Computer Science: Professional Ethics - Assignment Example

Comments (0) Cite this document
Summary
The author states that computer scientists have the capability to take the world in their stride and create an environment, which is beneficial, to all. They can enhance their capabilities by following certain professional ethics meant for helping them understand their professional implications. …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.3% of users find it useful
Computer Science: Professional Ethics
Read TextPreview

Extract of sample "Computer Science: Professional Ethics"

Download file to see previous pages Unfortunately people most related to it i.e. the computer professionals have started misusing this excellent media. The problem is accelerating at a huge pace and has become a matter of concern for organizations all over the world.
I have a friend who works in a BPO (Business Process Outsource) organization in India as a top-level computer scientist. He is working indirectly for a bank situated in the U.S. as this bank outsources its back-office work to other countries. Through my friend's emails, I came to know that India is the most popular country for outsourcing work from developed countries. The reason is that the companies get cheap labor there when compared to countries like U.S or U.K. So most of the companies located in these countries are transferring their backend process to India to reduce their operating expenses. Hence India has become the back office of the world.
Of late there have been many incidents that have threatened the reputation of the BPO industry workers there. Due to the mistake of a few computer professionals, the entire BPO clan is being looked with suspicion. According to my friend an incident that took place a couple of months ago in his organization, became the focal point for everybody's attention.
One of my friend's colleagues used to deal with the credit cards of people situated in different parts of the world. He was not new in the organization and had gradually earned trust from all. His crime was that - he copied all information of credit cards of thousands of customers on a removable storage media and passed on this important data to wrong hands. Naturally, he earned a lot of money by doing this. The customers of the bank smelled the rat and complained about the illegal transfer of their money and misuse of their personal information. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Computer Science: Professional Ethics Assignment, n.d.)
Computer Science: Professional Ethics Assignment. Retrieved from https://studentshare.org/human-resources/1530138-computer-science-professional-ethics-essay
(Computer Science: Professional Ethics Assignment)
Computer Science: Professional Ethics Assignment. https://studentshare.org/human-resources/1530138-computer-science-professional-ethics-essay.
“Computer Science: Professional Ethics Assignment”, n.d. https://studentshare.org/human-resources/1530138-computer-science-professional-ethics-essay.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Computer Science: Professional Ethics

Professional Ethics and Responsibilities in Computer Technology

...?PROFESSIONAL ETHICS AND RESPONSIBILITIES IN COMPUTER TECHNOLOGY Professional Ethics and Responsibilities in Computer Technology Affiliation Date Table of Contents Introduction 3 The Role of Ethics in Information Technology 3 Common Dilemmas 5 Current Attitudes, Perceptions, and Behavior 7 Managing Ethical Issues 7 Outsource Awareness 8 Training and Rewards 8 Develop an IT Ethics Policy 9 Conclusion 9 Bibliography 10 Duke University. (2011, August). Legal Ethics. Retrieved February 19, 2012, from http://www.law.duke.edu/lib/researchguides/legale 10 Introduction Every...
6 Pages(1500 words)Research Paper

Computer Ethics and Professional Responsibility

...languages in emergency room. It can create an emergency room that can thrive million person communities using e commerce. The larger and advanced questions about human relationships and society can explore the computer’s potential to support creativity. This needs consensus and resolution of conflicts. Author finds in each chapter a skeptic corner that assumes trust, privacy and digital divides. Ethics and Technology This can be termed as a text book on ethical issues in cyber science. This is regarding the computer communications and sciences. These ethics involve philosophy, sociology and library...
6 Pages(1500 words)Annotated Bibliography

Computer Science

.../321957-321957-64295-306995-306995-3355644.html HP Pavilion a6500z series .http://www.shopping.hp.com/webapp/shopping/computer_can_series.dostoreName=computer_store&category=desktops&a1=Category&v1=Everyday+computing&series_name=a6500z_series Choosing a PDA versus a Laptop. (2007). Retrieved july 30, 2008, from http://www.googobits.com/articles/1019-choosing-a-pda-versus-a-laptop.html roseberry, catherine. (2008). Laptop or PDA for Business Trips. Retrieved july 30, 2008, from http://mobileoffice.about.com/cs/packyourgear1/a/laptoppda.htm Heather, booth., & Brown, murray. (n.d.). Basics of computer science. Retrieved july 30, 2008, from http://www.cs.utk.edu/modules/acknowledgements.html... 1. Write a short report with examples to show how a...
13 Pages(3250 words)Essay

