Tuesday, December 10, 2019

Ethics in Information Technology †Free Samples for Students

Question: Discuss About the Ethics in Information Technology? Answer: Introduction Rapid growth of information technology has brought several changes in human lives. However, there are some serious ethical issues are faced by IT experts as well as users of information technology and they need to be ready for the challenges. Information technology faces several challenges that are lack of privacy, copyright infringement, and security as well as increased crimes in computers. There are several areas where ethical challenge are faced by the users such as ICT professionalism, privacy, security, cyber-crimes, intellectual property, regulation on the internet, social inclusion, community as well as pervasive and convergent computing. Present study deals with the ethical issues found in cyber crime. Ethical issues in cyber crime One of the ethical issues in information technology comes into act with cybercrime, which is named as ethical hacking. Johnson (2014) stated that the ethical hackers are also known as white hat hackers. They try to compromises the systems for sake of informing owner of the content so that they can fix the issue. Thus, security professionals need to be aware with the securities of the system. On contrary, security enthusiasts penetrate software as well as website and publish the issue along with solutions in some times in order to help the users. The white hat hackers send the information privately to creator as well as publish the hack in public. Software organizations as well as owners of websites are upset regarding people penetrating the systems. The motivations of hackers act into the procedure of hacking that is viewed in ethical realm. During attacking by the hackers for some times of obtain, it would come at the targeted cost system. These are looked down upon and not actually ethical ground in order to stand on the case. However, the hackers break into the system for gaining fun and better understanding of own skills. In addition, learning more about the security are involved in it, which is considered as involvement of ethical grey area (Sorell Draper, 2014). However, motivation affects the process of their actions by the hackers that are viewed by others. Hence, motivation plays as an important role in the ethics of action. On the other hand, hacktivism involves with the computers as well as internet in order to promote political as well as social cause. There are some categories of hacktivism that are not considered as illegal, like breaking into the system of proprietary as well as stealing of information. Moreover, some categories of hacktivism are legal such as parodies of website. Upadhyaya and Jain (2016) commented that denial service attack is one of the common types of hacktivism. The attack engages sending large amount of traffic to the specific website before reaching the limit as well as crashes. This kind of attack has achieved in distributed way. Thus, it reaches to the traffic that comes from multiple numbers of nodes across the world. It makes the particular source of attacks harder for tracing. Thus, denial service attacks are not legal under the law of USA (Sharma, Mittal Verma, 2015). However, it is tough to enforce. This attack engages sending of traffic in a large amount to the webs ite. Hacktivism is considered as ethical grey area. Many people claim that activities of hacktivists are protected under the free speech. Denial service attack accesses website at larger scale as well as accelerated the rate. There is any hacking or system penetration involved with it. The internet is one of the primary mediums for communication as well as grassroots movements that are utilizing in it (Broadhurst et al. 2014). On the other hand, internet is one of the primary mediums are involved with it. Hence, it is required to take proper actions regarding the matter. On the other hand, information technology has a central role in industry, government, education as well as entertainment and society in large scale. Economic as well as social benefits need not any explanation. However, there are any other technologies that have problematic implications as well as some negative impacts on the society. Cavelty (2014) asserted that it creates some issues associated with the ethics as well as containing major types of ethical issues such as personal privacy, rights for access as well as harmful actions. In addition, IT enables exchange of data on large scale and on the locations and parts of the world. In the particular situation, there is increased potential in order to disclose the information as well as violation of privacy to widespread disseminations (Bartolacci, LeBlanc Podhradsky, 2014). It is one of the major challenges as well as responsibility for maintaining privacy as well as integrity of data about individuals. It includes precautions for ensuring accuracy of data and protecting the device from unauthorized access as well as accidental disclosure to improper individuals. One of the ethical issues in the computing system is accessing right. Recent popularity of the international commerce on internet, computer security as well as access right is moved quickly from low priority for government agencies and corporations. There are several attempts of illegal access to the USA as well as military computers by hackers that have been widely reported (Lucas, 2016). Lack of appropriate security policies as well as network connections cannot be developed on the internet to make sure from illegal access. In the computer ethics, negative consequences are considered as harmful actions. Conclusion From the above discussion, it can be concluded that understanding security and privacy issues are important in cyber crime. As information in cyberspace is accessed globally, computer ethics is required to examine right and wrong things for internet users. There are various issues associated to human relationships as well as community that becomes during human activities carried in cyberspace. The basic issues are solved partially through utilizing technological approaches like encryption technique, digital IDs, SSL and computer firewalls. Hence, guidelines and strategies need to be implemented so that socially as well as ethically sensitive method for gaining future advantages and applications. It would be helpful to eliminate the ethical issues in cyber crime. References Bartolacci, M. R., LeBlanc, L. J., Podhradsky, A. (2014). Personal Denial Of Service (PDOS) Attacks: A Discussion and Exploration of a New Category of Cyber Crime.The Journal of Digital Forensics, Security and Law: JDFSL,9(1), 19. Broadhurst, R., Grabosky, P., Alazab, M., Bouhours, B., Chon, S. (2014). An analysis of the nature of groups engaged in cyber crime. Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities.Science and engineering ethics,20(3), 701-715. Johnson, J. A. (2014). From open data to information justice.Ethics and Information Technology,16(4), 263. Lucas, G. (2016).Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare. Oxford University Press. Sharma, M., Mittal, S., Verma, A. (2015). Cyber Ethics in Security Application in the Modern Era of Internet.IITM Journal of Management and IT,6(1), 140-143. Sorell, T., Draper, H. (2014). Robot carers, ethics, and older people.Ethics and Information Technology,16(3), 183-195. Upadhyaya, R., Jain, A. (2016, April). Cyber ethics and cyber crime: A deep dwelved study into legality, ransomware, underground web and bitcoin wallet. InComputing, Communication and Automation (ICCCA), 2016 International Conference on(pp. 143-148). IEEE.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.