• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

Moral and ethical uses in Information Technology.

Extracts from this document...


Table of Contents INTRODUCTION 3 WHAT IS SPAMMING 4 WHY SPAMMING IS BAD AND UNETHICAL? 5 CONCLUSION 8 REFERENCES 9 ARTICLE IN NEWSPAPER AND MAGAZINES 11 AOL TRIES TO SLAM SPAM 11 BIG FINE FOR SPAMMING AOL MEMBERS 12 SPAM SPAM SPAM SPAM SPAM BY FARHAD MANJOO 13 SPAM, OR JUST GLAD TO SEE ME? BY FARHAD MANJOO 13 WHEN TRAGEDY HITS, SO DOES SPAM BY LINDA FORMICHELLI 14 FIXING A HOLE WHERE SPAM COMES IN BY JEFFREY BENNER 14 WHO'S SPAMMING WHOM? 14 THE TEN COMMANDMENTS FOR COMPUTER ETHICS 20 Introduction There are many different sides to the discussion on moral and ethical uses in Information Technology. In many situations, the morality of a particular use of a Computer is up to the individual to decide and because of this reason, absolute laws about ethical and moral use of Information Technology is almost impossible to define. The introduction of Information Technology using computers in workplace has introduced many questions as well: The questions that may come up are as follows. Is someone's desire to download pornographic images from a newsgroup protected by freedom of speech and privacy laws? [1]. Should employers make sure the workplace is designed to minimize health risks for people who work with computers? [2]. Can a network provider be held liable for the content of the traffic on the net? Can employers prohibit employees from sending personal memos by electronic mail to a friend? Should employers monitor employees' work on computers? According to Kenneth Goodman, "There's hardly a business that's not using computers."[3] This makes these questions all the more important for today's society to answer. There are many moral and ethical problems dealing with the use of computers but there are no specific answers to these issues and their legal dimensions are vague, ethics become an important factor. The use of information technology raises many ethical issues, ranging from the surveillance of electronic mail, pornography on net, hacking, spamming, virus attack to the potential invasion of privacy of millions of customers whose data are stored in private and public database. ...read more.


But that doesn't mean all is bright on the anti-spam front. It's clear from the opening day of Spamcon -- the anti-spam conference occurring here this week -- that there are, dedicated spam-fighters out in the world. But it's also clear that they're fighting a losing battle, trying to plug a river with their fingertips. Spam, Or Just Glad to See Me? By Farhad Manjoo 2:00 a.m. May 24, 2001 PDT Wired News might be a respected and well-read Web publication, but judging from the e-mail that flows into the inboxes here, the site has a serious image problem: People think Wired News has a small penis. About once a week, on average, reporters and editors at WN receive offers to enlarge the site's penis by between one and four inches, usually through a safe, "natural" procedure that requires no more than seven minutes of work per day. More often than not, these methods are free of "pumps and pills," and are bolstered by a money-back guarantee. Now, for obvious reasons, Wired News is not in need of a larger penis. And that's a big problem with spam. It's not just that every unsolicited message reeks of unseemliness -- it's that the messages aren't going just to the folks who need them, and they're instead flooding us all, with no apparent method to the madness. When Tragedy Hits, So Does Spam By Linda Formichelli 2:00 a.m. Sep. 13, 2001 PDT Before the rubble had even stopped smoking from Tuesday's terrorist attacks in New York and Washington D.C., spammers were trying to capitalize on the tragedy. "No terrorists here! Join our porn site, turn off the TV, quit watching the crap happening in the states and join our free site!" cried one e-mail that landed in the inbox of Julie Datres of Marlboro, New Hampshire, just two hours after the initial attack. "I can't believe people would take advantage of such a tragic situation to push porn," Datres said. ...read more.


Tell me more. A few $'s extra never hurt. The Bad Type Dear Chrystine, Thank you so much for writing me. This is so exciting! I am new to the Internet and when someone decides to write me from a casino it is very exciting! At first, I was concerned because I usually get unsolicited e-mail from sleazy pornography sites ... but not you Chrystine! I was happy to get an e-mail about how to make money! I like to make money through hits! Please tell me more! No, actually I would like to know why you spell your name with a "Y." Are you a slave in the Casino? If so, I would like to liberate you from your Internet captors. I was so excited about receiving your e-mail; I sent a copy to your ISP! I hope THEY want to earn money, too. Please send me more e-mail, Chrystine with a Y. Yours, Tim If anything, this response is mild compared to what some spammers get. Ultimately, people can complain about it, antispam vendors can concoct better ways to block it, and legislators can write new laws outlawing it - but the sad fact is that spam is here to stay. THE TEN COMMANDMENTS FOR COMPUTER ETHICS From the Computer Ethics Institute 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not use or copy software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you write. 10. Thou shalt use a computer in ways that show consideration and respect. Source: - http://www.fau.edu/netiquette/net/ten.html 1 Turbam.E.,McLEAN.E and Wetherbe.J.(1999) 2 Turbam.E.,McLEAN.E and Wetherbe.J.(1999) 3G.W.Kenneth. (1997) 4 Turbam.E, McLEAN.E and Wetherbe.J. (1999) 5 http://www.fau.edu/netiquette/net/ten.html 6 http://www.wired.com/news/print/0,1294,45343,00.html Assignment: - Two MIT ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Electronic Media Studies section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Electronic Media Studies essays

  1. Computer Technology: the Good and the Bad.

    A single e-mail has recently done more damage than anyone care's to estimate, and with the discovery of a more deadly "E-Virus", named Code Red, has even the American Government running scared! The most powerful nation in the world could be brought to a standstill, if by mistake a secretary,

  2. E-commerce change management

    First, they will start with centralising the storage and labelling all the files. Which makes it very easy to find the files. Second, they are going to use a new software program which will automatically make links between assets, allowing Company A perform real-time impact analysis and send announcements.

  1. Impact of Internet on Plagiarism. This paper aims to explore the reasons behind ...

    Participating in discussions and taking notes at appropriate places ensures that the original authors are always credited for their work. This also encourages asking questions and raising doubts as and when they arise thereby helping the students understand the subject better.

  2. The rapid development and utilisation of information and communication technologies has dismantled gender hierarchies ...

    an adaptable tool for accomplishing many job related tasks; the computer has literally opened a whole new world of employment, entertainment, communication and information gathering. During the years since the development of the World Wide Web, numerous amounts of people in developing countries have been using Information communication technologies (ICT's)

  1. Bluetooth technology continues to develop and evolve into many network and communication systems. Discuss ...

    This statement is very true to the world will live in today, at present if you have the right technology that is Bluetooth enabled it is possible to connect your laptop computer, mobile phone, headset, personal digital assistant, pager or a MP3 together to transfer data from one to the next.

  2. Digital networks like the internet have extended State and Corporate control to unprecedented levels. ...

    Clearly this implies although our personal civil rights have been invaded by this increasing surveillance, society?s ability to tackle issues of social concern has enhanced beyond traditional measures through digital networks. With this in mind the internet has become a redefined social tool with increasing micro importance to our individual

  1. Social networking and computer mediated communication

    He also describes how identity was always a little different or modified behind screens regardless of social networking, even just in a simple email, which does not make Facebook seem like a bad form of computer-mediated communication. However, Facebook has the facility to upload numerous pictures, status updates, create events,

  2. COICA. The Role of the US Government and Online Piracy

    Like the equality symbol created by the Human Rights Campaign, we will need a logo and/or slogan that can rally support. Something that portrays a fair give-and-take, communal relationship, would be effective. It needs to clearly convey how Hollywood and the general public are in the same boat.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work