StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Ethics Is a Fundamental Issue - Essay Example

Cite this document
Summary
The paper "Computer Ethics Is a Fundamental Issue" discusses that computer ethics has been a fundamental issue since the emergence of computers. The rapid growth and development of computers have led to the evolution of how they can be used inappropriately…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.3% of users find it useful
Computer Ethics Is a Fundamental Issue
Read Text Preview

Extract of sample "Computer Ethics Is a Fundamental Issue"

? Computer Ethics Introduction Computer ethics have been a fundamental issue since the emergence of computers. The rapid growth and development of computers has led to the evolution of how they can be used inappropriately (Cavalier, 2005). This is to the detriment of society and its values. Since the application of computers is widespread, its use and application in juvenile practices is also vast. With the evolution of computer use in our society, the storage of most of people’s has become digitalized. The information stored varies from highly sensitive to potentially harmless information about the user. Organizations store information about their staff, their clients and their operations in general. This kind of information is sensitive and should be secure. Leakages of this kind of information to the competitors, would expose the organization’s confidential data. Computer ethics leads to prevent these kinds of actions and regulate the kind of personal information about users that can be released and under which circumstances it would be legal. Ethics also deal with the kind of actions that should be taken against people who illegally access unauthorized information. The ethical issues related to information technology are very many and they have been described in detail in many sources, with scholars taking different opinions on the privacy of data. Enforced codes of conduct. The regulation of information management is essential in the Information technology field, because the sensitivity of the information varies greatly. The privacy of one’s information is one of the fundamental universal human rights (Edgar, 1997). These rights flow over to the privacy of digital information. If these codes of conduct are enforced to all professional bodies, they will be obliged to secure their information better. This will increase the integrity of data and reduce cases of unauthorized access. This will also reduce the cases of attackers masquerading and getting other users information. Information theft has led to many cybercrimes and deliberate sabotage. Data that has not been properly secured has led to other crimes like identity theft and fraud. With the adoption of the ethical codes, the measures taken in the securing of data will improve greatly. If the codes are universally and forcefully enforced, there might be issuance of licenses to all information systems professionals, and all the related users/ people who handle information. This would help the body mandated with this responsibility to monitor all its members and know their activities. This monitoring will help them to track any perpetrators who have committed cybercrimes easily. This will also lead to punishment of professionals who have not acquired the license. For the license to be acquired the body will require all the applicants to meet certain requirements. The meeting of these requirements will ensure a certain level of professionalism that will have to be met by all the members. This professionalism will ensure the assurance in the quality of service and operations by the IS professional. The enforced ethical codes will also ensure that some standards that foster good ethics are met. Standardization of a sensitive issue like ethics will be a great advantage to all involved. This will provide guidelines on the mode of operation regarding the issue, and it will provide a structure (Johnson, 2000). This will also help create a transparent structure, which will be available to every user and administrator of the system. This will consequently reduce the number of cases that arise from the abuse of information. With the enforcement of the codes of conduct, users will also feel more secure about divulging their accurate information to organization and companies. This will be due to the laid out regulation that will be governing all the professionals. The codes will also compel users to submit their correct information. In some cases, users do not give out accurate information even when it is necessary. With the enforcing of the codes of conduct, it will be considered illegal to submit inaccurate information. This will help regulate the users of the systems. In these views, the enforcement of the code of ethics will improve the field of information systems by having standards and a universally accepted mode of operations (Edgar, 1997). The users of the systems will also be involved in the reforms process. In the scenario where the city accesses the tax records of city businesses from the IRS, the city might argue that, this method of information acquisition was the only way to track down these businesses. It might also argue that the information was acquired in an attempt to uphold the law, by tracking down these businesses. The city might add that, the IRS is the only government body that has access to these records that are accurate and up to date. This is because the city government needs the most current tax records for their referral. The privacy advocates might argue that, the acquisition of information in this manner is unlawful. They will argue that it was a breach of security by the IRS, as they are not allowed to give out other people’s information without the person’s permission or knowledge. Computer matching should not be permitted because it leads to a compromise in the security of data. Organizations are given different types of information according to their functions, and if the can access information from other sources then it is considered a breach in security. This can also lead to data theft with intruders masquerading and accessing the information. Privacy and Security Privacy and security are closely related but differ their fundamental meaning. Privacy is more user oriented, it is determined by the user when he/she decides the kind of information they want to give out and where that information goes (Lessig, 1997). This is the privacy of information and it entirely dependent on the holder of the information. Security on the other hand is the belief held by the user that information will be kept safe. Securities are the measures taken to keep the user data safe. This is to prohibit unauthorized access from intruders. The level of security differs according to the sensitivity of the information held. References Cavalier, R. (2005). The Impact of the Internet on Our Moral Lives. Albany, NY: Suny Press. Edgar, S. (1997). Morality and Machines: Perspectives on Computer Ethics. Sudbury, MA: Jones and Bartlett. Forester, T., Morrison. (1993). Computer Ethics. Massachusetts: MIT Press. Johnson, G, D. (2000). Computer Ethics. New Jersey: Prentice Hall. J. van den Hoven., & Wecket, J. (2007). Moral Philosophy and Information Technology. Cambridge: Cambridge University Press. Lessig, L. (1997). Computer Ethics and Society. Oxford: Oxford Press. . Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Ethics Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Computer Ethics Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1449077-computer-ethics
(Computer Ethics Essay Example | Topics and Well Written Essays - 750 Words)
Computer Ethics Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1449077-computer-ethics.
“Computer Ethics Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1449077-computer-ethics.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Ethics Is a Fundamental Issue

Computer Security or Ethical Issue

This research paper "Computer Security or Ethical issue" shows that due to the amazing efficiency of a computer system, every business feels the need to utilize computer technology inside the business infrastructure to enhance its operational performance.... This paper discusses how computer security has become an important issue for companies.... Additionally, corporations utilize computer technologies in various disciplines such as for communication with other people through e-mail or chatting....
9 Pages (2250 words) Research Paper

Professional Ethics and Responsibilities in Computer Technology

The basic aim of this research is to discuss the importance and relevance of computer ethics in information technology.... The basic aim of this research is to discuss the importance and relevance of computer ethics in information technology.... This paper ''Professional ethics and Responsibilities in Computer Technology'' discusses the role of the professional ethics and responsibilities in computer technology.... This paper discusses the role of the professional ethics and responsibilities in computer technology....
6 Pages (1500 words) Literature review

Ethics in Healthcare: Stem Cell Research

Medical risks According to Lo & Parham, (2009), another ethical issue pertains to the medical risks associated with the process of retrieving the human body parts for the research purposes.... Additionally, some think that it is against religion and fundamental morals.... ethics in healthcare: Stem Cell Research Name: Instructor: Task: Date: Ethic in healthcare: Stem Cell Research Introduction The stem cell research can provide solutions concerning the development of human beings....
3 Pages (750 words) Case Study

Issues in Email Hacking

Levy (2010) identified sex tenets to exemplify the ethics of hacker; according to the first tenet, 'access to computers - and anything which might teach you about the way the world works- should be unlimited and total' (Levy, 2010, p.... ethics vary from one individual to another.... ethics cannot be completely defined by one individual so that a certain action can be deemed right or wrong.... The technology-savvy people can easily use the Internet to hack into the computer systems so that they can steal money, infect others' computers with viruses, and change the information in their private profiles....
9 Pages (2250 words) Essay

The Dynamics, Ethics and the Legal Aspect Associated with CCTV Surveillance

Electronic scrutiny and workplace surveillance are fundamental subjects of interest to scholars in a wide variety of disciplines, ranging from the deep-seated ones; such as sociology and the beliefs over specialized computer and information ethics to the applied topics such as in sequence systems.... The author of the paper titled "The Dynamics, ethics and the Legal Aspect Associated with CCTV Surveillance" tries to establish the reaction and perceptions of the general public towards CCTV with close scrutiny of the ethical, legal, and moral domains....
12 Pages (3000 words) Essay

Computer Ethics and Its Issues That Concern IT Professionals

21, 2006) Moreover, Baase's (2003) concept of ethics is as simple and as basic as "doing the right thing.... ince ethics is generally an extensive theme, philosophers break it into several branches that cater to the different aspects of life.... The role of man in the society, therefore, made ethics an important issue that needs to be given as much attention.... ne of the most basic and the most significant requirement of man is ethics....
12 Pages (3000 words) Essay

The Interaction of Modern Computer Technologies

otably, computer ethics is significant and interesting since computers play special roles in modern society.... Moor defines computer ethics as 'the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology' (1).... In absence of computer technology, we would not have computer ethics in society.... Indeed, computer ethics focuses on personal and societal policies for the ethical use of computer technology....
6 Pages (1500 words) Essay

Unethical Behavior in Information Technology and Information Systems

There is no specific category of computer ethics.... computer speed, unauthorized access to databases, information integrity and information confidentiality not considered adequately means that information technology and information system can be exposed to unethical practices.... Piracy in information technology or computer means reproduction, distribution or copying of software without permission of the owner of the copyright....
5 Pages (1250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us