logo

Security, Privacy and Ethical Reflection

   

Added on  2023-06-04

12 Pages3279 Words167 Views
 | 
 | 
 | 
Running Head: SECURITY, PRIVACY AND ETHICAL REFLECTION 1
SECURITY, PRIVACY, AND ETHICAL REFLECTION
Name
Institution
Instructor
Course
Date
Security, Privacy and Ethical Reflection_1

SECURITY, PRIVACY AND ETHICAL REFLECTION 2
1. Discuss what you see as the personal and ethical implications for the privacy of individual
clients of an NGO that has adopted the MySupport approach. Will these personal implications
lead to possible behavioral changes? (30 marks)
First of all, privacy is defined as somebody’s right for protection from disturbance from
others or in other words the right to be let alone. Privacy is also defined as the individual's
controlled access by other people into their private affairs (Lustgarten, 2015). The privacy right
doesn’t apply only to information processing that is personal but also to the interference of
human behaviors and how they relate to one another. There are several reasons that make privacy
to be more valuable. Privacy is seen as important because it protects other people from any kind
of threats that are external. Such as seen above include such as data manipulation, theft,
subordination, blackmail, harassment, and exclusion. It has also been said that privacy is the core
security value articulation that its goal is the protection of people from harm that is caused by
others. Examples of such rights include abortion rights and sexual right to expression. Balance
should be made to other interests and rights. Public order maintenance and national security are
examples of such. The right to privacy varies differently in contexts. For instance, their
expectation of privacy is less in the place of work than privacy at home. For instance, a principle
that has been in use in the countries of the west is that of informed consent. The information that
is given to the citizens is that they should learn how to store, use and exchange their personal
data. The people can then choose to give up their private information at will if they want to.
Looking at the privacy and information technology, we get to understand that privacy in
this modern generation is corresponding to a person who can act freely and make decisions on
his own destination. Yet this generation that is modern has a surveillance character that
undermines privacy by practice. What basically surveillance refers is that it is the observation
Security, Privacy and Ethical Reflection_2

SECURITY, PRIVACY AND ETHICAL REFLECTION 3
that is systematic for a group of people for specific purposes that are usually exerting some form
of influence over them. Argument by experts has shown that surveying has been an important
part of modern society. The engagement of the national government has the intention of fighting
crime and for the provision of the national security (Corey, 2015). The arising of computers has
made surveying stronger by increasing its speed, scale, and ease. Surveying has been made
delegate on the computers that assist in data collection. The introduction of computers has not
only made the changes to the scale and the surveillance speed, but they have also made it
possible to use a new method of surveillance. This is data surveillance which is the largest-scale
that is a computerized collection and does personal data processing so that it can monitor the
action of people and how they communicate. In addition to this, the usage of the information
technology is not only for use for recording and static information processing about people but
also to do recording and processing of their communications and actions.
In the society of information, the realization of privacy protection is through all the
privacy law information, directives, and information, or policies for protecting data. The work of
these policies is for protecting, storing, using and personal data exchange. These policies have
been overtaken by the new technological developments. However, the development of
information technology has made privacy protection became a major issue of concern. The
privacy for information, on the other hand, has also become another topic of academic study
(Drachsler & Greller, 2016). The information privacy studies have made the attempts of
balancing the rights of privacy against other interests and rights and also made trial in the
determination of rights of privacy in specific contexts and practices. Some of the specialized
topics are like privacy on places of work and privacy on medical, privacy on the internet, public
privacy and genetic privacy.
Security, Privacy and Ethical Reflection_3

SECURITY, PRIVACY AND ETHICAL REFLECTION 4
2. Discuss what you see as the personal and ethical implications for the security of individual
clients of an NGO that has adopted the MySupport approach. (30 marks)
Under the ethical and personal implications of the security of individuals, we will look at
the information security and the moral importance of security at a personal level. We will also
look at security nationally as well as their relationship with personal security. Now, personal
security is the provision of information protection against unauthorized access, change or
formatting of information and also against service denial (Pope & Vasquez, 2016). The condition
that results from all these efforts is known as a personal security. The main aim of personal
security is the attainment of personal information security. There exists a difference between
personal security and information security or data security. Personal security is the protection of
personal information from being accessed without the owner’s consent while security for data
refers to data protection in the disk the of a computer system or that is being transferred between
systems. Security for information is concerned with the protection of the following data aspects:
data availability, data integrity, and data confidentiality.
For instance, let’s look at an example of a computer. How does it cause a security issue?
According to the explanation of ethics, its main concerns are on the interests, harms and the
rights. This question may be answered looking at the relationship between a computer security
and rights, interests and arms. What important benefits does a computer security bring? What can
the moral harms violation or rights violation result to as a lack of computer security (Hepworth,
Rooney, Rooney & Strom-Gottfried, 2016)? We get to see that in case a system is undermined,
the software and the hardware that are valuable might become damaged or corrupted leading to
Security, Privacy and Ethical Reflection_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents