Ethical Use of Computers and Networks: An Organizational Perspective

Verified

Added on  2020/03/23

|5
|1766
|102
Essay
AI Summary
This essay examines the crucial topic of ethical computer and network usage within organizations. It begins by defining computer ethics and highlighting the emergence of new ethical issues alongside technological advancements. The essay then delves into specific ethical concerns such as privacy violations, identity theft, deception and misuse, and the importance of responsible decision-making. It analyzes these issues, exploring topics like data security, license and copyright laws, trade secrets, and the impact of open versus closed-source software. The document emphasizes the importance of addressing these ethical challenges to ensure the protection and well-being of computer users, promote responsible technology use, and maintain data security. It concludes by emphasizing the importance of ethical guidelines and educational initiatives to foster a culture of responsible technology use and respect for others' privacy and data.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Ethical use of the computers and networks in any organisation
As the growing use of computers, ethically usage of computers and networks is significant. The word
“ethical” refers to the professional ethics in which PC specialists apply ethical codes and good
standard practices. Ethical use of computers and networks involve shrewd use of software, hardware
and data. Computer ethics is the examination of the nature and social effect of computer innovation
and the corresponding detailing and validation of policies for the ethical use of computer
technology.
Introduction to Ethical Issues Computers and Networks
New set of ethical issues are emerging with the growing of computer and network technologies.
These issues must be settled down in computer and internet technology to have a positive impact in
society. Communication, privacy, and cyber crimes are set of ethical issues that torment the
individuals who use internet on daily basis. By knowing the issues in computer utilization, it can be
resolved earlier. Today, computer ethical issues are a major concern to be looked for in the field of
privacy and maintaining the confidentiality of one’s information. Much of the IT professionals have
approach to the confidential information and learning about the people and organisation systems
and framework that give them a lot of admin powers. Those powers can be misused intentionally or
unintentionally. Numerous IT professionals perform their skills and actions in with a hacker’s
viewpoint. Truth be told, they don’t understand that their employments involve ethical issues. [1]
Ethical issues involve mainly privacy. For example:
1. Can it be okay that network admin can read the private email of their employees to
guarantee that delicate organisation data isn’t unveiled?
2. Can it be okay to scrutinize the web pages visited by system clients? Is it imprudent to not to
check such internet use, to maintain a good environment?
3. Is it OK to put key lumberjacks on machines on the system to catch everything the client
sorts?
Identifying the Ethical Issues
New PC technologies for collecting, controlling and conveying data are upsetting the utilization and
spread of data. En route, they are likewise making ethical issues. The accompanying issues are cases
of security issues which an association may need to manage:
A. Responsible ethical decisions.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
B. Secrecy and privacy.
C. Identity theft.
D. Deception and misuse.
E. Risk and liabilities.
F. Licence and Copyright laws.
G. Trading secret information.
H. Vandalize.
I. Open and closed source.
Analysis of Ethical Issues
A. Responsible decision making: It enables the companies to promote the ethical issues and
code of conduct that can be visible to their employees. It acknowledges their employees to
act sincerely and obey with the law. Choosing an effective and ethical decision is a way of
eliminating unethical behaviour and avoiding conflicts. Ethical decisions likewise affect on
the organization to make things correct regardless of the cost.[2]
B. Secrecy and Privacy: Large range of data related individual is collected everyday in places
like in hospitals, home services, licensing of things etc. and they are stored in computerized
form. This data holds critical information like credit card details, addresses, and personal
details of individuals. These data can symbolically used to deceive the customers.
If physically or remotely an unauthorised person is accessing your computer and network it
means violation or password changing can be done. [3]
C. Identity theft: It is considered as a protection break, unapproved access to, or exposure of,
individual data. Probably the theft happens when their data is stolen or erroneously shared.
Piracy of brand names is also a kind of identity theft. In this, the person creates same ditto
copy of the original brands and deceives people buying it.
D. Deception and Misuse: In this, PC can make a domain in which unapproved things can
happen. There are numerous violations in this category like robbery, blackmail,
misrepresentation etc. This domain incorporates the presentation of fake records into PC
framework, robbery of administrations, financial instruments and other profitable data.
E. Risk and liabilities: Liability is the warranty of the product quality to the purchaser and it is
the premise of the deal. Guarantee and certifications made by the seller to the client about
the quality of the product can be delegated as an express guarantee. All deals ought to be in
composing. These are guarantee given naturally in each deal. This will protect the quality of
Document Page
product going to the buyer and is fit for purposes for which comparable merchandise are
utilized.
F. Licence and Copyright law: Licence or patent can secure the part of an idea. It is hard to get
the patent as compared to copyrights. With programming, finish exposure is required for the
programmer to build the program. [4]
Copyrights give a huge lawful tool to build the program both before and after security
threats. This can manage the misrepresentation and misappropriation of data, PC projects.
Therefore, familiarity with copyright law is an important for the specialist to build products.
G. Trade secret: It secures something of significant worth and helpfulness. It secures special
and mystery parts of ideas, known just to their pioneers. Prized formula or trade secret is
critical in computer and network field, where a slight leak of information can give a huge
focussed advantage to the opponents.
H. Vandalize: The PC can be the assault of wrongdoings, for example, the unapproved using
computers, changing the passwords without owner’s consent, information record harm,
short circuit the PC or bombed. [5]
I. Open and closed source: There are numerous software products available in the market.
They can be divided into open and closed sources. Open source products are easily available
to user and they can be downloaded free of cost. Closed source software products provide
more security. It is difficult for the hackers to attack into closed source products. But they
can check the vulnerabilities through open source products and can harm the closed source
products.
These ethical issues look easy to sense but they are difficult to handle.
Evaluation and Justification of Ethical Issues
Computers and Networks are viewed as a standout amongst the most basic innovative advances and
have turned into a regular apparatus. Numerous organisations have turned out to be intensely
subject to PC, Internet and information frameworks for instructive reason. They are the way of
communicating among individual and organisations. In the meantime, they raise moral issues like
unapproved access, identity theft and data security.
To overcome the issues the proper use of concerned PC is done. Things are validated and embedded
with proper security to avoid the unethical challenges. The way toward assessing an estimation
instrument for unwavering quality and researching the factor structure are examined utilizing the
size of moral PC mindfulness. SAS techniques examine the PC in better way to maintain the inner
Document Page
consistency that is dependability of factor instrument. The examination with ECA codes inquire
about the variety of ethical issues later on. [6]
Conclusion
In a growing world of computer technology, the objectives of ethical use of computer and network
are to guarantee the protection and wellbeing of PC clients, to empower customers of any
organisation to utilize computer in right direction and to guarantee work done by somebody isn't
pronounced by another person. A focus should be on connecting with PC experts and joining their
groups can help us to dispose to computers. An emphasis on data framework failure and research on
them could give an idea about computer ethics. To ensure the ethical use of computers, computer
ethics subjects should be included in the curriculum activities of students as it will provide them an
introduction to computer and its network. It will enhance the capability of nation leading to a decent
nation. To accomplish this everyone should respect the privacy of others and utilization of products
should not affect others and end-user should be willing to pay for closed source and contribute for
sharewares. If user comes across any disparities he should inform legal authorities about the issue.
Terms and conditions of the organisation should be followed to guarantee the proper use of their
products. Genuineness and integrity can endeavour to morals.
Subsequently, we should take after all the approaches to enhance our morals keeping in mind the
end goal to accomplish all of the destinations as this issue truly essential in our day by day life which
are to ensure our protection, keep up our security and to respect others.
However, people are encouraged to follow the ethical use of computers while taking precaution
against the unethical ones. To wrap things up, PC morals are imperative for us to live serenely and in
peace thus we should do our part as PC clients, comply with all the PC morals.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
References
[1] https://en.wikipedia.org/wiki/Computer_ethics [Accessed 28 september 2017].
[2] Shinder, D. (2005). Ethical issues for IT security professionals. [Online] Available at:
https://www.computerworld.com/article/2557944/security0/ethical-issues-for-it-security-
professionals.html [Accessed 28 september 2017].
[3] Sinkey, L. (1995). Ethical use of computers and networks. [Online] Available at:
http://www.ucalgary.ca/InfoServe/Vol2.4/03_Ethical.html [Accessed 28 september 2017].
[4] Anonymous, (2016). Making Ethical Decisions: Process. [Online] Available at:
https://blink.ucsd.edu/finance/accountability/ethics/process.html [Accessed 28 september 2017].
[5] Anonymous, (2017). Ethical Issues. [Online] Available at:
http://niatec.info/ViewPage.aspx?id=153 [Accessed 28 september 2017].
[6] Kant, R. (2015). Computer and Internet Ethics. [Online] Available at:
http://www.cyberblogindia.in/computer-and-internet-ethics/ [Accessed 28 september 2017].
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]