Ethical issues in Information Technology: how and when
1.
Introduction
Information technology is of course a very much a taken-for-granted
part of everyday life today. There are, however, many ethical issues that need
to be considered and developed in I.T. This article will firstly consider some
of the philosophical issues surrounding ethics and then examine some of the
various ethical issues in I.T. specifically. Some of the different methods for
teaching ethical issues in I.T. will then outlined as well as a consideration
about when it is appropriate to teach these different ethical I.T. issues.
2. Philosophical issues surrounding ‘ethics’
The question of ‘what are ethics’ has always been a central part of
philosophy. So, any meaningful discussion about ethics must surely begin with a
philosophical enquiry. The Stanford Encyclopedia of Philosophy refers to the
great philosophers Aristotle, Socrates and Plato, saying that:
Aristotle
conceives of ethical theory as a field distinct from the theoretical sciences.
Its methodology must match its subject matter – good action – and must respect
the fact that in this field many generalizations hold only for the most part.
We study ethics in order to improve our lives, and therefore its principal
concern is the nature of human well-being. Aristotle follows Socrates and Plato
in taking the virtues to be central to a well-lived life. Like Plato, he
regards the ethical virtues (justice, courage, temperance and so on) as complex
rational, emotional and social skills (Stanford
Encyclopedia of Philosophy, p.1).
The Encylopedia continues, saying:
…Aristotle is
deeply indebted to Plato’s moral philosophy, particularly Plato’s central
insight that moral thinking must be integrated with our emotions and appetites,
and that the preparation for such unity of character should begin with
childhood education… (Stanford Encylopedia of Philosophy, p.2).
Meanwhile, Kallman and Grillo (1992) argue that:
Ethics has to
do with making a principle-based choice between competing alternatives. In the
simplest ethical dilemmas, the choice is between right and wrong (Kallman and Grillo, 1996, p.3).
Ethics then, are often very subjective, and connected to our emotions
and our basic sense of ‘right’ and ‘wrong’. This means that it can be difficult
to define ethics rigorously. This also applies to ethics in I.T.
Kallman and Grillo consider whether ‘computer ethics’ are different
from ‘regular ethics; and argue that:
Most experts
agree that there is actually no special category of computer ethics; rather,
there are ethical situations in which computers are involved (Kallman and Grillo, 1996, p.4).
This would seem to be the most sensible way to approach the subject.
However, it must be noted that there are a great variety of ethical issues that
need to be considered in I.T., ranging from plagiarism, to ergonomics and the
digital divide, through to netiquette and nanotechnology. These will all be
considered in this article. Furthermore, the meaning of ‘ethics’ might be
interpreted differently in these different circumstances.
3. Various ethical issues in I.T.
3.1 Introduction
Any analysis of information technology should begin with a definition
of it. There are various definitions of I.T. The British Advisory Council for
Applied Research and Development defines it quite succinctly as:
The
scientific, technological and engineering disciplines and the management
techniques used in information handling and processing; their applications;
computers and their interaction with men and machines; and associated social,
economic and cultural matters (British
Advisory Council for Applied Research and Development, 1980).
Various writers have referred to the importance of adopting an
ethical/moral approach to I.T. Mason says that:
Our moral
imperative is clear. We must insure that information technology, and the
information it handles, are used to enhance the dignity of mankind (Mason, 1986, p.10).
Professional computing bodies realise the importance of laying down
good ethical foundations, and as Bowyer notes
…almost every
professional organization dealing with the field of computing has published its
own code of ethics (Bowyer, 2001, p.47).
This includes organisations such as the Association of Information
Technology Professionals (AITP), the Association for Computing Machinery (ACM)
and the Computer Society of the Institute of Electrical and Electronics
Engineer (IEEE-CS). The ethical codes of different organisations have some
differences, but they are all in broad agreement in regard to most of the
important general issues. These include, for example, being honest in
professional relationships and protecting the privacy and confidentiality of
all information that is entrusted to the professional.
Ethical issues in I.T. differ from general ethical issues in a variety
of ways. Parker, Swope and Baker note that ethical problems involving computers
pose a special challenge, for a number of different reasons. Firstly, there is
less personal contact. We sometimes associate the moral decisions that we make
with our face-to-face contacts, including moral decisions on issues such as
euthanasia and abortion. Such face-to-face contact is missing when using I.T.
systems. This is why various ‘codes of ethical practice’ have been developed
for email communication on some networks, for example, which can be referred to
as ‘netiquette’. Without such a code, and its penalties, some people would
probably not address each other in an appropriate manner in these forums.
