Ethical use of information technology - Article Example

Comments (0) Cite this document
The twenty-seven years, Ryan Ackroyd, stood with his heart pounding in the center of Sheffield Hallam University Auditorium, in front of the students (Chellel 1). Having occupations of a student at present and previously a computer hacker, Ackroyd managed to gather all his…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful
Ethical use of information technology
Read TextPreview

Extract of sample "Ethical use of information technology"

Article Summary The twenty-seven years, Ryan Ackroyd, stood with his heart pounding in the center of Sheffield Hallam University Auditorium, in front of the students (Chellel 1). Having occupations of a student at present and previously a computer hacker, Ackroyd managed to gather all his courage when he spoke to them about his unethical activities related to Information Technology.
Ackroyd was sentenced prison in 2013, along with his three group mates for two and a half year. They were found guilty of the charges of cracking the security of the websites of Sony Corporation, U.S. Federal Intelligence Organization and for shattering the integrity and privacy of the U.S. Air Force website (Chellel 1). In May 2013, they were jailed as these reputable organizations suffered with hefty losses of reputation and money due to these hackers.
In jail, Ackroyd was truly guilty and felt extremely embarrassed for what he did and how badly he used his gifted skills (Chellel 1). He decided to correct all his mistakes when he gets out of jail, and use his natural blessing of ability to hack for the goodwill of his nation and people. But, he was still doubtful if life would give him another chance and he would get any opportunity to be a part of the respectable society and study further, ever.
Ackroyd’s imprisonment period was shortened to nine months. When he was released out of jail in February, his good intentions helped him and he succeeded in getting admission at Sheffield Hallam for a Masters qualification in the field of Information Systems Security (Chellel 1). It was not late after, when he again got a big chance to prove his skills, but now for a good purpose. His role became active when companies direly demanded ethical hacking, due to flooding in of cyber security. Companies lacked the immediate expertise required to protect their business from drowning in the floods of cyber security.
LulzSec’s hacking activities against Pay Pal and Mastercard Inc. were observed at a hype when they rejected WikiLeaks to operate for their payments from their platform. These companies got highly alert when Wikileaks dispatched all military confidential information. LelzSec’s members conducted their activity by recording FBI conversations, uploading all secret info and false claims on YouTube. They became a great threat for the nation. Ackroyd has a heroic role in this act. Server obstacles and hidden patterns were always a thrill for Ackroyd (Chellel 1). With his nature of taking the hidden as a challenge and going deep down, Ackroyd succeeded in putting a full stop to the acts of corruption of LulzSec. Bloomberg news has revealed that Wall Street Banks are paying more than double now to ethical computer hacking specialists for their security reservations.
Works Cited
Chellel, Kit. Laughing Hacker Who Hit Sony, FBI Now Seeks Legal Lols. Bloomberg. N.p., 2014. Web. 1 Dec. 2014. Read More
Cite this document
  • APA
  • MLA
(“Ethical use of information technology Article Example | Topics and Well Written Essays - 250 words”, n.d.)
Ethical use of information technology Article Example | Topics and Well Written Essays - 250 words. Retrieved from
(Ethical Use of Information Technology Article Example | Topics and Well Written Essays - 250 Words)
Ethical Use of Information Technology Article Example | Topics and Well Written Essays - 250 Words.
“Ethical Use of Information Technology Article Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Ethical use of information technology

Information Technology: Use in the Education Sector

... Module Information Technology: Use in the Education Sector My Client: The Education Sector Role of the Sector The education sector is the agent of society that has the responsibility of giving knowledge to the younger generations to prepare them to deal with the challenges of the future. The sector must have sustainable means of offering knowledge to do so, which are in line with current technological developments, but economical at the same time. Scanning Levels: 1. Sector foresight: With the current technological developments, and the availability of cheap information technology tools, every sector in society wants to take advantage of the efficiency and effectiveness that come with the use of these tools. The education sector... is no...
6 Pages(1500 words)Research Paper

Use of Information technology in education

...?The Conceptualization of the Problem Introduction There are several benefits that can be obtained from the use of Information technology in education presently. Generally, when we talk about IT we simply mean computers together with their networks; however, in this instance, we also mean some other technologies that help in moving information around from one region or place to another. While most academic institutions have their own systems and databases, there is a huge lake of linking these institutions which make it as islands of automation. This is because most of academic institutions often purchase systems to address its internal needs (Forman, 2002). Consequently, the academic institutions provide physical evidence of our... ...
22 Pages(5500 words)Essay

