You are on page 1of 23

What Is Technology?

Technology is a body of knowledge devoted to creating tools, processing actions and extracting
of materials. The term Technology is wide and everyone has their own way of understanding
the meaning of technology. We use technology to accomplish various tasks in our daily lives, in
brief; we can describe technology as products, processes or organizations. We use technology to
extend our abilities, and that makes people as the most important part of any technological
system.
Technology is also an application of
science to solve a problem. But what you
have to know is that technology and
science are different subjects which work
hand-in-hand to accomplish a specific task
or solve a particular problem.
We apply technology in almost everything
we do in our lives, we use technology at
work, we use it to , extract materials , we
use technology for communication,
transportation, learning, manufacturing,
creating artifacts, securing data, scaling
businesses and so much more. Technology
is human knowledge which involves tools, materials and systems. The application of technology
results in artifacts or products. If technology is well applied, it can benefit humans, but if it is
wrongly applied, it can cause harm to human beings.
Many businesses are using technology to stay competitive, they create new products and services
using technology, and they also use technology to deliver those products and services to their
customers on time. A good example is, mobile phones companies like Apple & Samsung, these
two electronics companies, use high end technology to create new smart phones and other
electronic devices to stay competitive. This competitive edge is gained through employing
advanced technology.
Lets take a simple example on how people use technology on a daily basis,
See figure (1) below:

ADVANCING TECHNOLOGY:
Technology is dynamic; it keeps on improving because even our needs and demands for
technology keep on changing. We have moved from the industrial age (industrial revolution) to
an information age. During the industrial age, companies with large sums of capital had the
potential of employing expensive technological tools to gain competitive advantage; small
businesses had less potential because they could not afford expensive manufacturing or
processing technological tools. But, the advancement in technology has created a new economic
environment which depends on information and that is what I call INFORMATION AGE, the
information age provides a different work environment and this has helped small businesses gain
position in highly competitive markets.
Lets take a simple example and see how technology has advanced;
See figure (2) below;

TYPES AND EXAMPLES OF TECHNOLOGY:


We use technology to accomplish various tasks, so technology comes in different types, below I
have listed some of the different types of technology we use on a daily basis and on each type of
technology I have included an example of that particular technology.

Communication Technology: This is a system that uses technical means to transmit


information or data from one place to another or from one person to another. Communication
is used for many purposes; it is used to convey ideas, exchange information and express
emotions. Humans use communication technology tools like phones, computers, emails, fax,
text messaging tools to stay in touch with friends and family , then, businesses use

communication technology tools to facilitate the flow if information in a workplace, to help in


decision making , to serve customers needs and requests, to promote new products or services
to targeted consumers and so much more.
Example of Communication Technology:
KUDOS Presenter for iPhone Presentation
Let your iPhone control your power point
presentations. This KUDOS presenter uses
audio connector to communicate. So you can
improve the way you make power point
presentation using your iPhone with this
KUDOS technology. Learn more
about KUDOS here

Construction Technology: This is the


study of advanced methods and equipments
which can be used to build structures.
Construction builds two types of structures.
These include buildings and heavy
engineering structures. Construction uses
various technological actions to erect a
structure on the site where it will be. The
use of construction technological tools like heavy tractors to prepare land where the
construction will be, computer design software to create designs for structures on computers
and in 3D format, using various construction technologies to enclose structures and install
utilities has helped in advancing both residential buildings and commercial buildings today.
Example of Constriction Technology:
Factory-Reconditioned Stanley Bostitch
It works as an air compressor and a nail gun at
same time. Buy it from AMAZON.COM

Assistive Technology: This is the type of


technology which is used by people
with disabilities to accomplish specific tasks
which seem to be difficult or impossible to
perform. The term Assistive means helping
providing an extra hand. Assistive technology
being used in schools to help students with
Autism to learn better, it is used to help
people with disabled bodies move, speech
recognition application help people who cant
type with a keyboard to use a computer and
much more. Due to advancement in
technology, we have a variety of assistive
technologies which can assist you accomplish anything which might seem difficult.

the

or
is

so

Example of Assistive Technology:


Off road wheelchair:
Image from: www.wheelchairdriver.com
This off road wheelchair can assist
people with disabilities to move
comfortably.

Medical Technology: This is the


type of technology which is used to
extend and improve human life.
Medical technology reduces patients
pain, and injury. Developed countries
have benefited from the use of
medical technology in their health
care systems and this explains the
reason why people in developed
countries leave longer than people in
developing countries. Medical
technology is used to diagnose
infections, treat diseases and to make research on diseases affecting humans.
Example of medical technology:
TAP 20 for Point-of-Care Testing SeventhSense
Image from: www.7sbio.com
This Point-of-Care Testing can help doctors obtain
patients blood without diagnosis. It comes with so many
advantages which include:
Its painless for the patient.
-It keeps the blood sample until used for testing
Learn more about Point-of-Care testing here

