In this era we tend to revolve around technology. Computers and other technologies have made their way into our lives. When it comes to using them, we must use our ICT ethics to prevent any ethical problems in the world of technology and communication. From there, we as global citizens can raise numerous questions regarding the ethical and legal uses of information and communications technologies. Ethics defines what is good for the individual and for society and establishes the nature of the duties that people have towards themselves and towards each other. Knowledge of technology and information spreads very quickly. This is evidenced by the growing number of Internet users and users. Undeniably, even five-year-olds already know what mobile phones, personal computers and tablets are. Now let's talk more about ethics in ICT. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay Ethics is necessary to avoid technical abuses that can harm people or even a group of people. Ethics arise from the users of technology themselves. Technology users should only be wise and wise people. Ethics itself means a set of principles or values relating to morals, procedures (customs, courtesy) values about what is right and wrong regarding the rights and obligations adopted by groups or societies. While ICT, in a broader context, embraces all aspects related to the machine (computer telecommunications) and the techniques used and visualizes the form of information. Therefore, the ethics of using information and communication technology is a moral principle in the world of technology. It can also be defined as a set of principles or values relating to morals, procedures (customs, good manners), values about right and wrong, rights and obligations relating to ICT adopted by groups or communities. When using the use of ICT, it will obviously have an impact on you as a user. Although the use of ICT tends to be related to conflicts such as cyber harassment, cyberbullying and other forms of non-compliance with one's ethics while on the Internet, ICT can also have a positive influence. Being a student, technologies are considered as a way to teach ourselves effectively. Digital tools are effective in engaging and challenging us students. The use of technology in classrooms can be extremely beneficial. Technology is also very important for people living in this age to help us communicate with each other. Technology can also broaden our knowledge of something and make us more creative and knowledgeable individuals. But that doesn't mean it doesn't affect us in a negative way. It is important that students are taught how to build their online profiles safely and responsibly. As for teachers, they should provide students with the tools to ensure legal, safe and ethical behavior when using ICT, at school, at home and within the community. The safe, responsible and ethical use of ICT is an important part of teachers' work and student learning. The overall purpose of ICT is to familiarize students and also teachers with the use of how computers and ethical issues relate to each other. ICT is also believed to be a source of empowerment for both teachers and students because it is an updated way for education and any learning process. In this essay I will mainly talk about how exposing your private information can lead to cyber harassment. This is always a problem for anyone who uses ICT. THEdata must be kept secure, Internet connections must be protected from attacks, new viruses and other forms of malware are released almost every day or even when you have been "attacked" by other users because they might use your personal information or your posts in something that could hurt you emotionally. I will talk about how important it is to be aware of maintaining your privacy and how to prevent it from being leaked. One of these is obviously to have the right ethics when using ICT. Cybercrime is not a crime committed using computer technology as a major criminal tool. Cybercrime is a crime that takes advantage of the development of information technology, particularly the Internet. Cybercrime is defined as an illicit act using computer technology based on the sophistication of Internet technology development. Privacy means guaranteeing confidentiality of our personal data. Privacy means the storage of any information relating to an identifiable individual or an identified person, including information such as name, telephone number, address, e-mail, car registration number, physical characteristics (face size, fingerprints , handwriting, etc.), credit card numbers, and family relationships with oneself. Privacy is an individual's right to keep personal information from being accessed by people who are not authorized to do so. Your personal information must be protected from being accessed without authorization and from being stored elsewhere without your knowledge. There are different types of privacy rights: the right to be free from unwanted access, physical access, access via SMS. The right not to allow unwanted public information, such as sales information and information leakage. The right not to allow personal information to others without your knowledge or permission, for example the use of CCTV. The right to have accurate and correct personal information. The right to obtain compensation for the value of the information itself. “Information technology” refers to automated systems for storing, processing and distributing information. Typically, this involves the use of computers and communications networks. The amount of information that can be stored or processed in an information system depends on the technology used. Human beings value their privacy and the protection of their personal sphere of life. They appreciate some control over who knows what about them. They certainly don't want their personal information to be accessible to anyone at any time. But recent advances in information technology threaten privacy and have reduced the amount of control over personal data and open the possibility of a variety of negative consequences following access to personal data. The development of information technology is developing very rapidly, this allows both from a technical and economic point of view, to easily collect, store and provide data and information. However, with the rapid development of information technology it can have a negative or negative impact on the privacy of each individual. Various issues are under debate in business and government. There are several examples including; Use customer information to market additional business services from various sources. Collection of phone numbers, credit card numbers and more to create a customer profile. Evaluate someone's personal conversations and various information about the individual benefits obtained from visits to various Internet sites. “They” would end up posting mean and negative comments towardsinformation obtained by invading someone's privacy online. Which brings us to cyber harassmentCyber harassment and privacy are closely related in practice and theory. It involves harassment of a person equivalent to traditional school bullying. Online privacy is about protecting your confidential data and profile across digital platforms. Cyber harassment can include trolling and image blurring using photos and content uploaded by a user. This material is private and confidential unless permission is given for public use. Bullying activities undermine a person's private space. Cyberbullying negatively impacts the psychological and social life of victims. Likewise, violating user privacy through bullying or theft of private data creates stress and mental health problems. Bullied children skip classes and perform poorly in exams. Now let's move on with the Jennifer Lawrence leaked nude photos case. According to time.com, nude photos of Jennifer Lawrence have been "leaked" online. The truth is that they were stolen. They were hacked by his personal technology. They were published online without his consent. This is a crime. And perhaps worst of all, this is something women should expect. Lawrence's representative released a statement to The Hollywood Reporter: “This is a flagrant violation of privacy. Authorities have been contacted and will prosecute anyone who posts the stolen photos of Jennifer Lawrence. “We live in a society where women's bodies are a commodity to be sold, whether they agree with it or not. And some of the same people who complain about the NSA (National Security Agency) or Facebook invading their personal privacy will be the same people who will search for and spread these photos. The person or people who stole these photos and posted them online knew exactly what they were doing and why, but society as a whole doesn't necessarily understand why it's not right that they did it. We have all been brainwashed in one way or another to believe that women who look or act a certain way can be treated a certain way without consequences. In many cases, trolling happens when people express their opinion against something on social media, but there can always be situations there where you get trolled without rhyme or reason. If someone takes your photograph, makes your videos, records and publishes your private photos, or sends them electronically to anyone without your consent, you can take legal action against them. In this case, when you know you are posting something risky and personal online, you need to reconsider the side effects. Based on the case we talked about before, you can learn that you need to be aware of other people on the Internet too. Leaking your personal information or images is a big deal because once it's out there, you can't really remove it. People on the Internet can also react in different ways. Some may think that you are just looking for attention when in real life you don't even know how a person can get your personal information. So regardless of whether the answers you get are good or bad, there is no good in giving out someone else's personal information. To stop people from disclosing our photos, text messages, or any other private matter is to never do it in the first place. Well, in this case it's a little different because Jennifer is considered a big star in Hollywood and most people know her, which makes it easier for them.
tags