• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

Moral and ethical uses in Information Technology.

Extracts from this document...


Table of Contents INTRODUCTION 3 WHAT IS SPAMMING 4 WHY SPAMMING IS BAD AND UNETHICAL? 5 CONCLUSION 8 REFERENCES 9 ARTICLE IN NEWSPAPER AND MAGAZINES 11 AOL TRIES TO SLAM SPAM 11 BIG FINE FOR SPAMMING AOL MEMBERS 12 SPAM SPAM SPAM SPAM SPAM BY FARHAD MANJOO 13 SPAM, OR JUST GLAD TO SEE ME? BY FARHAD MANJOO 13 WHEN TRAGEDY HITS, SO DOES SPAM BY LINDA FORMICHELLI 14 FIXING A HOLE WHERE SPAM COMES IN BY JEFFREY BENNER 14 WHO'S SPAMMING WHOM? 14 THE TEN COMMANDMENTS FOR COMPUTER ETHICS 20 Introduction There are many different sides to the discussion on moral and ethical uses in Information Technology. In many situations, the morality of a particular use of a Computer is up to the individual to decide and because of this reason, absolute laws about ethical and moral use of Information Technology is almost impossible to define. The introduction of Information Technology using computers in workplace has introduced many questions as well: The questions that may come up are as follows. Is someone's desire to download pornographic images from a newsgroup protected by freedom of speech and privacy laws? [1]. Should employers make sure the workplace is designed to minimize health risks for people who work with computers? [2]. Can a network provider be held liable for the content of the traffic on the net? Can employers prohibit employees from sending personal memos by electronic mail to a friend? Should employers monitor employees' work on computers? According to Kenneth Goodman, "There's hardly a business that's not using computers."[3] This makes these questions all the more important for today's society to answer. There are many moral and ethical problems dealing with the use of computers but there are no specific answers to these issues and their legal dimensions are vague, ethics become an important factor. The use of information technology raises many ethical issues, ranging from the surveillance of electronic mail, pornography on net, hacking, spamming, virus attack to the potential invasion of privacy of millions of customers whose data are stored in private and public database. ...read more.


But that doesn't mean all is bright on the anti-spam front. It's clear from the opening day of Spamcon -- the anti-spam conference occurring here this week -- that there are, dedicated spam-fighters out in the world. But it's also clear that they're fighting a losing battle, trying to plug a river with their fingertips. Spam, Or Just Glad to See Me? By Farhad Manjoo 2:00 a.m. May 24, 2001 PDT Wired News might be a respected and well-read Web publication, but judging from the e-mail that flows into the inboxes here, the site has a serious image problem: People think Wired News has a small penis. About once a week, on average, reporters and editors at WN receive offers to enlarge the site's penis by between one and four inches, usually through a safe, "natural" procedure that requires no more than seven minutes of work per day. More often than not, these methods are free of "pumps and pills," and are bolstered by a money-back guarantee. Now, for obvious reasons, Wired News is not in need of a larger penis. And that's a big problem with spam. It's not just that every unsolicited message reeks of unseemliness -- it's that the messages aren't going just to the folks who need them, and they're instead flooding us all, with no apparent method to the madness. When Tragedy Hits, So Does Spam By Linda Formichelli 2:00 a.m. Sep. 13, 2001 PDT Before the rubble had even stopped smoking from Tuesday's terrorist attacks in New York and Washington D.C., spammers were trying to capitalize on the tragedy. "No terrorists here! Join our porn site, turn off the TV, quit watching the crap happening in the states and join our free site!" cried one e-mail that landed in the inbox of Julie Datres of Marlboro, New Hampshire, just two hours after the initial attack. "I can't believe people would take advantage of such a tragic situation to push porn," Datres said. ...read more.


Tell me more. A few $'s extra never hurt. The Bad Type Dear Chrystine, Thank you so much for writing me. This is so exciting! I am new to the Internet and when someone decides to write me from a casino it is very exciting! At first, I was concerned because I usually get unsolicited e-mail from sleazy pornography sites ... but not you Chrystine! I was happy to get an e-mail about how to make money! I like to make money through hits! Please tell me more! No, actually I would like to know why you spell your name with a "Y." Are you a slave in the Casino? If so, I would like to liberate you from your Internet captors. I was so excited about receiving your e-mail; I sent a copy to your ISP! I hope THEY want to earn money, too. Please send me more e-mail, Chrystine with a Y. Yours, Tim If anything, this response is mild compared to what some spammers get. Ultimately, people can complain about it, antispam vendors can concoct better ways to block it, and legislators can write new laws outlawing it - but the sad fact is that spam is here to stay. THE TEN COMMANDMENTS FOR COMPUTER ETHICS From the Computer Ethics Institute 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not use or copy software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you write. 10. Thou shalt use a computer in ways that show consideration and respect. Source: - http://www.fau.edu/netiquette/net/ten.html 1 Turbam.E.,McLEAN.E and Wetherbe.J.(1999) 2 Turbam.E.,McLEAN.E and Wetherbe.J.(1999) 3G.W.Kenneth. (1997) 4 Turbam.E, McLEAN.E and Wetherbe.J. (1999) 5 http://www.fau.edu/netiquette/net/ten.html 6 http://www.wired.com/news/print/0,1294,45343,00.html Assignment: - Two MIT ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Electronic Media Studies section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Electronic Media Studies essays

  1. What are the benefits and disadvantages to an organisation of using computer technology to ...

    Companies using computerised systems have developed in various areas. Modern banks using systems were less functional without the use of computerised technology but have become efficient over the years in the speed of processing. In a bank, building society or government department, hospital or in retail transactions are stored on disks for processing and analysing.

  2. Computer Technology: the Good and the Bad.

    A single e-mail has recently done more damage than anyone care's to estimate, and with the discovery of a more deadly "E-Virus", named Code Red, has even the American Government running scared! The most powerful nation in the world could be brought to a standstill, if by mistake a secretary,

  1. Campaigner for Digital Privacy Rights.

    the British Government has increased police powers to detect crime in the new digital age. However, critics already claim the individual's right to privacy could be harmed and that a balance should be found between the nation's security interests and individual privacy concerns.

  2. Introducing Internet technology to any business allows it to take advantage of the many ...

    Similarly, research conducted by Oftel (2002) uncovered that many SME's have a poor understanding of the 'strategic importance of the Internet for their business.' This meant that 'few respondents had any ideas regarding future use or value of the medium' (Oftel, 2002).

  1. Digital networks like the internet have extended State and Corporate control to unprecedented levels. ...

    Clearly this implies although our personal civil rights have been invaded by this increasing surveillance, society?s ability to tackle issues of social concern has enhanced beyond traditional measures through digital networks. With this in mind the internet has become a redefined social tool with increasing micro importance to our individual

  2. Iphones and Society - misconstrued messages in a connected world.

    It is safe to say that the mobile devices have caused many problems in today?s culture and that our society would be better off with a more self-regulation of its usage. Along with many societal issues, the iPhone has also caused many people to develop negative physiological habits that inhibit

  1. Social networking and computer mediated communication

    promote projects etcetera which cannot be done through emails and gives a more clearer formation of identity as opposed to emails or other forms of computer-mediated communication. Social media and the web has become a controversial subject especially with the youth of the population.

  2. What in your view, are the main problems involved in attempting to produce policies ...

    Conditions of access are essentially predicated on the pursuit of stated goals; societally, the primary condition of access is content regulation; where the imagined absolute freedom of an ?ownerless? medium is mediated into a freedom of expression in line with local or societal mores.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work