{"id":27088,"date":"2024-05-30T00:57:07","date_gmt":"2024-05-30T00:57:07","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/week-1-assignment-exploring-legal-and-ethical-foundations-of-information-security-navigating-regulatory-constraints-and-ethical-expectation\/"},"modified":"2024-05-30T00:57:07","modified_gmt":"2024-05-30T00:57:07","slug":"week-1-assignment-exploring-legal-and-ethical-foundations-of-information-security-navigating-regulatory-constraints-and-ethical-expectation","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/week-1-assignment-exploring-legal-and-ethical-foundations-of-information-security-navigating-regulatory-constraints-and-ethical-expectation\/","title":{"rendered":"Week 1 Assignment- Exploring Legal and Ethical Foundations of Information Security: Navigating Regulatory Constraints and Ethical Expectation"},"content":{"rendered":"<div style=\"font-size: 13.3333px; cursor: auto; color: inherit;\">\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><span style=\"font-weight: inherit; cursor: auto; color: inherit;\" data-contrast=\"auto\">As a fundamental part of the SecSDLC investigation process, a careful examination of current legislation, regulation, and common ethical expectations of both national and international entities provides key insights into the regulatory constraints that govern business. This week examines several key laws that shape the field of information security, and it presents a detailed examination of computer ethics necessary to better educate those implementing security. Although ignorance of the law is no excuse, it is considered better than negligence). This module also presents several legal and ethical issues that are commonly found in today\u2019s organizations, as well as formal and professional organizations that promote ethics and legal responsibility.<\/span><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><span style=\"font-weight: inherit; cursor: auto; color: inherit;\" data-contrast=\"auto\">Ethics plays a large role in information security.\u202f<\/span><\/div>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><\/div>\n<\/div>\n<div style=\"font-size: 13.3333px; cursor: auto; color: inherit;\">\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">For this assignment, you will select an ethical dilemma related to information security (it could be something you encountered or a scenario from the textbook). Then write a summary of the following:<\/strong><\/div>\n<ul style=\"margin-top: 1em; margin-right: 0px; margin-left: 0px; padding: 0px 0px 0px 40px; font-weight: inherit; cursor: auto; color: inherit;\">\n<li style=\"font-weight: inherit; cursor: auto; color: inherit;\">Describe the dilemma and whether it was handled appropriately according to the laws and ethics.<\/li>\n<\/ul>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Address the following questions to help describe the dilemma:&nbsp;<\/strong><\/div>\n<ol style=\"margin-top: 1em; margin-right: 0px; margin-left: 0px; padding: 0px 0px 0px 40px; font-weight: inherit; cursor: auto; color: inherit;\">\n<li style=\"font-weight: inherit; cursor: auto; color: inherit;\">Which laws were being violated?&nbsp;<\/li>\n<li style=\"font-weight: inherit; cursor: auto; color: inherit;\">Was the dilemma handled ethically?&nbsp;<\/li>\n<\/ol>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\">Submission Guidelines:<\/div>\n<ul style=\"margin-top: 1em; margin-right: 0px; margin-left: 0px; padding: 0px 0px 0px 40px; font-weight: inherit; cursor: auto; color: inherit;\">\n<li style=\"font-weight: inherit; cursor: auto; color: inherit;\">Provide a well-structured summary with a minimum of 250-400 words<\/li>\n<li style=\"font-weight: inherit; cursor: auto; color: inherit;\">Use a minimum of 2 citations. Use APA citation style for in-text citations.<\/li>\n<li style=\"font-weight: inherit; cursor: auto; color: inherit;\">The summary should be well-organized, clear and concise, demonstrating professionalism and attention to detail.<\/li>\n<li style=\"font-weight: inherit; cursor: auto; color: inherit;\">Ensure proper grammar, spelling, and formatting.&nbsp;<\/li>\n<\/ul>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">Important:&nbsp;<\/strong>To access the submission page and review the grading rubric for your summary, please click on the link for the assignment. Remember that you can only submit your summary once, so it&#8217;s recommended to utilize the Plagiarism check available on the Getting Started Page. This tool allows you to check your plagiarism report multiple times for any necessary revisions. Additionally, there is no limit to the number of times you can submit your paper.&nbsp;<\/div>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><a style=\"font-weight: inherit; cursor: auto;\">Police use of Ring doorbell cameras \u2014 poor ethics or public good? | The Hill<\/a><\/div>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><a style=\"font-weight: inherit; cursor: auto;\">An Ethics Perspective On Facebook (forbes.com)<\/a><\/div>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\">&nbsp;<a style=\"font-weight: inherit; cursor: auto;\">Ethics and security in information technology | MU CIS (marquette.edu)<\/a>&nbsp;<\/div>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><a style=\"font-weight: inherit; cursor: auto;\">3 Ethical Dilemma for Information Security Professionals \u2013 Gyp the Cat dot Com<\/a><\/div>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><a style=\"font-weight: inherit; cursor: auto;\">Five ethical decisions cybersecurity pros face: What would you do? | Infosec (infosecinstitute.com)<\/a><\/div>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><a style=\"font-weight: inherit; cursor: auto;\">Here&#8217;s How Tesla Solves A Self-Driving Crash Dilemma (forbes.com)<\/a><\/div>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><a style=\"font-weight: inherit; cursor: auto;\">&#8220;Balancing Security and Privacy: The Ethical Dilemma of Cybersecurity Professionals&#8221; (linkedin.com)<\/a><\/div>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><a style=\"font-weight: inherit; cursor: auto;\">Ethical Issues in Cybersecurity: CompTIA\u2019s Future of Tech<\/a><\/div>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><a style=\"font-weight: inherit; cursor: auto;\">Cybersecurity Ethics: What Cyber Professionals Need to Know (augusta.edu)<\/a><\/div>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><a style=\"font-weight: inherit; cursor: auto;\">Tesla whistleblowers filed complaint to SEC in 2021: What it said (cnbc.com)<\/a><\/div>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><a style=\"font-weight: inherit; cursor: auto;\">The business ethics of Elon Musk, Tesla, Twitter and the tech industry &#8211; Harvard Law School | Harvard Law School<\/a><\/div>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><a style=\"font-weight: inherit; cursor: auto;\">A Holistic Approach to Ethical Issues in Cyber Security &#8211; Swiss Cyber Institute<\/a><\/div>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><a style=\"font-weight: inherit; cursor: auto;\">A &lt;0 million question and other cybersecurity-related ethical dilemmas amid the COVID-19 pandemic &#8211; PMC (nih.gov)<\/a><\/div>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><a style=\"font-weight: inherit; cursor: auto;\">Sensors | Free Full-Text | Ethical Dilemmas and Privacy Issues in Emerging Technologies: A Review (mdpi.com)<\/a><\/div>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><a style=\"font-weight: inherit; cursor: auto;\">TECHNOLOGY AS A THREAT TO PRIVACY: Ethical Challenges (simmons.edu)<\/a><\/div>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><a style=\"font-weight: inherit; cursor: auto;\">Ethical Dilemmas On Data Privacy And Security For Social Media &#8211; Free Essay Example &#8211; Edubirdie<\/a><\/div>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><a style=\"font-weight: inherit; cursor: auto;\">Facebook\u2019s ethical failures are not accidental; they are part of the business model | AI and Ethics (springer.com)<\/a><\/div>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><a style=\"font-weight: inherit; cursor: auto;\">Amazon\u2019s Ring blamed hacks on consumers reusing their passwords. A lawsuit says that\u2019s not true. &#8211; Vox<\/a><\/div>\n<div style=\"margin-bottom: 1em; cursor: auto; color: inherit;\"><a style=\"font-weight: inherit; cursor: auto;\">Amazon\u2019s Ring blamed hacks on consumers reusing their passwords. A lawsuit says that\u2019s not true. &#8211; Vox<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>As a fundamental part of the SecSDLC investigation process, a careful examination of current legislation, regulation, and common ethical expectations of both national and international entities provides key insights into the regulatory constraints that govern business. This week examines several key laws that shape the field of information security, and it presents a detailed examination [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[62],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/27088"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=27088"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/27088\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=27088"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=27088"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=27088"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=27088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}