欢迎来到51Due,请先 | 注册
关注我们: 51due论文代写二维码 51due论文代写平台微博
英国论文代写,英国essay代写知名品牌微信

Essay代写范文

为您解决留学中生活、学习、工作的困难、疑惑
释放自我

英国essay代写-the use of regulation in public internet access

2017-11-09 | 来源:51due教员组 | 类别:Essay代写范文

本篇英国essay代写-the use of regulation in public internet access讲了作为一个在公共环境(如公共图书馆,大学,网吧或工作场所)管理计算机和互联网接入的IT专业人员,有一些需要了解的问题。首先,区别或区分行业的法律和道德原则的范围和视角是重要的。本篇essay代写由51due代写平台整理,供大家参考阅读。


Introduction

As an IT professional managing computer and Internet access in a public environment such as a public library, university, internet café OR a workplace, there are a few issues that one needs to understand. First, it is important to make the difference or to differentiate between the scope and perspective of both the law and ethical principles in the industry. In addition, a good IT professional has to identify the different and diverse national laws which related or guide or regulate the general practices or application of information technology security in the country (Bok, 1999). It is also vital for the It professional to understand and grasp the implications of different roles of the prevailing IT culture as it applies to the ethics within the information security. According to John (2014, pg. 45) helps to equip the person with the relevant competencies through which they can understand both the legal and the ethical responsibilities in the perspective of the organization's legal and ethical responsibilities. 

A practicing IT professional is able to minimize the potential risks, reduce associated risks in the paradigm of the current legal environment, and keeps the professional in tune with the current laws and regulations as well as prepared him or her to adequately watch for new issues that emerge in this dynamic field. Moreover, understanding different legal issues in the management of computer and Internet access in a public environment such as a public library, university, internet café or a workplace allows the IT professional to understand and appreciate the different rules which mandate or prohibit certain societal behavior in the uptake and utilization of computers and the internet within the public space. For example, Antenucci (2011, pg. 23) explains that  it exposes the IT professional to the prevailing ethics as socially defined, to the prevailing cultural mores through exposure to fixed moral attitudes, specific group ethics or attitudes and customs of each group. This fully prepares the IT professional for the different implications and interpretations of the IT related laws in addition to the sanctions of the specific governing authority which may not be evident through ethical principles.

This assignment discusses the practical as well as associated ethical issues that an information technology professional needs to take into consideration when managing both computer and internet access in a public environment such as in a public library, a workplace, in a public university or in an internet café.

A case study of the use of regulation in public internet access

One of the best examples of the application of public internet and computer regulations is the case of Multnomah county library. In this library, there is a set of regulations that outline an acceptable use of the internet and other library public computers. These regulations allows the library to regulate as well as facilitate the users to access a variety of their internet resources and public computers in accessing internet information beyond the confines of the library collections. As a result through these regulations, the library is able to provide a full range of different intent browser plug-ins for such different functions as searching the internet, file display as well as multimedia content viewing in addition to word processing. 

Procedures and systems for an information professional when managing computer and Internet access in a public environment

As an information professional with the duty and responsibility to manage both computer and intent access, it is important to put in place different but relevant procedures and systems in order to ensure that security policies are developed and implemented in order to safeguard the integrity, confidentiality as well as the availability and access of the information within the public sphere. 

 IT professional managing computer and internet access in a public sphere such as in an environment such as a public library, university, internet café or a workplace must ensure that the necessary and relevant infrastructure in terms of personnel, systems and procedures are developed, implemented as well as complimented through the right and relevant monitoring, compliance as well as provision of the necessary support mechanisms for both incident reporting and violations. 

 According to Singer (2013, pg. 89) some of the most common procedures and system that are available for It professionals charged with the duty and responsibility of managing both computer and internet access in a public environment such as a public library, university, internet café OR a workplace include

Could of the private cloud

     This is a cloud-based platform that an IT security manager can implement within the organization's network over the corporate firewall in order to limit access only to the authenticated persons. It is very efficient particular in publically share connections.

Encryption

This provides the organization IT security manager with a security procedure under which access is only permitted through a method of scrambled or encoding electronic data. Hence, access is only possible for some specific individuals with a designated password. 

workforce/work member

Under this procedure or security system, the IT security manager protects the organization's network connection through a system of share but the secret password.  

User

This is a security code name given to each workforce member or any other party with allowed access to the common computer network. It allows the IT security manager the ability to secure the organization's connection through maintaining a closely guarded list of who uses, maintains or has access to the privileged IT county IT systems.

