StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The World of Computing in the Last Decade - Coursework Example

Cite this document
Summary
The paper "The World of Computing in the Last Decade" discusses that the act may be deemed as an invasion of privacy. However, it can be ruled as necessary if any concealed information may be proven a possible threat, and invasion of privacy will be for the greater good of a country or community…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
The World of Computing in the Last Decade
Read Text Preview

Extract of sample "The World of Computing in the Last Decade"

Ethics/DP/Sustainability Ethics/DP/Sustainability Summary The world of computing has evolved substantially in the last decade. Theevolution can be attributed to the growing usage of the internet, creating a new technological world for individuals to interact. The high level of usage of the internet has resulted in the growing development of new, advanced and technological computers tailored to the needs of the vast users of the internet. However with the numerous users comes the responsibility of establishing computing ethics, data protection and establishing regulations that allow access to free information (Quinn, 2009). It is important to develop regulations that serve to monitor, regulate and advocate for the various aspects of the computing world. Ethics in Computing Ethics is considered the philosophical study that relates to morality. It can be termed as a rational analysis of individuals regarding their moral beliefs and behavior. Ethics can be deemed a vital factor in the computing world, especially because of the high level of internet usage and children having an increased level of access to the internet, exposing them to the various contents that are presented on the internet. However, ethics does not control the age of children and what access on the internet, social factors can be considered as a factor regarding the nature of the digital world (computer world). Ethics should have a level of consideration for various factors that are part of any given community/society (Quinn, 2009). For example, the internet must establish regulations that serve to control information or content that may discredit or tarnish the reputation of any religious group. Ethics is applied to create a sense of parity in the computing world, hence the importance of implementing ethics with regard to the digital age. Application of ethics is designed to regulate activities in the digital world and prevent drastic or consequential activities. For example, high school and college killings in the United States have been proven to stem from the information obtained or created on the internet, which may cause students to commit malicious acts that involve killing and suicidal acts. The internet has a growing influence on the behavior of children and their general development. It is with this fact that the content available on the internet should be monitored in order to avoid any problems or causes for concern in the future. Ethics is applied to stop growth of terrorism, whether in the United States or on a global scale. Regulating activities on the internet will go some way in limiting or preventing criminal acts. Another element is preventing hate speech. The latter has a growing influence on a society because people are likely to follow or accept ideologies presented on the internet that use rational thought to generate hate speech, which may cause a community or a country to react to the hate speech. It can have a negative effect in the country in general, for instance, the case in Libya that resulted in a major war, in Libya, as well as Syria (Quinn, 2009). Such cases must be avoided at all costs, and implementing ethics in the digital world will serve as a solution to problems related to the internet. Data Protection Act The nature of the internet has resulted in the high level of data theft for the benefit of other individuals. It has resulted in the development of the data protection act that is designed to protect original data, which should be protected to profit the owner. Data theft has become a growing concern that has several individuals, firms and even governments seeking protection from information thieves, who are intent on illegally profiting on information or data of others. The internet is a haven of information, and it can be considered as the fastest medium in the exchange, transfer, and obtaining of data from any given location in the world. However, various levels of data can be considered as confidential for fear of image, reputation and even profitability to an individual, company or government. The internet can be used as a tool for ‘Industrial Espionage’ (forms stealing ideas from other companies with the aim of profiting from the related idea). Such factors have resulted in the creation of the data protection act, to serve in the best interest of the firms and related individuals. Industrial Espionage is not the only cause for the establishment of the protection act, with Wiki leaks revealing confidential information that relates to government secrets. It is important for the application of the act to prevent such situations (Quinn, 2009). Such a scenario can put a country in jeopardy regarding other countries using leaked information as a tool to cause harm or damage to a country (probably cause World War III). The data protection serves as a measure of protecting valuable and confidential information from individuals such as hackers or pirates, to ensure a form of data security for anybody that would require the application of the act. Data security is becoming a growing concern especially based on the evolution of the internet and the growing concern of data theft. Data theft results in the development of counterfeit items, leaked original products that could affect company sales, or the element of national security. These are a few examples on the importance of the Data Protection Act. Freedom of Information Act ‘The right to information’ is labeled as a fundamental right for every person; however, the context of the statement is a cause for concern. A person can obtain information for personal use, but the information may affect the related community or individuals that reveal the information which creates debate on the right to information. The Freedom of information act is based on creating a legal aspect that instructs or forces individuals to revealed previously concealed information, which illustrates the element of revealing information that may affect an individual(s). The act is designed to force people to reveal information that individuals may seek clarification on a given point of concern. For example (this is a hypothetical example) if Coca-Cola is under scrutiny regarding the formula for their secret ingredient, the company may be forced to reveal its secret ingredients to clear the firm’s name of any wrong-doing in their production process. The same factor applies in the digital world, regarding conspiracies that may cause a threat to significant situations. The act is utilized by the U.K. government, when addressing possible threat to national security. (Quinn, 2009) In hindsight, the act may be deemed as an invasion of privacy. However, it can be ruled as necessary if any concealed information may be proven a possible threat, and invasion of privacy will be for the greater good a country or community. The act has proven to be controversial, because it can be used in revealing company secrets, which may affect their revenue generation or image and reputation. The Freedom of Information Act can be essential in given situations; however, it is proven that, it can be utilized in the wrong context, hence the controversial nature of the Act. References: Quinn, J. 2009. Ethics for the Information Age (3rd Ed), Pearson Education, Boston. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ethics/DP/Sustainability Coursework Example | Topics and Well Written Essays - 1000 words”, n.d.)
Ethics/DP/Sustainability Coursework Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1591475-ethicsdpsustainability
(Ethics/DP/Sustainability Coursework Example | Topics and Well Written Essays - 1000 Words)
Ethics/DP/Sustainability Coursework Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1591475-ethicsdpsustainability.
“Ethics/DP/Sustainability Coursework Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1591475-ethicsdpsustainability.
  • Cited: 0 times

