comply with the legal protection accorded to it by the relevant licenses and copyrights. In addition guidelines regarding security of twain data collected and user should be addressed. Consequently, security measures such as encryptions and firewall software are to be applied in the companys calculator server system (Criddle). In relation t o the acceptable conduct policy, a specific guideline for inclusion pertains to disclosure of data use information. Consequently, all employees are obligated to disclose any information regarding the type of data they store and their plans for usage. Furthermore, company staff should only access and collect data in a manner that is not deemed as illegal or unfair. Another guideline pertains to the accuracy of data collection and retention policy. In light of this policy, all employees

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.