• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14

The main ethical issues relating to Information Technology.

Extracts from this document...

Introduction

TABLE OF CONTENTS INTRODUCTION 3 CURRENT ETHICAL ISSUES IN IT 4 REFERENCES 9 ARTICLE IN NEWSPAPER AND MAGAZINES 10 Guard accessed porn, prosecutors charge 10 Cyber cop busts local porn seller 11 Beware: Employee Monitoring Is On The Rise 12 APPENDIX 15 Introduction Information technology has had an effect on private and public organization as well as on employees, customers, clients, and society as a whole and "as the number of computers increases, the magnitude of their impact on society increases" (p.116 Kizza, J.M). Indeed, everyone from living room to the boardroom of a company has been touched in some or other way by information technology. The impact of Information technology can be seen in every aspects of human life however, not everyone likes computers and information technology, and even those who do not like them at all times. Many people believe that humankind is threatened by the evolution of information technology in last two decade. In contrast we can say that information technology is essential to maintaining and supporting our culture, so we have symbiotic relationship with information technology therefore we must be aware of its effects on us as individuals and member of organization and as well as on society as a whole. Information technology has raised a multitude of negative issues and it raises many ethical issues ranging from pornography, privacy, accountability (responsibility in case of software crash) hacking, gambling, online scam, planned surveillance, censorship, illegal Copying of software programs surveillance of E-mail file etc. apart from these major issues few ethical issues deals with health and safety are also of major concern, as are the impact of Information Technology on employment levels and the quality of life of the people. Ethics is a branch of philosophy that deals with what is considered to be right and wrong. The one of the oldest codes of ethics, the Ten Commandments, (appendix 1) ...read more.

Middle

Mr. Gooden, 46, was indicted Friday on charges of theft and unauthorized use of county property. If convicted, he faces up to three years in prison. Prosecutor Mike Allen alleged Mr. Gooden gained access to the computers while working as a supervisor for a firm that is paid by the county to provide security at several offices. Mr. Gooden, of Coryville, is accused of using the computers after hours on Dec. 16 and Dec. 17 at the county's Department of Human Services. Mr. Allen said county employees were alerted to Mr. Gooden's activities when they noticed new icons on their computers. Many of those icons contained sexual terms. The employees clicked on the icons and discovered that someone had connected the computers to sexually explicit Internet sites. They reported it to the sheriff, who determined that the only people who had access to the building after hours were cleaning crews and security personnel. He said many of the computers were in areas that could be entered only with keys used by security officers. Prosecutors say the charge of unauthorized use of property applies to illegally accessing the computers. The theft charge was filed because a 16-channel radio supplied to him by the county was not returned. (SOURCE: - http://enquirer.com/editions/2000/03/04/loc_guard_accessed_porn.html) 2. The Cincinnati Enquirer Publication date: 11-19-97 Cyber cop busts local porn seller By Paul A. Long, Post staff reporter A Taylor Mill man, charged with peddling child pornography on the Internet, was nabbed by a New Hampshire cop who regularly patrols chat rooms looking for sexual activity. ''Our agency has decided to try to make the Internet a safer place,'' said James McLaughlin, a detective with the Keane, N.H., and police. ''We've made an investment to return some inhibitions to the cyberworld.'' For about an hour a day, McLaughlin goes online, talking to people, looking for those who are looking for pictures of naked children having sex. ...read more.

Conclusion

Patiently awaiting my bid in the Collectibles/Science/Space Exploration section was a person hoping to unload his Nike Ajax surface-to-air guided missile, which the seller described as "32 feet of shark-like elegance." Maybe Larry Ellison could buy it, to go with his MiG 29 fighter jet. He could certainly afford the deadly projectile--bidding starts at just $2,345 (warhead not included). However, there is the problem of shipping. The seller, who identified himself only by his email address, said he'd prefer it if the buyer came to pick up the missile at his home, which he said was somewhere in the "DEEP South." 5. FTC bars man from using Net USA today 01/26/99- Updated 08:31 PM ET LAKE WORTH, Fla. -- The Federal Trade Commission has reached a settlement that bars a man for life from doing business on the Internet because he scammed 25 people in online computer auctions. Craig Lee Hare, also known as Danny Hare, was accused by the federal agency of selling new and used computers through the auctions, then pocketing the money without shipping the equipment. He made $20,000 to $30,000 from people in the United States and Canada, the FTC said. He was charged with four counts of using unfair or deceptive acts in mail or telephone commerce. (Source: - http://www.usatoday.com/life/cyber/tech/ctd487.htm) Appendix THE TEN COMMANDMENTS FOR COMPUTER ETHICS * Thou shalt not use a computer to harm other people. * Thou shalt not interfere with other people's computer work. * Thou shalt not snoop around in other people's files. * Thou shalt not use a computer to steal. * Thou shalt not use a computer to bear false witness. * Thou shalt not use or copy software for which you have not paid. * Thou shalt not use other people's computer resources without authorization. * Thou shalt not appropriate other people's intellectual output. * Thou shalt think about the social consequences of the program you write. * 10. Thou shalt use a computer in ways that show consideration and respect. (SOURCE: - http://www.tekmom.com/tencommand/) Assignment: - One MIT ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Electronic Media Studies section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Electronic Media Studies essays

  1. Nations today, most commonly such as China, Iran, and Burma has become infamous for ...

    Furthermore, censorship occurs even in the state level, where government officials may nationally censor web pages containing content that clearly infringe on the guaranteed rights of the state's citizens. One of the most well known examples of internet censorship in Canada was through the case of holocaust denier Ernest Zundel1 who openly promoted ethnic hate propaganda through his website.

  2. The Future of Journalism. For the first time, more and more people are ...

    to advertisers and in some cases even advertisers themselves are not sure where to invest their money in. Newspaper circulation is going down but not as sharply as the critics are making us believe it. Newspapers are a long way from being dead even though business is definitely headed in a new and bold direction.

  1. Cyber Ethics @ Computer Ethics

    An absolutist (because of a proclivity for hierarchical thinking) might not have a problem with this divergence in procedure. A relativist, on the other hand, might question what makes the two situations essentially different (e.g. are faculty assumed to have more need for computers than students? Are students more likely to cause problems than faculty?

  2. This paper intends to provide a framework for thinking, debate and action on the ...

    In the 1950s and 1960s, the overseas activities of American multinationals centered on exports and direct investment. Newer technology went abroad embodied in goods. Overseas affiliates typically got older technology. Multinational corporations kept the latest knowledge at home, where it could be protected more easily. (Freeman & Soete, 1997) 2.

  1. Critical review - 'What Just Happened?", a chronicle from the information frontier - James ...

    portable e-mail devices and pseudo artificial software that track us and predicts our movement. Gleick says these inventions are an invasion of our lives and privacy many people are not comfortable with phones or computer technology still. "We are still self-conscious about the unshackling of our phones and will use

  2. Digital networks like the internet have extended State and Corporate control to unprecedented levels. ...

    This digital platform has facilitated the growth of new cultures beyond traditional understandings along with an increased awareness of personal security. Indeed the market for online security software has grown tremendously in recent times becoming a billion dollar industry (Yar, 2013).

  1. Going Viral the use of online (social) media for the spread of ...

    It also opens doors for propaganda, hoaxes or what is colloquially known as ?trolling? where false information is spread on a large scale and believed to be true. An example of this is the ?dead celebrity twitter trend? where falsified claims of a celebrity or person of interest passing away

  2. COICA. The Role of the US Government and Online Piracy

    I think that if the two of them can get S. 3804 to appear as an American problem, instead or a Democratic or Republican problem, they have a bigger chance at successfully pushing it through congress. Hatch?s constituents must not have a problem with Internet censorship even though most Republicans are completely against the Bill.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work