The technologies of information and communication technologies (ICTs) are invading all aspects of human existence and are posing serious challenges individual and social values that were considered firmly established. It is true that the technologies of computing, Internet and World Wide Web have created global opportunities that were not previously available or for individuals or for organizations. It is also true that they have raised new ethical issues because the changes are affecting human relations, social institutions and basic moral principles (Schultz, 2006). The increasingly widespread use of computers, as happened with other technological advances has created and is creating a myriad of new possibilities. Today's world with information technology so widespread and growing is certainly different from the world of yesterday. Seem to have been a process of feedback between society and technology that has determined the structures which today we face. This is also conditional responses to emerging issues.
Discussion
The privacy and the protection of personal data are among the major challenges in the development of information and Communication technology (ICT) systems and applications, which got faced by different companies. Potential vulnerabilities caused by technical and human Vulnerabilities arise (e.g. aggressive unsolicited commercial e-mails (Spam), malware, phishing), used for organized criminal attacks utilized. The expected spread of sensor networks, the information from capture the everyday life of the individual, is meaningful and effective application the principles of data protection can be pushed to their limits, if not adequate resources be found to ensure their compliance. Many of the procedures that got previously conducted in person at any private or government facility, currently carried out online (Anderson, 2002). It seems that in the not too distant future, most of our interactions labor, economic and social, among other activities, made through electronic technology.
Although this alternative has a lot of functionality, acceptance and other favorable characteristics, the question arises: is there an ethical awareness of the proper use of the new tool? What is at stake is the security and user confidence. Computer ethics is dynamic and complex, considering facts, policies and values that are constantly changing, as the same information technology (IT). Computer ethics has its roots in the studies of Professor Norbert Wiener, Massachusetts Institute of Technology (MIT) during the Second World War. Wiener emphasized that the integration of computer technology will eventually constitute regeneration of society in general, “a second industrial revolution” with radical changes. In the 1970s, Walter Manner began to define the term computer ethics, referring to the study of ethical problems created, processed or compounded by computing technologies (Reynolds, 2009). However, Bynum offered more complete computer ethics, the report them as social impact analysis of IT and its corresponding formulation and justification of policies for ethical use.
Consequently, respective authors showed that consolidated the field of study, as James Moor of Dartmouth College in the U.S., who said the computer technology revolution would occur in two phases: the first and technology introduction, the development and definition of ...