Verified Document

Ethical Considerations In Computer Crimes The Study Essay

Ethical Considerations in Computer Crimes The study is based on the topic of ethical consideration in computer crimes. The rapid expansion of computer technology has resulted in an extremely sensitive issue of computer crimes. The ethical standards that are applied in other fields cannot be applied to the field of computer technology therefore the paper has discussed various aspects that are crucial for the understanding of the topic.

There are a number of issues that have appeared in the recent times due to the rapid expansion of computer technology and with it, the advancements made in the field of computer crimes. Computer Crimes have been a major threat to the development f the modern technologies and have resulted in a number of financial and security breaches. Financial frauds, phishing, spoofing, piracy, privacy breaches, and a number of other issues come under the domain of ethics concerning computer crimes. [footnoteRef:1] [1: Williams, M. Virtually Criminal: Crime, Deviance and Regulation Online, Routledge, London. (2006)]

Computer ethics is an extremely touchy subject. Unethical does not mean that a company or an individual is not conforming to a particular code of conduct. On the other hand ethical does not mean that a company or an individual has violated a particular set of code of conduct. The constant advancements in the information technology industry make it difficult to update the ethical standards in the fields related to this field. The application of ethical standards in other fields is much easy as compared to the implication of ethical standards in computer related fields. Computers have changed the way communication and data management takes place, nowadays the personal contacts and direct dealings are much less which makes it easy to cheat on each other. The data is transmitted and shared...

The process of communication takes place at such a great speed that people do not have time to consider the ethical implications of their actions. Information in the electronic form is far more fragile than in the conventional paper form. Freedom of expression can be abused extremely easily with the use of the Internet and can hurt the feelings of millions of people with a single post and cause protests like it did in the Muslim world. The affects of computer crimes are also magnified therefore the ethical responsibility should be far more than in other fields. [footnoteRef:2] [2: Halder, D., & Jaishankar, K. Cyber crime and the Victimization of Women: Laws, Rights, and Regulations. Hershey, PA, USA: IGI Global. (2011)]
In the early 1980s most of the computer crimes were committed by young college students who wanted to gain some attention and popularity by stealing someone's identity and playing fun pranks. This has changed great deal now; computer crimes are committed by professional hackers and crackers who engage themselves in serious financial fraud, privacy intrusions, blackmailing, phishing and spoofing. Credit card hacking is one of the most dangerous forms of computer crimes and has led to serious concerns for the whole banking sector.[footnoteRef:3] [3: McQuade, S. (ed) The Encyclopedia of Cybercrime, Westport, CT: Greenwood Press. (2009)]

Media itself has not played a responsible way to counter computer crimes. Media is responsible for educating the younger generation about developing a sense of belonging to the society and adopting fair practices in day-to-day dealings. Instead, media has somehow glorified the hackers, and has been promoting the hackers and crackers as some kind of geniuses and role models by glorifying their acts. Media has often portrayed these hackers…

Sources used in this document:
References:

Balkin, J., Grimmelmann, J., Katz, E., Kozlovski, N., Wagman, S. & Zarsky, T. Cybercrime: Digital Cops in a Networked Environment, New York University Press, New York. (2006)

Halder, D., & Jaishankar, K. Cyber crime and the Victimization of Women: Laws, Rights, and Regulations. Hershey, PA, USA: IGI Global. (2011)

McQuade, S. (ed) The Encyclopedia of Cybercrime, Westport, CT: Greenwood Press. (2009)

Williams, M. Virtually Criminal: Crime, Deviance and Regulation Online, Routledge, London. (2006)
Cite this Document:
Copy Bibliography Citation

Related Documents

22 Federal and State Law Enforcements Role to Enforce Computer-Based...
Words: 1162 Length: 3 Document Type: Term Paper

Law Enforcement and Computer-Based Crime Before beginning any discussion regarding the consequences of employee monitoring, it is crucial to first develop a working knowledge of precisely what this blanket term actually entails. Simply put, employee monitoring is deliberate surveillance by an employer which is used to track various behaviors, such as a worker's visitation rate to certain websites, as well as to transcribe and archive written correspondence in the form of

Information System on Ethical and
Words: 6479 Length: 15 Document Type: Research Paper

They have a moral obligation to the South African people in this area for many reasons. First, they have an obligation to make certain that they can participate in the global economy to give their citizens the same chances for advancement as other nations. Secondly, they have a moral obligation to do everything possible to keep their citizens safe. When one discusses the topic of security in Information and Communication

Law Enforcement and the Social Media
Words: 1446 Length: 4 Document Type: Term Paper

data collection includes survey form, structured interviews using closed ended questions, and gathering information regarding a sample size appropriate to analyze and draw conclusion on the basis of the research results. The statistical techniques are used for data analysis to analyze collected data in quantitative research methods. The qualitative data is gathered through case study method and open ended question of an unstructured interview from notable sample. The qualitative

Juveniles and Delinquency Youths Are
Words: 4772 Length: 17 Document Type: Term Paper

Based on statistics, nearly one million eighth graders admit getting drunk and another 1.2 million twelfth graders are considered binge drinkers. Heroin use by young adults has doubled from 1991 to 1996 and even teenage compulsive gambling is on the rise (http://www.einstein.edu/e3front.dll?durki=8576,2004). Youth Gangs and Violence - The Starting Point It should be noted that violence started from the family affecting the whole society. What an individual has for a family, what

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Internet Privacy for High School Students
Words: 12595 Length: 40 Document Type: Term Paper

Internet Privacy for High School Students The unrestrained stream of information is conceived necessary for democracies and market-based economies. The capability of the Internet to make available the vast quantity of information to practically everyone, irrespective of their locations thus entails large benefits. The Internet provides access to the greatest libraries of the world to the students even in the smallest towns and permit the medical specialists to analyze the patients

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now