INFO4MYSTREY

This blog is created for educational purposes. Info4mystery archive and support student, teacher, Educationalists, Scholars and other people for learning by facilitating reflection, questioning by self and others, collaboration and by providing contexts for engaging in higher-order thinking.

Full width home advertisement

Popular Posts

Post Page Advertisement [Top]

Moral scope of computer use

Moral scope of computer use


Some of the problems with information technology in moral undertones are discussed below:
Privacy and freedom in an information society
The policy refers to the rights of individuals to keep personal information in them. Personal data such as one's health problems, income sources, spending habits, leisure activities, etc. may be important for some companies because they use them for business planning. Some companies may collect such personal information and sell it to other companies. Individuals want to be alone at home and at home without being checked. Employees may be able to prevent e-mail and other communications from employees. The security systems of the organizations often include monitoring or intrusion that violates the privacy of individual employees.
Internet and privacy of individuals
New technologies based on the Internet show a serious threat to personal privacy. Every internet user is kept up to date without knowing it. Software such as cookies keep visitors on websites and their surfing behavior. The data is used for market research of companies.
"Cookies" are pieces of special software stored on the user's computer's hard disk when he visits a site. Users may feel that they are not viewed by anyone, but it is not true. Cookies collect important information about user surfing behavior, online buying behavior, etc. When they visit the same website next time, cookies pass on information to users. So cookies keep internet users. Spam is another serious challenge that every internet user faces and bullying grows fast. It is the practice of sending unsolicited e-mails for business promotion. It is difficult for a user, because the mailbox is filled with so many spam e-mails and some e-mails from his contacts.
Intellectual property rights (IPRs)
IPRs cover all poor or intangible assets of the human mind. Assets are subject to abuse. So the law is obliged to protect them. Protection is in the form of trademarks, copyrights and patents. Registered trademarks are legal means to prevent the misuse of trademarks, etc. Copyright protects a person's intellectual property against copying from others without permission from the author. In a network environment, it is very difficult to protect intellectual property. On the Internet, digital content can be opened and distributed without permission or knowledge of the author. For example, illegal copying and distributing MP3 music files on the web is a major challenge in the music industry. Likewise, any publication of the internet is easy to download and can be reproduced in any other work.
Software piracy is another major threat to the global network. This is the unauthorized distribution or use of the software. Software companies lost revenue due to software piracy and did not receive enough return for the efforts involved in developing software. Images, films and sounds that have been downloaded from the Internet can also be changed un-recognizably with the help of scanners and multimedia devices. It leaves a small remedy to the original copyright owner.

No comments:

Post a Comment

Labels

Bottom Ad [Post Page]

| Designed by Colorlib