We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Information Technology Ethics - Term Paper Example

Comments (0) Cite this document
Information Technology Ethics Date Information Technology Ethics Information technology presents a plethora of opportunities and challenges. The world today is reaping the benefits of information technology, specifically that of internet technology…
Download full paperFile format: .doc, available for editing
Polish This Essay93.4% of users find it useful
Information Technology Ethics
Read TextPreview

Extract of sample
"Information Technology Ethics"

Download file to see previous pages Cyber crimes are here to stay. As Price stated, “As the number of computer owners connected to the internet increases, so too does the opportunity for cyber crime” (Price, 2010). Chantler in his review of the book, “The Reality of the Threat” by Nigel Phair (2007) cited Phair’s description of the different cyber crimes (Chantler, 2007). Phair noted (as cited by Chantler 2007) that cyber crimes can be broadly divided into seven groups namely: 1) unwanted software; 2) identity crime; 3) phishing; 4) critical infrastructure protection; 5) intellectual property; 6) communications; and 7) terrorism (Chantler, 2007). Hacking activities, spyware, adware, cookies, Trojans, spams and viruses fall under unwanted software. Unwanted software may be found either outside or within the organization. The second and third types of cyber crime, identity crime and phishing, deal with proof of identity, authentication of internet users and the tools used to get information. Chantler goes on further to cite Phair’s description of the other divisions of cyber crimes (2007). Critical infrastructure protection crimes are the crimes which involve the destruction of the information structures such as telecommunications and computer networks. On the other hand, crimes on intellectual property are concerned with software piracy. Cyber crime on communications is another form of cyber crime which gets much attention from organizations. These type of crimes include risks and threats on “wireless devices, VoIP (voice-over-internet protocol) - such as Skype and Google-talk, third generation phone systems, issues with caller ID, clipping, v-bombing, sim boxing, internet dumping, PABX hacking, phoneline scanning, voicemail, cloning, Bluetooth, RFID” and issues on privacy (Chantler, 2007). Like any other group of society, terrorists have also resorted to digital technology in carrying out their activities. They use cyber space to commit crimes such as information warfare and distributed denial of service attacks (ddos) (Chantler, 2007). One of the most common crimes which Chantler failed to mention is cyber bullying. Over the years, there has been a proliferation of cyber bullying crimes worldwide. Cyber bullying is “bullying through email, instant messaging (IMing), chat room exchanges, Web site posts, or digital messages or images send to a cellular phone or personal digital assistant (PDA)” (Hazelden Foundation, n.d.). Cyber bullying involves online harassment which has become more severe through the years sometimes even the cause of some suicides among teenagers. Electronic Monitoring of Employees One of the offshoots of the advancement in information technology is the growth in the extent of workplace monitoring in several companies. Software such as Websense, SurfControl, SmartFilter and Xora have sprung up as corporations saw the need to monitor employees in the workplace. These software make it easy for management to monitor the computer, internet or email use of the employees. A software like Xora can even go as far as monitoring an employee’s whereabouts through GPS technology on their company’s mobile phones (Dell & Cullen, 2006). According to sellers of Web and email monitoring software, employee productivity, corporate liability and bandwidth limitations are the major reasons why workplace monitoring is implemented by corporations (Lemos, 2001). In a study by the American Management Association and the ePolicy Institute, it was revealed that 76% of employers ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Information Technology Ethics Term Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/management/1441107-information-technology-ethics
(Information Technology Ethics Term Paper Example | Topics and Well Written Essays - 1000 Words)
“Information Technology Ethics Term Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/management/1441107-information-technology-ethics.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Information technology
As a first step, she invites you to write a short statement where you describe what you see to be your role as head of the IT management effort at Magnum. The role of an Information Technology (IT) Manager varies with respect to the company; therefore, the IT Manager can be responsible for diverse areas of the information technology.
20 Pages(5000 words)Term Paper
Ethics In Information Technology
Today, computers have been applied in varied disciplines including medicine in the field of embryonic stem cell research. Stem cell research has been the most remarkable latest advances in medical research. There have been a great debate relating to the ethical perspective of carrying out the stem cell research.
3 Pages(750 words)Research Paper
General Dynamics Information Technology Managerial Economics
In studying the various aspects and the strategies of the organization the pros and cons have been highlighted and respective suggestions have been provided have a clear understanding of the managerial economics point of view. The paper also focuses on the agency problem of the organization to point out the limitation in the strategy of the organization.
8 Pages(2000 words)Term Paper
Ethics, as It Pertains to Information Technology
Despite the fact that information technology has been instrumental in increasing efficiency in every sector, there is the question of the right and wrong actions as it pertains to use of information technology and these issues are what are referred to as ethical considerations (Sembok, 2003).
4 Pages(1000 words)Term Paper
Information Technology Analysis
IT governance delivers maximum value and improves healthcare quality when while making an IT based decision, the alternative with higher value is chosen. For example, one decision might increase customer satisfaction; the second alternative decision might increase hospital’s revenue while the third might increase both.
4 Pages(1000 words)Term Paper
Information Technology Infrastructure Library
ITIL v3 is the most recent version of ITIL succeeding ITIL v2 which has improvements on the previous ITIL v2 but where some features of ITIL v2 are not changed. Overall, ITIL v3 or 2011 edition includes five core publications which include design,
12 Pages(3000 words)Term Paper
Information Technology
ment the latest technology in the scheme of any given organisation, but it is critical that any new resource to be added is effectively managed and first well with the needs and vision of the company in general. As such, information technology management has become the buzzword
20 Pages(5000 words)Term Paper
Image Recognition and Surveillance
Every day, the world is often awakening by threats or attempts of terror attacks by these groups. Hope of fighting these groups is through having prior knowledge of
4 Pages(1000 words)Term Paper
Information Technology Strategic Plan
Events planning needs are dynamic, and companies are expected to match their operations with prevailing trends in the industry. The management of Great Heights hopes to increase its revenue from $5Million to $20Million per year if it infuses the technology of mobile apps,
9 Pages(2250 words)Term Paper
Information Technology Strategic Plan
The company is well-known for the production of the juice of various varieties both juice and non-juice drinks. Examples of juice products we have Cranberry mixed juice and Grab ‘n Go and
8 Pages(2000 words)Term Paper
Let us find you another Term Paper on topic Information Technology Ethics for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us