Computer Ethics Insert Computer Ethics According to Debora, the increase in computers is causing more harm than good in terms of social issues. She explains that privacy in the social aspect should relate to social good in its own right (Johnson, 1993). Most people feel that privacy only affects people who have issues to hide from their friends. This is however untrue. Information to a person may be wrong in many ways (Langford, 2009). A person can decide on issues where incorrect information is saved although they may not be able to completely erase the information from the database, which stores it. Numerous information of a person can exist in an infinite period leading to unfavorable actions on the side of agencies that enforce law, potential employers together with agencies that offer credit facilities (Becker & Becker, 2008). She puts across that some companies and institution can gain access to individual information and uses it against them basing on religion, ethnicity or race. People who discover that their personal information may be accessed, have a lot of pressure to conform. When most people feel afraid that their personal information can be accessed, they reduce their capability to induce change in the society (Tucker, 2006). This indicates that privacy matters affect more than the wrong doers do.
Debora also argues that people have a right to reject giving their personal information. Those that give their information indeed forfeit this right (Werhane & Freeman, 2011). She says that in the current society it is almost impossible to live without providing your personal information. For instance, one cannot use a computer if he cannot provide personal information, use credit card, get health insurance or even get a driver’s license or benefit from any government program (Gabelman, 2005). This is because the information is stored in the databases. She observes that there are many reasons why people should reject giving their personal information though it can cause serious inconveniences (Canto-Sperber, 2004). People can embrace the new developments of computers without fear of dangers that arise by using passwords and keywords to protect their personal information.
Our writers will create one from scratch for
Becker, L. & Becker, C. B.(2008).” Ethics and Computers.” In The Encyclopedia of Ethics edited by 191-194. New York: Garland Publishing.
Canto-Sperber, M. (2004). “ LEthique Des Ordinateurs.” In Dictionnaire De Philosophie Morale. New York: Garland Publishing.
Croissant, J. & Restivo, S. (2007). Albany Conflicts of Interest and Industry-Funded Research: Chasing Norms for Professional Practicein the Academy.” In Degrees of Compromise: Institutional Interests and AcademicValues. NY: SUNY Press.
Gabelman, M. (2005).“ Engineering Ethics.” In the new engineers guide to career growth and professional awareness Piscataway. NJ: IEEE Press.
Johnson, D. (1993). Computer Ethics. London: Prentice Hall College Div; 2nd edition
Langford, D. (2009). “ Democratic Values.” In Internet Ethics edited. London: Macmillan Press
Paris: Presses Universitaires de France.
Tucker, A. (2006). Ethical Issues for Computer Scientists and Engineers.” In The Computer Science. London: CRC Press.
Werhane, P. & Freeman, R. (2011). “ Ethical Issues of Computers and Computer Technology.” New York: Blackwell Publishers.