New Developments in Information Technology

The following sample Information Technology research paper is 1332 words long, in APA format, and written at the undergraduate level. It has been downloaded 637 times and is available for you to use, free of charge.

A relatively new development in information technology is the emergence of cloud computing. Cloud computing consists of a large number of computers which are connected through the internet. It has allowed for network access and storage without the physical hardware traditionally required, and is also mobile and scaled to size without negative effects on the network users. The following will address cloud computing as a new development and internet technology and discuss its background and benefits, as well as its legal, ethical and security implications. Research shows that it is convenient and beneficial but is not without its drawbacks. The purpose of this paper is to analyze and develop information related to cloud computing and explain the legal, ethical, and social issues related to it.  While cloud computing has significant attributes, it must continuously be evaluated and monitored to address potentially negative social implications.

Background

In order to understand the new developments which constitute the current applications of cloud computing, it is important to understand its foundation and history. Even before the internet was invented, American computer scientist John McCarthy asserted that "computation may someday be organized as a public utility" (Garfinkel, 2011). His assertion foreshadows the shared space concept that the cloud represents in the 21st century. Other scholars hinted to this shared application but stopped short of predicting the process of cloud computing available today. In the 1990’s virtual private networks set somewhat of a framework for cloud computing by managing shared bandwidth space for network users (Rochwerger, 2009). Beginning in the early 2000s, the cloud computing concept was modernized by improved data centers with significant internal efficiencies. Amazon was the first to launch a cloud computing service in 2006, however, Gartner enhanced its popularity and developed a cloud computing foundation that allowed companies to skip the large hardware and switch to the cloud service model. Today, continuous innovations and developments integrate the cloud with the internet to allow for storage of applications and documents over independent high capacity networks at low costs.

Benefits

Cloud computing has many features and benefits.  Its internet-based services support business processes and allow for a resourceful sharing of space at a significantly low cost. In addition, networks experience fast application deployment on demand. Network access is abundant and simple while offering businesses the benefits of “agility, faster startup time, reduced management costs, and just-in-time availability of resources” (Bhargava, et. Al, n.d). While businesses were the first to benefit, the personal cloud is a recent development that is used by individuals to share and store data. This allows files to be stored remotely rather than on individual computers, making it much simpler and easier to access personal documents and information despite location (Kyriazis, 2010). Access is available wherever the internet is available, which is almost everywhere in this day and age. It is cost-effective and updates are handled remotely, saving individuals time and energy on downloading and managing constant computer upgrades. 

Legal Implications

The legal and ethical risks related to the cloud are the possibilities of unwarranted data flow across multiple jurisdictions.  Transborder data flow can be dangerous if sensitive information stored and processed in the cloud goes to unsecure servers. While this potential issue of security affects companies and clients, there is currently nothing that places security responsibility with the cloud for legal liability. The legal discovery process is also impacted because the third-party cloud provider could delay the process, allowing individuals to modify documents or make changes before they can be retrieved (Cruz, 2012). It is important to define key components of the business in order to structure a legal standard around it. Continuous cloud development must be monitored to manage these legal implications.

Ethical Implications

The loss of direct control over information and documents by allowing a third party to store it presents an ethical issue. Data corruption, infrastructure failure, and unauthorized access are ethical issues that impact all parties involved. The ethical issue of who maintains control over the information is also important to address. While the information is technically owned by the individual or company that uploaded it to the cloud, it is possible that certain scenarios may cause the information and documents to transfer ownership to the company managing the cloud (Sen, 2013). This ethical issue over who really owns the information and who can determine how to use it remains a concern in cloud computing and storage (Newton, 2011). Cloud computing also has the potential to become a monopolistic industry. This increased power position could create compromising and even harmful circumstances for users.  

Security Concerns

The potential for data breaches on the cloud would have a significant and large scale impact. It not designed properly, small flaws could allow cyber attackers access to a mass array of client data. This problem is additionally challenging because measures to address security could potentially lead to data loss (Samson, 2013). Aside from outside hackers, security breaches could also come from internal employees, making it even more difficult to track. Cloud abuse is also a security concern, as it can be used to aid hackers in attacks by using the platform to share malware or viruses.

Social Problems

Cloud computing may be a part of a larger trend which supports sharing information with others. This concept is seen on social media sites as well as the inherent synching abilities many phones come equipped with. The idea of a reasonable expectation of privacy has significantly developed in the information age. The development of laws and standards surrounding cloud computing will continue to shape and change society’s understanding of privacy, risk management, and an approach to technology.

Further Required Research

Additional legal research regarding the liability of clients, businesses, and cloud companies is required. As the legal system is historically antiquated and often lags behind in addressing technological areas which develop quickly, it is important to understand the extent of consumer protection and what must be done to eliminate the potential for negative legal and ethical ramifications. Additional research related to the responsibilities of cloud computing and its impact on individual ownership and functionality will help users feel more at ease while providing additional guidelines and standards for cloud computing practices.

Conclusion

In conclusion, the cloud is an information technology development that has significant benefits. Despite this, it also has significant legal and ethical ramifications, many of which remain to be seen. As technology typically develops quickly, the legal system is tasked with properly addressing developments in a timely and consistent manner. If the legal system continues to be sluggish in its law-making applications, it will not be able to properly protect consumers. It is up to individuals and business owners to make smart and cautious decisions when applying this new information technology application in order to protect themselves. 

References

Bhargava, B., Kim, A., Cho, Y. (n.d). Research in cloud computing. Purdue Univerity. Retrieved on September 27, 2013 from http://www.google.com

Cruz, X. (2012). Cloud computing and it legal implications. Cloud Times. Retrieved on September 27, 2013 from http://cloudtimes.org/2012/12/03/cloud-computing-and-its-legal-implications/ 

Garfinkel, S. (2011). The cloud imperative. Technology Review. MIT. Retrieved on September 27, 2013 from http://www.technologyreview.com/news/425623/the-cloud-imperative/ 

Kyriazis,.D. Menychtas, G Kousiouris, K Oberle, T Voith, M Boniface, E Oliveros, T Cucinotta, S Berger, G (2010)"A Real-time Service Oriented Infrastructure", International Conference on Real-Time and Embedded Systems (RTES), Singapore

Newton, J. (2011) The ethic and security of cloud computing. Infrastructure Technologies. ILTA White Paper. Retrieved on September 27, 2013 from http://www.goclio.com/resources/white_papers/Security%20Ethics%20of%20Cloud%20Computing.pdf 

Rochwerger, J Caceres, RS Montero, D Breitgand, E Elmroth, A Galis, E Levy, K Nagin, Y Wolfsthal, E Elmroth, J Caceres, M Ben-Yehuda, W Emmerich, F Galan, B. (2009) "The RESERVOIR Model and Architecture for Open Federated Cloud Computing", IBM Journal of Research and Development, Vol. 53, No. 4. 

Samson, T. (2013). 9 top threats to cloud computing security. InfoWorld. Retrieved on September 27, 2013 from http://www.infoworld.com/t/cloud-security/9-top-threats-cloud-computing-security-213428 

Sen, J. (2013). Security and privacy issue sin cloud computing. Retrieved on September 27, 2013 from http://arxiv.org/ftp/arxiv/papers/1303/1303.4814.pdf