StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

IT in Ethical Discourse - Essay Example

Summary
The essay "IT in Ethical Discourse" focuses on the critical analysis of the main issues of Information Technology in the ethical discourse. Information Technology is transforming societies while fueling global economic growth since the world has grown increasingly hyper-connected…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful

Extract of sample "IT in Ethical Discourse"

Student Name: Tutor: Title: Essay Course: Introduction Information technology is transforming societies while fueling the global economy growth. In the past several years, the world has grown increasingly hyper-connected. The global environment today where internet as well as its related services are immediate and accessible, where businesses and people can communicate between themselves instantly, and where more often than not machines are interconnected with one another. The appropriate place of technology in the society is beyond an aspect of art than science (Apel, 2001). An environment that is often conscious of the place of technology not only uses technology for a better comprehension of society and their needs, but can also apply technology itself to safeguard the perpetuity of knowledge. This perceived hyper-connectivity is grossly redesigning relationships between consumers, individuals, and enterprises, and government and citizens; it is bringing forth new opportunities but also precipitating unprecedented challenges as well as risks in terms of individual privacy and rights, cybercrime, security, access to information, and the flow of personal data. There is no doubt that Information Technology has revolutionalized culture, society and communication at global front. Therefore, governments all over the world have collaborated to come up with elaborate laws regarding the application of Information Technology (Beschorner, 2006). Computer professionals have to adhere to this laws to make the use of Information Technology be considered ethical. However, this is not always the case. It is from this perspective that this essay explores ethical dimensions of Information Technology considering the enacted laws and regulations. I argue that is difficult to achieve a middle ground that will be regarded as ethical considering the proliferation of governing laws and regulations in different parts of the world. Information Technology and Ethical discourse The supremacy of information technologies has occasioned the necessary evil of information overflow that can sometimes be at odds with democratic freedom and values cherished by individuals (Bynum, 2008). Consequently in any democracy, it is paramount to start a discourse that offers ethical guidance to public managers with regard to these democratic values. Human dignity, individual privacy and rights have to be respected despite the urge to increase connectivity and open up economies using the ever advancing Information Technology (Broadhurst, 2002). Digital convergence and globalization in the growing knowledge society has raised complex societal, legal and ethical issues. There are difficult and complex challenges concerning the access to information, freedom of expression, intellectual property rights, the right to privacy, as well as cultural diversity. All human beings should be granted basic rights regardless of gathering of knowledge and information using Information Technology. Within countries and beyond national boundaries rights that are legally recognized are being trampled on in the name of political stability, economic advancement, the campaign against terrorists, religious causes, or for personal interests and greed. Violations of such rights have occasioned new challenges in human social systems like digital divide, digital privacy and security concerns, cybercrime, all of which have one way or another affected the lives of people either indirectly or directly. Incidences of malicious attacks of integrity, confidentiality, and availability of electronic systems and data, computer related crimes like fraud and forgery, child pornography and violation of intellectual property rights are very common (Bryneson, 2002). Furthermore, threats to important infrastructure as well as national interest arising from the use of the internet for terrorist and criminal activities have become a growing concern since the September 11 attacks in the United States of America. The responsibility of solving emerging challenges due to increased interconnectivity lies with all stakeholders who include individuals, governments, professional organizations, consumers and the society at large. In order to realize solution it is crucial for all voices of relevant stakeholders to be heard. The issue of litigation in the case of breach of contracts and set laws and regulations has to occur across national or state boundaries. Professionals have to take responsibility for any kind of information on the Web and how misdirecting it can be to some clients hence encourage professionals to highlight the correct information to discourage cybercrime. The Web has diversity of information that can be confusing to potential users (Broadhurst, 2002). Therefore, service providers have to offer guided tours of the information they are providing besides links to Web sites. Standards of practice have to be observed when it comes to internet use and sharing of information. Access of information that is protected without a valid license is unethical and a breach of set rules, laws and regulations and it is considered intrusion and the perpetrator should be viable for prosecution. Technology failures have given changes to cyber criminals to privy on private information and use it to commit crime. The harm to governments, businesses, as well as individuals in nations where the internet is used widely, is increasing in scope and importance, whereas in other countries, cybercrimes is a threat to the application of communication and information technology, the anonymity of these technologies, and the communication network’s transnational nature. Few countries have put in place regulatory and legal frameworks to deal with such challenges. Despite growing awareness and cases adequate legislation, the ability to utilize information security technologies, as well as related procedures together with protecting against, detecting and responding efficiently and effectively, to cybercrime is still low (Bryneson, 2002). Cyber crime is one of the global challenges that are a threat to all economies and countries. Since it is a crime which is committed across national boundaries, it calls for pro-active approaches to help countries that are less developed. User cyber systems are free to leave or join any systems whose rules they find uncomfortable or comfortable. This situation is occasioned by different rules in the globe governing the behavior of users. More often than not conflict of interests occurs. Computer-based and internet communications and commerce cut across territorial boundaries hence occasioning a new degree human activities while undermining the legitimacy and feasibility of applying laws using geographical boundaries. Boundaries are manifested in the firewalls, monitor screens, intruder detection, passwords and virus busters hence creating new groups, personalities, and other organizations in the new environment (Bynum, 2008). Traditional border-based law enforcing and making authorities find the new environment to be very challenging. Cyber systems across national borders possess differing rules that govern the behavior of users hence creating challenges despite the flexibility. The flexibility can encourage improper conduct on the part of the user. Inadequate legal framework may make it challenging for System Administrators to check on vandalism, frauds, as well as other abuses that cause the lives of other users to be miserable. This trend is alarming since any iota of distrust for the internet may cause people to avoid doing transactions online hence adversely affecting e-commerce (Beschorner, 2006). The misuse or use of the internet as a means of communication can sometimes lead to actual damage to the physical society. Not levying taxes on online transactions will have destructive effect on government revenues and physical businesses. Computer professionals have to be compelled to follow ethical guidelines relating to the use of Information Technology. It should be the collective responsibility of governments and businesses across national boundaries that have to ensure laid down rules and regulations are followed and adhered to strictly. Stiff penalties and punitive fines have to be leveled against perpetrators of cyber crimes to discourage others from attempting the same trade (Bynum, 2008). Digital convergence has to make life better instead of increasing risks of fraud and malicious damage to unsuspecting users. There are many challenges that hinder ethical application of Information Technology but enacting of universal laws and regulations that cut across national boundaries is important to its success. Conclusion Information Technology has enhanced communication and reduced the world to a global village. However, it has come with its own share of challenges that put users to risk and gives room to perpetrators of cyber crimes to get away scot free following the flexibility created by the different regimes of laws governing cyber systems. The connectivity boundaries are not enough to secure users privacy, security and confidentiality. It is important for countries to work together under an international body to fine tune laws that will lead to apprehension of perpetrators of cyber crimes. Universal laws that will govern privacy, confidentiality, security and define intrusion are needed to secure the loopholes that cyber criminals take advantage of because of different law regimes. Governments have to liaise with businesses across national boundaries in order to assure users of the safety while engaging in e-commerce and other transaction online. Inasmuch as Information Technology has improved the quality of life, its vulnerability to abuse is hurting many innocent users who would love a quiet life. Establishing an ethical ground of operation should be the goal of national and state governments globally. All in all, information technology has enhanced communication and accessibility of information apart from defining the level of economic growth. References Apel, K.O. 2001. The Response of Discourse Ethics, Leuven: Peeters. Beschorner, T. 2006. "Ethical theory and business practices: The case of discourse ethics," Journal of Business Ethics (66), pp. 127-139. Broadhurst, R. 2002. E-commerce & Cybercrime: issues, problems & prevention. Asia-Pacific Conference on Cybercrime and Information Security, Seoul, Republic of Korea, 11-13 November 2002. Bryneson, M. 2002, Sexual exploitation on the Internet: Asia-Pacific Conference on Cybercrime and Information Security, 10-12 November 2002, Seoul, Republic of Korea. Bynum, T. 2008. "Milestones in the history of information and computer ethics," in The Handbook of Information and Computer Ethics, K. Himma and H. Tavani (eds.), New Jersey: Wiley, pp. 25-48. Read More
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us