Computer Science: Professional Ethics - Essay Example

Comments (0) Cite this document
Summary
In today's world the computer is the most important means of problem free existence. Over the years we have been using it to make our work less strenuous. The computer scientists have the capability to take the world in their stride and create an environment, which is beneficial, to all…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Computer Science: Professional Ethics Essay
Read TextPreview

Extract of sample "Computer Science: Professional Ethics"

Download file to see previous pages Unfortunately people most related to it i.e. the computer professionals have started misusing this excellent media. The problem is accelerating at huge pace and has become a matter of concern for organizations all over the world.
I have a friend who works in a BPO (Business Process Outsource) organization in India as a top-level computer scientist. He is working indirectly for a bank situated in U.S. as this bank out sources its back office work to other countries. Through my friend's emails I came to know that India is the most popular country for outsourcing work from the developed countries. The reason is that the companies get cheap labor there when compared to countries like U.S or U.K. So most of the companies located in these countries are transferring their backend process to India to reduce their operating expenses. Hence India has become the back office of the world.
Of late there have been many incidents that have threatened the reputation of the BPO industry workers there. Due to the mistake of a few computer professionals, the entire BPO clan is being looked with suspicion. According to my friend an incident that took place a couple of months ago in his organization, became the focal point for everybody's attention.
One of my friend's colleagues used to deal with the credit cards of people situated in different parts of the world. He was not new in the organization and had gradually earned trust from all. His crime was that - he copied all information of credit cards of thousands of customers on a removable storage media and passed on this important data to wrong hands. Naturally he earned a lot of money by doing this. The customers of the bank smelled the rat and complained about the illegal transfer of their money and misuse of their personal information. That bank immediately caught hold of this outsourcing organization of India. A major investigation was ordered at once and shortly after that the magnitude of the crime and the person behind it was made obvious to all. The person responsible for this tried to escape but was taken under police custody. He confessed that he was planning this for a long time and money was the only motive behind his criminal act.
The bank that had outsourced the job to this particular organization of India severed all ties. The whole outsource community at large started seeing India as untrustable. Thankappan and Kamath has rightly stated, "It would be safe to say that the biggest challenge the BPO segment faces today is information security, as much of the backlash against outsourcing revolves around security." (2004. p 29)
Since that incident the BPO organizations have tried hard to put back the image of India in its appropriate place. They have ensured all their business partners abroad, that they have adopted severe security measures in terms of policies, procedures and technology to bounce back their image. If we look from the ethical point of view we find that professional ethics or the principles of conduct that was required to be followed by that professional as a computer scientist or engineer was overlooked by him completely. So as we can see there was a major ethical problem behind this incident.
The culprit had the responsibility towards the following people or in other words the stakeholders of the organization he was working in:
Clients
Employer
Colleagues
Public at large
But he ignored all that. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Science: Professional Ethics Essay Example | Topics and Well Written Essays - 2250 words”, n.d.)
Computer Science: Professional Ethics Essay Example | Topics and Well Written Essays - 2250 words. Retrieved from https://studentshare.org/miscellaneous/1530138-computer-science-professional-ethics-essay
(Computer Science: Professional Ethics Essay Example | Topics and Well Written Essays - 2250 Words)
Computer Science: Professional Ethics Essay Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/miscellaneous/1530138-computer-science-professional-ethics-essay.
“Computer Science: Professional Ethics Essay Example | Topics and Well Written Essays - 2250 Words”, n.d. https://studentshare.org/miscellaneous/1530138-computer-science-professional-ethics-essay.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Computer Science: Professional Ethics Essay

Computer Ethics

...? Computer Ethics Introduction Computer ethics have been a fundamental issue since the emergence of computers. The rapid growth and development of computers has led to the evolution of how they can be used inappropriately (Cavalier, 2005). This is to the detriment of society and its values. Since the application of computers is widespread, its use and application in juvenile practices is also vast. With the evolution of computer use in our society, the storage of most of people’s has become digitalized. The information stored varies from highly sensitive to potentially harmless information about the user....
3 Pages(750 words)Essay

Computer Ethics

...must adjust to the new working conditions or be replaced. New laws and regulations will have to be put in place to control and monitor the new computer age situation. Information can easily be transferred into the office and out of the office. Hence, industries and businesses must create new marketing and business policies and practices. Professional organizations must develop new codes of conduct for their members. Sociologist and psychologists should study and understand new social and psychological phenomena brought about by the computer age. Philosophers must also rethink old social and ethical concepts. Computer theft is now rampant....
6 Pages(1500 words)Essay

Computer Science

.../321957-321957-64295-306995-306995-3355644.html HP Pavilion a6500z series .http://www.shopping.hp.com/webapp/shopping/computer_can_series.dostoreName=computer_store&category=desktops&a1=Category&v1=Everyday+computing&series_name=a6500z_series Choosing a PDA versus a Laptop. (2007). Retrieved july 30, 2008, from http://www.googobits.com/articles/1019-choosing-a-pda-versus-a-laptop.html roseberry, catherine. (2008). Laptop or PDA for Business Trips. Retrieved july 30, 2008, from http://mobileoffice.about.com/cs/packyourgear1/a/laptoppda.htm Heather, booth., & Brown, murray. (n.d.). Basics of computer science. Retrieved july 30, 2008, from http://www.cs.utk.edu/modules/acknowledgements.html... 1. Write a short report with examples to show how a...
13 Pages(3250 words)Essay

Professional Ethics for Computer Science

...Professional Ethics for Computer Science September, 2006 My Ethical Perspective Ethics has been one of the most debated issues in the history of man’s existence. As most people say, what is right and wrong may depend on one’s values, principles, and beliefs. In philosophy, moral conduct can be measured through any of the following: (1) virtue ethics; (2) duty ethics; and (3) consequentialism. Virtue ethics emphasizes that a person’s moral conduct can be identified through “virtues” or “good habits”, such as Plato’s cardinal virtues of wisdom, courage, temperance, and justice. Other...
2 Pages(500 words)Essay

Computer Professional Ethics Journal #2 & #3

...October 2006 Journal No. 3: Impacts of Intellectual Property Laws on Computer Scientists Nowadays, software companies like Microsoft, Macromedia, Norton Anti Virus, and the like have been neck to neck against invisible individuals who have been pirating their software. These companies also pay hard money just so governments in various countries would pass on intellectual property bills, particularly in the distribution of their respective softwares. In this regard, computer scientists must be aware of the fact that despite the intricacies and complexity of their programs, these softwares are bound to be pirated, hacked, or cracked sooner or later. With such inevitability, there is a need to make...
2 Pages(500 words)Essay

Professional Ethics for Computer Scientists

...September 2006 The Role of Ethics and Computer Scientists towards the Education of the Youth in the Internet Abstract In the advent of modern technology and the boom of the Internet Age, one of the most uncensored and taken for granted sector of society is the youth. The role of ethics has been profoundly noted in the field of computer and information technology. Various Universities and organizations have recognized the role of ethics in the cyber world. The widest user of the Internet, the youth has been lagged behind in terms of education and proper perspective in utilizing computer technology. This paper will tackle and examine the...
2 Pages(500 words)Essay

Computer Professional Ethics Journals

...Computer Professional Ethics Journal no. __ Computer Professional Ethics Journal no. __ One information privacy principle (under the Information Privacy Principles under the Privacy Act 1988) that can most affect a behavior or a computer scientist is the “access to records containing personal information.” In this entry it states that: Where a record-keeper has possession or control of a record that contains personal information, the individual concerned shall be entitled to have access to that record, except to the extent that the record-keeper is required or authorized to refuse to provide the individual with access to that record under the applicable provisions of any law of the Commonwealth that provides for access by persons... to...
2 Pages(500 words)Essay

Computer Science

...changes (Ambler et al., 2007). The next confront for the traditional Software Engineering is: How do we proffer effortlessness and visibility into SE actions? Incorporating and supporting the transparency and visibility in the Software Engineering is really hard and delicate (Williams et al., 2003). Agile Software Engineering makes use of and pays more stress on the teamwork and in-group collaboration. This attribute of the Agile Software Engineering makes it capable to counter this confront of the conventional Software Engineering. Next we have the challenge: How could software engineering reveals that it would be able to track paramount practices in management science? Software Engineering is more than a project...
10 Pages(2500 words)Essay

Computer Ethics

... Computer Ethics How has the Internet changed the notion of community standards for determining if material is legally obscene? Do you think the community standards criterion can be preserved on the Internet? If so, explain how. If not, explain why. The Internet has not changed the notion of community standards for determining if material is legally obscene, nor can community standards criterion be preserved on the Internet. These points will be proved in the forthcoming subsections. Even the Supreme Court had difficulty trying to figure out how community standards would determine illegally obscene material on the Internet. According to Marzilli (2004), “The Supreme Court considered the issue of how...
2 Pages(500 words)Essay

Computer Science

...COMPUTER SCIENCE Dos/DDos Dos attack ification is vital in understanding the attacked protocols so as to avoid the worms on suitable platforms. Over the last decades there has been no study on the DDos attacks and therefore there is not much understanding on the same. This is because there is insufficient data at the backscatter. According to Kumar, there are some articles that have scrutinized the hosts that have been contaminated with the worms. This has been done through examination of the structure and the properties of the worms. This has been instrumental in the classification.Mandia and Prosise categorized the DDos attack into three distinct groups. These groups include Destructive, Resource...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Computer Science: Professional Ethics Essay for FREE!

Contact Us