Ethical Issues of Information and Communication Technology

Verified

Added on  2022/10/02

|16
|3692
|199
AI Summary
This assignment explores the ethical issues of information and communication technology (ICT), including security, access control, data transmission, and more. It discusses the social, legal, and ethical characteristics of ICT and its impact on society. The assignment also covers technical, cultural, and economic aspects of ICT, as well as ICT guidance policy. Read on to learn more about the challenges and opportunities of ICT in modern society.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: INFORMATION AND COMMUNICATION TECHNOLOGY
INFORMATION AND COMMUNICATION TECHNOLGY
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1INFORMATION AND COMMUNICATION TECHNOLOGY
Table of Contents
Introduction:-...................................................................................................................................3
Discussion:-.....................................................................................................................................3
Issues of ICT:-.............................................................................................................................3
Social Legal and ethical characteristic of ICT:-..........................................................................4
Security and protection of ICT:-..................................................................................................5
Access control of Information:-...............................................................................................5
Proper data transmission:-.......................................................................................................5
Storage security and data disposal:-........................................................................................5
Security Issues:-...........................................................................................................................6
Human error:-..........................................................................................................................6
Hacking:-.................................................................................................................................6
Spoofing:-................................................................................................................................7
Viruses:-...................................................................................................................................7
Sniffing:-..................................................................................................................................8
Theft:-......................................................................................................................................8
Data Loss:-...............................................................................................................................8
Biometric Identification:-........................................................................................................9
ICT and Cybersecurity:-..............................................................................................................9
Technical Aspects of ICT:-..........................................................................................................9
Document Page
2INFORMATION AND COMMUNICATION TECHNOLOGY
Cultural Aspects of ICT:-..........................................................................................................10
Economic Aspects of ICT:-.......................................................................................................10
ICT guidance policy:-................................................................................................................11
Conclusion:-...................................................................................................................................11
References:-...................................................................................................................................13
Document Page
3INFORMATION AND COMMUNICATION TECHNOLOGY
Introduction:-
ICT is one of the innovative ideas for modern technology. The full form of ICT is
information and communication technology. This technology helps to broadcast the signal
through the internet network, wireless communication, and telephonic medium. Without the
assistance of ICT, the user cannot communicate. Not only has the communication, but ICT also
helped to transmit the information with the help of the server (Monostori 2014). Business
organization easily stores a huge number of data for modern technology. Customer satisfaction is
one of the basic criteria for business growth. ICT is the computer that enables technology and it
is used at the same time with information technology. There is some relationship between
business and ICT. Business growing mainly depends on Information and communication
technology. ICT is one combination of information technology and communication technology.
Unfortunately, some dishonest person tries to hack the security systems of ICT. They try to
access the network server then easily manipulate the information. ICT is important for every
person because this communication media helps to promote and monitoring any human issues.
ICT delivers bigger information and can help to access the information. ICT also helps to
increase the educational knowledge.
Discussion:-
Issues of ICT:-
In this assignment, the main discussed topic is the ethical issues of information
technology and communication. Social media and telephonic media is the biggest gift for human
and also the biggest dangerous for human. ICT implementation is helpful but it also dangerous
for human health, human character, and education. First of all, every human being is not survive
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4INFORMATION AND COMMUNICATION TECHNOLOGY
without electronics devices like telephone, mobile, internet laptop, etc. According to the
research, the researcher investigates that one person can access their device in a minimum of 14
hours in a day. It is a very unhealthy activity for humans. They easily lost their mental balance
and also health structure. In another case, 65 to 70% of humans ordered their daily necessities
online. Without the reaching in market human beings are easily get all daily necessities. It is very
much bad for there health. Without the minimum exercise, human beings cannot belong in many
days. The last issues are very much dangerous for the growing child. With the help of the
internet and ICT medium education is very much growing day by day. The student easily gains
good knowledge by this medium. But continuous internet surfing is very dangerous for children's
health as well as education. The students also suffering from laziness, eye problems, brain
disturbance. Human beings are more selfish about this technology because they are always busy
with telephonic communication. They easily forget the face to face conversion and it is effective
for human character.
Social Legal and ethical characteristic of ICT:-
Each innovation has pros and cons to society. ICT deliver efficient and easier storage and
data recovery method. But ICT suffers from copyright issues of images, videos, software, music,
etc. ICT has made the investment, trade, e-commerce, and on-line transactions but suffer from a
hacking, cyber crimes, and loss. The Internet has made the entire world a small area. But
unfortunately, the internet is polluted with offensive contents like worms, viruses, and spam. At
this moment ICT is not limited to engineers, researchers, and scientists. When the common
people used this ICT then they don't understand the consequences of this incident. It has become
a general fact, affecting people at different stages in their position like consumers, participants,
Document Page
5INFORMATION AND COMMUNICATION TECHNOLOGY
service providers. One of the biggest responsibilities of the common user is to use ICT
technology in very correctly.
