Assignment 3/Leicht-Deobald2019_Article_TheChallengesOfAlgorithm-Based.pdf Vol.: XXXXXXXXXX Journal of Business Ethics XXXXXXXXXX:377–392 https://doi.org/10.1007/s XXXXXXXXXXw ORIGINAL PAPER The...

1 answer below »

View more »
Answered Same DayMay 22, 2021Macquaire University

Answer To: Assignment 3/Leicht-Deobald2019_Article_TheChallengesOfAlgorithm-Based.pdf Vol.: XXXXXXXXXX Journal...

Abhinaba answered on May 30 2021
158 Votes
CYBER SECURITY
Table of Contents
1. Introduction    3
2. Issues Relating to Ethical Dilemmas in Computing    3
2.1 Homogeneity    3
2.2 Understanding the Structural Framework    4
3. System Resilience    6
3.1 AI Undergoing Changes    6
3.2 Usage of Internet    7
4. Evaluation of the Article    8
4.1 Assessment    8
4.2 COBIT 2019 Framework for Cyber Ethics Approach    9
4.3 ACM Code of Ethics Providing Guidance    10
4.4 Organizational Response    11
5. Conclusion    12
6. References    13
1. Introduction
Over the year’s technological advancement has paved the way for the creation of cyber security it has led to the situational discomfort of dire impediments. These impediments are the resultant effect of the complexity, the gravity, and the vast array relating to the ethica
l dilemmas that exists within the cyber security framework. Therefore, it is meant that the ethical code of conduct relating to the cyber security is based on the merits relating to its own curricular focus that are effective in the preparation of the cyber security professionals.
Today if adequate attention is paid then the Internet strives to be one of the fastest growing infrastructures concerning the life of everyday practice. Therefore, the technical environment on today’s ground appears to embed many technologies that strive to survive as the latest in lieu of the changing face concerning the humankind. This paper aims to shed light on the ethical dilemmas that appear to stand in the way of a cyber-practitioner and analyse those issues effectively. This is done by taking into account a specific article that has been taken for evaluating the problems of the ill-being of the employee in consideration of the IT Sector.
2. Issues Relating to Ethical Dilemmas in Computing 
2.1 Homogeneity
The IT or Information Technology supposedly appears to play a central role concerning the industry, commerce, and the government. It also plays important part in the facilitation of the activities relating to education, medicine, society as well as entertainment in a matter that appears to be writ large. As opined by Bada et al., (2019) the matter relating to the benefits concerning the economic as well as social benefits are effective in getting impacted due to this. Therefore, the matters relate to the cyber security personnel. They face major hindrance in relation to their ethical dilemmas where they are unable to act in accordance to their technological elements. Along with this, the Information Technology appears to strive as one of the most problematic implications. These implications appear to exhibit some of the most negative impacts that pave the way for ethical dilemmas in our society. Henceforth, it is functional in posing as well as creating some of the major impediments relating to the ethical code of conduct. It is effective in containing the matters in general aspects that includes almost three main types relating to the ethical issues. These issues appear to be the personal privacy, along with the accessing of the rights, and the matters concerning the harmful actions. These issues stand at the threshold of the exploration of facets that functions in each case various ways for which is the resultant aspect of affecting the relations thriving in the public concerning that of this technological change. The matters concerning the terms involving the personal privacy, is effective in enabling the IT and the data, it paves the way for exchange of information.
2.2 Understanding the Structural Framework
This is undertaken in a large scale concerning anybody, on it can be in any locations or in any part of the world, and therefore stand irrespective of times. Such a situation leads to an increased potential concerning the disclosing of the information. It also leads to the violation of the privacy concerning any individuals. As observed by Fielder et al., (2016) it might also involve the groups of people which can be due to the widespread disseminations in a global context. Therefore, it appears to stand as a major challenge as well as responsibility concerning the maintenance of the privacy and the integrity concerning the data, which, belongs to that of the individuals. It also inclusive of the matters that appear to be essential for taking precautions for ensuring the accuracy relates to the data. Therefore, this happens to strive, as the matter for protecting it from any kind of unauthorized access or the matter relates to the accidental disclosure that might appear inappropriate to the individuals. It is therefore the second aspect in consideration of the ethical issues that strives in the computing systems involving the access right. It is solely due to the current popularity concerning the international commerce relating to that of the Internet. It means that the topic relating to the computer security as well as the access right appears to moved swiftly. This is done in lieu of a state of from being completely low priority concerning the corporations as well as the government agencies relating to a high priority. The interest has heightened to a level by break-ins of the computer system at popular places such as the NASA or the Los Alamos National Laboratories in the United States. However, it appears to be the attempts relating to matters such as illegal access concerning the government of the United States as well as the military computers. Mostly the computer hackers who appear to have been widely reported undertake these. They undertake these functions without any implementation relating to the proper policies of computer security as well as the strategies, whatsoever. It also involves the network connections relating to the Internet appears to be at par with the risk it is subjected to. The cyber security personnel are however unable to function in consideration of the computer ethics, because they face harmful actions. This means that there might be injury or any other kind of negative consequences (Dua & Du, 2016). This can be something that might lead to the situational discomfort of the undesirable loss relating to the information. It also involves the loss of property, as well as the property damage, or the impacts relating to unwanted environmental hazards. This thrives as a kind of principle that prohibits in the usage of the computing technology. This happens to stand in a way, which might results in a situation, which might be harmful to any of its users. They are mostly the public, the employers, as well as the employees. There happens to be certain harmful actions that also include the intentional destruction or the matters for the modification concerning the files as well as the programs that leads to loss. These serious losses in consideration of the resources or the unnecessary expenditure relating to the human resources might be undesirable. These cause the situation where factors such as the effort as well as the time are required for purging the systems from any and every kind of computer viruses.
3. System Resilience
3.1 AI Undergoing Changes
The system resilience relating to the Artificial Intelligence is often observed to have been increasingly deployed relating to the threat and anomaly detection or that is popularly known as TAD. The cyber security personnel face this dire hindrance relating to the TAD and can effectively make usage of the existing data concerning the security for training for improving their pattern recognition. As observed by Cherdantseva et al., (2016) there comes the ethical dilemma which the personnel face that more advanced TAD systems does not require...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here
April
January
February
March
April
May
June
July
August
September
October
November
December
2025
2025
2026
2027
SunMonTueWedThuFriSat
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
00:00
00:30
01:00
01:30
02:00
02:30
03:00
03:30
04:00
04:30
05:00
05:30
06:00
06:30
07:00
07:30
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
22:30
23:00
23:30