logo

Ethics and the IT Professional

   

Added on  2021-05-30

7 Pages2211 Words36 Views
Web DevelopmentPolitical Science
 | 
 | 
 | 
IT PROFESSIONALSANDETHICSPrivacy in Digital Era
Ethics and the IT Professional_1

1Privacy is an essential aspect in the age of digital world as it is somehow the right of thepeople to safeguard their personal details (Bélanger & Crossler, 2011). Protectinginformation related to who we are, what we think, what we do or what we believe in. Thecontent and the boundaries of what is considered as privacy differ according to individual,culture or region. Privacy is a sensitive issue and inherently special to someone. The privacydomain mainly overlaps confidentiality that involves appropriate utilisation or protection ofdata. There are many laws that have been made in different nations so as to protect them.These are made for in some way to limit privacy. Privacy is sacrificed voluntarily sometimesfor the sake of any perceived benefit or in the case of loss or danger. The idea of universalprivacy is a modern construct linked with western culture as it was not seen in many of thesocieties in other parts of the world till recent times.The dependence of people on technology for their day to day activities has increasedconsiderably. The connection of privacy and digital mediums is known as digital privacy. Inother word digital privacy is linked with privacy of digital data (Brand & Todhunter, 2016). Ithas become one of the leading social concerns. It specifically refers to data or informationconcerning individuals identity shared over public networks. With the increasing cyber-attacks on the systems in various parts of the world, digital privacy has become a very seriousconcern in all around the world. Data leaks and data stealing have enhanced this data leaks.There are larger numbers of people whose data have been leaked through various sources.This has forced the companies and people to be more concerned about the digital privacy.There are larger set of people who have faced the issues related to digital privacy.In the developed nation like Australia where the Information technology has taken deeperpresence in the society and communication mediums have become powerful (Williams &Hossack, 2013). It has increased the chances of data leaks or enhanced cybercrimes. TheAustralian Society is very much concerned about the privacy and hence the governmentshave also taken huge amount of steps to reduce the digital privacy threats. Since Australiansociety is highly active on digital platforms like social media hence the digital privacy hasbecome difficult. With the increasing use of cloud services by the Australian business housesmaintaining privacy is not an easier job. Apart from this in Australia the concepts like IOThave reached to various organisations. Since IOT is a very large network with huge numberof nodes connected with it hence keeping data safe is not easier. Attorney-Generaldepartment in Australia has announced that they are considering opening up the access toindividual’s personal telecommunications metadata in civil proceedings.
Ethics and the IT Professional_2

2There are several privacy threats that are present when a person or an organisation utilises ITmediums for their operations. First and foremost threat to digital piracy is CookieProliferation. There are many invisible cookie software agents that are able to track thebrowsing habits as well as personal data (Bennett & Raab, 2017). This is a serious threat asthe cookie owners have a large set of data regarding a person’s habits or preferences on theinternet. Second very common type of privacy threat is Seizing Cloud. Today almost 40% ofthe organisation or individual is associated with Cloud. Since cloud network is having lot ofloopholes hence it becomes easier for the hackers to grab the data from this network. Thereare various kinds of data that is getting stored at servers and if that data goes into the hands ofunauthorised people, then there is a chance that privacy could be breached. Google’stransparency report suggests that there is around 70% enhancements in law enforcementagencies making a cloud based data with enhanced frequency (Warren Lippert, Walby &Palmer, 2013). The rise in such requests over the past three years climbed up to 21,389 in lastsix months of 2012 to 12,539 to last six months of 2009. Third biggest threat to privacy isLocation data betrayal where the location of an individual is taken up by different sites. Anyfirm can track a parson down where ever he or she may wander all around the world. This ishappening because of the internet connectivity through phones and other mediums. With Geolocation targeting advertisers can send promotional contents regarding the businesses that arerunning in the nearby locality (Deng, Wuyts, Scandariato, Preneel & Joosen, 2011). Forth inthis count is face recognition data breach. In order to make the social networking sites moreunique generally the data related to face is stored by the social media owners like Facebook.Posting and tagging has become a trend but whenever a person does that he or she is invitingthe firms like Facebook to collect their personal data regarding their face orientation. If suchdata gets sold to other organisations, then there is a chance that they can utilise it for theirpersonal benefit. This is extremely dangerous in the case of national security since it can beutilised for the purpose of making official documents. The last and most crucial cybersecurity threat in this regards is that unauthorised scanning in the name of cyber security. It isseen that governments usually scan the online mediums so as to gather the data regardingwhat a person does (Nicholls, 2012).In the expanding use of IOT over different networks has raised the concerns related to thecyber-security. Many a time IT is considered as the worst enemy of the privacy. This is dueto the reason that IOT infrastructure has many devices connected with each other and aresharing data related with each other (Harvey, 2015). There is a larger chance that weak link
Ethics and the IT Professional_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Smart Connected Home Architecture, Threats and Countermeasures.
|17
|4151
|17

Privacy does not really exist in today’s society
|8
|2718
|292

Internet of Things Security and Privacy
|16
|4358
|255

ETHICS AND SUSTAINABILITY Executive Summary
|10
|1991
|26

The Balance Between Security And Privacy
|6
|1509
|426

Online Privacy
|9
|2272
|76