StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Ethical Aspect of Using Information on the Internet - Essay Example

Summary
The paper "Ethical Aspect of Using Information on the Internet" is an outstanding example of an essay on social science. Ethics entail the standards that define the conduct of human beings. Society then establishes the standards within which a group or person exists. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful

Extract of sample "Ethical Aspect of Using Information on the Internet"

Name: Professor: Course: Date: Legal Aspects of I.T 1. Ethical aspect of using information on internet Ethics entail the standards that define the conduct of human beings. The society then establishes the standards within which a group or person exists. Individuals from diverse backgrounds are allowed to access the internet thus the ethical standards of these people differ greatly. Nevertheless, in order for participants to interact meaningfully through sharing of information, it is essential for the society to come up with a common set of norms to govern the behaviour of its members. This is very important since those sharing information cannot interact with each other tangibly. There are various groups that are trying to come up with a common set of norms for the internet (Zhili & Zheng 117). The notion that what is illegal is unethical could not be said any better. However, in some instances the opposite also applies. Ethical conduct is not just about legal requirements but goes beyond personal interests. It is not easy to pin down ethics and that is why technology professionals set high standards. The internet has been and still is of great value to customers, companies and the industry in general. The current world is full of technological advancement and the changes are occurring at a very high speed. The internet is finding it hard to be at par with the ethical and legal advancements in technological. There are various implications for technological product and service providers. Most of the difficulties that emerge concerning the internet are closely related to matters concerning intellectual property. Intellectual property deals mainly with proprietorship of ideas. It is obvious that ideas cannot be felt or touched, but they do belong to the individual who established them. They are therefore, known as intangible property. 2. Using someone else’s intellectual property When a similar mark is used for different products, consumer confusion arises. This however does not mean that a trademark that belongs to another program can never be used. “Fair use” can be employed such that the origin of the product is identified. The principles behind “fair use” necessitates that another person’s trademark may be exploited to criticize the products and services that the brand identifies. However, it is important to note that such an action be conducted in a truthful way. In simple terms, the law allows free speech as long as it is limited. It is not right to use trademarks to deceive others or for self-interests. In some instances, it is legal to use some else’s product for the purposes of parody. When parody is used, it is necessary that the information does not confuse customers. An authorized dealer or distributer can use a particular trademark. Dealers must make sure that they provide the correct information regarding the trademark such as registration mark. There are some cases where customers have been led to believe that the information on the products is true and legal. In the case of Danny Ferrer for instance, the products purchased on the website were reproduced on compact disks and distributed through the mail. On the CD-R discs, Ferrer included labels that featured trademarks of the legitimate software companies and had a serial number that allowed the purchaser to activate and use the product. These tactics were meant to dupe the consumer. Technology professionals have therefore the sole responsibility of ensuring that their clients are protected. Competitors’ names can also be used and this is referred to as comparative advertising. Comparative advertising has been known to provide consumers with relevant information in turn promoting competition. Products can be compared as long as the information does not confuse the customers. 3. Moral and legal issues with software piracy and its affects Piracy is an issue that is affecting the software industry especially in the current technological world. The software industry has been trying to deal with the danger of piracy for many years now. The impact of piracy on many businesses has been extremely devastating. Piracy has been viewed generally as an illegal act. In the current world, piracy is being perceived as a normal practice and many people do not think twice before doing it. The ease on piracy is so great that some individuals have opted to make profit using pirated software (Wendy, Tam & Yan 585). Reflecting back on the case of Danny Ferrer of Lakeland, it is clear that people are ready to go out of their way just to make large amounts of profit. Danny was convicted of selling illegal software online worth over twenty million dollars. The products were copyrighted and were sold at prices lower than the suggested retail value. Danny sold counterfeit and illegal copies of software such as Adobe and Autodesk. It is easy to perceive that this kind of activity is illegal since the products that were being sold were copyrighted. However, there are ethical implications. Ferrer may have thought that he was ethically right for selling the product at a price at a value that he felt was right. He might have felt noble at