StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Best Approach to Address Computer Technology Related Ethical Problems - Research Paper Example

Cite this document
Summary
This paper 'Best Approach to Address Computer Technology Related Ethical Problems' tells us that  “Computer technology has improved our lifestyle far better than before”. Some of the main benefits of computer technology include advanced communications, scientific discovery, and quick information processing…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
Best Approach to Address Computer Technology Related Ethical Problems
Read Text Preview

Extract of sample "Best Approach to Address Computer Technology Related Ethical Problems"

To me, the use of traditional laws would be the most suitable option to deal with computer technology-related ethical problems. The reason is that computer crimes have become so much common and difficult to deal with that there needs to be some proper way to prevent such crimes. Illegal use of a computer has become one of the most common offenses (Patrus, 2011). Computer crimes are just like traditional crimes because the offender intends to achieve personal benefits by putting others in trouble. For example, hackers hack the passwords of the computers of other people to steal private information to use it for their benefit “Hacking can get you into a lot of trouble as it is essentially breaking into a computer which has purposefully been made to be private” (Coles, 2010). Similarly, some people copy and use proprietary software without paying money. An undertaker makes use of intentness Trent breaks into another computer to destroy the data present in those computers. Therefore, there must be some special way to address such activities. For example, a person, who copies private information of others from their personal computers, should be dealt the with wait a person is punished for robbery. Similarly, there should be a law that should hold a person ineligible to apply for jobs in case he/she produces fake documents to get a particular job.

Depending on the codes of ethics does not provide a proper solution to the problem of computer crimes because hackers and other culprits do not give importance to the codes of ethics at all. Codes of ethics just make computer users aware of what is right according to the ethical perspective of computer use and what one should not do. The use of traditional laws for computer crimes can provide a good solution to deal with technology-related ethical problems. Traditional laws are successful in dealing with traditional crimes because law enforcement agencies can identify the criminals and can punish them. In case of computer-related crimes, the government of a country should use traditional laws to prevent people from doing any kind of criminal activity using computers. There must be a separate section of computer ethics-related laws in the constitution of every country. Moreover, the government should make people aware of the laws to make them recognize computer ethics and the penalties for different types of computer-related crimes.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“In your opinion, what is the best approach to addess the the ethical Research Paper”, n.d.)
Retrieved from https://studentshare.org/information-technology/1592275-in-your-opinion-what-is-the-best-approach-to-addess-the-the-ethical-problems-presented-by-computer-technology-for-example-should-we-depend-on-codes-of-ethics-laws-have-special-laws-use-traditional-laws-for-traditional-crime-justify-your-answer
(In Your Opinion, What Is the Best Approach to Addess the the Ethical Research Paper)
https://studentshare.org/information-technology/1592275-in-your-opinion-what-is-the-best-approach-to-addess-the-the-ethical-problems-presented-by-computer-technology-for-example-should-we-depend-on-codes-of-ethics-laws-have-special-laws-use-traditional-laws-for-traditional-crime-justify-your-answer.
“In Your Opinion, What Is the Best Approach to Addess the the Ethical Research Paper”, n.d. https://studentshare.org/information-technology/1592275-in-your-opinion-what-is-the-best-approach-to-addess-the-the-ethical-problems-presented-by-computer-technology-for-example-should-we-depend-on-codes-of-ethics-laws-have-special-laws-use-traditional-laws-for-traditional-crime-justify-your-answer.
  • Cited: 0 times

CHECK THESE SAMPLES OF Best Approach to Address Computer Technology Related Ethical Problems

A Fundamental Role in Caring for the Sick

computer technology is rapidly evolving, and research is not examining and documenting its impact on the nursing profession.... n a profession focused on providing evidence-based practise, current and relevant evidence is needed regarding nurses' current application of computers and the health-related impact of usage on nurses.... Nurses have incorporated technology from the poultices of the 1900s to the intravenous balloon pumps of the 1970s....
12 Pages (3000 words) Essay

Ethical versus Unethical Hacking

Furthermore, by discussing and analyzing the different theoretical approaches that different authors have made, in determining ethics and/or the definitions/interpretation of hacking, the analysis has engaged in a diverse approach to the literature and sought to reflect this with respect to the representations and determinations that have been made.... The paper "ethical versus Unethical Hacking" highlights that the boundary between ethical and unethical hacking is slim, and it calls for qualities such as trustworthiness to ensure that system administrators do not use sensitive information maliciously....
10 Pages (2500 words) Research Paper

Local Area Networking Technology

In this regard, a specific networking technology is utilized to give a clear insight into the best way of having the primary school's networking devices connected in the most effective way possible.... The best way of initiating this distinction is to employ an IP address that is fully visible to the primary school management.... In this regard, each student or teacher accessing the website for the first time will collect the IP address of the server as well as the service port number....
15 Pages (3750 words) Assignment

The Ethical Issues of Information Security

Information security problems that arise most of the time are not technical problems but people problems.... This is because ethical issues do not arise because of technical problems but because of people either intentionally or by accident (Buchanan & Huczynski, 2004).... The paper "The ethical Issues of Information Security " looks at the ethical issues of information security as well as the various legislations that have been made to guarantee information security to individuals as well as to organizations and the empirical theories that explain behavior....
8 Pages (2000 words) Term Paper

Ethical and Privacy Concerns of Big Data

The paper "ethical and Privacy Issues of Big Data" is a wonderful example of a research proposal on information technology.... The paper "ethical and Privacy Issues of Big Data" is a wonderful example of a research proposal on information technology.... n this proposal, ethical and privacy concerns of large volumes of data will be researched on to detail.... This obviously has implications on the ethical and privacy aspect of an organization since in most cases, the large volumes of data comprise of business secrets (Wu et al....
6 Pages (1500 words) Research Proposal

Technological Ethics, Cyber Ethics

It, therefore, becomes a practical approach to the problems concerning information ethics and computer.... It differs from ethical approaches that are either legal, cultural, or personal.... The ethical term used for computer ethics is cyber ethics.... Cyberethics is an ethical issue that both computer professionals and machines face.... In AEC's case, it's evident that the new information technology computer will bring more benefit to the company as opposed to having many human employees....
6 Pages (1500 words) Article

Computer Security Problems and Measures

The paper 'Computer Security problems and Measures' is a great example of an Information Technology Case Study.... The paper 'Computer Security problems and Measures' is a great example of an Information Technology Case Study.... The paper 'Computer Security problems and Measures' is a great example of an Information Technology Case Study.... It is considered an important means of improving computer security; however, it has led to various problems such as sluggish response time, user antagonism, as well as reduced performance....
6 Pages (1500 words) Case Study

Ethical Teaching as a Solution to Computer Security Problems

The paper 'Ethical Teaching as a Solution to Computer Security problems" is a good example of an information technology report.... This report describes was created in 2015 to raise awareness on the following issues: why software licensing is antisocial, whether ethical teaching is the solution to computer security problems, and whether the removal of the computer security measures would reduce the incidences of the computer fraud.... The paper 'Ethical Teaching as a Solution to Computer Security problems" is a good example of an information technology report....
6 Pages (1500 words)
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us