CHECK THESE SAMPLES OF The World of Computing in the Last Decade

Comparing a Past Decade with Todays Economy

This pushes one to think on the subject of the level of economic growth over the last 10 years in the country.... Describe the state of the economy at the beginning of the decade using economic indicators such as GDP, unemployment rate or CPI The United States has the most technically advanced, diverse, superior and largest financial system in the world with a per capita GDP of $33,900l as per the statistics of 2000.... 9 (US Inflation Rate Forecast) 3) Describe the state of the economy at the end of the decade: The US financial system is the world's biggest national economy....
4 Pages (1000 words) Research Paper

History and Impact of Computing

The paper "History and Impact of computing" discusses that computers are used for communication, business tool, recreation, and also in the fields of medicine.... ENIAC and UNIVAC computers are some of the first generation computing gadgets.... Society has made remarkable advancements in technology since the development of computers and the Internet....
5 Pages (1250 words) Essay

British Politics Shaped By The FPTP Electoral System

After the First world War, several changes in the electoral system of Britain occurred.... An essay "British Politics Shaped By The First-Past-The-Post System" discusses that elections are no doubt central to the democracy purpose of Britain.... Governments and political parties have placed motions to change the FPTP electoral system, but they have all failed....
8 Pages (2000 words) Essay

Innovation and Technology Management in Apple Inc

Apple has been consistently scoring the top place on the American Consumer Satisfaction Index (ACSI) for the last several years among all technology companies; the brand Apple has become synonymous to innovative ideas, designs and products.... By market capitalization (shareholders worth), Apple occupies a top place among technology companies for the last several years.... Future trends such as Big Data, Smart Connectivity, and User Experience are likely to impact technology companies in the world....
12 Pages (3000 words) Essay

History of Computers from Early Machines to Net-Books

This paper under the headline "History of Computers – from Early Machines to Net-Books" focuses on the fact that introduction to computer technology is not needed anymore.... Role of computers in our lives cannot be denied.... They are now a vital part of our everyday life.... ... ... ... From home to offices, cars to general stores computer have found their purpose....
6 Pages (1500 words) Coursework

History and Impact of Computing

This essay "History and Impact of computing" focuses on five main generations of computers characterized by a crucial technological breakthrough that altered the way computers operate leading to increasingly smaller, inexpensive, powerful, efficient, and reliable devices.... ENIAC and UNIVAC computers are some of the first generation computing gadgets....
5 Pages (1250 words) Essay

Sharaf GD Competitors Comparing Their Price

The paper "Sharaf GD Competitors Comparing Their Price" tells that Sharaf DG Company started in 2003 with a mission to change the face of electronics retailers in the UAE region providing services to consumers in a better and cost-efficient manner than it had been experienced before.... ... ... ... Some of their in-store customer engagement activities are considered key to the success of the business....
12 Pages (3000 words) Essay

Enterprise Utilisation of Cloud Computing UAE Context

At the moment, cloud computing in UAE is getting more and more recognition, but some enterprises are concerned about the security setbacks brought about subsequent to its espousal.... Additionally, cloud computing provides a new world of business opportunities to UAE, but this comes with numerous security issues that have to be considered and managed before the implementation of cloud computing strategy.... The paper 'Enterprise Utilisation of Cloud computing UAE Context' is a well-turned variant of the literature review on information technology....
7 Pages (1750 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us