StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Advancement of the Information Age - Term Paper Example

Cite this document
Summary
The paper "The Advancement of the Information Age" discusses that people getting ensuring that they uphold ethical standards will be instrumental in ensuring that hacking is eliminated in the information technology sector and that the right to privacy is maintained…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
The Advancement of the Information Age
Read Text Preview

Extract of sample "The Advancement of the Information Age"

Task The information age has come in to change every aspect of how people conduct business and relate with each other. With theadvancement of the information age, economic activities are based on using technology since it has developed and has being accommodated in all sectors. Despite the fact that information technology has been instrumental in increasing efficiency in every sector, there is the question of the right and wrong actions as it pertains to use of information technology and these issues are what are referred to as ethical considerations (Sembok, 2003). Ethics in information technology is a branch of philosophy that deals with how people should make decisions concerned with their professional conduct, when using information technology. Computers have dramatically changed information handling and communication, but have also caused ethical questions to be raised on standards that the users of information technology should uphold in order to be at par with the expectations from the society. The most theatrical abuse of computer technology is the rampant internet hackings of company websites and online theft of credit card numbers. Such cases are imperceptible, frequent and tied to everyday workings of ordinary, law abiding citizens and different situations are on the rise with great frequency due to computer hacking. Hacking is a situation where an individual referred to as a hacker, gains, or attempts to gain access to resources or services belonging to someone else from their computer databases, usually organizations or companies without their prior authorization or awareness (Davis, Philipp and Cowen, 2005). Such activities lead to the disruption of services, loss of data as well as vandalism of data, software or even hardware resources. Hackers are motivated by a multitude of reasons, which include, getting profits, protests, or to gain recognition based on the enormity of the challenge. Hackers have different attitudes and aims. They use different terms to differentiate themselves from each other, or to exclude themselves from specific groups that they have disagreements with. Members of the computer underground should be referred to as crackers and not hackers. A cracker is someone who gains unauthorized access to a computer in order to commit crimes such as information theft. The amount of data and its confidentiality amplifies the concerns that are raised over information technology ethics, and why they should be maintained. Organizations are then forced to device come up with ethical standards that will guide their employees conduct while at the same time ensuring that they remain within the bounds of acceptable public ethics. However, there has been a disregard of societal ethics where companies have employed espionage tactics over rival companies to gain unfair competitive advantage by hacking into their information systems or purchasing information from hackers. In other cases, inquisitive minors have done hacking using a computer and an internet connection. A good example is that of a juvenile who, in March of 1997, sent a couple of computer commands from his personal computer effectively and disabled a telephone company services that was serving an airport in the United States. Such actions have drawn major attention from security agencies such as the F.B.I, and they have made fighting computer hacking be one of their priorities. In the recent past, there has been an accelerated increase in the number of organized hacker groups all over the world. Such groups gather occasionally in conventions such as DEF CON, HoHoCon, and SummerCon and such conventions provide information and a means to learn from other members. Hackers also gain credibility by affiliating themselves to elite hacker organizations. Public interest groups such as the computer Ethics Institute have been in the frontline in trying to lay down the ethical standards that computer users should uphold. Various security agencies have highly prioritized cases of hacking to the extent of setting up a cybercrime department to deal with cases of unethical use of information technology. Hacking or cracking is sometime legal although unethical. This is in the case where security intelligence agencies hack into individuals’ emails, telephone conversations and internet usage statistics for identifying criminal activity such as terrorism plots. Many argue that such acts are a breach of people’s privacy and there have been campaigns trying to limit the government’s ability to search bank records. In 1988, the Computer Matching and Privacy Act was initiated and it restricted the government from accessing people's information. The subject of hacking spans beyond the aspect of ethicality. There have been numerous cases where nations have traded accusations of one trying to or successfully accessing the others information resources such as top-secret military documentation. This has not only strained the diplomatic ties between such countries, but also brought them to the brink of war. Large organizations have been hit by civil lawsuits that have cost them fortunes amounting to hundreds of millions of dollars. Others have been paralyzed by attacks leading to loss of millions of dollars in revenue. There have been instances where hacking has placed the life of citizens of a nation in grave danger such as when the hacker targets mission critical infrastructure such as water supply systems, power grids, airport computer systems and hospital systems. When attacks escalate to such heights, they are no longer considered as unethical acts but as acts of terrorism. Because of the prevailing rampant abuse of information technology, there is a great need to review various computer ethics codes. Computer usage has brought about an increase in efficiency of people and organizations, but the ethical issue of hacking is greatly undermining this by people misusing information of others without their permission (Erickson, 2008). Institutions have been forced to increase the safety of their websites by using security strategies such as encryption in order to deal with this menace. However, hackers who find ways of decrypting the codes and accessing information they are not authorized constantly break into the security measures institutions have set. People getting ensuring that they uphold ethical standards will be instrumental in ensuring that hacking is eliminated in the information technology sector and that the right of privacy is maintained. References Davis, C., Philipp, A., and Cowen, D. (2005). Hacking Exposed Computer Forensics: Secrets And Solutions: Hacking Exposed. California: McGraw-Hill Professional Erickson, J. (2008). Hacking: The Art of Exploitation: San Francisco: No Starch Press. Gupta, S. (2004). Hacking In the Computer World. New Delhi: Mittal Publications Sembok, T. (2003). Ethics of Information Communication Technology. Regional Meeting on Ethics of Science and Technology, Bangkok. . Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ethics, as It Pertains to Information Technology Term Paper”, n.d.)
Retrieved from https://studentshare.org/information-technology/1439185-ethics-as-it-pertains-to-information-technology
(Ethics, As It Pertains to Information Technology Term Paper)
https://studentshare.org/information-technology/1439185-ethics-as-it-pertains-to-information-technology.
“Ethics, As It Pertains to Information Technology Term Paper”, n.d. https://studentshare.org/information-technology/1439185-ethics-as-it-pertains-to-information-technology.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Advancement of the Information Age

