StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Crimes, Ethics, and Privacy - Research Paper Example

Cite this document
Summary
This research paper "Computer Crimes, Ethics, and Privacy" attempts to highlight some computer crimes and explain how these crimes give rise to ethical issues. Also, a detailed discussion will be made on the breach of privacy through computer crimes…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful
Computer Crimes, Ethics, and Privacy
Read Text Preview

Extract of sample "Computer Crimes, Ethics, and Privacy"

Inserts His/her Inserts Inserts Grade (23, 10, Computer Crimes, Ethics, and Privacy Introduction The age of technology has made our world cozier to a great extent but at the same technology has negatively affected the moral values of the society in general. It is true that everything has two sides; a positive and a negative one. And on the basis of some negative effects the potential benefits of technology, such as computers and internet, cannot be ignored. But it is also important to understand the perils of computers and internet, so that one can attempt to avoid and eradicate such perils. The advent of computers and internet in our daily life has given rise to computer crimes, illicit activity that is carried out by the help of computers, and these crimes have had a ponderous impact on the moral values of the people, especially adolescents. In this paper we will attempt to highlight some computer crimes and explain how these crimes give rise to ethical issues. Also a detailed discussion will be made on the breach of privacy through computer crimes. The paper talks about computer technology and ethical issues it poses therefore it is perfectly related to the chapter. Computer Crimes Computer crimes are formally defined as crimes that involve a computer and a network (Moore, 4). Crimes that are carried out by the help of a computer or where computer is the target also come under computer crimes. The word cyber crime is also used interchangeably for computer crime. The most common of computer crimes include identity theft, financial theft, spamming, and breach of privacy. There has been seen a surge in cyber crimes mainly due to the increasing reliance on computers and network. Almost everything is run by computers these days and therefore can be targeted by cyber criminals. Malware (short form for malicious software) is the most prevalent form of computer crime where a person controls a computer by planting some malicious code. The attacker can install or plant the code on a system and then can enjoy great access to the computer without authorization of the user (Skoudis & Zeltser, 2). Common types of Malware include Virus, Trojan, and Worm. Malwares are used to gain access to computers, sometimes just for fun. They can delete important files and can also slow down the speed of the system. Identity theft is another computer crime that can make life of a computer user miserable. The effects of this computer crime are more ponderous than Malware as it can financially hurt the individual. Identity theft involves stealing information of extremely personal nature in order to use it for some benefit. Mainly hackers try to gain access to bank account passwords, credit card numbers etc to steal money from the users. The crime of identity theft is extremely prevalent and many people lose their money on a daily basis as a result of it. E commerce has given users opportunity to shop online using credit cards and online merchant accounts. This has in turn increased the chances of identity theft. Other computer crimes include cyber stalking, spamming, and child pornography. Cyber stalking refers to the use of internet for stalking purposes by using personal information of a person. Cyber stalkers use internet to repeatedly harass a person and therefore it is listed as a computer crime (Pot, 1). Spamming refers to the bulk messages that are sent to users. These are unwanted messages that fill the inboxes of users. Spamming is a big business for many people and causes problems for users. Child pornography is also propagated through internet and it is a serious offense. Children are left vulnerable because child pornography has become a business today through internet. Ethical Issues Involving Computer Crimes Computer crimes pose many ethical issues for the society. The main problem of computer crimes is that they are mostly conducted by teenagers or young people in general. This has posed many problems for the society at large. Younger generation is the pioneer of the future for any society but today there are involved in computer crimes. The moral values of the youth are seriously suffering as a result of computer crimes. The ease with which such crimes can be carried out is blurring the boundaries between right and wrong for the young people. Cyber stalking, for example, is extremely hard to catch and many victims even ignore stalkers. This also makes cyber crimes easy to carry out. Identity of a person is hidden when using a computer or internet and this makes the person feel that he or she cannot be caught. This alone is more than enough reason to get involved in cyber crimes for young people. The moral values that are prevalent today are totally different from past. Younger generation does not consider spamming or piracy as crimes. They rationalize all their wrongs and this is an extremely bad sign for the society. The exponential increase in the use of internet has given rise of technology specific criminal behavior (Ditzion et al, 285). This means that ethical issues are increasing because internet is available to many people. This is an important dimension of ethical issues related to computers and networks. The feeling of being invisible along side with the easy availability of technology is giving rise to a society where hard work is not considered the gate way to success, rather use of technology to manipulate the system is the new success story that is attracting youth of our times. Computer crimes have therefore seriously shaken the moral values of our society Breach of Privacy Breach of privacy is an important ethical issue that computer crimes pose for the society. The issue is of significant importance and therefore it has to be discussed separately. Internet has allowed people to share their personal information through social networking sites. There are loads of other ways through which people are sharing information with each other and with organizations. This information is of personal nature and therefore needs to be secured from any kind of theft. Computer crimes have made all the private information of people vulnerable to hackers. There are many uses of private information for hackers. They can easily sell the information to research companies. Private information is vital for marketing firms because they can screen customers that have specific traits. Excessive marketing is bombarding us everywhere from television to internet. This marketing is based on the information regarding demographics of potential customers. All this information is purchased from different sites or research organizations. This has made breach of privacy a financial rewarding crime and hackers are trying newer and better ways to gain information. The value of information is great today and it has become a valuable asset (Hoser & Nitschke, 181). Security incidents involving misuse of information mostly originate within an organization (D’Arcy, 79). This means that the survey forms we often fill on internet for security or other purposes are used for entirely different purposes. This kind of breach of privacy is a serious ethical issue which the world is facing today due to computer crimes. Our personal information is so easily used by organizations to make money and this is sometimes not even considered something against ethics. The problem again here is that computer crimes have blurred the differences between right and wrong. People who misuse private information don’t even consider it wrong because they think that no one gets hurt in the process. Technology is therefore shaping the moral compass of the society in an extremely negative manner. Privacy is important for all individuals. It is our right to live a life without any outside interference as long as we are not breaking the law. Unfortunately this is only a dream today because there are so many unwanted interferences in our lives because of internet and computer crimes. Trying to see the pictures of your classmate by trying to access his or her Facebook account is in no way different to peaking in your neighbor’s bedroom. But the youth do not understand this and therefore breach of privacy seems to have no end in sight. Protection of personal information that may be sensitive is not the only thing important for privacy. All information whether sensitive or trivial shared without consent of the user comes under breach of privacy (Kinkus, 1). This should be made clear to the young if future transgressions are to be avoided. The right of privacy has been seriously violated by computer crimes but proper training and education can help to control, if not eradicate, such crimes. Conclusion Computer crimes are illicit activities that are carried out with the help of a computer and a network. Technology has brought many benefits but many perils have also come to life as a result. Cyber crimes are raising serious ethical issues with respect to privacy of information. Spamming, identity theft, malware, child pornography, and cyber stalking are some of the computer crimes. Breach of privacy is the most serious ethical issue that computer and internet is posing today. The moral values of the society have changed in a negative way as a result of computer crimes. Works Cited Page D’Arcy, J., Hovav, A., and Galletta, D. “User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach.” Journal of Information System Research 20.1 (2009): 79-98. Web 23 October 2011 Ditzion, R., E. Geddes, and M. Rhodes. “Computer Crimes.” The American Criminal Law Review 40.2 (2003): 285-337. Web. 23 October 2011 Hoser, Bettina and Nitschke, Tanja. “Questions on ethics for research in the virtually connected world.” Social Network 32.3 (2010): 180-186. Web 23 October 2011 Kinkus, Jane. “Science and Technology Resources on the Internet.” Issue in Science and Technology, 2002. Web. 23 October 2011 Moore, R. Cybercrime: Investigating High-Technology Computer Crime. Mississippi: Anderson Publishing, 2005. Print Pot, Justin. “Top Five Computer Crimes & How to Protect Yourself from Them.” Makeuseof.com. Makeuseof, 2010. Web. 23 October 2011 Skoudis, Ed, and Zeltser, Lenny. Malware: fighting malicious code. New York: Prentice Hall Professional, 2004. Print Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer crimes,ethics, and privacy Research Paper”, n.d.)
Computer crimes,ethics, and privacy Research Paper. Retrieved from https://studentshare.org/finance-accounting/1434408-computer-crimesethics-and-privacy
(Computer crimes,ethics, and Privacy Research Paper)
Computer crimes,ethics, and Privacy Research Paper. https://studentshare.org/finance-accounting/1434408-computer-crimesethics-and-privacy.
“Computer crimes,ethics, and Privacy Research Paper”, n.d. https://studentshare.org/finance-accounting/1434408-computer-crimesethics-and-privacy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Crimes, Ethics, and Privacy

