StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Ethical Issue in Information Technology - Term Paper Example

Cite this document
Summary
This paper, Ethical Issue in Information Technology, stresses that the term information ethics refers to the discipline of applies ethics developed by Luciano Floridi. In his theory of information ethics, he asserted that information ethics should be included under the umbrella of computer ethics. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.7% of users find it useful
Ethical Issue in Information Technology
Read Text Preview

Extract of sample "Ethical Issue in Information Technology"

According to the Webster’s dictionary, ethics are; “the body of moral principles or values governing or distinctive of a particular culture or group”. Ethics in information technology is no different than this definition. The history of this branch of ethics dates back to few decades back. Walter Maner, in 1976, categorized information ethics as “wholly new ethics problems that would not have existed if computers had not been invented. With this, he proposed a new branch of applied ethics as “computer ethics”. Then new field, according to him, should deal with the ethical issues provoked by the computers. The term information ethics refers to the discipline of applies ethics developed by Luciano Floridi (Floridi, 1999). In his theory of information ethics, he asserted that information ethics should be included under the umbrella of computer ethics. He argued that his concept of information ethics intends to supplement the already existing theories like utilitarianism, contractualism etc. This area of ethics examines the concerns arising in the modern world due to the constant development of information technology. It is related to the fields of computer ethics and philosophy of information. The present “information society” is facing the escalating dilemmas about the life of information. Globalization and digital congregation of the world has exposed the mankind to the intricate ethical, social and societal issues. The humanity is confronting the crucial issues like access to information, privacy, intellectual property rights etc. Ethical issue in information technology Following is the detailed account of the subjects inside the sphere of information ethics. Intellectual property rights Intellectual property is the term used to describe the work of a person or firm created or owned by it. Certain laws have been formed to protect the intellectual property. For example, copyright law (protects authored works), patent laws (protects inventions), Trade secret laws (help safeguard information critical to an organization’s success) etc. (Elrod, 2005)Despite all these law enforcements, practices such as plagiarism and illegal downloads of software and other materials have greatly increased the threats to the intellectual properties. Annually, software worth million dollars are downloaded illegally, causing an immense setback to the software industry across the globe. The software industries, both international and locals, need the support of the customers to flourish. Otherwise, the innovation and invention in information technology will cease. Freedom of speech: Under the cover of freedom of speech, a dozen unethical practices have emerged because of the misuse of IT. The issues of pornography, libel, censorship, cyber harassment etc. not only affect the individuals but also de-frame the societies on moral and ethical grounds. (Gotterbarn, 2001) Digital divide: The use of computers and particularly information technology has become essential for our lives. But this immense use of IT has created a distinction between rich and the poor of societies. This widened gap is called as “digital divide”, is indirectly responsible for the knowledge divide, as lack of access is translated into lack of knowledge. (Burks, 2001) Globally, in the areas where there is limited or no access to the information technology, education suffers thus preventing the individuals to be the effective participants to the global economy and welfare. (Young, 2001) Privacy The privacy of the participants, be them individuals, groups or corporations, is dramatically affected. Online behaviors and activities are not secure and can be revealed uncontrollably. The computer or the system when connected to the internet becomes a betrayer as is prone to several irresistible and unseen threats. (LITAN, 1998)Currently, no hard and fast rules or standards are present, for the control and usage of the personal or private information, which can make the cyberspace a safe place Unemployment Another direct or indirect effect of increased reliance on information technology is unemployment. Computer systems have replaced humans and digital libraries have substituted libraries, thus making several people unemployed. Automation has distinctively purged some positions and introduced others. Cyber crimes Cyber crimes include all misconduct that involves network and a system, without the instrumentality of the computer in the conduction of the crime. (wall, 2001). Particular issues (for example hacking, pornography, viruses, copyright violation etc.) regarding cyber crimes have gained popularity since the past decade. Issues regarding privacy and loss of private information have also their origins in cyber criminal activities. Cyber crimes and law enforcements With the increased spread of information technology, criminal activities at individual, group and state level have also increased. These activities include information theft, espionage, cyber warfare etc. The increasing trend of illicit cyber activities have emerged as a threat to various nations and the issue has started grabbing interest. At present, the on hand laws do not deal with the cyber crimes. This unavailability of proper laws is