Ethical Issues in an Age of Information and Communication Technology

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Introduction

  • Ethics are concerned with placing value.
  • They help determine whether an act is good or bad.
  • These rules and are written into laws.
  • The computing profession is no exception.
  • It has guidelines on the conduct of its professionals (Pojman, 2012).

Introduction

Ethics and computer crime

  • Computer use was initially not regulated.
  • This caused problems and guidelines had to be formulated (Barbara, 2011).
  • With the freedom of the internet, new issues have emerged.
  • Computer ethics seeks to address the menace.

Ethics and computer crime

Computer crimes

  • Computer crimes are quite common today.
  • This refers to any crime involving a network and a computer.
  • The computer may be used in the crime or may be the target (Herman, 2004).
  • Criminal exploitation of the internet is referred to as Net crime.

Computer crimes

Cyber crime

  • Cyber crime is a crime committed with the intent to harm an individuals reputation.
  • It could be physical or mental harm, and directly or indirectly (MacKinnon, 2011).
  • The crime is propagated by modern telecommunication such as the internet.

Cyber crime

Malware

  • Malware refers to computer virus or a Trojan.
  • Viruses get into the computer without the user’s conscience (Michael, 2011).
  • They are developed as normal programs.
  • Viruses harm data stored in the computer by corrupting it.

Malware

Identity theft

  • Identity theft involves a criminal getting and targets personal information and using it as their own.
  • It can involve the hacker getting personal bank details (Michael, 2011).
  • The hackers then uses the information for their own benefit.

Identity theft

Cyber stalking

  • It means to use the internet to stalk someone.
  • Many individuals leave personal information on the internet (Michael, 2011).
  • This increases the vulnerability to cyber stalking.
  • Cyber stalking is essentially a form of harassment.

Cyber stalking

Child pornography

  • It is unbelievable, but the internet is used to exploit children (MacKinnon, 2011).
  • Individuals make a lot of money from this crime.
  • This presents an issue of critical concern.
  • This is due to the nature of the crime and its implications in society.

Child pornography

Spam

  • Spam refers to the numerous annoying emails.
  • The annoying messages are illegal in many countries.
  • A malware protected computer is used to prevent the spread of a spam.
  • There are certain guides that were formulated to minimize computer crimes (White & White, 2006).

Spam

Computer Ethics

  • There are various guides that emanated from the computer ethics institute.
  • It is unethical to write a program with wrong motives.
  • A program should be formulated with the sole intent not to harm users.
  • It is wrong to access and destroy other peoples files.
  • Generating and spreading computer viruses is unethical.
  • Reading other peoples information is unethical.
  • This is because it contravenes to their privacy.
  • Using the computer to steal is illegal.
  • This is computer fraud and there are laws against it.
  • Using the computer to spread lies is unethical.
  • Software books are guarded by intellectual property rights.
  • It is thus unethical to use a product not that is not legally acquired.
  • Hacking into unauthorized system is unethical.
  • It is not legal to bypass authorization measures.
  • Intellectual property piracy is prohibited.
  • Coping another person’s work without authorization is unethical
  • It is prohibitive to write a program that is harmful to society (Stephen, Maeve & Donald, 2003).
  • Computer will be used to depict respect and consideration.
  • The computer may be used in the crime or may be the target (Herman, 2004).

Computer EthicsComputer EthicsComputer EthicsComputer Ethics

Conclusion

  • Vulnerability to computer crime is evident.
  • This is either through the internet or the computer network.
  • It is important to be ethical to avoid crimes.
  • Computer protection measures should also be applied to reduce computer crime.

Conclusion

References

Barbara, M. (2011) Ethics: Theory and Contemporary Issues, 7th ed. Belmont, CA: Wadsworth Publishing Co.

Herman, T.(2004). Ethics & Technology: Ethical Issues in an Age of Information and Communication Technology. Hoboken, John Wiley and Sons, Inc.

MacKinnon, B. (2011). Ethics: Theory and contemporary issues. Boston, MA: Wadsworth/Cengage Learning.

Michael, J. (2011). Ethics for the Information Age, 4th ed. Boston, MA: Addison-Wesley.

Pojman, L. P. (2012). Ethics: Discovering right and wrong. Boston, MA: Wadsworth.

Stephen, H. Maeve, C., & Donald, J. (2003). Management Information Systems: For the Information Age, 4th ed. New York, McGraw-Hill.

White, J.E., & White, J.E. (2006). Contemporary moral problems. Belmont, CA: Wadsworth Pub.

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!