• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

The main ethical issues relating to Information Technology.

Extracts from this document...


TABLE OF CONTENTS INTRODUCTION 3 CURRENT ETHICAL ISSUES IN IT 4 REFERENCES 9 ARTICLE IN NEWSPAPER AND MAGAZINES 10 Guard accessed porn, prosecutors charge 10 Cyber cop busts local porn seller 11 Beware: Employee Monitoring Is On The Rise 12 APPENDIX 15 Introduction Information technology has had an effect on private and public organization as well as on employees, customers, clients, and society as a whole and "as the number of computers increases, the magnitude of their impact on society increases" (p.116 Kizza, J.M). Indeed, everyone from living room to the boardroom of a company has been touched in some or other way by information technology. The impact of Information technology can be seen in every aspects of human life however, not everyone likes computers and information technology, and even those who do not like them at all times. Many people believe that humankind is threatened by the evolution of information technology in last two decade. In contrast we can say that information technology is essential to maintaining and supporting our culture, so we have symbiotic relationship with information technology therefore we must be aware of its effects on us as individuals and member of organization and as well as on society as a whole. Information technology has raised a multitude of negative issues and it raises many ethical issues ranging from pornography, privacy, accountability (responsibility in case of software crash) hacking, gambling, online scam, planned surveillance, censorship, illegal Copying of software programs surveillance of E-mail file etc. apart from these major issues few ethical issues deals with health and safety are also of major concern, as are the impact of Information Technology on employment levels and the quality of life of the people. Ethics is a branch of philosophy that deals with what is considered to be right and wrong. The one of the oldest codes of ethics, the Ten Commandments, (appendix 1) ...read more.


Mr. Gooden, 46, was indicted Friday on charges of theft and unauthorized use of county property. If convicted, he faces up to three years in prison. Prosecutor Mike Allen alleged Mr. Gooden gained access to the computers while working as a supervisor for a firm that is paid by the county to provide security at several offices. Mr. Gooden, of Coryville, is accused of using the computers after hours on Dec. 16 and Dec. 17 at the county's Department of Human Services. Mr. Allen said county employees were alerted to Mr. Gooden's activities when they noticed new icons on their computers. Many of those icons contained sexual terms. The employees clicked on the icons and discovered that someone had connected the computers to sexually explicit Internet sites. They reported it to the sheriff, who determined that the only people who had access to the building after hours were cleaning crews and security personnel. He said many of the computers were in areas that could be entered only with keys used by security officers. Prosecutors say the charge of unauthorized use of property applies to illegally accessing the computers. The theft charge was filed because a 16-channel radio supplied to him by the county was not returned. (SOURCE: - http://enquirer.com/editions/2000/03/04/loc_guard_accessed_porn.html) 2. The Cincinnati Enquirer Publication date: 11-19-97 Cyber cop busts local porn seller By Paul A. Long, Post staff reporter A Taylor Mill man, charged with peddling child pornography on the Internet, was nabbed by a New Hampshire cop who regularly patrols chat rooms looking for sexual activity. ''Our agency has decided to try to make the Internet a safer place,'' said James McLaughlin, a detective with the Keane, N.H., and police. ''We've made an investment to return some inhibitions to the cyberworld.'' For about an hour a day, McLaughlin goes online, talking to people, looking for those who are looking for pictures of naked children having sex. ...read more.


Patiently awaiting my bid in the Collectibles/Science/Space Exploration section was a person hoping to unload his Nike Ajax surface-to-air guided missile, which the seller described as "32 feet of shark-like elegance." Maybe Larry Ellison could buy it, to go with his MiG 29 fighter jet. He could certainly afford the deadly projectile--bidding starts at just $2,345 (warhead not included). However, there is the problem of shipping. The seller, who identified himself only by his email address, said he'd prefer it if the buyer came to pick up the missile at his home, which he said was somewhere in the "DEEP South." 5. FTC bars man from using Net USA today 01/26/99- Updated 08:31 PM ET LAKE WORTH, Fla. -- The Federal Trade Commission has reached a settlement that bars a man for life from doing business on the Internet because he scammed 25 people in online computer auctions. Craig Lee Hare, also known as Danny Hare, was accused by the federal agency of selling new and used computers through the auctions, then pocketing the money without shipping the equipment. He made $20,000 to $30,000 from people in the United States and Canada, the FTC said. He was charged with four counts of using unfair or deceptive acts in mail or telephone commerce. (Source: - http://www.usatoday.com/life/cyber/tech/ctd487.htm) Appendix THE TEN COMMANDMENTS FOR COMPUTER ETHICS * Thou shalt not use a computer to harm other people. * Thou shalt not interfere with other people's computer work. * Thou shalt not snoop around in other people's files. * Thou shalt not use a computer to steal. * Thou shalt not use a computer to bear false witness. * Thou shalt not use or copy software for which you have not paid. * Thou shalt not use other people's computer resources without authorization. * Thou shalt not appropriate other people's intellectual output. * Thou shalt think about the social consequences of the program you write. * 10. Thou shalt use a computer in ways that show consideration and respect. (SOURCE: - http://www.tekmom.com/tencommand/) Assignment: - One MIT ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Electronic Media Studies section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Electronic Media Studies essays

  1. Nations today, most commonly such as China, Iran, and Burma has become infamous for ...

    Furthermore, censorship occurs even in the state level, where government officials may nationally censor web pages containing content that clearly infringe on the guaranteed rights of the state's citizens. One of the most well known examples of internet censorship in Canada was through the case of holocaust denier Ernest Zundel1 who openly promoted ethnic hate propaganda through his website.

  2. The Future of Journalism. For the first time, more and more people are ...

    The Internet has several advantages over newspapers. First stories are now repeatedly broken first on the Web, before moving to TV and print ssecondly, the internet has a fantastic search capability, through the search engines like Google, making news stories more visible. Surfing through the internet has now become a more popular culture while reading newspaper has

  1. Digital networks like the internet have extended State and Corporate control to unprecedented levels. ...

    In correspondence with this trend the EU in 2004 created a high tech crime agency against trans-border digital crimes (Yar, 2013). In America the Megan?s law database register was released online as a parent?s protection tool regarding the locations of convicted sex offenders (Bryne, 2010).

  2. What in your view, are the main problems involved in attempting to produce policies ...

    The regulatory mechanisms designed to govern their use have traditionally reinforced the role of the media as both creators and advocates of the status quo and left the exercise of the freedom of the rights of expression and access to information to be governed by more general legislation.

  1. Going Viral the use of online (social) media for the spread of ...

    It also opens doors for propaganda, hoaxes or what is colloquially known as ?trolling? where false information is spread on a large scale and believed to be true. An example of this is the ?dead celebrity twitter trend? where falsified claims of a celebrity or person of interest passing away

  2. The Tragedy of the Commons - Examining the Free Internet

    Free does have a downside, and there is a tendency that favors a few winner-takes-it-all companies that actually gets monopoly status in their field. Google has a huge infrastructure advantage, which means that they earn as much in one industry (search and advertising)

  1. COICA. The Role of the US Government and Online Piracy

    According to a release by the MPAA in November Senator Orrin Hatch from Utah has also been a significant leader in pushing for this bill. He sits on the Judiciary Committee alongside Sen. Leahy as its senior Republican member. He said, ?This legislation is critical to our continued fight against online piracy and counterfeiting.

  2. Convergence in Technology and its likely effects on society.

    "Nowadays the urge to contact each other over the phone or even face to face isn?t as important because we feel like we are still connected via social networks? ( Thomas, 2007). Convergence can also affect the workplace in a negative way.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work