New technologies raise new ethical challenges besides new technical problems. Cloud computing is the recent technology in IT that moves the data away from portable storage devices to large data centers called cloud. It basically means that every application given as services over the Internet to the user. In the view of User it is accessing his/her files, programs and other services through Internet which are hosted by other service providers. One more aspect of cloud computing is the cost effectiveness of this technology which attracted enterprises to use this technology to consume their IT services in a cost effective way. With the Commercialization of this technology, the hype around the Cloud computing technology growing in lightning speed. Now the Cloud Computing is in use, but still it is an emerging technology. It is a unknown thing that, how this technology can be used and for what purposes it will be used and what kind of ethical issues these developments will rise in future. A Precautionary Principle is obtained to control the rise of ethical issues. It is good to react before unexpected consequences occurs through these ethical issues. The technical problems can be solved at the time of rise but ethical problems need to be identified prior to the development to the success of the technology.
Cloud Computing is growing rapidly and now it is used by great number of individuals and organizations. But they are not concerned about the ethical issues related to this technology .They need to discuss the ethical issues widely so that the technology can be used in a proper way. The range and the diverse innovations included in the technology makes the meaning of cloud computing a ‘Conceptual Muddle ‘ (Moor 2006 & Vaquero et al.2...
... middle of paper ...
...they have to speculate possible ways of solving these issues in forward.
In conclusion to avoid ethical issues related to cloud computing precautionary principle is an approach to deal with. The precautionary principle is that we should be in preventive mode in the development stage of the technology so that the raised ethical issues will have a solution. The precautionary is to prevent harm from unknown happenings without hampering the development of the technology. There are many more ethical issues are there which are not identified till now. Developers has to identify these problems .This does not mean that development and implementations abort all together. By solving the ethical issues the developers can give trust on the technology to the users. Then users can use this technology without any negotiations which will finally lead to the success of technology.
Ethics of technology is one important aspect of ethics and is required to answer all the ethical questions which are specific to the technological age. Ethics of technology can also be defined as “Cyber-ethics”. The main reason for the existence of cyber-ethics is to examine the impact that cyber related crimes has for our social, legal and moral systems. Cyber ethics can also help us in calculating the social policies and laws that we frame with respect to issues...
Cloud is the result of a decade research in the field of distributing computing , utility computing, virtualization , grid computing and more recently software, network services and web technology which is changeable evolution on demanding technology and services also as looking to the rapid growth of cloud computing which have changed the global computing infrastructure as well as the concept of computing resources toward cloud infrastructure. The important and interest of cloud computing increasing day by day and this technology receives more and more attention in the world (Jain, 2014) the mostly widely used definition of cloud computing is introduced by NIST “as a model for enabling a convenient on demand network access
The cloud computing is still under development but if it can manage to maintain information privacy and confidentiality than it will become revolutionary in healthcare field. And we never know, in future science and technology might introduce more advanced level of apps and service with enhanced level of privacy and security measures.
Even though cloud computing is still an emerging technology there are many benefits to our organization by adopting this technology. For instance, the reduction of operational cost, the ability to access data from any network and device, and the ability to upgrade and downgrade with ease whenever needed. Looking at the statistical data from companies that have adopted this technology, I think Partners in Heath should adopt Cloud computing. It think it is the perfect technology to solve our financial problems, as well as adding several benefits mentioned earlier.
Albert Einstein once said that he “[does] not believe in immortality of the individual, and consider [‘s] ethics to be an exclusively human concern with no superhuman authority behind it”. Ethics matters not only in ones personal life but in society as a whole. It touches everything in today’s world. A major place that is affected by ethics nowadays is technology. With the development of new powerful technologies and better communication systems the Internet threats have reached a certain level of maturity that concerns many. Cyber Security has turned into a dependency for many, such as: private organizations, government health institutions and many companies. The amount of information available in these systems could compromise them and the many users they support. In the article” Data theft from firms topped a trillion dollars in 2008: study” cyber security is the main topic. The formal ethical systems that could justify the actions reported in the article, if these actions are consistent with either the ACM or IEEE codes of ethics, and if the behaviors are consistent with issues of privacy or intellectual property are all issues that will be further discussed.
Legal and ethical issues in computing are not as straight forward as one expects, consequently these two comprehensive concepts can be divided into many sub-sections such as computer ethics, which is a moral standard used as a guideline for computer users, Code of ethics is
A. Ethics is the collection of moral principles that controls the actions of an individual or a group. And managing the use of computers can be done by computer ethics which is set of moral principles that controls the usage of computers. Here in computer ethics we can find some common issues which contains privacy concerns, copyrighted electronic content and how the society is been affected by computers. Let us understand in brief about computer ethics by illustrating with an example that is approaching or entering into someone’s personal details or particulars though it may be attainable on a computer system but, according to computer ethics it would suggest that such an action is completely wrong.
Viswanathan, Priya. “Cloud Computing- Is it Really All That Beneficial?” Advantages and Disadvantages of Cloud Computing (2013): n. pag. Web.
With the growth of information technology use in organization, there is also a parallel growth in some individuals or businesses engagement in some unethical behaviors relating to the use of information technology. That is a good enough reason why it would be vital for education systems and businesses to tackle about the ethical concerns of information technology usage and to come out with code of ethics to restore ethical issues and violations. According to Brooks (2010), there are four major problems which concern the managers of information technology the most. The problems are as following (a) security, (b) privacy, (c) electronic monitoring, and (d) intellectual property of workforces. In this paper, this paper will address these major issues and identify the ethical challenges presented by each issue.
When they wanted to save photos online instead of on your personal computer, they are able to use “cloud computing” service. Cloud computing means that the transfer of computing data or information over the internet. Not just to keep data in your personal computer, they are able to save the data on internet server to open their data in any computer. In this report we will walk through about what is cloud computing, what kinds of model did cloud computing have, types of cloud computing, benefits of cloud computing, and security.
As aforementioned, in recent years the internet has increased popularity and with that comes some concerns in laws regarding the cloud. Few laws have been created to protect the users of the internet from non consensual use of personal information. “Usually the only legal precedents restricting a company is its own privacy policy but most companies give you a sense of protection without any legality behind it,”(2013, CQ Researcher, Big data and privacy). This is a problem because with no laws or policies protecting the private internet user companies will be able to do what they want with the information and nothing will stop them.
James H. Moor, Why We Need Better Ethics for Emerging Technologies, Ethics and Information Technology, v.7 n.3, p.111-119, September 2005
...puter technology are rooted in the general ethical issues that people in society deal with. For example, the ethical issues such as invasion of privacy, theft, and fraud have been around since human beings began interacting with each other. The fact is that elements of these ethical issues are not unique to the computer field or computer technology. These current technologies raise the same ethical dilemmas with conditions that are unique to computer and cyber technology. This explains why we general ethical issue are such as privacy, theft and fraud are reexamined as informational privacy, identity theft and computer fraud in computer technology.
Duquenoy, P., Jones, S., & Blundell, B. (2008). Ethical, legal and professional issues in computing. London: Thomson.
In cloud computing, the word cloud is used as a metaphor for “the internet”. So the cloud computing means “a type of internet-based computing”, where different services such as servers, storage and applications are delivered to an organization’s computers and devices through the internet.