translated to the reliance on technological means for prohibiting steal, unauthorized access and destruction of information. Internationally however, this issue is being addressed by international criminal court. The virtual complements of the existing laws, regarding theft, intrusion etc., need to be implemented by the governments. Clearly, a huge amount of work is needed to ensure the security and privacy of the information available at cyber space, where a criminal would have to think twice before attacking valued systems. (Ophart, 2010) Cyber crimes are different from the physical ones in their virtual and transnational nature, which greatly intricates the enforcement of laws. Lawbreakers can pass the boundaries between the countries by designing a scheme to attack any computer in the world or by devising an attack as a citizen of any other country of the world. The adoption of such practices makes the infliction of laws highly complex. (McQuade, 2006) Types of cyber crimes Peter Grabosky (Peter Grabosky, 1998) in his book crime in the digital age has classified the cyber crimes into the following categories: 1. Theft of telecommunication services: The category involves the phone calls made by gaining access to the telephone switchboard of the organization or the individual. Other techniques such as calling card theft, reprogramming of the calling cards etc. are also included in this category. 2. Use of communication for criminal conspiracies: Like registered and legal organizations, activities of criminal organizations have also been facilitated by the information technology. The use of computer and network resources for the distribution of child pornographed material has been witnessed. Empirical evidence regarding the use of information technology as a mean to asses drug trafficking and money laundering are also present. 3. Piracy: With the increased advent of information technology, the reproduction of copyrighted materials has become extraordinarily easy. This pirated material can be used, sold at lower prices or for free by the individuals. This has not only increased the threat to the software industry but also has revoked the concern in government bodies. When the creators do not benefit from their creations, their creativity will be greatly masked. 4. Distribution of offensive materials: There is excessive content on the cyberspace that is objectionable by certain groups of people. This offensive content includes racial misinformation, sexually explicit materials etc. telecommunication systems and line can be used for harassment or threatening. Computer networks may also be used in furtherance of extortion. The Sunday Times (London) reported in 1996 that over 40 financial institutions in Britain and the United States had been attacked electronically over the previous three years. 5. Electronic money laundering and tax evasion: Electronic funds transfer has on one hand assisted the customers of the banks but on the other hand given rise to several crimes regarding the technique. Similarly huge amount of legal income has been window dressed by the implication of such techniques and with the use of information technology. 6. Electronic vandalism and extortion: Western trade and economy relies heavily on the telecommunication and information systems. Damage to, or interference with, any of these systems can lead to catastrophic consequences. (Hundley and Anderson 1995, Schwartau 1994). Hacking of several web pages and personal accounts of people has made them suffer a lot. Furthermore, governments and defense ministries of several countries are allocating special budgets for information warfare. 7. Sales and investment fraud: This category includes all kinds of pyramid, low risk investment schemes, telephone lotteries, sale or purchase of several items which do not exist in reality etc. Information technology bloom has provided such criminals with a bulk of target victims. 8. Programming criminal softwares: This category includes all kinds of softwares that are aimed at harming a software or hardware of the others’ system. Numerous viruses are prepared and disseminated all over the world by these evil geniuses. Several important information is lost due to these viruses. Bibliography Burks, M. R. (2001). Economic factors involved with universal internet access and people with special needs hi- a working paper. internet fiesta . Elrod, E. (2005). information ethics. encyclopedia of science, technology and ethics . Floridi, L. (1999). ethics and information technology. Gotterbarn. (2001). information and professional responsibility . sceince and engineering ethics . LITAN, P. P. (1998). None of your business:world data flows. electronic commerce and the eurpean privacy directive . McQuade. (2006). Understanding and anaging cybercrimes. boston: Allyn and Bacon. Ophart, J. A. (2010). Cyber warefare and the crime of aggression : the need for individual accountability in tomorrows battlefield. duke law and technology review . Peter Grabosky, R. S. (1998). Crime in a digital age. Sydney: Sydney federaton press. wall, d. (2001). crime and the internet. Young, J. (2001). Does 'Digital Divide' Rhetoric Do More Harm Than Good? The Chronicle of Higher Education . Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Ethical Issue in Information Technology Term Paper, n.d.)
Ethical Issue in Information Technology Term Paper. Retrieved from https://studentshare.org/information-technology/1738825-information-technology-ethics
(Ethical Issue in Information Technology Term Paper)
Ethical Issue in Information Technology Term Paper. https://studentshare.org/information-technology/1738825-information-technology-ethics.
“Ethical Issue in Information Technology Term Paper”, n.d. https://studentshare.org/information-technology/1738825-information-technology-ethics.
  • Cited: 1 times

