Solutions To Ethical Problems In IT

Posted: May 2, 2013 in Relevance Of Ethics To People In IT

ethics_thumbAlong the lines of Information Technology, the importance of ethics is forsaken. Intellectual property is lost along the lines of piracy, privacy is invaded through hacking; people’s systems are captured through viruses etc. How can these be addressed?

Companies, both software and music and movie producers work hard to maximize profit, but pirates cut it down. The root of this, I believe, started in manufacturing devices e.g. smartphones and computers that have Bluetooth which allows users to exchange files for free, CD/DVD writers used to duplicate disks (music, software, movies), and much more. Apart from issuing copyrights, how can producers protect what they own?

Having been declared ineffective and only bringing damage, copy protection has evolved. With augmentation, copy protection might serves as a viable solution to piracy. Companies like SG-Lock, Microcosm, among others have brought a more effective copy protection system. Copy protection is not the only solution however; the issuing of software registration codes is also used as a means to limit piracy.

I learned that one of the reasons viruses are created is to take control of a computer and use it for specific tasks. Through emails, hackers can get malicious software through. As all of that happens without the user’s knowledge, antivirus can be a ‘watchman’, working to detect and capture viruses before they spread into the system.

Privacy is important, however most computer users are victims of spying and data theft. Some companies consider email interception as a way to monitor their workers’ progress; however it is a violation of privacy looking at it in terms of ethics. This is an unethical act, but it is justified by contracts. ‘Black hat’ hackers break into their systems to steal sensitive information like banking details, credit card numbers, Identity numbers etc. To solve this, computers can be protected by firewall, which will monitor everything that enters and exits the system. These systems must be regularly updated in order to stop the latest network tactics by hackers. Encryption of files, password protection also count as useful solutions.

Even though hackers find their way around this systems, with continuous development, hackers can be ceased.

chosenkoketso.simplesite.com

(Links to the information are aggregated in the above website)

Author: Koketso Sithatu

Editor: Kelebogile Mokwena

REFERENCES

Business & Society (Ethics and Stakeholder Management), Archie B. Carroll, Ann K. Buchholtz

Computer Concepts, 2010: Comprehensive, June Jamrich Parsons, Dan Oja

Guest Contributor, August 15, 2006, 7:00 am PDT

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s