You often get the notification to relate to the new rule for the security of your social media. Then, you just click okay or skip it on Facebook or others. Apparently, it is the ethics in information technology. The function of the ethics to protect the user’s privacy. Besides that, it informs that the users use the right applications and the email response. Additionally, the ethic detects
Here are 5 Ethics in Information Technology
Below, the article shows 5 ethics in information technology which are actually very important. Even though, the user never think about it because they do not understand what is that?
Data mining has a wide range coverage of activity which turns words, numbers, and other data into differentiable patterns. They are able to responsible determine demographic buyer groups or determine probable next step for a terrorist cell.
2. Social Networking
There are numerous cases relating to the social networking. For example, Facebook made a new program with Beacon as the name in 2007. The program, then, changes the user’s personal information become an advertisement. It surely allows a greater amount of connectivity between the website’s members. In fact, this program failed to create an opt-in system and came under fire because pulling information from Facebook profiles.
By the way, the action had broken down privacy boundaries common in the real world. Additionally, the ethical issue relates to the amount of security when they registering members. Several abductions come from the social media networking that connected to MySpace. Certainly, it brings up new concerns that social networking sites are not giving enough to protect young users.
3. E-mail Spam
Spam is an email with commercial or profane messages. People sent it blindly to hundreds and thousands of users. Besides that, the major case of ethics in information technology affects service providers and individuals. AOL and Yahoo! are able to identify some spammers who know that detect that their spam programs depend on feedback. As information, some users identify legitimate spammers bringing viruses and pornographic messages.
4. Intellectual Property and Information Technology
Since the 1990s, there is incorporating between the information technology and the intellectual property rights. Apparently, Limewire, Napster, and peer-to-peer downloading networks give issue toward the future property artistic violation. Here, the ethical issue arises when faced with intellectual property in the virtual world. The producer should pursue permission to reprint images and articles.
5. Filtering Online Content
Comcast had come under fire in the past two years after blocked downloads from Bit Torrent. He had claimed that “throttling down” downloads through Bit Torrent is a reasonable element to maintenance the high-speed service. Before ISP, the Federal Communications Commission (FCC) and end users is whether Internet service becomes content-neutral, they had done debate.
It turns out knowing about the ethics in information technology is very important. Knowing and obey the regulation surely save yourself. Other people cannot take your data, steal your privacy, and commit a crime against you. Moreover, cybercrime has difficult detection for common people and often not realized. So, save yourself!