Computer Crimes Number
Computercrimes commonly known as cyber-crime are criminal activities, whichinvolves computer system, internet, and computer technology. Thereare different approaches to the computer crime issues however, thekey point is that, it is a criminal activity targeting computers orinternet through hacking. The crime is done via the internet withcomputers. Due to technology advancement, there has been an increasein the cases of cyber-crimes or the computer related crimes. Thecrimes come in different forms, with different people falling victimof the criminal activities (Akman & Mishra, 2009). Nowadays,other different terms are used to refer to the crime such as, hi techcrime, electronic crime, cyber-crime, or e-crime. Examples ofcomputer crimes involve crimes such as, phishing, cyber stalking,cyber terrorism, child pornography, fraud among others.
MostPrevalent Types of Computer Crimes
Thereare numerous cyber-crimes carried out through the internet, withdifferent people falling victim. One of the most common is CyberTerrorism.This is whereby the internet is used to hack into the company’scomputer system or an individual computer, corrupting theinformation, or obtaining personal details. It is also used to sendthreats, blackmailing towards a business or an individual. Cyberterrorism can be prevented through the creation of a strong securitypolicy of an organization, always secure the systems with bothhardware and software protections. For an individual, always useantivirus, and keep to date the system programs (Hyman, 2013).
Anothercommon crime is the CyberBullying/Stalking.This is harassing others online, with children and young people beingthe main victims of this crime. This can be prevented through parentscontrolling their children’s action online. There is also thecreation of Malwareor Viruses.This can be prevented through use of anti-virus, keeping the systemup to date and controlling what one is downloading from the internet.In addition, there is also phishing. Phishing is an act of fraud,involving the sending of legitimate looking emails, with an intentionof to gather financial information or gather personal information.This can prevented through avoiding responding to every email. Othercyber-crimes include child pornography, spamming, identity theft,harvesting among many others (Herley, 2014).
ProtectiveMeasures against Cyber-Crimes
Cyber-crimesare divided into three categories in accordance with the targetgroup. These include individual, property or government. Differentmeasures can be implemented towards the curbing of the menace. Oneway to prevent the crimes is the use of strong passwords. Othermeasures include educating the employees, on security measures toavoid exposing the computer systems to cyber-criminal. It is alsoadvisable to always shore up weak points, which may be used to accessthe system. This can be done, through use of antivirus software’s,and installing latest operating system updates. Finally, it’sadvisable to always back up the information in case of an attack toone’s system, and also protecting one’s e-identity, as wellinforming the right personnel in case of any cyber-attack (Arnold etal, 2010).
Ethicaltheories are used to make ethical decisions, where there are fourdifferent four ethical frameworks used in making ethical decisions.These includes rightsand responsibilities, consequentialism, autonomy, and virtue ethics.There are different forms or types of ethical theories that has beenused when making an ethical decision. These entails theories such asduty to principles or people, compassion and consequence, virtue andvice, and finally there is self-interest/enlightened theory (McGee &Byington, 2013).
Inthe current times/information age, there are different numerousethical issues facing the IT sector, and especially the use internetin an organization by the employees. One of the major areas ofconcern is the privacy concerned with the use of the technology.Through the growth of information technology, its capacity forsurveillance, there is a constant threat to people’s privacy. Thereis also the threat posed by the increased value of information indecision-making. Information is increasingly becoming valuable topolicy makers, however, the policy makers covet the information evenif fetching it invades another’s policy (McGee & Byington,2013).
ReynoldsSeven-Step Approach in Decision-Making
Stating of the problem,
Howmuch privacy monitoring is acceptable in an organization, shouldsecurity cameras be allowed even in private areas?
Whatare the benefits of increased surveillance of the employees, to theindividuals, and to the organization?
Identify relevant factors,
Thisincludes the personnel included, practical constraints and laws thatmay be affected by the practice
Developing list of options to the problem
Application of tests such as: harm, reversibility, professional, organization. Colleague, defensibility, and publicity tests.
Making of a choice with reference to steps 1-5.
Reviewing of steps 1-6.
Inconclusion, the development and the adoption of internet and computersystem use has been a positive aspect in the management oforganizations. However, the technology has brought ethical issuesconcerning the use of the systems. One of the ethical concern, is howmuch of the employee privacy is exposed without their knowledge.Cybercrime has been on the rise in the recent times, taking differentforms. These include, cyber terrorism, phishing, cyber bullying amongothers. However, with effective measures, the negative impact ofthese crimes can be minimized.
Akman,I., & Mishra, A. (2009). Ethical behavior issues in software use:An analysis of public
Andprivate sectors. Computers In Human Behavior, 25(6),1251-1257.
Arnold,D. G., Audi, R., & Zwolinski, M. (2010). Recent Work in EthicalTheory and Its
Implicationsfor Business Ethics. Business Ethics Quarterly, 20(4),559-581.
Herley,C. (2014). Security, Cybercrime, and Scale. Communications OfThe ACM, 57(9),
Hyman,P. (2013). Cybercrime: It`s Serious, But Exactly HowSerious?. Communications Of The
McGee,J. A., & Byington, J. R. (2013). How to Counter CybercrimeIntrusions. Journal Of
CorporateAccounting & Finance (Wiley),24(5), 45-49.