Security and protection of ICT:-
Access control of Information:-
A primary opinion of ICT security is to secure the information that any management
holds. Some numbers of technical protection procedures that are commonly used to control and
monitor to secret data. There are some measurements are relating to the data security policy.
First of all proper system construction plans are important for maintaining the security structure.
After maintains the proper structure then connect this with the perfect internet address.
Securing the IP is a very much important part of ICT security.
Proper data transmission:-
If any business administration cannot secure their data then an unethical person easily
manipulates this data. So it is important to create the data path for securing data transmission.
One of the biggest processes is encryption. Encryption mainly restricts to access all information
by any unauthorized users. If any type of information moves on the proper gateway then an
unethical person cannot access this path.
Storage security and data disposal:-
Measures for data disposal and storage security are another part of ICT privacy processes.
Important evidence must be secured for the data life which should be released perfectly. The
official creates a parallel data set and accesses this data set for securing the official data, it is
very much a healthy procedure to secure this information.
Document Page
6INFORMATION AND COMMUNICATION TECHNOLOGY
Security Issues:-
Information Technology and Communication establish a platform of human education,
lifestyle and social activities (Mishra, Akman and Mishra 2014). ICTs uphold the information
exchange, globalization, and production of the business. The profit of using these technologies is
huge and human being accepts it very easily. Day by day human is revaluating by the digital
enhancement and human more and more dependent on these implementations. Additionally,
these technologies have developed into such specific domains like wireless communications,
mobile communications, and satellite broadcasting. This type of difficulty is very much affecting
human beings and business organizations.
Human error:-
Human error can be explained as the mistake made by a personality. But it turns out to be
a bit more difficult than that (Sánchez, Cortijo and Javed 2014). Human makes this type of
mistakes and the outcome of these mistakes is very dangerous. When someone made a mistake,
then they confused by other causes of the design. Human mistake as an equivalent mechanized
design flows, defects, equipment damage to the environment. It may also happen when the
direction does not follow the accurate or overlook the warning protection.
Hacking:-
Hacking is the adjustment process of the system. The person who is constantly doing this
activity called a hacker. There are two types of hackers one is ethical and another is unethical.
The ethical hackers are working for any particular organization and they try to secure their
system from any unwanted disturbance. Unethical hackers are very much dangerous for any
organization and society also. They mainly try to access all types of a network without any
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7INFORMATION AND COMMUNICATION TECHNOLOGY
permission. At this moment the numbers of unauthorized hackers are increasing tremendously.
The unauthorized hacker hacked these ICT devices by malicious files, viruses, and junk
messages. They send these messages to the business operator. If the business operator cannot
aware of this message they easily struggling from this hacking. These issues are very much
obstacles to business development.
Spoofing:-
The dishonesty thought it was an unreliable e-mail and web site from the source but it
will not.. The most popular type is the e-mail and Internet Protocol spoofing and website
deception.
Fraud or deception in mail spoofing mainly used software to generate the sending message. Web
page spoofing, an unauthorized person will use the software to demonstrate that they have
created a non-functional web page to copy the definite goal of the page. The use of software in
internet address spoofing, the hacker redirected with this false web page.
Viruses:-
A computer virus is a little computational program. This program planned to increase
from one system to another with the computational procedure. Through the procedure, the
system's Internet and computer are receiving this virus. Many computer junks stopped before
working, but there are some viruses are damage the computer files and software. Computer
viruses remove any information about the computer (Rehg 2015). If someone using the e-mail
program then these viruses to increase it to other systems and also even erase all files and
folders. The characteristics of the virus are to duplicate itself (Wellington 2015). This means the
systems virus dissemination by making a replica of itself. This intentional replica is part of the
Document Page
8INFORMATION AND COMMUNICATION TECHNOLOGY
virus effect. In every case, some of the common viruses are affecting the different types of
systems.
Sniffing:-
Online transaction is the most common things at this moment. Human beings are used
their credit or debit card for this transaction (Wu et al. 2015). By using the sniffing process the
hacker easily collects these financial documents and manipulates them. This is the one type of
crime and by this sniffing the hacker easily collects the card number, pin code, and customer
verification number(Lee, Son and Kim 2016). When an unauthorized person collects these
banking details then they easily withdraw huge money. Sniffing is very helpful to collect
responsive data like user name and password, Credit details and bank account information.
Theft:-
Theft happens when a hacker copies someone’s uniqueness to practice break down. This
is frequently done by access individual information of someone else (Sampson and Osborn
2015). The minutiae used in such offense include credit and debit card numbers, social security
numbers, passport numbers and date of birth, etc. Once the data has been obtained by the hacker,
it can be used to make buy online while takeoff himself to be someone else. In these ways, the
hacker uses to gain such individual information.
Data Loss:-
If the information was flooded, then the data hardware can be spoiled. Any successful
organization can create a remote data centre for secure some internal official evidence (Laczniak
and Murphy 2019). The supports are made occasionally and are frequently put in more than one
isolated area.
Document Page
9INFORMATION AND COMMUNICATION TECHNOLOGY
Biometric Identification:-
This is now attractive and common features of ICT devices. The device can trace the
operator’s fingerprint and use it for verification reasons. But it is harder but not impossible to
collect this user's biometric details. Such technology can also be used to stop illegal people from
accessing.
ICT and Cyber security:-
There is some basic difference between cybersecurity and ITC security. Cyber security is
a common attack like unauthorized access, viruses, malware on system devices like computers,
laptops, etc (Stahl, Timmermans and Flick 2017). But ICT security helps to ensure the growth
level, control, methods in the organization. Business organizations are trying to secure their
confidential data and this data saving strategy is very much important. ITC security is thus
considered a bit broader than cyber security.
Technical Aspects of ICT:-
Electricity, Technical structure, and communication networks are important for ICT
development. Bad quality communication infrastructure is very much dangerous for ICT
implementation. Bad Internet penetration, interrupt bandwidth can also delay the active
application of ICT (Quan-Haase, Martina and Schreurs 2016). Generally, this technology can
provide reliable and faster facilities for common users. The deployment and acquisition of ICT
can be slowed down by financial, personal and legal constraints. In spite of the clear advantages
of ICT can lead to numerous disadvantages. ICT bounds to the least interaction between teachers
and students. The learner is always busy with the computer and the internet. For this reason,
human beings lose their face to face speaking ability. Without practical communication, the
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10INFORMATION AND COMMUNICATION TECHNOLOGY
human cannot elaborate on their activity and thinking process. In this way, human being loses
their social relationships.
Cultural Aspects of ICT:-
At this moment the network authorizes the human to contribute too many cultural actions.
With the help of ICT, the human easily accesses the internet at any time and any places. But
these profits also create some weakness for human (Graham and Dutton 2019). With the help of
ICT, some people easily adopt the new culture and they forget their inborn culture. ICT are
gradually combined into the creative and cultural sectors. The developing countries updated
there creation, cultural content, and distribution for ICT implementation. The cultural
transformation was mainly occurred by the usage of ICT in developing countries. According to
the research, the researcher observes proper proof that technology initiates changes in cultural
values and self-construal. Human used laptops, mobiles or any modern device are structured by
ICT. These devices are very much innovative and increase the modern culture of any nation.
Economic Aspects of ICT:-
Information and communication technology helps to enhance any type of business. A
business organization can change its manufacturing strategy and production plan by
implementing the ITC (Burbules 2018). Business organization easily stores a huge number of
data for modern technology. Customer satisfaction is one of the basic criteria for business
growth. At this moment any business authority can easily communicate with their customer and
customer also provides the feedback (Anderson et al. 2014). So the customer-business
relationship is very much enhancing by ITC. At this moment the biggest number of people are
like to use online mediums. Without the help of ITC, any business association cannot start its
Document Page
11INFORMATION AND COMMUNICATION TECHNOLOGY
online retailing process (Silverstone 2017). But one biggest negative side is the ethical issues.
The unethical person tries to access any business server then they easily manipulate important
official evidence. If any business organization trained its employees for resolving these issues
then all employees are very much aware of this. It is difficult to absorb this technology as soon
as possible but it is also necessary for their business betterment. The information and
communication technology is trying to enhance this modern society but some unlawful activities
decrease this enhancement.
ICT guidance policy:-
With huge control comes great duty. ICT systems bring original prospects and
compensation to the business but they also initiate problems that can harmfully affect society
(Carvalho, Francisco and Relvas 215). Any business wants to address this problem and come up
with a proper framework. ICT plays an immense role in improving modern technology
(Vaishnav and Kuechler 2015). This technology sometimes suffers from privacy issues. If the
user follows some guidelines then they easily recover these types of problems. First of all users
must aware of the basic operating principles of devices. If they know how it works and them
easily understand the hacker's activity. Then the user should observe the using procedure of ICT
devices (Bloom et al. 2014) .If they change their system password daily then hackers cannot be
traced to their systems. One importing thing is Password should be identical and the user should
not share this with anyone. If the user updates their system software daily or monthly then-
modern version can easily observe any unauthorized notifications.
Document Page
12INFORMATION AND COMMUNICATION TECHNOLOGY
Conclusion:-
Information Technology and Communication have numerous characteristics of human
lives and contribute to a significant finding in modern science. While the profits are huge then
quite a few aspects are impacting harmfully on ICT. These effects are restrictive in their
proceeds and control their production. The lack of safety alertness, design difficulty, multi-
layered approach, and operating system security are the current troubles with ICT. These
troubles tend to continue in the future because machinery systems are altering so quickly. But
some progressive businesses and governments are very much aware of these incidents. The
success of the organization rides seriously on a complete execution and development schedule
that involves all portion of administration. The system needs new structures, processes, training
to enlarge new values and skills. ICT takes delivery of meaning only if citizens use and perform
them for an exact reason and if the local group of people can regulate over their use by
appropriating and interpreting them for their definite social authenticity.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13INFORMATION AND COMMUNICATION TECHNOLOGY
References:-
Anderson, A.A., Brossard, D., Scheufele, D.A., Xenos, M.A. and Ladwig, P., 2014. The “nasty
effect:” Online incivility and risk perceptions of emerging technologies. Journal of Computer-
Mediated Communication, 19(3), pp.373-387.
Bloom, N., Garicano, L., Sadun, R. and Van Reenen, J., 2014. The distinct effects of information
technology and communication technology on firm organization. Management Science, 60(12),
pp.2859-2885.
Carvalho, J., Francisco, R. and Relvas, A.P., 2015. Family functioning and information and
communication technologies: How do they relate? A literature review. Computers in Human
Behavior, 45, pp.99-108.
Graham, M. and Dutton, W.H. eds., 2019. Society and the internet: How networks of information
and communication are changing our lives. Oxford University Press.
Laczniak, G.R. and Murphy, P.E., 2019. The role of normative marketing ethics. Journal of
Business Research, 95, pp.401-407.
Mishra, D., Akman, I., and Mishra, A., 2014. Theory of reasoned action application for green
information technology acceptance. Computers in human behavior, 36, pp.29-40.
Document Page
14INFORMATION AND COMMUNICATION TECHNOLOGY
Monostori, L., 2014. Cyber-physical production systems: roots, expectations, and R&D
challenges. Procedia Corp, 17, pp.9-13.
Quan-Haase, A., Martin, K. and Schreurs, K., 2016. Interviews with digital seniors: ICT use in
the context of everyday life. Information, Communication & Society, 19(5), pp.691-707.
Rehg, W., 2015. Discourse ethics for computer ethics: a heuristic for engaged dialogical
reflection. Ethics and Information Technology, 17(1), pp.27-39.
Sampson Jr, J.P., and Osborn, D.S., 2015. Using information and communication technology in
delivering career interventions.
Sánchez, R.A., Cortijo, V. and Javed, U., 2014. Students' perceptions of Facebook for academic
purposes. Computers & Education, 70, pp.138-149.
Silverstone, R. ed., 2017. Media, technology and everyday life in Europe: From information to
communication. Routledge.
Stahl, B.C., Timmermans, J., and Flick, C., 2017. Ethics of Emerging Information and
Communication technologies on the implementation of responsible research and
innovation. Science and Public Policy, 44(3), pp.369-381
Vaishnavi, V.K. and Kuechler, W., 2015. Design science research methods and patterns:
innovating information and communication technology. CRC Press.
Wellington, J., 2015. Educational research: Contemporary issues and practical approaches.
Bloomsbury Publishing.
Wu, S.P.J., Straub, D.W. and Liang, T.P., 2015. How information technology governance
mechanisms and strategic alignment influence organizational performance: Insights from a
matched survey of business and IT managers. Mis Quarterly, 39(2), pp.497-518.
Document Page
15INFORMATION AND COMMUNICATION TECHNOLOGY
Burbules, N., 2018. Watch IT: The risks and promises of information technologies for education.
Routledge.
Lee, A.R., Son, S.M. and Kim, K.K., 2016. Information and communication technology overload
and social networking service fatigue: A stress perspective. Computers in Human Behavior, 55,
pp.51-61.
chevron_up_icon
1 out of 16
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]