Privacy Laws related to Information Technology use

...? Privacy Laws in IT use Privacy Laws in IT use All individuals are en d to privacy of private information and protection from unauthorized access and use of private data (Canoni, 2004). The contemporary business environment is characterized by application of information and communication technology and the use of internet in the communication process. The applicable technologies have challenges related to the effective protection of individual private information and data. The digital world makes people to provide private data and information to various organizations...
3 Pages(750 words)Research Paper

Information Use

...? Information Use Paper Information Use Paper Information system is a vital part of any business/organizational management. Notably,information is an indispensable tool that facilitates crucial decision-making processes within organizations’ managers. The information used in organizations takes the form of management information system. Information in organizations is usually well co-ordinated within the organization’s database providing management with the information they need for planning and making decisions (Rich, 2010). The modern...
3 Pages(750 words)Essay

Ethical Issues of Information Technology, the new technology radically reshapes life styles, at the same time creates challenges in the areas of privacy, property, security and individual identity (Information systems, 2007). The following discussion covers issues in consumer or online privacy, copyright, patents, trademarks, trade secrets, legal jurisdiction, and online contracting that manifest in the field of information technology. The details come in the form of definitions and philosophical reflections or historical events elucidating the issue. The paper then ends with a note on probabilities for the future. Computer and information technology may be...
10 Pages(2500 words)Essay

Ethical Issues within Information Technology

...Ethical Issues within Information Technology Ethical issues within information technology can be defined as a frame work which considers moral issuesconcerning use of information and its privacy. Information technology is facing some serious ethical challenges. The five ethical issues within information technology are privacy, security, ownership, control and accuracy. Information technology helps to find and share relevant information online but it...
2 Pages(500 words)Essay

Ethical use of information

...Ethical Use of Information al affiliation Patients have a right to privacy and confidentiality. Patients should be provided for competent and medical care with compassion and respect by physicians and other medical practitioners should provide medical care. Patients’ information should be protected from unnecessary access and inappropriate disclosure. Use of medical information other than to provide them with care and treatment is unethical, unprofessional and illegal. In case there is suspected unethical use of patient information, one must try to find out whether the physician has acted out...
1 Pages(250 words)Essay

Safe use of Health Information Technology

...Safe use of Health Information Technology Safe use of Health Information Technology The human-computer interface is the most common cause of health sentinel IT events. Inability to use systems as designed creates numerous difficulties for employees; this is especially prevalent in settings where systems are regularly remodeled. Depending on how efficient individual employees are, health sentinel IT events can be ubiquitous or rare, resulting in high or low incidences of data-related errors. Workflow and communication are also influential in the emergence of health IT sentinel events (The Joint Commission, 2015). An effective health IT framework requires a sound support system to facilitate teamwork and communication. Poor workflow... of...
1 Pages(250 words)Research Paper

Ethical Issues in Health Information Technology

...Disclosing a patient’s confidential information without the proper procedure is wrong, and the employee may face the full force of the law. However, to minimize the risk that comes with disclosing confidential information the following procedures should be followed. First, the patient should be told the consequences or harm that may come with disclosing the information so be aware of them. Second, appropriate consent of the patient and the health care institution should be provided before disclosing confidential information. Additionally, confidential information can be disclosed without the patient’s consent when the law mandates or permits the...
1 Pages(250 words)Essay

Whether the Use of Technology by Marketers to Gather Information about Customers is Ethical or Unethical

...Marketing WHETHER THE USE OF TECHNOLOGY BY MARKETERS TO GATHER INFORMATION ABOUT S IS ETHICAL OR UNETHICAL Introduction Marketing strategies are changing with greater use of the Internet which is now the centre of increasing business activity. Personalized marketing is made possible by tracking the customer, recording his or her preferences and inclinations, and presenting the customer with products that they are most likely to buy. There is a shift away from business based on generalizations and estimates of the average requirements of customers, to a system of one-on-one trade activities. The change in the dynamics of business activities is due to the...
17 Pages(4250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Article on topic Ethical use of information technology for FREE!

Contact Us