Skip to main content

Moral scope of computer use


Some of the problems with information technology in moral undertones are discussed below:
Privacy and freedom in an information society
The policy refers to the rights of individuals to keep personal information in them. Personal data such as one's health problems, income sources, spending habits, leisure activities, etc. may be important for some companies because they use them for business planning. Some companies may collect such personal information and sell it to other companies. Individuals want to be alone at home and at home without being checked. Employees may be able to prevent e-mail and other communications from employees. The security systems of the organizations often include monitoring or intrusion that violates the privacy of individual employees.
Internet and privacy of individuals
New technologies based on the Internet show a serious threat to personal privacy. Every internet user is kept up to date without knowing it. Software such as cookies keep visitors on websites and their surfing behavior. The data is used for market research of companies.
"Cookies" are pieces of special software stored on the user's computer's hard disk when he visits a site. Users may feel that they are not viewed by anyone, but it is not true. Cookies collect important information about user surfing behavior, online buying behavior, etc. When they visit the same website next time, cookies pass on information to users. So cookies keep internet users. Spam is another serious challenge that every internet user faces and bullying grows fast. It is the practice of sending unsolicited e-mails for business promotion. It is difficult for a user, because the mailbox is filled with so many spam e-mails and some e-mails from his contacts.
Intellectual property rights (IPRs)
IPRs cover all poor or intangible assets of the human mind. Assets are subject to abuse. So the law is obliged to protect them. Protection is in the form of trademarks, copyrights and patents. Registered trademarks are legal means to prevent the misuse of trademarks, etc. Copyright protects a person's intellectual property against copying from others without permission from the author. In a network environment, it is very difficult to protect intellectual property. On the Internet, digital content can be opened and distributed without permission or knowledge of the author. For example, illegal copying and distributing MP3 music files on the web is a major challenge in the music industry. Likewise, any publication of the internet is easy to download and can be reproduced in any other work.
Software piracy is another major threat to the global network. This is the unauthorized distribution or use of the software. Software companies lost revenue due to software piracy and did not receive enough return for the efforts involved in developing software. Images, films and sounds that have been downloaded from the Internet can also be changed un-recognizably with the help of scanners and multimedia devices. It leaves a small remedy to the original copyright owner.

Comments

  1. Casinos in Malta - Filmfile Europe
    Find ventureberg.com/ the best Casinos filmfileeurope.com in Malta including bonuses, games, games and the history jancasino.com of games. https://septcasino.com/review/merit-casino/ We cover all the main reasons to visit wooricasinos.info Casinos in

    ReplyDelete

Post a Comment

any suggestion on my side

Popular posts from this blog

How to set up a passkey for your Apple account

  Passkeys are a new and more secure way to sign in to your Apple account. They are similar to passwords, but they are stored on your device and are not shared with Apple. This makes them more resistant to phishing attacks and other security threats. Passkeys are currently not available for Apple accounts. However, they are expected to be available in a future software update. Set up a passkey for Apple account When passkeys are available, you will be able to set up a passkey for your Apple account by following these steps: 1.     Go to the Settings app on your Apple device. 2.     Tap on your name at the top of the screen. 3.     Tap on "Password & Security." 4.     Tap on "Passkeys." 5.     Tap on "Set Up Passkey." 6.     Follow the on-screen instructions to create a passkey. Once you have created a passkey, you will be able to use it to sign in to your Apple account on...

Requirement for connecting to the Internet

The basic requirements for connecting to the Internet are a computer device. In addition,   you need the following things, to connect to the Internet: (i)           Modem (ii)          Telephone wire (iii)         Internet Service Provider (ISP) (iv)        Internet connection (v)         Web-browsing software Modem (modulator-demodulator) A modem is a device that enables a computer to transmit data over telephone or cable lines. Computer stored information digitally; information transmitted over telephone lines in the form of analog waves. A modem converts between these two forms. A modem can be either internal or external. The internal modem is attached to a slot on the motherboard. The external modem can be placed anywhere outside the system unit and connected to the ...

Approaches of comparative education

  Apollo (1986) identified eight approaches to the study of Comparative Education. They are: 1. Problem Approach or Thematic approach 2. Case study approach 3. Area study approach 4. Historical approach 5. Descriptive approach  6. Philosophical approach  7. International approach and 8.  Gastronomic approach 1. Problem approach or thematic approach —   In this approach the investigator will first of all identify a particular educational problem in his own country. Then, he will begin to look for another country that has the same problem . —   The researcher will also study the education problem of another country in relation to their culture. The researcher will not only study the educational problem of another country but he will also examine the solution applied to such problem by the affected country . 2. Case study approach   —   In this approach, an education comparativist from Nigeria can go to Iraq to study the...