Wednesday, February 19, 2020

Security Essay Example | Topics and Well Written Essays - 1500 words - 2

Security - Essay Example Authority, source and control are the major resources of the information. In fact, the key to success is the right access towards the information. As a result, the social and political relationships are also involved in the development and growth of information systems (Hilton, Se-Hyung "David" Oh et al. 2006). It is more important and ethical that how this information is been utilized by the people. For instance, government levels, headquarters and homes include the electronic systems (Hilton, Se-Hyung "David" Oh et al. 2006). This involvement is increased so much that the people without access to these systems are exaggerated in a particular way. For this reason, new and modern techniques, innovative ethical and lawful decisions are needed in order to balance the requirements and privileges of every person (Stahl 2011). The legal decision lags lies as in modern technological field behind technical development and growth. These gaps are filled through confronting on the issue and by discussing the facts on how to use the electronic information should be proceed. Furthermore, the above observation delineates the ethical issues in a broad way. On the contrary, the deciding laws include some characteristics related to the issues. These legal issues should be resolved in Electronic Information Systems. In relation to the entire community, the ethics consists of moral options choose by the individuals or users. These include standards of acceptable behavior and rules governing members of an occupation. Moreover, these extend to the Electronic Networks, Electronic Databases and significantly to a Geographic Information Systems. The problems that are present particularly in the three areas require a little different type of ethical decisions. In general, the Electronic Systems, Geographic Information Systems and Networks are being described individually in the later section of this study. Starting from a fundamental definition of computer networks, a

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.