ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Effects of Computer Addiction, Cyber-crime, and Unethical Behavior

Updated on January 22, 2018

Published: November 17, 2010

Edited: November 20, 2011

Exposing children to technology from the day they are born in this age of technological availability poses risks at later life stages for those children. Parents permit their children access to MP3 players, video games, cell phones, and computers at younger and younger ages. When these children mature, they have already developed their views on the proper uses of technology, whether ethical or not. Some of those views conflict with the accepted standards or codes of ethics incorporated by many organizations. This hub discusses some possible effects on the information assets of organizations from the standpoints of ethics and computer addiction.

Computer Addiction

Computer addiction is a phrase that was unheard of prior to the age of the Personal Computer (PC). Many researchers and practitioners dispute whether computer addiction is in fact an addiction. However, most agree that there are characteristics that individuals who are highly devoted to their computer related activities display that are compulsory in nature.

An Extreme Example

One case detailed by Griffiths (2000), involved an individual who was happily married until a change of jobs forced him to stay at home. His wife worked during the day so he was left on his own during those stretches. He began to spend too much time devoted to Internet Relay Chat (IRC) sites.

“Dave’s wife found out that he was using the Internet to live in a fantasy world—mainly with people in the United States” (p. 216). He became totally devoted and overwhelmed with the activity. Dave eventually lost his wife and job because of this obsessive behavior. Was Dave a computer addict? That is a question that only a psychiatrist could answer but Dave’s obsessive behavior certainly resulted from an increasingly high level of participation in IRC.

Other Compulsive Activities

Individuals who participate in cell phone texting and computer gaming may become highly preoccupied with those activities. Sometimes, to the extent that they exhibit what some would term as withdrawal symptoms when they are placed in situations that do not permit access to those activities. The combined use of MP3 players with PCs and the Internet resulted in an increasing attitude by young adults that some forms of copyright infringement or software piracy are acceptable.

File sharing technology enables users of peer-to-peer networking services to download songs and software from other user’s PCs, thus bypassing normal distribution channels and avoiding payment. Some individuals who would not intentionally commit theft see nothing wrong with these activities.

According to Nykodym, Ariss, and Kurtz (2008), the practice of computer hacking became prevalent in the 1990s and prosecutions for hacking related crimes increased. Convicted hackers were sometimes placed into rehabilitative therapyprograms which led to a public acceptance of computer addiction as a condition, regardless of whether there were any diagnostic procedures or accepted symptoms for the condition. Reed, as cited by Nykodym, et al. (2008), stated that “The Mitnick case introduced and legitimized the notion of clinical computer addiction to the US legal system” (p. 2). Mitnick is probably the most noted and publicized hacker, who went on to write many books and currently acts as a security consultant.

Leading to Unethical Behavior and Cybercrime

What influences lead an individual to perform unethical acts or participate in cybercrime activities? Accepting the lack of consequences to past behavior or the behavior of others is an influencing factor. This may explain why many young adults see no ethical conflict with the downloading activities presented in the previous section. Once performing an activity results in no negative consequences the individual is more likely to participate in that activity again. A study cited by Kshetri (2009) stated that “88% of computer science students at a U.S. university admitted committing an illegal act online” (p. 143).

Past Addictions

Nykodym, et al. (2008) concluded that psychologists concurred, “Past addictions, such as substance abuse or addiction to gambling, can lead to future addictive behaviors. Many computer addicts have a history of addiction” (p. 5). An Individual who spends enough time on the Internet to become a computer addict may be presented with the opportunity to commit cybercrime simply by the nature of high involvement with the Internet.

Without the individual developing the proper coping mechanisms, this opportunity may manifest as participation in criminal activity. This effect may be especially true for individuals experiencing low economic opportunity, especially teenagers. Kshetri (2009) pointed out “Crime rates are linked to economic opportunities…. [L]ow earnings are a factor behind crime, and teenagers have lower earnings and fewer opportunities” (p. 143).

Personal Isolation from Victims

The ease of access to PCs, computer networks, and the Internet may lead to a misunderstanding by users of the ethical implications of such use. As proposed by Kshetri (2009), perpetrators of cybercriminal offenses do not know or often see their victims. This lack of personal contact removes the perpetrator from the victim and strengthens the belief that the individual has committed no ethical offense. “Compared to conventional crimes, people involved in cybercrimes are thus less likely to see their actions’ negative impacts” (p. 144).

Opportunity

Opportunity plays a role in cybercrime. As proposed by Nykodym, et al. (2008), “Evidence shows that some people commit crimes simply because they had the opportunity laid in front of them and took it…. This shows a lack of restraint by these individuals, which can lead to further criminal activity” (p. 4). In other words, some individuals commit cubercrime simply because they can.

Low Moral Values

A final influence on the propensity to unethical behavior may be the current state of moral values. Kshetri (2009) cited a 2004 Gallup Poll, which stated that “the state of moral values is getting worse” (p.144). Since perceived ethical standards are by nature married to moral values, a decline in moral values would lead to a decline in ethical standards and long-perceived unethical behavior would gain legitimacy.

Internet Influences on Crime

Twenty years ago, few individuals had access to the Internet or computers. Today, however, computers and Internet access permeate nearly every household and business. This ease of access influences the ability of criminals to commit crimes. Cybercrime is not necessarily crime committed over the Internet but more broadly includes any crime in which the criminal makes use of a computer. Nykodym, et al. (2008) stated that “all types of criminals, from hackers and spies to sexual predators and murderers, are able to use computers and the Internet to facilitate and ease the processes of their crimes” (p. 4). Nykodym, et al. (2008) further provided the following list of benefits that criminals feel the Internet provides:

· extend the reach of the criminal

· ease the investigation of potential victims

· provide a damper to prevent discovery

· provide anonymity

( p. 4)

The Internet does not provide new types of crime to commit but provides a new avenue to commit the existing types of crime with a far-reaching effect. For instance, swindles and Identity theft existed as types of crime long before the advent of the PC. However, the Internet has provided an avenue to commit those crimes with less effort on a global basis.

Computer Addiction and Data Safeguards

Information glut or the unbridled quest to discover new information may be one of the most detrimental effects to data safeguards that organizations face because of computer addiction. Nykodym et al. (2008) pointed out the dangers of addicted employees bypassing or defeating security controls in the quest to discover new and fulfilling information. “A person can become so engrossed in finding out information and searching Internet databases, that he or she will start to overstep boundaries. This information craving can lead to hacking into company databases and even espionage” (p. 5).

Addicted individuals may lack ethical standards to provide guidance when facing ethical dilemmas. An ethics of care attitude; which according to Stapleton (2008), “emphasizes solidarity, community, and caring about one’s special relationships” (p. 406) would help lead the individual toward making decisions that do not negatively affect the individual’s peers or the organization with which the individual is affiliated.

By the same token, an attitude reflecting “the more dominant ethics of justice and rights, which emphasizes universal standards, professional codes of conduct, moral rules, and impartiality” (p. 406) would help the individual understand the possible harm that bypassing safeguards may inflict. When a computer addict oversteps the security safeguards imposed by an organization to safeguard data, the addict demonstrates a lack of sound ethical judgment and thereby demonstrates to the organization that future trust should be withheld.

Threats to data safeguards also exists from without the organization. A group of convicted hackers “would drive past retailers with a laptop computer, tapping into those with vulnerable wireless Internet signals. The trio would then install ‘sniffer programs’ that picked off credit and debit card numbers as they moved through a retailer's computers” ( Associated Press, 2010).

The lead hacker, who prosecutors classified as a computer addict, demonstrated a lack of ethical values during his trial. He stated, as reported by the Associated Press (2010), that he had little concern for the people whose’ account information he had stolen “I always thought that they were being made whole by their financial institutions." He therefore felt that since a financial institution would cover the losses that he had not violated the rights of the involved individuals.