Secondly, the speed of computers means that the likely repercussions of our
actions might not be adequately considered, and this could lead to unfortunate
consequences. An inappropriate email might be sent in a moment of rage, which
the sender later regrets, but meanwhile irreversible decisions have been made
on the basis of this! Thirdly, Parker, Swope and Baker point out that
information in electronic form is more fragile than in paper form. Information
in electronic form can easily be changed, it is vulnerable to unauthorised
access and it can easily be reproduced. This raises questions in regard to
issues such as intellectual property rights, plagiarism, piracy and privacy.
Fourthly, there are issues around information itself. Information integrity,
information confidentiality and information availability/non-availability can
conflict with notions of information sharing. Fifthly, Parker, Swope and Baker
point out that a lack of widespread means of authorisation and authentication
means that I.T. can be exposed to unethical practices.
Meanwhile, Kallman and Grillo (1996) outline various rights and
duties, which can also be seen to be important areas to consider in
relation to ethical issues in I.T. In regard to ‘rights’, they refer to
the ‘right to know’, such as the extent to which we have a right to know and
have access to information about us in a database. Also, the ‘right to
privacy’, and the extent to which we have a right to control the use of
information that relates to us, such as our personal medical information.
Finally, the ‘right to property’, and the extent to which we have a right to
protect our computer resources from misuse and abuse, such as viruses. Under ‘duties’
they refer to ‘confidentiality’ and the need for a professional to protect
information from unauthorised access and use and ‘impartiality’, whereby a
professional should aim to be fair and impartial. An example of ‘impartiality’
is where a software company makes new releases available to all customers, on
the same basis. The extent to which such ‘rights’ and ‘duties’ are enforceable
in practice is clearly debatable, but they provide some useful guidelines for
those concerned with ethical issues in I.T.
There are also differences between wider ethical I.T. issues related
to the well-being and dignity of humankind and people, and organisations
behaving morally in their own use of I.T. The former includes issues such as
transhumanism, nanotechnology, genetic engineering and the patenting of
life-forms, and the latter includes issues such as plagiarism, netiquette and
computer crime.
Kallman and Grillo consider computer ethics and individual
responsibility, arguing that:
An individual
who uses a computer, whether on the job or for personal use, has the
responsibility to use it ethically (Kallman and
Grillo, 1996, p.25).
They say that individuals should take responsibility in a number of
key areas, such as protecting passwords and not leaving confidential
information unattended on the screen. Clearly, there are differences between
how individuals could and should behave ethically in I.T. matters, compared
with how organisations could and should behave. Furthermore, different
legislation applies. Legislation for copyright for individual creators of works
is different from copyright legislation for organisations, for example.
The wider ethical issues in relation to I.T. consider the implications
of I.T. for society in general. If those designing complex I.T. systems (such
as nanotechnology) do not pay sufficient heed to certain ethical/moral issues,
then this could have very serious consequences for society and, indeed, for
human kind in general. This is considered, in particular, in the nanotechnology
section of this article. Bill Joy suggests that if we do not heed to moral
principles then nanotechnology could begin to destroy humankind.
3.2 Types of ethical issues in I.T.
There are a great variety of ethical issues in I.T. that need to be
considered, and some of the different types will be considered in this section.
3.2.1 Ethical dilemmas
There are various ethical dilemmas in relation to I.T. that need to be
addressed. What are and are not ethical issues in I.T.? In regard to hackers, for example, are they
testing the system or performing an immoral action? Will genetic engineering
improve the quality of peoples’ lives or start to destroy it? How do we
recognise when an ethical dilemma exists? There are, indeed, many grey ethical
areas.
3.2.2 Plagiarism
Plagiarism is where the work of others is copied, but the author
presents it as his or her own work. This is a highly unethical practice, but
happens quite frequently, and with all the information that is now available on
the Internet it is much easier to do and is happening more often. As Bowyer
states:
Plagiarism is
the taking of the ideas, writings, drawings, words, or other similar intellectual
property created by others and presenting it as your own. It is generally not a
legal issue, like copyright infringement, but it is an ethical one. For
example, you can reuse writings in the public
domain without worrying about the legal problem of infringing a
copyright, but presenting them as your own without proper credit to their true
origin is an act of plagiarism. And plagiarism is unethical (Bowyer, 2001, p.267).
