Preview

Eassay : Information Technology Boon or Bane ?

Good Essays
Open Document
Open Document
493 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Eassay : Information Technology Boon or Bane ?
Until recent times, the role of technology and technological developments has been regarded as entirely beneficial to the society. However, in the past few years, a number of voices have questioned this benevolent view of the effects of technology upon society. We are wedged in a society that compels and encourages us to get the newest and best possible technology as we can. The problem is that for most of us having the newest and best is more than we will ever need.

The maximum exploitation of technology exits at workplace where personal computers, network systems, Internet access, e-mail and telephones are easily accessible for employee’s use. Employers’ greatest risk to their computer security comes not from outside hackers but from current and former employees who intentionally or inadvertently disclose confidential or sensitive information. Employees no longer have to photocopy documents behind closed doors; they can simply download package of data to disk, CD or DVD, or even e-mail the information to a competitor with the click of a mouse.

Another form of technical exploitation or defamation is employer harassing female employees’ by sending obnoxious and sexually assaulting emails. Technology may also be used to commit a wide spectrum of other offenses, including embezzlement, defrauding the company and customers, and corruption of company records.

The easiest way for a modern office worker to destroy the company is through its information resources. It only takes one disgruntled or irritated employee, or former employee with enough information technology expertise, to create serious disruption, which could result in significant economic loss. There are numerous ways in which insiders or former insiders can attack company computers:

hacking (gaining access to a computer or network without authorisation); cracking (gaining access for the purpose of committing crime once inside); sabotage (gaining access for the purpose of doing damage); and

You May Also Find These Documents Helpful

  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Behaviors such as transferring files from a work device to a home computer that is not protected or maintained to IT’s standards, using personal communications that are not as safe as corporate communications, talking about sensitive company matters where others can hear the conversation, and failing to use a laptop privacy guard when working remotely in a public place all invite information theft. Employees also fail to safeguard equipment such as laptop computers and portable storage devices, which can be lost or stolen (Cisco Systems, 2008, p 5).…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    The nature of telework and remote access technologies – permitting access to protected resources from external networks and often external hosts as well, generally places them at higher risk than similar technologies only accessed from inside the organization, as well as increasing the risk to the internal…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Spamming coworkers Accessing prohibited websites Purposely circumventing security policies Sending files with sensitive data outside the organization.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    With technological advances and the rising popularity of the flexible work environment labeled Results-Only Work Environment (ROWE), the ability to work anywhere and everywhere poses the issue that sensitive company data could be compromised in a telecommuter environment. With an employee’s remote access to company documents, email, systems and proprietary information, there is an elevated risk of equipment theft and security breach.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    When an organization uses and relies on computer systems and information technology to assist in running their company(s) and also uses these resources to store important, personal information about clients, customers, employees, and the organization itself, it is important to have the adequate security protection in place to prevent this information from being compromised. The following summary will discuss how IBM prevents security breaches by using technology to reduce the rampant crime committed against them.…

    • 555 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    High technology gives criminals the opportunity to obtain valuable information. They are considered a cyber-threat. Criminals usually get illegitimate or legitimate work-related access to a company’s computer resources to sell wanted information.…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Imagine the impact technological innovations have had on society? How much did technology influence society a decade ago, and how much does it influence society now? Technology was created from humans to become a more efficient specie. Although technology has advanced society with respect to technology and efficiency, it has also created problems not previously seen because of the use of technology. Edward Tenner, a writer and technology consultant, wrote an article titled “Another Look Back, and a Look Ahead” published in 1996. In his article Tenner argues, through the use of the rhetorical appeal ethos, compare and contrast, and cause and effect, that society is advancing at an alarming rate and suggests a “retreating from intensity” (Tenner 78) in order to allow society to slow its progression and accustom itself to new technology.…

    • 1047 Words
    • 5 Pages
    Good Essays
  • Good Essays

    With technology advancing at a rapid pace a great deal of us are more so thinking of the benefits rather than the detriments of technological advancements. Many people have stopped and questioned “Is this ethical?” and this has raised many conflicts amongst different variations of people. Technology essentially plays a weighty role in today's society that comes with both its benefits and detriments.…

    • 665 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Syllabus

    • 1217 Words
    • 5 Pages

    In recent history, there has been an influx in controversy regarding e-mail, Internet usage, and overall privacy policies in the workplace. Because of the extensive increase of personal e-mail, smartphones, social media, and other Internet-based communications, the need for laws that govern privacy for the users of these communications is crucial. These policies are usually implemented to ensure security and to reduce liability. This report will show examples of privacy issues, laws, and experiences in the workplace.…

    • 1217 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Computer Misuse Act

    • 277 Words
    • 2 Pages

    An employee uses a company computer to send personal emails or someone gaining access to a banking computer and performing an unauthorized transfers.…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Over the past 30 years, humans always tried to create something that helps us reduce the amount of work we have to do. Games were created to help human release our stress while mobile phones help us to call and access the internet anywhere we want. Technologies really help us in every task of our life. However, technological advances are bad for our society because of addiction, censorship, and they may lead us into another technological weapons war between countries around the world.…

    • 1488 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Internet and the Workplace

    • 1937 Words
    • 8 Pages

    However, in addition to using the Internet, especially the World Wide Web and e-mail for work-related purposes, employees are also using the Internet for personal use, whether for sending personal e-mail messages, playing games, downloading pornography, ordering goods online, checking stock prices, or gambling. Accordingly, many issues have come to light involving employee e-mail and Internet use. Employers have to question how much, if any, personal use of the Internet and e-mail to permit in the workplace. Employers are also grappling with the question of whether to monitor Internet use and whether to block access to certain…

    • 1937 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Cyber Law Contd

    • 2531 Words
    • 11 Pages

    The word "hacking" has two definitions. The first definition refers to the hobby/profession of working with computers. The second definition refers to breaking into computer systems. While the first definition is older and is still used by many computer enthusiasts (who refer to cyber-criminals as "crackers"), the second definition is much more commonly used.…

    • 2531 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    In this topic we will be discussing six computer crimes and how they are committed. We will also look at laws that protect users against these specific crimes. At the end, we will look at ways in which users and corporations can protect themselves against computer crimes physically, using software, electronically and what controls management can implement to safeguard company IS infrastructure. At the end, we will explain ways in which individuals as well as company management can safeguard against computer crime.…

    • 5098 Words
    • 21 Pages
    Powerful Essays