StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Ethics, Privacy, and Security Sides of Computer Spammer Issue - Essay Example

Cite this document
Summary
The author answers the questions as to computer spammer issue from the ethics, privacy and security sides. Answering the questions, the author describes the approaches which could be taken to reduce spam and expresses his opinion as to Spamhaus methodology…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.1% of users find it useful
Ethics, Privacy, and Security Sides of Computer Spammer Issue
Read Text Preview

Extract of sample "Ethics, Privacy, and Security Sides of Computer Spammer Issue"

How do the interests of computer users differ from the interests of spammers? Spammers work under a specific agenda and policy and thereby have a different course of action to their online activities. The ordinary user uses it in a more logical and natural manner and the others use it in an abrupt manner, while ordinary users use it for purposes pertaining to the private usage and other resources. Common user might be a student, a technology follower, a news follower, gardening follower, sports follower and all the uses of such computer users are for peaceful purposes.

Spammers use them to access different profiles, accounts, cause damage and get into the secure centers of the defense organizations, educational institutes, banking sectors and others. They flood the networks through continuous bombardments.The interests of ordinary users are of no threat to anyone else especially their privacy and flow of information across the network. In case of spammers the activities are motivated by damage and illegal practices.2. Do you agree with Spamhaus methodology to reduce spam?

There is margin of improvement to the manner in which Spamhaus operates. It has raised the eye brows in cases where organizations have become victim of this barring process Spamhaus methodology is based on the idea of segregation. Separating the good from the bad and this is done through blocking of list of ids which are habitual offenders. Once the list is complied that of black list ids, their list is sent across the networks of institutions and organizations. However, there work and the methods adopted has resulted in various legal constraints from time to time.

Though the methods adopted by them have made the task relatively easy and according to some, the inboxes would get flooded with junk and spams incase Spam haus was not in place and not conducting the operations.3. What other approaches could be taken to reduce spam?While the Spamhaus process does irk some of the business community members, due to the indiscriminate and at times random blocking, the solution can be reached by installing effective softwares and firewalls at back end that stream out the spam and other junk mails prior to reaching the customers.

In this method the direct approach and reach to customers can be eliminated and as a result only those ips and addresses can reach to the customers that are authenticated and of no damage. This can by large resolve the issues faced in the case of Spamhaus.4. What are the relevant legal issues in this case?There are multiple legal issues faced in the usage and application of Spamhaus. These pertain to the manner in which it operates its impact on the business enterprises, its accountability afterwards and most importantly its relevance to the local law of the land.

The first is that of damages incurred in businesses due to the filter in the name of Spamhaus. An example of this form was seen in case of suing by a Chicago based company that took Spamhaus to the court for the losses caused due to this filtering technique.The within United States law jurisdiction working is another factor on legal front since its working falls outside the local laws rules and regulations. However despite this all, this case has enabled safe browsing to a very large degree and has made life easy online.

Works cited:Portnoy, M., & Goodman, S. (2008). Global Initiatives to Secure Cyberspace: An Emerging Landscape. Springer.Zdziarski, J. (2005). Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification. No Starch Press,.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ethics, Privacy, and Security Sides of Computer Spammer Issue Essay”, n.d.)
Ethics, Privacy, and Security Sides of Computer Spammer Issue Essay. Retrieved from https://studentshare.org/information-technology/1606184-ethics-privacy-and-security-case-study-s5
(Ethics, Privacy, and Security Sides of Computer Spammer Issue Essay)
Ethics, Privacy, and Security Sides of Computer Spammer Issue Essay. https://studentshare.org/information-technology/1606184-ethics-privacy-and-security-case-study-s5.
“Ethics, Privacy, and Security Sides of Computer Spammer Issue Essay”, n.d. https://studentshare.org/information-technology/1606184-ethics-privacy-and-security-case-study-s5.
  • Cited: 0 times

CHECK THESE SAMPLES OF Ethics, Privacy, and Security Sides of Computer Spammer Issue

Cyber Terrorists: Shutdown the Internet

Hacking procedures generally dealt with infringement upon others privacy and illegal access to files, WebPages and software and causing damage to the inbuilt system.... Scare ware is the most innovative among them as the attackers remove the program installed in the computer in payment of money.... The major security forces of the world have strengthened their operation and have manipulated every possible measures to encounter the brutal acts of terrorist, but not very often they did managed to escape from the parasitism of terror....
15 Pages (3750 words) Essay

Private and Personal Information Available on the Web

Protecting their privacy online will ensure that they are not leaving their personal information open to abuse (Australian Government).... The more a person knows about his/her rights, the easier it will be for him/her to safeguard his/her privacy (Australian Government).... here are instances where people don't know about their right and importance of their privacy....
8 Pages (2000 words) Essay

Real Estate Development

This project will evaluate and provide recommendations on the potentials of developing a property in the Fountain bridge area, which was formerly a brewery, also called Fountain South East.... I will try to ascertain: They have ceased all operations in this particular location as part of a program of rationalization and are therefore placing the property on the market....
17 Pages (4250 words) Case Study

Using Official Resources for Non-Work Activities

The problem of misusing resources in the office assumes much greater significance within the office than seen from the The issue is that such actions can lead to insurmountable problems involving sentiments of the employee, and his or her belief of ownership within the company.... It is in fact, a long standing problem that HR manager have had to solve....
10 Pages (2500 words) Essay

Cyber Terrorists: Shutdown the Internet

Hacking procedures generally dealt with infringement upon others privacy and illegal access to files, WebPages, and software and causing damage to the inbuilt system.... nbsp;… There is also the presence of the United States computer emergency readiness team (CERT) which works under the domain of the National Cyber Security division.... Scare ware is the most innovative among them as the attackers remove the program installed in the computer in payment of money....
10 Pages (2500 words) Term Paper

The Issues of Cyberethics

Though the changes of ICT are subtle and obvious, the benefits have been doubted to improve the quality of life for man but as well introduce some issues such as unemployment, internet crime, loss of privacy, errors, and intellectual property, freedom of speech and press and the digital divide.... Ethical standards include the right to choose, the right to privacy, the right to freedom, and expression among others that are funded and supported by well-founded reasons....
7 Pages (1750 words) Term Paper

Ethical and Professional Issues for Computers and the Internet

MODULE 4: privacy and surveillance Privacy is defined as a person's right to maintain free space devoid of external interference.... Consequently, post-masters ought to ensure that they possess security interfaces, system policies, breach procedures, etc.... Experts assert that privacy should be treated as a right because it is almost equal to property rights.... Violations of privacy rights can occur in the following scenarios: satellite surveillance, loyalty cards, warranty cards, public declarations on bankruptcy, data mining, and many others....
12 Pages (3000 words) Assignment

The Use of the Cellular Technology

The history of social media backdates back to the invention of the internet that started as basic computer networks.... After the invention of the computer network, and ultimately the internet, communication started.... … The paper "Applied Communication" is a perfect example of an essay on media....
11 Pages (2750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us