Standards in Information Technology Essay Example
Standards in Information Technology Essay Example

Standards in Information Technology Essay Example

Available Only on StudyHippo
  • Pages: 4 (832 words)
  • Published: April 21, 2022
View Entire Sample
Text preview

The development of the internet and information technology which can capture and store personal information and greater reliance on the information system in almost every aspect of life has the risk of the technology being used unethically. With the breakthrough in informatics, the significance of ethics and human values has not been sufficiently emphasized. Some of the areas that raise public concerns about standards in information technology include the following; workers have their emails and internet access being monitored while at work, the workers are struggling to balance the work and have privacy.

People are downloading videos and music online without paying for it thus, goes against copyrights. Also, organizations are contacting millions of clients worldwide via unsolicited email at a highly low cost marketing. Hackers break into someone’s database of financial a

...

nd retail institutions to steal information from the customer or the government and then use the information taken to commit theft. Also, the student around the world have been got downloading items from the internet and uses as their projects. And finally, websites plant cookies on visitors’ hard drive to track them and their purchases online. (George, 2015)

This technology news goes against the privacy of an individual, the users of IT are over exercising the freedom of expression. After an election for instances, several news shared, and the sources of this information being shared may not be trusted because they are not from the legal channels. We do not know where the information is retrieved. With this development, other people can access the read the emails and other personal information of an individual. When someone hacks someone to account, he creates a fake one

View entire sample
Join StudyHippo to see entire essay

and uses it to steal from others. In that example of U.S election, Russians hacked the emails of the Democrats and used to rig the election so that Donald Trump became president. According to Reuters, Trump’s team colluded with the Russian team to hack the emails of Democrats, including that of Podesta, the chief campaigner to (or “intending to”) sway the election.

Consider the just completed U.S elections, after the results were announced that Trump won, there were several conspiracies developed and shared widely through social media. One of the most widely shared news through the technology was that Trump colluded with Russia to hack the electorate process and thus Trump rig the election. According to that news, it alleged that “a top aide to Hillary Clinton’s presidential campaign said, Trump advisors colluded with Russia to hack into the Democratic Party emails so that it can rig the election for Trump. Clinton’s team stated that they had evidence that the election was rigged; there was an association between Trump and Russian intelligence. But the validity and the truth of the information is not known because the source also says that” it is very much unknown whether there was collusion” the person exposing the news is not sure if it goes that the election interfered.

Trump team did not respond to the claim immediately, but they did so in a separate interview, that is according to the source of this information. It is clear that Information technology interferes with personal privacy since it leaks particular secrets and only it could remain with the owner of such sensitive information. I think we may choose to have chips in future

so that we can protect the information that we have for reaching the unintended audience.

The leaked emails reveal information about the speeches Secretary Clinton gave to the Wall Street, infighting within the party. The report also shows the comments from the top aide who were shocked about Clinton’s use of the private server to send emails when she was the U.S. Secretary of state. The leakage of the information leads to the embarrassment of news and media coverage and also forced some party officials to resign. Trump was able to dig into personal details of Mrs. Clinton through the emails that she send during her time as the secretary of state. On the other hand, Clinton also uses technology to establish that Trump has never filed tax to the government yet he is a big ad renowned businessman.

From the example given above, it is evident that with the technological advancement, it is impossible to hide personal information. Other people can access private emails and also company data in the wrong way. Trump’s team collided with the Russian to hack the opponents’ emails and uses it to alter the election result. It is, therefore, becoming necessary in future if we can have a microchip in our brains so that we can store our information and be sure that nobody can access to your private and confidential information. The Internet is the best source of the variety of information, but the users are misusing it, some companies use the internet to get the customer information, which is stealing.

References

  1. George, R. W. (2015). Ethics in Information Technology. Ethics and Technology, 200-240.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New