• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

The main ethical issues relating to Information Technology.

Extracts from this document...


TABLE OF CONTENTS INTRODUCTION 3 CURRENT ETHICAL ISSUES IN IT 4 REFERENCES 9 ARTICLE IN NEWSPAPER AND MAGAZINES 10 Guard accessed porn, prosecutors charge 10 Cyber cop busts local porn seller 11 Beware: Employee Monitoring Is On The Rise 12 APPENDIX 15 Introduction Information technology has had an effect on private and public organization as well as on employees, customers, clients, and society as a whole and "as the number of computers increases, the magnitude of their impact on society increases" (p.116 Kizza, J.M). Indeed, everyone from living room to the boardroom of a company has been touched in some or other way by information technology. The impact of Information technology can be seen in every aspects of human life however, not everyone likes computers and information technology, and even those who do not like them at all times. Many people believe that humankind is threatened by the evolution of information technology in last two decade. In contrast we can say that information technology is essential to maintaining and supporting our culture, so we have symbiotic relationship with information technology therefore we must be aware of its effects on us as individuals and member of organization and as well as on society as a whole. Information technology has raised a multitude of negative issues and it raises many ethical issues ranging from pornography, privacy, accountability (responsibility in case of software crash) hacking, gambling, online scam, planned surveillance, censorship, illegal Copying of software programs surveillance of E-mail file etc. apart from these major issues few ethical issues deals with health and safety are also of major concern, as are the impact of Information Technology on employment levels and the quality of life of the people. Ethics is a branch of philosophy that deals with what is considered to be right and wrong. The one of the oldest codes of ethics, the Ten Commandments, (appendix 1) ...read more.


Mr. Gooden, 46, was indicted Friday on charges of theft and unauthorized use of county property. If convicted, he faces up to three years in prison. Prosecutor Mike Allen alleged Mr. Gooden gained access to the computers while working as a supervisor for a firm that is paid by the county to provide security at several offices. Mr. Gooden, of Coryville, is accused of using the computers after hours on Dec. 16 and Dec. 17 at the county's Department of Human Services. Mr. Allen said county employees were alerted to Mr. Gooden's activities when they noticed new icons on their computers. Many of those icons contained sexual terms. The employees clicked on the icons and discovered that someone had connected the computers to sexually explicit Internet sites. They reported it to the sheriff, who determined that the only people who had access to the building after hours were cleaning crews and security personnel. He said many of the computers were in areas that could be entered only with keys used by security officers. Prosecutors say the charge of unauthorized use of property applies to illegally accessing the computers. The theft charge was filed because a 16-channel radio supplied to him by the county was not returned. (SOURCE: - http://enquirer.com/editions/2000/03/04/loc_guard_accessed_porn.html) 2. The Cincinnati Enquirer Publication date: 11-19-97 Cyber cop busts local porn seller By Paul A. Long, Post staff reporter A Taylor Mill man, charged with peddling child pornography on the Internet, was nabbed by a New Hampshire cop who regularly patrols chat rooms looking for sexual activity. ''Our agency has decided to try to make the Internet a safer place,'' said James McLaughlin, a detective with the Keane, N.H., and police. ''We've made an investment to return some inhibitions to the cyberworld.'' For about an hour a day, McLaughlin goes online, talking to people, looking for those who are looking for pictures of naked children having sex. ...read more.


Patiently awaiting my bid in the Collectibles/Science/Space Exploration section was a person hoping to unload his Nike Ajax surface-to-air guided missile, which the seller described as "32 feet of shark-like elegance." Maybe Larry Ellison could buy it, to go with his MiG 29 fighter jet. He could certainly afford the deadly projectile--bidding starts at just $2,345 (warhead not included). However, there is the problem of shipping. The seller, who identified himself only by his email address, said he'd prefer it if the buyer came to pick up the missile at his home, which he said was somewhere in the "DEEP South." 5. FTC bars man from using Net USA today 01/26/99- Updated 08:31 PM ET LAKE WORTH, Fla. -- The Federal Trade Commission has reached a settlement that bars a man for life from doing business on the Internet because he scammed 25 people in online computer auctions. Craig Lee Hare, also known as Danny Hare, was accused by the federal agency of selling new and used computers through the auctions, then pocketing the money without shipping the equipment. He made $20,000 to $30,000 from people in the United States and Canada, the FTC said. He was charged with four counts of using unfair or deceptive acts in mail or telephone commerce. (Source: - http://www.usatoday.com/life/cyber/tech/ctd487.htm) Appendix THE TEN COMMANDMENTS FOR COMPUTER ETHICS * Thou shalt not use a computer to harm other people. * Thou shalt not interfere with other people's computer work. * Thou shalt not snoop around in other people's files. * Thou shalt not use a computer to steal. * Thou shalt not use a computer to bear false witness. * Thou shalt not use or copy software for which you have not paid. * Thou shalt not use other people's computer resources without authorization. * Thou shalt not appropriate other people's intellectual output. * Thou shalt think about the social consequences of the program you write. * 10. Thou shalt use a computer in ways that show consideration and respect. (SOURCE: - http://www.tekmom.com/tencommand/) Assignment: - One MIT ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Electronic Media Studies section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Electronic Media Studies essays

  1. What are the benefits and disadvantages to an organisation of using computer technology to ...

    All of these computerised technology perform several tasks include ATM machines and telecommunications. People with the inner interest in the computer industry will need basic skills to work in a particular career involving Information Communication Technology such as, web designer, programmer, manager, technician, graphic designer, data entry clerk, database manager, bank clerk, administrator, accountant and other related careers.

  2. "Does Technology have an essence? Define what this might be and critically assess how ...

    a computer game, finding information on the Web, or making money by providing these services may be quite instrumental, when the process is viewed on a larger scale, when all the complex interactions between its elements come into play, it comes much more difficult to conceptualise as simply a matter of an instrumental rationality or enframing.

  1. Campaigner for Digital Privacy Rights.

    Often, personal information can include name, address, email address, social security numbers, URLs for web sites you've visited, as well as other information that may have been built up about you in a profile. Consumers are, therefore, strongly encouraged to read privacy policies, be highly selective when offering their personal

  2. Digital networks like the internet have extended State and Corporate control to unprecedented levels. ...

    This digital platform has facilitated the growth of new cultures beyond traditional understandings along with an increased awareness of personal security. Indeed the market for online security software has grown tremendously in recent times becoming a billion dollar industry (Yar, 2013).

  1. What in your view, are the main problems involved in attempting to produce policies ...

    The regulatory mechanisms designed to govern their use have traditionally reinforced the role of the media as both creators and advocates of the status quo and left the exercise of the freedom of the rights of expression and access to information to be governed by more general legislation.

  2. Going Viral the use of online (social) media for the spread of ...

    It also opens doors for propaganda, hoaxes or what is colloquially known as ?trolling? where false information is spread on a large scale and believed to be true. An example of this is the ?dead celebrity twitter trend? where falsified claims of a celebrity or person of interest passing away

  1. The Tragedy of the Commons - Examining the Free Internet

    that you as a consumer need to pull out your credit cards - unless you really want to. What Is the Future? But is the free model a good or bad thing? It is an economic force, it?s not a decision, but rather an underlying cost structure for digital goods.

  2. COICA. The Role of the US Government and Online Piracy

    By coordinating our efforts with industry stakeholders and law enforcement officials, we?ll be better able to target those who are profiting from illegal activity? (Traverse Legal). Sen. Hatch?s support for this bill is due partly to Senator Leahy?s efforts to making this a bipartisan endeavor.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work