Tuesday, May 14, 2019
Information Technology Ethics Term Paper Example | Topics and Well Written Essays - 1000 words
Information Technology ethical motive - Term Paper ExampleCyber nuisances are here to stay. As Price stated, As the number of information processing system owners connected to the internet increases, so too does the opportunity for cyber crime (Price, 2010). Chantler in his review of the book, The Reality of the holy terror by Nigel Phair (2007) cited Phairs translation of the different cyber crimes (Chantler, 2007). Phair noted (as cited by Chantler 2007) that cyber crimes can be broadly divided into seven groups namely 1) unwanted software 2) identity crime 3) phishing 4) critical infrastructure protection 5) quick property 6) communications and 7) terrorism (Chantler, 2007). Hacking activities, spyware, adware, cookies, Trojans, spams and viruses fall under unwanted software. Unwanted software may be found either eruptside or within the organization. The second and third types of cyber crime, identity crime and phishing, convey with proof of identity, authentication of int ernet users and the tools used to get information. Chantler goes on further to cite Phairs description of the other divisions of cyber crimes (2007). Critical infrastructure protection crimes are the crimes which involve the destruction of the information structures such as telecommunications and computer networks. On the other hand, crimes on intellectual property are concerned with software piracy. Cyber crime on communications is another form of cyber crime which gets much attention from organizations. These type of crimes include risks and threats on wireless devices, VoIP (voice-over-internet protocol) - such as Skype and Google-talk, third generation phone systems, issues with caller ID, clipping, v-bombing, sim boxing, internet dumping, PABX hacking, phoneline scanning, voice-mail, cloning, Bluetooth, RFID and issues on privacy (Chantler, 2007). Like any other group of society, terrorists have also resorted to digital technology in carrying out their activities. They use cyb er space to commit crimes such as information warfare and distributed denial of service attacks (ddos) (Chantler, 2007). nonpareil of the most common crimes which Chantler failed to mention is cyber bullying. Over the years, there has been a proliferation of cyber bullying crimes worldwide. Cyber bullying is bullying with email, instant messaging (IMing), chat room exchanges, clear site posts, or digital messages or images send off to a cellular phone or personal digital assistant (PDA) (Hazelden Foundation, n.d.). Cyber bullying involves online harassment which has aim more severe through the years sometimes even the cause of some suicides among teenagers. Electronic observe of Employees One of the offshoots of the advancement in information technology is the growth in the extent of workplace monitor in several companies. Software such as Websense, SurfControl, SmartFilter and Xora have sprung up as corporations saw the strike to monitor employees in the workplace. These sof tware make it easy for management to monitor the computer, internet or email use of the employees. A software like Xora can even go as far as monitoring an employees whereabouts through GPS technology on their companys mobile phones (Dell & Cullen, 2006). According to sellers of Web and email monitoring software, employee productivity, corporate liability and bandwidth limitations are the major reasons why workplace monitoring is implement by corporations (Lemos, 2001). In a study by the American Management Association and the ePolicy Institute, it was revealed that 76% of employers
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment