Sign In
Not register? Register Now!
You are here: HomeEssayLiterature & Language
Pages:
1 page/≈275 words
Sources:
2 Sources
Level:
APA
Subject:
Literature & Language
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 3.6
Topic:

Core Values and Value Conflicts in Cybersecurity (Essay Sample)

Instructions:

this order requested writing skills about values and CO VALUES. the target area i chose to focus on was in CYBER SECURITY. therefore, i highlighted the primary guidelines often WRITTEN to manage CYBER SECURITY issues and the potential limitations and conflicts that might arise among the various goals.

source..
Content:


Core Values and Value Conflicts in Cybersecurity
According to the author, the central values relevant to cybersecurity are privacy, security, fairness and accountability. Privacy is a value arguing that personal data should be managed diligently as guided by someone’s identity, dignity, moral autonomy, confidentiality, anonymity and liberty (Christen et al., 2020). The second value, security, address the safety of data and valuable information through protection from harm, breaches or attacks. Fairness in cybersecurity upholds equality, justice, democracy, non-discrimination and freedom in cyber-related activities. Lastly, the value of accountability is a procedural policy that addresses openness, transparency and explainability regarding internet services, processes and procedures. Generally, goodness and ethicality in cybersecurity are maintained by privacy, security, fairness and accountability values.
Among the primary values that drive cybersecurity, privacy and security share conflicting beliefs. Value conflict is the difficulty in simultaneously respecting the guidelines of more than one value (Van de Poel & Christen, 2020). For instance, privacy dictates that valuable data be handled confidentially and anonymously while security strives to protect information between an agent and potential threat. There is no clear danger in privacy, while in security, there are identified malicious parties. Sensitive data can be hidden from unauthorized access, but in ensuring safety, some privacy principles might be customized to target a known threat.

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • The Interrelation among Theory, Practice and Research
    Description: The relationship between these three fundamentals is cyclical and reciprocal. This implies that the clinical practice generates the research questions and the knowledge for theory. Applying research in our daily nursing practice enhances nursing practice and patient care. Notably, their relationship ...
    2 pages/≈550 words| 2 Sources | APA | Literature & Language | Essay |
  • Vivaldi's most famous piece
    Description: The four seasons are Vivaldi's most famous piece, even though he wrote 500 other concertos. His three movements were divided into fast-slow-fast. The movement I choose to listen to is Allegro non molto which is concerto four in the F minor, summer. Often, he loves using word painting in his pieces;...
    1 page/≈275 words| 2 Sources | APA | Literature & Language | Essay |
  • The Effect of Online Learning and Difficulties in Parenting
    Description: Schooling in universal is a style of study in which the information, ability, and practice of a class of population are passed on as one develops to the following across training, practice, or exploration. Advances in details technology and media technology, as well as the use of the Internet as an extra ...
    12 pages/≈3300 words| 9 Sources | APA | Literature & Language | Essay |
Need a Custom Essay Written?
First time 15% Discount!