Legal, Social, Ethical, And Professional Issues In Cyber Security

Social Issues

Discuss the Legal, Social, Ethical and professional issues.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

This essay discusses the topic of cyber security within different business organizations. This essay discusses the needs of ethics of different organization in order to deal with the software protection of the computers of the organization. This essay discusses whether every organization has the demand of anti malware protection within the computers and mobile devices those are used by the particular company. There are various threats of affecting the personal data of the computers or mobile within the organizational premises. Therefore, every organization needs to check the security of different products of informational technology as well as information communication and technology. The essay discus whether a law should be imposed by the government o not on the issue of personal security of different IT related products. This essay discusses the possibility of using malware protective software within the purposes of business.

As stated by, Pfleeger & Pfleeger (2002), social issues within the sector of information technology refers to all issues those can have the impact over the all types of societal aspects of information technology. The social issues of computer hacking or information technology can have the impact over the culture; practices, beliefs and values of inter organizational aspect. The process of management over the information resources, information system and information technology have the potential effect or impact over the important aspects of the society. On the other hand, Quinn (2014) argued that, in this case the term ‘society’ has a large meaning. Therefore, the areas of society are nations, culture, people, and tendency of people within the society. If an organization or an individual person of a particular country can be caught, while doing hacking or similar types of action the aspect of the particular country have been decreased among other countries of the world. Many developing countries are witnessing the cyber crime or the mobile hacking process within the fellow citizens of the country.

A series of cultural issues can be included within different types of social issues of informational technology related elements. Cultural issues include political conflict between two or more countries regarding some IT issues, power asymmetry, social environments, cultural customs and social capital etc (Gunn & Taylor, 2014).

On the other hand, Sweeney (2013) stated that, several types of security issues are also there within the societal issues. The social issues include misuse of various types of data, abuse of internet, misinterpretation of digital media, security design and method of management etc. Apart from these issues, creation of viruses, abuse of different social media sites has greatly affected upon the people within the society. Several hackers of different websites are harassing women. Hackers often have harassed the teenagers and women by abusing the information technology. Hackers while using hacking technology have the personal data of different individuals. These have created nuisance among the society (Vlek et al. 2012).

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Ethical Issues

On the other hand, Whitman & Mattord (2011) argued that, social security has been affected by the activities of computer hacking, pirated software or else. There are many organized activities behind this type of activities of hackers. Different political conflicts have been increased within two or more countries. Therefore, different political groups, terrorist groups have utilized the activity of hackers in order to attack a country of their conflict.  

As discussed by, Stahl et al. (2014), many practitioner has created the term Ethical Hacking. This means that hackers try to compromise the data and information system of computer in order to inform the owner of the system to solve a problem related to informational system or informational technology. Some professional hackers take this type of action for solving the problems f the system. The particular organization also pays for this work. Freelancing white hat hackers also take action for penetrating software and publish the data within the website.

On the other hand, Bowden et al. (2015) argued that, as the world has been changed from different dimension the definition and purposes if hackers have also changed. The effect of globalization has changed the phenomenon within the society and various regions of different countries. Therefore, the changing scenario of information technology as well as information system has affected upon the societal framework as a whole.

According to Herlihy & Corey (2014), hackers can be categorized into three segments; those are hackivists, hobbyist hackers, and research and security hackers. Hactivists have the political or diplomatic intention while hacking a website. Hobbyist hackers refer to those hackers who hack for learning the thing or only for fun and hobby. Research and security hackers are those who have been concerned with discovering security vulnerabilities and they write the code for fixing the problem. Different government of different regions has imposed different laws and ethical issues. Therefore, an organization who is engaged with the action of hacking they should be breached for disturbing the ethical concerns of the organization.

As stated by, Mullen et al. (2015), professional issues are involved with different types of issues within the professional framework organization. Profession of information technology refers to the workplace of information technology and the workforce diversity of an organization. The professional issues concern diversity within the team of information technology, diversity within the workforce of IT related profession. Different types of professional organization have made different code of ethics for creating effective environment for protecting the security of IT related services within an organization.

Professional Issues

On the other hand, Bush, Heilbronner, & Ruff (2014) stated that, proper education and training is required for the professional of information technology. They should consider the security and ethical concerns of the computer system. Professional of information technology has the knowledge about different critical aspects of Information technology. However, they also should be trained by various concerns about informational technology and the security issues of those IT related issues. They should be able to deal with different types of ethical issues and security issue of the computer system r mobile devices of the organization in order to know the process of saving the organizational resources of information technology from the black hole of the hackers.

Computer hacking and violating information and other types of internet abuses fall under the legal proceeding. Civil, tort, criminal, private, public laws are there for protecting individual and organization from the process of computer hacking. As the system of internet has developed and the process of communication and business have started to take the advantage of IT and ICT system appropriate law should be imposed by different governments of several countries. In the United States, different laws are there to safeguard the information in system of IT and ICT. Computer Fraud and Abuse Act of 1986 (CFA Act), National Information Infrastructure Protection Act of 1996, USA Patriot Act of 2001, Communications Decency Act of 1996 (CDA), Telecommunications Deregulation and Competition Act of 1996 are the potential laws for saving the information of IT related document from hackers or any type of misused categories (Broadhurst et al. 2014).

On the other hand, Summers et al. (2014) discussed that, there are different professional organizations of information technology who has invented different code of ethics for dealing with the hackers. These ethical code of conduct also help to save the IT and ICT elements from any sort of misuse. The security professional should responsible in order to deal with the security issues. Computer Fraud and Abuse Act has focused upon the damage of codes of computer system. Electronic Communication Privacy Act has been signed in 1986 in order to account the data that has been stored and transferred into computer system.

Computer Misuse Act is the law that covers the area of computer hacking within an organization or individual. Computer Hacking has increased in different manner within different regions of the world. Therefore, Computer Misuse Act imposes provides that hacking is a criminal offense that has to be imposed by legal provisions. The Computer Misuse Act of 1990 has been established for providing guidelines in the process of computer hacking and other misuses of computers.  In the year 1990, the government of United Kingdom has amended the computer misuse Act.  

Legal Issues

However, Bartolacci,LeBlanc & Podhradsky (2014)  stated that, the problem of hacking has been increased as the contemporary world has been changed by different sector of economy, politics, social and other aspects. As the political diplomacy has been increased within two or more countries, the hackers have become more active than before. Different countries are utilizing different methods of hacking through effective hackers.

Therefore, Ryder (2014) has analyzed that, a group of hacker has huge sources of knowledge that has been helped them in order to take action of hacking. Several countries have used the most talented engineers for doing effective hacking of different website of different official website of government in order to know the private information. Hacking is illegal action against the privacy of an individual or an organization. Increased effort of hacking has enabled a provision of law within the country. Specific legislation is very much required in order to stop the action of hackers within different regions.

As stated by, Wiederhold (2014), The Computer Misuse Act has recognized some areas of offences; those are as follows:

  • Any type of unauthorized access to any type of material of computer
  • Any unauthorized access that intends to do crime
  • Any type of modification of material of computer that is very much unauthorized
  • Manufacturing any sort of unauthorized data and supplying the data that can be utilized for any type of computer misuse that can be called as the offence

These actions are recognized as offences under the section of Computer Misuse Act of 1990 within Britain

The threat of hacking of different IT (Information Technology) related services have increased a lot within different regions of the world. This is no longer restricted within the fun loving people it has been developed for the people of political diplomacy. Many terrorists have started hacking in order to attack the different regions of the world.

However, Ryder (2014) stated that, the government of United Kingdom has also published ‘Cyber Security Strategy’ in the year of 2009. The government of United Kingdom has recognized the need of an integrated approach in order to tackle the threats from any information technology related element or other materials. As the threats of hacking have been increased, the need of an integrated approach is very much required for developing a crime free atmosphere within the different regions of country.   

As discussed by Broadhurst et al. (2014), there are many organization behind this type of cyber crime. Many organized activities are behind this to take action of hacking. Many organized effort have been taken to destroy the privacy of any type of organization also.