Information Technology: Information Technology is a set of hardware and software


tools used to store information. Information technology tools help in providing the right
people with the right information at the right time. Knowledge workers in organization use
information technology to complete various tasks and these can include; transferring of
information which facilitates decision making with in an organization, improve customer
service, and so much more. In this information age, it is very important to manage information
systems to ensure accuracy and efficiency. Management information systems (MIS) involves
planning for, development, management, and use of information technology tools to help
knowledge workers and people perform all tasks related to information processing and
management. Big financial institutions likeBANKS use information technology to operate
their entire businesses as well as serve their customers.
Examples of information technology tools:
Transporter:

This IT based technological


tool will enable you share,
access and protect files.
Transporter is an online, offcloud storage solution which
supports private sharing of
valuable files. Unlike cloud
storage facilities
likeDropbox.com & Box.com,
this device is private and it can
allow you to store your files
remotely and share them with
your employees or partners. To
use the device remotely, you
will have to create a free
online account, create shared
documents, and much more,
the only difference with
Dropbox.com, is that the files
are stored on this device, so the all cloud service is brought to your office or home. Learn more
about Transporter here

Entertainment Technology: This is a process of using various technological components


to create an entertainment experience. Since entertainment is too broad, every one gets
entertained in their own way. Technology is used to build theaters, it is used to create video
games, to develop musical systems and so much more. Entertainment technology includes
things like video, sound, automation. Animations, scenery fabrication, computer simulations.
Interactive environments and so much more.
Example of Entertainment Technology:
gTar: Ethics in technology is a sub-field of ethics addressing the ethical questions specific to
the Technology Age. Some prominent works of philosopher Hans Jonas are devoted to ethics of
technology. It is often held that technology itself is incapable of possessing moral or ethical
qualities, since "technology" is merely tool making. But many now believe that each piece of
technology is endowed with and radiating ethical commitments all the time, given to it by those
that made it, and those that decided how it must be made and used. Whether merely a lifeless
amoral 'tool' or a solidified embodiment of human values "ethics of technology" refers to two
basic subdivisions:

The ethics involved in the development of new technologywhether it is always, never,


or contextually right or wrong to invent and implement a technological innovation.

The ethical questions that are exacerbated by the ways in which technology extends or
curtails the power of individualshow standard ethical questions are changed by the new
powers.

In the former case, ethics of such things as computer security and computer viruses asks whether
the very act of innovation is an ethically right or wrong act. Similarly, does a scientist have an
ethical obligation to produce or fail to produce a nuclear weapon? What are the ethical questions
surrounding the production of technologies that waste or conserve energy and resources? What
are the ethical questions surrounding the production of new manufacturing processes that might
inhibit employment, or might inflict suffering in the third world?
In the latter case, the ethics of technology quickly break down into the ethics of various human
endeavors as they are altered by new technologies. For example, bioethics is now largely
consumed with questions that have been exacerbated by the new life-preserving technologies,
new cloning technologies, and new technologies for implantation. In law, the right of privacy is
being continually attenuated by the emergence of new forms of surveillance and anonymity. The
old ethical questions of privacy and free speech are given new shape and urgency in
an Internet age. Such tracing devices as RFID, biometric analysis and identification, genetic
screening, all take old ethical questions and amplify their significance.

For those who want to play a


guitar but you have always found
it
difficult, you can opt for this
engineered guitar. The gTar can
be
played by anyone , it is an
electrical guitar which comes a
free gTar app which has test
songs that you can start playing
right away. Buy this gTar
from here:

Business Technology:
This is the type of technology
which is made up of various hardware tools and software applications used to run a business
and enhance various business operations. Many businesses are using technology to scale and
grow big. Small businesses have used technology to create new ways of competing with well
established companies. To some extent, some business technologies can make a small
company look like a big company and this can help a small business gain position in a
competitive market.
Example of business technology:
3D Printer Created by formlabs
This is an affordable 3D printer which can help designers create advanced 3D objects. Its size
and design is good, so it can fit well on your office desk. With this 3D printer, you can create as
many 3D models as you want. Use its software to generate thin, breakable support structures.
Learn more about this FORM1 3D printer here:

Educational Technology: Is the type of


technology which aims at improving
performance by creating and managing
various technological processes and
resources. It is an academic discipline which
prepares individuals to acquire deeper
understanding and knowledge. It helps them
learn how to devise solutions to problems
through research, design, evaluation and
utilization. Educational technology helps in
improving the way we learn, some of the
benefits of educational technology include:
It motivates students and it encourages
individual learning.
It makes the access of educational material
easy.
It helps students learn new subjects and languages through Gamification
Example of Education Technology:
Markup:
Teachers you can try this Paperless grading application for iPad. If you want to have a paperless
classroom and your students have access to iPads, then this technology will be of great use to
you and your students. Markup has completely changed the way teachers mark test and exam
papers, students can submit electronic papers to be marked by their teachers electronically, this
saves time and resources on both sides. Try out this Markup application for ipad from here
(www.showme.com )
1.

4. WHAT IS THE DIFFERENCE


BETWEEN TECHNOLOGY AND
SCIENCE?
Technology is not applied science, both
technology and science are closely related but
they are different in so many ways. Technology
develops and explains the human-made world; it
involves development, processing and
management;
While
Science explains the natural world; science
refers to systematic methodology which is used
to gather accurate information about the shared reality. During the process of gathering this
information, technological tools are used. For example, microscopes are biological tools which
can be used to study specific facts about anything with life.
Scientific knowledge is gathered from detached observations. Scientists can use this gathered
information using technological tools to explain why certain things happen and this all process
can be described as research.

As humans, we use both technology and science together, that is why we confuse these two to be
the same. Science is knowledge of the natural world while technology is human-made world
determined by processing, development and management.

For
you to understand the difference between science and technology, see example in figure
Look closely at image (a), it shows you a volcanic mountain erupting, this is a natural state of
our world, and it is only science which explains how this volcanic activity happens basing on
extensive research and data gathered by scientist. In image (b) , we see a scientist using a
microscope to make research and gather data. A microscope is human-made technology designed
to help scientists make research. So that means that both concepts work hand in hand, but they
are completely different. Humans have developed various technological tools to help us solve
problems during our daily lives, but also this technology can affect the natural setup of our
environment if applied wrongly.

ADVANTAGES AND DISADVANTAGES OF TECHNOLOGY?


Technology is good because it simplifies the way we do things in our daily lives, however, if
technology is wrongly applied, it can be harmful in so many ways. Technology is developed by

humans, so we can use it to accomplish almost every task; it makes the impossible look
possible. However, for you to understand the advantage and disadvantage of technology today,
we can use an example in figure (4) below:
Figure (4)

As you can see in the photo above, if technology is well implemented it can be of great use to
humanity, but it can also cause harm. Below I have detailed points on the advantage and
disadvantage of technology inbusiness, classroom or education.
Advantages of Technology in Business:

Increases production: Technology helps businesses automate most tasks and this process
results into increased production and efficiency. Business can automate tasks in the accounting
department by using accounting software likeQUICKBOOKS . Bakeries can automate the
temperature room by using temperature sensors to detect a drop or an increase in temperature.

Technology Helps small business gain competitive advantage: If business technology is


well implemented, it can help a small business gain position in a competitive market. Some of
the ways small businesses use technology to scale out and gain a good position in the market
are; improving customer care services through internet technologies like social networks and
electronic mail, creating new products and services tailored basing on customers needs and
wants

Saves time: Since most of the activities in the business are automated, time is saved
during the process. Computers can be used to perform various business tasks, for example a
computer can be used to record data, it can be used in video conferencing, and much more.
Technology accelerates innovation: The only way small businesses can succeed in todays
competitive world is by using technology to create new products or services. Small businesses
can use internet technology to collect information about targeted consumers, so that they
understand their needs and wants, this information can be used when tailoring new products or
services.
It improves sharing of information: Many businesses use internal networks to facilitate
the flow of information with in the organization. This internal network can help in the transfer
of information among different departments at work. Also employees can share different
technologies like printers, fax machines and internet via an internal network. This easy flow
of information also improves on the speed at which decisions are made in a business.
It improves on data storage: It is very important to keep business data secure, because a
disaster can strike your business and you lose all important information. The use of databases
and remote storage facilities helps in keeping business information and data secure and
accessible from anywhere.
Technology simplifies business communication: Every business survives on
communication; you need to communicate with yourSUPPLIERS , business partners and
employees, so technology will make this all process simple. Many businesses use
communication technologies like mobile phones, video conferencing applications
like SKYPE, text messaging services and electronic mail to exchange important business
information.

Disadvantages of Technology in Business:

Its expensive: Technology comes at a price, not every small business can manage to use
technology. After buying and integrating technology in business, you will have to pay another
cost of maintaining that technology, monthly maintenance is recommended and this can be
expensive.

Not Safe: Technology is not safe; it is very easy to lose business data through internet
technology. Hackers can easily access your remote database and use your business data for
their own personal needs.

Disconnectedness: Over-dependence on technology has killed workplace relationships,


employees and business managers communicate through email, phones, text messages and
video conferences, this kills face-face communication. Also most tasks are being automated,
so you find that employees have less involvement in the final product which leads to
dissatisfaction and workplace boredom.
Information technology ethics is the study of the ethical issues arising out of the use and
development of electronic technologies. Its goal is to identify and formulate answers to questions
about the moral basis of individual responsibilities and actions, as well as the moral
underpinnings of public policy.