Professional Ethics for Computer Science

...Professional Ethics for Computer Science September, 2006 My Ethical Perspective Ethics has been one of the most debated issues in the history of man’s existence. As most people say, what is right and wrong may depend on one’s values, principles, and beliefs. In philosophy, moral conduct can be measured through any of the following: (1) virtue ethics; (2) duty ethics; and (3) consequentialism. Virtue ethics emphasizes that a person’s moral conduct can be identified through “virtues” or “good habits”, such as Plato’s cardinal virtues of wisdom, courage, temperance, and justice. Other...
2 Pages(500 words)Essay

Computer Professional Ethics Journal #2 & #3

...October 2006 Journal No. 3: Impacts of Intellectual Property Laws on Computer Scientists Nowadays, software companies like Microsoft, Macromedia, Norton Anti Virus, and the like have been neck to neck against invisible individuals who have been pirating their software. These companies also pay hard money just so governments in various countries would pass on intellectual property bills, particularly in the distribution of their respective softwares. In this regard, computer scientists must be aware of the fact that despite the intricacies and complexity of their programs, these softwares are bound to be pirated, hacked, or cracked sooner or later. With such inevitability, there is a need to make...
2 Pages(500 words)Essay

Professional Ethics for Computer Scientists

...September 2006 The Role of Ethics and Computer Scientists towards the Education of the Youth in the Internet Abstract In the advent of modern technology and the boom of the Internet Age, one of the most uncensored and taken for granted sector of society is the youth. The role of ethics has been profoundly noted in the field of computer and information technology. Various Universities and organizations have recognized the role of ethics in the cyber world. The widest user of the Internet, the youth has been lagged behind in terms of education and proper perspective in utilizing computer technology. This paper will tackle and examine the...
2 Pages(500 words)Essay

Computer Professional Ethics Journals

...Computer Professional Ethics Journal no. __ Computer Professional Ethics Journal no. __ One information privacy principle (under the Information Privacy Principles under the Privacy Act 1988) that can most affect a behavior or a computer scientist is the “access to records containing personal information.” In this entry it states that: Where a record-keeper has possession or control of a record that contains personal information, the individual concerned shall be entitled to have access to that record, except to the extent that the record-keeper is required or authorized to refuse to provide the individual with access to that record under the applicable provisions of any law of the Commonwealth that provides for access by persons... to...
2 Pages(500 words)Essay

Computer Science

...changes (Ambler et al., 2007). The next confront for the traditional Software Engineering is: How do we proffer effortlessness and visibility into SE actions? Incorporating and supporting the transparency and visibility in the Software Engineering is really hard and delicate (Williams et al., 2003). Agile Software Engineering makes use of and pays more stress on the teamwork and in-group collaboration. This attribute of the Agile Software Engineering makes it capable to counter this confront of the conventional Software Engineering. Next we have the challenge: How could software engineering reveals that it would be able to track paramount practices in management science? Software Engineering is more than a project...
10 Pages(2500 words)Essay

Computer science & ethics - research & analysis paper

...Computer Science & Ethics - Research & Analysis Paper INTRODUCTION Computer ethics can be termed as moral regulations that control the usage of the computers. In the modern world, professionals receive mixed ethical approach messages from various sections in the field of computer science. The ethicality of computer science rotates around the ownership of the intellectual property as well as unlawful usage of the software. It is witnessed that the maximum portion of companies budget is mainly spend on the software,...
10 Pages(2500 words)Research Paper

Computer Science

...COMPUTER SCIENCE Dos/DDos Dos attack ification is vital in understanding the attacked protocols so as to avoid the worms on suitable platforms. Over the last decades there has been no study on the DDos attacks and therefore there is not much understanding on the same. This is because there is insufficient data at the backscatter. According to Kumar, there are some articles that have scrutinized the hosts that have been contaminated with the worms. This has been done through examination of the structure and the properties of the worms. This has been instrumental in the classification.Mandia and Prosise categorized the DDos attack into three distinct groups. These groups include Destructive, Resource...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Computer Science: Professional Ethics for FREE!

Contact Us