Internet Ethics Essay Example
Internet Ethics Essay Example

Internet Ethics Essay Example

Available Only on StudyHippo
  • Pages: 5 (1245 words)
  • Published: May 24, 2017
  • Type: Essay
View Entire Sample
Text preview

The internet is a worldwide network of networks that employs universal standards to connect millions of diverse networks (Laudon & Laudon, 2012). Due to the massive traffic on the networks daily, it is virtually impossible to keep track of all unethical activities. Criminal acts such as publishing false information, utilizing fake identities, hacking accounts for financial gain, among numerous others, are widespread across the internet and cannot all be prevented. Nevertheless, the internet is an accessible resource that many contemporary industries rely on heavily to function.

The internet impacts not only business users but also casual users, and ethical issues related to it affect both groups. In my search for information technology ethics, I came across Dennis O'Reilly's article "The Internet and the Death of Ethics". O'Reilly shares his personal experience on the topic and cites The Computer Ethics Institute'

...

s "Ten Commandments of Computer Ethics". This list was made to encourage users to treat each other with respect and includes the commandment "Thou shalt not use a computer to harm other people".

Commandments for ethical computer use include refraining from interfering with others' computer work, avoiding snooping in others' computer files, and refraining from using a computer to steal.

5. It is prohibited to use a computer for lying. 6. It is prohibited to utilize or replicate licensed software without payment. 7.

The eighth, ninth and tenth commandments of responsible programming entail obtaining permission or providing adequate compensation when using another person's computer resources, prohibiting the taking of ownership of someone else's intellectual property, and considering the societal implications when developing a system or writing computer code.

It is important to use a computer in a respectfu

View entire sample
Join StudyHippo to see entire essay

and considerate way towards others, even though many people ignore the rules and guidelines that address wrongdoings online. The first commandment of the Ten Commandments of Computer Ethics clearly prohibits using a computer to harm other individuals.

Laudon & Laudon (2012) address those who engage in the unauthorized access of computer networks for personal gain, entertainment or mischief. Such actions can have severe consequences for businesses as hackers are able to access and misuse sensitive financial and personal information. These unlawful activities may even result in blackmailing individuals for monetary gain, ultimately leading to significant financial losses and loss of customer trust. The second Commandment of Computer Ethics prohibits any interference with other people's computer work, rendering such actions directly violating this principle.

Businesses are especially affected by computer viruses, which can cause malfunctions in hardware and software systems by attaching themselves to files and software (Laudon ; Laudon, 2012). Although anyone is susceptible to virus attacks, the consequences for companies can be costly if not prevented or addressed. It should also be noted that unauthorized access to others' computer files violates the Third Commandment of Computer Ethics.

The intricacy of rationalizing the second commandment is explored in this paragraph. Hackers, who possess the ability to access other individuals' computer data, are akin to those with malicious intentions under the first commandment. Nevertheless, there exist people striving to safeguard our freedoms and entitlements falling within the same group as violators of this principle.

Cyber-crime investigators in law enforcement have the ability to search through personal files of suspects to uncover evidence of wrongdoing. This action, however, is deemed unethical and illegal according to the Fourth Commandment of Computer Ethics

which prohibits computer theft. Infiltrating a bank account or obtaining personal details from a company database without proper authorization is also considered inappropriate as it breaches the principle of accessing confidential information without permission.

The Fifth Commandment of Computer Ethics prohibits the use of computers to disseminate false information, a particularly relevant issue with the growth of social networking sites. These platforms function as virtual communities where individuals can expand their personal and business networks through mutual connections (Laudon & Laudon, 2012). However, immediate social media outlets like Twitter are often used to spread misinformation. This can be detrimental for businesses if an unsatisfied customer posts negative comments about poor treatment from the company that do not reflect reality. The Sixth Commandment of Computer Ethics makes it illegal to copy or utilize proprietary software without payment.

This is the most expensive issue for tech companies: avoiding the use of illegal software copies. In the video game industry, piracy is a common practice where hackers copy game software and share it online without permission. This unauthorized distribution is known as piracy in the game world. It is a significant concern for the industry as more games are now available for download instead of physical distribution via disks.

The act of unlawfully distributing software is resulting in substantial financial loss for game companies, which violates the Seventh Commandment of Computer Ethics. This commandment prohibits the usage of another individual's computer resources without their consent or appropriate reimbursement. Unsanctioned access to an account with the intention of obtaining personal gain constitutes hacking; however, it can also be executed by a person who gains knowledge of someone else's password without their awareness

and utilizes their account. Both instances are considered violations of this ethical principle.

Businesses can suffer due to employees' personal vendettas that lead them to sabotage others, even if it was not their intention. The Eighth Commandment of Computer Ethics prohibits individuals from taking credit for someone else's intellectual work, which applies to software plagiarism as well. If one person creates a program and another falsely claims credit for it, it is challenging to accomplish since companies safeguard their intellectual property by registering patents and trademarks for any employee-developed work. Moreover, even if the primary programmer leaves the project, the company still owns the program they were developing.

In the Ninth Commandment of Computer Ethics, it is stated that one must contemplate the societal outcomes of their program or system creation. Essentially, the individual should be cognizant of their program's actions and prevent offense towards others. This principle is especially significant in the education and video game industries, where understanding the target audience is imperative when designing software.

For instance, an educational game for children under the age of 5 might contain inappropriate language for its young audience, which could result in legal action taken by parents. Additionally, companies should strive to remain neutral and politically correct to avoid criticisms and false accusations of favoring a particular race, nationality, or religion. Ultimately, the last commandment of Computer Ethics advises users to always use computers in ways that demonstrate consideration and respect for others. This commandment is particularly relevant for social media users who engage with others online, reminding us to treat everyone with respect and avoid offensive or profane language.

It is important to show respect and consideration towards

the opinions and feelings of others, especially on the internet where harmful effects can occur if users are not careful. Business can be greatly affected by these issues, as emphasized by the author in a previously mentioned article who suggests that there may be a lack of ethics in the fight for an ethical internet (Reilly, 2010).

Although security measures and awareness have increased on the web, it is unfortunate that I must agree with the notion that without greater control, little change will occur. Nevertheless, implementing more control over the World Wide Web would likely come at the cost of our current freedom of internet use. While adopting the idea of Ten Commandments of Computer Ethics is an admirable concept, like many calls for cooperation and order, it is often ignored.

Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New