- The use of computer systems to compromise privacy – Protecting privacy in the contemporary society where there is a steady flow of data and information about people and companies like driving and credit records is difficult. Information management disasters involving doctored data, data mix-ups and mistaken identities adversely affect people’s lives.
- Developing systems for criminal purposes – New technology is coupled with new opportunities for criminal activity. For instance, people are doctoring or stealing data, or blackmailing multinational companies with threats to destroy such information to extort money from them. Cellular phones and other mobile devices, EDI (Electronic data interchange), EFT (Electronic funds transfer), ATMs (Automated teller machines) are all becoming increasingly vulnerable to developers who are intent to perpetuating crime. Counterfeiting and forgery has also become easy due to desktop publishing.
- Using pirated software and technology to develop computer systems – Theft of software is costing the computing industry close to $12 billion annually. The users’ perspectives on copying software does not always match with that of the publisher and the laws are inconsistent throughout the world. Most companies and individuals in the computer systems development world are confused on which laws in intellectual property rights apply to their products and that leaves them susceptible to piracy. Most jurisdictions are also not sure on how to enforce intellectual property laws without supressing or killing creativity.
- Using computer systems development to access other computer systems without authorization – Hacking attacks and computer system viruses have cost computer developers and operators a great deal of resources and time.
- Abuse of computing proficiency to mislead other parties for financial or other gains