Therefore, the needs of up to date malware protection is very much required for secure every software and information system of the organization. They should protect the system from the hackers.

As stated by, Ryder (2014), cyber security strategy of United Kingdom has evolved that the government should take an integrated approach. Every business organization should also take necessary action for using up to date software. Use of up to date software can be very effective for the companies in order to avoid the pirated copy or virus enabled copy. Hackers are very effective with this type of pirated computer. Therefore, hackers can easily find the sources of information from these computers. Up to date software that is malware protective do not have any problems with viruses or hackers.

There will be different conflicts about the economic benefit that can be attended from any pirated software. The cost of having this type of software is low than real anti malware protective software.

Conclusion:

The conclusion can be done by saying that a legal provision can be effective for solving the problem of computer hacking or security issues of information system within different business organizations. Pirated software or illegal documents often can cause problem within the organization. Several hackers can easily attack the systems within the organization.

Reference lists

Bartolacci, M. R., LeBlanc, L. J., & Podhradsky, A. (2014). Personal Denial Of Service (PDOS) Attacks: A Discussion & Exploration of a New Category of Cyber Crime. Journal of Digital Forensics, Security & Law, 9(1), 19-36.

Bowden, L., Fearon, C., McLaughlin, H., & Jackson, S. (2015). Aligning computing ethics for strategy making in higher education (HE) A contrarian view–who knows?. The International Journal of Information & Learning Technology, 32(1), 2-16.

Broadhurst, R., Grabosky, P., Alazab, M., Bouhours, B., & Chon, S. (2014). An Analysis of the Nature of Groups Engaged in Cyber Crime. An Analysis of the Nature of Groups engaged in Cyber Crime, International Journal of Cyber Criminology, 8(1), 1-20.

Bush, S. S., Heilbronner, R. L., & Ruff, R. M. (2014). Psychological Assessment of Symptom & Performance Validity, Response Bias, & Malingering: Official Position of the Association for Scientific Advancement in Psychological Injury & Law. Psychological Injury & Law, 7(3), 197-205.

Gunn, J., & Taylor, P. (2014). Forensic psychiatry: clinical, legal & ethical issues. CRC Press.

Herlihy, B., & Corey, G. (2014). ACA ethical st&ards casebook. John Wiley & Sons.

Mullen, P. R., Lambie, G. W., Griffith, C., & Sherrell, R. (2015). School Counselors’ General Self-Efficacy, Ethical & Legal Self-Efficacy, & Ethical & Legal Knowledge. Ethics & Behavior, (just-accepted).

Pfleeger, C. P., & Pfleeger, S. L. (2002). Security in computing. Prentice Hall Professional Technical Reference.

Quinn, M. J. (2014). Ethics for the information age (Vol. 4). Pearson.

Ryder, N. (2014). Cyber crime, security & financial crime-what SMEs need to know & how to protect yourself

Stahl, B. C., Eden, G., Jirotka, M., & Coeckelbergh, M. (2014). From Computer Ethics to Responsible Research & Innovation in ICT: The transition of reference discourses informing ethics-related research in information systems.Information & Management, 51(6), 810-818.

Summers, S., Schwarzenegger, C., Ege, G., & Young, F. (2014). The emergence of EU criminal law: cyber crime & the regulation of the information society. Bloomsbury Publishing.

Sweeney, D. S. (2013). Legal & ethical issues in play therapy. Innovations in Play Therapy, 65.

Vlek, R. J., Steines, D., Szibbo, D., Kübler, A., Schneider, M. J., Haselager, P., & Nijboer, F. (2012). Ethical issues in Brain–Computer interface research, development, & dissemination. Journal of Neurologic Physical Therapy,36(2), 94-99.

Whitman, M., & Mattord, H. (2011). Principles of information security. Cengage Learning.

Wiederhold, B. K. (2014). The role of psychology in enhancing cybersecurity.Cyberpsychology, Behavior, & Social Networking, 17(3), 131-132.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP