StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Ethics, Pirated Software and Spyware - Essay Example

Cite this document
Summary
An individual’s moral judgment remains the ethics’ primary concern. In business, decisions and recommendations are made by individuals on behalf of the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Ethics, Pirated Software and Spyware
Read Text Preview

Extract of sample "Ethics, Pirated Software and Spyware"

Computer Sciences and Information Technology Ethics, Pirated Software, and Spyware What are ethics, and how do ethics apply to business? Ethics can be defined as the principles that govern a groups or an individual’s actions in any given situation. An individual’s moral judgment remains the ethics’ primary concern. In business, decisions and recommendations are made by individuals on behalf of the organization that they represent. These people should be guided by the organization’s culture (Bredeson 65).

The decision to act ethically is a moral choice. Hence, employees should decide on the right course of action in any business engagement. Corporate social responsibility and ethics can bring a lot of benefits to the business. Benefits include attracting new employees, customers, investors and retaining the employees. Lack of ethical behavior and corporate social responsibility, can damage the firm’s reputation and cause a fall in profits and an eventual business close down.What situation would qualify as an exception to the copyright law?

There are several cases that would be eligible for an exception to the law of copyright. One of such situations is when the work is in the public domain. The work in the public domain is not protected by the copyright law and can be used freely by anyone. Another instance is when there is assurance of fair use. This provision allows copyright materials to be used for research and educational purposes (Howe 265). Other occasions may include the use of electronic reserves, libraries and archives, learning management systems like blackboards, and the application of the first scale doctrine.

In the first scale doctrine, owners of legally obtained copyright material can dispose of them without the permission of the owner. However, this does not apply to music and software licenses. In music and software licenses, one has to be authorized so as to carry out a transaction.What is spyware? Would this include key logging while at work?Spyware can be defined as software and applications that take information about the user’s online activities and send them back to their creators. Spyware effects include pop-up ads and browser hijacking.

More serious breaches include identity theft and key logging. Each piece of spyware acts differently depending on the information collected. Some gather information for the purpose of marketing while others have malicious intents. Key logging applications monitor the user’s keystrokes and send the information a malicious recipient of the data. In the workplace, keystrokes may be directed to an administrator, who may just be monitoring the companys operations. Keylogging can happen through the email or other internet servers.

There are three types of keylogging, hardware keyloggers, software hooking keyloggers, and driver key loggers. Key logging at workplaces is also considered as spyware; however, the intentions may not be malicious. Employers can activate Key logging so as to monitor their employees’ activities.Works CitedBredeson, Dean. Applied Business Ethics: A Skills-Based Approach. Manson, OH: south-western Cengage learning. 2012. Print. Howe, Helena. Concepts of Property in Intellectual Property Law. Cambridge, UK: University Printing House. 2013. Print

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ethics, Pirated Software and Spyware Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Ethics, Pirated Software and Spyware Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1678641-ethics-pirated-software-and-spyware
(Ethics, Pirated Software and Spyware Essay Example | Topics and Well Written Essays - 500 Words)
Ethics, Pirated Software and Spyware Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1678641-ethics-pirated-software-and-spyware.
“Ethics, Pirated Software and Spyware Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1678641-ethics-pirated-software-and-spyware.
  • Cited: 0 times

CHECK THESE SAMPLES OF Ethics, Pirated Software and Spyware

Apples Biggest Successes and Failures

Apple systems, though, are costly as compared to other brands; yet provide longer durability, lower downtime, increased reliability, and built-in support against viruses and spyware (Apple Inc.... This moved attracted customers as Office was the most used software at that time.... This is made possible due to continuous and dedicated hard work and commitment to creativity which are cornerstones of Apple's work ethics....
2 Pages (500 words) Case Study

Counterfeit Merchandise

Counterfeiting is prevalent in many sectors such as software, video, music, toys, aircraft spare parts, medicines, perfumes and fashion merchandise such as handbags, watches, textiles (Vithlani, 1998, p.... Counterfeiting in the software, music and motion picture industry has been on the increase over the years due to technological innovations, reduced costs of counterfeiting and the ease with which the products can be counterfeited (Vithlani, 1997, p....
6 Pages (1500 words) Essay

Different Type of Spywares

These freewares even have a notification that a spyware will be installed onto the host computer in the fine prints.... Imagine the previous times full of inconvenience and hassles when we had to stand in what appeared to be never ending queues, to execute any transaction at the bank be it some money transfer or even a minor enquiry....
7 Pages (1750 words) Lab Report

Spyware and Viruses

The creators of spyware have been known for paying the developers of shareware to bundle their software with the authentic software and just repackaging the freeware as well as bundling it with their individual spyware (Parikka, 2007).... spyware is kind of malware, which is installed on a computer without approval or awareness of the owner with the aim of gathering the private information of the owner.... When the software that is being installed by the user is completed, the spyware will attach itself to the installation and begin the collection of data from the activities of the user or the owner....
17 Pages (4250 words) Term Paper

Impact of After Sales Service on the Sale of Apples Products

The objective of the current research "Impact of After Sales Service on the Sale of Apple's Products" is to analyze the impact of after sales services on the sale of Apple products.... The research proposal provided an expansive background on literature review … 100 samples will be used for the current study with 10 employees from Apple and 90 customers who have experienced Apple's after sales services....
12 Pages (3000 words) Dissertation

Digital Certificate Technology and Its Criticisms in the Recent Times

This coursework "Digital Certificate Technology and Its Criticisms in the Recent Times " describes digital certificates of technology and web technology that have been fundamentally and increasingly compromised in recent times, their advantages and disadvantages.... hellip; Additionally, technology has been effective in ensuring that various programs are developed to enhance the security among many other important functions....
10 Pages (2500 words) Coursework

Digital Piracy as a Crime

Digital piracy refers to the illegal copying of any digital software, digital documents, goods, digital audio (including video and music), for any other reason except to backup without any prospected permission from the owner and compensation to the immediate copyright holder (Ellacoya 2007; Higgins & Makin 2008, p.... The laws produced a few court cases for pirating music, software, and movies directly from the Internet (Hinduja 2003, p.... Industry groups in their research results estimated software piracy as accounting for nearly 11 billion dollars in terms of lost revenue and was a substantial contributor to job losses and reducing the government's revenues (Higgins, Wilson & Fell 2005, p....
8 Pages (2000 words) Term Paper

Should There Be Greater Censorship of the Internet

The first implementation costs can entail the attainment of the necessary software or hardware and their incorporation into the present systems, which could involve system and network configurations.... Therefore, these costs are getting harder to foresee, but include preservation of any obtained software or hardware, filter and blacklist updating and consumer assistance regarding blocking or some websites....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us