Free

Computer Ethics - Case Study Example

Comments (0) Cite this document
Summary
Individuals involved with the industry of computer sciences are not allowed to gain access to information or enter in another individual’s computer until he/she…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.7% of users find it useful
Computer Ethics
Read TextPreview

Extract of sample "Computer Ethics"

Computer Ethics Computer Ethics Computer Ethics Issues Two computer ethics issues related with the use of ransomware includes the issue of privacy and criminal behavior. Individuals involved with the industry of computer sciences are not allowed to gain access to information or enter in another individual’s computer until he/she has the authority to do so. When individuals gain access to unauthorized information, they use it in different ways for their own self interest while ignoring the interest of the society. The utilitarian rule of ethics state that if an activity results in damaging the society and benefiting a few, then that particular activity is regarded as unethical. On the other hand, if a computer professional or a group of professionals ask for ransom in exchange of not holding a computer as a hostage, they are indulging in criminal behavior. Ransom in previous years used to be gained by kidnapping an individual and this activity was recognized as a criminal conduct. Similarly, holding a computer hostage and acquiring ransom is even recognized as criminal behavior.
Prevention From Ransomware
One way through which computer users can protect their computers from being attacked by ransomware is by protecting their computers with security software. This security software has the ability to detect and stop malicious attacks launched on a particular computer. The user needs to ensure that the security software is kept up-to-date. It is essential for the security software to remain up-to-date because new forms and software of ransomware are being launched every day and in order to tackle updated viruses, a computer needs updated security software. Another way of preventing becoming a hostage to ransomware is having a backup of the information and data that is stored on a particular computer (Deccan Herald, 2012). In cases a computer becomes a hostage, the most probable threat that a user faces is the loss of important data. If this data is stored in a backup storage device such as a USB or an external hard drive, the user will not have to give in to the demand of ransom.
Government Legislation
Government can use both deterrent as well as preventive modes of legislation to counter the issue of ransomware. The government should pass a legislation requiring all organizations and computer users to protect their computers with security systems and having backup of the data. The government can levy hefty fines for not complying with legislation. This will encourage computer users as well as organizations to protect their system in order to avoid hefty sanctions. Government can deter computer hackers who use ransomware from indulging in such acts by assigning hefty sanctions such as jail time and penalties for holding another individual’s computer hostage (Cross, 2013). The fines should be influential and should have the ability to inhibit fear amongst computer hackers. The fear of sanctions will deter such hackers from performing these unethical activities. This is because the hackers might conduct a cost-benefit analysis of performing these acts and may perceive that the costs are much higher than the benefits.
References
Cross, S. (2013). Shaping South East Europes security community for the twenty-first century (1st ed.). Basingstoke: Palgrave Macmillan.
Deccan Herald,. (2012). Hackers holding your PC to ransom. Retrieved 3 July 2014, from http://www.deccanherald.com/content/297460/hackers-holding-your-pc-ransom.html. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Ethics Case Study Example | Topics and Well Written Essays - 500 words”, n.d.)
Computer Ethics Case Study Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1651599-computer-ethics
(Computer Ethics Case Study Example | Topics and Well Written Essays - 500 Words)
Computer Ethics Case Study Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1651599-computer-ethics.
“Computer Ethics Case Study Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1651599-computer-ethics.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Computer Ethics

Computer Ethics: Some Dilemmas and Solutions for the Workplace

...Introduction The rise of ‘information revolution’ has indeed altered various aspects of human life, from technological to socio-cultural. As highlighted in an online article entitled Computer and Information Ethics, the changes brought about by the Internet on commerce, employment, medicine, security, transportation and popular culture have consequently affected— in both good ways and bad ways — the interpersonal engagements and relations of people (Bynum 1). The emergence and continued development of computer ethics as a branch of applied ethics has been viewed as a response to the socio-cultural impacts of the Internet. By examining the nature and effects of the use of the Internet in familial relations, business transactions... , and...
9 Pages(2250 words)Research Paper

James Moor - Computer Ethics

...?In “What is Computer Ethics”, philosopher James H. Moor makes a broad, ambitions account of the nature of computer ethics, with the implicit intent of deriving a special science set off from the other regions of ethical thinking. In his essay, Moor seeks to explain the causes of ethical questions brought on by computer-related technological forces in our society as opposed to other kinds of technologies. Moor identifies a notion of computer technology as “logically malleable” as this root cause of the indelible uniqueness of ethical issues arising from computers in particular. He says, “Computers are logically malleable in that they can be shaped and molded to do any activity that can be characterized in terms of inputs, outputs... , and...
3 Pages(750 words)Essay