CHECK THESE SAMPLES OF Ethical Issue in Information Technology

National Initiative for Cyber Security Education

hellip; NICE According to Scarfone (2009), NICE is regarded as a national initiative with the main objective or aim of developing and augmenting mien of cyber security through fast-tracking or hastening the obtainability and accessibility of edification as well as teaching materials and equipment geared towards enhancement and mending of conduct, expertise, and information awareness in regard to cyber matters.... Importance of NICE framework Based on the ever growing use of the internet, there has been the need of knowledgeable and talented individuals to protect, safeguard, as well as preserve various information structures set up and implemented within the country....
3 Pages (750 words) Assignment

Professional Ethics

thical Discussion:The major ethical issue in this case is unethical access to computers with the aim of blackmailing young girls into submission.... He was sentenced to 10 years in prison when he was found guilty of unethical access to computers of young girls who were subjected to emotional torture and trauma because of the information the pedophile had gathered from their computers.... Thus adolescents and children become an easier target for pedophiles who can then misuse the information gathered and can cause serious emotional and even physical danger to their hapless victims....
5 Pages (1250 words) Essay

Ethics in Information System

technology has made our lives easier but we do not understand that this technology is not to favor ‘us' only but it is for everyone (Warren, M.... The technology is not for us to misuse.... Taking someone else's right in the name of technology is not justified.... Ethical issues like these are very common in the realm of information Systems.... The ethical issues involved here is stealing and piracy....
4 Pages (1000 words) Research Paper

Organizational behavior

the theory emphasizes various approaches that can enable one determine an outcome following a particular course, inform one of his duties… The proliferation of information technology by the use of computers has, however, threatened to a large extent the effectiveness of ethics as outlined in the ethical theory. Many Outline 0.... The proliferation of information technology by the use of computers has, however, threatened to a large extent the effectiveness of ethics as outlined in the ethical theory....
2 Pages (500 words) Article

Intellectual Property Issue

Trends and Issues in Instructional Design and technology (3rd Ed.... This information should be the deal breaker of the bad habits the students have acquired.... Joel can engage the class in ethical discussion and even guide them to bring up the issue of plagiarism and the effects is can bring to not only one's personal life but professional one as well as it is… Joel should explain in detail to the class without making any accusations to the students directly about the negative effects that can befall an individual once their work is realized to have been “borrowed” from elsewhere especially the Intellectual Property issue Affiliation: The best way is to bring up the issue under the discussion of ethics....
1 Pages (250 words) Essay

An Ethical Approach towards Developing the Student Workload Project

The ethical issues may also involve the role of the developer of the system concerning the objective of the information technology system.... As the paper outlines, the ethical issues may also involve the role of the developer of the system concerning the objective of the information technology system.... The following analysis aims to identify the ethical issues surrounding a class project concerning intellectual property and reliability of the project....
10 Pages (2500 words) Essay

An Ethical Approach towards Developing the Student Workload Tracker Project

Nevertheless, the technological environment created by the development of information technology systems has been confronted by a lot of ethical issues.... Ethical issues with regard to information technology systems have taken different dimensions because not only do the ethical issues arise due to the emergence of technology but also due to the implementation by the users.... Moreover, the ethical issues may also involve the role of the developer of the system concerning the objective of the information technology system....
9 Pages (2250 words) Essay

Ethical Issues in Health Information Technology

Furthermore, ethical awareness, decision-making skills, and knowledge are also Ethical issues in health information technology affiliation Ethical issues in health information technology Task In the administrative medical care background, there is an incessant presence of moral issues entrenched in daily activities.... Ethical and legal issues in the use of health information technology to improve patient safety.... With the development of information systems, one ethical or moral concern that repeatedly presents itself to the administrator is the informationinformation confidentiality refers to what is privileged, secret or private....
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us