...EXECUTIVE SUMMARY This paper details the importance of cyber security in the face of evolving cyber threats and the ever-increasing attacks on government and businesses alike. We live in a globally connected world and globally distributed cyber threats. Not restricted by geographical boundaries these threats target all technologies, service providers, and consumers. The threats are at an all-time high, in terms of sophistication and volume, and continue to trend upwards. WHAT IS CYBERSECURITY? Twenty years ago businesses did not think twice about cyber security. In a world of mainframes and dumb terminals with no connectivity to anything outside, viruses, malware, and hacking was unheard of, however, with the introduction of the Internet things have now changed. The term cyber security is getting more and more mixed usage lately, so much so that it is almost as ambiguous as the term "cloud". Cyber security, referred to as information technology security, is the focus on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction. Cyber security also encompasses ten different security domains. The following domains provide a foundation for security practices and principles: • Access Control - to maintain information confidentiality, integrity, and availability, it is important to control access to information. Access controls prevent unauthorized users from retrieving, using, or altering information. They are...
Words: 1611 - Pages: 7
...always ethical. If we were all always ethical, there would be no need to discuss ethical matters. Rather, we sometimes do things that are not fair, not right, and not in the best interest of humanity or sometimes, ourselves. This research paper focuses on the ethical issues facing information technology. I will be identifying examples of those ethical issues, situations in which they occur, and helpful ways in which organizations can avoid abuse and catastrophes. Introduction Ethics is defined as moral principles that govern a person or group’s behavior. (insert reference) Now that we know the definition of ethics, then what are ethics in information technology? Ethics in information technology are a set of moral principles that police the use of computers and all forms of telecommunications used to receive, send, and store information. With the rise of information technology, more and more professionals have encountered ethical issues in the workplace and finding out there are situations in which ethical problems are becoming more prevalent. Some examples include; (1) problems with privacy and confidentiality, (2) computer security, and (3) computer crimes and computer related crimes. This paper will focus on these examples. Problems With Privacy and Confidentiality Information privacy is the right of an individual to determine what information is collected about them and how it is used. Some people are not aware...
Words: 1562 - Pages: 7
...Affiliation A Different Word: Subcultures in Cyberspace The way people organize, govern and create meaning in their lives is associated with social patterns that link to other cultures. This describes the study of sociocultural anthropology. This brief essay will examine: Egao, cyberpunk, queer and ethnic cyber-subcultures and relate them to sociocultural anthropology. This field of study as several concerns from the environment to health issues, however, the main in terms of cyber-subcultures deals with social change. Social change can be described as any event that causes a dramatic change immediately or over time. The presence of the Internet and cyberspace has already caused several changes in society. Facebook (FB), Twitter and other social media sights have made it possible to connect with people from different states and countries in seconds. It also makes it possible to find lost friends and reconnect with distant family members. There are opportunities to play games, exchange video files and stream live footage. The possibilities are seemingly endless. Within this new frontier of freedom along with social media Egao can be found. Egao Egao can be defined as a cyber-subculture in satire with the mainstream (Zhang, 2010). It can be accessed from mobile phones and other electronic devices. There are several forms which include: text, audio, image, or video. This particular sub-culture has become a means of free expression for the younger generation of Chinese...
Words: 1018 - Pages: 5
...Most Important Cybersecurity Vulnerability Facing IT Managers Today: You and I Cybersecurity vulnerabilities in the early years generally revolved around problems with computer hardware and software with no solid definition of what a vulnerability really was, much less which vulnerability would take home the “Most Important Vulnerability” title. In his thesis proposal on “Computer Vulnerability Analysis”, Krsul (1997, p. 2) starts his “Definition of Vulnerability” section by delving into the fact that there was no industry accepted definition that precisely defines “computer vulnerability.” Krsul goes on to ask us to review three of the most commonly accepted definitions of the day—remember, this is 1997!—that he will use to form the basis of this thesis (Krsul, 1997, pp. 2-3): 1. Bishop and Bailey define a vulnerability as “a characterization of a vulnerable state which distinguishes it from all non-vulnerable states.” (Bishop & Bailey, 1996, p. 2). Their report focuses on computer vulnerabilities from a state configuration view where computers are state devices, and a vulnerability is any flaw in software that allows a user (whether authorized or unauthorized) to transition the system from an “authorized state” to an “unauthorized state.” We commonly reference these types of vulnerabilities today as buffer overflow vulnerabilities, input validation vulnerabilities, improper system configuration, etc. 2. Longley and Shain define a vulnerability using several different...
Words: 3201 - Pages: 13
...Week 5: Final Paper Journal Assignment Carol Hickman PHI445: Personal & Organization Ethics Instructor: Kristine Ouzts June 15, 2015 Thesis statement for the Boys & Girls Club of America (BGCA) Not-for-Profit Company This paper will evaluate how the BGCA honor their commitment to assist young people at reaching their potential of becoming productive, caring responsible citizens using motivation, education and encouragement. The ethical issue that BGCA faces is maintaining the virtues and image of the BGCA and the challenges related to disenfranchised youth of today. The ethical theories of deontology, utilitarian and relativism will be examined to resolve how BGCA will honor their mission statement with an ethically proper solution. Background The BGCA is a 501(c) 3 (nonprofit) organization and their donations are tax deductible. The BGCA’s mission is to ‘To enable all young people, especially those who need us most, to reach their full potential as productive, caring responsible citizens.’ The BGCA has over 4000 youth affiliated clubs throughout the U.S., Native lands and military installations worldwide. The BGCA started in 1860 in Hartford, Connecticut with three women and for more than 150 years, BGCA has been helping kids grow and thrive. The moral character of the three women whom started BGCA is a great example of the virtue theory. Taking boys off the streets into their homes to provide a positive alternative is a selfless act of kindness. BGCA’s...
Words: 2676 - Pages: 11
...demoralizing, desensitizing, and false. Young people and adults alike are trying to navigate through their lives and through the world with a broken compass. The role media plays in issues such as self-worth, bullying, and suicide need to be addressed and revised. I will discuss media and its role and responsibility through the perspective of both a classical and contemporary ethical theory. The classical theory that will be discussed is virtue ethics, which is the study of the virtuous character of a person (Mosser, 2010, p.1.7). The contemporary theory that will be discussed is emotivism, which is basing one’s moral decisions on one’s feelings and emotions (Mosser, 2010, p.1.8). Concluding, I will discuss which theory is closer to my own personal view and why I chose that particular theory. While freedom of speech and personal connection are very important, age appropriate moral standards should be upheld in the media because media plays a significant role in suicide, bullying, and self-worth. According to Mosser (2010), virtue ethics seeks to find “not what makes an act good but what makes a person virtuous” (p.1.7). Indeed, a virtuous person has and shows high moral standards. So if media plays the role of a super peer in multiple realms, shouldn’t media also exemplify these same high moral standards? Healthy balances with proper limits need to be enforced with mass media and society. One way to do this...
Words: 2617 - Pages: 11
...Cybercrime Law, Regulation, Effects on Innovation Human Aspects in Cybersecurity: Ethics, Legal Issues, and Psychology CSEC 620 9024 Summer Semester May 18, 2015 Table of Contents Introduction 1 The Role of the Government in Protecting National Security 1 Acceptance of Government Intervention on Protecting National Security 2 Reaction to the Security Intervention on the Private Sector 3 Impacts/Effects of Government Regulations to Private Industries 4 Compliance Measures to Protect National Security 5 Responsibility to Protect National Security 5 Conclusion 6 Introduction Government has the responsibility to protect its national security and citizen. This could be done by providing policies and procedural guidance to private industries. This relationship between government and private industry are not conflict immune as the balance between protecting the national interest and invading privacy is in question. Senior management from the private industry caught in between making the right decision to protect their customer or investing in cyber security. This research paper covers the impact of government regulations, security laws, and legal concepts on the private sector to protect national security and its interpretation and acceptance by the public. The Role of the Government in Protecting National Security The US government invested a lot to protect its critical infrastructure from cyberattack by creating and implementing policies...
