, Research Paper
The information age is the age we live in today, and with the information age comes an age of ethics. When we deal with the new technologies introduced every day, we need to decide what we must consider ethical and unethical. We must consider all factors so that the use of the information readily available to many persons is not abused. “Information technology will be the most fundamental area of ethical concern for business in the next decade.” (Ermann)
The most widely used tool of the information age is the computer, whether it is a PC or a network of computer systems. As we enter the information age, the newness and power of information technology’s tests the ethics of the average person, not just the criminal and cause thousands of computer crimes to be committed daily.
Problems associated with the information age
Invasion of
privacy Computer
virus Internet
scamming Junk
E-mails Minors
viewing
pornography Fraud
Accounts
Illegal Downloading Hacking
Cyber chat
The most common computer crime committed daily, some aware and many not, is the
illegal sharing of computer software. Software is any of the programs used in operating a digital
computer, as input and output programs, as defined by Funk and Wagnalls Standard Desk
Dictionary. When we purchase computer software, we purchase it with the understanding that it
will be for use on a single computer, once installed on that system, it is not to be loaded on any
other computer. However many people are not aware of this understanding, and many load a
program on a couple of computers or on a whole network of computer systems not aware that
they are committing a crime. Even though you probably will not be prosecuted for loading a
program on a friends computer, this is where your ethics come in.
Do you consider anything when you share a program with others? If not then consider the
programmers of the software who are denied compensation for their developments every time you
distribute a piece of software. “Why is it that people who wouldn’t think of stealing pack of gum
will copy a $500 piece of software”. (Parker)
A popular form off illegal software distribution is throughout the online world. Whether it
be the Internet, America Online, CompuServe, Prodigy, or a BBS (Bulletin Board System),
software “pirates” thrive freely online. These so called “pirates” operate by uploading pieces
of software, commonly referred to as “warez”, into an online service’s database then sending
through e-mail the rights to download them. “The Information Superhighway has opened the door
to a new kind of highway robbery – the home shoplifting network” .
When you access a online service, you are identified through an account which most commonly
consists of a user ID and password. The password is so you only can access the online service
with your user ID. Many people online use their own accounts to access their service, but many
steal and use the accounts of others or make fake accounts. When online, these account “pirates”
many times trick other users into giving their passwords to them by impersonating an employee of
the online service. Others can hack into the online services mainframe computer and steal
thousands of accounts. (Biemiller)
Probably the most common method of getting online without paying is the use of fake or
fraudulent accounts. These are made by giving false information when attempting to gain access to
an online service. Name, address, phone number, and billing information, such as checking
account or credit card number, are all falsified in obtaining an online account. With these stolen
and fake accounts, software “pirates” have virtually unlimited time to download their “warez”
without any charge to them. Many people don’t consider the people behind the creation of
software when they illegally distribute it. (Rochlin)
The developers of software are not properly compensated for their work because
of the extent of software piracy. No one can argue with a software company’s desire, and right, to
make sure everyone using their products has paid for it.
The numbers add up, it is estimated that in 1994 alone that software companies
lost $15 billion from illegal software copying. It is not only illegal, but clearly unethical to
distribute software knowing that the people behind the software are experiencing the downfalls of
it.
Every time software companies cannot compensate their programmers for their work, more
people are out of a job. Consider this, you enter a store and purchase an item, during this
transaction you give your name and phone number. The person you have given this information to
then enters it into a computerized database. After this person has collected a sufficient amount of
names, they then sell it to a telemarketing firm for a profit. This action is legal, but is it ethical.
Do you want your name sold without your consent? Most people don’t because they don’t want to
be bothered by sales persons on the telephone. Also, your address could be sold and you put on a
mailing list. Then its an issue of do you want your mailbox filled with junk
mail. (Wellbery). This action is unethical for the simple reason of consent. If the person had just
gained consent to enter the names into his/her database then he would not have committed and
unethical act. One conclusion from studies sponsored by the National Institute of Justice
is that persons involved in computer crimes get form skills and interests at an early age. Usually
they are introduced to computers at home or in school and usually start their “career path” with
illegally copying software.
As young people interact with hackers, they incorporate the beliefs of the hackers into
their own.
Many of these unconventional beliefs of young hackers about information and
computers leads them to a career in computer crime. Many times it is the lack of education by
parents and schools that helps to make these beliefs all the more true to a young person.
Computer criminals have their own set of beliefs about information and computers. Their
beliefs are based on obvious unethical reasoning. For example, hackers believe that computerized
data are free and should be accessible to anyone. They also believe that passwords and other
security features are simply obstacles to be overcome in obtaining data that should
already be available and while data should never be destroyed, there is nothing wrong with
viewing and transferring data for one’s own use. One member of the Legion of Doom, a
nationwide group of hackers who exchange information about computer systems and techniques
to break into them, has said, “Hackers will do just about anything to break into a computer except
crashing a system, that’s the only taboo”. (Biemiller)
The key to stop computer criminals from forming is education. It is often times the case
that people commit computer crimes without even know they are doing so and the reason for this
is the lack of education. Few schools teach computer ethics, and parents of arrested hackers are
usually unaware that their children have been illegally accessing computer systems. Colleges and
universities do not usually include computer use and abuse in their
courses, arguing that it is the responsibility of the schools.
On the other hand, many secondary school educators are not sure about what should be
taught and are reluctant or unable to add ethical computer education to many subjects in the
curriculum. Textbooks on computer literacy rarely mention computer abuses and individual
responsibilities. Educators and software developers have worked together to prevent software
piracy in educational institutions. In 1987, the Software Copyright Committee of the International
Council for Computers in Education (ICCE) developed a policy to guide
educators. The policy call on school districts to teach staff the provisions of the copyright law
and both staff and students the ethical and practical implications of software piracy. This policy
has been adopted by many school districts across the country.
In recognition of the problems arising with the illegal and unethical use of computers,
criminal justice forces have begun to crack down on computer criminals. In 1989, three computer
crime studies were sponsored by the National Institute of Justice. One of these studies
examined different organizational approaches for computer crime investigation and prosecution,
another documented the experiences of several dedicated computer crime units, and the third
developed a computer crime investigation handbook. (Biemiller)
Computers are a permanent fact of life in work places and classrooms across the country.
More businesses are likely to incorporate policies on information access and confidentiality in their
employee orientation and training programs. Many schools and universities, responding from
pressure around them, are beginning to incorporate computer ethics into their courses.
For the criminal justice community, computer crime, which poses special challenges in
detection and prosecution will require more and more attention. In order to prevent computer
crimes in the future, criminal and juvenile justice agencies must look for ways to help parents,
teachers, and employers educate the computer-using community to the importance of ethical
computer behavior.
Bibliography
Biemiller, Lawrence. U.S. Plans New Effort on Computer Security. “The Chronicle of
Higher Education”. Vol 44. Issue 27, March 13, 1998 Pg. A33.
Ermann, David. Computers, Ethics & Society. New York: Oxford University press 1990
Parker, Donn . Ethical Conflicts In Information and Computer Science,
Technology, and Business. Wellesley: QED Information Sciences, Inc. 1990
Rochlin, Gene. Trapped in the Net. Princeton: Princeton University press 1997
Wellbery, Brabara. Privacy in the Information Age. ” Business America” vol. 119
Issue 1 . January 1998 page 12
Другие работы по теме:
Pentium Iii Disturbs Privacy Essay Research Paper
The recent release of the Intel Pentium III has consumers as well as businesses concerned about the privacy of the computer world. The controversial issue is a feature in the Pentium III chip known as a Processor Serial
Crime Essay Research Paper In today s
Crime Essay, Research Paper In today s society computers are everywhere, but when someone thinks of a computer they think of it as a way to make life easier. This is true computers have made our life a lot easier and some times harder. The area that computer have improved our life the most is in communication, now we can write talk and hold a video conference anywhere in the world in real time.
Melissa Virus Essay Research Paper On Friday
Melissa Virus Essay, Research Paper On Friday March 26, 1999 an e-mail virus named “Melissa” slipped into systems via e-mail and forcing computers to fire off dozens of infected messages to friends and colleagues. Once opened, the virus immediately reads the user’s e-mail address book and sends an infected message to the first 50 entries.
Internet Privacy Essay Research Paper A new
Internet Privacy Essay, Research Paper A new report was written on the privacy issue of consumer reports to large companies. This is an issue which has been debated for some time and has been the subject for many parliamentary bills. Consumers, in exchange for their shopping statistical information, are rewarded.
Process Paper How To Get
On The Net Essay, Research Paper Process Paper: How to get on the net The Internet is a very important tool for communicating, learning, and just surfing. To utilize the capabilities of the Net one must have a phone line, a computer with a modem, and an Internet Service Provider (ISP). Computers can usually be found at any electronic store.
Cyber Porn And Internet Privac Essay Research
Paper Cyber Porn and Internet Privacy Two computer ethic controversies There are many controversial questions about computer issues today but there are many debates with cyber porn and internet privacy. The Internet is accessed by millions of people everyday, especially children. Cyber porn is all over the Internet and can be accessed by anyone from anywhere whether in school, home, or on the job.
Computer Essay Research Paper Computer is useful
Computer Essay, Research Paper Computer is useful for finding the information. As long as the Internet is installed in the computer, the people can be able to what they want to find. Of course, they have to waste the time for doing. Acquiring the information, they feel that it is valuable. Renctly years, the number of people is increased by using computer.
The Cookie Controversy Essay Research Paper The
The Cookie Controversy Essay, Research Paper The Cookie Controversy Most of us know cookies as tasty treats that are baked in the oven but now there is a new kind of cookie and it is stirring up privacy issues with Internet users. A cookie is a text-only file that gets entered into the memory of a web browser. Various web sights use cookies to help with on-line sales and services, tracking popular links, and demographics.
Invasion Of Privacy Essay Research Paper Invasion
Invasion Of Privacy Essay, Research Paper Invasion of Privacy Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.
What Really Is A Hacker Essay Research
Paper What Really is a Hacker? Dan Parks Julie Jackson – Instructor CIS 101 11-18-96 There is a common misconception among the general public about what constitutes a hacker and what hacking is. Hacking is defined as “gaining
What Should And Shouldn
’t Computer Be Allowed To Run Essay, Research Paper What Should and Shouldn’t Computer Be Allowed To Run Computers have always scared people. Not just because they can be
Computer Net Crime Essay Research Paper Computer
Computer Net Crime Essay, Research Paper Computer crimes are terrorism of the present day. Everything from Website attacks, viruses, and cyber sex. People have even been charged for rape over the internet. Government computers have been an easy target for hackers for decades. According to Defense Information Systems Agency s data, the military may have experienced about 250,000 attacks in 1995 with 2/3 s of the intrusions being successful.
Hackers Essay Research Paper In the article
Hackers Essay, Research Paper In the article that I read was about Hackers. It talked about the aspects of how the youths of today commit this crime. Hacking overall requires the utmost intelligent. These people that become Hackers have special knowledge and skills in computer programming, Internet use, overwhelmingly bright in mathematics and other important factors.
Privacy Essay Research Paper A person has
Privacy Essay, Research Paper A person has a right to solitude and freedom from prying public eyes, in other words, to privacy. The definition of privacy in the Webster’s Dictionary is defined as
Essay On Hacking Essay Research Paper Essay
Essay On Hacking Essay, Research Paper Essay On Hacking by Philip Smith A topic that i know very well is computers and computer hacking. Computers seem very complicated and very hard to learn, but, if given time a
Privacy And Personal Security On The Net
Essay, Research Paper Privacy and security are two things that are hard to find on the Internet today. Many debates have risen concerning the personal aspects of the Internet. Should you have privacy on the Internet? Or should companies have the privilege to gather information about you? I believe that your privacy and personal security should be top priority on the Internet.
