How has the presence of viruses changed computer use

Assignment Help Other Subject
Reference no: EM131177317 , Length: word count:1500

Assessment task-

You are to write an essay where you provide support for a particular position on an ethical issue. The essay is to be 1,500 words in length.

1. Choose an issue from the topic list

2. Write an essay with the following structure (do not include headings in your essay):

i. Introduction

  • A hypothesis statement.
  • A clear explanation or definition of the problem.

ii. The body

  • Reasons and evidence to support your position stated in your hypothesis statement.
  • Address at least one objection to your position.

iii. Conclusion

  • Restate your hypothesis statement (not a direct copy and paste).
  • Summarise the main points.
  • A call to action - what is the reader to do or believe in relation to this ethical issue?

iv. Reference list (start this on a new page following the essay).

3. As part of your argument, include what guidance the code of ethics from the Australian Computer Society provides.

4. Within your essay include references that help you support your argument. Follow Harvard Referencing for the reference list and for in-text citations.

General Topics and Issues related to Computer Ethics

1. Computer Crime: Theft of unprotected data

If someone has not properly secured some important data, is it ethical for another person to exploit that situation and take the information? Is it not the original owner's error by not being more secure? A parallel example is the situation that if a homeowner leaves a door unlocked, does someone else have the right to enter that house? Consider a situation where someone has thrown away trash, but do others have the right to go "Dumpster Diving" to see what is there?

2. Computer Crime: Wire tapping and Eavesdropping

Should a person be allowed to monitor network activity by running a "sniffer" program that could be used grab sensitive data and password information of the other users on the system? Should an employer be allowed to monitor keystrokes and behavior patterns of employees to see that they are doing their work? What monitoring activities are appropriate, which could be considered un-ethical, and which should be considered criminal?

3. Computer Crime: Denial or Degradation of Service and Masquerading

By generating a large number of requests to a computer site, it is possible to overload the capabilities of that remote system making it impossible for valid users to access the resources. Tracing the cause of the problem can be further complicated when the actual instigator appears to be someone else. How do we handle situations like these? Are there ways to trace such crimes?

4. Computer Crime: Intellectual Property Rights and Software Piracy

How do we expect a company to make a reasonable profit if software pirates steal the programs and copy them without paying? Is it possible to support future innovation if program developers are not compensated for their time? If an unknown program is discovered to be a worthless piece of junk, should the consumer be expected to pay just to see if it might be appropriate. Open source software seems to be preferred by many users, but what is the mechanism to support an industry based on that premise.

5. Privacy: Sensitive Personal Information

Companies are collecting a large quantity of information about individuals, but what rights do the individuals have to keep that information private? If a doctor has been maintaining medical records on an individual for some health concern, does an insurance company have the right to deny coverage to that individual because of potential health risks. Could not digital information be used to monitor someone's behavior so that criminals could rob an unattended home. Are private phone conversations actually private?

6. Privacy: Directed Advertising

Is it ethical to monitor behavior and buying patterns of online customers, and use that information for directed advertisements and spam? What rights do the users have to keep that information from being passed around and sold to others? Is not directed advertising more valuable for retail outlets so that energy and effort are not wasted? What information is being collected about user preferences and how might it be used if all the information could be cross referenced? How appropriate are pyramid schemes that pay others for obtaining customers for directed advertising be viewed?

7. Privacy: Employee email privacy

What rights does an employer have with respect to private email? Should an employee be reading and writing email on company time? Doesn't the employer have a right to read and monitor personal email messages? Should the government monitor email transfers across the Internet in order to look for subversive activity? Should the schools be monitoring inappropriate email full of vulgarity and hate? How should chain letters sent through email be considered?

8. Computer Accuracy: Safety Critical Applications

As our economy becomes more and more dependent upon computer controlled devices, how much faith should be placed in the hands of software programs? Are there ways to ensure that a program is fail safe? Should a safety critical application such as a network of nuclear defense missiles or a an air traffic control system be controlled only by a computer program rather than having a human element to over ride potential consequences?

9. Computer Crime: Attacks on Software through Back Doors or Trojan Horses

Is it ethical for a developer of a program to create a back door that will allow someone to bypass multiple levels of security? If a back door exists, is it not possible that others might discover the entry parameters, therefore rendering the security features useless? Is it appropriate for a software developer to require that a customer pay a registration fee by a certain time, or the program will become inactive? What if the program destroys the customer's data in the process of inactivation? Who is wrong, the person who didn't pay the registration fee, or the person who designed the program to get back at free loaders and pirates?

10. Computer Crime: Attacks on Software through Viruses and Worms

How has the presence of viruses changed computer use? What are some of the reasons people write virus or a worm programs? Is there not an advantage for people who write virus protection software to also make certain that there are plenty of new viruses being released all the time? Why are virus programs not typically associated with Linux systems? Could the virus programs also be written by people who want to exploit a competitor's weakness in order to promote their own products? Are UNIX systems completely free of security problems?

11. Computer Crime: Attacks on People - Financial Hacks

What are some of the ways that people can hack into financial systems and steal money? Is it ethical for banks and other companies to always give themselves the financial benefit of rounding down balances and interest payments so that they get the benefit instead of the customer?

12. Computer Crime: Attacks on People - Fraud or Embezzlement

In addition to stealing credit card numbers, what are some of the ways people can be defrauded. What about "identity theft", gaining enough information about an individual such as Social Security Number and bank numbers so that another individual in a different part of the country might assume a living person's identity, fraudulently gaining credit and running up large debts? Is it considered un-ethical, or should it be considered criminal fraud if a computer error gives someone more money than they are supposed to have, yet the person does not report the error?

13. Computer Crime: Attacks on People - Digital Forgery

Since it is possible to easily modify digital images, what are some of the ramifications of altering images to personally attack the credibility of another person? Is it not possible to modify existing images and even movies to completely misrepresent a person's situation? What rights How might digital forgery relate to legal concerns related to pornography or intellectual property rights?

14. Computer Crime: Attacks on People - Sabotage/Destruction of Data

What are some of the concerns over sabotage and destruction of data, especially in relation to a disgruntled employee? If an employee has been treated unfairly but then threatens to destroy important company records, who is to blame? Are there any safeguards against such acts?

15. Computer Crime: Attacks on People - Harassment

In addition to some of the more common ways of bothering individuals electronically, such as spamming or email flaming, are there other ways people can be harassed by computer technology? What are some of the ethical concerns about purchasing domain names that are similar to existing entities, and then holding the parent organization hostage, requiring either payment of a large fee or risk the presentation of a parallel and possibly defamatory site?

16. Computer Crime: Attacks on People - Hate Sites vs. Freedom of Speech

The First Ammendment guarantees the right of free speech, but does having the right to say whatever one desires mean that there should be no consequences for things that might be slanderous or harmful? What about web sites that promote hatred, genocide, or vulgarity? Are there any effective ways to limit access to those sites in schools or other settings? Can laws governing the behavior of people in one jurisdiction be binding upon those in another?

17. Intellectual Property: Music Software

What are some of the ways digital music is being disseminated over the Internet. Are there effective ways to minimize theft? How can we compensate musicians for their talent? Will mergers between major entertainment giants and Internet resource providers likely have an effect on the future of the digital music industry?

18. Unfair Business Practices: Market Domination by Anti-Competitive Actions

In the very competitive software market, how should we deal with unfair business strategies that force compliance with brand products? Does not that approach reduce competition and force up prices? Should it be considered a monopoly, or is it just aggressive marketing?

Some Ethical Questions to Consider

The following are some general questions to consider when researching the above topics:

  • What should the penalties be with respect to violation of ethical principles? When a crime is actually committed, can we really impose judgments on individuals from another state or nation?
  • Who has the responsibility and/or the authority to police computer crimes on a global basis? Who should be the "whistle blower" on ethical issues?
  • When discussing what is ethical vs. what is legal, there are often differences of opinion. For instance, legal decisions can often become blurred as to what is right or wrong on a global context. An act that is illegal in one country might be perfectly legal in another. When discussing ethics, try to make a distinction as to what is the ethically RIGHT thing to do vs. what might be legally acceptable in our country.

Some web references

  • ThinkQuest web site on Computer Ethics: https://library.thinkquest.org/26658/
  • ACM's Code of Ethics and Professional Conduct: https://info.acm.org/constitution/code.html
  • Online Ethics Center for Engineering and Science: https://onlineethics.org/
  • Centre for Applied Ethics: Resources on the WWW: https://www.ethics.ubc.ca/resources/computer/
  • Computer Ethics - Cyber Ethics: https://cyberethics.cbi.msstate.edu/
  • Ethics in Computing: https://www2.ncsu.edu:8010/eos/info/computer_ethics
  • IEEE Ethics Committee: https://www.ieee.org/organizations/committee/ethics/
  • Computer Institute's Ten Commandments of Computer Ethics: https://www.cpsr.org/program/ethics/cei.html
  • DePaul University Computer Ethics Links: https://condor.depaul.edu/ethics/ethb16.html
  • Kevin Bowyer's Ethics and Computing Links: https://marathon.csee.usf.edu/~kwb/ethics-and-computing.html
  • Teaching Ethics and Computing: https://marathon.csee.usf.edu/~kwb/nsf-ufe/
  • Ethics Updates by Lawrence Hinman: https://ethics.acusd.edu/.

1500 words

8 references.

Reference no: EM131177317

Questions Cloud

Identify one website for practicing punctuation : Identify one Website for practicing punctuation. Identify the source of the site and describe three beneficial activities a student can access on the Website.
Determine the in-degree and outdegree of each vertex : Given the ordered pairs of vertices associated to the edges of a directed graph, determine the in-degree and outdegree of each vertex.
Briefly describe how you can maintain high standards : Analyze how you can maintain high standards and demonstrate high expectations for all ethnically, culturally, and linguistically diverse students in the classroom.
Write about a current microeconomic topic : You do not need to find current event articles, as you may simply write about a current microeconomic topic, firm, or market occurring during this quarter for each of the first two questions.
How has the presence of viruses changed computer use : How has the presence of viruses changed computer use? What are some of the reasons people write virus or a worm programs? Is there not an advantage for people who write virus protection software to also make certain that there are plenty of new vi..
Develop a lessons learned document for worldview project : Develop a Lessons Learned document for the Worldview project with these specific action items: Write three project success criteria that would have been included in the charter-you may use or reference the project objectives you wrote in Unit One...
Examples of a true monopoly : In the real world, there really are not that many examples of a true monopoly. Microsoft, amazon, and Walmart are all huge companies that tend to dominate in many markets, but they still face competition.
Find the thickness of each of the graphs that are not planar : determine the thickness of each of the graphs that are not planar.
Corner the market for some good : This often happens through trademark or patent protection. Less common is the case of someone trying to "corner the market" for some good. This week, we learn about the rather odd case of the "Onion King." Listen and discuss whatever you find most..

Reviews

Write a Review

Other Subject Questions & Answers

  Identity christian supremacist movement-domestic radical

Identity Christian/White Supremacist movement with the domestic radical Islamists movement. When doing the research for this assignment what common themes and/or goals did you find that would support the development of an alliances between these two ..

  Find the absolute maximum and minimum values for each

find the absolute maximum and minimum values for each function fx. list your answer as an ordered pair.fxtanx cotx

  Situation that would call for a more task oriented leader

Do you think communication is more important to leaders now than it was in Hitler's and FDR's time? Explain why you think so or why you disagree. Who is a more current charismatic leader that you know of, and how are they similar to Hitler or FDR in ..

  Describe various myths

Try to identify and describe various MYTHS that surround marriage and family. If you can, (based on how you choose to spend your leisure time) try to identify two or three popular families in T.V. shows, movies, or books.

  Differences between legitimate-reward-coercive

Power is a leader's influence over their followers. While power has the potential to control others, it is the perception of power rather than the actual use of it that can influence, manage, and move people and organizations to a higher level of ..

  Calculate the correlation coefficient and test

Plot viscosity against reaction temperature. What type of relationship do you ?observe - calculate the correlation coefficient and test whether it is zero. Does this ?confirm your previous conclusions?

  Chronological age and the developmental age of child

Make sure you tell us the chronological age and the developmental age of this child (remember, this will be different ages since the child will most likely have special needs)

  General attributes of a grant proposal

Describe the general attributes of a grant proposal. Be sure to address the function of a grant proposal, the purpose of a grant proposal, and how a grant proposal relates to a program plan.

  Local authorities in some european cities

After World War II local authorities in some European cities (Berlin and Frankfurt, for instance) prescribed ceilings on rental prices for city flats. The idea was to make access to appropriate dwelling space largely independent of income. Althoug..

  Compute the real roots of a quadratic equation

write a program to compute the real roots of a quadratic equation (ax^2 + bx + c = 0 ). The roots can be calculated using the following formulas:

  The opportunity cost of macroeconomic event

All societies face a trade-off between efficiency (productivity) and equity (fairness). Whenever a society focuses on production, they gain efficiency, but the makes the distribution of income and resources less fair throughout the population, so the..

  Grade calculator solution folder

Professor Arkins wants an application that allows him to assign a grade to any number of students. Each student’s grade is based on three test scores, with each test worth 100 points. The application should total the test scores and then assign the a..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd