Friday, December 6, 2019

Community Vulnerability

Question: Discuss about theCommunity Vulnerability. Answer: Introduction The human dignity is a moral vision which cannot be taken away. It holds a strong position from the start to end of a human life as it is our inherent value. As human being is a social animal, they need to make broader contribution for the realization of common good. Common good is superior to personal good as it is involved in benefit of the wider community (Chung, 2016). In this digital age, information technology is usually synonymous with mobile devices, internet, gadgets and computers of all kinds. The information and communication technology helps people in uniting them with their closed ones (Mel, 2011). Human beings have a personal sphere of life and they value privacy. They certainly do not want their personal information to be accessed by others. However, information technology (IT) has been advancing constantly thereby reducing the amount of control over data. In the future, I shall respect ones human right to keep information restricted so that there is maintenance of self-worth in the society. I shall use my skills and tools and technology to nurture positive human experience. I have great opportunities in developing their cross-disciplinary skills sets (Standring, 2012). However, social media has made it too easy for people to voice their opinion as there is anonymity of the keyboards. The information technology has granted the protection of anonymity which is giving the people an opportunity to demonstrate their inner evil. The informational technology allows social media channels to foster cruelty, rudeness and other ill will. The employees may use their social media account for manifesting their views of work. Technology comes with a price. In an IT firm, there are IT professionals who have skills and abilities to decode information or hack accounts. I shall ensure that screening employees and securing password of the employees so that relations are not jeopardized. There are people indulging in the sadistic pleasures of shaming and humiliation, which raise a question if information technology is a boon or curse for the society. Internet is more like a mental torture chamber for some people as the people doing wrong are clearly against the common good and human dignity. In the words of Galileo, human beings may be running the risk of explaining what is unknown (privacy) by what is even more unknown (human dignity) (Mel, 2011). While there are various causes of information technology proving beneficial for common good, the advent of technology is also leading to invention of deadly bombs, automatic rifles and other weapons that is destroying millions of lives. Not only destruction of life, but we have reached a point where we cannot survive without information technology. As stated before, information technology plays a crucial role in uniting people from different corners of the world, there are predators that pretend to be the relatives of the people and create scams. Sharing information on information technology is giving people an unprecedented power. The mob mentality and social amplification are leading to mundane events which are leading to devastating consequences (Bunge, 2015). Every human being has rights to privacy and security. Where information technology as the main cause of privacy issues, I shall try and solve the privacy issues that people face in information technology. I shall develop privacy enhancing technologies that can be useful in providing privacy to the users. It is argued that technology not only influences accessibility of information, but also changes the privacy norms. According to the precautionary principle, as an IT professional, I can come up with strategies for managing the risks that would prevent harm to the common public. Breaches of privacy have an ontological impact (Beitz, 2013). I would like to argue regarding human dignity lying in a minus and not a plus. Human being, the species always want things which are surrounded by questions, having doubts, or leads us to feeling nostalgia (Bunge, 2015). Therefore, we observe that information technology is bound by several privacy and confidentiality issues. It is my responsibility as an IT professional to utilize the technology in a manner that benefits the wider community. The human rights of privacy need to be respected for maintaining self-worth. References Beitz, C. (2013). Human Dignity in the Theory of Human Rights: Nothing But a Phrase?.Philosophy Public Affairs,41(3), 259-290. https://dx.doi.org/10.1111/papa.12017 Bunge, M. (2015).Treatise on Basic Philosophy: Ethics: The Good and The Right. Dordrecht: D. Reidel. Chung, W. (2016). Social media analytics: Security and privacy issues.Journal Of Information Privacy And Security,12(3), 105-106. https://dx.doi.org/10.1080/15536548.2016.1213994 Mel, D. (2011). The Firm as a Community of Persons: A Pillar of Humanistic Business Ethos.Journal Of Business Ethics,106(1), 89-101. https://dx.doi.org/10.1007/s10551-011-1051-2 Standring, S. (2012).The Art of Column Writing. Oak Park: Marion Street Press, LLC. Zhang, L., Amos, C., Pentina, I. (2015). Information Disclosure on a Chinese Social Media Platform.Journal Of Information Privacy And Security,11(1), 3-18. https://dx.doi.org/10.1080/15536548.2015.1010981

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.