Words: 1899 - Pages: 8
...or broken. On the small scale, such as a local grocery, ethics of the owners and employees can be easily maintained because the area they are operating in shares the same values. This, however, is not the case with global businesses. Instead of a local community for profits large businesses rely on the global market, thus exposing and challenging their original ethics for the sake of continued profits. This cross-cultural perspective will examine a recent example of this challenge when the company Google began to expand into the Chinese and other Asian markets. Google is a multi-billion dollar company that was started in the garage of two Stanford students in 1997 (Google, 2012). The initial goal was to produce an internet search engine that would be able to find and provide access to an immeasurable amount of information. Since its inception, Google published several values that were believed to be the essence of the company. Among them were that all focus should be on the user of the product and that any ad revenue should not come at the users cost, examples include pop-up advertising and manipulated searches (Google, 2012). Google also started with a relaxed approach to business, believing that employees worked better when comfortable, and that information should be shared. As Google expanded from its humble beginning, the company took on a larger and larger role in the community as a role model for business ethics. The company stayed true to their initial objectives, focused...
Words: 1206 - Pages: 5
...Running head: Strategic Communications Strategic Communications its implications in Corporate Social Responsibility, especially as it relates to the United States Military Social Responsibility and Ethics Management MGMT 325 1 November 2008 Abstract The purpose of this paper is to inform the readers of Strategic Communications and its implications in corporate social responsibility especially as it relates to the United States Military and specifically how the United States Air Force is utilizing Strategic Communications to decisively influence worldwide audiences in efforts to either diffuse or prevent aerospace crisis. Strategic Communications, its implications in Corporate Social Responsibility, especially as it relates to the United States Military Wow, now if that is not a mouthful, it is no wonder why today and in the future we are going to rely more and more heavily on what we say versus what we actually accomplish. I reiterate we must remember it is what and how we say things that are most remembered not how we acted. The ability to affect change in a memorable voice is accomplished through an ever growing medium known as Strategic Communications, which is defined by the Defense Science Board (2004) as “a vital component of U.S. national security. It is in crisis, and it must be transformed with strength of purpose that matches our commitment to diplomacy, defense, intelligence, law enforcement, and homeland security.” It is also further...
Words: 2346 - Pages: 10
...increasingly complex tools and technologies. These ethical challenges can be managed by Islamic code of life. In this paper, we have studied and tried to identify, how computer affects the ethical issues of the society. In this regards, we have traced some highly related issues to the ethics of computer usage, namely – misuse of time, honesty and integrity, privacy, security, intellectual property right, and computer crime. We have also tried to explain these issues in the light of Qur’an and Hadith. At the end of this paper, we have also suggested some measures that can help in promoting proper use of computer facilities by the Muslim masses without compromising the Islamic principles. Keywords : islamic ethics, computer ethics, privacy, security, computer crime. GJCST-G Classification: K.8.m Ethical Issues in Computer use A Study from Islamic Perspective Strictly as per the compliance and regulations of: © 2013. Abdul Kadar Muhammad Masum. This is a research/review paper, distributed under the terms of the Creative Commons Attribution-Noncommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/), permitting all non-commercial use, distribution, and reproduction inany medium, provided the original work is properly cited. Ethical Issues in Computer use: A Study from Islamic Perspective Keywords : islamic ethics, computer...
Words: 5242 - Pages: 21
...Running head: Network Security The Importance of Network Security to Safeguard Organizational Proprietary Data Donald Shipman Strayer University Dr. Kwang Lee June 10, 2012 Abstract Cyber-criminal activity is on the rise in a world that thrives on the use of technology in everyday living. The close-minded thought process of simple theft of a credit card number or a social security number are long gone. Crimes in today’s business are much more extreme to include attacks that disable key functions of major operations such as public transportation and utilities, to the major financial records of customer information being exposed and stolen. In this paper I will focus on the latter. It is important that companies make significant investment in network security in order to protect its proprietary data from hackers and other criminals. I will address current attitudes toward network security, the rise in and recent increase in criminal activity, existing counteractive measures along with their effectiveness and the direction of network security for organizations in the future. Ultimately, the paper will show the importance of network security in organizations and the immediate change is needed to restore the consumer confidence about their information being safe. Introduction The Internet has become a staple of the business world today. One might find it impossible to be current on the latest world events without being able to effectively use it, navigate it, and understand...
