0% found this document useful (0 votes)
196 views4 pages

Assignment 1: Information Technology Ethics Issues (IT)

Uploaded by

Adeel Ahmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
196 views4 pages

Assignment 1: Information Technology Ethics Issues (IT)

Uploaded by

Adeel Ahmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Assignment 1

The Department of Computer Engineering and Information Technology assists students in


acquiring technical knowledge, transitioning into the workforce, and obtaining vocational
training in computer studies. CSIT provides students with theoretical and practical skills in the
use of computer resources in order to comprehend and resolve business challenges, network and
security issues [1]. This is accomplished through a program that emphasizes programming,
computer applications, information technology, and networking. Additionally, the organization
offers a variety of general education seminars that address social and ethical issues around
technology.

 A business network develops, constructs, operates and resolves problems.


 Fundamentals for network management.
 Implement and administer a cellular network.
 Computer hardware building, troubleshooting and restoration.
 The principles of app design.
 Develop awareness and experience in business and open source systems.
 Virtualized computing.
 Computing as well as social networking, legal issues.

IT Security employees also have access to sensitive information and knowledge, which provide
them considerable authority on individual and corporate networks and processes. This control
can be targeted or unintentionally exploited. However, there are no established prerequisites to
prepare the presentation as an IT security consultant or an internal security expert [3]. IT
associations and entities begin to debate the ethical side of the profession; however IT security
staff is not expected to be members of such organizations.

Information Technology Ethics Issues (IT)

Information Technology refers to the server components that comprise the bare-bones operating
system for storing, retrieving, and updating data. Digital technology is being used in a wide
number of fields, including education, business, health, agriculture, finance, and scientific
research. Leading IT innovations must raise awareness of security issues, privacy concerns, and
the primary negative consequences of IT [2]. To overcome these obstacles, it is critical to
understand the IT society's ethical issues.

Big ethics challenges that Information Technology (IT) faces are:

 Personal Privacy: It is a critical component of its ethical concerns. IT enables users to


connect to network servers, while also allowing users with their own hardware, operating
systems, and development resources to access network servers. Due to the network's
widespread distribution, a great amount of data or knowledge is transmitted; as a result,
there are secret channels for information transfer and invasion of the privacy of specific
individuals or organizations. Data protection and data security are major concerns for the
IT community and businesses. Privacy concerns could include unintended exposure to
inappropriate individuals and quality assurance standards.
 Access Right: The second component of ethical problems in information technology is
the right to access. As technology advances, access rights become increasingly critical for
information technology and cyberspace. The growth of e-commerce and computerized
payment methods on the internet has exacerbated this problem for a wide variety of
business sectors. It is unnecessary to protect the Internet network from unauthorized
access. Typically, an intrusion detection system is used to determine whether an attacker
or a person is who they claim to be.
 Harmful Actions: Digital ethical violations, such as loss of critical understanding, loss
of money, control, financial loss, and big unforeseen consequences, result from the
adverse or damaging effects of information technology. This ethical principle prevents a
business from utilizing information technology to the detriment of consumers,
employees, and the broader public. These efforts frequently entail the removal or
alteration of systemic data and services, resulting in a massive loss of resources. It
requires a significant amount of time and resources to eradicate viruses from operating
networks and to recover from malicious behavior.
 Patents: These kind of legal challenges are more difficult to resolve. Patents shall be
used to safeguard the unique and concealed components of innovation. Patents are more
difficult to get than trademarks. Complete transparency is required for the app. The patent
holder shall communicate complete software specifications for software creation to a
professional programmer.
 Copyright: Copyright is a critical concept for information security professionals to
understand. Copyright law is a highly useful legal weapon in the context of secure digital
applications, particularly prior to and obviously following a security breach. This might
have resulted in the paper, computer systems, reports, and related information being
exploited and abused. Numerous nations have revised or amended their copyright laws to
reflect special regulations applicable to electronic programs.
 Piracy: Piracy is defined as the act of creating illegal copies of software. It is up to the
programmer to determine whether or not customers should back up their software. When
copyright laws are amended, provisions against unauthorized software copying are
retained. The information technology sector is resilient to piracy-related devices. The
courts are increasingly confronted with security actions.
 Liability: The concept of guilt should be taken into account while making ethical
judgments. The software producer offers promises and claims regarding the design and
functionality of the product, which can be limited directly to the consumer. The
programmers or manufacturers can evaluate the stated guarantees. Therefore, they must
be realistic in presenting any observations and projections on the functionality,
performance and design of their apps or devices. You can utter any term as legally
authentic as it is written for your things. In order to guard against responsibility, both
agreements should be written. An exemption from express promises may restrict a
provider from being held responsible for informal, subjective or predictive assertions
during the course of the agreement.

Numerous aspects of basic computer and information technology have advanced rapidly in
recent years, and the committee does not anticipate the rate of change to slow significantly in the
near future. While several discoveries are nearing maturity, other more advancements offer
immense potential for the future.

References
[1] Shingan, G. G., & Ugale, B. K. (2018). A Holistic Approach for Teaching Design and Analysis of
Algorithms Course in the Department of Computer Engineering. Journal of Engineering Education
Transformations, 31(3), 146-151.

[2] Tang, Y., Xiong, J., Becerril-Arreola, R., & Iyer, L. (2019). Ethics of blockchain: a framework of
technology, applications, impacts, and research directions. Information Technology & People.

[3] Paul, P., & Aithal, P. S. (2018). Cyber Crime: Challenges, Issues, Recommendation and Suggestion
in Indian Context. International Journal of Advanced Trends in Engineering and Technology.
(IJATET), 3(1), 59-62.

You might also like