Question

How should the ethical problems presented by Computer Technology, Information Technology, Information Networks and the Internet...

How should the ethical problems presented by Computer Technology, Information Technology, Information Networks and the Internet be approached?

there is an answer existing in chegg already but i couldn't open that .. will you please help me out ?

Homework Answers

Answer #1

Robbery and cheating in order to obtain personal data and the lack of security on the Internet is a controversial subject nowadays, as it is difficult to control it without taking away the freedom of speech. What is the balance between control and freedom? Additionally, the number of incidents related to the data robbery is growing and growing; thus, some kind of control is needed and it should be international.

The problems related to this subject might affect us in three different ways:

  1. Personal data. There several techniques to get the personal data. Perhaps, the most used technique is “spoofing” which imitates the user interface and the behavior of web sites in order to deceive users into thinking that that is the real web site and then users will introduce their passwords. However, sometimes the personal data is stolen from the companies which are storing them and in which you trust, but other times, those companies are the ones which use your personal information without your approval or knowledge.
  2. Confidential data which belongs to companies or countries. There are several examples of recent incidents related to it. Today, the Snowden case is the most popular one; the United States (US) used companies to get data from other states and to spy on them. Nevertheless, this is not an isolated incident, this year (2014) Canada stated to change its network infrastructure because of a Chinese attack by hackers – China denied its participation in the attack. In fact, several countries are taking actions to control this leak of information. China has banned Windows 8 and Apple products in the government facilities for security issues. In addition, Russia asked for the source code to IBM and Apple so that it could study it and verify the trust in their software.
  3. The protection of intellectual rights. It is important to know the differences between Europe and the US, since in the US the software can be patented and in Europe it cannot. There is an exception in which software can be patented in Europe, if it is a part of an invention which includes hardware. Therefore, the protection of the software in Europe is lower.

Aside from that, regarding the illegal use of music or movies, the protection of intellectual rights on the Internet is really difficult, although there are various techniques (Digital Rights Management, Fingerprinting…). In fact, in Spain some money is paid to artists through what is called the Digital Canon to help them. This payment is made by everyone who buys a CD, DVD or something related to electronics, since they have to pay a fee for those things and no matter if they are making an illegal use of them or not.

In general, it is difficult to fight against these problems, as sometimes guilty parties are from other countries and the state which is interested in solving the problem does not have jurisdiction there. This is the case of some Spanish web sites which have links to other web sites in which movies or songs can be downloaded.

CONCLUSION

In my opinion, the Internet has to be controlled, we should know what companies or countries are doing with our information and make sure that our rights are protected everywhere. Therefore, an international law or an international institution should be created. Perhaps, we might use what we have learnt in Montego Bay, where an international agreement to rule the sea was reached. I believe that, given the international scope of both, the Internet and the international waters, the Internet could be controlled by using the same foundations which were created in the Montego Bay Convention.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Explain how the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 impacts...
Explain how the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 impacts on population health. Describe how your organization is impacted by population health and the HITECH Act of 2009. As a consumer of health care, how do you perceive the use of health information technology (HIT) to address these topics affecting your personal health care delivery? I asked posted the above question yesterday only to check back and find "your question needs more infor to...
As advances in computer technology continue to change the way we work and play, Internet use...
As advances in computer technology continue to change the way we work and play, Internet use on and off the job has become a danger zone for employees and employers. Misuse costs employers millions of dollars in lost productivity and litigation, and it can cost employees their jobs. A 2006 survey by the American Management Association and the ePolicy Institute revealed that 28 percent of employers fired workers for e-mail misuse. In addition, 2 percent terminated employees for using instant...
Hello, I am working on a internet marketing/business assignment but I am unsure of how to...
Hello, I am working on a internet marketing/business assignment but I am unsure of how to solve it. Please help me. The assignment details are below. Consider this scenario: Your friend starts a website, nothingbutflags.com, which is not making money. Your friend asks you to help generate more traffic. You ask your friend how much traffic the website had last month? And your friend replies and says only 500 visits. You also ask how many flags did you sell? Your...
The title of the course is SYSTEM ANALYSIS AND DESIGN. All answers should be based on...
The title of the course is SYSTEM ANALYSIS AND DESIGN. All answers should be based on that. Please do not copy and paste answers on chegg or on google for me. All answers should be based on your understanding on the course. Please try as much to answer the questions based on what is asked and not setting your own questions and answering them. Let it be if you want to copy and paste answers. ********************************************************************************************************************************************************************************************************************** 10. (a). You are...
Can you provide information on how I should plan to study the anatomy class/lecture? Please provide...
Can you provide information on how I should plan to study the anatomy class/lecture? Please provide me resources or studying methods you found worked best for students.
Oh, and could you please show your work in as much detail as possible. I already...
Oh, and could you please show your work in as much detail as possible. I already kinda know the answer, I just want to see how you get it. Thank you so much!!! Edit: Thank you so much for trying to help me but I figured it out but I would appreciate your help in the following question. Thank You! One hundred identical mortgages are pooled together into a pass-through security. Each mortgage has a $100,000 principal, a fixed interest...
Please tell me how to do the problems. Thanks! 1. Use the following information relating to...
Please tell me how to do the problems. Thanks! 1. Use the following information relating to Company X to answer questions below. Cost Retail Beginning Inventory $25,000 $40,000 Net Purchases $50,000 $85,000 Net Markups - $15,000 Net Markdowns - ($5,000) Net Sales - $100,000 What is the estimate of cost of goods sold under the average cost retail method? $19,444 $35,632 $45,784 $55,556 2. On January 1, 2016, Company X acquires inventory for $200. On January 1, 2017, Company X...
Answer the question as if you are the risk manager at a hospital. How should ethical...
Answer the question as if you are the risk manager at a hospital. How should ethical guidelines influence your decisions when implementing or revising policies and procedures regarding patient care decisions? In particular, consider patient end-of-life care policies. This is for a discussion post in my Healthcare Risk class. Please povide a 250 word response. Thanks in advance.
1)Do a web search to find out information on the abuse of dextromethorphan and words must...
1)Do a web search to find out information on the abuse of dextromethorphan and words must be 300 words or more?. Write a brief summary of what you have learned. pleas I need help this homework please send me typing answer becouse I dont understand hand writting.thanks
you are asked to provide networking advice to a chain of doughnut stores called Hole In...
you are asked to provide networking advice to a chain of doughnut stores called Hole In One. The company already has a server-based network. The server that holds the company’s inventory, ordering, sales, time tracking, and employee information and provides an Internet connection is located at their store across the street from ABC Love. Three other Hole In One stores in town connect to the central server through high-speed internet connections. Hole In One is having problems with heavy traffic...