Words: 2112 - Pages: 9
...to use artificial intelligence agents to help identify persons of interest and allow local law enforcement, along with the companies, to monitor these agents. Annotated Bibliography Dulek, R., Motes, W., & Hilton, C. (1997), Executive Perceptions of Superior and Subordinate Information Control: Practice versus Ethics. Journal of Business Ethics Vol. 16, pgs.1175-1184 This entry examines the ethical practices of leaders in a business and their employees involving information control within a business. Specifically it examines whether these executives know if control is being performed and if they deem it ethical. The statement “…executives are generally drawn to those command activities they deem to be "proper and right." but shy away from those that are iniquitous.” R. Dulek has authored six books and publishes more than forty journal articles. He is currently a professor at John R. Miller School of Business at the University of Alabama. W. Motes is a Marketing professor at the same university and has had articles appear in twelve business journals. C. Hilton is...
Words: 1878 - Pages: 8
...Cyber and Traditional Bullying Victimization as a Risk Factor for Mental Health Problems and Suicidal Ideation in Adolescents Rienke Bannink1, Suzanne Broeren1, Petra M. van de Looij – Jansen2, Frouwkje G. de Waart2, Hein Raat1* 1 Department of Public Health, Erasmus University Medical Center Rotterdam, Rotterdam, the Netherlands, 2 Municipal Public Health Service Rotterdam area, Rotterdam, the Netherlands Abstract Purpose: To examine whether traditional and cyber bullying victimization were associated with adolescent’s mental health problems and suicidal ideation at two-year follow-up. Gender differences were explored to determine whether bullying affects boys and girls differently. Methods: A two-year longitudinal study was conducted among first-year secondary school students (N = 3181). Traditional and cyber bullying victimization were assessed at baseline, whereas mental health status and suicidal ideation were assessed at baseline and follow-up by means of self-report questionnaires. Logistic regression analyses were conducted to assess associations between these variables while controlling for baseline problems. Additionally, we tested whether gender differences in mental health and suicidal ideation were present for the two types of bullying. Results: There was a significant interaction between gender and traditional bullying victimization and between gender and cyber bullying victimization on mental health problems. Among boys, traditional and cyber bullying victimization...
Words: 6925 - Pages: 28
...for disaster recovery. Ethics, Privacy, and Information Security LEARNING OBJECTIVES rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 71 WEB RESOURCES Student Web site www.wiley.com/college/rainer • Web quizzes • Lecture slides in PowerPoint • Author podcasts • Interactive Case: Ruby’s Club assignments WileyPLUS • All of the above and... • E-book • Manager Videos • Vocabulary flash cards • Pre- and post-lecture quizzes • Microsoft Office 2007 lab manual and projects • How-to animations for Microsoft Office • Additional cases CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources What’s in IT for me? ACC FIN MKT OM HRM MIS rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 72 72 Chapter 3 Ethics, Privacy, and Information Security Opening Case NASA Loses Secret Information for Years The Business Problem Over the past decade, U.S. government agencies have been the victims of an unprecedented number of cyber-attacks. One government official noted, “It is espionage on a massive scale.” Government agencies reported almost 13,000 security incidents to the U.S. Homeland Security Department during fiscal year 2008, triple the number from two years earlier. The National Aeronautics and Space Administration (NASA) (www.nasa.gov) is one of the hardest-hit agencies. The government agency responsible for the nation’s public space program, NASA, has been the target of cyber-espionage dating back at...
Words: 25389 - Pages: 102
...economy. Having to do more work because of short staffing, leaving work grabbing dinner for the family, dealing with a rebellious teenager while ushering your nine year old to soccer practice seems to be your daily routine. With all this running around, and then having to cope with your elderly parents to boot, it tends to weigh big on the mental state of an individual. Even those unexpected events that happen in life will sometimes cause us to need the guidance of a therapist. What is one to do when there is no time to walk into a therapist office? The answer to that question is the internet. The internet offers a variety of solutions to the problem. With the advancement in technology and the web ever changing, ever increasing information cyber data bank, one can now do just about anything online. One of those online items is Therapy. Yes, it is possible to find an online therapist that will assist with any issues that are going on in your life. Getting the help needed with mental well being is only a click away. The following information will give incite to three such cites in the online therapy family. The three are the CBT website, E-Therapy and Internet Therapy. Brief descriptions of each cite will be given along with how regulations and guidelines govern online therapy sessions. Also an opinion of the advantages and disadvantages of online therapy will be provided. ...
Words: 1043 - Pages: 5