Securing the Electronic Frontier the Paradox of Essay

Total Length: 591 words ( 2 double-spaced pages)

Total Sources: 4

Page 1 of 2

Securing the Electronic Frontier

The paradox of how to secure individuals and organizations' right to access the Internet vs. securing personal and corporate data and identities is a particularly complex and challenging issue. The ethicacy of this paradox is most present in the differences between encryption and Pretty Good Privacy (PGP). Too open of standards and governance policies on these areas will often lead to large scale data breaches, as many organizations presume they have greater security over their data than is actually the case (Mikko, 2010). When security guidelines and initiatives are too restrictive, organizations cannot accomplish their objectives either. Making this paradox complex is the ethicacy of asking people and organizations for passwords and access to their accounts (Spinello, 2004). The ethics of trespass vs. legitimate access becomes all the more critical when the complexity, pace and severity of computer fraud perpetrated by globally-based gangs that are well-financed (Mikko, 2010).

Stuck Writing Your "Securing the Electronic Frontier the Paradox Of" Essay?



Analyzing the Ethics of the Electronic Frontier

Too many organizations are getting lulled into a state of false complacency due to the security vendors hyping their solutions, and the tendency to believe in their technological superiority (Miller, Tucker, 2011). This is dangerous and is one of the strongest catalysts for global governments increasingly attempting to get password access to user's accounts globally. Crime syndicates and gangs, in addition to unscrupulous marketers all attempt to also gain access to potential customers' account through the use of spam and spiders. Both of these forms of communication are clearly forms of electronic trespass. They violate the ethical boundaries of individual freedoms as defined by Kantian, Utilitarian, and Social Contract Theories (Spinello, 2004). Bots, spiders and spam are also unethical from the standpoint of deliberately changing the context of value exchanged and the intentional misuse of the….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Securing The Electronic Frontier The Paradox Of" (2013, April 16) Retrieved May 22, 2025, from
https://www.aceyourpaper.com/essays/securing-electronic-frontier-paradox-89684

Latest MLA Format (8th edition)

Copy Reference
"Securing The Electronic Frontier The Paradox Of" 16 April 2013. Web.22 May. 2025. <
https://www.aceyourpaper.com/essays/securing-electronic-frontier-paradox-89684>

Latest Chicago Format (16th edition)

Copy Reference
"Securing The Electronic Frontier The Paradox Of", 16 April 2013, Accessed.22 May. 2025,
https://www.aceyourpaper.com/essays/securing-electronic-frontier-paradox-89684