Preview

Computer Ethics

Good Essays
Open Document
Open Document
897 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Ethics
As of September 2003, there were approximately 70 million Americans or about 62 percent of the American population had at least one home computer. Another statistic is that about 55% of people also have internet on there home computers. In everyday life it is important for a person to have good ethics; this is also true about computer usage. Due to the fact that more then half of the American population owns computers, computer ethics are a growing concern in a rapidly changing society. Computer ethics can be broken down in to many topics including piracy, hacking, viruses, spam, phishing, and responsibility of use of software, cyber porn, and invasion of privacy and the use of the computer in the work place. Also there are many issues both moral and professional that a person who uses a computer might face.
Piracy which by definition is reproduction, distribution and use of software without permission of the owner of copyright, poses some serious ethical problems. The free exchange of copyrighted materials is piracy as it undermines the ability of copyright holders (and their representatives) to control the sale and distribution of goods to which they—and only they—own the rights. Probably the best known and most widely practiced form of piracy is the distribution of copyright protected music files via popular file sharing programs such as Kazaa and Limewire. As bandwidth increases, the "sharing" of movies and television shows on the Internet is likely to increase as well. Although file sharing is quite common, that does not mean it is okay.
Another ethical problem with computers is hacking. Hacking is the computer equivalent of breaking and entering. A computer hacker uses his or her skills to gain unauthorized access to another computer or computer network and, once inside, can wreak havoc by altering important information, deleting essential files, or just crashing the whole system. Many hackers who break into commercial Web sites are looking for

You May Also Find These Documents Helpful

  • Better Essays

    Analyze the security issues and the HIPAA security requirements and describe the safeguards that the organization needs to implement in order to mitigate the security risks. Ensure that you describe the safeguards in terms of administrative, technical, and physical safeguards.…

    • 1284 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Computer and Internet technology use in the workplace gives rise to questionable ethical practices among employees as well as managers. For the last three (plus) decades the increasing availability and advances in technology has improved productivity; however the use of computers and Internet in the workplace leads to temptation to misuse the resource for personal gain.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    CSS350 IP5

    • 6832 Words
    • 19 Pages

    In today’s world it is an indisputable fact that computers and digital devices are a part of our everyday lives. As such they are a part of our society whether they are used for business or for personal reasons. There are many uses for computers. We can use them to track our finances, keep databases of information about our clients, and use them to save pictures and documents. Sometimes computers are used in the commission of a crime like hacking systems for credit card information or launching computer viruses against a target. Sometimes they are used to communicate with others about the details of a crime, plan a crime, or share illegal media like child pornography. Other times computers can be misused and lead to loss or theft of data resulting in system downtime or monetary losses for an organization.…

    • 6832 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Ethics refers to what comes off as right or wrong to an individual’s conscience .The internet age has brought about new ethical issues, not only for an individual but for the society as well as it has eased anonymous manipulation and distribution of information, creating new and easier paths for committing crimes like piracy, identity theft, infringement of an individual’s privacy etc. In this paper we will be analyzing the Choice-point case and the ‘Sony data breach ‘case from an ethical point of view. (Laudon &Laudon, 2010, p.128)…

    • 2180 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    The process of being cool

    • 708 Words
    • 2 Pages

    It is illegal to download music, software, and video off the internet, this material is copyrighted. “Copyrighted is a form of protection by United States laws to the creator” (source 1). This is basically a form of protection against stealing other peoples work. Copyright is to software as plagiarism is to writing. People put money into copyrighting any original work. This includes, literary, musical, dramatic, artistic, and other intellectual pieces. When avoiding the cost of these works, people are stealing money. Not only is online piracy morally and lawfully wrong, but it comes with hefty consequences. According to source 3, “Criminally copyright infringement is investigated by federal law enforcement agencies and is punishable by up to 5 years in prison and a fine of $250,000.” Even though the consequences are severe, people continue to commit online piracy.…

    • 708 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    According to an article in Forbes, Yang and the other participants in the software scam worked since 2009, obtaining and selling fraudulent product activation keys for Microsoft and other software programs through e-commerce websites. The participants traded product key codes over email and wired money to each other between different bank accounts. They allegedly operated a series of ecommerce sites, claiming to be selling the product activation keys legally, and received many “cease and desist” letters from Microsoft. It is thought the group may have made at least $30 million in profits over the years. That surge in profit from pirated software began to fall apart in 2013.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1. The paper is about the issues that arise in connection with the new information technologies and the author’s assessment of arguments. A number of theorists have tried to prove that the study of computer ethics is a field by arguing that computer ethics is unique in some theoretically significant way but they differ with respect to the way they think it is unique. By interpreting the uniqueness thesis, numbers of conceptualizations were made like…