Behavior Leading to Ethical Problems

Certain forms of compulsive behavior may lead to ethical problems or computer addiction. The author, in the capacity of an IT instructor, witnesses some of this behavior on a daily basis. Students sign an agreement to abide by the institution’s acceptable use policy and regularly disregard the restrictions that the policy contains.

The acceptable use policy states that students may only use the institution’s computers for academic purposes. This instructor reinforces that policy by reminding students that they should not use the computers to play online games, participate in social networking, or access file-sharing sites. This instructor also observes students involved in these activities on a daily basis. The students who participate in these activities either do not understand the policy or do not feel an ethical obligation to comply with them (Personal observation,

Research conducted by Grusser, Thalemann, and Griffiths (2007) found that “gaming has an addictive potential that is also mirrored by addiction-related cognitive components like significantly stronger positive outcome expectancies” (p. 291). Positive outcome experiences are those experiences that add a reward to a particular activity. These positive outcome experiences may lead to expectations in other areas and lead the gamer to more destructive or addictive behavior.

Gambling, more specifically online gambling is another activity that leads to addiction and manifests in other compulsive behaviors. A 2008 study concluded that “the pathological gambler has clear tendencies towards alcoholism, nicotine addiction, or drug addiction” (Beteille, 2008). Many other activities when left unchecked may lead to compulsive behavior and ethical conflicts. These activities include excessive cell-phone texting and social networking.

Have you been the victim of cybercrime?

See results

Conclusion

Computer addiction exists even though practitioners disagree on the ability to diagnose the condition.  This addiction presents organizations with ethical dilemmas regarding the disposition of affected employees.  Some may argue that computer addiction is not an addiction but merely a form of compulsory behavior.  However, the affects of excessive compulsory behavior may be as ethically challenging as an addiction.  Employees affected by these conditions may bypass the safeguards to data and place the organizations at risk.  Compulsory behavior may lead employees to make poor ethical judgments concerning the use of technology and those decisions are a matter of concern to organizations. 

Organizations may help prevent the effects of computer addiction, cybercrime, and compulsory behavior to the organization’s data assets by employing sound HR screening procedures of employment candidates.  Maintaining a management atmosphere that demonstrates awareness to the signs of addiction and offering treatment when appropriate would help alleviate the problem and encourage employee openness.

Some signs of compulsory behavior include excessive participation in cell-phone texting, using company owned computer assets to participate in social networking, and using company owned computer assets to download copyrighted material.  Organizations should explicitly forbid these noted activities in their codes of conduct or ethical standards and take action against employees who knowingly violate those policies or standards.

What are your thoughts?

The author appreciates all comments.

Have you ever used an service that violates intellectual property rights?

See results

References

Associated Press. (2010). Hacker Gets Harshest Cybercrime Sentence Ever. Available from http://www.foxnews.com/scitech/2010/03/26/hacker-gets-harshest-cybercrime-sentence-passed/

Griffiths, M. (2000). Does Internet and computer "addiction" exist? Some case study evidence. CyberPsychology & Behavior , 3 (2), 211-218. doi:10.1089/109493100316067

Grusser, S., Thalemann, R., & Griffiths, M. (2007). Excessive computer game playing: Evidence for addiction and aggression? CyberPsychology & Behavior , 10 (2), 290-292. doi:10.1089/cpb.2006.9956

Kshetri, N. (2009). Positive Externality, Increasing Returns, and the Rise in Cybercrimes. Communications of the ACM , 141-144.

Nykodym, N., Ariss, S., & Kurtz, K. (2008). Computer addiction and cyber crime. Journal of Leadership, Accountability and Ethics , 78-85.

Stapleton, S. (2008). Ethical decision making in technology development: a case study of participation in a large-scale information systems development project. AI & Soc , 22, 405-429. DOI 10.1007/s00146-007-0150-1


working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)