Late last century, we saw the rapid rise of Information Technology, replacing erstwhile manufacturing based industrial societies into knowledge based ones. With this transformation came attendant risks and threats to security of information. This aspect of the new digital age…
Download file to see previous pages...
Organisations such as Association for Computer Machinery (ACM) and Australian Computer Society (ACS) are strong advocates of ethical practices by IT personnel and have laid out sets of recommendations. This essay will look at some of their codes and how they can have practical use in reducing clearly identified threats to computer systems.
At the outset, it is important to remember that almost any sort of business enterprise today will have a dedicated IT department. Hence the code of ethics laid down by ACM and ACS are applicable to IT personnel of such departments, irrespective of the business domain of the particular organisation. Some of the frequently occuring information security breaches are common for almost all businesses that are enabled by Information Technology. Broadly speaking, the term system security threats refers to “the acts or incidents that can and will affect the integrity of business systems, which in turn will affect the reliability and privacy of business data”. (Lin, 2006). Irrespective of the size of the organisation, the threat is persistent, and hence measures have to be undertaken to curb security breaches and ensure business continuity.
Beyond the commonly identified security threats such as Viruses, Spyware, Adware, etc, a major source of information leakage and misappropriation occurs due to the abuse/misuse of computer network by employees themselves. (Lin, 2006). Since IT personnel have privileged access to vital business information, it is often very tempting for them to misuse this privilege and undermine the prospects for their employers. Employees are also prone to using Internet connectivity for their personal use when in fact they were strictly meant for official use. For example while email and general Internet access are given to improve productivity, surveys have shown that employees (including IT personnel) use them for such activities as online-shopping, playing games, social
...Download file to see next pagesRead More
Cite this document
(“Associations such as the ACM and the Australian Computer Society have Essay”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1570894-associations-such-as-the-acm-and-the-australian-computer-society-have-developed-code-of-ethics-for-computing-professionals
(Associations Such As the ACM and the Australian Computer Society Have Essay)
“Associations Such As the ACM and the Australian Computer Society Have Essay”, n.d. https://studentshare.org/miscellaneous/1570894-associations-such-as-the-acm-and-the-australian-computer-society-have-developed-code-of-ethics-for-computing-professionals.
This is to the detriment of society and its values. Since the application of computers is widespread, its use and application in juvenile practices is also vast. With the evolution of computer use in our society, the storage of most of people’s has become digitalized.
The sections below discuss the points of similarity and difference between the two codes of ethics, with a special emphasis on issues of patient autonomy and paternalism. Points of Comparison The code of ethics for elder care stress five core values of integrity, loyalty and responsibility, promoting benefit and avoiding harm, respect for clients’ rights and dignity, and justice (Care Manager, 2012).
89). The IEEE-CS/ACM Software Engineering Code of Ethics and Professional Practice - often abbreviated as IEEE-CS/ACM SECEPP provides the basis for ethical and professional responsibility of software engineers (Gotterbarn & Rogerson 1997, p. 89). This paper will explore the day-to-day occupational framework for computer professional in the context of the IEEE-CS/ACM SECEPP.
This makes are always there in the society but there ways in which they can be solved. Everyone in the society live according to the social norms that have been established by the ancient leaders. These norms ensure that everyone in the society live in peace.
This means that computing is a very integral part of the world today and it is responsible for the developments that have been noted in various areas of the world and this include such areas as development in economic terms, industrial development in many countries and also elevating the efficiency of communication.
Yet, the more that these professionals become more in demand in the market, the more that they need to be taught of the different issues concerning their ethical practices, with which one of the major issues would be the thin line that divides what is perceived to be right and wrong with the use of technology.
The Dell's direct business model enables the PC maker to directly sell its computers to customers in a lower value with great support. Dell's innovation from simple desktop PC expanded to various high-end desktop models, notebooks, servers, storage systems, multimedia, and more.
Even the World-Wide Web is a direct result of HCI research that utilized the hypertext technology to allow users to traverse a link across the world by clicking on a link.
The objective of this essay is to firstly cover the processes and methodologies used in designing interfaces.
ons, for example in universities and professional associations, not one has negated the immorality of lying and deception in the professions; telling the truth has been always the maxim (Gert 1988, cited in Berreman 2003, p. 98) making the profession and the practitioners more
It is used in both private and government hospitals as most patients prefer it to human surgery. The use of the modern equipment requires privacy and only the doctor in charge of the surgery should access information from the
4 Pages(1000 words)Research Paper
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Essay on topic Associations such as the ACM and the Australian Computer Society have developed code of ethics for computing professionals for FREE!