Computer-Based Crimes

With the number of computer crimes growing, there is significant interest on how users can enhance their safety when using computers.... However, this essay focuses on computer-based crimes, hackers and criminals, who can, for example steal personal data from a user.... This research paper not only describes such events, but also explaines terminology of hacking attacks, phishing and prevention and mitigation of computer-based crimes.... Phishing Computer-based crimes may also entail wrongful acquisition of data and information about users for the purpose of misrepresentation....
4 Pages (1000 words) Research Paper

Ethics in Computing

pecifically, computer ethics have been used about the professional philosophers' application of traditional theories of western origin which include such theories as Kantianism, utilitarianism, or virtue ethics and these are incorporated into the field of computer and computer networks.... This field is also concerned with professional code of ethics and also good practice standards which are to be practiced by the professionals in this field.... Other codes of ethics that have been incorporated in computer ethics include cyber ethics and internet ethics which are concerned with cyberspace and the internet respectively (Begg, 2005)....
10 Pages (2500 words) Essay

Computer Science-Information System

It is obvious that working conditions in IT Company must be designed to prevent computer crimes and simultaneously to avoid negative ethical consequences of prevention procedures.... These violations can be classified as computer crimes and often related to industrial espionage and information "wars" between competing companies.... Employees define acceptable practices more strictly than just refraining from committing computer crimes; they also consider the effects of their activities on other people and organizations....
3 Pages (750 words) Essay

Best Approach to Address Computer Technology Related Ethical Problems

Moreover, the government should make people aware of the laws to make them recognize computer ethics and the penalties for different types of computer-related crimes.... The reason is that computer crimes have become so much common and difficult to deal with that there needs to be some proper way to prevent such crimes.... computer crimes are just like traditional crimes because the offender intends to achieve personal benefits by putting others in trouble....
2 Pages (500 words) Research Paper

Cyberethics Issues

The alone computer user has own personal ethics while interacting with a system when the same user becomes the internet user more principles involved under ethics and as a whole, the user should follow the ethical norms (Tavani, 2006).... The cyber ethics codes are proposed by Microsoft some of them are: do use of the internet to keep in touch with family, friends, work fellows, and other people for sharing ideas, get engage with the online community through social media sites and discussions forums, do not become cyberbully and use good language, be respectful with other online friends and don't try to cheat them in any way, do not encourage cyberbullies....
9 Pages (2250 words) Essay

Ethical Issue in Information Technology

It is related to the fields of computer ethics and the philosophy of information.... Humanity is confronting the crucial issues like access to information, privacy, intellectual property rights etc.... Humanity is confronting the crucial issues like access to information, privacy, intellectual property rights etc.... This paper, Ethical Issue in Information Technology, stresses that the term information ethics refers to the discipline of applies ethics developed by Luciano Floridi....
6 Pages (1500 words) Term Paper

Unethical Behavior in Information Technology and Information Systems

There is no specific category of computer ethics.... computer speed, unauthorized access to databases, information integrity and information confidentiality not considered adequately means that information technology and information system can be exposed to unethical practices.... Piracy in information technology or computer means reproduction, distribution or copying of software without permission of the owner of the copyright....
5 Pages (1250 words) Research Paper

The Ethical Impacts of Computer Systems on our Personal Lives

The coursework called "The Ethical Impacts of Computer Systems on our Personal Lives" describes the importance of ethics to man.... he word ethics spurs a lot of debate as to being on the affirmative or negative.... As part of the existence of society, everyone has the right and obligation to each other with regard to ethics.... The paper assesses the trends technological and information systems pose to the society, advantages ad disadvantages associated with computer systems....
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us