Legal and Ethical Issues Related to Computers

Common Issues

Use of Spyware

Spyware is a type of malware that invades a computing device, stealing valuable internet usage data and sensitive information (1). In other words it's a harmful software that is created to gain access to or damage your computer internally. Spyware is used for many reasons. This involves tracking and selling your internet usage data to advertisers, data firms, or external users, capture your credit card or bank account information and steal your personal identity. The main factor that makes spyware so dangerous is its ability to hide well and not be discovered (1). Many of its victims are unaware that such a program is on their computer.

The four main types are: These all use different, yet highly effective tactics to steal your information.

How is spyware installed? Spyware usually infiltrates your system when you click a button on a pop-up window, install a software package or agree to install add-ons to your web browser (2). Spyware software is effective at tricking you to click buttons such as cancel when in reality clicking cancel results in downloading the software. In addition, many websites and applications, especially the free alternatives, team up with data firms and include the harmful software in the application installation. This catches many people off guard as they tend to ignore all the installation information.

Cyberbullying

Cyberbullying is the use of electronic communication devices to bully others. The most common method of cyberbullying is sending rude, harmful, or threatening messages that are intended to harass, humiliate, torment or threaten the victim. Cyberbullying usually occurs in the teenage years when the victims are most vulnerable. However, unlike face-to- face bullying, cyberbullying can be relentless and persistent (3). The victim is never safe, not even in their bedroom, at their grandmothers house, or even on a family vacation. Internet bullying comes in many forms. This includes spreading embarrassing rumors, gossip, or secrets online, hacking someone's email account and sending hurtful content to others, creating online polls and rating people in negative ways, and even harming a players' character in an online video game.

Fun facts

Identity Theft

Identity theft is a serious crime where someone gathers your personal information for criminal purposes. Anything from your name, driver's license, or social insurance number may be compromised by an impostor who intends to commit fraud in your name. When someone has your identity they can use your personal information to get away from legal matter, leaving you with a criminal record. Methods of identity theft can range from dumpster diving and collecting mail, to creating elaborate schemes to steal someone's personal information. The most common frauds associated with identity theft are impersonating another person and the misuse of credit or debit card data (5). A victim of identity theft or fraud is likely to experience severe financial loss as well as difficulty in restoring their reputation. Identity theft is highly illegal and unethical as it can completely destroy a person's or a families' life. One day you can be a millionaire and manager at your business firm and the next day you can lose your job and go bankrupt. Penalties for identity theft and fraud are worth up to 15 years in prison (5). However, frauds or felonies committed after the theft can increase that number.

Conclusion

In conclusion there are many illegal and unethical issues related to the use of computers. The internet comes with many dangers and it is important that you stay safe.

Questions

  1. Why is spyware so dangerous?
  2. What is the most common method of cyberbullying?
  3. What is one common fraud associated with identity theft?
Click here for the answers.

Works Cited

(1) NortonOnline. (n.d.). What is spyware? And how to remove it. Retrieved from https://us.norton.com/internetsecurity-how-to-catch-spyware-before-it-snags-you.html
(2) Coustan, D. (2005, February 16). How Spyware Works. Retrieved from https://computer.howstuffworks.com/spyware1.htm
(3) What is cyberbullying? (2018, October 4). Retrieved from https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/cbrbllng/prnts/cbrbllng-en.aspx
(4) 11 Facts About Cyberbullying. (n.d.). Retrieved from https://www.dosomething.org/us/facts/11-facts-about-cyber-bullying
(5) Government of Canada, Royal Canadian Mounted Police, & Federal and International Operations. (2015, December 4). Identity Theft and Identity Fraud. Retrieved from http://www.rcmp-grc.gc.ca/scams-fraudes/id-theft-vol-eng.htm
(6) Identity Theft Odds: Identity Theft Statistics: Reduce the Risk of ID Theft: IdentityForce®. (2019, September 17). Retrieved from https://www.identityforce.com/blog/identity-theft-odds-identity-theft-statistics
(7) Seth, P., & Tweak Library Team. (2019, November 26). Prevent yourself from Cyberbullying. Retrieved from https://tweaklibrary.com/prevent-yourself-from-cyberbullying/
(8) Miles, B. (2019, October 7). Learn More About This Malware That Could Track Your Online Movement. Retrieved from https://www.lifewire.com/what-is-spyware-4771730
(9) Montaldo, C. (2019, September 25). 10 Ways Identity Thieves Can Get Your Information. Retrieved from https://www.thoughtco.com/ways-identity-thieves-get-your-information-972208