The personal computer has become a near necessity in modern society; business and government have also become dependent on the computer for all manner of operations and operating their business. With new opportunities come new dangers, and there are concerns today both for ethical violations in computer use and crime making use of the power of the computer. The computers today are creating violation among the people due to the software which are created and this makes the person feel insecure and the person always stays in tension.
Ethics is the art of doing what is right in a societal context, and the computer user is part of such a context in the virtual world, or the world of cyberspace. Computer ethics includes everything from proper online etiquette to respect for the privacy of others. Computer crime may take place through overt theft, confidence games, and new electronic means of capturing data, creating viruses that destroy other computers, and crimes not even thought of yet.
Due to this increment in the number of computer crimes, important and confidential data of people have been hacked and misused in different places. Fighting computer crime requires a law enforcement community that is computer literate and constantly on the watch for criminal activity and new crimes. It also requires a legislature willing to change existing laws to match new capabilities.
Computers today are part of our lives in ways we often do not even notice, not only in the more obvious personal computers we use at home and the larger computers we may use in such places as banks and libraries, but also in computer technology that is found in home appliances such as television sets, coffee makers, microwave ovens, videocassette recorders, and hand calculators, not to mention toys and games. Computers are nowadays used in every part of life and are easily accessible from anywhere. The world has become very close but it has also affected the international business to a great extent.
The Act places restrictions on the ability of businesses to include in their distributed applications the capability of gathering user information and disseminating this information to the software company or some other third party. The legislation includes the demand that any business that uses information-gathering must make it clearly visible to consumers that such information is being collected. The legislation also mandates that consumers must be able to view a summary of all information collected that pertains to them.
One of the most important features of the legislation is that it mandates that no company is able to collect personal information for such purposes without first gaining the consent of consumers. This type of software safeguard’s the rights of the company but the computer thefts have created such programs that are very powerful and can help in seeking information. The data in the computer is transferred at a very fast speed but the data through transferring can even be copied or lost. All the time the computer accession is not available and therefore the connection with the business is lost if the business completely depends on the computers.
The reasons could be power failure, hard disk break down or many more. These reasons require time to be overcome and solved and the time which is required makes a person out of touch with the trade of the business and this affects the economy a lot as the sales are reduced. International trade requires services of the computer at all times but the computer having exceed in the development to a great extent still remains a machine and therefore a machine is a program based device which can get mingled up with any type of wrong instructions or many other things.
The loss of property both physical and financial in nature through theft is a major problem confronted by management. The perpetrators of this illegal activity are found among the employees of the organizations, the customers of the organizations, and persons not directly associated with the organizations. It is a definite mistake to assume that white collar crime or white collar criminals are unitary in character. Both come in many forms. These crimes are committed by many people and this has created a small untrustworthy feeling on the computers.
People are not sure that the data of their business is safe or not. The internet banking system is also a great facility for the people who are abroad to get things easily in just few clicks but this has also suffered when many accounts were hacked and the money was taken out. In the conclusion is can be stated that people have misused the facility of the computer and this has infected the society very much. The people have themselves created software which has made the data unsafe. Therefore this has made international business slow in progress.