Tuesday, May 5, 2020

Balance Between Security and Privacy - Free Samples to Students

Question: Discuss about the Balance Between Security and Privacy. Answer: Introduction Cybersecurity has always been a contentious issue owing to the nature of its operational environment management i.e. the internet. In essence, the internet was originally designed to be a seamless platform having extended accessibility and user freedom. However, the same defining factors limit its effectiveness today as intruders or malicious individuals use these factors to compromise systems which have led to the ethical dilemmas and issues seen today. Moreover, the political climate exhibited today where different states and countries hold different priorities in cybersecurity makes it difficult to enforce the critical laws of safeguarding user information(Liew, 2016). In addition to this, a multitude of operational factors are attributed to the problems seen in cyber systems where peoples security, privacy and even intellectual property is regularly lost. Now, this report analyses the ethical issues in cybersecurity based on the four classical ethical theories. According to an article written by Liew Jason, the biggest ethical dilemma facing cybersecurity is the balance between information privacy and security. In essence, the users of the internet demand freedom and liberty based on their existing rights of communication as well as information. However, the same rights are exploited by intruders to carry out attacks on innocent civilians which today has even extended beyond the digital world to include physical attack such as those of terrorism. Furthermore, there have been many incidences of cyber intrusion where businesses management, governments and even non-profit institutions have been hacked affecting their overall credibility(Liew, 2016). Classical ethical theories Utilitarianism the internet by all accounts was met to expand the mind and operational environment of the human species. This objective led to its original design which is facilitated by a borderless and extensive network. Again, based on this account the utilitarian principles are fully maximized where the general good of the people is at the helm of operations, boosting business outcomes, communication and even socialization. However, with the emergence of cybercrime, the unethical stature of the users emerge where the same structure promote harm and not happiness, a key component of utility principles(Driver, 2014). Remember, as an ethical theory, utilitarianism advocates for the general good of the people where the actions imposed should promote the overall happiness of the majority. This outcome raises a serious ethical issue on the cyber security features put in place where again, the users liberty and freedom is short-lived to safeguard them. In fact, the ethical issues at hand, stand as dilemmas as governments must weigh two critical moral components; privacy and security. On one hand, promoting utmost security will mean accessing users confidential information to evaluate their actions hence mitigate malicious individuals. On the other hand, extended freedom will result in extensive attacks, which places the utilitarian principles under a constant conflict as a dynamic balance is needed(Gandjour, 2007). Deontology In his article, Liew highlights the countless attacks conducted by cybercriminals where medical records, governments defence institutions and even adultery websites are breached. These attacks signal the duties (or lack of duties) by the perpetrators as well as the security agencies. In essence, these parties should hold several ethical/moral duties to the society at large. For one, they should exercise prohibitory duties where their moral code should stop them from executing the attacks. However, even more, critical are the duties held by the security agencies who should safeguard the users of the internet. Now, based on deontological principles, these individuals hold a promise to protect the users of the internet and their resources management. However, the same promise should be limited and controlled by their ethical standards(Misselbrook, 2013). Therefore, the security parameters imposed should not be an exercise to intrude on users privacy where extensive surveillance and online monitoring is imposed. Again, this outcome raises the concerns of distinguishing between the rights of privacy and security, elements that are always in constant conflict in the cyber world(Alexander, 2016). Virtue forgetting the duties, actions and consequences of cybersecurity, one has to consider the character of the people involved in the cyber-environment. The ethical issues at hand (privacy and security) are generally determined by the stakeholders of the digital environment where governments and security agencies should impose the right measure without depriving other related factors. What does this mean? The security protocols put in place should balance the need for security with that of freedom and privacy. In fact, the security personnel involved (either government officials or private contractors), should not extend their legal or ethical reach beyond their mandated procedures. Therefore, a need to gather intelligence must not be used as an excuse to access users private information. This outlook is the defining factor of virtue ethics where the character and attributes of the people involved are based on the virtue principles i.e. courage, honesty, justice and temperance am ong many others(Sakellariouv, 2015). Contract recent statistics outline the devastation caused by cyber-crime and terrorism, where more than 39 percent of business institutions have been attacked through their cyber systems. However, the same companies still hold ignorant stands on the need for cybersecurity, lacking the necessary security features(Liew, 2016). Now, as worldwide agencies of the internet, these organizations management hold a social responsibility to protect the assets they use. Furthermore, this responsibility should be based on the contractual obligation to protect the society and not documented legislation. The same contractual obligation should also be held by the governing bodies i.e. the governments who through the principles of social contract should exercise equality by managing the issues at hand. Moreover, the individual using the internet must also hold the same responsibility where adequate security features are implemented and supported(Gaus, 2017). Conclusion The problems outlined above are a consequence of the nature of cyber security which to date is still a new concept, lacking the necessary definitions and parameters to enforce its functionalities. Furthermore, the different security policies and legislation used by countries across the globe make it difficult to implement the features of cybersecurity. However, away from these challenges, cybersecurity has also to contend with the need for information security and privacy where both elements are continuously conflicting with each other. Now, while legislation may help mitigate the ethical problems at hand, the virtues and character of the people involved will need to change. In essence, the solution lies in the cultural change of cyber systems users where internet proponents will need to conduct their online affairs while adhering to proper ethical/moral codes. References Alexander, L. (2016). Deontological Ethics. Stanford Encyclopedia of Philosophy, Retrieved 22 September, 2017, from: https://plato.stanford.edu/entries/ethics-deontological/. Driver, J. (2014). The History of Utilitarianism. Stanford Encyclopedia of Philosophy, Retrieved 22 September, 2017, from: https://plato.stanford.edu/entries/utilitarianism-history/. Gandjour, A. (2007). Is it rational to pursue utilitarianism? University of Cologne, Retrieved 22 September, 2017, from: https://www.ethical-perspectives.be/viewpic.php?TABLE=EPID=1060. Gaus, G. (2017). Contemporary Approaches to the Social Contract. Stanford Encyclopedia of Philosophy, Retrieved 22 September, 2017, from: https://plato.stanford.edu/entries/contractarianism-contemporary/. Liew, J. (2016). Cyber Security: The Balance Between Security And Privacy. Legal News Analysis - Asia Pacific - Regulatory Compliance, Retrieved 22 September, 2017, from: https://www.conventuslaw.com/report/cyber-security-the-balance-between-security-and/. Misselbrook, D. (2013). Duty, Kant, and Deontology. NCBI, Retrieved 22 September, 2017, from: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3609464/. Sakellariouv, A. (2015). Virtue Ethics and its Potential as the Leading Moral Theory. Student pulse journal quest, Retrieved 22 September, 2017, from: https://www.inquiriesjournal.com/articles/1385/virtue-ethics-and-moral-theory.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.