Computer Ethics

...? Computer Ethics Introduction Computer ethics have been a fundamental issue since the emergence of computers. The rapid growth and development of computers has led to the evolution of how they can be used inappropriately (Cavalier, 2005). This is to the detriment of society and its values. Since the application of computers is widespread, its use and application in juvenile practices is also vast. With the evolution of computer use in our society, the storage of most of people’s has become digitalized. The information stored varies from highly sensitive to potentially harmless information about the user....
3 Pages(750 words)Essay

Computer ethics and law

...?Discusses Ethical and Moral Obligations of Computer Professional (BSC of conduct or IEEE-CS ACM Software Engineering of Ethics and Professional Practice) The code of ethics was developed by the Joint Task force on Software Engineering Ethics and Professional Practices to address the need for “appropriate set(s) of standards for professional practice of Software Engineering upon which industrial decisions, professional certification, and educational curricula can be based" (Gotterbarn & Rogerson 1997, p. 89). The IEEE-CS/ACM Software Engineering Code of Ethics and Professional Practice - often abbreviated as IEEE-CS/ACM SECEPP provides...
5 Pages(1250 words)Essay

Computer Ethics and Professional Responsibility

...languages in emergency room. It can create an emergency room that can thrive million person communities using e commerce. The larger and advanced questions about human relationships and society can explore the computer’s potential to support creativity. This needs consensus and resolution of conflicts. Author finds in each chapter a skeptic corner that assumes trust, privacy and digital divides. Ethics and Technology This can be termed as a text book on ethical issues in cyber science. This is regarding the computer communications and sciences. These ethics involve philosophy, sociology and library science students. He starts with introducing cyber...
6 Pages(1500 words)Annotated Bibliography

Computer Ethics

...Question Computer ethics will change. Computer technology constitutes the remaking of society. This is the 2nd industrial revolution. This affects all major aspects of life and this will make our world small. The computer generation will have many faces, this will change radically everything we think and do. There will be radical changes in the work place. For instance, the typewriter has been replaced by computers. The fifty office employees have been reduced to ten skeleton-force employees using the computers as their clerical assistants. Many computer programs can now do the architects', engineers', accountants', and...
6 Pages(1500 words)Essay

Computer Ethics and Its Issues That Concern IT Professionals

...Computer Ethics and Its Issues That Concern IT Professionals Outline I. Introduction II. Computer ethics A. History Cybernetics 2. Computer Ethics B. Definition of Computer ethics C. Ethical Issues that Concerns Computer/IT Professionals 1. Health and safety in the Workplace 2. Proper Use of the Internet in the Workplace 3. Privacy and Anonymity 4. Awareness on Computer Ethics 5. Intellectual Property Rights or Ownership III. Conclusion Computer Ethics and Its Issues That Concern IT Professionals Abstract Global competition has increased the demand for more technologically advanced individuals in the society. Computer scientists and It professionals have been greatly demanded. However, the demand to ethical awareness... of these...
12 Pages(3000 words)Essay

Computer Ethics-Cyberbullying

...such as: its location independence; its secret perpetrator nature; the difficulty to trace or discover it; its ability to rapidly scale; and the lack of codes of conduct and procedures to deal with it (“Cyberbullying - Computer Ethics,” 2011). Finally, this paper argues that the best way to deal with cyberbullying could possibly be through promoting moral cyber-citizenship. This will be a civil process that would follow the success of organized cybercommunities such as the Free and Open Source Software community. References Alexander, L., & Moore, M. (2007, November 21). Deontological Ethics. (E. N. Zalta, Ed.)The Stanford Encyclopedia of Philosophy. Retrieved from...
8 Pages(2000 words)Thesis

Computer Ethics

... Computer Ethics How has the Internet changed the notion of community standards for determining if material is legally obscene? Do you think the community standards criterion can be preserved on the Internet? If so, explain how. If not, explain why. The Internet has not changed the notion of community standards for determining if material is legally obscene, nor can community standards criterion be preserved on the Internet. These points will be proved in the forthcoming subsections. Even the Supreme Court had difficulty trying to figure out how community standards would determine illegally obscene material on the Internet. According to Marzilli (2004), “The Supreme Court considered the issue of how...
2 Pages(500 words)Essay

Computer Ethics

...Computer Ethics While the positive rights allow action, whether of a legal or moral nature, the negative rights permit the inaction of any legal or moral character (Gavison, 2000). While an individual has a negative right, then he holds the right from being subjected to an action of another person or a group of people. While an individual holds a negative right, then he is set free from being coerced, or forced by any authority or individual to a given indulgence. The individual holding a negative right is protected from being abused by the authority or the other individuals (Hodgson, 1998). On the other hand, when an individual holds a positive right, then, the right holds others responsible to act in...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Computer Ethics for FREE!

Contact Us