Bowyer also refers to ‘self-plagiarism’, whereby the author reuses
his/her own words from a previous publication in a newer publication without
referencing the older publication. There
are software packages that operate to detect plagiarism from the Internet, but
it would be highly beneficial if more work was undertaken in this area.
3.2.3 Piracy
Piracy, the illegal copying of software, is a very serious problem,
and it is estimated that approximately 50% of all programs on PCs are pirated
copies. Programmers spend hours and
hours designing programs, using elaborate code, and surely need to be
protected. Although some might argue that some pirating at least should be
permitted as it can help to lead to a more computer literate population. But,
for corporations, in particular, this is a very serious issue, and can
significantly damage profit margins.
3.2.4 Hacking
Hackers break into, or ‘hack’ into a system. Hacking can be undertaken
for a variety of reasons, such as the wish to damage a system or the wish to
understand how a system works, so that money can be made out of it. Alternatively, there might be a desire to
alert people to the fact that a system is insecure and needs improving. Due to
this some argue that there are ‘hacker ethics’. Mikkkeee (und.) says that:
The ethics
behind hacking and the actions taken by hackers constitute a philosophical
manifesto that transcends our understanding of the art (Mikkkeee, und. p.1).
Hacking can present a moral dilemma. This is because ‘reformed
hackers’ sometimes offer their expertise to help organisations protect
themselves against other hackers. Hackers cannot just wander into a system, as
they could into an unlocked door. Instead, it requires a lot of skill. With
this skill hackers can demonstrate that a system is insecure and needs
improving. In this way, it could be argued that hackers play a valuable role.
However, many such as Mikkkeee, argue that hacking might lead to some
improvements, but that it causes such a lot of disruption that it is not worth
it in the long-run. Mikkkeee suggests that there should be a National Data
Protection Commission to monitor information, propose legislation and monitor
abuse.
3.2.5 Computer crime
Many different computer crimes are committed, which clearly poses
ethical questions for society. Various illegal acts are performed on computers,
such as fraud and embezzlement. This includes, for example, using imaging and
desktop publishing to create, copy or alter official documents and graphic
images. There are also various ethical dilemmas, such as whether copying such
files is as bad as stealing something.
3.2.6 Viruses
Clearly writing and spreading virus programs are unethical acts, they
have very serious consequences, and cause systems to crash and organisations to
cease operating for certain periods. One of the most concerning consequences of
such actions is when viruses interrupt the smooth functioning of an
organisation such as a hospital, which could in extreme cases even cause people
to die. Logic bombs are also sometimes planted.
There is obviously a lot of anti-virus software on the market now
though that helps to deal with this ever-growing problem.
3.2.7 Ergonomics/health issues
There are many ergonomic/health issues related to I.T.
Responsible/ethically-minded employers will, hopefully, give due consideration
to this, as indeed should all employers. This includes issues such as the
importance of taking adequate breaks from using the computer and ensuring that
the screens comply with the regulations. Also, ensuring that the positioning of
the chair and the computer is appropriate for the user and providing foot
rests, when required. Some organisations will give special advice to their
employees on these matters. When I worked at Clifford Chance, an international
law company, for example, they had specialised staff who would come round to
each employee individually, and discuss their ergonomic needs, if the employee
requested this. Having enough light and having plants in the room can also be
important factors. As Kallman and Grillo say:
Ergonomics is
concerned with the physical work environment. The question is, how far should
an organization go to be “ergonomically sound”? For example, what is required
to provide data entry clerks with a healthful work area? How can a firm create
an environment that results in minimal eyestrain, guards against back problems,
prevents repetitive-motion syndrome, and protects against exposure to possibly
harmful CRT (cathode-ray tube) emissions? (Kallman and Grillo, 1996, p.27).
Without such ethical/moral awareness and taking the necessary action,
many workers will suffer health problems directly from I.T., such as back
problems, eyestrain and eye infections and repetitive strain injury (RSI).
3.2.8 Job displacement/work pressures imposed on computer
professionals
Computers are changing the face of the work scene. For some people,
their jobs are becoming redundant or they have to play quite different roles,
and others are suffering increasing levels of stress from work pressures.
Others are, obviously, reaping the benefits of having more rewarding jobs, and
there is certainly more emphasis on knowledge, information and I.T. skills than
ever before. However, this all clearly poses various ethical issues. Should
those that lose their jobs be compensated? How can the pressure be eased on
those that are suffering stress? Is it acceptable for computer programmers to
be made redundant ‘on the spot’ etc? There are many ethical issues that need to
be addressed here.
3.2.9 Digital divide
The digital divide poses a serious problem today. A new breed of
‘haves’ and ‘have nots’ are being created, between those that have access and
can use a computer and the Internet, and those that do not have such access.
There are clearly serious ethical implications here. Those that do not have
such access may well be discriminated against, feel ‘socially excluded’ and
miss out on many life opportunities. As Lynch says:
One of the
major issues in electronic networks is the question of access: who will have
access to the networks, and what kind of information will be accessible. These
questions are important because networks offer tremendous economic, political,
and even social advantages to people who have access to them. As the networks
become a larger presence in society, conflicts may arise between information
“haves” and “have-nots”. Conceivably, network communication could create
greater equality by offering common access to all resources for all citizens.
Already, in a few places scattered around the country, experiments with
“freenets”, network connections established through local libraries or other
municipal or local organizations specifically for people who otherwise would
have no way to use the networks, have shown that those people will, for
instance, participate more in local government issues. They therefore have a
greater voice in whatever happens with a local government. Conversely, if
access is not evenly distributed, it threatens to perpetuate or deepen existing
divides between the poor, who cannot afford expensive computer systems, and the
better-off (Lynch, 2000, p.9).
This is all very concerning. However, there will always be
inequalities in some shape of form, whilst we live in global capitalism, I
would suggest. There will be both absolute and relative poverty; absolute
poverty being the state of poverty that people are in where they lack the basic
means for survival, such as food and shelter, and relative poverty being where
some members of a society are poor relative to other members. Clearly, the
digital divide is an example of relative poverty.
3.2.10 Gender
There are also ethical issues in regard to gender and computers, given
the fact that females are often discriminated against in various ways in this
new I.T. age. As I emphasised in my article Females, computer and libraries:
The computing
world is very male-dominated…For various reasons, such as early socialisation,
the male-dominated computer environment, and an apparent lack of confidence,
females tend to focus on the softer subjects. They either do not study and move
into areas such as computing, mathematics and engineering at all, or if they do
many subsequently become discouraged and disillusioned and leave. Males
dominate the computing world and even more disturbingly the numbers of women
going into IT are falling (Rikowski, 2003, p.6).
Furthermore, Butcher notes the fact that:
Only around 5%
of young women consider the IT industry for a career; with most perceiving it
as nerdy, even though girls who pick IT often excel (Butcher, 2003, p.6).
Also, the number of females in computing academia is low. Wade,
reporting in The Guardian, says that:
Computing
degrees are notoriously male-dominated; nationally there is an average of only
21% of women registered on them (Wade, 2001,
p.15).
Margolis and Fisher consider early socialisation both at home and
school, emphasising that:
Childhood
behaviours, however conditioned by gender socialization and genetics, tend to
set computing on the male side of the gender divide (Margolis and Fisher, 2002, p.32).
Margolis and Fisher undertook some detailed research into women and
computing. They conducted over 230 interviews with over 100 male and female
computer science students, during a four-year period (from 1995-1999) at
Carnegie Mellon University. In this research they consider the fact that
women’s confidence in computing is often undermined. They refer to one participant, Carmela, for
example, who started programming when she was
about 5 years old. Carmela found that comments made by her male
classmates overwhelmed her and undermined her confidence. She said:
Then I got
here and just felt so incredibly overwhelmed by the other people in the
program (mostly guys, yes) that I began
to lose interest in coding because really, whenever I sat down to program there
would be tons of people around going, “My God, this is so easy. Why have you
been working on it for two days, when I finished in five hours? (p.79).
Furthermore, when females do work closely with computers, it is often
in the lower-level of work. As Wilding said:
Why are women
a tiny percentage of computer programmers, software designers, systems
analysts, and hackers, while they are the majority of teletypers,
chip-assemblers, and installers, and low skilled tele-operators that keep the
global data and infobanks operating? (Wilding,
und., p.2).
Also, computer screens and layouts are frequently designed and
programmed by men, and they might not be ideally suited to women, which could
affect the quality of the work that women produce.
All this clearly has serious repercussions for society. Certain
aspects of the digital divide will not only apply to the ‘haves’ and the ‘have
nots’, but also to males and females. Furthermore, men tend to obtain the
better quality I.T. jobs, earn more money, and make far more of the important
decisions in relation to I.T. Basically,
men are driving the I.T. age forward, whereas females are playing more passive
roles, confined to working with the systems that men have already created, but
which might not be ideally suited to them. These are all ethical issues that
people should be made more aware of, and efforts need to be made to try to
remedy the situation.
3.2.11 Nanotechnology
Nanotechnology presents a new set of ethical dilemmas. Colvin says:
For the past
decade, nanotechnologists have basked in the glow of positive public opinion.
We’ve wowed the public with our ability to manipulate matter at the atomic
level and with grand visions of how we might use this ability. All this ‘good
news’ has created a growing perception among business and government leaders
that nanotechnology is a powerful platform for twenty-first technologies (Colvin, 2002, p.1).
Nanotechnology could help humankind and help to provide adequate food
and shelter. On the other hand, it could be very dangerous. There are also
various environmental issues to consider, such as the effect that nanomaterials
have on living systems. There is a relatively low investment in environmental
nanotechnology, which must surely give us cause for concern.
Bill Joy considers nanotechnology issues in some depth. Joy has worked
with computer networking for over 25 years and has written computer programs
such as the Unix utilities and the Vi text editor on Unix. He says in regard to
ethics:
I believe we
all wish our course could be determined by our collective values, ethics and
morals (Joy, 2000, p.256).
However, he speaks about nanotechnology saying that:
…it is far
easier to create destructive uses for nanotechnology than constructive ones (Joy, 2000, p.246).
Furthermore:
…we have the
possibility not just of weapons of mass destruction but of knowledge-enabled
mass destruction (KMD), this destructiveness hugely amplified by the power of
self-replication. I think it is no exaggeration to say that we are on the cusp
of the further perfection of extreme evil, an evil whose possibility will
spread well beyond that which weapons of mass destruction bequeathed to the
nation-states, on to a surprising and terrible empowerment of extreme
individuals (Joy, 2000, p.9).
He concludes by saying that:
I have always
believed that making software more reliable, given its many users, will make
the world a safer and better place; if I were to come to believe the opposite,
then I would be morally obliged to stop this work. I can now imagine such a day
may come (Joy, 2000, p.262).
Thus, these are all very serious ethical issues that need to be
confronted sooner rather than later. If it appears to be the case that advanced
aspects of I.T. are seriously threatening our way of life, then something
surely needs to be done about it as soon as possible.
3.2.12 Expert systems
Expert systems are a body of information in a specific field that is
held in an electronic format, such as a ‘doctor expert system’, that houses
detailed medical information on a database. Various questions can be posed in
regard to expert systems, such as what is the basis of ownership? Is it the
different elements that comprise the total system or the total package? These
issues are related to intellectual property rights and the moral aspects in
regard to this. Belohlav, Drehemer and Raho (und.) report on a survey of
information system professionals that was undertaken, which examined the
perceptions of these professionals on the development and use of expert systems
business organisations. The population that was examined was the membership of
the Data Processing Management Association (DPMA), and 499 usable
questionnaires were returned. The DPMA is the largest general computing
association in the United States. The survey examined how knowledge of an
expert system was developed. Respondents said that individual experts in an organisation should be informed about their
participation, but that they should not necessarily be forced to participate in
creating an existing system.
Furthermore, they said that they were not the owners of the end product.
Thus, the respondents had clear opinions about their moral rights in relation
to the use of their intellectual property for expert systems, although also:
The results
indicate that no uniform ethical perspective dominates the perceptions of the
respondents in assessing expert system applications (Belohlav, Drehmer and Raho, und., p.1).
This, perhaps, helps to illustrate the complexity of ethical issues
here.
There are also wider ethical issues in regard to expert systems that
need to be explored. In regard to a 'doctor expert system’, for example, such a
system can provide accurate information, but the face-to-face contact is
missing. Such face-to-face contact might prove to be essential in order to
ensure that the right diagnosis is made, and it is possible that some
individuals could even die as a result of a wrong diagnosis given through this
lack of face-to-face contact. In other ways expert systems could help to save
lives. The patient might, for example, be given a speedier response. All these
ethical issues need to be considered further.
3.2.13 Genetic engineering and
the patenting of life-forms
Many ethical issues are raised in regard to genetic engineering and
the patenting of life-forms. Is such behaviour morally acceptable? Such debates
can sit alongside debates on subjects such as euthanasia and abortion.
3.2.14 Netiquette
There are also ethical/moral codes that should be adhered to, in the
use of networks and email correspondence. As already indicated, the setting up
of such codes has become necessary as people have not always addressed each
other in an appropriate manner through this means of communication, and in this
way they have behaved unethically. As pointed out by Margaret Lynch (1994)
guidelines for ‘on-line civil behaviour’ include, for example, not wasting
peoples’ time and not taking up network storage with large files. Furthermore,
not looking at other peoples’ files or using other systems without permission
and not using capital letters, as this denotes shouting (unless one does
actually want to shout at someone through email!). Also, people that become too
obnoxious can be banned or ignored. A ‘kill file’ can be set-up which will
automatically erases messages from that person.
3.2.15 Intellectual property rights: the moral rights
There are moral rights embedded within much intellectual property
rights legislation, agreements and directives, for the benefit of creators of
works and copyright holders. Furthermore, there are penalties for those that
violate such legislation, (such as violating copyright legislation), although
this can sometimes be difficult to enforce in practice. The legislation,
though, is often complex and difficult to understand, which means that some
creators of works do not obtain the moral rights that they are entitled to.
However, sometimes, moral rights are actually excluded from agreements. This
applies to the World Trade Organisation’s Agreement on Trade-Related Aspects of
Intellectual Property Rights (TRIPS) (1995), in relation to copyright. As the
WTO says:
…Members do
not have rights or obligations under the TRIPS Agreement in respect of the
rights conferred under Article 6Bis of that Convention, i.e. the moral rights
(the right to claim authorship and to object to any derogatory action in
relation to a work, which would be prejudicial to the author’s honour or
reputation), or of the rights derived there from (WTO, und., p.4).
The Berne Convention is over 100 years old, and deals with copyright
issues in great depth. All of the Berne Convention has been incorporated into
TRIPS, apart from the moral rights. This should surely give us cause for
concern.
3.2.16 Issues of data collection, storage and access
There are many moral issues that need to be considered in regard to
the collection, storage and access of data in electronic form. Under what
circumstances, for example, should one seek permission from or inform those
whose records are on file? Furthermore, how accurate is the data and who has
access to it?
3.2.17 Speed of computers
The pure speed at which computers operate can cause ethical problems
in themselves. It can allow people to perform unethical issues quickly, or
perform operations that it was difficult or impossible to perform before, such
as browsing through files that one is not authorised to. It can also mean that
people do not give enough consideration before performing various actions.
3.2.18 Vendor-client issues
Ethical issues also arise in regard to vendor-client relationships,
the vendor being the computer supplier and the client being the person that is
buying the computer system, whether this be the hardware or software or both.
If the user continually changes the system specification, for example, to what
extent should the vendor be prepared to adjust the system specification
accordingly? Other unethical acts include, for example, consultants selling the
program to the second client, after being paid to develop the program for the
first client only. Also, the vendor might provide hardware maintenance
according to a written contract and for hardware to be repaired in a ‘timely
manner’, but the client might not believe that the repairs have been timely.
Drawing up more precise contracts might help here, but in some instances the
outcome can probably only depend on peoples’ individual moral consciences.
3.2.19 Conclusions
Thus, there is a vast range of ethical issues in I.T., and some of
these have been discussed in this article. These can be broken down into a
number of sub-headings, including computer crime, social implications, advanced
I.T. issues, netiquette and intellectual property rights. Some of these can be
solved quite easily, whilst others seem to be almost impossible to solve.
Kallman and Grillo say that in order to create an ethical computing environment
we need to establish rules of conduct. Referring to ethical issues in I.T. in
general, they say:
Because
computers permeate our work and personal lives, all of us have an obligation to
see that they are used responsibly. The factors that characterize ethical
dilemmas in a computer environment include the speed of a computer,
vulnerability of computer data to unauthoized
change, and
the fact that protecting information often decreases its accessibility. Because
of the effort effect, harmless situations may turn into harmful ones without
our realizing it (Kallman and Grillo, 1996, p.31).
There is much food for thought and a lot of work that needs to be
done, if we are to meaningfully address some of these issues. Not addressing
some of these issues (such as computer viruses) is not an option anyway, if we
want to continue to live in an I.T. age (which seems inevitable anyway) – we
cannot have viruses causing our I.T. systems to continually crash.
Very informative and worthy post. Thanks for the sharing such a precious updates with us.
ReplyDeleteToshiba - Refurbished - 14" Tecra Notebook - 4 GB Memory - 320 GB Hard Drive
Toshiba - Satellite 15.6" Touch-Screen Laptop - 6GB Memory - 750GB Hard Drive - Mercury Silver (L55DTA5253)