Technological Advancement and Marketing

The technological advancement or for such the information technology solution has been part of the organization's core competencies.... IT Solution in Literature: In today's modern world, both information technology and society are co-evolving (Hearst and Grudin, 1999).... the available literature argues that the development of information systems communication technologies (ICT) will impact health care (Pegesy et al.... The paper "Technological advancement and Marketing" tells that the influence of technological advancements seems to be part of the modern organization....
6 Pages (1500 words) Essay

Microprocessors advancement generations

Moreover, the integration of these components is vast in this current age of information technology, where every now and then, computing devices are expanding their usage beyond imagination and finds a new product to take their place.... Moreover, the integration of these components is vast in this current age of information technology, where every now and then, computing devices are expanding their usage beyond imagination and finds a new product to take their place....
4 Pages (1000 words) Research Paper

Technological Achievements that Led to FISMA and COPPA

It also requires of them to improve the information security framework that is the plan of how they will improve the networks and finally the act includes a set of directives that govern agencies' security responsibilities and how to adhere to the law (NIST, 2002).... COPPA and technological advancements leading to its creation The second act, the COPPA act in general aims to give parents the control over what information is gathered from their children who are below the age of 13 online....
3 Pages (750 words) Essay

Advancements in the humanities: Worldwide Web/ Internet

Thesis Statement: advancement of the humanities facilitated by the invention of the internet and its role in transforming the world around us The revolutionary tool invented by Tim Berners-Lee, at CERN - The European organization for Nuclear Research, in the year 1989.... He was involved in the computing services section and was deliberating on establishing a process or a platform that would enable the physicists and researchers from across the globe and working on remote sites to co-ordinate and participate in the information sharing....
3 Pages (750 words) Essay

Advancement in Technology in Different Sectors and Problems Associated With Advancement in Technology

With the advancement of technology a wide variety of war tools, guns, bombs are made.... Moreover, the advancement in the technology refers to the development of all the areas connected with technology.... In fact, a lot of researches have been carried out on this subject shown that the advancement in technology plays a significant role in the improvement of human life.... Basically, these technological developments can be seen different areas such as in information technology, construction technology, space technology, medical technology, communication technology, art technology and so on....
6 Pages (1500 words) Essay

Technology Advancement: ''Digital Natives and Digital Immigrants

In the olden days, the radio and the television changed how people received information and even altered the way people were governed.... Technologies such as mobile phones and the internet have provided individuals with information, a reliable communication method, education, easy purchases, news, dating sites, and jobs among other services....
5 Pages (1250 words) Research Paper

Executive Dilemmas in the Information Age

It Executive Dilemmas in the information age Executive Dilemmas in the information age Reasons why it is important for CEOs need tounderstand technology especially the areas of security and ethics CEOs are pivotal to security systems of organizations that help secure customers' information and company's secrets from unauthorized access.... It would deny the CEO a good standing if he cannot communicate meaningfully with his or her information technology team....
2 Pages (500 words) Assignment

Problems Associated With Advancement in Technology

It outlines the advancement of technology that has been playing a significant role in today's world, as they help to improve people's living standards.... With the advancement of technology, a wide variety of war tools, guns, bombs are made.... Moreover, the advancement in technology refers to the development of all the areas connected with technology.... Basically, these technological developments can be seen in different areas such as in information technology, construction technology, space technology, medical technology, communication technology, art technology and so on....
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us