A Detailed Report on Ethics in IT and Computer World [Year]

Verified

Added on  2020/03/02

|14
|3910
|460
Report
AI Summary
This report provides a detailed exploration of ethics within the IT and computer world, addressing key areas such as computer crimes, data privacy, and ethical hacking. It begins with an introduction to computer ethics, tracing its origins and evolution, and presents a literature review that examines workplace computer ethics, computer crimes, privacy concerns, and the impact of technology on democracy. The report highlights the importance of professional ethics, including the conduct, practices, and behavior within professional organizations. It also discusses the role of ethical hackers, intellectual property, and the need for ethical training and decision-making processes. The research methodology emphasizes the significance of ethical standards, integrity, and social audits. Finally, the report stresses the importance of public awareness regarding ethical issues in IT and the necessity of addressing hacking threats and plagiarism. The appendices include references to journals and other sources used in the research.
Document Page
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Abstract
A detailed research on the topic of ethics in IT and computer world has been carried.
A literature review is done with the help of some journals whose information are
provided at the appendices. The literature review has somehow managed to fill the
gap between the research questions and the current issues. It shows the relevance of
the topic and develops a suitable methodology that would allow them to answer it.
Document Page
Contents
1. Introduction............................................................................................................................4
2. Research question...................................................................................................................4
3. Literature Review...................................................................................................................5
5. Project Plan..........................................................................................................................10
6. Conclusion............................................................................................................................12
7. References............................................................................................................................12
8. Appendices...........................................................................................................................12
1. Introduction
Document Page
The computer ethics were started in the year of 1940 as a new branch called as computer
ethics and information ethics. This applied science has given the name as Cybernetics by
great professor Wiener, who is a famous researcher on noise and stochastic process. The
cybernetics deals with the science and the ethics of the computers and information. The
cybernetics book was written in the year 1948. It is an interdisciplinary study. There was
another book released on Human use of human beings in which the computer ethics and the
information system ethics were handled (Nielsen, 2014). The term computer ethics was first
given by Walter Maner in the year 1976. That time the ethics were mostly related to the
medical field only. But later its was expanded to many other fields due to the expansion of
computer usage. Then people started using terms like computer crimes, the privacy of data,
confidential data, etc. The new issues like hacking gain more prominence, where people had
divided into two types of hacking. One is an ethical hacking group which protects the people
from the negative ways and other people are dangerous for the file and system safety.
2. Research question
This also questioned the privacy of the disabled people who cannot operate the computers
independently. There was a huge impact on democracy due to the internet.
What was the threats to the huge privacy on data?
To whom the ownership of the software must be given ?
How the ownership must be protected ?
Why should one must teach ethics in student level?
3. Literature Review
The work place computer ethics was the hot topic in modern days. The computer has become
the universal tool. It has replaced the human beings and their jobs too. Due to its fastness,
accuracy and no errors made the replacement for the human beings. But in long term, they
have created many jobs in the sector of IT (Paz, Paz, Villanueva and Pow-Sang, 2015).
The computer crime comes under this ethical part. The computer crimes may happen due to
the computer and software viruses and hackings (unethical hacking). The main concern here
is the privacy and the confidential integrity where the third person controlling some
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
applications or systems. The malicious software where the virus attacks the system which can
crash entire data. This may also cause some severe effects on the software. Many of these
computer attacks are happening by the insiders and the trusted personalities. The ethical
hackers here plays a key role in overcoming these kinds of problems. One has to know the
consequences of this virus and the software attacks on the computer systems and the services.
Privacy is the basic lesson of the computer ethics, one has to know about when the person
must reveal the data to the second person. If the above step fails then the people face many
problems in the ethical point of view (Mosqueira-Rey, Alonso-Ríos, Vazquez Garcia, del
Río and Moret-Bonillo, 2009).
The data collection will also lead to the distribution, where the data is flowing? Is it safe with
the next person? In the year 1970 major privacy bills were passed in the united states as the
computer revolution is taking place. This has also discussed the process of the data collection.
The efficiency of the data collection and the control of the data. One example of this kind is
medical reports and the prescription then lead to data mining and the data storage. The
computer crime can be done with the computer as a target, storage devices of the computer,
computer tools. When the computer as a target, then the people may access it with the
improper authentication, theft of the services. In the storage attack one may expect the data
lost or stolen with big damage to data like copying, password change and the deletion of
some key files.
Document Page
Figure: Cycle of the Cybernetics
Professional Ethics: The professional ethics are associated with the conduct, practices and
behaviour in the professional organization. The examples of this kind are like teaching, a
researcher in the lab, consultation, etc. The professional ethic is very important because of its
good will between an organization and the clients. One must consider the below things for a
good relationship with the clients (Schmetzke, Greifeneder, Yushiana, and Rani, 2007). The
basic thing is the good relationship with the profession and the clients associated with the
organization. The next one is associated with the profession and the people in the society.
