Spyware is the software that secretly gathers user’s info through its Internet connection without his consent usually using for marketing purposes. However; the definition is so broad that it may cover the software that might be beneficial or has been poorly written to affect the user’ system permanently
Spyware – Is It Covert Or Ethical Software
Spyware is a malware that sneakily records, and distributes user’s data without the consent of user. It comes to us maliciously, however; it is subtle and hard to detect. It is regarded as the largest threat to the Internet users, yet most of us don’t know that spyware is present on our personal computers. Ethical or not, associated concerns calls for the response. A balance is yet to found between legitimate interests of spyware installers who have already obtained consent of the users, and to those who are unwitting targets.
Presently there is no understanding or awareness of the existence of the spyware, it effects and its remedies to defend against it. This of course makes it a grey area. (“Haag/Cummings”, 2009)
The increasing prevalence of the spyware is not unlike the intended used of cookies, a web tracking and info gathering technique for obtaining personal information from the users, often without their consent. While info concerning users preferences and characteristics gathered via cookies may be used beneficially to improve the product and service offerings to the consumers. The point is spyware just does its job, but the user may or may not be either authorized or ethical to perform the tasks. The superstitious nature of its acquisition, coupled with no indication of its good use can raise an ethical issue regarding its acceptability, and may turn out to be a privacy invasion case to the user. The consequences of such spyware can be severe resulting into crashing or damaging the system permanently. (“Baker D.”, 2012)
While the make of these software are technically not breaking any law, however; they are making hard to people to understand what they are agreeing to.
References:
1. Baker D. (2012). Spyware. 8 August 2012. Retrieved from web. http://www.yourvirtualresource.com/articles/DB-Spyware.htm
2. Management Information Systems, for the Information Age, Seventh Edition. By Haag/Cummings, McGraw Hill 2008, ISBN : 978-0-07-727664-5