-
Essay / Computer ethics violations in its field
Technological advancements bring many improvements as well as apprehensions. New technologies encourage individuals and businesses to improve their communication, costs and resources. However, the concerns associated with these innovations increase when they address ethical and community aspects. Amazon Echo and all other smart device technologies pose great fears for individual freedoms when they are equipped with microphones capable of listening to and recording every conversation that takes place within the home. In addition to privacy, security, and legal concerns, smart speakers like the Amazon Echo have major ethical implications that can affect individuals and businesses on a large scale. Topics such as cyberbullying, internet shaming, data protection, ransomware and data rights are topics that have a broad impact not only on individuals and businesses, but also on society as a whole. together. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get the original essay. Cyberethics, as we first discussed throughout this course, defines a “group of moral, social and legal issues that can be analyzed within this branch. of applied ethics” (Tavani, 2016). While others have used the term "computer ethics", both refer in the same sense to ethical conduct in the field of computers and information technology (IT). One of the major areas of digital voice assistants is the area that deals with ethics violations related to data protection and ownership, intellectual property theft, bullying and harassment via the web. From a moral point of view, let's discover the influence of these ethical violations: Data Backup Cybersecurity has been questioned since its childhood. As Tavani (2016) also asked: “How secure is personal data stored on our devices or in a storage service space such as the cloud? » The question I speculated is: what would happen if a data breach occurred and your Amazon Echo and all your data on the smart speaker were compromised? Is this data stored in the cloud and who has access to it? Where else is this information stored? Once deleted, is it deleted forever? Barrett (2017) also uncovers this thinking and offers a more detailed analysis on “What Amazon Echo and Google Home do with your voice data”. After all, it's quite disturbing to know that a technological device is listening in on your daily life, isn't it? To start, Barrett (2017) walks us through how Google Home and Alexa don't technically start doing anything with your voice. until they hear their “wake up word”. This is another method of calling the device by its trigger name to turn on the device, which most of these devices know as "Alexa" for Amazon Echo or "OK Google" for Google Home. But in the meantime, the voice is constantly “searching” for its wake-up word. Once the magic word is heard by the device, it starts to turn on, starts recording, and then the data is transmitted to the cloud. The cloud, also known as a large shared space where multiple servers are connected over a global network. to act as one, is a common storage database for various computing purposes. When the cloud is exposed, the operating limits of,.