Sunday, 18 May 2014

. Explain the four classifications of crime issues

Ethical issues can be classified into:
1. Privacy issues: The privacy issues deal with the collection, storage, and dissemination of information about individuals. For example:

  • What information about oneself should an employer reveal to others?
  • What kind of surveillance can an employer use on its employees?
  • What things can people keep to themselves and not be forced to reveal to others?
  • What information about individuals should be kept in databases, and how secure is the information there?
2. Accuracy issues: The accuracy issues deal with authenticity, fidelity, and accuracy of information collected and procured. The questions that need to be addressed in accuracy issues include:
Who is responsible for the accuracy, fidelity, and accuracy of information collected?


  • How can we ensure that information will be processed properly and presented accurately to the users?
  • How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional?
    • Who is to be held responsible for errors in information, and how should the injured party be compensated?
    3. Property issues: The property issues deal with ownership and value of information (intellectual property). Examples of issues that need to be addressed as property issues are:

    • Who owns the information?
    • What are the just and fair prices for its exchange?
    • How should one handle software piracy?
    • Under what circumstances can one use proprietary databases?
    • Can corporate computers be used for private purposes?
    • How should experts who contribute their knowledge to create expert systems be compensated?
    • How should access to information channels be allocated?
    4. Accessibility issues: The accessibility issues concern with the right to access information and payment towards the same. These issues include:

    • Who is allowed to access information?
    • How much should be charged for permitting accessibility to information?
    • How can accessibility be provided for employees with disability?
    • Who will be provided with the necessary equipments for accessing information?
    There is a need to address these four types of issues so that the computer and information technology business operates in an ethical domain. We must ensure that information
      
    Question=3.Discuss the distinct features of the Internet.

    Answer- 
                      The Internet has three distinct features:

    Global Scope: The Internet has a global reach. Internet technology has much broader scope and access than conventional modes of communications and data retrieval. With little effort, a user can reach hundreds and thousands of individuals around the globe. The ability to reach many people quickly and easily is not exactly new or unique compared to radio or television communication. But the significant difference between the Internet and television and radio is that in the case of radio and television, communication is in most cases one way whereas in the case of Internet it is interactive. It is this interactivity, which is the unique
    • characteristic of the Internet. Not just interactivity, customizability, easy usability, and accessibility are also distinct features of Internet.
    • Anonymity: The second important feature of the Internet is that it provides a certain kind of anonymity. On the Internet, individuals have the possibility of creating a different profile, ensuring that information about them cannot be traced while in communication with others on the Internet. It is a silent feature of Internet communication and people can deliberately avoid seeing or hearing one another directly. Anonymity makes accountability for one’s action difficult to achieve and tends to diminish trust in the information that is being exchanged. The feature of anonymity has also facilitated the development of “virtual information”.
    The open and anonymous nature of communications on the web, has led to the development of software with stealth to gather information intelligently. An inference is made from information gathered without our knowledge or consent, which is termed as “virtual information”. This type of information adds information to a person’s profile and tends to redefine a person’s digital persona. This is an invasion of one’s “virtual privacy”. 
    Reproducibility: The third feature is not just a feature of the Internet, but of information technology in general. Electronic information exists in the form that makes it easy to copy without any loss of originality or value in the process of reproduction. Copied data or software is perfectly usable. Copied data or software leaves no evidence behind and the creator/owner of the data or software could remain unaware of their work being copied. Reproducibility facilitates anonymity 

No comments:

Post a Comment