Information technology ethics raises new and unique moral problems because information
technology itself has brought about dramatic social, political, and conceptual change. Because
information technology affects not only how we do things but how we think about them, it
challenges some of the basic organizing concepts of moral and political philosophy such as
property, privacy, the distribution of power, basic liberties and moral responsibility.
Specific questions include the following. What are the moral responsibilities of computer
professionals? Who is to blame when computer software failure causes harm? Is computer
hacking immoral? Is it immoral to make unauthorized copies of software? Questions related to
public policy include: what constitutes just policy with respect to freedom of speech, association,
and the exercise of other civil liberties over computer networks? What determines the extent and
limits of property rights over computer software and electronic information? What policies
adequately protect a right to privacy?
The list of questions shifts in response to developments in information technology. One
noteworthy example is the rise in prominence of questions about communication and information
in response to the explosive growth of high-speed digital networks. This shift has subsumed the
field commonly called computer ethics under the broader rubric of information technology
ethics.

Ethical Challenges of Information Technology


As much as information technology is important to our lives, it is facing some serious ethical
challenges, and it is up to the IT experts and users of information technology to be ready for
these challenges. As more emerging information technologies pop up on the market, most of the
IT experts and users do not know how to go about the challenges brought by these technologies.
Information technology is facing one of its biggest challenges which are lack of privacy, security,
copyright infringement and increased computer crimes. This has stimulated criminals to exploit
users of IT basing on the lope holes left in these technologies. Since information technology
speeds the access and flow of information, many businesses and organizations are at risk of
losing this data because experienced criminals can easily tap that information for their personal
use.
Also unfaithful employees can use information technology to archive their personal goals which
might be harmful to an organization. IT is not bad by its self, but the way humans use the tools
provided by information technology has brought some serious challenges. Below I have listed
detailed topics on 5 Ethical Challenges of Information Technology

Security: With tools like the internet, hackers have found it very easy to hack into any
computer or system as long as it is connected on internet. Hackers can easily use an IP
(Internet Protocol) address to access a users computer and collect data for selfish reasons.
Also the wide spread of internet cookies which collect information whenever we use the
internet , has exposed IT users to high risks of fraud and conflicting interests. Many big
companies use these cookies to determine which products or service they can advertise to us.
When it comes to online banking, the transfer of money can easily be interrupted by a hacker
and all the money will be transferred to their desired accounts , which affects both the bank
and the customers who is using online banking technology.

Copyright
Infringement: Information
technology has made it easy
for users to access any
information or artifact at any
given time. With the
increased development of
music sharing networks and
photo bookmarking sites, many original creators of these works are losing the credibility of
their works, because users of IT can easily gain access and share that data with friends. Free
music and file downloading sites are popping up on internet every day , lots of original work
like music albums, books , are being downloaded for free. In this case one legitimate user
will purchase the book , software, web template or music album, and they will submit it to a
free download site where others will simply just download that data for free. It is good news
for the users because it saves them money, but it harms the original creator of these works.
The government has closed some of these sites likeMEGAUPLOAD.COM , but many are
popping up using funny URLs.

Increased pressure on IT experts. Since information technology systems have to run all
the time, pressure is mounted on IT experts to ensure the accuracy and availability of these
systems. Many big organizations which need to operate 24 hours will require a standby IT
team to cater for any issues which might arise during the course of operation. This pressure
results into stress and work overload which sometimes results into Imperfection.

Digital divide: Information technology has many opportunities and it has shaped many
industries in developed countries; however, developing countries have difficulties of enjoying
the same benefits of Information technology. To get these benefits they have to train their
labor and users should also adopt the new culture which is a bit costly in these developing
countries. In some remote areas they do not even have power, so information technology
tools like computers cannot be used. In other sectors like education, most of these developing
countries have poor old education systems, so a student will not be aware of new information
technologies.
Ethical Issues in Information Technology There are a great variety of ethical issues in I.T.: 1
Ethical dilemma there are various ethical dilemmas in relation to I.T. that need to be addressed.
What are and are not ethical issues in I.T.? In regard to hackers, for example, are they testing the
system or performing an immoral action? Will genetic engineering improve the quality of
peoples lives or start to destroy it? How do we recognize when an ethical dilemma exists? There
are, indeed, many grey ethical areas. 2 Plagiarism is where the work of others is copied, but the
author presents it as his or her own work. This is a highly unethical practice, but happens quite
frequently, and with all the information that is now available on the Internet it is much easier to
do and is happening more often. 3 Piracy, the illegal copying of software, is a very serious
problem, and it is estimated that approximately 50% of all programs on PCs are pirated copies.
Programmers spend hours and hours designing programs, using elaborate code, and surely need
to be protected. Although some might argue that some pirating at least should be permitted as it
can help to lead to a more computer literate population. But, for corporations, in particular, this is
a very serious issue, and can significantly damage profit margins. 4 Hacking Hackers break into,
or hack into a system. Hacking can be undertaken for a variety of reasons, such as the wish to
damage a system or the wish to understand how a system works, so that money can be made out
of it. Alternatively, there might be a desire to alert people to the fact that a system is insecure and
needs improving. Due to this some argue that there are hacker ethics. Hacking can present a
moral dilemma. This is because reformed hackers sometimes offer their expertise to help
organizations protect themselves against other hackers. Hackers cannot just wander into a
system, as they could into an unlocked door. Instead, it requires a lot of skill. With this skill
hackers can demonstrate that a system is insecure and needs improving. In this way, it could be
argued that hackers play a valuable role. Many argue that hacking might lead to some
improvements, but that it causes such a lot of disruption that it is not worth it in the long-run.
5 Computer crime many different computer crimes are committed, which clearly poses ethical
questions for society. Various illegal acts are performed on computers, such as fraud and
embezzlement. This includes, for example, using imaging and desktop publishing to create, copy
or alter official documents and graphic images. There are also various ethical dilemmas, such as
whether copying such files is as bad as stealing something. 6 Viruses Clearly writing and
spreading virus programs are unethical acts; they have very serious consequences, and cause
systems to crash and organisations to cease operating for certain periods. One of the most
concerning consequences of such actions is when viruses interrupt the smooth functioning of an
organisation such as a hospital, which could in extreme cases even cause people to die. Logic

bombs are also sometimes planted. There is obviously a lot of anti-virus software on the market
now though that helps to deal with this ever-growing problem. 7 Ergonomics/health issues There
are many ergonomic/health issues related to I.T. Responsible/ethically-minded employers will,
hopefully, give due consideration to this, as indeed should all employers. This includes issues
such as the importance of taking adequate breaks from using the computer and ensuring that the
screens comply with the regulations. Also, ensuring that the positioning of the chair and the
computer is appropriate for the user and providing foot rests, when required. Some organisations
will give special advice to their employees on these matters. When I worked at Clifford Chance,
an international law company, for example, they had specialised staff who would come round to
each employee individually, and discuss their ergonomic needs, if the employee requested this.
Having enough light and having plants in the room can also be important factors. Without such
ethical/moral awareness and taking the necessary action, many workers will suffer health
problems directly from I.T., such as back problems, eyestrain and eye infections and repetitive
strain injury (RSI). 8 Job displacement/work pressures imposed on computer professionals
Computers are changing the face of the work scene. For some people, their jobs are becoming
redundant or they have to play quite different roles, and others are suffering increasing levels of
stress from work pressures. Others are, obviously, reaping the benefits of having more rewarding
jobs, and there is certainly more emphasis on knowledge, information and I.T. skills than ever
before. However, this all clearly poses various ethical issues. Should those that lose their jobs be
compensated? How can the pressure be eased on those that are suffering stress? Is it acceptable
for computer programmers to be made redundant on the spot etc? There are many ethical issues
that need to be addressed here. 9 Digital divide The digital divide poses a serious problem today.
A new breed of haves and have nots are being created, between those that have access and can
use a computer and the Internet, and those that do not have such access. There are clearly serious
ethical implications here. Those that do not have such access may well be discriminated against,
feel socially excluded and miss out on many life opportunities. 10 Gender There are also ethical
issues in regard to gender and computers, given the fact that females are often discriminated
against in various ways in this new I.T. age. The number of females in computing academia is
low. Furthermore, when females do work closely with computers, it is often in the lower level of
work. Also, computer screens and layouts are frequently designed and programmed by men, and
they might not be ideally suited to women, which could affect the quality of the work that
women produce. Men tend to obtain the better quality I.T. jobs, earn more money, and make far
more of the important decisions in relation to I.T. Basically, men are driving the I.T. age forward,
whereas females are playing more passive roles, confined to working with the systems that men
have already created, but which might not be ideally suited to them. These are all ethical issues
that people should be made more aware of, and efforts need to be made to try to remedy the
situation. 11 Nanotechnology presents a new set of ethical dilemmas. Nanotechnology could help
humankind and help to provide adequate food and shelter. On the other hand, it could be very
dangerous. There are also various environmental issues to consider, such as the effect that
nonmaterials have on living systems. There is a relatively low investment in environmental
nanotechnology, which must surely give us cause for concern. These are all very serious ethical

issues that need to be confronted sooner rather than later. If it appears to be the case that
advanced aspects of I.T. are seriously threatening our way of life, then something surely needs to
be done about it as soon as possible. 12 Expert systems Expert systems are a body of information
in a specific field that is held in an electronic format, such as a doctor expert system, that
houses detailed medical information on a database. Various questions can be posed in regard to
expert systems, such as what is the basis of ownership? Is it the different elements that comprise
the total system or the total package? These issues are related to intellectual property rights and
the moral aspects in regard to this. There are also wider ethical issues in regard to expert systems
that need to be explored. In regard to a 'doctor expert system, for example, such a system can
provide accurate information, but the face-to-face contact is missing. Such face-to-face contact
might prove to be essential in order to ensure that the right diagnosis is made, and it is possible
that some individuals could even die as a result of a wrong diagnosis given through this lack of
face-to-face contact. In other ways expert systems could help to save lives. The patient might, for
example, be given a speedier response. All these ethical issues need to be considered further. 13
Genetic engineering and the patenting of life- forms Many ethical issues are raised in regard to
genetic engineering and the patenting of life forms. Is such behaviour morally acceptable? Such
debates can sit alongside debates on subjects such as euthanasia and abortion. 14 Netiquette
There are also ethical/moral codes that should be adhered to, in the use of networks and email
correspondence. As already indicated, the setting up of such codes has become necessary as
people have not always addressed each other in an appropriate manner through this means of
communication, and in this way they have behaved unethically. For example, not wasting
peoples time and not taking up network storage with large files. Furthermore, not looking at
other peoples files or using other systems without permission and not using capital letters, as
this denotes shouting (unless one does actually want to shout at someone through email!). Also,
people that become too obnoxious can be banned or ignored. A kill file can be set-up, which
will automatically, erases messages from that person. 15 Intellectual property rights: the moral
rights There are moral rights embedded within much intellectual property rights legislation,
agreements and directives, for the benefit of creators of works and copyright holders.
Furthermore, there are penalties for those that violate such legislation, (such as violating
copyright legislation), although this can sometimes be difficult to enforce in practice. The
legislation, though, is often complex and difficult to understand, which means that some creators
of works do not obtain the moral rights that they are entitled to. However, sometimes, moral
rights are actually excluded from agreements. 16 Issues of data collection, storage and access
there are many moral issues that need to be considered in regard to the collect.

Security
Companies monitor employees and visitors and collect much additional information in the name
of security. Ethical issues arise from the continuous monitoring of employee activity and the
recording of security camera images. An unjustified level of employee surveillance is ethically
questionable; the ethical company must try to establish a level of monitoring it can justify. The

surveillance of non-employees, such as visitors or suppliers' representatives, must be constrained


to an even lower level to be ethically acceptable.

Communication
Where it used to be difficult to monitor telephone conversations due to the nature of the analog
signal, companies and governments can easily monitor digital, text-based communication, such
as email. Computers can scan the text of millions of messages for words that are of interest to
investigators and identify the sender. Companies that employ such technologies must ask
themselves about the ethical implications of such surveillance, especially if it is carried out
without the knowledge or explicit agreement of employees.

Content
With new technologies allowing the easy creation and distribution of images and videos, both
individual employees and companies need guidelines as to what is acceptable. Without such
guidelines, some of this content will be offensive to some of the company staff and to some
members of the public. When developing such guidelines, companies may be quite restrictive in
terms of what is permissible within the business. Such restrictions only become ethical issues
when the company tries to extend them into the employees' private lives. The interaction of such
restrictions with legal limits on hate speech and pornography, as well as with community
standards, make this a particularly delicate area for business ethics.

Privacy
Individual privacy is one area that has been identified clearly as a base for unethical business
behavior through the application of technologies. Companies can track Internet usage, buying
habits and individual movement as well as collect personal information about millions of
customers or even potential clients. While governments have passed legislation restricting the
collection of personal data and allowing individuals some control over what companies can
collect and store, ethical businesses must decide -- independently of legislation -- what is
appropriate behavior.
Privacy may be lessened by surveillance in this case through CCTV.
Privacy is the ability of an individual or group to seclude themselves, or information about
themselves, and thereby express them selectively. The boundaries and content of what is
considered private differ among cultures and individuals, but share common themes. When
something is private to a person, it usually means that something is inherently special or sensitive
to them. The domain of privacy partially overlaps security (confidentiality), which can include

the concepts of appropriate use, as well as protection of


information. Privacy may also take the form of bodily
integrity.
The right not to be subjected to unsanctioned invasion of
privacy by the government, corporations or individuals is
part of many countries' privacy laws, and in some
cases, constitutions. Almost all countries have laws which
in some way limit privacy. An example of this would be
law concerning taxation, which normally requires the
sharing of information about personal income or earnings.
In some countries individual privacy may conflict
with freedom of speech laws and some laws may require
public disclosure of information which would be considered private in other countries and
cultures.
Privacy may be voluntarily sacrificed, normally in exchange for perceived benefits and very
often with specific dangers and losses, although this is a very strategic view of human
relationships. Research shows that people are more willing to voluntarily sacrifice privacy if the
data gatherer is seen to be transparent as to what information is gathered and how it is used. In
the business world, a person may volunteer personal details (often for advertising purposes) in
order to gamble on winning a prize. A person may also disclose personal information as part of
being an executive for a publicly traded company in the USA pursuant to federal securities
law. Personal information which is voluntarily shared but subsequently stolen or misused can
lead to identity theft.
The concept of universal individual privacy is a modern construct primarily associated
with Western culture, British and North American in particular, and remained virtually unknown
in some cultures until recent times. According to some researchers, this concept sets AngloAmerican culture apart even from Western European cultures such as French or Italian. Most
cultures, however, recognize the ability of individuals to withhold certain parts of their personal
information from wider societya fig leaf over the genitals being an ancient example.
The distinction or overlap between secrecy and privacy is ontologically subtle, which is why the
word "privacy" is an example of an untranslatable lexeme, and many languages do not have a
specific word for "privacy". Such languages either use a complex description to translate the
term (such as Russian combining the meaning of solitude, secrecy, and private life) or borrow
from English "privacy" (as Indonesian Privasi or Italian la privacy).The distinction hinges on
the discreteness of interests of parties (persons or groups), which can haveemic variation
depending on cultural mores of individualism, collectivism, and the negotiation
between individual and group rights. The difference is sometimes expressed humorously as
"when I withhold information, it is privacy; when you withhold information, it is secrecy."

Privacy Issues: As much as information technology has enabled us to share and find relevant
information online, It has also exploited our freedom of privacy. Their so many ways our
privacy is exploited, (1) use of internet webcams, experienced computer users can turn on any
webcam of any computer online and they will have access to your private life, many
celebrities have been victims of these online stalkers. A good example is Dharun Ravia
former Rutgers University student who was spying on his roommate through a webcam. Read
more on this story here . (2) use of social networks, the main concept of these networks
is to connect with new and old friends then share your life with them, however, the loop hole
in this , is that when ever someone access your shared life data like photos , they can like it
and send it their friends who are not your friends, which might expose you to users with
wrong intentions to use your data, also some companies are known for spying on their
employees via these social networks.

Privacy in Computing
The conflict between personal privacy and company surveillance of e-mail communications and
other computer activity was one of the most widely publicized computer-ethical controversies in
the late 1990s and early 2000s. More on privacy Computer Ethics, Laws, Privacy Issues

The Computer Ethics Institute's Ten


Commandments of Computer Ethics entreat
computer users to treat each other with
'consideration and respect.
The 9 Places, Where a Hacker Might Look To
Know More about You.
1. Index.dat File: The index.dat file functions as an active database, which runs as
long as a user is logged on in Windows. It functions as a repository of redundant
information, such as web URLs, search queries and recently opened files.
2. Temporary Internet files: It is a directory on Microsoft Windows computer
systems. The directory is used by Internet Explorer and other web browsers to
cache pages and other multimedia content, such as video and audio files, from
websites visited by the user. This allows such websites to load more quickly the
next time they are visited.
3. Web site cookies: Website Cookies are a small piece of text stored on a users
computer by a web browser. A cookie consists of one or more name-value pairs
containing bits of information such as user preferences, shopping cart contents,
the identifier for a server-based session, or other data used by websites.

4. Browser History: The history in your browser is a useful feature. But it also
tells a lot about you and your browsing habits.
5. Typed URL history: This features is used by most of the modern browsers to
auto-complete or guess the web site or page when you type the URL of a
previously visited site. It add to the user convenience and make your web surfing
a lot quicker. But it is privacy concern for your computer and a quick look at your
Types URL History can tell a lot about your browsing habits.
6. Saved Passwords and AutoComplete Information: This is crucial. Most
modern browsers allow you to save your passwords and private information
through their AutoComplete feature. It saves a lot of time whenever you visit the
website next time. As you do not have to remember your password and other
information every time as it gets filled in the appropriate boxes automatically.
7. Recent Documents: Recent Documents feature of Windows gives you a quick
access to the most recent documents you have used. It is nice features, but allows
an unauthorized person also to quickly know, what you are upto.
8. Usage history of Start/Run, Search: These things contain vital traces about
how you use your computer and what are the things you usually do on your
computer. These important bits pf private information is stored on your computer
and you can tweak the windows registry keys to wipe them out.
9. Temporary Directories and Temporary Files: Windows temporary directory
(Temp folders) stores Windows and other programs temporary files. This
directory can contain files from programs you no longer have installed or files
which may violate your privacy. If you know where these files are located in your
computer, you can manually delete them through Windows Explorer. Otherwise
there are lots of free tools available on Internet, which can do the job for you.
Ethics in the workplace is a combination of morality and rules. Ethics involve trust
between employees and the employer, and between employees. While technology
(specifically computers and Internet access) can be a huge boon to any business, it
can also be a major source of ethics abuse, or the temptation for abuse.

Spyware
A question of computer ethics and privacy falls onto management in the
workplace. Spyware such as key loggers or other programs that watch what a user is
doing on a given computer are common at work. However, does the management
have the right to eavesdrop on employees? It creates a breach of trust that employees
aren't doing their job without an electronic babysitter, but at the same time, it provides
proof that no one is misusing computers while on the job.

Email privacy
Email privacy is the broad topic dealing with
issues of unauthorized access and inspection
of electronic mail. This unauthorized access
can happen while an email is in transit, as well
as when it is stored on email servers or on a
user computer. In countries with a
constitutional guarantee of the secrecy of
correspondence, whether email can be equated
with letters and get legal protection from all
forms of eavesdropping comes under question
because of the very nature of email. This is
especially important as more and more communication occurs via email compared to postal mail.
Email has to go through potentially untrusted intermediate computers (email servers, ISPs)
before reaching its destination, and there is no way to tell if it was accessed by an unauthorized
entity. This is different from a letter sealed in an envelope, where by close inspection of the
envelope, it might be possible to tell if someone opened it. In that sense, an email is much like a
postcard whose contents are visible to everyone who handles it.
There are certain technological workarounds that make unauthorized access to email hard, if not
impossible. However, since email messages frequently cross nation boundaries, and different
countries have different rules and regulations governing who can access an email, email privacy
is a complicated issue.

Facebook
Face book is a corporation and an online service headquartered in Menlo Park, California, in
the United States. Its website was launched on February 4, 2004 by Mark Zuckerberg with
his College roommates and fellow students Eduardo Saver in, Andrew McCollum, Dustin
Moskovitz, and Chris Hughes. The founders had initially limited the website's membership to
Harvard students, but later expanded it to colleges in the Boston area, the Ivy League,
and Stanford University. It gradually added support for students at various other universities and
later to high school students. Since 2006, anyone in general aged 13 and older has been allowed
to become a registered user of the website, though variations exist in the minimum age
requirement, depending on applicable local laws. Its name comes from the face book directories
often given to American university students.

After registering to use the site, users can create a user profile, add other users as "friends",
exchange messages, post status updates and photos, share videos, use various apps, and receive
notifications when others update their profiles. Additionally, users may join common-interest
user groups organized by workplace, school, or other characteristics, and categorize their friends
into lists such as "People from Work" or "Close Friends". Also, users can complain or block
unpleasant people. Facebook had over 1.59 billion monthly active users as of August 2015.
Because of the large volume of data that users submit to the service, Facebook has come under
scrutiny for their privacy policies. Facebook, Inc. held its initial public offering in February 2012
and began selling stock to the public three months later, reaching an original peak market
capitalization of $104 billion. On July 13, 2015, Facebook became the fastest company in
the Standard & Poor's 500 Index to reach a market cap of $250 billion following its Q3 earnings
call in 2015, Facebooks market cap exceeded $300 billion.
People Share their Data on their profiles and inbox, Due to Harmful acts Accounts are Hacked
and misused.Personal information are stolen.

Workplace privacy
A workplace code of ethics is the result of a company analysis where practices are analyzed in
light of right behavior and wrong behavior. The code of ethics defines right behavior and
encourages, or requires, employees to engage in that behavior.
Employees typically must relinquish some of their privacy while at the workplace, but how much
they must do so can be a contentious issue. The debate rages on as to whether it is moral, ethical
and legal for employers to monitor the actions of their employees. Employers believe that
monitoring is necessary both to discourage illicit activity and to limit liability. Although, with
this problem of monitoring of employees, many are experiencing a negative effect on emotional
and physical stress including fatigue and lack of motivation within the workplace. Employers
might choose to monitor employees activities using surveillance cameras, or may wish to record
employees activities while using company owned computers or telephones. Courts are finding
that disputes between workplace privacy and freedom are being complicated with the
advancement of technology as traditional rules that govern areas of privacy law are debatable
and becoming less important. Purpose. Ideally, a code of workplace ethics would be
implemented for the primary purpose of encouraging ethical behavior. However, avoiding
lawsuits can also be a driving force behind a code of ethics. A workplace code of ethics
delineates behavior that is ethically unacceptable, and many of those unacceptable behaviors are
also violations of law.

it is essential to communicate
ethical values to employees as you
are giving them the authority to
take appropriate ethical decision
in any given situations.
How do you train your employees
to be ethical to one and all, whether
in the professional area or personal?

A written code of conduct

Define ethics to be
maintained in an
organization.

Each employee should have one, including new hires.

Ethics in the workplace is a combination of morality and rules. Ethics involve trust between
employees and the employer, and between employees. While technology (specifically computers
and Internet access) can be a huge boon to any business, it can also be a major source of ethics
abuse, or the temptation for abuse.
Appropriate Use: The rules of the workplace generally state computers are to be used for work
only. While you may have access to the Internet (perhaps because your office's file search
function is hosted on an Internet server), that means you shouldn't use your computer for nonwork related functions such as surfing, keeping a private diary.
Personal Time An ethical question is whether or not you can use company equipment on
personal time. For instance, if you're on your lunch break, should you be able to check your
personal email account? Your workplace will often have a policy on that. However, if you're not
sure, it might be best to talk to your supervisor and put the question forward.

THIN CONSENT
If an employee receives formal notification that the company will be monitoring all e-mail and
Web activityeither at the time of hire or during employmentand it is made clear in that
notification that his or her continued employment with the company will be dependent on the
employees agreement to abide by that monitoring, then the employee may be said to have given
thin consent.
In other words, there are two options: agree to the monitoring or pursue other employment
opportunities.

You could argue that the employee has at least been notified of the policy, but the notification is
based on the assumption that jobs are hard to come by and the employee is not in a position to
quit on principle and risk temporary unemployment while seeking a position with another
company.

THICK CONSENT
If employment conditions are at the other end of the scalethat is, jobs are plentiful and the
employee would have no difficulty in finding another positionthen consent to the monitoring
policy could be classified as thick since the employee has a realistic alternative if he or she finds
the policy to be unacceptable.

You might also like