StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Ethics and Privacy in the Social Aspect - Essay Example

Cite this document
Summary
The paper "Computer Ethics and Privacy in the Social Aspect" states that generally, a person can decide on issues where incorrect information is saved although they may not be able to completely erase the information from the database, which stores it. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
Computer Ethics and Privacy in the Social Aspect
Read Text Preview

Extract of sample "Computer Ethics and Privacy in the Social Aspect"

Numerous information about a person can exist over an infinite period leading to unfavorable actions on the side of agencies that enforce the law, and potential employers with agencies that offer credit facilities (Becker & Becker, 2008). She puts across that some companies and institution can gain access to individual information and uses it against them based on religion, ethnicity, or race. People who discover that their personal information may be accessed, have a lot of pressure to conform. When most people feel afraid that their personal information can be accessed, they reduce their capability to induce change in society (Tucker, 2006). This indicates that privacy matters affect more than the wrongdoers do.
Debora also argues that people have a right to reject giving their personal information. Those who give their information indeed forfeit this right (Werhane & Freeman, 2011).

She says that in the current society, it is almost impossible to live without providing your personal information. For instance, one cannot use a computer if he cannot provide personal information, use a credit card, get health insurance, or even get a driver’s license or benefit from any government program (Gabelman, 2005). This is because the information is stored in the databases. She observes that there are many reasons why people should reject giving their personal information though it can cause serious inconveniences (Canto-Sperber, 2004). People can embrace the new developments of computers without fear of the dangers that arise by using passwords and keywords to protect their personal information. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Privacy Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Privacy Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/business/1585988-privacy
(Privacy Essay Example | Topics and Well Written Essays - 250 Words)
Privacy Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/business/1585988-privacy.
“Privacy Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/business/1585988-privacy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Ethics and Privacy in the Social Aspect

Computer and Information Technology Ethics in Saudi Arabian Business Organizations: Attitudes and Approaches

Thus maintaining ethical codes of conduct for the uses of computers or information systems has become a necessary aspect in every institutional organization....       Institutional studies reflect that social or ethical values and principles have effects on an organization's performances and firms acquire techniques for correcting the circumstances through use of ethical practices.... (1994), Managing social and economic change with information technology, Chicago: Idea Group Inc 7....
8 Pages (2000 words) Report

Professional Ethics and Responsibilities in Computer Technology

This paper ''Professional ethics and Responsibilities in Computer Technology'' discusses the role of the professional ethics and responsibilities in computer technology.... ROFESSIONAL ethics and RESPONSIBILITIES IN COMPUTER TECHNOLOGY Professional ethics and Responsibilities in Computer Technology Affiliation Date Table of Contents Introduction 3 The Role of Ethics in Information Technology 3 Common Dilemmas 5 Current Attitudes, Perceptions, and Behavior 7 Managing Ethical Issues 7 Outsource Awareness 8 Training and Rewards 8 Develop an IT Ethics Policy 9 Conclusion 9 Bibliography 10 Duke University....
6 Pages (1500 words) Literature review

The Human Factor in Cyber Security

9 Perina, K (2004), 'Hacking the social Code', Psychology Today, 37, 5, p.... 3 'Security and privacy' (2006), Health Management Technology, 27, 9, p.... Now if the both terms, ethics and hacking are taken together, it can easily be assimilated that the act of involving oneself in the criminal intent, pertaining to the computerized activities; however, with a moral aspect attributed to it, or pursuing those activities for the goods, rather than pleasing the deeply imbedded evil aspirations of the human nature (Lynch, 2005, p....
6 Pages (1500 words) Essay

Ethics and Morality in Software Development

Ethical issues emerge in relation location privacy in line with GIS systems use.... This paper ''ethics and Morality in Software Development'' tells that ethics is perceived as the study of concept value in terms of right or bad, as applied to actions concerning a group's norms or rules.... Basing on ethics and computer systems computer software systems lie squarely in the heart of decision-making.... ethics and morality in software development: A user perspective ethics and morality in software development According to studies, in people's lives today, digital devices and majorly computers have become part of them....
8 Pages (2000 words) Literature review

How the Internet Has Caused an Ethical Debate on Our Information Privacy

ethics and Social Impact of Information Systems in Our Society: Analysis and Recommendations.... ccording to the observation, it has been determined that the impact of the internet has changed the aspect of modern life enormously.... According to the observation, human beings in recent years have become extensively depended on the internet for their personal, professional and social requirements.... At the same time, many anti-social activities have been executed through the help of internet communication medium....
8 Pages (2000 words) Case Study

The Interaction of Modern Computer Technologies

he lack of effective non-computer analogies defines the uniqueness of computer ethics and derives new ethical issues (Maner 3).... However, in using such technologies, companies and governments must consider the ethical implications of such surveillance since it may demean the security and privacy of the parties involved (Markgraf 1).... otably, computer ethics is significant and interesting since computers play special roles in modern society....
6 Pages (1500 words) Essay

Software Piracy and Privacy Policy

The author of this paper "Software Piracy and privacy Policy" discusses the benefit of the use of authentic and licensed software protection, the organization policy, the three principles selected for the matrix, software application piracy and dilemma, the factors that attract researchers.... The aspect of software piracy is considered to be illegal in many of the countries.... The aspect of software piracy will drastically influence the software engineers, publishers of genuine software and most importantly the overall economy of a nation....
7 Pages (1750 words) Assignment

Social Issues in Technology

his is largely controversial to the computer ethics; they state that the user should be given the respect to privacy.... ome behaviors as seen in the given case scenarios are not exactly in line with the required code of conduct expected by the computer ethics.... The main aspect that requires consideration in the case of the company's flexibility of the set rules.... This paper 'social Issues in Technology' seeks to determine the issues that affect the ethical standards....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us