Unethical Tend of Using Information Technology

introduction

I am Simardip Kaur, a 3rd semester student at CSTN and I am about to conduct a case study on trends that have increased the risk of unethical use of information technology. Ethics in information technology means the branch of ethics that focuses on the relationship between the creation of an organization, the dissemination and use of information, and the proper standards and moral codes that govern human behavior in society. definition of information technology information technology is the use of computers to store addresses, re-capture and form data and any information.

Data innovation is considered a subdivision of data, and interchange innovation and the value of morality are known as good and bad behavior. moral behavior generally corresponds to generally recognized social standards. The moral in data innovation implies that imperative specialized decisions are regularly left to specialized specialists.

Give examples of trends that have increased the risk of unethical use of information technology trends that have increased the risk of unethical use of information technology are email and Internet access monitoring, peer-to-peer networks, copyright infringement, unwanted email hacks and identity theft, plagiarism, cookies and spyware.

for example, monitoring e-mail and Internet access. Most companies that require employees to work from corporate computers also have a computer usage policy.

This policy gives employers, including managers, the right to exercise and control all activities that occur on company computers. this includes all computers, including computers in break rooms. So sometimes the supervisor reads all e-mail from a computer that he/she is not using.

Get quality help now
Doctor Jennifer
Verified

Proficient in: Information Technology

5 (893)

“ Thank you so much for accepting my assignment the night before it was due. I look forward to working with you moving forward ”

+84 relevant experts are online
Hire writer

so this is an unethical use of email and internet access monitoring. they misuse their knowledge. Using their computer and hacking knowledge, anyone can access your computer, read your personal data and misuse it. Peer-to-peer networks copyright infringement copyright infringement is an act of violating the exclusive rights of the copyright owner. examples include copying or doing work without the permission of the owner, or creating one’s own work. In this case, computers connect to each other directly to exchange files, and sometimes the owner of the computer copies all the data from another computer to his computer.

Unsolicited Email

Unsolicited email means spam email. In this unsolicited email message that forces the recipient to bear the cost of storing it and deleting it from their mailbox. the sender does not need verifiable permission from recipients before sending messages to their mailboxes. However, a person may send you unsolicited e-mail messages while having your e-mail address. hackers and identity theft Identity theft is the process of stealing your personal information, such as your name, address, social security number, and email address, and using it without your permission. Identity theft can happen to anyone and it has so many bad consequences. Hackers can get your information by hacking your data. but they can also get your information from a public computer or go to an insecure website. at the same time, hackers can break into your personal computer and do whatever they want with it, and they can also disable all their information about who hacked into your computer.

Plagiarism

Plagiarism means stealing and publishing thoughts or expressions in the language of your colleagues and presenting them as your own original work. plagiarism is considered intellectual dishonesty. this is subject to approval, such as suspension and even expulsion from school or work. cookies and spyware are plain text files that are stored in the “cookies” folder. The cookie stores data about browsing sessions, as well as all the details about what we are looking for and which website we have visited. they are also used to track information about someone’s visit to many websites. this is mainly used by hackers to find out all your personal details like bank account information, credit card information, your personal accounts and more. Spyware is software that is sometimes installed on your computer with or without your permission.

And it’s just installed to collect your personal data, your browsing history, etc. Sometimes it can install so many apps on your computer without your permission and sometimes you didn’t even know it. Copyright infringement by developing so many applications and sites, such as websites and applications for photoshop editing and music sharing, that many original workers and creators of these fields lose their jobs. with these apps, anyone can get the copyright to do everything on their own. Information technology allows everyone to access anything at a certain time. there are so many free music and book apps on the internet today and we can download any music and books for free and this paves the way for a real creator to make money.

Security hackers can easily use an ip address to hack anyones computer and read and misuses all their personal information and data. With the help of internet it is really easy to do anything. And also there are so many cookies which collects our browsing data without our permission and send it to a remote user. a hacker can also easily hack your online bank accounts and transfer all the money from your account to the desired accounts by thehelp of internet. media piracy digital media piracy is used unethically by so many computers. By this people can steal anyones original music clips and uploads them as their own. nowadays it is s very common thing. One singer can steal other singers and music director songs and upload it to their own page and get fame and name from it.

Cite this page

Unethical Tend of Using Information Technology. (2022, Jun 25). Retrieved from https://paperap.com/unethical-tend-of-using-information-technology/

Let’s chat?  We're online 24/7