    • 783 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Pros and Cons of Piracy

    • 2574 Words
    • 8 Pages

    This essay will critically discuss and evaluate the pros and cons arguments surrounding media piracy and its consequences. The aim is to evaluate what media piracy is and how it has changed the world’s approaches to legislation and copyright laws. This essay will try to focus on the Political, Economic, Technological and Social factors of the consequences of piracy, doing so by positioning myself within the argument.…

    • 2574 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    The society develops with unbelievable speed, from telegraphy, telephone, radio of 19th century to the modern 21th century, which is the Age with rapid developing and growing of knowledge and information. For example, Internet has been used widely everywhere in the world. We call it “global, Web-based platform, this platform enables people to connect, compute, communicate, compete, and collaborate anywhere, anytime to access limitless amounts of information, services, and entertainment”(Rainer & Cegielski, 2011 ). It is so obvious Information technologies benefit us a lot; in the meantime, IT also can raise new ethical problems.…

    • 820 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Internet Privacy Ethics

    • 1380 Words
    • 6 Pages

    The citizens of the United States have always been keen on privacy. A new emerging issue is on Internet Privacy issues. Privacy issues can lead to devastating consequences such as identity theft and bad credit ratings. Many users of the internet do not know the level of security or privacy of a website they access. There are many uncertainties when using the internet. How can we trust that our personal information is safe? How do we know that we actually have privacy? How do advertisers obtain our personal information? Are there actually laws regarding internet privacy?…

    • 1380 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Digital Privacy

    • 2212 Words
    • 9 Pages

    Kuzu, A. (2009). Problems Related to Computer Ethics: Origins of the Problems and Suggested Solutions. Online Submission,…

    • 2212 Words
    • 9 Pages
    Best Essays
  • Good Essays

    Ethics of Hacking

    • 275 Words
    • 2 Pages

    The ethical question about unlocking seems to have been answered - by governments, at least - as to say that it is the corporations' hands that need slapping, and not the consumers. If I had to define what a "hacker" was, I'd say it's someone who possesses a rare technical discipline to alter the function of another work, and the ethical discipline to do it without lying, cheating, or stealing. So the real ethical challenge to a hacker is identifying the difference between corporate greed and theft of services. Hackers are the great equalizer of a capitalist society, and when conducted ethically, hacking can be of great benefit to both the consumer and the manufacturer. They have the power to balance out corporate greed and further improve on otherwise great products. If the ethical situations concerning computer hacking could be resolved, these hackers ideas could be potentially useful and could help to further advance our technological standing in…

    • 275 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Hacking and Hacker

    • 1666 Words
    • 7 Pages

    Hacking is to change computer hardware or software, in order to cause damage to important data on a computer or to simply steal personal information. Computer hackers take help of internet because internet connects the entire computer around the world. A person who attacks to another system with the intent to cause harm, without having any permission from the system owner is called as hacker. There are different types of hacker with different purpose of hacking. Hacking is illegal thing which have lots of effect but somehow hacking is good because it got some benefit. In the following paragraph I am going to discuss about types of hacker, purpose of hacking, effect of hacking, benefit of hacking and ethical hacking. (Beaver & McClure, 2007)…

    • 1666 Words
    • 7 Pages
    Better Essays
  • Best Essays

    Social Media Essay

    • 2082 Words
    • 9 Pages

    References: Brey, P. (2000a), ‘Disclosive computer ethics’, Computers and society, Vol. 30 no.4, pp. 10-16…

    • 2082 Words
    • 9 Pages
    Best Essays
  • Powerful Essays

    As technology like computers progresses, they will continue to contain a larger impact on people in today’s society. For that reason, computer ethics supports the how some debate on just how much influence computers need to have in human communication. With computers evolving constantly, ethical standards will continue to be constructed by computer ethics and will always have newer concerns that come from recent technology.…

    • 1931 Words
    • 8 Pages
    Powerful Essays

Related Topics