.

Tuesday, May 14, 2019

Information technology ethics Essay Example | Topics and Well Written Essays - 750 words

Information technology ethics - Essay ExampleOn the other hand the biggest demoralised use of a data processor is for crime personas. As people make use of the calculating machines they typically deliberate that their activities are confidential and also their personal information is protected. For instance, web points of business nature often hit details from many visitors later on many web sites sell these personal details against the desires of the visitors (Turban, Rainer and thrower NCSI-Net). This is a kind of computer crime. There are many other kinds of a crime which are performed using a computer however most of the computer crimes are covered under the landmark phishing. In their book, (Laudon and Laudon 147) define computer crime as the unlawful activities by making use of a computer or against a computer system. The Internets user-friendliness and convenience have fashioned advance(a) ways for computer crime, well-known forms of which is phishing. Additionally, the computer crimes appear in a wide variety of ways and also bring forth a number of serious problems for different people. For instance, nowadays online frauds or frauds using the Internet are modern form of the online criminal activities in which an authorized person (normally acknowledged as a hacker) hacks some helpful data and information and later on use it to conduct illegal and criminal tasks, such as cash related scandals. In this scenario, the basic intentions of criminals are to earn money, tease other or coquette games with others. In fact, the Internet is open for everyone which gives the opportunities to criminal people, to steal, new ways to steal them, and new techniques to harm others (Laudon and Laudon 147). As discussed above, there are many kinds of a computer crime and criminals do it intentionally. For instance, sometimes a displease employee or terminated worker can be dangerous to an organization. In this scenario, these people want to misemploy busine ss with their extensive criminal activities (Parker Turban, Rainer and Potter). Therefore, employers should properly scrutinize the background of persons being connected with critical computer related tasks. Some people falsify resume to get jobs. Also, the company should hire trustworthy military force to minimize crimes related to computers. In addition, Hacker and Cracker are most widely used impairment in computer crimes. In this scenario, Hacker is an external person who can break through a computer system, typically with no illegal intention. On the other hand, a Cracker is a afoul(ip) hacker, who may perhaps produce a stern crisis for the organization (Parker Turban, Rainer and Potter). Moreover, Phishing is an emerging problem regarding online data auspices and information safety. There are a number of cases of identity theft and online frauds using Phishing and other hacking techniques. At the present, Phishing is normally carried out through E-mail or the instant messa ging. In many cases its basic purpose is to direct online traffic to a particular website whose appearance or interface are approximately homogeneous to the actual one. Even though server cannot differentiate between false and original web site so a hacker successfully passes through these security walls. Normally, Phishing techniques are aimed at making gain to the internet users, and making use of the attractive usability of present web expertise. In this scenario,

No comments:

Post a Comment