Computers and the world of information technology are advancing quickly in this generation. Moor in his 1985 article “What is Computer Ethics?” stated that, “Computers provide us with new capabilities and these in turn give us new choices for action”. Hence, arguments about privacy and ethics in computer technology arise. With the birth on computers there “was concern right away that computers would be used inappropriately to the detriment of society”(Herold, 2006). I believe that the good is outweighing the bad when it comes to computers. I also believe there is a degree of user Alana Northrop states in her paper that, “Computerized search systems have been one of the most widely deployed management science technologies in the fight against crime”(1993). Police officers use computers in their cars now. The computers gives them access to information on citizens and also has the ability to give them directions to where they want to go. Everybody benefits from the use of GPS. At some point everyone has used Google Maps and perhaps even Google Street View to find an address. But is Street View seen as an invasion of privacy? Or is it just another stride in computer and information advancement? I believe the way people use computers and information play a big role in the social benefits. People and corporations alike use computers and information as a tool for more information or for leverage. What users do not often understand is that “they also have a responsibility to consider the ramifications of their actions and to behave accordingly”(Herold, 2006). Software piracy and plagiarism are examples of what happens when computer users decide to ignore ethics and use the computer and information for their own personal gains and/or pleasure. Hackers believe that it’s acceptable to do anything with a computer as long as the purpose is to learn. This utilitarian way of thinking, that anything is ok as long as it is for the greater good (Beauchamp, Bowie, Arnold, 2009),...
References: Beauchamp, T. L., Bowie, N., & Arnold, D. (2009). Ethical Theory and Business, (8th ed.). Upper Saddle River, NJ: Pearson/Prentice Hall.
Herold, R. (2006). Introduction to computer ethics. Retrieved from http://www.infosectoday.com/Articles/Intro_Computer_Ethics.htm
Moor, J. (1985). What is computer ethics?. Metaphilosophy, 16(4), 266.
Northrup, A. (1993). Police use of computers. Informally published manuscript, Center for Research on Information Technology and Organizations, University of California- Irvine, Irvine, California. , Available from Escholarship.org. (qt71x0h7hb)Retrieved from http://escholarship.org/uc/item/71x0h7hb
Please join StudyMode to read the full document