logo

Information Communication Technology Ethics

   

Added on  2023-06-09

9 Pages2007 Words378 Views
Running Head: ICT Ethics 0
Information Communication Technology Ethics

ICT Ethics
Contents
Introduction...........................................................................................................................................2
What is going on?..................................................................................................................................2
What are the Facts?...............................................................................................................................2
What are the Issues?..............................................................................................................................2
Who is affected?....................................................................................................................................3
Ethics Analysis......................................................................................................................................3
Ethical Issues and Implications..............................................................................................................5
What can be done about it?....................................................................................................................5
What options are there?.......................................................................................................................5
Which option is best and why?..............................................................................................................6
Conclusion.............................................................................................................................................6
References.............................................................................................................................................7

ICT Ethics
Introduction
There is a huge advancement in Information technology and with this advancement it
is followed by some ethical difficulties. Providers make profit and also maintain balance
between ethics and profit that is unaware by the users. Information Technology wrong use
must be considered by businesses, software developers and individuals. The user information
used on applications and email, the user expect privacy of that information and the provider
ethical duty to use that responsively. In a recent case it was revealed in the March, 2018
edition of The Guardian, Walladr (2018) states “50 Million Facebook profiles harvested for
Cambridge Analytica in a major data breach”.
What is going on?
Millions of Facebook users data has been harvested by Cambridge Analytica without
the permission of user’s and from that huge marketing database been made on each user likes
and interests between 2013 and 2015 (Walladr 2018). The profiling system been offered by
Cambridge Analytica to many political campaigns using a personality profiling methodology.
What are the Facts?
In information technology ethics the Facebook data leak as it can be called a biggest
ethical breach of privacy. Loophole in Facebook API from which Cambridge Analytica was
able to take this data because of that loophole the user’s data been taken but also the user’s
friend’s data also had been collected. This access has the rule that says this access cannot be
marketed or sold but Cambridge Analytica violated this rule promptly.
What are the Issues?
Due to Data breach of Facebook had been blamed huge for allowing Cambridge
Analytica to took its data but it’s been reported from various reports that it is a leak of the
data or might hacked or a serious violation of Facebook policy but this is wrong. Mobile
developers got an access because Facebook has allowed that access. In New York Times the
Facebook spokesperson said that “No System was infiltrated, and no passwords or sensitive
pieces of information stolen or hacked” (Rosenberg 2018). Until 2015 Facebook did not
cared but in 2015 when Facebook blocked access to the third party API to the kind of huge

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Understanding Ethics and Professional Practice
|17
|3443
|84

Computer Security Breaches
|7
|2314
|447

Data Breaching from Facebook: Three Distinct Perspectives of Applied Ethics
|7
|2725
|328

Cambridge Analytica Scandal: An Analysis of Ethical Issues
|14
|3221
|241

Cambridge Analytica Case Analysis
|10
|2868
|226

Critique of Act Deontology and Rule Deontology
|10
|2378
|27