Verified Document

Personal Issues Re. Cloud Computing And Data Case Study

Personal issues re. Cloud computing and data security This essay is an attempt on sorting out my conflictual feelings on cloud computing and data security. These include emotional investment on the subject, intellectual curiosity, advocacy, and bias. The following also explains my attraction towards the research.

Cloud computing is the use of computing resources (both hardware and software) that are delivered as a service over the Internet. I certainly have a mix of feelings when it comes to the issue of cloud computing. At the top of the list is the realization of the possibility that the entire computer enterprise provides little privacy

Medical centers, for instance, are increasingly using electronic software systems as their way of storing patient files, but I think that this is less secure than traditional methods in the past where one physician simply faxed the file to another for consideration -- and only one other saw it. Here, files can be accidently opened simultaneously by electronic transmission that passes through several hands. At the same time, I know of various individuals who are hesitant to divulge their private medical information -- as they are asked to do over the Internet. We are assured of privacy and given conventions such as HIPAA and so forth, but each of these policies can be unintentionally...

I followed with interest the ethical case of Jason Ellsworth, a U.S. commander, who was killed whilst serving in Iraq in 2005. His father wished to make a memorial for him and, therefore, asked Yahoo for access to his e-mail correspondence whilst in Iraq. Yahoo refused citing their contract of privacy with users. The case was brought to court, and Ellsworth won. Controversy ensued that made front lines in many papers. On the one hand, readers argued that Yahoo was right: it had promised confidentiality to its users and could not break that promise, come what may. On the other hand, there were others who argued that the family may profit from release of correspondence and that, therefore, it should be transmitted. (HU, 2004)
This is also a case of certain networks who play around with data security laying the laws of its perimeters. How far does extending privacy to data exist, and when should this guarantee be broken. Those who condemned Yahoo, for instance, and supported Ellsworth argued that more people would be made happy by release of the e-mails than were the e-mails to be kept from…

Sources used in this document:
http://www.usatoday.com/news/washington/2006-05-10-nsa_x.htm

Hu, J (2004) Yahoo denies family access to dead marine's e-mail. CNet

http://news.cnet.com/Yahoo-denies-family-access-to-dead-marines-e-mail/2100-1038_3-5500057.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Cloud Computing Will Be Discussed to Show
Words: 9986 Length: 26 Document Type: Research Proposal

cloud computing will be discussed to show that the good outweighs the bad. Furthermore, it will be further discussed that the government is looking into using cloud computing because it will cut IT cost down and increase capabilities despite the fact people are concerned with security issues that this may bring to the public. In completing a dissertation, it is very hard to go through the challenges that it requires.

Cloud Computing and Data Security
Words: 5196 Length: 18 Document Type: Term Paper

It's a tidal wave that's going to engulf us all within the next five years. Cloud services will be a $160 billion industry by the end of 2011" (Ginovsky 2011, 21). Although the decision to transition from a traditional approach to cloud computing will depend on each organization's unique circumstances, a number of general benefits have been cited for those companies that have made the partial or complete transition to

Cloud Computing Information Security in
Words: 6099 Length: 18 Document Type: Research Paper

This approach to defining a performance-based taxonomy will also allow for a more effective comparison within industries as well. All of these factors taken together will provide enterprise computing buyers with more effective foundations of arguing for more thorough measures of application performance. The net result will be much greater visibility into how cloud computing is actually changing the global economics of the enterprise computing industry. III. Final Report: Introduction The foundational

Information Systems Cloud Computing
Words: 1083 Length: 4 Document Type: Term Paper

Cloud Nursing Technology advancement within today's society ensures that new ways of performing tasks must be learned. This cycle of discovery is at the heart of every academic or professional pursuit that molds and evolves our methods and thinking patterns. The digital revolution that has occurred throughout the last two decades has forced many industries to alter their approach to their tasks, requiring re-education and an open mind ready to welcome

Cyber Security Cloud Computing
Words: 1389 Length: 4 Document Type: Term Paper

Cyber Security/Cloud Computing Consider a recent cyber security breach (specific event) and address the following questions: Describe the circumstances involved Monster Com: Confidential information of 1.3 million job seekers was stolen and used in a phishing fraud Monster.Com, a United States online recruitment site reported in 2008 that hackers broke into the site using password-protected resume library. They used credentials that Monster Worldwide Inc. claims were stolen from some of its clients. Reuters reported

Public Personal Clouds
Words: 1827 Length: 6 Document Type: Essay

Public, Personal Clouds Amazon Web Services is an anthology of remote computing services, which make up a cloud-computing platform provided by Amazon. Nevertheless, Amazon is a renowned company in the Web business, but other companies such as Apple have a big market share. Some of the services offered by Amazon include Amazon EC2, and Amazon S3, the latter is a storage service where people can store their things, such as documents

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now