Clearly from this case and others there is a critical need for the development of safeguards on consumer data captured over the Internet, both of the opt-in (where the customer approves the data being captured) and the non-opt-in variety.
An Explicit equirement for Transparency and Ethical Use of Data
Consumers have become increasingly concerned that their data, however acquired, will eventually be sold without their knowledge, eventually leading to the potential for identity theft at the worst and continual junk e-mail and bulk mail at the least. Due to the pervasive lack of trust regarding the use of their data, consumers are increasingly calling for Corporate Social esponsibility (CS) programs that will protect their rights and data despite any pre-existing claims made by the companies who captured it through benign surveillance techniques (Pirsch, Gupta, Grau. pp. 126, 127).
Facebook, one of the emerging companies that is defining social networking, has gone through…...
mlaReferences
Anders Albrechtslund 2007. Ethics and technology design. Ethics and Information Technology 9, no. 1 (March 1): 63. (Accessed April 12, 2008).http://www.proquest.com
Josh Bernoff, Charlene Li. 2008. Harnessing the Power of the Oh-So-Social Web. MIT Sloan Management Review 49, no. 3 (April 1): 36-42.
In order to implement the policy, a preliminary general meeting, as mentioned above, can be held. The issues relating to the policy will be discussed, and modifications made as necessary. A final policy will be created and provided to each employee. Employees will be provided with the opportunity to participate at any time when they choose to do so. The policy can be enforced via providing each participating personnel member with a password that expires within half an hour after logging on during work hours, for example.
Continuous training sessions can also be implemented in order to keep personnel updated on policies regarding this issue. Furthermore, training sessions will also include guidance on using the Internet, and which Web sites are safe and user friendly for generating extra income.
ources
McNamara, Carter. Complete Guide to Ethics Management: An Ethics Toolkit for Managers. 2007. http://www.managementhelp.org/ethics/ethxgde.htm#anchor52197
Olson, Gary a. The Ethics of Technology. Chronicle Careers, October…...
mlaSources
McNamara, Carter. Complete Guide to Ethics Management: An Ethics Toolkit for Managers. 2007. http://www.managementhelp.org/ethics/ethxgde.htm#anchor52197
Olson, Gary a. The Ethics of Technology. Chronicle Careers, October 2007. http://chronicle.com/jobs/news/2007/10/2007101901c/careers.html
Schwartau, Winn. Cyber ethics in the workplace. Network World, January 2002. http://www.networkworld.com/columnists/2002/0121schwartau.html
Western Digital Corporation. Workplace Integrity. 2007. http://www.wdc.com/en/company/governance/workplaceintegrity.asp?p=3
Social Networks and Computer Ethics
For the past 20 years, there have been many changes caused by the internet on many aspects of the contemporary life. The internet is growing rapidly. As of 2006, it was recorded that the number of internet users was about four million. For a long time, there have been promises made on how internet changes will positively impact people worldwide. These promises have reached many people throughout the world. Some of the promises have been fulfilled, while some have not been completely achieved. Among the main reasons for that is the decrease in people's faith in the system (Sund, 2007).
Sund (2007) stated that creating confidence and faith is a major factor for ensuring that the internet continues to grow, and for it to be used more. The increased growth of the internet has opened up doors for crime. Cyber criminals can now exploit the internet's weaknesses…...
mlaREFERENCES
Elovici, Y., Fire, M., Herzberg, A., Shulman, H. (2013, October 7). Ethical Considerations when Employing Fake Identities in OSN for Research. Retrieved June 28, 2016, from Arxiv.Org: https://arxiv.org
Huff, C., & Martin, C. D. (1995). Computing Consequences: A Framework for Teaching Ethical Computing. Communications of the ACM, Vol 38, No. 12, 75-84. Retrieved from ACM Digital Library: http://dl.acm.org
Johnson, D. G. (1997). Shaping social behavior online takes more than new laws and modified edicts. Ethics Online, Vol 40, No. 1, 60-65. Retrieved from ACM Digital Library:
Unfortunately, many consumers may not be aware of their photographic image being used in this fashion and even if they were, existing privacy laws fail to provide any substantive protections. For example, in response to these trends, the Harvard Law eview published an essay entitled, "In the Face of Danger: Facial ecognition and Privacy Law," with a majority of the article describing how "privacy law, in its current form, is of no help to those unwillingly tagged" (2007, para. 3). These issues have become even more salient because of the proliferation of social networking sites as discussed further below.
