Title of Your Case Study/scenario: Assignment 1: Doing Ethics Technique
Title of Your Case Study/scenario: Assignment 1: Doing Ethics Technique
Title of Your Case Study/scenario: Assignment 1: Doing Ethics Technique
study/scenario
Assignment 1: Doing Ethics Technique
Your Name
[2016]
Ethical Dilemma related to ICT
ICT (Information and Communication Technology) have made our lives easier and have made
many businesses and organizations successful today. Many companies, such as Facebook,
Google, Ebay and many other are existing just because of the existence of information and
communication technology. ICT has played a very vital role in our lives and has provided us so
many benefits. But along with the advantages there are some dark sides of this blessing too.
Improper use of information technology has also become threat for the society and is creating so
many problems for not only the organization and employees but also for the students and normal
public.
Recently, the ethical dilemma related to the information and communication technology is
“Cyber Crime”. In this assignment “Doing Ethics Technique” (DET) will be used to analyze the
cyber crime, its affects and solution for this problem. Doing Ethics Technique is a process to
analyze the ethical and non ethical issues and it helps to have ethical analysis of any issue
regarding to ICT or any other field. To analyze the cyber crime by DET, following questions has
to be answered;
Now the crimes are at their peak and criminals are using information technology by different
means, such as the criminals get access to the credit card information and in this way the victim
has to face financial loss. Many criminals use ICT to harm any organization or institute. Now it
has become the practice and in last 6 months, it is observed that the crimes related to ICT have
reached to its peak. Now the social networking websites have become a normal source to access
the individual and to know anything about the person and by finding complete details about a
person, criminals can get benefit of the information in any way. In fact the use of photographs
and blackmailing has become practice due to the misuse of information technology. In last 6
months, the most prominent ethical dilemma related to information and communication
Cyber crime refers to the commitment of crime by using the information technology. Now-a-
days it has become practice. From the simply annoyed users to the professional criminals, all are
familiar to the misuse of information technology. Smart phone and other mobile devices have
become the practice and misuse of these devices is so easy. By using the internet and Bluetooth a
criminal can easy do his work. These all smart devices are contributing to the growth of the
cyber crime.
There are many ethical and non-ethical issues related to the cyber crime such as spamming,
stalking, malware, phishing, hacking, piracy, fraud, identity theft, and blackmailing.
4 Who is affected?
Now the criminals target the online bank accounts which results in the financial loss of the
victim. It has been observed that in some cases the criminals provided such huge financial loss
that it caused death of the victim. Not only the financial loss but also some annoyed users use the
pictures and then threat the individuals which creates a threatening situation on the victim which
also sometimes lead to the death of victim. However, not only the individual or victim but the
It occurs when someone tries to have access to the personal information of someone, such as
someone tried to get anyone else’s identity and then he do any crime. For identity theft, the
criminal uses the date of birth, social security number, debit or credit card numbers or passport
numbers of the victim. When the criminal get access to the personal information of someone then
he can have access to the different personal things of the user and then the criminal can use it in
5.2 Piracy:
In the present era, piracy is at the top of the ethical dilemmas. Piracy is the biggest problem
associated with the information technology and digital products. Many websites have been
constructed which buy the original products and then they upload those original software as an
open source for all and the people can easily download that software from that website. Many
pirated audio and videos are available on such websites. This is totally illegal and is unauthorized
5.3 Fraud:
Cyber crime also makes people able to play with the innocent people with great ease and in very
skillful way. Most of the people just send the viruses in the files easily by sending mails to the
email addresses or by placing the advertisements of the public interest at the side of the most
popular websites. When the people open the emails or they click the advertisement then the virus
enters into the computing device by which some of the criminals can have access to the personal
data of the victim or it may cause the problem in the software of the operating system (Seach,
2003).
To control the cyber crime, one should maintain hygiene of the operating system, should update
the operating system timely and the user should install security software and should update and
upgrade it timely to protect computer from the cyber crime. (Anand, 2016).
Use of security software and strong passwords is much more helpful to prevent any cyber crime.
References;
Anand. (2016). What is Cyber Crime? How to deal with it? Retrieved 12 3, 2016, from windows
Club: http://www.thewindowsclub.com/what-is-cybercrime-prevention
GURU. (2016). Ethical and Social issue in Information system security. Retrieved 12 3, 2016,
from http://www.guru99.com/mis-ethical-social-issue.html
Systems , 127-133.