Ethical and unethical uses of technology Essay

Essay Topic: Essay, Ethical, Personal information, Private information, Social media, Technology, Uses,

Paper type: Technology,

Words: 448 | Published: 02.01.20 | Views: 195 | Download now

These two subject areas do go with each other since the combination of both topics can lead to the problem of identity thievery. Identity thievery is a very common problem at the present universe which has affected over “8. 1 million people”. Relating to me, personality theft can be described as stealing one’s personal information for your own gain throughout the means of technology. One example of this could be how it is possible for us while humans to determine (“stalk”) info of others while staying seated in the home.

To sophisticated, it is simpler to access data of people just like date of birth, cell phone numbers, the town/city one lives in, email address, and postal address through the way of social media websites like Facebook . com, Twitter, Instagram, and Tumblr etc . One could say that the key reason why people reveal their private information as stated just before on social media sites because they “trust” the people around them, which not surprisingly can be not true. Many people in this world (even though, it is not considered ethically right) will use the individual information for his or her own great.

For instance, various teenager outdated 15-18 can use personal information of other people (they hate or jealous of) from Facebook or myspace (one can easily access private data of somebody else even though they are really not good friends if the person lets the earth see his own information) to produce a fake accounts and bug them before the world (this shows how topics ethics and personal privacy is attached to cyberbullying); this kind of here might be the story of “12% of Canadians” whose life got affected by this action since they placed their personal information online. Other than this, additionally, there are other reasons that show who in the world down load software (which results in all of us stealing private information of the software program like item key, and installation split password) illegally, and install them in their computer by making use of torrent working programs and Daemon Application Lite.

A lot of us might have written for the “$59 billion really worth of software stolen” in the year 2010, even though all of us knew that it can be not morally correct. Although we the “installers” are considered as underhanded, one may admit the “uploaders” are too similarly the culprits as the installers. Many uploaders crack through the application to remove personal information like selected security programs that obstructs hacking, and installation crack.

They later sell the so called duplicate software in order to websites for money where we all “installers” can easily download from free.

Related posts

Save your time and get your research paper!

Get My Essay