Preview

How Technology Advancement has influenced Computer Ethics

Good Essays
Open Document
Open Document
1067 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
How Technology Advancement has influenced Computer Ethics
How Technology Advancement has influenced Computer Ethics
Name:
Professor:
Course
Date:

How Technology Advancement has influenced Computer Ethics The 21st century has been dubbed ”the digital age” because of the monumental achievements witnessed in the Information, Communication and Technology (ICT) fields, which have impacted every aspect of human life. The internet has become one of the most lucrative Information Technology (IT) tool which has made communication and exchange of information faster and efficient. Consequently, it has transformed how people consume information. In spite of its benefits, the internet has led to a severe decline in ethics among internet users (Salman, Saad & Ali, 2013). The widespread use of internet has led to increased and sophisticated crimes, terrorism and wars (May, 2004). This essay will be based on a case involving hackers who hold Personal Computers (PC) hostage. It will outline the potential computer ethics issues associated with holding computers hostage. It will also highlight methods that computer users could use to prevent this type of attack. Moreover, it will highlight governmental legislations that could be enacted against this type of attack. Ethics is defined as the principles governing both right and wrong among free humans (free moral agents), whose actions are influenced by their freedom of choice (Soskolne, n.d). Advancement of technology presents both positive and negative impacts to a society. Technological advancements have led to a rapid decline in social and ethical issues regarding to security and privacy of personal information (Shieh & Tanthuwanit, 2004). One of the major forms of social ethic violation includes hackers holding personal computers hostage, and hence infringing on both privacy and security of targeted computer users. This in turn compromises information security concerned with the protection of information confidentiality, availability and integrity (Gordon &



References: Colombell, M., R. (2002). The Legislative Response to the Evolution of Computer Viruses. 8 RICH. J.L. & TECH. 18. Retrieved from < http://jolt.richmond.edu/v8i3/article18.html> French, A., M Gordon, L., & Loeb, M. (2002). The Economics of Information Security Investment. ACM Transactions on Information and System Security, 5 (4), 438–457. May, M. (2004). Federal Computer Crime Laws. SANS Institute. Retrieved from < http://www.sans.org/reading-room/whitepapers/legal/federal-computer-crime-laws- 1446? Show=federal-computer-crime-laws-1446&cat=legal > Perlroth, N Shieh, M., & Tanthuwanit, K. (2004). Privacy and Security: Internet Hacking and Surveillance The Canadian Press (2014, April 14).  Computer hacking expert says more bad news to come from Heartbleed. Edmonton Journal. Retrieved from

You May Also Find These Documents Helpful

  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Peter Krapp Analysis

    • 703 Words
    • 3 Pages

    Peter Krapp builds a well-constructed argument designed to persuade readers that computer hacking is a danger that steals our most valuable possession—personal information—from our most vulnerable people--students. The article focuses on personal information about college students stolen from college computer networks. The writer builds his argument brick by brick. He starts by giving an example of student data stolen from a college by hackers in China, relating his topic to an event that really happened. The writer quickly establishes himself as an expert in the topic so readers can trust his information. Krapp asks and answers questions about the theft of data, goes into more depth about the type of information stolen from college networks, and then briefly touches on the laws, or the lack of laws, to protect students. He points out that data is stolen from students by not only foreign hackers, but also by American companies. The writer finishes with a call for colleges to protect student data, clearly stating his purpose.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Better Essays

    20142321 SIYIWANG TACC403

    • 2051 Words
    • 7 Pages

    4. K. Himma. (2004). The Ethics of Tracing Hacker Attacks Through the Machines of Innocent Persons. International Journal of Information Ethics. vol. 2, pp. (4), p1-13.…

    • 2051 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Capstone Analysis

    • 285 Words
    • 1 Page

    Regular stories featured in the media on computer crime include topics covering hacking to viruses, web hackers, to internet pedophiles, sometimes accurately portraying events, sometimes misconceiving the role of technology in such activities. The increase in cybercrime has been documented in the news media. Both the increase in the incidence of criminal activity and the possible emergence of new varieties of criminal activity pose challenges for the legal system, as well as for law enforcement. Some of the things I do to try and prevent falling victim to cybercrime is keeping the latest version of virus software on my computers. Using strong passwords that only my family knows. I do not fall prey to online offers of things like free TVs, or you have won $1,000.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Computer Ethics

    • 2654 Words
    • 11 Pages

    Everyone has the right to privacy. Ethics is a branch of philosophy which seeks to address questions about morality; that is, about concepts such as good and bad. Some common issues of computer ethics include Intellectual property rights, privacy concerns, and how computers affect society. One problem is that many domains are being bought and sold to the highest bidder. Personal information has become more important in transacting business, and it’s available to many people and organization. The apparent solution to the lack of privacy on the internet is a technique known as encryption. In political discourse, the term “privacy” has been used to refer to physical privacy in the home or office, the ability to make personal reproductive decisions without interference from government, freedom from surveillance, or the ability to keep electronic communications and personal information confidential.…

    • 2654 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    DISCUSS SOME OF THE MORAL, ETHICAL, PROFESSIONAL ISSUES FACED BY THE USERS OF ICT SYSTEMS…

    • 1194 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    The development of technology which is getting greater and advance often leads to complex ethical, illegal, and societal issues. Thus there were many ethic centers developed in order to examine the implication of the moral principles into various fields that raise throughout the development of the technology such business ethics, engineering ethics, computer ethics, and medical ethics. Computer ethics or ICT ethics are not so much different of the human ethics, the different is how it is perform via the technology has to offered to unethical human. Obviously the world of communication and technology has affected the cultures, values, and social responsibility for good and for harm. The unethical way of using the facilities of ICT may or may not lead to crime or illegal action, which called cyber crime. The computer security is defined to protect the CIA principles (confidentiality, Integrity, and Accessibility); hence, the violation of these principles may leads to serious crime. Thus, the complication rise here concerns on freedom of expression, information access, privacy rights, intellectual property rights and cultural diversity.…

    • 623 Words
    • 3 Pages
    Good Essays
  • Good Essays

    who 's fault it is. It could have been the computer programmer 's fault, but…

    • 1708 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Ethics deals with placing a “value” on acts according to whether they are “good” or “bad”. Every society has its rules about whether certain acts are ethical or not. These rules have been established as a result of consensus in society and are often written into laws.…

    • 3739 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    Hacker

    • 1123 Words
    • 5 Pages

    The advancement of information technology spans a lot of areas of our lives. Information technology has made a huge difference in industry, agriculture and services. This in turn boosts up the productivity of the society. However, the development of computer technology also leads to many security problems in our modern society. There has emerged a group of computer savvy people who seeks and exploits weaknesses in a computer system or computer network. Their motivation has put many questions on debating table. On the one hand, many people contend that a hacker is a dangerous person who will probably destroy the whole world’s computer system. On the other hand, others argue that hackers are not dangerous and not causing harm. This essay will discuss the two sides of the coin with regard to hackers with relevant examples.…

    • 1123 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Computers have evolved in our society to a point where almost everything runs off of them and cannot function without them. The days of balancing a checkbook by putting pen to paper have all but passed, today, there’s an app for that. But as times change and as technology advances, the bounds of limitation increases, and consequently people are able to perform much more devious or conversely much more righteous things. Ethics by itself means: a system of moral principles, or “the rules of conduct recognized in respect to a particular class of human actions or a particular group, culture, etc.” So by extension we can surmise that computer ethics are the set of principles that we should adhere to when engaging in any computer related activity. For example, we know plagiarism to be morally wrong, we understand internet piracy to be morally wrong (although this is a topic of great debate), and we understand that invasion of one’s privacy through “hacking” or “tunneling” (infiltrating a network to snoop around) is inherently wrong. There are actually a set of principles that are universally recognized called “The 10 Commandments of Computer Ethics”. These commandments, listed below, will be further discussed in the following essay.…

    • 967 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computer and Web Ethics

    • 1530 Words
    • 7 Pages

    With the freedom of the computer has come a multitude of new ethical issues. Computer ethics is a set of moral principles that systematize the use of computers and supervise the behavior of a group or individual. This essay will tell how computer ethics came about. We will discuss the “Ten Commandments of Computer Ethics.” Having the use of a computer for business, academic, or just for social reasons entitles you to know and follow these ethics. Do you apply computer ethics when spending time on the internet? At the end of this essay ask yourself this question again and give an honest answer. If your answer is no then correct the issue and apply them now. Ethics in computing are social-justice issues, commerce, computer abuse, speech issues, intellectual property, basics, privacy, and risks. We will discuss each of these issues in this essay. By the end of this essay you will have the knowledge of computer and web ethics to apply to your daily use of a computer.…

    • 1530 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Computer Ethics

    • 7106 Words
    • 29 Pages

    Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society.…

    • 7106 Words
    • 29 Pages
    Powerful Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays