Legal and Ethical Issues Related to Computers
Legal and Ethical Issues Related to Computers
Common Issues
-
Spyware
-
Cyberbullying
-
Identity Theft
Use of Spyware
Spyware is a type of malware that invades a computing device, stealing valuable internet usage data and sensitive information (1). In other words it's a harmful software that is created to gain access to or damage your computer internally.
Spyware is used for many reasons. This involves tracking and selling your internet usage data to advertisers, data firms, or external users, capture your credit card or bank account information and steal your personal identity.
The main factor that makes spyware so dangerous is its ability to hide well and not be discovered (1). Many of its victims are unaware that such a program is on their computer.
The four main types are:
- Adware
- Trojan
- Tracking cookies
- System monitors (1)
These all use different, yet highly effective tactics to steal your information.
How is spyware installed? Spyware usually infiltrates your system when you click a button on a pop-up window, install a software package or agree to install add-ons to your web browser (2). Spyware software is effective at
tricking you to click buttons such as cancel when in reality clicking cancel results in downloading the software. In addition, many websites and applications, especially the free alternatives, team up with data firms and include the harmful software in the application
installation. This catches many people off guard as they tend to ignore all the installation information.
Cyberbullying
Cyberbullying is the use of electronic communication devices to bully others. The most common method of cyberbullying is sending
rude, harmful, or threatening messages that are intended to harass, humiliate, torment or threaten the victim. Cyberbullying usually occurs in the teenage years when the victims are most vulnerable.
However, unlike face-to- face bullying, cyberbullying can be relentless and persistent (3). The victim is never safe, not even in their bedroom, at their grandmothers house, or even on a family vacation.
Internet bullying comes in many forms. This includes spreading embarrassing rumors, gossip, or secrets online, hacking someone's email account and sending hurtful content to others, creating online polls and rating people in negative ways, and even harming a players' character in an online video game.
Fun facts
- About 1 in 10 teens in Canada claim they have experienced online bullying
- More than one-third of teens in Canada have seen inappropriate activity on social media (3)
- Girls are more likely than boys to be victims and perpetrators of cyberbullying
- Victims of cyber bullying are at greater risk for self-harm and suicidal behaviors (4)
Identity Theft
Identity theft is a serious crime where someone gathers your personal information for criminal purposes. Anything from your name, driver's license, or social insurance number
may be compromised by an impostor who intends to commit fraud in your name. When someone has your identity they can use
your personal information to get away from legal matter, leaving you with a criminal record. Methods of identity theft can range from dumpster diving and collecting mail,
to creating elaborate schemes to steal someone's personal information.
The most common frauds associated with identity theft are impersonating another person and the misuse of credit or debit card data (5). A victim of identity theft or fraud is likely to experience severe financial loss as well as difficulty
in restoring their reputation. Identity theft is highly illegal and unethical as it can completely destroy a person's or a families' life. One day you can be a millionaire and manager at your business firm and the next day you can lose your job and go bankrupt. Penalties for identity theft and fraud are worth up to 15 years in prison (5).
However, frauds or felonies committed after the theft can increase that number.
- In 2017, 6.64 percent of internet users experienced identity fraud
- In 2017, 1 million children in the US were victims of identity theft costing families $540 million in expenses
- Statistics show that every 2 seconds there is a new victim of identity theft (6)
Conclusion
In conclusion there are many illegal and unethical issues related to the use of computers. The internet comes with many dangers and it is important that you stay safe.
Questions
- Why is spyware so dangerous?
- What is the most common method of cyberbullying?
- What is one common fraud associated with identity theft?
Click here for the answers.
Works Cited
(1) NortonOnline. (n.d.). What is spyware? And how to remove it. Retrieved from https://us.norton.com/internetsecurity-how-to-catch-spyware-before-it-snags-you.html
(2) Coustan, D. (2005, February 16). How Spyware Works. Retrieved from https://computer.howstuffworks.com/spyware1.htm
(3) What is cyberbullying? (2018, October 4). Retrieved from https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cbrbllng/prnts/cbrbllng-en.aspx
(4) 11 Facts About Cyberbullying. (n.d.). Retrieved from https://www.dosomething.org/us/facts/11-facts-about-cyber-bullying
(5) Government of Canada, Royal Canadian Mounted Police, & Federal and International Operations. (2015, December 4). Identity Theft and Identity Fraud. Retrieved from http://www.rcmp-grc.gc.ca/scams-fraudes/id-theft-vol-eng.htm
(6) Identity Theft Odds: Identity Theft Statistics: Reduce the Risk of ID Theft: IdentityForce®. (2019, September 17). Retrieved from https://www.identityforce.com/blog/identity-theft-odds-identity-theft-statistics
(7) Seth, P., & Tweak Library Team. (2019, November 26). Prevent yourself from Cyberbullying. Retrieved from https://tweaklibrary.com/prevent-yourself-from-cyberbullying/
(8) Miles, B. (2019, October 7). Learn More About This Malware That Could Track Your Online Movement. Retrieved from https://www.lifewire.com/what-is-spyware-4771730
(9) Montaldo, C. (2019, September 25). 10 Ways Identity Thieves Can Get Your Information. Retrieved from https://www.thoughtco.com/ways-identity-thieves-get-your-information-972208