Topic > Ethical Dilemma in the Use of Information Technology

IndexCyber ​​CrimeIntellectual PropertySoftware PiracyJob ShiftingThe ethical dilemma is a decision between two alternatives, both of which will lead to an antagonistic outcome in light of social and individual rules. This is a fundamental leadership question between two conceivable good goals, neither of which is unequivocally worthy or ideal. Unpredictability emerges from situational conflict where obeying one would result in transgressing another (Melissa, 2017). Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original Essay The use and spread of information advancements have been reformed and supported by the rise and improvement of information technology innovations. Electronic systems have enabled the exchange of information, but this has also brought new difficulties. The rights and obligations in how accessible information is used have given rise to some ethical issues. Ethical difficulties greatly affect organizations and especially private companies that may not have huge capital and mastery costs to manage ethical situations in using innovations. Cyber ​​Crime Cyber ​​crimes have been commonly referred to as electronic crime, computer crime and electronic crime, these are activities carried out by experienced and knowledgeable IT professionals normally called hackers. The activities in their basic nature are illegal as they tend to revolve around the illegal manipulation of information of individuals and organizations. This normally involves browsing or stealing private information of individuals or organizations. Most computer crimes are committed with malicious intent to corrupt or destroy computer systems or data files (Chron, n.d.). Intellectual property Protected innovation is the production of a company and incorporates the name, outlines, creations, images and images used by an organization. The success of a business depends to a large extent on these aspects. Information technology has enabled several organizations to duplicate these innovations from others and use them as their own. A portion of these developments come from medium-sized businesses (SMEs), whose efforts may not be fully utilized and therefore not increase monetary earnings. This is because their creations are unprotected and are normally taken up by large organizations that can afford to quickly commercialize the developments or product. To maintain a strategic claim on these developments, SMEs should patent them, thus preventing competitors from imitating or duplicating their products (Chron, n.d.).Software piracyThis is the illegal duplication of programs, regardless of whether it is intentional or unconscious. Programming theft ignores copyright claims. In 2002, 39% of business application programs were stolen in the United States. Program theft can be exorbitant, especially for organizations, as it causes significant misfortunes. In 2002 alone, the software business in the United States lost a total of $13 billion. It could be argued that individual theft may not be unscrupulous as it requires computer education and may even lead to future purchase of the product. Be that as it may, the situation may arise when the theft is carried out on a large scale, as this will cause real misfortunes for program producers, especially for people who are small-scale producers. Large organizations like Microsoft hardly feel the misfortune since).