Verified Document

Ethics And Addiction It Is Term Paper

According to the policy, computers within the universities can only be used for academic purposes only. The policy has highlighted that computers in an academic environment should not be used for online sharing, downloading, social networking and gaming (Nykodym, Ariss, & Kurtz, 2008, p. 7). But in the campuses and academic institutions, it is seen that the students usually sit in for social networking and gaming. Thereby, from here it can be seen that either the students don't want to follow the policies or they don't want to understand the restrictions placed in the policies. The authors have highlighted that gaming has an addictive potential based on the fact that there are strong cognitive components involved that include a strong expectation of a positive outcome. Other than gaming, gambling is a behavior that leads to certain compulsive behaviors and addiction (Roberts, 2010, p. 54).

Conclusion

Occurrence of computer addition cannot be denied even though there is no diagnosis available. Based on this addiction there are many organizations facing ethical dilemmas. Data breach is an important threat faced by...

Ethical dilemmas are faced by the addicted individuals as they are not aware of the consequences faced by their activities by their victims as they are not in touch with their victims.
References

Nykodym, N., Ariss, S., & Kurtz, K. (2008). Computer Addiction and Cyber Crime. Journal of Leadership, Accountability and Ethics .

Poulsen, K. (2011). Kingpin: how one hacker took over the billion-dollar cybercrime underground. Crown Publishing Group.

Roberts, K. (2010). Cyber Junkie: Escape the Gaming and Internet Trap. Hazelden Publishing.

Ross, A.J. (2008). How to Hug a Porcupine: Negotiating the Prickly Points of the Tween Years. McGraw-Hill Professional.

Shelly, B.G., and Vermaat, E.M. (2009). Discovering Computers 2010: Living in a Digital World, Fundamentals, Shelly Cashman Series. Edition 6. Cengage Learning.

Young, S.K., and de Abreu, N.C. (2010). Internet Addiction: A Handbook and Guide to Evaluation and Treatment. John Wiley and Sons.

Sources used in this document:
References

Nykodym, N., Ariss, S., & Kurtz, K. (2008). Computer Addiction and Cyber Crime. Journal of Leadership, Accountability and Ethics .

Poulsen, K. (2011). Kingpin: how one hacker took over the billion-dollar cybercrime underground. Crown Publishing Group.

Roberts, K. (2010). Cyber Junkie: Escape the Gaming and Internet Trap. Hazelden Publishing.

Ross, A.J. (2008). How to Hug a Porcupine: Negotiating the Prickly Points of the Tween Years. McGraw-Hill Professional.
Cite this Document:
Copy Bibliography Citation

Related Documents

Ethics and Management and Ethics
Words: 17336 Length: 55 Document Type: Research Proposal

Therefore, corporations have had to change their viewpoints and start looking at the long-term consequences of their behavior, as well as looking at the bottom line. Businesses also have to be concerned because consumers have also become aware of environmental concerns, and many consumers are demanding earth-friendly products and have shown a willingness to pay more money to competitors who observe environmentally-friendly practices. Interestingly enough, this demand has given rise

Addiction in Buddhism, Addiction Is
Words: 1109 Length: 4 Document Type: Term Paper

Taoism On the other hand, Taoism teaches that people should not "strive to serve society and honor people of worth." People should be uneducated, not honor others and should be protected from material desires, which means addiction would be acceptable because people should not be affected by others The belief that people should be uneducated is not applicable to American society. To get a good job in America, most people have to

Ethics and Counseling and Ethics
Words: 1830 Length: 6 Document Type: Term Paper

Walker and Clark propose active use of clinical supervision through facilitation, rather than directive approaches and discuss ten cues of seemingly insignificant acts that may lead to problems, such as gift-giving, sale of goods, self-disclosure on the part of the counselor, touching and sex. Interventions are made by risk managers when these cues are detected (1999, p. 1435-1439). Perhaps this is the solution, but problems will still occur, as

Ethics Organ Transplants for All
Words: 2139 Length: 7 Document Type: Research Paper

In theory, such evaluations could be useful, but as is, they are fairly useless. Plus, the validity and necessity of evaluations are up for debate themselves, besides the actual results from the evaluations being up for debate. Thus, the bioethical dilemma in those who abuse their bodies before and after receiving organ transplants lies not necessarily just with the recipients, but also with society, and with the medical field with

Ethics Plastic the Ethics of Plastic Surgery
Words: 1728 Length: 6 Document Type: Essay

Ethics Plastic The Ethics of Plastic Surgery Funding Based on the Reason for Surgery and Other Factors: A Literature-Based Briefing Since the beginnings of recorded history at least, and indeed even earlier from what archaeologists have been able to ascertain, human beings have been obsessed with their own bodies. This is evident in the earliest works of art and in some of the earliest texts, and can also be seen in certain

Ethics and Technology
Words: 1821 Length: 5 Document Type: Term Paper

Ethics and Computing in Computer Science EMPOWERMENT AND RESPONSIBILITY Errors and Hazards and Their Consequences Despite the best of care and talent, computation is subject to uncertainties, which experts call "errors (Landau, 2008)." Some of these errors are man-made and some are produced by the computer itself. The four classes of errors are blunders or bad theory, random errors, approximation or algorithm errors, and round-off errors. Blunders are typographical errors or errors caused

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now