Ethical issues can be classified into:
1. Privacy issues: The privacy issues deal with the collection, storage, and dissemination of information about individuals. For example:
1. Privacy issues: The privacy issues deal with the collection, storage, and dissemination of information about individuals. For example:
- What information about oneself should
an employer reveal to others?
- What kind of surveillance can
an employer use on its employees?
- What things can people keep to
themselves and not be forced to reveal to others?
- What information about
individuals should be kept in databases, and how secure is the information
there?
2.
Accuracy issues: The
accuracy issues deal with authenticity, fidelity, and accuracy of information
collected and procured. The questions that need to be addressed in accuracy
issues include:
Who is responsible for the accuracy, fidelity, and accuracy of information collected?
Who is responsible for the accuracy, fidelity, and accuracy of information collected?
- How can we ensure that
information will be processed properly and presented accurately to the
users?
- How can we ensure that errors
in databases, data transmissions, and data processing are accidental and
not intentional?
- Who is to be held responsible
for errors in information, and how should the injured party be
compensated?
3. Property issues: The property issues deal with ownership and value of information (intellectual property). Examples of issues that need to be addressed as property issues are:
- Who owns the information?
- What are the just and fair
prices for its exchange?
- How should one handle software
piracy?
- Under what circumstances can
one use proprietary databases?
- Can corporate computers be used
for private purposes?
- How should experts who
contribute their knowledge to create expert systems be compensated?
- How should access to
information channels be allocated?
4. Accessibility issues: The accessibility issues concern with the right to access information and payment towards the same. These issues include:
- Who is allowed to access
information?
- How much should be charged for
permitting accessibility to information?
- How can accessibility be
provided for employees with disability?
- Who will be provided with the
necessary equipments for accessing information?
There is a need to address these four types of issues so that the computer and information technology business operates in an ethical domain. We must ensure that informationQuestion=3.Discuss the distinct features of the Internet.
Answer-Global Scope: The Internet has a global reach. Internet technology has much broader scope and access than conventional modes of communications and data retrieval. With little effort, a user can reach hundreds and thousands of individuals around the globe. The ability to reach many people quickly and easily is not exactly new or unique compared to radio or television communication. But the significant difference between the Internet and television and radio is that in the case of radio and television, communication is in most cases one way whereas in the case of Internet it is interactive. It is this interactivity, which is the unique
The Internet has three distinct features:
- characteristic of the Internet.
Not just interactivity, customizability, easy usability, and accessibility
are also distinct features of Internet.
- Anonymity: The second important feature of the Internet is that
it provides a certain kind of anonymity. On the Internet, individuals have
the possibility of creating a different profile, ensuring that information
about them cannot be traced while in communication with others on the
Internet. It is a silent feature of Internet communication and people can
deliberately avoid seeing or hearing one another directly. Anonymity makes
accountability for one’s action difficult to achieve and tends to diminish
trust in the information that is being exchanged. The feature of anonymity
has also facilitated the development of “virtual information”.
The open and anonymous nature of communications on the web, has led to the development of software with stealth to gather information intelligently. An inference is made from information gathered without our knowledge or consent, which is termed as “virtual information”. This type of information adds information to a person’s profile and tends to redefine a person’s digital persona. This is an invasion of one’s “virtual privacy”.Reproducibility: The third feature is not just a feature of the Internet, but of information technology in general. Electronic information exists in the form that makes it easy to copy without any loss of originality or value in the process of reproduction. Copied data or software is perfectly usable. Copied data or software leaves no evidence behind and the creator/owner of the data or software could remain unaware of their work being copied. Reproducibility facilitates anonymity- Who is to be held responsible
for errors in information, and how should the injured party be
compensated?
No comments:
Post a Comment