Introduction
Recent advancement in technology has fostered the establishment of the multimedia network. The network link has promoted both the social and business world to the next level of economic measure Whetzel (2014). Also, businesses have found it easy to conduct transactions across the continental boundaries. In addition, new product advertisement has been simplified to the furthest level. Moreover companies do not have to incur the travelling expense in the effort of marketing. Quick orders are made through the selected sites and links. The technology progress has connected people across the world. Despite the good news and promising progress of the world, several adverse issues have been linked to the technology advancement. The vices connected to the new technology poses a question, whether new ethical issues related to the IT should be overemphasized? The concern of ethical issue prompted the urge for research and resolution to the problem
Technology advancement has been the core aspect towards the economic growth and development. Despite the great contribution ethical issues have become the major concern and thus attracting investigations for the wellbeing. The research focus is also centered to guarantee quality and maximum benefit to the workers. The areas of interest are majorly on the financial and social aspect. On the social side the transmission of information that appears to compromise the moral standards and humanity. This entails the privacy exploitation and property loss. The other financial impediment is hacking. A lot of fear relating to the act of hackers targeting financial institutions has caused attention to every consumer of new technology. As a result of these vices, the meaningful aspect of new technology has been compromised.
On contrary to the original purpose, technology has been used to regenerate the aspect of humanity and social wellbeing cohesion and integration. On top of that technology has led to the emission of harmful radio magnetic emissions that has caused different health-related issues.
Regarding the prevailing situation analysis, research and critical situation for protection analysis are held important. This paper represents the rationale for research on the selected topics.
Why I Select This Topic of Research?
The topic is very integral to everyone regardless of the age, race, level of education and social status. The investigation was done in the quest for addressing the prevailing ethical dilemma. Whether to roll out the ancient way of social and economic engagements? The ultimate purpose of selecting the topic was to bring forth a clear depiction of the adverse cause in the new technology and advocate for lasting solutions. "Whatever appears to be good has its limitations," Abraham Lincoln.
Several issues have been raised for and against the development of new software and continuous upgrading of websites. The relevant question in response to the prevailing reactions is whether hacking attempts should be banned? In different circumstances, hacking may be used to test the effectiveness of a given network and selected software at a given moment. The test is usually done with an objective of making appropriate protection mechanism to cushion the different organization from hackers. The rampant cases and magnitude of the cases of hackers have attracted different legislative measures so as to alleviate the incidences. Evidence shows that about ten financial institutions have lost huge cash through. Of late the provision of law has demanded continuous registration of the cyber specialist so as to ensure that there is close monitoring. Is hacking right or wrong, the response depends on the reason behind it for instance when testing the strength and full encryption of a given network. Should absolute prevention be put in place to ban the hacking attempt?
The basis of hacking is only when an individual is capable of developing new software's and developing an end to end encryption so as to test the network strength or any other network concern, an example case of hacking is the freelancer hackers who are capable of penetrating the websites and system software in order to publish the results and guarantees security. It may sometimes be done by the private developers of websites. The logic of the matter is that hacking is a crime and subject to ethical compromise Glein (2014). It is associated with loss of important data from the affected organization. On top of that, the hacked cites my experience financial losses.
Research evidence shows that most of the people's companies do not allow anyone to tamper with their own sites. The hackers get motivated to do an action that may appear to have a perceived expertise Himma (2018). . Once hacking has been made successful then the hackers can brag when the institutions are tarmacking to reinstate their stable network and sites.
The act of hacking may seemingly appear to be a way of demonstrating prowess or appear to e a guru in the computer knowledge. At the same time, some may do it with malicious intention so as to reach the business enemy scorers. From reasonable man's point of view, hacking is unethical and it is also subject to the ethical dilemma. This is, therefore, a clear implication that whole issue is under scrutiny for everyone who is ready to stand in the gap to guarantee the ethical and wellbeing.
Does the Open Social Networking Compromise the Ethical Issue of Privacy by Permitting Open Transmission of Information?
What benefit does involvement in social media owes to the moral standards cohesion and integration? As much as information technology has facilitated sharing of information online, it has taken away the freedom of privacy. A webcam is one of the ways in which one can use the computer to access the private information. Statistics indicate that many celebrities have been victims of the typical online stalkers. In a different note, the trust in sharing information may be compromised. It may occur when a friend attempts to share personal information. The person may then expose the same to unintended person and thus breach of privacy integrity. A similar ethic concern is when the companies may install software with an aim of using the social software to monitor the social progress of the employees. Another concern may apply when there is CCTV surveillance. Sometimes the persons may need privacy and space without observation. The action may, therefore, translate to a hindrance of privacy.
Conclusion
In conclusion technology, consumers deserve the right to information and property protection. It is also very crucial to get the assurance of privacy and moral safety. Every mechanism of the shield should be applied to guarantee optimum satisfaction without any tendency of compromise. The request for the research is to reassure the public and private consumers the best out of technology.
References
Glein. G, 2014. Industry experts discuss the challenges of hacking, tracking, and attacking in a virtual world.
Himma, K. E. (2018). Ethical Issues Involving Computer Security: Hacking, Hacktivism, and Counterhacking. The handbook of information and computer ethics, 191.
Whetzel, E. P. (2014). Technology and Ethics. Ohio Law. 28, 16.
Cite this page
Paper Example on Technology Advancement. (2022, May 16). Retrieved from https://proessays.net/essays/paper-example-on-technology-advancement
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Essay Sample on Unified Theory of Acceptance and Use of Technology
- Essay Sample on The Impact of an Industry, Technological Advancement or Invention
- Essay Example on Force: The Key to Electric Power Generation
- Paper Example on Solar Power: Cost Reduction for Grid Parity
- Banning Cell Phones While Driving: A Step Towards Improved Road Safety - Research Paper
- Essay Example on Renewable Energy: Growing Demand & System Flexibility
- Essay on Humans Augmented: Rise of Tech to Improve Human Productivity