StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information technology ethics - Essay Example

Cite this document
Summary
Professor Name ID # Date Computer Supported Crimes With the passage of time, huge developments have been done in the field of computer science. The computer is being used in every field of life. Computer is being used in scientific research, medical department, missile technology, banking, laboratory, and other walks of life…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.3% of users find it useful
Information technology ethics
Read Text Preview

Extract of sample "Information technology ethics"

Download file to see previous pages

On the other hand the biggest pessimistic use of a computer is for crime purposes. As people make use of the computers they typically think that their activities are confidential and also their personal information is protected. For instance, web sites of business nature often gather details from many visitors; later on many web sites sell these personal details against the desires of the visitors (Turban, Rainer and Potter; NCSI-Net). This is a kind of computer crime. There are many other kinds of a crime which are performed using a computer however most of the computer crimes are covered under the term ‘phishing’.

In their book, (Laudon and Laudon 147) define “computer crime as the unlawful activities by making use of a computer or against a computer system. The Internet's user-friendliness and convenience have fashioned modern ways for computer crime, well-known forms of which is phishing.” Additionally, the computer crimes appear in a wide variety of ways and also cause a number of serious problems for different people. For instance, nowadays online frauds or frauds using the Internet are modern form of the online criminal activities in which an authorized person (normally acknowledged as a hacker) hacks some useful data and information and later on use it to conduct illegal and criminal tasks, such as cash related scandals.

In this scenario, the basic intentions of criminals are to earn money, tease other or play games with others. In fact, the Internet is open for everyone which gives the opportunities to criminal people, to steal, new ways to steal them, and new techniques to harm others (Laudon and Laudon 147). As discussed above, there are many kinds of a computer crime and criminals do it intentionally. For instance, sometimes a dissatisfied employee or terminated worker can be dangerous to an organization.

In this scenario, these people want to damage business with their extensive criminal activities (Parker; Turban, Rainer and Potter). Therefore, employers should properly scrutinize the background of persons being connected with critical computer related tasks. Some people falsify resume to get jobs. Also, the company should hire trustworthy personnel to minimize crimes related to computers. In addition, Hacker and Cracker are most widely used terms in computer crimes. In this scenario, Hacker is an external person who can break through a computer system, typically with no illegal intention.

On the other hand, a Cracker is a nasty hacker, who may perhaps produce a stern crisis for the organization (Parker; Turban, Rainer and Potter). Moreover, Phishing is an emerging problem regarding online data security and information safety. There are a number of cases of identity theft and online frauds using Phishing and other hacking techniques. At the present, Phishing is normally carried out through E-mail or the instant messaging. In many cases its basic purpose is to direct online traffic to a particular website whose appearance or interface are approximately similar to the actual one.

Even though server cannot differentiate between false and original web site so a hacker successfully passes through these security walls. Normally, Phishing techniques are aimed at making fool to the internet users, and making use of the attractive usability of present web expertise. In this scenario,

...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information technology ethics Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Information technology ethics Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1477662-information-technology-ethics
(Information Technology Ethics Essay Example | Topics and Well Written Essays - 750 Words)
Information Technology Ethics Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1477662-information-technology-ethics.
“Information Technology Ethics Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1477662-information-technology-ethics.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information technology ethics

Computing and Information Technology

Since the introduction of computer and information technology, much advancement has been made in various sectors.... information technology is also responsible for the provision of information to everyone irrespective of time and location.... information technology is also responsible for the provision of information to everyone irrespective of time and location.... However, the issue of ethics in the utilization of technology has been overlooked for a long time now....
4 Pages (1000 words) Essay

Ethical Issues Concerning Information Technology

This paper ''Ethical Issues Concerning information technology'' tells that Since the introduction of computer and information technology, much advancement has been made in various fields such as engineering, biotechnology.... Similarly, information technology has been assimilated in business activities through systems such as supply chain management systems, inventory management systems, and customer relationship management systems (Atkinson & McKay, 2007)....
14 Pages (3500 words) Essay

Ethical Decision-making and High Technology

In reflecting upon the… blems of information technology and computing ethics, this research will explore the academic literature on workplace computing, computer ethics and ethics compliance strategies.... This broader scope of computer ethics examines the impact of computing and information technology upon human values using concepts, theories and procedures... businesses monitor their employees Internet use and largely due so to reduce loss and enforce ethics compliance (Conlin, 1997)....
4 Pages (1000 words) Essay

Internet Explosion - Protecting Our Future

This may result in the braking of professional ethics as one tries to manage emerging challenges.... ommittee on Advances in technology and the Prevention of Their Application to Next Generation Biowarfare Threats, 2005).... This has not eliminated all security gaps though, as criminals have also been exposed to the ever-growing technology.... Identify potential ethical challenges that may be faced by security professionals as technology advances, applications become more mobile, and computer criminals become more innovative....
1 Pages (250 words) Assignment

Identify the ethical issues within the field of Information Technology

Ethical aspects in Information and Communication technologies can be identified at four spheres as one's personal identity, social relations, political participation and Identify the ethical issues within the field of Information technology ethics is generally identified as “a system of moral principles, rules, and accepted standards of conduct” (22).... Such software can be associated with plagiarism, reverse engineering, open source code and cybersquatting(Ethics in information technology - Auburn University)....
2 Pages (500 words) Essay

Ethics, Pirated Software and Spyware

Corporate social responsibility and Computer Sciences and Information technology ethics, Pirated Software, and Spyware What are ethics, and how do ethics apply to business?... An individual's moral judgment remains the ethics' primary concern.... ethics can be defined as the principles that govern a groups or an individual's actions in any given situation.... An individual's moral judgment remains the ethics' primary concern....
2 Pages (500 words) Essay

Computer and Information Technology Ethics in Saudi Arabian Business Organizations

This study "Computer and Information technology ethics in Saudi Arabian Business Organizations" focuses on the ethical measures reflected in the information technology within organizations in the Arab countries particularly highlighting the Saudi Arabia region.... hellip; The use of computers and information technology can be understood to have become a a major part of the lives of today's generation.... Be it in the education system or the organizational cultures, information technology is one of the most flexible applications to provide huge benefits to its users....
8 Pages (2000 words) Case Study

Microsoft Corp: Information Technology Ethics and Policy

On petition from a grant of a beginning, the court The paper "Microsoft Corp: Information technology ethics and Policy" is a good example of a case study on information technology.... technology, and in this case where Microsoft is a subject, it has generally given media practitioners more control over the whole communication process....
3 Pages (750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us