Topic > Violations of Computer Ethics in the IT Sphere

Technological progress brings numerous improvements and concerns. New technology encourages individuals and companies to improve communication, costs and resources. However, the concerns associated with these innovations are amplified when they concern ethical and community aspects. Amazon Echo and all other smart device technologies put a great fear on individual freedoms when they are equipped with microphones that can listen and record all conversations that take place inside your home. Aside from privacy, security, and legal concerns, smart speakers like the Amazon Echo have important ethical consequences that can affect individuals and businesses on a large scale. Issues such as cyberbullying, internet-shaming, data custody, ransomware and data rights are topics that have a broad impact not only on people and businesses, but on society as a whole. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay Cyberethics, as we first covered in this course, defines a “set of moral, social and legal issues that can be analyzed within that branch” of applied ethics” (Tavani, 2016) . While others have used the term “computer ethics,” both refer to the same meaning of ethical conduct in the realm of computers and information technology (IT). An important focus within digital voice assistants is the area that addresses violations of ethics from data protection and ownership, to intellectual property theft, to bullying and web harassment. From a moral point of view, we discover the influence of these ethical violations: Safeguarding data Cyber ​​security has been questioned since its inception. As Tavani (2016) also asked: “How secure is personal data stored on our devices or in a storage service space such as the cloud?” The question I hypothesized is: what would happen if a data breach occurred and your Amazon Echo and all your data on the smart speaker were compromised? Is this data stored in the cloud and who can access it? Where else is this information stored? Once deleted, is it deleted forever? Barrett (2017) also uncovers this thinking and provides a more detailed analysis on “What Amazon Echo and Google Home do with your voice data.” After all, it's pretty creepy to know that a technological device is listening to your daily life, don't you agree? For starters, Barrett (2017) introduces us to how Google Home and Alexa technically don't start doing anything with your voice until they hear their “wake word.” This is another method of calling the device by its trigger name to turn on the device, which most of these devices know as "Alexa" for Amazon Echo or "OK ​​Google" for Google Home. But until then, the voice is constantly “searching” for its wake word. Once the device hears the magic word, the device starts turning on, starts recording and then the data goes to the cloud. The cloud, also known as a large shared space where multiple servers are connected over a global network to act as one, is a common storage database for various computing purposes. When the cloud is exposed, the limits of data exploitation are unlimited. This brings me to the discussion of Internet ethics in managing data security. From an ethical perspective, when a data security breach occurs within an individual's home, it can be quite traumatizing. If the data is compromised,.