Journal of Information and Technology
Latest Publications


TOTAL DOCUMENTS

4
(FIVE YEARS 4)

H-INDEX

0
(FIVE YEARS 0)

Published By Stratford Peer Reviewed Journal & Book Publishing

2617-3573

2021 ◽  
Vol 5 (1) ◽  
pp. 1-14
Author(s):  
Masum Wang Sargolzaei

New advancements especially in the field of information technology has actually brought new scientific gains to humans however it ought to be noted that the entry of new scientific and technological areas will constantly require to have ethical issues and restrictions. The purpose of the study was to analyze the ethical issues in computer as an instrument to technology growth in China. The study was literature review based. The participants of the study contained 20 computer system experts. 10 of them were graduates of computer education and educational technologies divisions, who worked as computer science instructors in China. Structured interviews were conducted with participants to identify their point of views concerning research study questions. Unauthorized access to the systems which is hacking is done utilizing different and new techniques and is increasing each day. Computer ethics has long been taken into consideration by the scientists. Interviews were organized separately with each participant in time slots and places they determined. The study concluded that computer ethics with a reference to personal privacy, accuracy, building and availability; investigated the beginnings of these issues; growth of internet and computer technology globally has resulted in the growth of new types of global criminal offense specifically Internet associated. The research suggested that the government of China should develop and apply a minimum set of directing rules of conduct that would certainly help with effective communications and reliable commerce via making use of electronic medium and to make certain the precision of data, in addition to shielding it from unauthorized accessibility or unintentional disclosure to improper people. Keywords: Ethical Issues, Computer, Technological Growth, China


2021 ◽  
Vol 5 (1) ◽  
pp. 1-14
Author(s):  
Masum Wang Sargolzaei ◽  

New advancements especially in the field of information technology has actually brought new scientific gains to humans however it ought to be noted that the entry of new scientific and technological areas will constantly require to have ethical issues and restrictions. The purpose of the study was to analyze the ethical issues in computer as an instrument to technology growth in China. The study was literature review based. The participants of the study contained 20 computer system experts. 10 of them were graduates of computer education and educational technologies divisions, who worked as computer science instructors in China. Structured interviews were conducted with participants to identify their point of views concerning research study questions. Unauthorized access to the systems which is hacking is done utilizing different and new techniques and is increasing each day. Computer ethics has long been taken into consideration by the scientists. Interviews were organized separately with each participant in time slots and places they determined. The study concluded that computer ethics with a reference to personal privacy, accuracy, building and availability; investigated the beginnings of these issues; growth of internet and computer technology globally has resulted in the growth of new types of global criminal offense specifically Internet associated. The research suggested that the government of China should develop and apply a minimum set of directing rules of conduct that would certainly help with effective communications and reliable commerce via making use of electronic medium and to make certain the precision of data, in addition to shielding it from unauthorized accessibility or unintentional disclosure to improper people.


2021 ◽  
Vol 5 (1) ◽  
pp. 22-30
Author(s):  
Grayson Sawyer ◽  

Cybersecurity is very complex, and as such, decisions regarding cybersecurity are highly intertwined with the functionality and application of systems. The threat to cybersecurity is, however, ever-evolving and decisions regarding cybersecurity, therefore, need to be made with this in mind. Cybersecurity systems, therefore, need to be tailored to individual systems, be adaptive, have the ability to evolve with the threat as well as be highly integrated with the system designs and the mission these systems support . In the military, it is critical to develop systems that maintain the expected level of confidentiality, non-repudiation, authentication, integrity, and availability that aids towards the collective goal of cybersecurity. In the military there are several stakeholders that play a key part in cybersecurity with the main ones being; the ones commanding or using the military system, the ones involved in the acquisition, life-cycle management and testing, the authorizing officials, the Chief Information Officer (CIO) and the intelligence and the counterintelligence officers. Accountability and control is, therefore spread out throughout the organization. This, however, leads to the blurring of roles and responsibilities. In conclusion, therefore, even though militaries exist for the purpose of combat most of the time, they operate in relatively peaceful conditions. During these peaceful times, they imagine and manufacture wartime conditions to determine their preparedness and the chances of a victory with the current conditions and resources. A communication plan approach will be able to tear down the expected natural resistance since the leaders will support the proposed changes and even devote resources to see that they are successful. The purpose of the communication plan is to, therefore, make the leaders the advocates for change. This is based on the understanding that in this environment, change is not possible without support from the leadership. Keywords: Cybersecurity, Intelligence, Communication & United States Army


Sign in / Sign up

Export Citation Format

Share Document