Saturday, March 9, 2019
The Modern Information Technology
The randomness age is the age we live in today, and with the training age hit sexs an age of ethics. When we deal with the new technologies introduced every day, we need to try what we must consider honourable and wrong. We must consider all factors so that the use of the training readily available to legion(predicate) persons is non abused. development technology allow for be the most fundamental bea of ethical concern for business in the next decade (Houston 2). The most astray used tool of the information age is the calculator, whether it be a PC or a net take a crap of com shake offer systems.As we enter the information age the newness and power of information technologies tests the ethics of the average person, not except the criminal and causes thousands of computer crimes to be committed daily. The most common computer crime committed daily, some aw ar and many not, is the illegitimate sacramental manduction of computer parcel. Softw be is any of the progra ms used in operating a digital computer, as input and output programs, as defined by Funk and Wagnalls Standard Desk Dictionary.When you purchase computer software program, you purchase it with the understanding that it will be for se on a single computer, once installed on that system, it is not to be teared on any other computer. as yet many citizenry are not aware of this understanding, and many load a program on a couple of computers or on a whole network of computer systems not aware that they are committing a crime. Even though you probably will not be prosecuted for loading a program on a friends computer, this is where your ethics come in.Do you consider anything when you share a program with others? If not then(prenominal) consider the programmers of the software who are denied compensation for their developments every time you give way a iece of software. Why is it that people who wouldnt think of abstracting pack of maunder will copy a $500 piece of software (Hous ton 3)? A popular form off illegal software distribution is throughout the online world. Whether it be the Internet, America Online, CompuServe, Prodigy, or a BBS (Bulletin Board System), software pirates thrive freely online.These so called pirates operate by uploading pieces of software, comm but referred to as warez, into an online services database then sending through e-mail the rights to download them. The Information pike has opened the door to a new kind of highway robbery the stem shoplifting network (Mattia 43). When you annoy a online service, you are set through an account which most commonly consists of a user ID and give-and-take. The password is so you only can access the online service with your user ID. many a(prenominal) people online use their own accounts to access their service, but many steal and use the accounts of others or make fake accounts. When online, these account pirates many propagation trick other users into giving their passwords to them by impersonating an employee of the online service. Others can hack into the online operate mainframe computer and steal thousands of accounts. Probably the most common method of subscribe toting online without paying is the use of fake or fraudulent accounts. These are made by giving false information when attempting to gain access to an online service.Name, matchress, phone number, and billing information, such as checking account or impute card number, are all falsified in obtaining an online account. With these stolen and fake accounts, software pirates demand virtually unlimited time to download their warez without any charge to them. many some other(prenominal) people dont consider the people behind the creation of software when they illicitly distribute it. The developers of software are not properly compensated for their work because of the extent of software piracy.No one can argue with a software companys desire, and right, to make sure everyone using their products has paid for it (Furger 73). The numbers add up, it is estimated that in 1994 alone that software companies lost $15 billion from illegal software copying (Maremont 65). It is not only illegal, but clearly wrong to distribute software knowing hat the people behind the software are experiencing the downfalls of Every time software companies cannot compensate their programmers for their work, more people are out of a job.Consider this, you enter a retentiveness and purchase an item, during this transaction you give your do and phone number. The person you agree given this information to then enters it into a computerized database. After this person has collect a sufficient amount of names, they then sell it to a telecommerce firm for a profit. This action is legal, but is it ethical. Do you sine qua non your name sold without your consent? Most people dont because they dont want to be fazed by sales persons on the telephone. Also, your address could be sold and you put on a mai ling list.Then its an issue of do you want your mailbox filled with junk mail. This action is unethical for the simple actor of consent. If the person had entirely gained consent to enter the names into his/her database then he would not have committed and unethical act. unitary conclusion from studies sponsored by the theme Institute of Justice is that persons involved in computer crimes get form skills and interests at an early age. Usually they are introduced to computers at home or in inculcate and ordinarily start their career way of life with illegally copying software (McEwen 2).As untested people act with hackers, they incorporate the beliefs of the hackers into their own. Many of these unconventional beliefs of young hackers about information and computers leads them to a career in computer crime. Many times it is the lack of genteelness by parents and schools that helps to make these beliefs all the more true to a young person. Computer criminals have their own se t of beliefs about information and computers. Their beliefs are based on obvious unethical reasoning. For example, hackers believe that computerized data are free and should be accessible to anyone.They also believe that passwords and other surety features are simply obstacles to be overcome in obtaining data that should already be available and while data should never be destroyed, on that point is nothing wrong with viewing and transferring data for ones own use (McEwen 2). One member of the Legion of Doom, a nationwide group of hackers who exchange information about computer systems and techniques o break into them, has said, Hackers will do just about anything to break into a computer except crashing a system, thats the only taboo (McEwen 2).The key to stop computer criminals from forming is education. It is often times the pillow slip that people commit computer crimes without even know they are doing so and the reason for this is the lack of education. Few schools teach com puter ethics, and parents of arrested hackers are commonly unaware that their children have been illegally accessing computer systems (McEwen 2). Colleges and universities do not usually include computer use and abuse in their ourses, arguing that it is the responsibility of the schools.On the other hand, many secondary school educators are not sure about what should be taught and are reluctant or futile to add ethical computer education to many subjects in the curriculum. Textbooks on computer literacy rarely mention computer abuses and individual responsibilities. Educators and software developers have worked together to prevent software piracy in educational institutions. In 1987, the Software Copyright Committee of the International Council for Computers in Education (ICCE) true a policy to guide educators.The policy call on school districts to teach staff the provisions of the copyright law and both staff and students the ethical and practical implications of software pira cy. This policy has been adopted by many school districts across the country (McEwen 3). In recognition of the problems arising with the illegal and unethical use of computers, criminal justice forces have begun to crack down on computer criminals. In 1989, three computer crime studies were sponsored by the National Institute of Justice.One of these studies examined different organizational approaches for computer crime nvestigation and prosecution, another documented the experiences of several dedicated computer crime units, and the third highly-developed a computer crime investigation handbook (McEwen 2). Computers are a permanent fact of life in work places and classrooms across the country. more businesses are likely to incorporate policies on information access and confidentiality in their employee orientation and training programs. Many schools and universities, responding from pressure around them, are reference to incorporate computer ethics into their courses.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment