You are on page 1of 68

General and Applied

Ethics
2.3.ETHICS IN INFORMATION
TECHNOLOGY
ETHICS IN INFORMATION TECHNOLOGY

“The most dangerous criminal


may be the man gifted with
reason, but with no
morals/Standard for good or
bad.” —Martin Luther King, Jr.
2.3. ETHICS IN INFORMATION TECHNOLOGY

The growth of the Internet, the ability to capture and store


vast amounts of personal data, and greater reliance on
information systems in all aspects of life have increased the
risk that information technology will be used unethically.
In the midst of the many IT break- throughs in recent years,
the importance of ethics and human values has been
underemphasized—with a range of consequences.
Here are some examples that raise public concern about the
ethical use of information technology:
 Many employees have their email and Internet access
monitored while at work, as employers struggle to balance
their need to manage important company assets and work
time with employees’ desire for privacy and self- direction.
2.3. ETHICS IN INFORMATION TECHNOLOGY

 Millionsof people have downloaded music and


movies at no charge and in apparent violation of
copyright laws at tremendous expense to the
owners of those copyrights.
 Organizationscontact millions of people
worldwide through unsolicited email (spam) as an
extremely low-cost marketing approach.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
 Hackers break into databases of financial and retail
institutions to steal customer information, then use
it to commit identity theft—opening new accounts
and charging purchases to unsuspecting victims.
 Studentsaround the world have been caught
downloading material from the Web and plagiarizing
content for their term papers.
 Web sites plant cookies or spyware on visitors’ hard
drives to track their online purchases and activities.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
2.3. ETHICS IN INFORMATION
TECHNOLOGY
I. ETHICS and/for IT WORKERS
AND IT USERS
II. ETHICS and SOCIAL
NETWORKING
III. ETHICS and INTELLECTUAL
PROPERTY
IV. ETHICS and Freedom of
Expression
2.3. ETHICS IN INFORMATION
TECHNOLOGY

I. ETHICS FOR IT
WORKERS AND IT
USERS
2.3. ETHICS IN INFORMATION TECHNOLOGY:

I. ETHICS FOR IT WORKERS AND IT USERS


 IT PROFESSIONALS
A profession is a calling that requires specialized knowledge
and often long and intensive academic preparation.
To be a professional:
“(i) Requiring knowledge of an advanced type in a field of
science or learning customarily acquired by a prolonged
course of specialized intellectual instruction and study in an
institution of higher learning or a hospital (as distinguished
from knowledge acquired by a general academic education,
or from an apprenticeship, or from training in the
performance of routine mental, manual, mechanical, or
physical activities)
2.3. ETHICS IN INFORMATION TECHNOLOGY

I. ETHICS FOR IT WORKERS AND IT USERS


(ii) Requiring the consistent exercise of
discretion(vigilance) and judgment in its performance
which is predominantly intellectual and varied in
character (as distinguished from routine mental, manual,
mechanical, or physical work).
In other words, professionals such as doctors, lawyers,
and accountants require advanced training and
experience.
They must exercise discretion and judgment in the
course of their work; and their work cannot be
standardized.
2.3. ETHICS IN INFORMATION TECHNOLOGY
I. ETHICS FOR IT WORKERS AND IT USERS
Many people would also expect professionals to contribute to
society, to participate in a lifelong training program (both
formal and informal), to keep abreast of developments in
their field, and to assist other professionals in their
development.
In addition, many professional roles carry special rights and
responsibilities.
Doctors, for example, prescribe drugs, perform surgery, and
request confidential patient information while maintaining
doctor–patient confidentiality.
2.3. ETHICS IN INFORMATION TECHNOLOGY

I. ETHICS FOR IT WORKERS AND IT USERS

 Professional Relationships That Must Be


Managed
 IT workers typically become involved in many
different relationships, including those with
employers, clients, suppliers, other professionals,
IT users, and society at large.
 In each relationship, an ethical IT worker acts
honestly and appropriately.
These various relationships are discussed in the
following sections.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
I. ETHICS FOR IT WORKERS AND IT USERS
 Relationships Between IT Workers and Employers
As the stewards of an organization’s IT resources, IT workers
must set an example and enforce policies regarding the ethical
use of IT. IT workers often have the skills and knowledge to
abuse systems and data or to enable others to do so.
Software piracy is an area in which IT workers may be tempted to
violate laws and policies. Although end users often get the blame
when it comes to using illegal copies of commercial software,
software piracy in a corporate setting is sometimes directly
traceable to IT staff members—either they allow it to happen or
they actively engage in it, often to reduce IT-related spending.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
2.3. ETHICS IN INFORMATION
TECHNOLOGY
I. ETHICS FOR IT WORKERS AND IT USERS
 Relationships Between IT Workers and Clients
One potential ethical problem that can interfere with the relationship between
IT workers and their clients involves IT consultants or auditors who recommend
their own products and services or those of an affiliated vendor to remedy a
problem they have detected. Such a situation has the potential to undermine
the objectivity of an IT worker due to a conflict of interest—a conflict between
the IT worker’s (or the IT firm’s) self- interest and the interests of the client.
 Relationships Between IT Workers and Suppliers
IT workers can develop good relationships with suppliers by dealing fairly with
them and not making unreasonable demands. Threatening to replace a supplier
who can’t deliver needed equipment tomorrow, when the normal industry lead
time is one week, is aggressive behavior that does not help build a good
working relationship.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
I. ETHICS FOR IT WORKERS AND IT USERS
Suppliers strive to maintain positive relationships with their
customers in order to make and increase sales.
To achieve this goal, they may sometimes engage in unethical
actions—for example, offering an IT worker a gift that is actually
intended as a bribe (act of providing money, property, or favors to
someone in business or government in order to obtain a business
advantage).
Clearly, IT workers should not accept a bribe from a vendor, and
they must be careful when considering what constitutes a bribe. For
example, accepting invitations to expensive dinners or payment of
entry fees for a golf tournament may seem innocent to the
recipient, but it may be perceived as bribery by an auditor.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
I. ETHICS FOR IT WORKERS AND IT USERS
 Relationships Between IT Workers and Other Professionals
Professionals often feel a degree of loyalty to the other members of
their profession. As a result, they are often quick to help each other
obtain new positions but slow to criticize each other in public.
Professionals also have an interest in their profession as a whole,
because how it is perceived affects how individual members are
viewed and treated. (For example, politicians are not generally
thought to be very trustworthy, but teachers are.)
Hence, professionals owe each other an adherence to the
profession’s code of conduct. Experienced professionals can also
serve as mentors and help develop new members of the profession.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
I. ETHICS FOR IT WORKERS AND IT USERS
A number of ethical problems can arise among members
of the IT profession.
 One of the most common is résumé inflation, which
involves lying on a résumé by, for example, claiming
competence in an IT skill that is in high demand.
Even though an IT worker might benefit in the short
term from exaggerating his or her qualifications, such
an action can hurt the profession and the individual in
the long run. Many employers consider lying on a
résumé as grounds for immediate dismissal.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
I. ETHICS FOR IT WORKERS AND IT USERS
 Another ethical issue that can arise in relationships between
IT workers and other professionals is the inappropriate
sharing of corporate information.
Because of their roles, IT workers may have access to
corporate databases of private and confidential information
about employees, customers, suppliers, new product plans,
promotions, budgets, and so on.

It might be sold to other organizations or shared informally


during work conversations with others who have no need to
know.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
I. ETHICS FOR IT WORKERS AND IT USERS
 Relationships Between IT Workers and Society
Regulatory laws establish safety standards for products and
services to protect the public. However, these laws are less
than perfect, and they cannot safeguard against all negative
side effects of a product or process. Often, professionals can
clearly see the effect their work will have and can take
action to eliminate potential public risks. Thus, society
expects members of a profession to provide significant
benefits and to not cause harm through their actions. One
approach to meeting this expectation is to establish and
maintain professional standards that protect the public.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
I. ETHICS FOR IT WORKERS AND IT USERS
Common Ethical Issues for IT Users
This section discusses a few common ethical issues for IT users.
Additional ethical issues will be discussed in future chapters.
 Software Piracy
Sometimes IT users are the ones who commit software
piracy(Unauthorized use) . A common violation occurs when
employees copy software from their work computers for use at home.
When confronted, the IT user’s argument might be: “I bought a home
computer partly so I could take work home and be more productive;
therefore, I need the same software on my home computer as I have
at work.” However, if no one has paid for an additional license to use
the software on the home computer, this is still piracy.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
I. ETHICS FOR IT WORKERS AND IT USERS
The increasing popularity of the Android smartphone operating system has created a
serious software piracy problem. Some IT end users have figured out how to download
applications from the Android Market Web site without paying for them, and then use
the software or sell it to others.
 Inappropriate Use of Computing Resources
Some employees use their computers to surf popular Web sites that have nothing to do
with their jobs, participate in chat rooms, view pornographic sites, and play computer
games.
o These activities eat away at/gradually damage or distroy worker productivity and
waste time.
o Furthermore, activities such as viewing sexually explicit material, sharing lewd jokes,
and sending hate email could lead to lawsuits and allegations that a company
allowed a work environment conducive to racial or sexual harassment. A survey by
the Fawcett Society found that one in five men admit to viewing porn at work, while
a separate study found that 30 percent of mobile workers are viewing porn on their
2.3. ETHICS IN INFORMATION
TECHNOLOGY
I. ETHICS FOR IT WORKERS AND IT USERS
 Inappropriate Sharing of Information
Every organization stores vast amounts of information that can
be classified as either private or confidential. Private data
describes individual employees—for example, their salary
information, attendance data, health records, and performance
ratings. Private data also includes information about customers
—credit card information, telephone number, home address,
and so on. Confidential information describes a company and its
operations, including sales and promotion plans, staffing
projections, manufacturing processes, product formulas,
tactical and strategic plans, and research and development.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
I. ETHICS FOR IT WORKERS AND IT USERS
An IT user who shares this information with an
unauthorized party, even inadvertently, has violated
someone’s privacy or created the potential that
company information could fall into the hands of
competitors.
For example, if an employee accessed a coworker’s
payroll records via a human resources computer
system and then discussed them with a friend, it
would be a clear violation of the coworker’s privacy.
2.3. ETHICS IN INFORMATION TECHNOLOGY

II. SOCIAL
NETWORKING
2.3. ETHICS IN INFORMATION TECHNOLOGY
II. SOCIAL NETWORKING
Definition: A social networking Web
site creates an online community of
Internet users that enables members
to break down the barriers of time,
distance, and cultural differences.
Social networking Web sites allow
people to interact with others online
by sharing opinions, insights,
information, interests, and
experiences.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
Members of an online social network may use the site
to interact with friends, family members, and
colleagues—people they already know—but they may
also make use of the site to develop new personal
and professional relationships.
By some estimates, people spend about 20 percent of
their time on PCs and 30 percent of their time on
mobile devices accessing social networks. Averaged
across all ages, U.S. males spend over 6 hours per
month and females over 8 hours per month on social
net- working sites.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
II. SOCIAL NETWORKING
 BUSINESS APPLICATIONS OF ONLINE SOCIAL NETWORKING
Although social networking Web sites are primarily used for nonbusiness
purposes, a number of forward-thinking organizations are employing this
technology to advertise, assess job candidates, and sell products and services.
An increasing number of business- oriented social networking sites are designed
to encourage and support relationships with consumers, clients, potential
employees, suppliers, and business partners around the world,
SOCIAL NETWORKING ETHICAL ISSUES
When you have a community of tens of millions of users, not everyone is going
to be a good “neighbor” and abide by the rules of the community. Many will
stretch or exceed the bounds of generally accepted behavior. Some common
ethical issues that arise for members of social networking Web sites are
cyberbullying, cyberstalking, encounters with sexual predators, and the
uploading of inappropriate material.
2.3. ETHICS IN INFORMATION TECHNOLOGY
II. SOCIAL NETWORKING

 Cyberbullying
Cyberbullying is the harassment,
torment, humiliation, or
threatening of one minor by
another minor or group of minors
via the Internet or cell phone.
Based on a formal survey of
15,000 middle and high school
children, it is estimated that as
many as 25 percent of teenagers
have experienced cyberbullying
in their lifetime:
2.3. ETHICS IN INFORMATION TECHNOLOGY

There are numerous forms of cyberbullying, including the


following:
 Sending mean-spirited or threatening messages to the victim.
 Sending thousands of text messages to the victim’s cell phone
and running up a huge cell phone bill.
 Impersonating the victim and sending inappropriate messages
to others.
 Stealing the victim’s password and modifying his or her
profile to include racist, homophobic, sexual, or other
inappropriate data that offends others or attracts the
attention of undesirable people.
2.3. ETHICS IN INFORMATION TECHNOLOGY

II. SOCIAL NETWORKING


 Posting mean, personal, or false information
about the victim in the cyber-bully’s blog or on a
social networking page.
 Creatinga Web site or social networking profile
whose purpose is to humiliate or threaten the
victim.
 Taking inappropriate photos of the victim and
either posting them online or sending them to
others via cell phone.
2.3. ETHICS IN INFORMATION TECHNOLOGY

 Setting up an Internet poll to elicit responses to


embarrassing questions, such as “Who’s the
biggest geek in Miss Adams’s homeroom?” and
“Who is the biggest loser in the senior class?”
 Sending inappropriate messages while playing
interactive games that enable participants to
communicate with one another .
2.3. ETHICS IN INFORMATION TECHNOLOGY

II. SOCIAL NETWORKING


 Cyberstalking
Cyberstalking is threatening behavior or unwanted advances directed at an
adult using the Internet or other forms of online and electronic
communications; it is the adult version of cyberbullying. Online stalking can
be a serious problem for victims, terrifying them and causing mental anguish.
Ex: In April 2013, a man was charged in federal court with cyberstalking 15
women in three different cities for several months. He told the women he
had nude photos of them and that he would send them to their family and
friends unless they sent him more naked photos of themselves.
 Encounters with Sexual Predators
 Some social networking Web sites have been criticized for not doing
enough to protect minors from encounters with sexual predators.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
2.3. ETHICS IN INFORMATION TECHNOLOGY

II. SOCIAL NETWORKING


 Uploading of Inappropriate Material
Most social networking Web sites have policies against
uploading videos depicting violence or obscenity. Facebook,
MySpace, and most other social networking Web sites have
terms of use agreements, a privacy policy, or a content code
of conduct that summarizes key legal aspects regarding use
of the Web site. Typically, the terms state that the Web site
has the right to delete material and terminate user accounts
that violate the site’s policies. The policies set specific limits
on content that is sexually explicit, defamatory, hateful, or
violent, or that promotes illegal activity.
2.3. ETHICS IN INFORMATION TECHNOLOGY

III. INTELLECTUAL
PROPERTY
2.3. ETHICS IN INFORMATION
TECHNOLOGY
III. INTELLECTUAL PROPERTY
Intellectual property is a term used
to describe works of the mind—such
as art, books, films, formulas,
inventions, music, and processes—
that are distinct and owned or
created by a single person or
group.
Intellectual property is protected
through
 Copyright,
 Patent,
 Trade secret laws.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
a. Trademarks
A trademark is a word, phrase, symbol, and/or design
that identifies and distinguishes the source of the goods
of one party from those of others. A service mark is a
word, phrase, symbol, and/or design that identifies and
distinguishes the source of a service rather than goods.
Examples include brand names, slogans, and logos. (The
term “trademark” is often used in a general sense to
refer to both trademarks and service marks.)
Some registered trademarks you may recognize
include: FORD LOGO for "automobiles." DOMINO'S LOGO
for "hot pizza pies." TARGET LOGO for "retail
department store services.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
A difference between a
trademark and a brand
A brand is a name given to a
product by its owner or
manufacturer. It is a name that
refers to a company’s products and
services and inspires favorable
images and feelings in the
customer
A trademark is any term, name,
sign, image, or any mixture of
these, used in business to identify
and differentiate one company’s
goods from those produced by
another, as well as to signify the
origin of the products. 
2.3. ETHICS IN INFORMATION TECHNOLOGY

b. Patent
2.3. ETHICS IN INFORMATION
TECHNOLOGY

The primary goal of the patent law is to


encourage innovation and commercialization
of technological advances. As a result, similar
to copyright law, patent law incentivizes
inventors to publicly disclose their inventions
in exchange for certain exclusive rights.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
c. A trade secret
It is information that has either actual or
potential independent economic value by
virtue of not being generally known, has
value to others who cannot legitimately
obtain the information, and is subject to
reasonable efforts to maintain its secrecy.
Ex: Probably the most famous example of
a product protected by trade secrets is
the Coca Cola drink. Its “formula” is not
protected by any patent - even if it had
been, the patent would have expired long
ago.
Coca-Cola's recipe for their signature
drink
2.3. ETHICS IN INFORMATION
TECHNOLOGY

Copyright law protects authored works, such


as art, books, film, and music; patent law
protects inventions; and trade secret law
helps safeguard information that is critical to
an organization’s success.
Together, copyright, patent, and trade secret
legislation form a complex body of law that
addresses the ownership of intellectual
property.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
Such laws can also present potential ethical
problems for IT companies and users—for example,
some innovators believe that copyrights, patents,
and trade secrets stifle creativity by making it
harder to build on the ideas of others. Meanwhile,
the owners of intellectual property want to control
and receive compensation for the use of their
intellectual property. Should the need for ongoing
innovation or the rights of property owners govern
how intellectual property is used?
2.3. ETHICS IN INFORMATION TECHNOLOGY
KEY INTELLECTUAL PROPERTY ISSUES
This section discusses several issues that apply to
intellectual property and information technology,
including plagiarism, reverse engineering, open
source code, competitive intelligence, trademark
infringement, and cybersquatting.
 Plagiarism
Plagiarism is the act of stealing someone’s ideas or
words and passing them off as one’s own. The
explosion of electronic content and the growth of
the Web have made it easy to cut and paste
paragraphs into term papers and other documents
without proper citation or quotation marks.
2.3. ETHICS IN INFORMATION TECHNOLOGY
2.3. ETHICS IN INFORMATION
TECHNOLOGY
2.3. ETHICS IN INFORMATION TECHNOLOGY
2.3. ETHICS IN INFORMATION TECHNOLOGY
 Cybersquatting
The term cybersquatting refers to the unauthorized registration and use of
Internet domain names that are identical or similar to trademarks, service
marks, company names, or personal names.
Trademark(a name or symbol on a product that shows it was made by a 
particular company, and that it cannot be used by other companies without 
permission)
Example: A cybersquatter could buy Heinz.com if the company hadn't created
a website yet, looking to sell the domain to Heinz at a later date for profit, or
use the domain name to attract traffic and generate money through advertising.
2.3. ETHICS IN INFORMATION TECHNOLOGY
2.3. ETHICS IN INFORMATION TECHNOLOGY

IV. Freedom of
Expression
2.3. ETHICS IN INFORMATION TECHNOLOGY

Freedom of Speech

“It is easy to believe in freedom of


speech for those with whom we
agree.”Leo McKern, Australian actor
2.3. ETHICS IN INFORMATION TECHNOLOGY

IV. Freedom of Expression


Information technology has
provided amazing new ways
for people to communicate
with others around the
world, but with these new
methods come new
responsibilities and new
ethical dilemmas.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
 Anonymity on the Internet
Anonymous expression is the expression
of opinions by people who do not reveal
their identity. The freedom to express
an opinion without fear of reprisal is an
important right of a democratic society.
Anonymity is even more important in
countries that don’t allow free speech.
However, in the wrong hands,
anonymous communication can be used
as a tool to commit illegal or unethical
activities
2.3. ETHICS IN INFORMATION TECHNOLOGY

IV. Freedom of Expression


 Hate Speech
In the United States, speech
that is merely annoying,
critical, demeaning, or
offensive enjoys protection
under the First
Amendment. Legal recourse
is possible only when hate
speech turns into clear
threats and intimidation
against specific citizens.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
Persistent or malicious harassment aimed
at a specific person is hate speech, which
can be prosecuted under the law, but
general, broad statements expressing
hatred of an ethnic, racial, or religious
group cannot.
A threatening private message sent over
the Internet to a person, a public message
displayed on a Web site describing intent
to commit acts of hate-motivated
violence against specific individuals, and
libel directed at a particular person are
all actions that can be prosecuted.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
IV. Freedom of Expression
 Pornography
Many people, including some free-speech advocates, believe
that there is nothing illegal or wrong about purchasing adult
pornographic material made by and for consenting adults. On
the other hand, most parents, educators, and other child
advocates are concerned that children might be exposed to
pornography. They are deeply troubled by its potential
impact on children and fear that increasingly easy access to
pornography encourages pedophiles and sexual predators.
 Sexting: Sending sexual messages, nude or seminude
photos, or sexually explicit videos over a cell phone is a
fast-growing trend among teens and young adults.
2.3. ETHICS IN INFORMATION
TECHNOLOGY
2.3. ETHICS IN INFORMATION TECHNOLOGY

Supporting the Ethical Practices of


IT Users
2.3. ETHICS IN INFORMATION TECHNOLOGY

Supporting the Ethical Practices of IT Users


The growing use of IT has increased the potential for new ethical
issues and problems; thus, many organizations have recognized
the need to develop policies that protect against abuses.
Although no policy can stop wrongdoers, it can set forth the
general rights and responsibilities of all IT users, establish
boundaries of acceptable and unacceptable behavior, and enable
management to punish violators.
Adherence to a policy can improve services to users, increase
productivity, and reduce costs.
Companies can take several of the following actions when
creating an IT usage policy.
2.3.ETHICS IN INFORMATION TECHNOLOGY
a. Establishing Guidelines for Use of Company Software
Company IT managers must provide clear rules that
govern the use of home computers and associated
software. Some companies negotiate contracts with
software manufacturers and provide PCs and software so
that IT users can work at home. Other companies help
employees buy hardware and software at corporate
discount rates.
The goal should be to ensure that employees have legal
copies of all the software they need to be effective,
regardless of whether they work in an office, on the
road, or at home.
2.3.ETHICS IN INFORMATION
TECHNOLOGY
b. Defining the Appropriate Use of IT Resources
Companies must develop, communicate, and enforce written
guidelines that encourage employees to respect corporate IT
resources and use them to enhance their job performance.
Effective guidelines allow some level of personal use while
prohibiting employees from visiting objectionable Internet
sites or using company email to send offensive or harassing
messages.
2.3.ETHICS IN INFORMATION TECHNOLOGY

c. Structuring Information Systems to Protect Data


and Information
Organizations must implement systems and
procedures that limit data access to just those
employees who need it. For example, sales managers
may have total access to sales and promotion
databases through a company network, but their
access should be limited to products for which they
are responsible. Furthermore, they should be
prohibited from accessing data about research and
development results, product formulas, and staffing
projections if they don’t need it to do their jobs.
2.3.ETHICS IN INFORMATION
TECHNOLOGY
d. Installing and Maintaining a Corporate Firewall
A firewall is hardware or software that serves as a barrier between an
organization’s network and the Internet.
 A firewall also limits access to the company’s network based on the
organization’s Internet-usage policy.
 A firewall can be configured to serve as an effective deterrent to
unauthorized Web surfing by blocking access to specific objectionable
Web sites. (Unfortunately, the number of such sites is continually
growing, so it is difficult to block them all.)
 A firewall can also serve as an effective barrier to incoming email from
certain Web sites, companies, or users.
 It can even be programmed to block email with certain kinds of
attachments (for example, Microsoft Word documents), which reduces
the risk of harmful computer viruses.
Conclusion
2.3.ETHICS IN INFORMATION
TECHNOLOGY

End

You might also like