Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Title of Your Case Study/scenario: Assignment 1: Doing Ethics Technique

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

SCHOOL OF COMPUTING AND MATHS, Charles Sturt University

Title of your case

study/scenario
Assignment 1: Doing Ethics Technique

Your Name

[2016]
Ethical Dilemma related to ICT
ICT (Information and Communication Technology) have made our lives easier and have made

many businesses and organizations successful today. Many companies, such as Facebook,

Google, Ebay and many other are existing just because of the existence of information and

communication technology. ICT has played a very vital role in our lives and has provided us so

many benefits. But along with the advantages there are some dark sides of this blessing too.

Improper use of information technology has also become threat for the society and is creating so

many problems for not only the organization and employees but also for the students and normal

public.

Recently, the ethical dilemma related to the information and communication technology is

“Cyber Crime”. In this assignment “Doing Ethics Technique” (DET) will be used to analyze the

cyber crime, its affects and solution for this problem. Doing Ethics Technique is a process to

analyze the ethical and non ethical issues and it helps to have ethical analysis of any issue

regarding to ICT or any other field. To analyze the cyber crime by DET, following questions has

to be answered;

1 What's going on?

Now the crimes are at their peak and criminals are using information technology by different

means, such as the criminals get access to the credit card information and in this way the victim

has to face financial loss. Many criminals use ICT to harm any organization or institute. Now it

has become the practice and in last 6 months, it is observed that the crimes related to ICT have
reached to its peak. Now the social networking websites have become a normal source to access

the individual and to know anything about the person and by finding complete details about a

person, criminals can get benefit of the information in any way. In fact the use of photographs

and blackmailing has become practice due to the misuse of information technology. In last 6

months, the most prominent ethical dilemma related to information and communication

technology is the Cyber Crime.

2 What are the facts?

Cyber crime refers to the commitment of crime by using the information technology. Now-a-

days it has become practice. From the simply annoyed users to the professional criminals, all are

familiar to the misuse of information technology. Smart phone and other mobile devices have

become the practice and misuse of these devices is so easy. By using the internet and Bluetooth a

criminal can easy do his work. These all smart devices are contributing to the growth of the

cyber crime.

3 What are the ethical and non-ethical issues?

There are many ethical and non-ethical issues related to the cyber crime such as spamming,

stalking, malware, phishing, hacking, piracy, fraud, identity theft, and blackmailing.

4 Who is affected?

Now the criminals target the online bank accounts which results in the financial loss of the

victim. It has been observed that in some cases the criminals provided such huge financial loss

that it caused death of the victim. Not only the financial loss but also some annoyed users use the
pictures and then threat the individuals which creates a threatening situation on the victim which

also sometimes lead to the death of victim. However, not only the individual or victim but the

society is badly affected by this cyber crime too.

5 What are the ethical issues and their implications?

5.1 Identity theft

It occurs when someone tries to have access to the personal information of someone, such as

someone tried to get anyone else’s identity and then he do any crime. For identity theft, the

criminal uses the date of birth, social security number, debit or credit card numbers or passport

numbers of the victim. When the criminal get access to the personal information of someone then

he can have access to the different personal things of the user and then the criminal can use it in

any way (GURU, 2016).

5.2 Piracy:

In the present era, piracy is at the top of the ethical dilemmas. Piracy is the biggest problem

associated with the information technology and digital products. Many websites have been

constructed which buy the original products and then they upload those original software as an

open source for all and the people can easily download that software from that website. Many

pirated audio and videos are available on such websites. This is totally illegal and is unauthorized

use of the copyrighted materials.

5.3 Fraud:

Cyber crime also makes people able to play with the innocent people with great ease and in very

skillful way. Most of the people just send the viruses in the files easily by sending mails to the
email addresses or by placing the advertisements of the public interest at the side of the most

popular websites. When the people open the emails or they click the advertisement then the virus

enters into the computing device by which some of the criminals can have access to the personal

data of the victim or it may cause the problem in the software of the operating system (Seach,

2003).

6 What could have been done about it?

To control the cyber crime, one should maintain hygiene of the operating system, should update

the operating system timely and the user should install security software and should update and

upgrade it timely to protect computer from the cyber crime. (Anand, 2016).

7 What are the options?

 Keep operating system with the latest patches and updates.

 OS should be configured securely.

 Choose strong passwords.

 Use security software.

 Review credit card or bank statements regularly.

 Which option is the best and why?

Use of security software and strong passwords is much more helpful to prevent any cyber crime.
References;

Anand. (2016). What is Cyber Crime? How to deal with it? Retrieved 12 3, 2016, from windows

Club: http://www.thewindowsclub.com/what-is-cybercrime-prevention

GURU. (2016). Ethical and Social issue in Information system security. Retrieved 12 3, 2016,

from http://www.guru99.com/mis-ethical-social-issue.html

Seach, G. R. (2003). Doing ethics: A universal technique. Australian Journal of Information

Systems , 127-133.

You might also like