Print Сite this

Computer Ethics and Data Protection

Computer ethics is the natural analysis and social impact of computer technology and the justification of policies and their moral uses. The main challenge in ethics is the gaps in implementing the strategies arising from new aspects of technology. Ethics involve practices, procedures, and standards governing technology consumption without violation of individuals’ or organizations’ moral values (Tang et al., 2019, p. 44). Information can be stolen through hacking, plagiarism, malware, and physical threats. Computing ethics addresses moral issues involved in technological procedures such as data theft and information sharing which should be guarded through laws and regulations.

We will write a
custom essay
specifically for you

for only $16.05 $11/page
308 certified writers online
Learn More

Ethics in computer use holds the moral guidelines governing computer users and privacy policies which protect data access and information belonging to other people. Organizations and individuals face data theft through digital information without their consent. The information can be either financial, banking accounts such as loan amounts, deposits of large sums of money, or health records. Cybercrimes have increased with developed technology through hacking, phishing, malware, malicious mobile applications, and physical security threats (Tang et al., 2019, p. 45). Data protection is achieved when users adopt computer morals while practicing ethical theories. A professional code of ethics should be practiced so that technological users follow the guidelines in handling data both for individuals and organizations. Team members should learn to cooperate and work together by following moral and ethical behavior while using and sharing information. Cybercrimes have been on the rise causing a threat to data, therefore, laws such as the Computer Fraud and Abuse Act are enhanced to govern data protection (Tang et al., 2019, p. 45). Computer ethics is essential in protecting information for users at the individual and organizational levels therefore, laws and regulations should be enacted to increase the safety of data.

In conclusion, computer ethics is essential in securing data from malicious acts which could cause losses. Ethics involve proper procedures and practices that determine data handling and access in a way that negatively affects owners of data. Due to the increased rate of cybercrimes, laws and regulations should be enacted to increase the security of information from computers and systems and owners should be consulted before accessing their information.

Reference List

Tang, Y., Xiong, J., Becerril-Arreola, R. and Iyer, L. (2019) ‘Blockchain ethics research: a conceptual model’, Proceedings of 2019 on Computers and People Research Conference, New-York, United States. Web.

Cite this paper

Select style

Reference

StudyCorgi. (2022, April 18). Computer Ethics and Data Protection. Retrieved from https://studycorgi.com/computer-ethics-and-data-protection/

Reference

StudyCorgi. (2022, April 18). Computer Ethics and Data Protection. https://studycorgi.com/computer-ethics-and-data-protection/

Work Cited

"Computer Ethics and Data Protection." StudyCorgi, 18 Apr. 2022, studycorgi.com/computer-ethics-and-data-protection/.

* Hyperlink the URL after pasting it to your document

1. StudyCorgi. "Computer Ethics and Data Protection." April 18, 2022. https://studycorgi.com/computer-ethics-and-data-protection/.


Bibliography


StudyCorgi. "Computer Ethics and Data Protection." April 18, 2022. https://studycorgi.com/computer-ethics-and-data-protection/.

References

StudyCorgi. 2022. "Computer Ethics and Data Protection." April 18, 2022. https://studycorgi.com/computer-ethics-and-data-protection/.

References

StudyCorgi. (2022) 'Computer Ethics and Data Protection'. 18 April.

This paper was written and submitted to our database by a student to assist your with your own studies. You are free to use it to write your own assignment, however you must reference it properly.

If you are the original creator of this paper and no longer wish to have it published on StudyCorgi, request the removal.