New technologies raise new ethical challenges besides new technical problems. Cloud computing is the recent technology in IT that moves the data away from portable storage devices to large data centers called cloud. It basically means that every application given as services over the Internet to the user. In the view of User it is accessing his/her files, programs and other services through Internet which are hosted by other service providers. One more aspect of cloud computing is the cost effectiveness of this technology which attracted enterprises to use this technology to consume their IT services in a cost effective way. With the Commercialization of this technology, the hype around the Cloud computing technology growing in lightning speed. Now the Cloud Computing is in use, but still it is an emerging technology. It is a unknown thing that, how this technology can be used and for what purposes it will be used and what kind of ethical issues these developments will rise in future. A Precautionary Principle is obtained to control the rise of ethical issues. It is good to react before unexpected consequences occurs through these ethical issues. The technical problems can be solved at the time of rise but ethical problems need to be identified prior to the development to the success of the technology.
Cloud Computing is growing rapidly and now it is used by great number of individuals and organizations. But they are not concerned about the ethical issues related to this technology .They need to discuss the ethical issues widely so that the technology can be used in a proper way. The range and the diverse innovations included in the technology makes the meaning of cloud computing a ‘Conceptual Muddle ‘ (Moor 2006 & Vaquero et al.2...
... middle of paper ...
...they have to speculate possible ways of solving these issues in forward.
In conclusion to avoid ethical issues related to cloud computing precautionary principle is an approach to deal with. The precautionary principle is that we should be in preventive mode in the development stage of the technology so that the raised ethical issues will have a solution. The precautionary is to prevent harm from unknown happenings without hampering the development of the technology. There are many more ethical issues are there which are not identified till now. Developers has to identify these problems .This does not mean that development and implementations abort all together. By solving the ethical issues the developers can give trust on the technology to the users. Then users can use this technology without any negotiations which will finally lead to the success of technology.
This essay discusses regulation that rules cloud provider to protect privacy of data citizens within country. This essay will describe about what cloud services and its wide range of service In the second section, it will explain more about the security threat of cloud services and going more specific into privacy issue. The next section, I will discuss about the extent of technical regulation that porposed from case given by taking model from exist country regulation. In the Fourth section, this essay will discuss about evaluation and another policy as alternative of the previous policy. Finally, this essay will be closed by suggestion and conclusion about what regulation that should be purposed regarding to protect privacy citizens’ data stored in cloud.
Albert Einstein once said that he “[does] not believe in immortality of the individual, and consider [‘s] ethics to be an exclusively human concern with no superhuman authority behind it”. Ethics matters not only in ones personal life but in society as a whole. It touches everything in today’s world. A major place that is affected by ethics nowadays is technology. With the development of new powerful technologies and better communication systems the Internet threats have reached a certain level of maturity that concerns many. Cyber Security has turned into a dependency for many, such as: private organizations, government health institutions and many companies. The amount of information available in these systems could compromise them and the many users they support. In the article” Data theft from firms topped a trillion dollars in 2008: study” cyber security is the main topic. The formal ethical systems that could justify the actions reported in the article, if these actions are consistent with either the ACM or IEEE codes of ethics, and if the behaviors are consistent with issues of privacy or intellectual property are all issues that will be further discussed.
As its core essences cloud computing is nothing but a specialized form of grid computing and distributing computing’s which various in terms of infrastructure , deployment, service and Geographic’s dispersion (Veeramachanenin, Sepetember 2015) the cloud enhance scalability, collaboration, availability , ability to adapt to fluctuation according to demand accelerate development work and provide optional for cost reduction and through efficient and optimized computing. (BH kawljeet, June 2015) cloud computing (CC) recently become as a new paradigm for the delivery and hosting of services our the internet. There are mainly three service delivery model Software as Service (SaaS) required software, operating system and network is provided or we can say in SaaS the customer can access the hosted software instead of installing it in local computer and the user can access these software through local computer internet browser (e.g web enabled E-mail ) the user only pay and the cloud service provider is responsible for management or control of mobile cloud infrastructure some of the company which provide such service are Google, Microsoft , Salesforce ,Facebook, etc…..Infrastructure as Service(IaaS)the cloud provider only provide some hardware resources such as network and virtualization is
Enterprises and individual users are outsourcing their services on the web, instead of maintaining the resources of their own. Outsourcing of technical resources enables the organization to concentrate on business need instead of technical aspect, which is looked after by the expert of the IT area. To facilitate such users, a web based paradigm known as cloud computing has emerged and offering the services on utility model [p3]. The major goal of Cloud computing is to reduce the operating cost, increase throughput, increase the reliability and availability [p10].
Discription: Services of cloud are used by both larger and smaller scale organizations.Cloud computing has huge advantages but it is a global phenomenon therefore it has some disadvantages. Both the Service providers and the consumers must work together to ensure safety and security of data on clouds. Customers of cloud services are in fear of data loss and privacy.This paper propose to use The Cloud Security Alliance (CSA) release of a new governance, risk management, and compliance stack for cloud computing. The cloud security tools are available for free download, is meant to help organizations create public and private clouds that act accordingly with industry standards for accepted governance, risk, and compliance (GRC) best practices. The GRC stack has three components: a controls framework, a technical foundation and a questionnaire for assessing what the CSA (cloud security alliance) calls for platform-, infrastructure- and software-as-a-service
The first computer ENIAC was invented by Charles Babbage in 18th century. But the real technological advancement of the computers came with the invention of the first four bit microprocessor in 1971. From 1971 till date, in the span of these 40+ years many operating systems came into existence (such as Windows 95, Windows 98, Windows 2000, Windows NT, Windows XP, Windows 7, Fedora, Mac, Redhat, Ubuntu, Kubuntu, Solaris etc.), many programming languages and web languages came into existence ( such as C, CPP, JAVA, .NET, HTML, XML, DHTML, SQL, PLSQL etc.), and many Multi-National Companies came into existence(such as Wipro, Genpact, Apple, Google, Tech Mahindra, Xerox, Oracle, SUN, Adobe, Microsoft and many more). But Internet is one of the key for the growth of each and every thing mentioned above. Cloud Computing is an emerging concept in which resources of computer infrastructure are provided over the Internet [1]. Cloud computing is a concept in which every device gets connected to the cloud which contains application, platform or Infrastructure or a mixture of them. People of 21st century are more familiar with smart phones rather than anything else. With the advent of phones such as IPhone and Android smartphones, the numbers of people using cloud are increasing substantially. Millions of people are using cloud in the present day scenario and it is equally important to provide the security to all the users who are using it. Cloud computing can be used as a utility to attract many people which can make software attractive as a service [2]. There are several security related issues with cloud which can be discussed in this paper.
Cloud computing is sort of like the first computers come full circle – in the early days of computing, users at terminals with no computing power to speak of made use of the number-crunching capabilities of mainframes in a shared fashion – in fact, the model of computer use was called “time-sharing.” As the personal computer grew in power and capabilities while also becoming a cheap...
A. Ethics is the collection of moral principles that controls the actions of an individual or a group. And managing the use of computers can be done by computer ethics which is set of moral principles that controls the usage of computers. Here in computer ethics we can find some common issues which contains privacy concerns, copyrighted electronic content and how the society is been affected by computers. Let us understand in brief about computer ethics by illustrating with an example that is approaching or entering into someone’s personal details or particulars though it may be attainable on a computer system but, according to computer ethics it would suggest that such an action is completely wrong.
Cloud computing remains firm and has great potential for the future despite its disadvantages and the fact that it is still is a working progress. The number of users are constantly growing and bigger companies are starting to be interested, offering better and finer tuned services and solutions. The best thing to do is to hope that the advantages will further grow and flourish and the disadvantages will slowly disappear, since cloud computing seems to have made IT a little bit easier (Morris, 2011).
Nowadays, the majority of jobs include using computer system along with computer technologies having penetrated every area of education, business as well as industry. Ethics plays a major role in resolving the ethical dilemmas and decision-making activities within the filed of information technology parencite{kuzu2009problems}. Moreover, an ethical dilemma is usually an argument between two ethical ideas where no actual solutions can be provided. Commonly, two sides disputes about what is wrong and what is right and just provide the methods what one considers
Experts have claimed that the services provided by cloud computing help the companies who subscribe for its use to focus on things that would differentiate them from other in this way they don’t look for its infrastructure cost or the infrastructure of the business. Advocates likewise guarantee that this system permits undertakings to get their applications up and running
“A major goal of hackers is to have control over system with ability to monitor, intercept, and modify system events and activities” (Rahman, 2011). And “All the sensitive data is received from the organization is processed by SaaS application and stored at the SaaS vendor end” (Goyal & Supriya, 2013). describes about how cloud architecture was designed .In addition to it “Many organizations are legally required to protect their data because organization don’t have any control over the sensitive information.” (Kuyoro Shade O, Chigozirim, Omotunde Ayokunle A, & Ibikunle Frank A, 2012). So, we need a secure mechanisms to deliver the data integrity and reliability for the cloud.
Tavani, H. T. (2011). Ethical Aspects of Emerging and Converging Technology. Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing (3rd ed., pp. 363,364). Hoboken, N.J.: Wiley.
As aforementioned, in recent years the internet has increased popularity and with that comes some concerns in laws regarding the cloud. Few laws have been created to protect the users of the internet from non consensual use of personal information. “Usually the only legal precedents restricting a company is its own privacy policy but most companies give you a sense of protection without any legality behind it,”(2013, CQ Researcher, Big data and privacy). This is a problem because with no laws or policies protecting the private internet user companies will be able to do what they want with the information and nothing will stop them.
James H. Moor, Why We Need Better Ethics for Emerging Technologies, Ethics and Information Technology, v.7 n.3, p.111-119, September 2005