Free

Ethics, Pirated Software and Spyware - Essay Example

Comments (0) Cite this document
Summary
An individual’s moral judgment remains the ethics’ primary concern. In business, decisions and recommendations are made by individuals on behalf of the…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful
Ethics, Pirated Software and Spyware
Read TextPreview

Extract of sample "Ethics, Pirated Software and Spyware"

Computer Sciences and Information Technology Ethics, Pirated Software, and Spyware What are ethics, and how do ethics apply to business?
Ethics can be defined as the principles that govern a groups or an individual’s actions in any given situation. An individual’s moral judgment remains the ethics’ primary concern. In business, decisions and recommendations are made by individuals on behalf of the organization that they represent. These people should be guided by the organization’s culture (Bredeson 65).
The decision to act ethically is a moral choice. Hence, employees should decide on the right course of action in any business engagement. Corporate social responsibility and ethics can bring a lot of benefits to the business. Benefits include attracting new employees, customers, investors and retaining the employees. Lack of ethical behavior and corporate social responsibility, can damage the firm’s reputation and cause a fall in profits and an eventual business close down.
What situation would qualify as an exception to the copyright law?
There are several cases that would be eligible for an exception to the law of copyright. One of such situations is when the work is in the public domain. The work in the public domain is not protected by the copyright law and can be used freely by anyone. Another instance is when there is assurance of fair use. This provision allows copyright materials to be used for research and educational purposes (Howe 265).
Other occasions may include the use of electronic reserves, libraries and archives, learning management systems like blackboards, and the application of the first scale doctrine. In the first scale doctrine, owners of legally obtained copyright material can dispose of them without the permission of the owner. However, this does not apply to music and software licenses. In music and software licenses, one has to be authorized so as to carry out a transaction.
What is spyware? Would this include key logging while at work?
Spyware can be defined as software and applications that take information about the user’s online activities and send them back to their creators. Spyware effects include pop-up ads and browser hijacking. More serious breaches include identity theft and key logging. Each piece of spyware acts differently depending on the information collected. Some gather information for the purpose of marketing while others have malicious intents.
Key logging applications monitor the user’s keystrokes and send the information a malicious recipient of the data. In the workplace, keystrokes may be directed to an administrator, who may just be monitoring the companys operations. Keylogging can happen through the email or other internet servers. There are three types of keylogging, hardware keyloggers, software hooking keyloggers, and driver key loggers. Key logging at workplaces is also considered as spyware; however, the intentions may not be malicious. Employers can activate Key logging so as to monitor their employees’ activities.
Works Cited
Bredeson, Dean. Applied Business Ethics: A Skills-Based Approach. Manson, OH: south-western
Cengage learning. 2012. Print.
Howe, Helena. Concepts of Property in Intellectual Property Law. Cambridge, UK: University
Printing House. 2013. Print Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ethics, Pirated Software and Spyware Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Ethics, Pirated Software and Spyware Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1678641-ethics-pirated-software-and-spyware
(Ethics, Pirated Software and Spyware Essay Example | Topics and Well Written Essays - 500 Words)
Ethics, Pirated Software and Spyware Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1678641-ethics-pirated-software-and-spyware.
“Ethics, Pirated Software and Spyware Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1678641-ethics-pirated-software-and-spyware.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Ethics, Pirated Software and Spyware

The Ethics Of Software Piracy

...ways, the initial is that they would not buy the computer software in any case and the next is that the label price is adjusted to financial credit for piracy. The justification “I would not have purchased it anyhow” is definitely the strongest we are able to present to recognize this type of piracy as ethical. If we would not have paid for the pirated software, it does not mean that we are harming anyone. But, in fact we are utilizing software of which capital belongs to the persons who spent their time and effort to develop that software. Thus, the corporations should charge fee for offering them with the product to utilize. On the...
6 Pages(1500 words)Research Paper

Spyware and Adware

...? Spyware and Adware Task A spyware is malicious software that gets installed on a computer without the prior knowledge of the owner. This software gets access to all the personal information about the user without his knowledge. The presence of the spyware on the computer cannot be detected by the user and is installed on the computer secretly. Spywares can be very lethal for a user as it can get access to any of your information like your personal details, account information, etc. They can enter the computer through ports or by downloading freeware software or any game from the internet (Michael 2010). For the safe...
4 Pages(1000 words)Essay

Spyware and Implementing Network Security

...their software and make it ever more stealthy and sticky. Additionally, the stakes are even higher if the attacker can steal credit card or bank account information. What we've seen in the past three years is the growth of a spyware industry that spins off millions of dollars. That money is often folded back into research and development for more malicious attacks. This R&D funding makes their software even more powerful and will continue to do so for the foreseeable future. As spyware continues to threaten the stability of corporate infrastructures, it's crucial to understand how this malicious software works and how to defend against it. This...
22 Pages(5500 words)Essay

Business Ethics on Software Piracy

...a small "donation" in good faith. As more and more users are switching to these free downloads, the situation is slowly becoming a serious business ethics issue that is both awkward and tricky to address. Existing piracy laws are lackadaisical at best, and only target users on a large scale. But for the small business, the prospect of saving a couple thousand dollars for relevant office software is quite appealing. - more so if the likelihood of getting caught is next to nil. Given the relative ease that one can download illicit software online, the morality and ethics of the matter comes into the forefront. Armed with the fact that some full-scale business in such...
3 Pages(750 words)Assignment

Spyware in the Enterprise

...Spyware in the Enterprise Executive Summary Spyware is presently one of the major security concerns facing the enterprise. This business report is part of our company's strategy to address the issues caused by spyware. Its purpose is to provide employees with basic information on spyware and the possible solutions to eradicate the problem. The report reviews in detail the causes and consequences of the widespread nature of the spyware phenomena; it outlines the implications it carries on a direct and indirect outlook. Spyware is widely defined as a software tool for which the primary function is the retrieval of personal...
7 Pages(1750 words)Essay

Pirated Software

...Running Head: PIRATED SOFTWARE Pirated Software in APA Format by The rapid technological developmentacross continents gives rise to new problems and issues which were not previously encountered. As the use of computer necessitates the installation of costly software, some people resort to using counterfeit software in order to save money. Software piracy is now a major issue in this technologically advanced world because of the extensive usage of pirated software especially in developing countries where illegal practices are not closely monitored and users have low purchasing power making...
2 Pages(500 words)Essay

Spyware

...bank account has been hacked by a smart hacker, after tracking the data from your computer system, he can transfer millions from your account into his account in just a few seconds. To your nightmare, it does not end here. He can sell the vital information, related to your company’s strategy and stored in your system, to the competitor and since the information has been leaked from your system, it will be only you who end up in a jail after losing all the money. All that has been said above is very much plausible and the softwares that are programmed by the hackers to perform all this are called Spywares. Spywares are programmed to obtain the data stored on our computer, and...
9 Pages(2250 words)Lab Report

Software

...ID # Software Ethics Software ethics is about the ethical compliance of the computer and software usage. It is all about being honorable and to follow software ethics those are established through a set of moral rules/principles. Without a doubt, copying software illegally is against the law as well as a violation of software ethics. The software copyright rules defend software authors and developers, similarly as investors are protected by the patent law (National Academy of Engineering; Shelly, Cashman and Vermaat). In...
2 Pages(500 words)Essay

Spyware and Viruses

...the release of the malware and the time they prepare and upload the hash to the security software. Understanding spyware Apart from the matters of privacy and ethics, spyware steals from the computer user by using the memory resources of the computer as well as consuming bandwith when sending information back to the home base of the spyware through the internet connection of the user (Feinstein, 2004). Since the spyware is using memory together with the resources of the system, the applications that run in the background can also result the crashing of the system or even its instability. Since spyware are existing as...
17 Pages(4250 words)Term Paper

Spyware

...by installing and using unconventional browsers that are not besieged by spyware and by using the PAC (Proxy Automatic Configuration) or Windows Hosts File in a browser that obstruct contact to spyware containing websites (Sipior, Ward, & Roselli, 2005; Loibl, 2005). Vigilance Watchfulness while using the internet can be a useful defensive approach. The user must pay attention to the files being downloaded or the software being installed. The user must have a cautious look on the EULA before installing any software. It is also an ethical responsibility according to the “click wrap” agreement to disclose the file that contains spyware...
10 Pages(2500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Ethics, Pirated Software and Spyware for FREE!

Contact Us