CYB 333 - Information Security: Ethical Issues and Technology Report

Verified

Added on  2023/04/26

|10
|1155
|461
Report
AI Summary
This report delves into the realm of information security, analyzing the proposed changes to the 2018 ACM Code of Ethics and Professional Conduct compared to the 1992 version, highlighting key modifications. It explores the significance of professional codes of ethics within the information security field, outlining their crucial functions. The report also examines standards of moral responsibility, legal liability, and accountability concerning unintentional insider or machine errors. Furthermore, it proposes a model for risk analysis in developing software for safety and life-critical systems, investigates organizations with higher moral responsibilities, and identifies scenarios where whistleblowing is ethically justified, specifically in cases of inter-organizational conflict. The report is a comprehensive analysis of ethical considerations in information security, supported by research and relevant examples.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: INFORMATION SECURITY
Information Security
Name of the Student
Name of the University
Author’s Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
INFORMATION SECURITY
Table of Contents
Question 1..................................................................................................................................2
Question 2..................................................................................................................................3
Question 3..................................................................................................................................5
Question 4..................................................................................................................................6
Question 5..................................................................................................................................7
Question 6..................................................................................................................................8
References..................................................................................................................................9
Document Page
2
INFORMATION SECURITY
Question 1
Changes in 2018 Code with Few Highlights
There are few changes that are being proposed to the 2018 code of ethical ACM code
other than the 1992 code. In 1992 code, there were 24 imperatives that were formulated as the
statements of personal responsibility and identified as the elements of commitment
(Ethics.acm.org. 1992). However, in the 2018 code of ethics, the computing professionals are
supported with aspiring and current computing practitioners, influencers, instructors and
anyone, who is utilizing technology within an impactful method. The statements of
responsibility on the basis of understanding of the public good is also considered in the 2018
code of ethics. In 1992, the fifth code refers to honouring of property rights like patents and
copyrights, while in 2018 code, the fifth code refers to respecting work required for
producing new ideas, inventions and computing artefacts (Ethics.acm.org. 2018). The sixth
code of 1992 code is providing proper credit to the intellectual property, whereas that of 2018
is respecting privacy.
Document Page
3
INFORMATION SECURITY
Question 2
Professional Codes of Ethics with Important Functions in Information Security Field
The professional codes of ethics with strengths and weaknesses are as follows:
i) Strive to Achieve High Quality in both Process and Products of Professional
Work: As per this code, high quality process and products of professional work should be
achieved for maintaining professionalism in work (Ethics.acm.org. 2018). The main strength
of this code is that quality is maintained without compromising.
ii) Maintaining High Standards of Professional Competence, Conduct and Ethical
Practice: A high standard of professional competence, conduct and ethical practices are
required majorly for an employee to maintain effectiveness in work and this is the strength of
this code. The weakness would be that while maintaining these standards, often work ethics is
removed.
iii) Knowing, Respecting and Applying Existing Rules for Pertaining Professional
Work: Every existing rule to pertain professional work is known, respected and applied for
every employee to understand the subsequent requirement of work ethics without much
complexity.
iv) Accepting and Providing Correct Professional Review: The main function of this
code is that it allows to accept as well as provide accurate professional reviews to the
employee and this is termed as a major strength (Ethics.acm.org. 2018).
v) Evaluation of Computer Systems with Impacts: The proper evaluation of
computer systems with the relevant impacts are the major functions in this particular code.
vi) Ability in Obtaining Expertise: A proper ability for obtaining expertise in job is
the next significant and important professional code of ethics.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
INFORMATION SECURITY
vii) Improving Public Awareness and Technologies: The major function or strength
of this code is that the other employees also get the chance of maintaining professional work
ethics and hence public awareness and technologies are enhanced.
Document Page
5
INFORMATION SECURITY
Question 3
Standards of Moral Responsibility, Legal Liability and Accountability for Unintentional
Insider or Machine Error
Regarding moral responsibility, there are three examples of standards for the
unintentional insider or machine error within an organization. These three standards are
moral obligations, moral norms and finally moral duties.
Regarding legal liability, these types of standards for the unintentional insiders and
machine errors majorly include being responsible and answerable in law that is legally
obligated (Dewey, 2016). The legal liability focuses on criminal and civil laws and could
arise from several law areas like fines, taxes and contracts.
Regarding accountability, the examples of standards are AA1000 series for helping
companies to become more accountable and sustainable and HAP or Humanitarian
Accountability Partnership for designing, implementing, assessing, improving and
recognizing accountable programs.
Document Page
6
INFORMATION SECURITY
Question 4
Proposal of Developing Adequate Model of Risk Analysis to Develop Software with Safety
Critical and Life Critical Systems
There are four distinctive steps for the development of an adequate model of risk
analysis for developing software with critical and life critical systems and these steps are as
follows:
i) Selection of Likelihood Functions
ii) Identification of Variables for Measuring Risks
iii) Proper Computer Simulation
iv) Checking the Risk Profile.
These above mentioned steps are hence proposed for developing sufficient risk
analysis model (Noddings, 2013).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
INFORMATION SECURITY
Question 5
Organizations having Higher Moral Responsibility than Others with Examples
Yes, some of the organizations have higher moral responsibility than the rest of the
companies. These types of organizations are solely responsible for reducing the complexity
of decision making and hence gaining competitive advantages (Moor, 2017). A contract
theory is also maintained in this case and thus proper effectiveness is being followed. For
example, when in any company, an employee might have differentiation in the concept of
interest than the other employees and in this case, high moral responsibility is majorly
important for the company.
Document Page
8
INFORMATION SECURITY
Question 6
Kind of Conflict in which Employee should Blow the Whistle
Whistle blowing is the type of activity that is being executed by either an employee or
employer in a company to remove the ethical issues or any particular ethical scenario from
that particular company (Ross, 2013). There are five types of conflicts, which are individual
conflict, interpersonal conflict, inter organizational conflict, inter group conflict and conflict
within group and individual. The employee should blow whistle for inter organizational
conflicts in a company.
Document Page
9
INFORMATION SECURITY
References
Dewey, J. (2016). Ethics. Read Books Ltd.
Ethics.acm.org. (1992). [online]. Accessed from
https://ethics.acm.org/code-of-ethics/previous-versions/1992-acm-code/ [Accessed on
01 Feb. 2019].
Ethics.acm.org. (2018). [online]. Accessed from https://ethics.acm.org/2018-code-draft-3/
[Accessed on 01 Feb. 2019].
Moor, J. H. (2017). What is computer ethics?. In Computer Ethics (pp. 31-40). Routledge.
Noddings, N. (2013). Caring: A relational approach to ethics and moral education. Univ of
California Press.
Ross, D. (2013). Foundations of ethics. Read Books Ltd.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]