Computer Viruses Essay Research Paper A computer
Computer Viruses Essay, Research Paper A computer virus is a program that attaches itself to, overwrites and/or otherwise replaces another program in order to reproduce itself without the knowledge of the computer user. Generally, the first thing a virus does is attach itself to other executable files in such a way that the virus code is in effect when the infected files are run.
Internet Cookies Essay Research Paper Internet CookiesMost
Internet Cookies Essay, Research Paper Internet Cookies Most Experienced Web visitors and even new ones know about cookies these days. Cookies are small data files that are being put on your hard drive by Web sites when you visit them. They do this for many different reasons. One of them is to identify you as a distinctive visitor by identifying your Web browser software.
Computer Viruses Essay Research Paper Anna L
Computer Viruses Essay, Research Paper Anna L. Porter Professor J. Brown Information Systems 201 December 1, 1998 Computer Viruses A computer virus is an illegal and potentially damaging computer program designed to infect other software by attaching itself to any software it contacts. In many cases, virus programs are designed to damage computer systems maliciously by destroying or corrupting data.
Computer Viruses And Their Effects On Your
Pc Essay, Research Paper Computer Viruses and their Effects on your PC This page intentionally left blank Table of Contents What is a Virus? 1 HOW A VIRUS INFECTS YOUR SYSTEM: 2
Privacy Essay Research Paper As laws policies
Privacy Essay, Research Paper As laws, policies, and technological design increasingly structure people’s relationships with social institutions, individual privacy faces new threats and new opportunities. Over the last several years, the realm of technology and privacy has been transformed, creating a landscape that is both dangerous and encouraging.
View On Cyberspace Essay Research Paper Views
View On Cyberspace Essay, Research Paper Views on Cyberspace George worked in the Hong Kong office of a large U.S. company. On the 8th of May, at about two o?clock, he received an email that came with an attachment labeled ?Love-Letter-For-You. The mail seemed innocuous enough that George opened it immediately without thinking.
Computer Privacy Essay Research Paper Today a
Computer Privacy Essay, Research Paper Today a profound shift in the privacy equation is under way. Technology brings enormous efficiency to the collection, sorting and distribution of personal information. This efficiency has revolutionized countless organizations but it has also increased opportunities for snooping.
Computer Privacy Essay Research Paper Computer PrivacyIn
Computer Privacy Essay, Research Paper Computer Privacy In the information technology world today there is a problem that can ruin a company. Bad publicity and finger pointing usually precede the problem. After this the federal government steps in and regulates things. The problem I am referring to is computer privacy.
Home Computer Network Essay Research Paper Have
Home Computer Network Essay, Research Paper Have you ever needed to have more than one home computer for you and your family? Do you have two or more computers, but need to copy and/or share files and/or programs between them, but you don t know how? Do all of your computers need Internet access, but you don t want to have a phone line installed for each of them? Well, you can do all of this.
The Right To Privacy Essay Research Paper
The word “privacy” does not appear in the U.S. Constitution, though a number of Supreme Court opinions have held that the Fourth, Fifth, Ninth, and Fourteenth Amendments offer some constitutional backing for a right “to” (as opposed to an enumerated right “of”) privacy. This right has been applied to cases involving privacy versus law enforcement, voyeurs, freedom of the press, the release of personal information, and personal choices.
Computer Privacy Essay Research Paper Computer Privacy
Computer Privacy Essay, Research Paper Computer Privacy Issues An issue of concern at is Computer privacy. Computer privacy techniques have been developed to protect single computers and network-linked computer systems from accidental or intentional harm. The main reason for protecting these computers is to keep them from physical loss of data, deception of computer users and the deliberate invasion of databases by unauthorized individuals.