Internet Ethics Persuasive Essay Example
Internet Ethics Persuasive Essay Example

Internet Ethics Persuasive Essay Example

Available Only on StudyHippo
  • Pages: 5 (1177 words)
  • Published: January 12, 2018
  • Type: Essay
View Entire Sample
Text preview

Both business users and individuals with internet access experience challenges that affect them. As a result, problems that impact casual users will also have an effect on business users. In my study on ethics in Information Technology, I discovered Dennis Reilly's article entitled "The Internet and the death of ethics." In this article, Reilly provides his viewpoint and personal encounters related to this subject. He references The Computer Ethics Institute's Ten Commandments of Computer Athletes.

In order to promote consideration and respect among computer users, they devised a list known as the Ten Commandments of Computer Ethics:

1. It is strictly prohibited to use a computer for causing harm to others.

2. You should not interrupt or disturb other individuals' computer work.

Rule #3: One must refrain from snooping around in other individuals' computer files.

4. Using a computer for

...

theft is prohibited.

5. Spreading false information using a computer is not advisable.

6. It is prohibited to copy or utilize proprietary software without proper payment.

The text states that it is not allowed to use someone else's computer resources without their permission or without proper compensation.

8. It is forbidden to claim ownership of someone else's intellectual work.

When developing a program or designing a system, it is crucial to take into account the potential social consequences.

10. Encouraging considerate behavior when using a computer is crucial, as this list aims to emphasize improper internet practices. However, many individuals choose to ignore these rules and regulations.

The initial rule of computer ethics mandates that using a computer to cause harm to others is forbidden. This rule specifically targets hackers, who unlawfully infiltrate computer networks

View entire sample
Join StudyHippo to see entire essay

for personal benefit, resulting in damage or engaging in criminal actions (Lauded ; Lauded, 2012). Such activities can have catastrophic consequences for businesses as hackers can gain access to and exploit financial data or personal records. Additionally, hackers may resort to blackmailing individuals by utilizing the information they acquire.

The Ten Commandments of Computer Ethics includes a rule that states individuals should not interfere with others' computer work. This is particularly important for businesses, as viruses can disrupt users' work and potentially result in the loss of money or customers who lose trust in the company. A computer virus is a harmful software program that attaches itself to other programs or data files and often causes hardware and software malfunctions (Lauded & Lauded, 2012).

Unlawful access to computer files, whether in business or personal settings, poses a serious threat that can result in substantial financial losses for companies. Therefore, it is essential to address and prevent such attacks. The Third Commandment of Computer Ethics explicitly forbids individuals from improperly accessing the computer files of others. However, justifying this commandment becomes challenging when considering hackers who unlawfully invade people's computer files.

Law enforcement professionals in the cyber-crimes unit are responsible for examining suspects' personal files to find evidence of their crimes. Both individuals with malicious intent and those defending our rights and freedoms can be held accountable for the same offense. The fourth commandment of Computer Ethics explicitly prohibits using a computer for theft, which is consistent with the first three commandments. It is considered unethical to hack into someone's bank account with the intention of gathering information.

Obtaining personal information of employees from an

employee database is considered unethical. It is a violation of confidentiality to access such information. The Fifth Commandment of Computer Ethics states that one should not use a computer to spread false information. This commandment becomes even more relevant in the age of social networking sites, which serve as online communities for individuals to expand their business or personal contacts through mutual connections (Lauded ; Lauded, 2012). This type of behavior should be strongly discouraged.

The following text has beenand unified while retaining the and their content:

For businesses, this can be detrimental when an irate or vengeful customer complains that the company mishandled or mistreated them, when in reality, they are simply bitter about not getting their desired outcome. The Sixth Commandment in the field of Computer Ethics states that one must refrain from copying or using proprietary software for which they have not paid. This particular commandment poses significant financial risks for technology businesses. Essentially, it emphasizes not using unauthorized copies of software. This issue is particularly prevalent in the video game industry, where hackers duplicate game software and distribute it unlawfully across the internet.

In the game industry, piracy refers to the unauthorized distribution and downloading of games instead of purchasing physical copies. This poses a major concern for game companies, as they increasingly rely on digital distribution. The financial impact on game companies due to this form of software distribution is significant. The Seventh Commandment of Computer Ethics states that it is unethical to use someone else's computer resources without permission or proper compensation. This includes hacking into someone's account and using it for personal gain.

While it doesn't have to

be a hacker, anyone who memorizes someone else's password without informing them and uses their accounts is also guilty of this technical "sin". Employees are often guilty of this, maliciously attempting to harm someone out of personal spite, which can have unintended consequences for everyone involved. The Eight of the Ten Commandments of Computer Ethics states, "Thou shall not appropriate other people's intellectual output," which essentially prohibits claiming something that is not rightfully yours.

The digital form of plagiarism occurs when someone creates a software program and dishonestly asserts ownership of it. This has become more difficult due to companies' increased efforts to safeguard their intellectual property through patents and trademarks for inventions made by their staff. Even if the primary programmer leaves the project, the program still belongs to the company. The Ninth Commandment of Computer Ethics advises individuals to consider the societal implications of the program or system they are developing.

When developing educational programs and video games, it is crucial to consider the content in order to prevent any potential offense. Both industries should have a clear understanding of their target audience. For example, if a game is designed for children under 5 years old, it is essential to avoid using inappropriate language that may result in legal consequences from concerned parents.

To prevent criticisms or false accusations of bias towards a particular race, nationality, or religion, it is essential for companies to maintain neutrality and political correctness. When using computers, it is crucial to demonstrate consideration and respect towards others. This principle should be communicated to all users of social platforms that facilitate human interaction. Ultimately, it is vital to show

respect towards every individual one communicates with by avoiding offensive language or profanity. Additionally, valuing and acknowledging the opinions and feelings of others is also important.

The internet poses risks for individuals and businesses due to user carelessness. The impact can be severe, especially for businesses. A previous article argues that the pursuit of an ethical internet is pointless, claiming that there are no ethics in business (Reilly, 2010). Regrettably, I share this viewpoint despite efforts to enhance security and raise awareness.

Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New