This website uses cookies to ensure you have the best experience. Learn more

Unsolicited Emails Essay

578 words - 3 pages

Patrick Schuyler
February 22, 2015
Business Ethics
Professor Christianson

Unsolicited Emails
Unsolicited emails do much more harm than good in this world. It is very unethical for online companies to send out any spam or unwanted emails to any person who makes a purchase online. Maybe a receipt email from the company you bought from is ok, but receiving emails without asking from companies with similar products is ridiculous. These unsolicited emails could always have the chance of opening up some type of virus onto the device you open it with. According to chapter four, they are considered to be an invasion of one’s privacy. Also, these unsolicited emails are wrong and unethical because society prospers through the struggle of market-places.
An invasion of someone’s privacy is clearly thought of as unethical ...view middle of the document...


No matter who you are you get the right to your own self and the right to have as much privacy as you please which clarifies why unsolicited emails are unethical and should be illegal for businesses to send them.
From a different stand-point, companies sending emails to people without their prior permission is wrong because according to Andrew Carnegie, you are hurting society with them in terms of wealth. In chapter 4, his article “defends the pursuit of wealth by arguing that society is strengthened and improved through the struggle for survival in the market-place”. Most unsolicited emails are ways and hopes of expanding the given company’s market by reaching out to as many people as possible without permission. Thus actually affecting the wealth of the company positively as well as affecting the overall economy and society negatively.
One final reason proving that unsolicited emails are unethical in today’s society comes from the philosopher Karl Max. He is a believer that devaluation of the human world increases in direct relationship with the increase in value of the world of things. Every company hopes to increase the value of their business when they send out the unwanted emails and advertisements because maybe they will gain more customers. However like Marx said, increasing value ends up increasing the devaluation of the human world, thus being unethical.
Without a doubt, companies are at complete fault when they send out unsolicited emails. They may be making more and more money by doing so but it is unethical because it has a much larger effect on hurting society. Philosophers in chapter 4 would say that they are so unethical because they are an invasion of privacy, a negative effect on society, and they increase the devaluation of the human world. It really should be illegal everywhere.

Other Papers Like Unsolicited Emails

Network Security Essay

1817 words - 8 pages even a friend. Spam Unwanted or unsolicited emails, typically sent to numerous recipients with the hope of enticing people to read the embedded advertisements, click on a link or open an attachment. Spam is often used to convince recipients to purchase illegal or questionable products and services, such as pharmaceuticals from fake companies. Spam is also often used to distribute malware to potential victims. Spear Phishing Spear phishing

Cyber Scam Essay

2555 words - 11 pages accounts. A common means of doing this is to email people that it is necessary to check their password by clicking onto a realistic but fake website and inputting their personal information. Then it is possible to fraudulently transfer the money from an individual’s account * Spam - Spam is the most common type of cyber crime. Spam is nothing but the unsolicited sending of emails for commercial purposes, which is an unlawful act. In various

Nt2580 Project Part 2

1969 words - 8 pages , in that the context is a personal attack, or might be considered as harassment * accessing copyrighted information in a way that violates the copyright * distribution of unsolicited commercial or advertising material * participating in activities that waste staff effort or networked resources * intended or unintended introduction of any form of computer virus or malware into the corporate network * downloading of anything of

Disadvantages Of Internet Use

1053 words - 5 pages is a very serious issue concerning the Internet, especially when it comes to young children. There are thousands of pornographic sites on the Internet that can be easily found and can be a detriment to letting children use the Internet. Spamming: This refers to sending unsolicited e-mails in bulk, which serve no purpose and unnecessarily clog up the entire system. If you come across any illegal activity on the Internet, such

Informative Speech - Online Shopping Safety

1116 words - 5 pages with the latest version. B. Make sure you have an internet security suite that includes an antivirus, firewall and antispyware installed and up to date with latest version. 1. Don’t click on links in emails as sometimes they have viruses attached to them. 2. Don’t click on unsolicited messages with .exe file extension unless it is from a trusted source. III. Now and most importantly, let’s talk about how we purchase things on the

Business and Management

3238 words - 13 pages established preference services that give customers more control over the marketing communications they receive in the mail. The term "junk mail," referring to unsolicited commercial ads delivered via post office or directly deposited in consumers' mail boxes, can be traced back to 1954.[6] The term "spam," meaning "unsolicited commercial e-mail," can be traced back to March 31, 1993,[7] although in its first few months it merely referred to

Smartphonesecurityissues

1570 words - 7 pages the cell phone has been remotely activated and used as an eavesdropping device. There have also been numerous exploits that use the GPS capabilities to tell where the phone is. Smartphone users are also susceptible to phishing emails. A smartphone can also be infected by malware after visiting malicious website. In the business world, personal smartphones can be productive tools used in the work place. The main thing the users currently want

Communication Skills

4057 words - 17 pages encoding, such as an idea, advice, opinion, request, question, answer etc. iii. Transmitter: The medium of communication, such as letters, reports, sms, facts, emails, charts, pictures or any other mechanical device is called transmitter. iv. Noise and Barriers: The blockage in the flow of communication is called noise and barrier. v. Receiver: The person for whom

Week 7 Project Paper

3453 words - 14 pages are quite a few common practices that you can utilize in order to be safer when surfing the internet. First you should consider scanning your email with anti-virus and malware programs. The biggest threat to your system can be a mistake on your part. Do not open unsolicited emails, or download their attachments until you are 100% sure that they are safe. Next is to use a virtual private network (VPN) in order to make your internet surfing more

Value Creation

4800 words - 20 pages surrendering private information that will be used for identity theft. The IRS does not initiate contacts with taxpayers via emails. Also, the IRS does not request personal detailed information through email or ask taxpayers for the PIN numbers, passwords, or similar secret access information for their credit card, bank, or other financial accounts. If you receive an unsolicited email claiming to be from the IRS, forward this message to phishing@irs.gov

Operating Sysytem

3193 words - 13 pages monitoring their employees' emails and other Internet usage * Unsolicited emails * Hackers accessing online databases * Web sites installing cookies or spyware to monitor a user's online activities ------------------------------------------------- See also[edit] * Information and communications technology (ICT) * Information systems (IS) * Computing * Data processing

Related Essays

Consultant Essay

1310 words - 6 pages causes information leakage v. Open and respond to unsolicited emails Incorrect: - One should never open and respond to unsolicited emails, doing so will lead to information leakage w. Access any unsolicited website Incorrect: - Accessing any unsolicited website can cause information leakage therefore one should always avoid it x. Making sure antivirus is installed on the computer and is being updated regularly Correct

Job Advertisment Essay

1043 words - 5 pages in terms of spees. User can send a message or mail simultaneously to multiple users. Thus email service saves a lot of time. * Informal and conversational Generally, the language used inn email is simple. It makes the process of communication informal. The process of sending and receiving emails does not require much time. Therefore, it can be used as a tool for conversing, just like chatting. * Data storage The email service

Health Care Communication Essay

856 words - 4 pages . Please advise all that this can range from direct contact, unsolicited phone calls or anonymous emails. The pretext of an un-named source while might sound enticing to some; we must reinforce company standards and ethics. While some may think that the information shared within the company can easily be accessed it must be noted that all is intellectual property and traceable. All forms of SMART technology cellphones and tablets shall not be allowed

Computer Crime Essay

1301 words - 6 pages facilitate social engineering e.g. Phishing • Using an unsolicited request to visit a counterfeit website in an attempt to trick users into disclosing personal banking information Scam categories Advance fee schemes Scam sub-categories Pyramid schemes, Ponzi schemes, chain letters, ‘Nigerian’ emails, business opportunities, prizes and lotteries, dating scams Online auctions, internet services, computer products, sexual services