StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Computer Science-Information System - Essay Example

Cite this document
Summary
1. There is an obvious contradiction between an employee's right to privacy at work and efforts of a company to protect its information and business. Sometimes an employee needs to be withdrawn from public (corporate) view; and almost always an employee needs to be sure that personal data collected by a company will be protected and distributed with his/her consent only…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.3% of users find it useful
Computer Science-Information System
Read Text Preview

Extract of sample "Computer Science-Information System"

Download file to see previous pages

in the case of industrial espionage or actions on the competitors' side) or inadvertent. Anyway, uncontrolled distribution of private information (especially about customers, e.g. card numbers, addresses, orders, business transactions, etc.) will result in withdrawal of customers and business partners, numerous lawsuits, and reducing revenues and profits. Therefore, often companies try to protect own information systems at the expense of employees privacy. This is a part of computer crime prevention measures with usage of specialized encrypting and authentication hardware and software, anti-malware programs such as Internet filters, firewalls, antiviruses, intrusion detection systems, etc.

In some cases company's prevention measures contain monitoring for employee's communications from office workstations including e-mail control. Here, it is necessary to note that federal laws permit employers to monitor e-mail sent and received by employees. However, most companies maintain own privacy policies, trying to balance between privacy rights and security of business information. Sometimes corporate privacy policies allow employees and customers to access data about them and let them decide how that data can be used.

This helps to avoid possible misunderstandings between company, employees, and customers. 2. 2. It is obvious that working conditions in IT Company must be designed to prevent computer crimes and simultaneously to avoid negative ethical consequences of prevention procedures. In fact, there is need to balance between some restrictions of Company's information flows and some rights to privacy, and also some rights to know; see Freeman & Graham Peace (2005), and also Tynan (2005). There are two main strategies to achieve such balance which often combined in practice.

First strategy is "the way of prohibitions", namely not to distribute business information and information about technical processes, innovations, features of source codes, information from Company's internal databases, not to delete or corrupt information without clear instructions, etc. These restrictions can be easy formulated, described and then realized by technical means. Also, there are certain possibilities to reveal and investigate almost all cases of violation such Company's rules. These violations can be classified as computer crimes and often related to industrial espionage and information "wars" between competing companies.

It is necessary to note that employee must have access to certain parts of Company's data to perform work tasks; therefore, information cannot be concealed at all. Alternative strategy is "the way of responsibility and obligations" or using corporate ethic rules. These rules determine generally accepted and discouraged activities within IT Company and between organizations. Employees define acceptable practices more strictly than just refraining from committing computer crimes; they also consider the effects of their activities on other people and organizations.

Therefore, it is necessary to promote ethically responsible use of information systems on the base of developed codes of ethics, e.g. AITP code of ethics. This code of ethics is a set of obligations to management, fellows, society, employer, and country. For each area of obligation, standards of conduct describe the specific duties and

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Science-Information System Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1512425-computer-science-information-system
(Computer Science-Information System Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/miscellaneous/1512425-computer-science-information-system.
“Computer Science-Information System Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/miscellaneous/1512425-computer-science-information-system.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Science-Information System

Computer Science Information System

This system will be used by both members and fitness consultants to track participation in various fitness activities, such as free weights, volleyball, swimming, stair climbers, and yoga and aerobic classes. The DSS system will be implemented in the form of a client server model with an interface, possibly a computer visual display unit, at all the five centers and will act as a platform to the prospective and current members and consultants.... It will also tell them about the fitness consultant associated with Members: To allow the members (prospective and current) to analyze their goals prior to joining or constantly monitoring their activities and performance to take better options in leading a healthy life. Solution: This system provides with user inputs to a large variety of questions to analyze their needs and future goals to get them the best they desire....
3 Pages (750 words) Essay

Development of Computers in Simulating the Human Brain

Since the inception of computer technology, researchers have anticipated about the probability of constructing smart machines that could compete with human intelligence.... What we call minds are merely very complicated digital computer programs.... Mental states are only computer states and mental procedures are computational systems.... It follows that a person could not find out that the brain or anything else was inherently a digital computer....
12 Pages (3000 words) Essay

Ethical Perspectives Related to Computer Science

hellip; Due to certain errors related to software and hardware that might crop up, it can be brought about uncalled-for errors in the system.... It is also an operating system that facilitates controlling the hardware.... Software often incurs various errors that hamper the process of operations of a computer system.... The hardware error is associated with the breakdown of hardware constituents in the computer system.... The source of any hardware error essentially is its hardware units that create a hurdle in the operating system (Netgear, 2014; Microsoft, 2013)....
11 Pages (2750 words) Coursework

Resources that Support Information Management Systems in Healthcare

hellip; Many functions such as alerting, reminding, and critiquing are basis on simple rules which disclose the computer system what to do when a certain incident takes place.... Alerting system produces the continuous signal or data or message in way of alertness which helps clinicians to take an immediate action.... There are so many devices included in this information system.... In the mid of 1950, information management system in healthcare was developed the devices such MYCIN and INTERNIST-1....
6 Pages (1500 words) Assignment

The Impact of Computer Viruses on Business and Users

Loss of files, unusual changes in computer operations, slow functions performed by the computer and corrupted files are also the indication of viruses in the computer system.... The viruses that affect the whole functions or memory of the computer are, of course, posing a threat to the data stored in the computer system.... The viruses that enter the computer multiply them by created and spreading in each section of the system.... This essay "The Impact of computer Viruses on Business and Users" discusses how the businesses, educational institutions, domestic users and other organizations which are using computers for their routine work are greatly affected by the viruses and their outcomes on the computer data....
6 Pages (1500 words) Essay

The Ethical Impacts of Computer Systems on our Personal Lives

Whitten et al ( 8-45) describe the computer system as an organization of people, interface, data, and processes working in harmony to help in day-to-day problem-solving and decision-making needs.... The coursework called "The Ethical Impacts of computer Systems on our Personal Lives" describes the importance of ethics to man.... The paper assesses the trends technological and information systems pose to the society, advantages ad disadvantages associated with computer systems....
6 Pages (1500 words) Coursework

Challenges of Distributed Computing Environments

A network can be described as a system where hardware and software components are networked using different computers through which allows these computers to effectively communicate and communicate and coordinate their actions only by message passing(Bernard, Thalheim, JANOS,&Hans pp.... ow It WorksThe computational unit of the distributed computing environment is also called an entity depending on the system being modeled by the environment.... Under these distributed computing entities exists which are responsible for the coordination and responses of various processes and among them include a processor, a switch, or an agent that is always available in the system....
10 Pages (2500 words) Literature review

Information Communication Technology and the Role of Social Media during Queensland Floods

Diffusion of these technologies in various levels of social life and economic conditions is gradually shifting the global society to an information society and at the same time spiraling globalization where various forms of information are merging to form an electronically delivered system, which can be accessed from various parts on the globe (Ahmed, 2013, p.... Furthermore, as the connections between information technology and economic development became more clear, various governments in the world began to invest heavily in developing their national information system infrastructure....
13 Pages (3250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us