.

Thursday, March 21, 2019

Ethical Issues in Secured Communications Essay -- Communication Ethics

Ethical Issues in Secured communications1. Introduction The outstanding growth of network technologies in the past ecstasy have contributed to millions of new applications and industries. Literally millions of companies around the world were created to serve this considerable growth. Even though many of those companies did not survive until the present time, roughly of the applications did survive and they are still widely used among consumers of all ages, cultures, and backgrounds. intimately of the widely used applications are not secured. I go forth set apart what is meant by a secured communication later in the stem. However, this paper is more concerned in the way people use these applications in equipment casualty of identity. Many applications allow users to participate in specific discussion groups or web activities as anonymous. Anonymity might not be a problem in open chatting rooms for example, but what about banking applications or email or even instant e lectronic messaging. Email and instant messaging software are free to use and provided by respective companies such as Microsoft and Yahoo. Those operate do not require a palpable identity to be used and many people use these services as anonymous. The opposite of being anonymous is to be verified, and in rate for someone to be verified on the internet, he/she has to be authenticated. enfranchisement ensures that the person using a specific application is whomever he/she claims to be. This paper will look in detail on how authentication nooky be achieved on the web and why it is necessary. Then I will focus on the notion of anonymity and identity. Then we will test who supports anonymity on the web and why. Then we will see who stands against it and why. A controversial example will be given and ... ...2 2000 B.C. Intell. Prop. & Tech. F. 041901 - Herman T. Tavani, Privacy and the meshwork3 1999 B.C. Intell. Prop. & Tech. F. 060506 - Dr. Ronald J. Kizior, Lurking on th e Internet4 1999 B.C. Intell. Prop. & Tech. F. 060507 - Adam White Scoville, Text is Self The conjugation of Property and Identity5 W. Stallings, Cryptography and Network Security Principles and Practice, assimilator Hall, 2002, Ch. 146 E. Shaefer, MATH 178/196 screen out notes, Santa Clara University, Computer Science and Mathematics division7 http//www.penet.fi/press-english.html8 http//legacy.eos.ncsu.edu/eos/info/computer_ethics/privacy/anonymity/9 http//www.niksula.cs.hut.fi/eklund/Opinnot/netsec.html10 N. Ling, Data Compression 1 class notes, Santa Clara University, Computer Engineering Department11 Anonymity on the web FAQ

No comments:

Post a Comment