Wednesday, December 11, 2019

Network Management in Organisations for Internet- MyAssignmenthelp

Question: Discuss about theNetwork Management in Organisations for Internet. Answer: Introduction Whereas information technology facilitated by the internet has led to a great revolution in social communication, the constant availability of information has had profound effectS on the moral and ethical values of the users. Moreover, when one considers the rapid transmission of information such files and images the concerns of privacy, security and intellectual property arise [1]. Nevertheless, ethics in this context are supposed to be the principles or values that guide people while using the facilities offered online. Now, the internet is a unique environment where based on its pervasive nature will influence the users to partake in immoral activities. Therefore, this paper analyses the common ethical issue related to the internet content. Ethical Issues A lot of content is usually available online which in most cases tends to blur the lines of property access, ownership and security. While analysing the access of information the privacy of the people involved always come into play, where the rights of the participants (internet users) collide [2]. Ownership, on the other hand, will highlight the concept of intellectual property where among other issues of copyrights and fair play are identified. Finally, with increased access and availability comes the issue of security where confidential details are exposed or lost. Furthermore, with advances in real-time systems and Internet of Things, users can be placed in harms way due to the content they expose online [3]. Analysis of the Ethical Issues Privacy Privacy can be defined as a status of anonymity where individuals and their information remain secluded from the public eye. Privacy tends to be an ethical issue when one considers the vast majority of information available online as a result of willing users who supply the content to websites such as social media sites. In this case, the question is, should the hosts (third party members) be allowed to store and even read the data supplied to them? For security reasons, security agency will have the legal right to scrutinise such data however, the people involved should exercise their moral values in the process [4]. In essence, there should be a limit to this access. Recent events have seen people advocate for data minimization where online hosts such as websites are been urged to minimise their data collection and retention efforts in order to cater for the privacy concerns of the end users. Intellectual Property A critical aspect of the internet, where among the items covered by legal rights users are never protected to own their own ideas or as popularly known their own genius [5]. According to a recent study by MTV, 68 percent of children pay for music content because they believe people deserve respect for their work. However, the same mantra is not seen in grown-ups who as a result of the extended availability of digital content will fail to pay for the rights to access other people's content. Moreover, as stated before the pervasive nature of the internet facilitates the false actions where people lack empathy and fail to associate with the people who are affected by their actions [6]. In the end, internet users will access content all the time without the concerns who supply the content and how. Furthermore, the popularity of streaming and sharing content blurs the lines of ownership where the original owners are unknown. Security The internet has become the livelihood of people today including their businesses which outline the need for secure systems to protect the data owned. Now, unlike regular people who may or may not follow ethical values, hackers will have zero consideration for ethics or moral codes. The fact that they engage in these malicious activities defines their loss of morality. Therefore, based on the inherent popularity of hacking incidences which employ illegal data access techniques, security is seen as a serious ethical issue [7]. Furthermore, while hacking and other acts of cyber crime are outlined by the law, ethics come into play when users who have legitimate access to data, use this privilege for their own gain. For instance, internet users will leak information for financial gain particularly, high valued data. On the other hand, consider the risks internet users take when exposing their locations and availability over the internet. Using real-time systems such as geolocations a use r can be easily be targeted by a person with malicious intention which infringes on their own personal security [8]. Justification for the evaluation A closer look at the functionalities offered by the internet outlines its resounding features most of which exposes it to the ethical issues outlined above. For one, it's instantaneous, immediate and decentralised, which means content is accessed in real-time at extended environments. These outcomes expose its to security problems since control is a challenging process. Secondly, content is continuously exposed having endless expandability and availability. These features predispose it to privacy issues as there is a slippery slope between accessing and infringing the rights of other participants using the internet. Moreover, the same features blur the lines of data ownership where users rarely acknowledge the original owners of the content available online [1]. Conclusion According to many experts, the internet needs regulation to enforce the moral and ethical standards of using information. However, in this recommendation, the same experts are faced with the dilemma of the extent of regulations. On one hand, you have the desire to limit the unethical outcomes through strict security regulations that focus on the need to protect peoples personal rights. However, while enacting these regulations they are bound to infringe on the same rights held by the users. In the end, the solution lies with the individuals themselves who need to establish personal policies to regulate their consumption of the information available online. Remember, the internet is very extensive to regulate having endless features that highlight its pervasive nature and the ability to grant the users anonymity, which in most cases leads to the unethical conducts exhibited. Therefore, a form of self-regulation is needed to enact the available laws of using the digital platform. This outlook is the only solution to solving most of the ethical issues related to the internet. References [1] Vatican. (2002). Ethics in internet. Pontifical council for social communication. [Online]. Available FTP: https://www.vatican.va/roman_curia/pontifical_councils/pccs/documents/rc_pc_pccs_doc_20020228_ethics-internet_en.html [2] SCU. (2017). The Ethics of Online Privacy Protection. Markkula centre for applied ethics. [Online]. Available FTP: https://www.scu.edu/ethics/privacy/the-ethics-of-online-privacy-protection/ [3] Extension. (2017). Internet Legal and Ethical Issues. [Online]. Available FTP: https://articles.extension.org/pages/62093/internet-legal-and-ethical-issues [4] Popescul. D Georgescu. M. (2013). Internet of things some ethical issues. The USV annals of economics and public administration. [Online]. Available FTP: https://seap.usv.ro/annals/ojs/index.php/annals/article/viewFile/628/599 [5] UCSC. (2005). The Ethics of Intellectual Property. [Online]. Available FTP: https://classes.soe.ucsc.edu/cmpe080e/Spring05/projects/ip/ [6] Media smarts. (2017). Ethics and Intellectual Property. Canadas centre for digital and media literacy. [Online]. Available FTP: https://mediasmarts.ca/digital-media-literacy/digital-issues/online-ethics/ethics-intellectual-property [7] Deguzman. V. (2017). Computer Security Ethics and Privacy. [Online]. Available FTP: https://www.webreference.com/internet/security/index.html [8] Mateti. P. (2017). Ethics in Internet Security. [Online]. Available FTP: https://cecs.wright.edu/~pmateti/InternetSecurity/Lectures/Ethics/

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.