0% found this document useful (0 votes)
11 views3 pages

Midterm Lesson 1 Ethics in Information Technology

Uploaded by

kelvtheking3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views3 pages

Midterm Lesson 1 Ethics in Information Technology

Uploaded by

kelvtheking3
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Data Center College of the Philippines of Laoag City, Inc.

A.G. Tupaz cor. M.V. Farinas Streets, Brgy. 8 San Vicente, Laoag City
F.R. Castro Street, Brgy. 1 San Lorenzo, Laoag City

COMMUNICATION AND INFORMATION TECHNOLOGY VIS-À-VIS


ETHICAL DILEMMAS/ISSUES
The advent of computers has changed many aspects of our lives. It has eliminated some occupations,
changed many people's work environment, altered the methods used by teachers to educate children,
rearranged organization structures, affected the way we shop and the manner in which we use money, and
changed the way in which organizations and individuals communicate.
The need for new Laws
The quick progress in information technology leaves a big ethical vacuum. Millions of data
items can be recorded, manipulated. Stored, and copied in minutes or even seconds.
Computer networks have turned the world into a “global village” where information is transferred
through radio waves and other means that reduce national borders to meaningless concepts.
I.T OPENS THE DOOR FOR NEW OFFENSES
This opens the door to undesirable phenomena. Computer- related offenses fall into three main
categories: offenses that existed before the advent of computers but were facilitated by the use of computers.
First Category
Crimes such as fraud and theft of money. The extensive use of computer and computer
networks to record business transactions and transfer money open great opportunities for criminals.
Second Category
This category includes offenses that did not exist before the computer age. It includes
destruction of computer equipment, destruction of computer files and programs and illegal copying of
computerized information and computer programs.
Third Category
Concern about activities that are not new, but have increased because of computers. It includes
the collection, manipulation, and dissemination of private data, and electronic monitoring of
individuals.
SOCIETAL IMPACT OF INFORMATION TECHNOLOGY
Few technological innovations have changed human lives as much as information technology has. The
invention of the wheel enabled people to improve land transportation and develop new machines.
Worker Dislocation
Technological progress usually takes the form of new means of production, which makes the
production process more efficient.

1
Data Center College of the Philippines of Laoag City, Inc.
A.G. Tupaz cor. M.V. Farinas Streets, Brgy. 8 San Vicente, Laoag City
F.R. Castro Street, Brgy. 1 San Lorenzo, Laoag City

COMPUTER ILLITERACY
Society is now experiencing a similar development. An increasing number of occupations require
computer knowledge. The advent of the microcomputer, those little machines called PC’s cell phones by most
people, brought the technology to every business and millions of homes in much of the world.
Personalization
People generally do not like to be referred to as numbers. To think rationally, Development in
electronic communication also contributes to this impersonal treatment of individuals.
Over Reliance on Computers
The most widely used means of communication, the telephone network, is run by computer.
Computers control the flow 0f television signals through communication satellites.
Health Hazards
A historical review of labor legislation shows that new technologies often have subjected
workers to hazards. The advent of computers changed the work environment of millions of people.
Telecommunicating
There are millions of such workers, and other countries. Some have an office, but use it only
part of the week. Telecommunicating would eliminate tons of pollutants, save gallons of gasoline, and free
personal hours for increasing productivity or leisure time. Sociologists have mixed opinions about the
phenomenon. On one hand, telecommuting allows people to work who would otherwise be outside the
workplace.
INVASION OF PRIVACY
Society esteems personal achievement and growth. Looking for the individual to endeavor and
succeed. Privacy is essential for individual growth and raises its standard of living. Privacy is essential for
individual growth.
Data Collection
Not all data that others collect about us is erroneous. But when it is, and that happens all too
often, it is not that easy to correct the misinformation.
Data Collection for marketing purposes is more than a century old, but only the information
technology of the last two or three decades allows businesses to mix and match data from different sources.
● To minimize invasion of privacy, the following rules should be followed:
o Purpose. Determine a specific purpose for collecting and maintaining the data,
and ensure that the data object understands how the data will be used.
o Relevance. Record and use only those data necessary to fulfill your purpose.

2
Data Center College of the Philippines of Laoag City, Inc.
A.G. Tupaz cor. M.V. Farinas Streets, Brgy. 8 San Vicente, Laoag City
F.R. Castro Street, Brgy. 1 San Lorenzo, Laoag City

o Accuracy. Ensure that the data are accurate and enhanced through careful data
entry and periodic verification.
o Correctness. Make use of all the data about an individual.
o Security. Limit access to those who need to know. Security includes the physical
limitation of access to computers and terminals, the use of access codes and
passwords, and the establishment of audit trails.

You might also like