User ID or login

This system of network security provided the internet or computer protection manager with a security system that authenticates the identity of each user. It is fitted with a specific code that gives each assigned person access privileged by means of identifying the specific user to the county IT systems. 

Virtue private network (VPN)

This is a security system that provides a secure encrypted network connection between several internet connections over the public intent or any form of safe network. It provides the IT manager with a sound security to different workstations computers over diverse locations through a system of communicating with each other. 

USB drive, USB flash drive or memory disk

  V this is a small portable device at the disposal of the IT security manager which he can use for the purposes of securing their interconnection, particularly in the public sphere. It is easy to use, has the capacity to plug into any workstation as long as the computer has the USB drive and protects the internet connection by functioning as an extra storage space for the hard drive.  

Trojan or Trojan horse

      This is an IT security system that allows the organization to protect their computers or internet access through disguising as something else. For example, it may pretend to be a legitimate file which a user wants to lead. It works through the creation of backdoors in order to allow access to the network which allows the hacker to access the network.

Legal and ethical issues for an information professional to consider when managing computer and Internet access in a public environment

The issue of both legal and ethical considerations in the IT field represents a somewhat neglected area. For example unlike physicians, attorneys as well as a wide range of other different professionals whose formal training entails course that address different ethical and legal issues as found common to their practice, the security training for professional information technologists does not entail any form of training over how to address the legal or the ethical issue that may arise in the course of their practice. This becomes a great challenge especially for the IT professionals charged with the duty and responsibility of managing both computer and intern access in public places (McKnight, 2015). Further, this becomes more relevant in the light of the fact that, these professionals, particularly in the public sphere, have unlimited access to confidential data as well as in-house or personal or private information and knowledge over different individuals as well as organization networks and systems. These places in their hand a means of immense power that can be abused either deliberately or inadvertently.

Due to this,  there is a need for the IT professionals to be versant with the legal and ethical training over how the immense access or control to access of both computers and the internet in such public places and public environments such as a public library, university, internet café OR a workplace can be used without undue misuse. However, despite the absence of a standardized formal training requirements, it is important for any professional IT manager in charge of both computer and internet access in the public sphere or environment such as in a public library, university, internet café or a workplace to develop and implement the relevant legal and ethical strategies for a smooth practice that avoids or eliminates either private infringement or uniform of unethical practices in the public access of computers or internet (Margaret, 2015).

For example at the legal affront, there are many issues that surround the law and the internet use in the public spheres or environment. However, according to SEP (2016 Pa. 69) owing to the relatively new nature of the internet application and access in the public environment, such laws are not very conclusive. In addition, they leave many questions unanswered while at the same time lack the necessary precedence that can only be set by time. However, there several general legal and ethical issues that a professional IT specialist in charge of managing computer and internet access in public environments such as a public library, university, internet café or a workplace. 

First, they must ensure that all copyright issues are adhered to by all the users in their jurisdiction. However, this should be enforced in a manner that allows for a fair use of such copyrighted works especially in regard to such issues as teaching, comment, research, news reporting as well as criticisms. For example, Jeffrey (2012, pg. 78) feels that it falls over such professionals to facilitate the purchase or access of permission for use of such photos or to link their clients to someone’s website. In addition, such professionals must ensure the respect in the use of trademarks as a protected infringement in addition to the use of domain names such as typo squatting, page jacking as well as cyber squatting. 

Subsequently, any professional IT manager in charge of computer and internet access has the responsibility of ensuring that the use, as well as access to different data information, is done over ethical considerations.  JSR (2009 Pa. 34) explains that different networks in public spheres have differently policed. As a result, the IT professional manager has the duty to ensure acceptable access and use policies of the internet in the public environment. For example, since public networks provide a collective use and access of internet for different purposes, such a professional has to ensure that only the allowed traffic passes through them. In addition, it is their duty to ensure that people who communicate that across such networks learn and practice or adhere to what they are allowed to do over each. For example, such a professional must have place systems that forbid and restrict the use of commercial activities for networks made for research and education purposes.

According to MCAE (2015 pa. 45) in spite of the great emphasis on the internet for free expression, the IT professional managing computer and internet access in a public environment must ensure the adherence to online civility. This would ensure that elimination of rude behavior between different users. This allows the IM managing security manager to minimize any liability to the organization that arises out of the computer or internet use.

Following the onset of the information technology era, the world has been cast adrift into a new world under which the different forms of information technologies are used for the purpose of gathering, manipulation, storing as well as disseminating and communicating different, diverse and varied information data. This has given rise to a new information revolution in regard to access, spread as well as utilization (MCAE, 2008). However, along with the way, the new phenomena has given rise to different technical as well as other ethical dilemmas in the midst of the created speed and efficiency of the IT and general aspects of electronic information systems. 

For example there the through the development and use of the information technology, the world has witnessed the emergence of local as well as the growth of global networks, databases in addition to a whole lot of a wide range of programs for accessing as well as for processing different kinds of information. This has led to the new challenges such as the reality of confronting entirely new forms of rights and other IT use associated responsibilities (OKA, 2016). For example following the massive adoption and use of IT, it has become necessary to institute different standards of conducts regulating their use and access that were not necessary before the advent of computers. In addition, this new world has led to the emergence of a new cadre of IT professionals charged with the management of the computer and Internet access especially  in a public environment such as a public library, university, internet café OR a workplace. This has been seen as the best way for different public entities to ensure the use and application ethics in the use of information systems. 

Conclusion

The development of the concept IT professionals with the duty of managing computer and Internet access in a public environment such as a public library, university, internet café or a workplace has assumed a critical role in the world of information technologies. In the current world, information is a great source of power and as a result has emerged as the key to the prosperity among different communities. This new development is also accompanied by different social, political as well as ethical challenges. Owing to these new challenges posed by the increases use of the intent in the public sphere, Most organizations serving in the public sphere such as the public library, university, internet café or a workplace have found it necessary to create the post of IT profession i.e. the manager with responsibilities over such areas as making and determining the ethical considerations under which IT can be used within their spheres. As a result, such new cadre of IT professionals have to put in place different practical and ethical policies, procedures and systems in addition to both Legal and ethical strategies in order to create the necessary controls from any infringement into private lives, within the workplace. Besides, such new strategies have been instrumental in ensuring the right balance between the needs as well as the rights of everyone, particularly in the workplace. 

       In order to achieve ethical and balanced success or practice in their work, an IT professional managing computer and Internet access in a public environment such as a public library, university, internet café or a workplace needs to have in place the relevant practical and ethical policies, procedures, systems as well as the relevant ethical and legal considerations. These approaches will allow an IT professional manager to understand the different laws that either mandate or prohibit any kind of behavior as informed by the prevailing societal ethics. Besides, availability of such provides the IT personnel with the relevant competencies for understanding the underlying ethical definitions that are acceptable within the wider community. 

        The availability of procedures that guide operations in a public environment in regard to use of information technology enables a personnel to have a clear understanding of the law in different perspectives such as civil, criminal, private, public as well as the tort law.

Word count: 2614

References

Antenucci, JC, Brown, K, Croswell, P, Kevany, M,& Archer, H 2011, Legal Issues. Chap. 11 in Geographic Information Systems: A Guide to the Technology, Van Nostrand Rheinhold, New York.

Bok, S 1999, Lying: Moral Choice in Public and Private Life, NY: Vintage, New York.

Charles, P 2014, Privacy in Peril, Macworld, New York.

CTB 2015, Ethical issues in community interventions.

Fried, C 2008, Right and Wrong. Harvard University Press, Cambridge.

HIPPAA, 2016, Security rules, policies and procedures.

Ijsr, Y 2009, Ethics and social impact of information systems in our society: analysis and recommendation.

Jeffrey, R 2012. Privacy for Sale: How Computerization Has Made Everyone's Private Life an Open Secret, Simon and Schuster, New York.

John, R 2014, A New technology creates new ethical Dilemmas.

Margaret, L 2015. Ethical issues in electronic information systems.

MCAE 2015, Ethics cases.

McKnight, J 2015, The Careless Society: Community and Its Counterfeits, New York, NY: Basic Books.

OKA 2016, Best practices in the management of computer systems security.

SEP 2016, Computer and Information Ethics.

Singer, P 2013, Practical Ethics, Cambridge University Press, Cambridge.


要想成绩好,英国论文得写好,51due代写平台为你提供英国留学资讯,专业辅导,还为你提供专业英国essay代写,paper代写,report代写,需要找论文代写的话快来联系我们51due工作客服QQ:800020041或者wechat:Abby0900吧。—Ace

我们的优势

  • 05年成立,已帮助上万人
  • 24小时专业客服
  • 团队成员都毕业于全球著名高校
  • 保证原创,支持检测

英国站