Ethical Challenges of Cloud Computing

Ethical Challenges of Cloud Computing

 

Introduction

The advancement in information and communication technology has brought immense pressure on organizations to transform their systems from primitive to more complex technology. Most certainly, this move has overarching merits, and those organizations that have not embraced it suffer huge losses in terms of low productivity, inefficiency in service delivery, and production of inferior goods (Amrhein & Quint, 2009). Looking back to the effects of the new development, many big corporations have either been completely transformed, or eliminated out of the competitive market. Despite the myriad appreciations awarded to new technology, its inception is usually accompanied by a wide array of ethical dilemmas and challenges.

The cloud computing technology is still one of the newest technologies that have swept the market raveningly, and it has been emergent since distributed computers and other relevant technologies gained massive adoption. Although this move is very crucial to enterprise developers, many still have questions concerning this service.  Cloud computing is defined as an all-inclusive package in which virtually all the computing resources including software, hardware, storage and networking among others are made available to users in line with their demands (Grimes, Jaeger & Lin, 2009). It enables Information Technology to be delivered to consumers as a service. Some of the unmistakable benefits of cloud computing to enterprise developers include reduced costs for IT-related service delivery, reduction in initial capital as well as operational costs, increased productivity and performance of the human workforce, and in promotes business agility. Amid all these outstanding benefits, various ethical issues are still raised by the adoption of this sleek technology (Lynch, 2000). The author of this paper champions the idea that although cloud computing has far-reaching benefits to business enterprises, the transition has further complicated the ethical challenges raised by Lynch, especially with regards to compromise of data sent over the networks.

Ethical Challenges Posed By Adoption of Cloud Computing

Lynch (2000) defines ethics as those standards of acceptable behavior; the moral choices that individuals make in relation to other community members; and rules that act as guiding principles to every organization and members of a given profession. The technological world has its own rules and standards that users must adhere to. One such standard is the online conduct, which is founded on the norms of a particular society, though becomes all-encompassing in international human electronic interactions (Lynch, 2000). The unique nature of cloud computing technology makes it easier for people to interact in a much easier manner, and sharing of information and data is simplified.

Cloud computing in essence allows for easy and cheap distribution of intellectual properties of various people (Amrhein & Quint, 2009). Basically, three major components of ethical issues raised by this technology can be identified: control shifts from individual technology users to other parties who service and control the cloud due to outsourcing of the ICT functionality to enable the operation of the cloud; data storage in multiple locations across numerous servers around the globe which are administered by a wide range of organizations; and the interconnection of many services in the cloud, which are aimed at providing the needed services to the final user. The problem of control of data and information across the cloud is a major ethical concern that is raised by cloud computing (Grimes, Jaeger & Lin, 2009). Since the technology involves off-shoring or outsourcing of ICT functionality from third parties, the end user is forced to place his data and computation in a machine that is not directly under his control (SEBoK Wiki, 2012). This loss of direct control is particularly problematic when things go amiss. Risk associate with this kind of arrangement include loss of data, unauthorized access, corruption of data, failure of infrastructure at a critical time, and outing. In this regard, it is very difficult to ensure traceability, thus parties cannot be held responsible easily, as boundaries between what is one’s and what is not is blurred.

Secondly, “the problem of many hands’, as is often used in ethical literature, can arise in the case of cloud computing. Since responsibilities are between the provider and customer, it is not clear who addresses what problem. This occurs when in a complex proceeding of events, several individuals can be held culpable in a situation that leads to some undesirable outcomes (Grimes, Jaeger & Lin, 2009). The Service Oriented Architecture (SOA), which cloud computing utilizes, is programmed in such a manner that its functionalities are aggregated into other larger applications that perform specified tasks to end users (Amrhein & Quint, 2009). This poses a challenge when something needs to be followed up and corrected. In addition, data stored in a cloud is exposed to a threat known as function creep; in which data that was initially collected for a particular purpose ends up being used for another unanticipated purpose.

As unique as it may sound, data stored and sent over the cloud networks have undefined ownership. A further question is raised on what use the information that is sent can be put, especially by those who handle the data. Grimes (2009) states that cloud computing will take control away from users and make them completely dependent on providers. The cloud has been found to generate some data, besides the active ones stored by users, for specific purposes such as ensuring accountability, improving service provision, and security issues. These self-generated data increases bit by bit, that leaves a trail of detailed personal information that can be abused if not properly protected.

Finally, privacy is one particular aspect that is greatly abused by the cloud technology. Usually, one critical concern of most companies dealing in cloud services is how to uphold the privacy of the data stored in multiple physical systems around the world. Though the general aim of most organizations is to safeguard their data and prevent anatomized access and use, several constraints and massive failures have been registered in this respect (Lynch, 2000). Hackers around the world find it easy to manipulate the algorithms and prototypes associated with cloud computing, and many multinational corporations have registered huge losses as a result (Amrhein & Quint, 2009). One of the most astounding was the hacking of the Yahoo databases, which prompted massive losses in the tune of billions of money. The list of ethical issues raised by the emergence of cloud technology is endless. Others include monopoly of data by centralization of computing, information self-determination, and issues relevant to cultural imperialism among others.

Conclusion

In lieu of the arguments advanced herein, it is obvious that cloud computing has more difficult and complex the ethical issues addressed by Lynch. Regardless of its remarkable contribution to improvement of service delivery, growth on multinational enterprises and improvement of human interaction across the globe, the ethical challenges associated with this technology are worth addressing, since they are currently far from being resolved.

 

 References

Amrhein, D. & Quint, S. (2009). Cloud computing for the enterprise: Part 1: Capturing the cloud. IBM Corporation. Visited 09 April 2013. from http://www.ibm.com/developerworks/websphere/techjournal/0904_amrhein/0904_amrhein.html

Grimes, J. M., Jaeger, P. T. & Lin J. (2009). Weathering the Storm: The Policy Implications of Cloud Computing. http://nora.lis.uiuc.edu/images/iConferences/CloudAbstract13109FINAL.pdf Visited 09 April 2013.

Lynch, M. (2000). Ethical Issues in Electronic Information Systems. University of Texas. Sections on Electronic Networks. Visited 09 April 2013. http://www.colorado.edu/geography/gcraft/notes/ethics/ethics.html#Elec_Nets.

SEBoK Wiki (2012). Enterprise Systems Engineering. Guide to the Systems Engineering Body of Knowledge. Visited 09 April 2013. from http://www.sebokwiki.org/075/index.php/Enterprise_Systems_Engineering.

Last Completed Projects

topic title academic level Writer delivered