doing so since in his mind he thought that he was protecting consumer rights. Such kind of argument is weak in presenting piracy as ethical. If Ferrer was concerned about the price, he would have contacted the company. If indeed this individual was committing piracy because the products were overpriced, it is rational that he should have given all the money to the company. He instead used the money to purchase planes, boats and other luxuries. There is no sort of justification for selling pirated software. The fact that the main aim of pirates is to profit themselves blocks any form of ethical arguments. There are times when companies discover that their products are being pirated but choose not to take action because the lawful expenses involved are much more than what the company is losing. In such a case, the piracy is still unethical since the companies are suffering major losses. If the companies decide to take legal action, they may suffer financially but again something good might just come out of this. Such companies will definitely boost their reputation hence attract potential customers. There is another kind of software piracy where the products are obtained free of charge. The pirates may overlook whatever form of protection that may exist and distribute the products free of charge. Whether the software is being shared among friends or distributed online, the kind of ethical implications are different from Ferres case. The argument is that even if the pirated product is not purchased, nobody suffers a loss. It is obvious that the company that created the product incurred some expenses hence it would be reasonable for anyone who likes it to pay for it. If the product is used without being accounted for then an unethical act is being committed. There are cases when such piracy may not be considered wholly unethical. When products are pirated and given freely, the consumers are suggested to that, if they like the software then they can purchase a copy of their own. In such an instant, the company can benefit from the pirated product. The consumers may also not purchase this particular product but they will consider purchasing other goods from the same company. Pirates are well aware that piracy is wrong but they continue with the practice. Protection methods have been established but there is still no method that is totally secure. For any new protection method, there is always a way to defy it. Companies have been left with no choice but to take legal action against pirates. 4. Moral and legal issues with music piracy and copyright issues Recent studies reveal that billions of dollars are lost due to music piracy and it is unfortunate that the trend is growing (Deli, Bosworth & Gerald 272).The legal implications of pirated music ought to be clear to everyone who utilizes technology. According to the law, illegal reproduction of music results into major damages and penalties offered to criminals. Considering these stakes, the consequences of music piracy are not worth risking for. Reserving the legal facts and focusing on the ethical implications of the issue, it would be better to begin by looking at the principle of impartiality and justice. Companies devote large sums of money in the creation and production of music. Those involved in the creation and production of this music deserve to be rewarded fairly and justly for their efforts. Everyone deserves a world that is full of respect for themselves and others. If ethics is applied, then one wonders if distributing and pirating music is fair enough. Many companies are establishing employee policies regarding the use of software. It is important for individuals to get such copies and read then carefully in order to reinforce ethical conduct. Technology professionals have come up with many ways of dealing with piracy. Copyright protection is among some of the legal ways that technology professionals have used to deal with music piracy. The protection is granted basing on how the idea is expressed but not on the notion itself. It is not just music alone which can be protected by copyright but works such as books, computer programs and many others as well. Copyright ownership is given rights such as reproducing work, distributing copies for retail, performing relevant work such as music and several others. It is illegal to use any copyrighted material without authorization or payment of a certain fee. Copying computer programs for instance can only be legal if the copy is necessary for use in the computer or if the backup copy has been damaged. Other individuals can acquire copyright through a will or personal property to the successors. Transfer of copyright from one person to the next takes place by a written contract, which must be, registered the copyright office. 5. Should music be free on internet In the past, it used to be simple to listen to music. People used to listen to it on the radio for free but did not have the chance to choose which song they wanted to listen to. Stealing music happened when a person shoplifted a compact disk from a shop and it was clearly understood that the act was incorrect. This is why most old people think that downloading music from the internet is ethically unacceptable. These people believe that music is something that should be purchased. Although some of them still download music, they are well aware that it is not ethically right. Governments have tried their level best to burn music piracy and various messages have been sent to consumers through the media urging them tom cease from downloading music unless one pays for it. Young people have been arrested due for downloading music but this has not taught them a lesson. Over the past few years, people have continued to listen to free music, which is currently readily available on social networks such as my space. Some online services that provide free music download like Napster argue that the law protects downloading copyrighted music free as long as Napster members are not making money from it. No one is able to come up with a rational argument that which discourages free music download. Music producers have no much power and have surrendered this issue to the authorities. The fact is, downloading free music is unfair and unjust considering the amount of effort and cost involved in the creation of such music. Music should therefore not be free on the internet. 6. Cyber bullying affecting lives of people Cyber bullying can simply be defined as the use of technology to harass or threaten others. Cyber bullying occurs mainly among young individuals. Cyber bullying can entail posting threats on web sites or leaving openly cruel text messages on the phone. Cyber bullying can also involve posting personal videos to embarrass someone else (Megan &Kimberly 60) As the number of youths who have access to the internet and cell phones increase, the higher the incidents of cyber bullying. Cyber bullying can have diverse impacts on young children and teenagers. Most young people spend a lot of time on social networking sites and such habits can be intimidating especially to parents. Some messages mislead children and teach them unethical practices such as bullying. There have been reports about children who have died due to online campaigns concerning bullying. Through cyber bullying, some people have been tricked into revealing confidential information, which in turn has been sent to others. Cyber bullying has had several effects on young people such as poor school performance, low self-esteem, and even hopelessness (Karen, Margaret, &Wanda 27).Since cyber bullying occurs mostly outside classroom; children experience more severe cases of its effects. Although bullying is an aspect that has been around for ages, the effects are devastating. It is recommended that anyone who experiences physical harassment should report it to website owners. 7. Disadvantages of social networking sites Social networking sites are continuing to gain popularity especially among youths. Despite the fact that these social networks connect people across the globe, they also have some disadvantages. The internet can be viewed as an equalizer such that individuals from different backgrounds, financial status, age and other factors meet and share information and air out their view regarding many issues. This fact is not just a blessing but a disgrace as well. Social networking sites have propagated information that has been found offensive to other people. Such negative material that has been posted on social networking sites include: pornography, hate speech and other information that is dangerous. It is true that children nowadays have access to such sites and hence technology professionals have to take measures to ensure that such negative aspects are not happening on social networks. There are also cases where few individuals have lost their jobs due to posting offensive comments about their bosses on Facebook and MySpace. Cyber bullying is also experienced by few individuals on these social networking sites and a people have committed suicide as a result of emotional stress (Alastair 3 ).There is again another case where new articles on Facebook have revealed that a woman was sacked for complaining about her boss after forgetting she had added him as a friend. It is not right for anyone to criticize his or her boss on the internet or post a negative comment that the boss is able to view. The users of social networking sites therefore have to be very careful in order to avoid such misunderstandings and stay safe. Security is one of the main concerns of social networking sites. This is due to the fact that the social networks allow an individual to display his or her personal information such as address. Some people however use fake identities when applying for accounts on these sites hence they can stalk others and use their information for negative purposes. It is always wise for people not to reveal their full identities on social networking sites. It is again right to try to know people first before adding them as friends on these sites to avoid cases of image distortion. Work cited Alastair. N. Schools, Bullying And The Law. Legaldate, Vol. 23 Issue 2, p2-4, 3p; Reading Level (Lexile): 2011. 1500 Deli. Y , Bosworth, M. & Gerald. F . Global software piracy: Searching for further explanations. Journal of Business Ethics, 2009. Vol 87(2), pp. 269-283. [Journal Article] Karen. B, Margaret, J &Wanda, C. Cyber-Bullying: Developing Policy to Direct Responses that are Equitable and Effective in Addressing This Special Form of Bullying. Detail Only Available . Canadian Journal of Educational Administration and Policy, n57 2006. p1-36, (EJ843445) Megan. A &Kimberly, H. Social networks and cyber bullies: What are your patients telling you? Contemporary Pediatrics: 2011 56-63 (journal article - pictorial, tables/charts) ISSN: 750-0507 Wendy.H, Tam. B & Yan. K. Economics of shareware: How do uncertainty and piracy affect shareware quality and brand premium? .Decision Support Systems, Vol 44(3), pp. 2008. 580-594. [Journal Article] Zhili. L & Zheng.Y . Software Piracy among College Students: A Comprehensive Review of Contributing Factors, Underlying Processes, and Tackling Strategies. Journal of Educational Computing Research, v33 n2 p115-140 2005. (EJ739135) Read More

CHECK THESE SAMPLES OF Ethical Aspect of Using Information on the Internet

Downloading Music For Free From Internet

How different people consider downloading music from the internet?... Numerous questions continue to be asked as to whether it is right or wrong to download free music from the internet (Gilbertson and Lehman, 2008).... In the center of this debate is that, some people are convinced that downloading free music from the internet is right and they cite numerous reasons to justify their position.... However, another group has come out to contradict this position, claiming that the whole process of downloading free music from the internet is both unethical and illegal, while at the same time, it largely demoralizes the creator and songwriters, thereby negatively impacting the music industry (Gilbertson and Lehman, 2008)....
4 Pages (1000 words) Lab Report

The History of Ethical Theory

Due to such significance, accountancy includes dealing with sensitive information that results in a very big responsibility on accountants, which at the same time, opens doors for unethical acts and fraudulent behaviours (Kotler & Lee, 2005).... This paper ''ethical Theory'' tells that For many centuries, ethics has enjoyed significant importance in almost every sect of human existence in this world due to its strong influence on the norms and values of society....
6 Pages (1500 words) Essay

The Role of the Professional Code of Ethics in Addressing Security Threats

This aspect of the new digital age has invoked much debate and concern among stakeholders.... Employees are also prone to using internet connectivity for their personal use when in fact they were strictly meant for official use.... or example, while email and general internet access are given to improve productivity, surveys have shown that employees (including IT personnel) use them for such activities as online shopping, playing games, social networking websites, etc....
5 Pages (1250 words) Essay

Identify the ethical issues within the field of Information Technology

There are unauthorized means of using shared internet connections.... Secondly, employees are responsible for using firm's computers, internet facility, software and other appliances solely for the purpose of fulfilling the duties assigned to them.... This shared network system can be used to obtain high speed internet facility to all the computers in firm.... Ethical procedure is purchasing an appropriate package from an internet Service Provider....
2 Pages (500 words) Essay

Ethics in E-mail Communication and Internet

This article describes the role of ethics in E-mail communication and the internet.... If we take into consideration all the internet activities, it can be noted that a large proportion of the total traffic over the internet is e-mail.... In fact today there are people who unless they have e-mail facilities and knowledge to use the internet don't get jobs.... This paper outlines the excellence of E-mail upon other types of communication, ethical code for E-mail communication, the ethical issues of privacy in the information age, rules and regulations regarding emails and the importance of safety....
9 Pages (2250 words) Article

Whether the Use of Technology by Marketers to Gather Information about Customers is Ethical or Unethical

It is important that organizations should take the initiative to develop a code of ethics for using the internet for marketing activities.... This paper identifies the various methods by which marketers gather information about customers' shopping activities and their personal details, with the use of advanced technology.... The use of technology for marketing activities should be based on mutual benefit for customers as well as the corporations The move of business to the information age raises many ethical issues....
17 Pages (4250 words) Essay

Ethics in Nursing

447) posits that management of health information and especially storage of records is one of the core nursing roles that portend intrinsic potential ethical issues and risks including multiple ethical dilemmas with regard to issues of confidentiality, legal issues, and the sensitivity associated with individuals health.... The paper "Ethics in Nursing" provides a basis for making ethical decisions regarding the storage of patient's health records (nursing plans, medication charts, and observations) using the model provided by Kerridge....
9 Pages (2250 words) Case Study

The Intersection of Ethics and Internet Gaming

The exponential growth of the internet in the recent past has seen the development of applications that can undertake various activities.... One such activity is Internet gaming, which involves the playing of interactive games using specialized devices and software and delivered through the internet.... The incorporation of the internet enables gaming between two or more players located in remote locations.... nternet GamingInternet gaming refers to the act of playing electronic games that involve human interaction with an electronic device connected to the internet....
10 Pages (2500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us