.

Thursday, February 28, 2019

Ethical and unethical uses of technology Essay

The above two topics do complement each some new(prenominal) since the combination of the two topics female genital organ lead to the problem of individualism theft. individualism theft is a very common problem at the parade world which has affected over 8.1 million masses. According to me, identity theft can be described as stealing wholenesss face-to-face randomness for your own gain by means of the actor of technology. unity example of this could be how it is easy for us as earthly concern to see (stalk) selective information of other people while macrocosm seated at home. To elaborate, it is easier to access information of people same(p) designation of birth, cell phone numbers, the town/city one lives in, email address, and postal address through the means of social media websites like Facebook, Twitter, Instagram, and Tumblr etc. One may say that the reason people sh atomic number 18 their offstage information as stated before on social media sites because th ey trust the people around them, which not surprisingly is not true. Many people in this world (even though, it is not considered ethically right) will use the individual(prenominal) information for their own good.For instance, many teenager aged 15-18 can use personal information of other people (they hate or jealous of) from Facebook (one can access private information of another person even though they are not friends if the particular person lets the world see his personal information) to make a fake account and embarrass them in see of the world (this shows how topics ethics and privacy is connected to cyberbullying) this here might be the story of 12% of Canadians whose life got affected by this action since they stick on their personal information online. Other than this, there are also other reasons that show how many people in the world download software program (which results in us stealing private information of the software like product key, and installation crack pa ssword) illegally, and install them in their computer through the use of torrent running programs and Daemon Tool Lite.Many of us might have contributed to the $59 billion worth of software stolen in the year 2010, even though we knew that it is not morally correct. While we the installers are considered as unethical, one may say that the uploaders are too as the culprits as the installers. Many uploaders hack through the software to remove private information like certain security programs that blocks hacking, and installation crack. They later dole out the so called pirated software to different websites for money where we installers can download from free.

No comments:

Post a Comment