.

Saturday, February 9, 2019

Ethical Issues in Secured Communications Essay -- Communication Ethics

Ethical Issues in Secured communications1. Introduction The outstanding growth of network technologies in the past ten have contributed to millions of new applications and industries. Literally millions of companies around the world were created to serve this considerable growth. Even though many of those companies did not survive until the present time, most of the applications did survive and they are still widely used among consumers of all ages, cultures, and backgrounds. to the highest degree of the widely used applications are not secured. I pull up stakes congeal what is meant by a secured communication later in the constitution. However, this paper is to a greater extent concerned in the way people use these applications in toll of identity. Many applications allow users to participate in specific discussion groups or web activities as anonymous. Anonymity might not be a problem in open chatting rooms for example, but what about banking applications or email or even instant communicate. Email and instant messaging software are free to use and provided by respective companies such(prenominal) as Microsoft and Yahoo. Those go do not require a very identity to be used and many people use these services as anonymous. The opposite of being anonymous is to be verified, and in set for someone to be verified on the internet, he/she has to be authenticated. documentation ensures that the person using a specific application is whomever he/she claims to be. This paper will look in detail on how authentication place be achieved on the web and why it is necessary. Then I will focus on the notion of anonymity and identity. Then we will assist who supports anonymity on the web and why. Then we will see who stands against it and why. A controversial example will be given and ... ...2 2000 B.C. Intell. Prop. & Tech. F. 041901 - Herman T. Tavani, Privacy and the network3 1999 B.C. Intell. Prop. & Tech. F. 060506 - Dr. Ronald J. Kizior, Lurking on the Internet4 1999 B.C. Intell. Prop. & Tech. F. 060507 - Adam White Scoville, Text is Self The uniting of Property and Identity5 W. Stallings, Cryptography and Network Security Principles and Practice, scholar Hall, 2002, Ch. 146 E. Shaefer, MATH 178/196 sort out notes, Santa Clara University, Computer Science and Mathematics department7 http//www.penet.fi/press-english.html8 http//legacy.eos.ncsu.edu/eos/info/computer_ethics/privacy/anonymity/9 http//www.niksula.cs.hut.fi/eklund/Opinnot/netsec.html10 N. Ling, Data Compression 1 class notes, Santa Clara University, Computer Engineering Department11 Anonymity on the web FAQ

No comments:

Post a Comment