Thursday, October 17, 2013

Computer Crime? Computer Mistakes? Computer Waste? Internet Issues?

Security, Privacy & Ethical Issues in Information Systems and the Internet

‘Effective advertising is the key to keeping the Internet free, and personalized ads allow consumers to see information about goods and services that are relevant to their lives’- Josh Isay

Computer crime is a serious and rapidly growing area of concern requiring management attention (Chiu, 2000). Intentional computer crime is rapidly increasing throughout the world due to the advancement in the IT industry especially IT Finance industry. Many hackers intentionally create crime to steal the information from the IT Finance industry and sell to others to make high amount of profits. Intentional computer crime requires the attention of management and security specialists to prevent the loss of importance data and privacy of the clients.

The use of information systems and technology impacts individuals, groups, and societies. Technology must be used ethically and designed to avoid injuring humans. There are two common kind of ethical issues in information systems which are computer waste and computer mistakes.



Computer Waste and Mistakes
Computer waste and mistakes contribute to computer problems, high costs, lost profits, and angry customers.


What computer waste mean?
Computer waste refers to the inappropriate use of computer technology and services in an organization or community. Many employees inside the organizational have no idea what is computer waste.


What you understand about Computer Waste?
Computer waste represents 2 percent of American’s trash in landfills, but it equals to 70 percent of overall toxic waste. The extreme amount of lead in electronics alone causes damage in the central and peripheral nervous system, the blood and the kidneys. There are about 20 to 50 million metric tons of computer waste are disposed worldwide every year. It is a terrible amount of toxic produced by human. However, there are only 12.5 percent of total computer waste is currently recycled. The develop countries such as United States of America, United Kingdom, Canada and German are the leading countries in recycling the computer waste, four of the develop countries have 80 percent from the 12.5 percent.


Computer waste is widespread in the public and private sectors, and is usually caused by the improper management of information system technology. Some organizations discard usable hardware and software that could be used elsewhere in the organization, or sold or donated. Another example of computer waste occurs when significant resources are invested in the development of an information system, and then it is never used to its fullest extent. This happens for many reasons, but poor design and inadequate training are major causes. Employees playing computer games or surfing the Web at their desks on working time is also a source of waste, as are junk e-mail and junk faxes from other organizations or hackers. 


What Computer Mistake mean?
Computer mistakes include errors, failures, and related problems that cause computer output to be incorrect or not useful. Most of the computer related mistakes are caused by human error. There are few common mistakes that employees or normal households will involve such as clicking on advertisements. For example, a free iPod! Worth $500 gift card! From the famous website such as Amazon.com, Walmart.com and etc. which the design is 99.99% seem alike but not the official company promotion. The hackers will replicate and use the well-known company website to attract and make the individual believe on it. Then they will steal the data from the computer not only the personal data but also the clients’ data.


How to avoid computer waste and mistakes?
Policies and procedures must be established to avoid computer waste and mistakes. Although often unintentional, computer waste and mistake can be costly. Organizational policies and procedures can help to avoid losses. Many employees tend to make the unintentional computer waste and mistake that caused the organization to pay a high amount to settle and repair the waste and mistake.

Preventive policies and procedures typically address the issues listed above. Procedures relating to the acquisition and use of computers can avoid both waste and mistakes. For example, procedures could ensure that computers no longer needed in one part of the organization would be used in another part of the organization, rather than discarded the computers.

Employees and groups are less likely to make mistake of using the applications and technology if they have been properly trained with ethics and the proper usage of organization’s computers. Many organizations require that systems or applications meeting certain criteria must be approved by a committee or the Information System department before the manager of any department acquire d and implemented, to ensure they are compatible with the existing systems, database and technology. It also must be cost-effective. Besides that they also established procedures to ensure that all systems including those developed by end users, have adequate documentation.

Security and Privacy of Information Systems and the Internet


What is computer crime?
Computer crime us relatively risk free, compared to crimes such as bank robbery which might involve murdering of human. And yet it can often escape detection. Furthermore, due to computer processing speed and data communications, large amounts of money can be quickly stolen or diverted with the right know-how and equipment. Computer Crime in the recent world involve of wide range of categories, such as introducing Viruses, Stealing Credit Card Numbers from online systems, and crashing Websites. The computer crimes have causes more than 10 Billion USD lost in the European countries. Even with policies in place, computer crimes can occur in an organization.


How computer being as a Tool to Commit Crime?
Computers can be used to access valuable information or steal funds. Individuals need to know how to gain access to the target computer system and know what to do to the system to achieve their objectives. Often, criminals gain the critical computer passwords or access codes needed simply by talking to employees. This is what we called the “Social Engineering”.



How to Prevent from Computer Crime?
Installed Firewalls in the computer. Firewall can help secure an organization’s information system from unauthorized external access. It is very important for organizations to develop and enforce effective Internet Security policies for all the employees. Many companies have taken steps to fight computer crime such as BERJAYA University College of Hospitality (BERJAYA UCH) has banned some unauthorized websites such as high potential forum (Crack Code Forum USA).

Since preventing computer crime requires additional controls on information systems, organizations must identify potential computer-related crime, the consequences of that crime, and the cost and complexity of the controls needed to protect against loss from the crime.  Sometimes, the cost of the controls may outweigh the potential for loss.



What is Privacy?
Privacy is the right to be out of public view or to be left alone.  With today’s information systems and networks, the right to privacy has become a challenge (IBM, 2013).  Data is continually collected and stored about personal details and often transmitted over networks without the user knowledge. Data collected normally will store inside countless database throughout the world.



Right to Privacy
The Internet poses major privacy issues which majorly involve private data about individuals is easily accessible, sometimes without charge.  The European Union has enacted privacy legislation that applies to all firms doing business in Europe. Although there is legislation before the U.S. Congress addressing Internet privacy, US citizens and businesses are skeptical about government involvement. The Online Privacy Alliance, a group supported by large companies such as AT&T, Microsoft and Walt Disney, is developing a voluntary code of conduct for Internet businesses to employ (US Department of Justice, 2013).


In conclusion, government has to play an important role in preventing the computer crime as well as the computer waste. Government can impose the new cyber laws to regulate the problem. However, government has to be careful when dealing with the cyber laws because every countries have different rules and regulations. International laws are much suitable for any country government to in use as it more accepted by most countries in the world. 



References 
Chiu.A.S (2007). The ethics of Internet Privacy.

IBM (2013). Protect Data Privacy. [online]. Availabe at http://www-01.ibm.com/software/data/optim/protect-data-privacy/

Isay.J (2002). Director of Public Policy at DoubleClick, Inc. [online]. Available at http://www.doubleclick.net/company_info/press_kit/pr.00.03.02.htm

US Department of Justice. (2013). [online]. Available at http://www.justice.gov/

No comments:

Post a Comment