The relationship is among the professionals in the organization or of the different
organization. The relationship is with the other grade workers in the same organization. The
persons who are in the field of computers must understand the ethical and the legal issues of
the computers. The responsibility is for the possible consequences of the work and the
success. Some organizations have the computing code ethics, in which the code data is
private and cannot share with the second person. The intellectual property here comes into
Document Page
act. This rule may slow down some process but the data safety is the primary idea behind this
law. The ethics have some professional code of conduct. Let us discuss in the following in
detail. The code will help in the symbolizing the professionalism which separates them
another group of people. The interest of the group is protected and will motivate the team
spirit which is the central idea behind the modern day organizations (Davis and Jiang, 2015).
The etiquette of the members will be improved. It leads to the inspiration to the good
conduct. The group members are educated and it gives the discipline in members. The
external relationship also will be improved in great ways which in turn benefits the
organization in a good way. This offers proper guidelines and gives the rights to the work
carried out by the group.
The ethics in the engineering field is even higher. The engineers are the people will good
skills and knowledge. The work done by the engineers will influence the people in the
society. Hence they must follow proper ethics to deliver their best. They must be honest and
follow the equity in the organization and the society also. They must stand by the public
health standards and the culture. The privacy in the computer ethic is vital in these days. The
computers are creating the false security in many ways. One has to aware of all the security
sense. People do not realize the importance of the system data often. The property of the
system can be associated with physical property or the software including the stored data.
The intellectual property includes the files associated with the patents and the copyrights. The
data property is the data access, in which the data in certain area or website can be referred by
cannot be owned (Paz and Pow-Sang, 2016). This also includes the computing technology
access, data access. The information sends also must aware of sending a data, where he can
lose his credibility to the confidential data.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Morality is associated with the conduct. It is more like right vs wrong. It always focuses on
the acts. Ethics are related to the character. It is the relation between good and bad, Virtue
and vice. It is completely related to the single person. Ethics are some guiding principles in
which the conduct of the person in the group or individual is related. Morality is just the
judgment of wrong and right. Ethics are much associated with the professional work and the
morality is much to do with the religion and the society. The ethics are uniform compared
with the moral due to its vast diversification. The theoretical ethics are classified into two
types. They are Metaethics and the normative ethics. The met ethics also knew as the
analytical ethics. Metaethics is the theoretical study logical issues in the ethics. It gives the
nature of judgements (Zarqa, Ahmet, Tarik Ozkul, and Al-Ali, 2014). Normative ethics are
one which tells some actions are good or bad. Some of the normative systems are religious
practices, moral values, game rules and another kind of laws. The ethics have to be learned,
which convey the clear sense of the professional responsibility. The computer must also treat
like the another person. Why should one must teach ethics in student level? It sensitizes the
students towards the issues of computer related works. It also helps in analysing the cases. It
helps the people in the good judgement and the ethical understanding. The ethics help to
study the conceptual level. The applied ethics are one which studies the everyday life of the
typical person. Professional persons follow the professional ethics in their field and pass on to
the next generation and same level people (Paz, Paz, Villanueva and Pow-Sang, 2015).
The computer related risks involve the reliability of the system, the safety of the data and the
devices, data security and the computer access security. The privacy of the data stored and
communicated through the system. The computers are created for the human well beings.
Document Page
The responsibility of the scientist in the computer age is the social responsibility with the
products designed.
4. Research Methodology
The experiments must carry on without the copy content. The data can be saved but the data
cannot be copied to claim the intellectual property. The values of the science must be realised
in the practice and in designing the product-related information. The publications must be
shared to avoid the confusion and betterment of the people.
One must follow the ethics in giving the authorship for the persons participated in the
experiment. There shouldn't be any miss conduct in the science, they must work for the
welfare of the people. The ethical standards must be improved time to time and one must
follow these ethical standards every time. The scientist group of society must work for
including or developing the new standards. Virtues are dealing with the habits of people in
which what is acceptable. The vices are opposite of the virtue where the things deal with the
unacceptable things. Integrity is an important aspect of ethical computing. Social audits are
necessary for recovering the mistakes of the past. It also allows avoiding the wrong steps in
future. The ethical training and workshops are necessary to avoid the flaws in the systems.
The decision making must be in the code of the ethical conduct. Some steps must be followed
in the ethical decision making. Collect the facts of the task. Note the positions of the stake
holders and their motion. Expect the results of the decision. Always consider some guidelines
and principles (Nielsen, 2014).
Develop the options and try to evaluate them. Always review the decision. The decision must
evaluate every time. The general public also must know about the ethical issues in
information technology. The Email monitoring system internet access ethics must be known
by the public for various reasons. Peer to peer systems must be monitored every time and
they must follow the given standards for the efficient implementation of the ethical work
culture. The hacking threats must be detected with the help of ethical hackers. The theft
issues must also address properly. The plagiarism is the must follow the rule in the present
day world. The spy wares also should be kept it best for the data protection and system safety
(Schmetzke, Greifeneder, Yushiana and Rani, 2007). It is not confused that the ethics must be
only applied to the IT industry. The important decisions must be always taken in concerned to
experts. The online adds must be monitored carefully.
Document Page
The information rights must be protected in all cases. There are 5 steps in the ethical analysis.
Analyse the fact and identify them in all possible ways. Try to identify and define the
conflict. Identify the higher values for the conflicts. Always be in touch with the stake
holders and identify them. Identify the clear options. Identify the best options to proceed in
the ethical path. Some of the challenges for the ethics on the internet are cookies, web bugs
and spyware. Intellectual property rights are one which is intangible created by the person or
a team. Flawless software must be used. The software bugs and errors must be avoided.
Hardware failures must be checked from time to time and some of them must be automated.
Data encryption is one of the best ways to hide the data and the privacy can be maintained.
This is the way of encoding the data in a team or the individual (Davis and Jiang, 2015).
In this case, only the sender and the receiver can read the message. Rest people cannot access
as it is encoded with a secret code. This will help people to make things confidential and
improves the integrity of the system. The online transactions and the applications of the
individuals can be safe by using the cryptography. The encryption is the process of
converting the data into an electronic format and decrypt in the receiver end by knowing the
sending code. Some algorithms must be used to encrypt the data. The spamming also major
problem in present day. The sending of a particular message, email, documents for a large
group of people. This is one of the inexpensive methods of marketing and public
advertisement. It can contain any kind of data. Generally, we require strong surveillance
systems like camera surveillance (Paz and Pow-Sang, 2016). The criminals must be identified
with the facial recognition software. The global positioning systems must be used for the
device and object locations. Standards of the system must be increased for various ethical
reasons.
5. Project Plan
Some of the basic computer ethics are checked the emails regularly. Use a common email for
all the important things. One must not delay in replying the emails as it may affect either
people. So people must reply the emails in short period of time. Use one of the best software
to get rid of the virus and other spams. Some times we must not open the emails when the
sender is unknown. If the message is suspicious then also we must not open it. One must not
type the emails in the capital letters (Zarqa, Ahmet, Tarik Ozkul and Al-Ali, 2014). Some of
the computer ethics are we should not use the computers to hurt others. It should not
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
interfere the work of others in the computer. We should not target to see or go through the
profile of others. The computer must not use for stealing the data. The computer must not
create false witness in any way. One must not use others computer without prior permission
and compensation after usage ensures everything working well. The intellectual property of
the other people must not be stolen when using their system. Mutual respect must be
maintained with the other online users. The personal code of conduct is described below. The
ethical computing must be honest and maintain the same with the other users of data and
systems. We must respect the time and the computers of the others. The confidential data
must be respected and should be used in a proper manner. The professionalism must be
maintained in the respective profession to be an ethical user of the computer and the software.
One must take the responsibility for usage of the data and computers in the organisation. The
communication is the major problem in the ethics (Nielsen, 2014). Proper communication
will eliminate problems in many ways. One must obey the cyber laws and follow the ethics.
Do not show the passwords or give the passwords to others in any way. The passwords must
be kept secretly. Ensure that your passwords are safe with you only. Never do the things
which decrease the reputation and brings you down in the society. One must be aware the
actions of self to protect his or her self-esteem. The identity must be protected in any field of
your organization. Try to log out of your portals every time after the usage. Never leave out
your printed copies at a common place. Respect the files of the others work. Never harass
anyone with computer or mobiles. Cyber laws have tightened in many ways, be aware of the
cyber laws. Do not abuse others for the storage space in the computer or the server. Citation
of information copied from the internet sources or the written books is must in present days to
avoid the plagiarism (Davis and Jiang, 2015).
The data must be obtained in a proper way, the information also must be selected in an ethical
way. The proper codes must be followed in the data selection. The verification must be done
in the correctness of the data and one must predict the consequences of the data collection.
The information must be used for accessibility of the organizational need or self. Some times
we may get free access to the data. There must be an intellectual freedom in the data usage.
The filtering must be used to get the quality data and reporting the same. Social networking
data sharing also a thing to remember concerned with the ethical computing and data.
Information sharing is permitted but the wrong data must not be circulated around in any
form. The IT professionals must use their power in an ethical way, they must not miss using
Document Page
the power in any form or way. The professionals must also work for the others. They must
get the reliable information from the other sources also. The professionals must clear in the
terminology they use in the emails, documents and the files of work. The communication
with others is to share the knowledge and achieve good results. They should share the bad
news and good news also. They must also respect the work of others for the better
cooperation (Paz and Pow-Sang,, 2016).
6. Conclusion
The email and internet access must be monitored in all the organization and government
offices. The downloading of unethical data and violating of code must not be supported. The
spam emails must be strictly restricted in any areas of the organization. The plagiarism must
be prohibited in all the areas of the research work which builds the proper ethics in the
system. The software tools and simulators must be used properly to extract the data. The
computers used in the banks, ATMs, government and private offices must ensure the safety
of the stake holders and their customers. The data safety and protection is always important.
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]