Privacy within social networking sites
Currently, there is a wide array of social media networks available, including social sharing sites such as YouTube and Flickr and social networks such as Linkedln and Facebook (Hensel & Deis, 2010). Others such as Spokeo and Twitter have become the virtual meeting places of choice for millions…...
mlaReferences
Bamberger, K.A. & Mulligan, D.K. (2011). Privacy on the books and on the ground. Stanford Law Review, 63(2), 247-249.
Brodkin, J. (2009, December 8). PCWorld. Retrieved from http://www.pcworld.com/article/
184029/Facebook_halts_beacon_gives_95m_to_settle_lawsuit.html.
Buchholz, R.A. & Rosenthal, S.B. (2006). Internet privacy: Individual rights and the common good. SAM Advanced Management Journal, 67(1), 34-36.
Computer and Web Ethics
The term "computer ethics," as coined by Walter Maner in the 1970s, refers to a field of study that examines "ethical problems aggravated, transformed, or created by computer technology" (Maner, 1980). Maner suggested that persons engaged in computer-related actions should apply traditional ethical frameworks, such as Kantianism and Utilitarianism, to govern their decision-making. While Immanuel Kant's virtue ethics are rooted in respect for all people and an inherent respect for virtuous character traits -- such as kindness, honesty, patience and humility -- Utilitarianism judges the morality of an action according to "the greatest good for the greatest number" rule (Stanford Encyclopedia, 2011).
Similar to Maner's definition, Deborah Johnson, author of Computer Ethics (1985), defined computer ethics as a study of how computers "pose new versions of standard moral problems and moral dilemmas, exacerbating the old problems, and forcing us to apply ordinary moral norms to uncharted realms" (Johnson,…...
mlaReferences
Bynum, T. (2006). "Flourishing Ethics," Ethics and Information Technology, 8(4), 157-173.
Gotterbarn, D. (2001). "Informatics and Professional Responsibility," Science and Engineering Ethics, 7(2), 221-30.
Johnson, D. (1985). Computer Ethics, First Edition, Englewood Cliffs, NJ: Prentice-Hall; Second Edition, Englewood Cliffs, NJ: Prentice-Hall, 1994; Third Edition Upper Saddle River, NJ: Prentice-Hall, 2001.
Maner, W. (1980). Starter Kit in Computer Ethics, Hyde Park, NY: Helvetia Press and the National Information and Resource Center for Teaching Philosophy.
Ethics in Technology
Business - Management
The purpose of this paper is to highlight and present the ethical issues that are involved in using modern technology. The paper highlights some of the current ethical issues faced by computer users that are due to unethical practice and lack of proper ethical policies by different businesses. The paper pinpoints the causes and gives recommendation on how the current issues can be minimized. A portion of this paper also consists of lawsuits that have recently occurred due to unethical practices adopted by businesses.
Ethics in Technology
We live in a modern era, the era of modern technology and innovation. Our lives are encircled by modern creations. These technology and advancement have surely brought comfort and ease in our life but unfortunately, the use of modern technology has also given rise to many ethical problems out of which few are a topic of discussion in this paper. The…...
mlaReferences
Anderman, E.M., & Burton Murdock, E. (2007). Psychology of academic cheating. (p. 1). California, USA: Elsevier Academic Press.
Morley, D., & Parker, C.S. (2009). Understanding computers: Today and tomorrow, comprehensive. (12th ed., p. 712). Boston, USA: Course Technology Cengage Learning.
Rogozea, L. (2009). Towards ethical aspects on artificial intelligence. Manuscript submitted for publication, Transylvania University of Brasov, Romania. Retrieved from http://www.academia.edu/1044129
4. Conclusions
In the article Ethical Issues in Information Technology, author Richard T. DeGeorge points out the existence of five interrelated ethical issues: issues in the usage of technology in business, issues in the it business, issues related to the Internet, issues in e-business and issues affecting the social background. Each of the five categories presents several ramifications. The article has a general coverage, an informal writing and throughout its 24 pages presents reduced details. The article merely highlights the existence of ethical problems and concerns in the information technology sector and poses questions as to how could these problems be best resolved. The academician also gives short but relevant examples as to how it procedures are being improperly used to deceive and cause harm. Among these examples, DeGeorge includes shortcoming of the medical systems, within organizations and individual usage of the Internet, mentioning at all times the inappropriate legislature.
Relative to…...
mlaBibliography
Anderson, James G., Goodman, Kenneth, 2002, Ethics and Information Technology: A Case-Based Approach to Health Care System in Transition (Health Informatics), 1st Edition, Springer
DeGeorge, Richard T., 2002, Ethical Issues in Information Technology, Blackwell Publishers
Hongladaram, Soraj, Ess, Charles, 2006, Information Technology Ethics: Cultural Perspectives, IGI Global
Johnson, Doug, 2007, Information Technology Ethics, Doug Johnson Website, Creative Commons License, accessed on December 7, 2007http://www.doug-johnson.com/ethics/,last
This information, stored on a computer and used to correlate with other data could be considered invaluable by many researchers, but the patients have a right to keep certain information private, and to suggest anything else would be an ethical violation of the patient's privacy.
Because computer ethics is such a volatile issue, an entire branch of study has grown up around computer ethics, which proponents who believe the computer age caused these ethical issues, and others who believe these issues would have surfaced anyway. One of the proponents of computer ethics, who actually was the first to teach the concept, Walter Maner, from Old Dominion University, is a proponent of the computer creating brand new ethical issues. An expert quotes Maner, "For all of these issues, there was an essential involvement of computing technology. Except for this technology, these issues would not have arisen, or would not have arisen…...
mlaReferences
Adams, H.R., Bocher, R.F., Gordon, C.A., & Barry-Kessler, E. 2005 Privacy in the 21st Century: Issues for Public, School, and Academic Libraries. Libraries Unlimited, Westbrook, CT.
Bynum, Terryl 2008 Computer and Information Ethics, Stanford University, URL=" http://plato.stanford.edu/entries/ethics-computer/ "
Fisher, C.B. 2006 Privacy and Ethics in Pediatric Environmental Health Research-Part I: Genetic and Prenatal Testing. Environmental Health Perspectives, 114(10), 1617+.
Rennie, John 2008 Who's Watching You: The Future of Privacy, Scientific American, URL=" http://www.sciam.com/podcast/episode.cfm?id=28825D7D-D772-2192-12177C05B4B2AED7 "
Intent to perform a greater good would not affect the possibility of being exposed to a prison sentence of up to 20 years and a fine of up to $250,000, plus possible penalties under state law.
Montana compares this legislation with that of the regulation of firearms. It is not the mere possession of malicious code that is criminalized, but the use and the damage to computer systems and association economic losses that are the focal point of the law. Computer code, even MMC, is considered intellectual property and carries legal protections similar to books or sound recordings. It is also considered a form of speech and therefore is also offered protection under the Constitution's First Amendment. However, this protection is limited, just as 'free speech' is limited, especially in instances when this speech interferes with the protection of the public welfare -- as is the case with the release…...
mlaWorks Cited
Ford, R., Bush, M., & Boulatov, a."Internet Instability and Disturbance: Goal or Menace?" Proceedings of the 2005 Workshop on New Security Paradigms. 2005: p. 3-8.
Frohmann, B. "Subjectivity and Information Ethics." Journal of the American Society for Information Science & Technology. 59(2) Jan 2008: p. 267-277.
Johnson, M. & Rogers, K. "The Fraud Act 2006: The E-Crime Prosecutor's Champion or the Creator of a New Inchoate Offence?" International Review of Law, Computers & Technology. 21(3) Nov 2007: p.. 295-304.
Ledin, G. "Not Teaching Viruses and Worms is Harmful." Communications of the ACM. 48(1) Jan 2005: p. 144.
Ethics in the Workplace
Ethics in Workplace
Ethics in relation to the use of Computer technology:
Ethics governing computer technology, the electronic data, personal information, and related situations have been of much debate in the information technology circles. The rules and regulations regarding this 'computer technology' seem to be very loose and flexible, and are often not given much regard. The field is in its adolescence phases and therefore not much has been concretely established relating to the ethical code of conduct relating to it. Since there is no concrete code of conduct, or set of instructions organizations and people tend to perceive ethical conduct each on their own accord. The way ethics related issues are solved differs from one person, organization to another. The difference can be based on external factors like the environment the organization is operating in, the size of the organization, the nature of industry it operates in etc.…...
mlaReferences:
Harrington, S.J., (1996), 'The effect of codes of Ethics and Personal Denial of responsibility on Computer abuse Judgments and Intention', Management Information Systems Quaterly, Volume 20(03), pages 257-278.
Horvath, C.M., (1999), 'Macro and Micro: the emerging field of organizational ethics', The online journal of Ethics, September 17. Accessed on 25th September 2011 from http://www.depaul.edu/ethics/ethgl.html
Paradice, D.B., (1990), 'Ethical Attitudes of entry level Management Information System personnel', Information and Management, Volume 18, pages 143-151.
Pierce, M.A. And Henry, J.W., (2000), 'Judgments about computer Ethics: Do individuals, co-worker, and company judgments differ? Do company codes make a difference?', Journal of Business Ethics, December, Volume 28(04), pages 307-322
Ethics in Cyberspace
Summary of the Book- the Ethics of Cyberspace by Cees Hamelink
Cees Hamelink is not new in the field of study of the principles relating to the communicating world and their association with civil liberties of mankind. Hamelink has accumulated his skills and views on all fields of communication and authored a book on the ways that most of the democratic society need to be resorted to in order to systematize the cyberspace. Hamelink, in his previous publications, attempted to evaluate the products, system and institutions of traditional industries vis-a-vis the morality of the people and liberty of mankind with a view to identifying these industries firmly and intentionally amidst as well as accountable to the civil society worldwide. He proved both of them to be essential. The book asserts of the facts that the control of the cyberspace worldwide should be guided by the public necessity rather than…...
mlaReferences
Cerf, Vint; et; al (2003). "Who Rules the Net: Internet Governance and Jurisdiction" Cato
Institute.
Edgar, Stacey L. (1997) "Morality and Machines: Perspectives on Computer Ethics, Jones and Bartlett Publications"
Featherstone, M; Burrows, R (1995) "Cyberspace, Cyberbodies, Cyberpunk: Cultures of Technological Embodiment" London. Sage.
[electronic resource] Journal of Business Ethics
Lin, C. And Ding, C.(2003) "Modeling Information Ethics: The Joint Moderating ole of Locus of Control and Job Insecurity," Journal of Business Ethics, 48:(4), 335- 346.
Molander, E. A 1987), 'A Paradigm for Design, Promulgation and Enforcement of Ethical Codes', Journal of Business Ethics 6, 619-631.
Paradice, D. B (1990) 'Ethical Attitudes of Entry- Level MIS Personnel', Information and Management 18, 143-151.
Parker, D. B (1981) 'Ethical Dilemmas in Computer Technology', in Ethics and the Management of Computer Technology (Proceedings of the Fourth National Conference on Business Ethics, Bentley
Pierce, M.A. And J.W. Henry (1996)'Computer Ethics: The ole of Personal, Informal, and Formal Codes', Journal of Business Ethics 15, 425 -- 437.
Pierce, M.A. And J.W. Henry (2000)'Judgements about Computer Ethics: Do Individual, Co-worker, and Company Judgements Differ? Do Company Codes Make a Difference?
Quinn, J. (1997) "Personal Ethics and Business Ethics: The Ethical Attitudes of Owner/Managers of Small Business,"…...
mlaReferences
Bass, K., Barnett, T., and Brown, G.(1999) "Individual Difference Variables, Ethical Judgments, and Ethical Behavioral Intentions." Business Ethics Quarterly, 9:(2),, 183- 205.
Barnes, R. F (1990), 'The Making of an Ethics Code', Bulletin of the American Society
for Information Science, pp. 24 -- 25.
Cassell, C., Johnson, P., and K. Smith (1997) 'Opening the Black Box: Corporate Codes of Ethics in the Organizational Context', Journal of Business Ethics 16, 1077 -- 1093.
Computer Technology, The Concorde Jet Liner, And Ethics
The issues of ethic in business practices in the age of increasing computer technology and the importance of managing information has come to the forefront of organizational management issues. In a society which now creates much of its wealth, not from hardwoods products, or services, but from the use of information, the integrity of that information is imperative to the ongoing well-being of the organization. In order for company A to continue to occupy the competitive position in the marketplace, the information and knowledge which company A possesses is considered as one of its proprietary assets. Stealing, 'borrowing' or otherwise duplication information in today's information business world is no different than breaking into a bank vault, and making off with the companies payroll money, or electronically hacking into the company bank records, and transferring moneys to a personal account.
In order to protect the…...
mlaWorks Cited
Association of Computer Machinery. "ACM Code of Ethics and Professional." ACM: Code of Ethics. 10 October 1992. www.acm.org/constitution/code.html.19 January 2001.
British Computer Society. "Codes of Ethics Online. Codes of Ethics Online. 6 March 1998. January 2001.http://csep.iit.edu/codes/coe/bcs-b.htm.19
Computer Society of India. "Codes of Ethics Online." Codes of Ethics Online. 24 October 1997. January 2001.http://csep.iit.edu/codes/coe/India_Code.htm.19
Langford, Duncan. "Essay: Computer Ethics and Clothing." Computer Ethics and Clothing. 1995. www.depaul.edu/ethics/computer.html.19 January 2001.
Ethical Scenario
Ethics is a term used to refer to the set of rules that help in determining right and wrong behavior during moral decision making. One of the major issues in Information Technology and Information Systems is computer ethics. This is primarily because the rapid technological advancements seem to enhance the likelihood of unethical use of computer devices and information systems. As these advancements continue to occur, it is expected that the misuse and abuse of these system will continue in the future (Masrom et. al., 2010, p.26). Therefore, IT professionals are increasingly faced with the need to promote ethical use of information systems in order to enhance information security. Some of the most common examples of unethical use of information systems include identity theft, hacking, software piracy, and spam. There is need to address these unethical practices because of their potential harm to individuals and the society.
Information Security Ethical…...
mlaReferences
Masrom, M., Ismail, Z., Hussein, R. & Mohamed, N. (2010). An Ethical Assessment of Computer Ethics Using Scenario Approach. International Journal of Electronic Commerce Studies, 1(1), 25-36. Retrieved from http://www.academic-journals.org/ojs2/index.php/ijecs/article/viewFile/857/35
O'Brien, J. & Marakas, G.M. (2006). Management information systems with MISource 2007.
New York, NY: McGraw-Hill Irwin.
Whitman, M. & Mattord, H. (2011). Legal, Ethical, and Professional Issues in Information
Ethics and the Internet
As the computer has evolved in the modern world, so the potential for communication has also increased. The computer, and the development of the Internet, has meant that human society has become more connected than ever before and the barriers between nations and people around the globe have been broken down. While this is a positive development in many ways, the growth of the Internet has also meant that there has been an increase in a wide range of new problems. One of these is the issue of ethics. "Just as ethics evolve as human societies grow and change, so similar ethical questions are raised during the evolution of this global electronic community." (Ethics on the Web)
The more that technology for communication and open publication of information advances, the more questions are raised about issues relating to moral codes of behavior and problems about what is right…...
mlaBibliography
Ethics. The Internet Encyclopedia of Philosophy. March 11, 2005. http://www.utm.edu/research/iep/e/ethics.htm
Ethics on the Web. 1995, Accessed March 11, 2005, http://www.echonyc.com/~ysue/ethics.html
INTERNET ETHICS: OXYMORON OR ORTHODOXY? March 12, 2005.
1. The ethics of using artificial intelligence in cyberattacks
2. The impact of deepfake technology on online fraud and deception
3. The ethical implications of governments using cyber espionage for national security purposes
4. The role of social media platforms in enabling cyberbullying and online harassment
5. The ethical considerations of hacking as a form of activism or protest
6. The relationship between cybercrime and environmental sustainability
7. The ethical dilemmas of using ransomware as a means of financial gain
8. The ethics of using cyber warfare tactics in conflict resolution
9. The implications of the dark web for cybercrime and illicit activities
10. The moral responsibility of tech....
Artificial Intelligence and the Future of Cybercrime: Ethical Considerations
Introduction:
The rapid advancement of artificial intelligence (AI) has transformed various aspects of our lives, including the realm of computer crime. The integration of AI into cybercrime tools and techniques has raised pressing ethical concerns, necessitating a fresh approach to understanding and addressing these evolving threats. This essay aims to explore the ethical implications of AI-driven cybercrime and propose strategies for mitigating its potential harm.
AI's Impact on Computer Crime:
AI has significantly enhanced the capabilities of cybercriminals. Machine learning algorithms enable the automation of complex tasks, such as malware creation, phishing email campaigns, and....
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now