Premium Essay

Computers and Ethics

In:

Submitted By dmsmorris
Words 1532
Pages 7
Social Networking

Danielle Morris
Professor Virginia Booth
INF 103: Computer Literacy
April 16, 2014

Communication is an inevitable occurrence in life and is vital to building and maintaining relationships. Individuals typically interact with family, friends, and colleagues regularly. Previously, landline phones and postal mail were popular methods of communication that individuals and businesses relied on. These venues were used to relay information, engage in transactions, and keep in touch with friends and family. As technology advanced, new and innovate ways of communication emerged. Today, one popular means of communication is that of social networking. A social network can be a group of friends, colleagues, or other personal contacts that a person interacts with. While many benefits of social networking have been identified, there are also consequences that have emerged.
Individuals of social networking groups typically share commonalities that create a bond between them. One of the most popular social networks is a site called Facebook. Here, individuals can stay in contact with friends, family, and even create business pages where they can advertise products and services. Individuals typically use Facebook as a means to stay in touch with friends and family, and update others on the changes and happenings of their life. Originally, Facebook was created with the intent of allowing college students the ability to interact with one another. It was a site where students could rate professors, share their experiences, and encourage one another throughout their collegiate journey. Soon, the site blossomed into a network where individuals could find old friends, long-distanced family members, and others who shared their likes or views. A newer, popular social network that has emerged is LinkedIn; a social network where individuals can advertise their

Similar Documents

Free Essay

Computer Ethics

...Computer Ethics Jason Hall CIS 324 Professor Pride December 4, 2010 Abstract As advancements in technology become more widespread, so do the ethical issues that come with these advancements. Computer ethics boils down to a “what is right and what is wrong” mentality. While one person’s view on computer ethics may differ from another person’s view, one basic idea should always be kept in mind when making ethical decisions, “Do unto others as you would have done to you.” If everyone obeyed this “golden rule” we would not have nearly as many issues with computer ethics. To better understand some of the computer ethics issues surrounding us today, I will explore the ethical issues dealing with software and social networking sites that have plagued the cyber world in recent years. Software Issues Ethical use of software is overlooked by many. Purchasing software does not mean that one owns the software and can use it anyway they want. You do not own the software. The only thing purchased in this case is a license to use the software. Upon using the purchased software, the purchaser accepts the terms and conditions that apply. By accepting the terms of the copyrighted material, one is agreeing not to use the software for anything other then the intended use and not to make and distribute copies to others who have not paid for the license. The only exception for making copies of software is for backup purposes. This type of exception is...

Words: 1697 - Pages: 7

Premium Essay

Computer Ethics

...Computer Ethics-NDex Danielle E. Maire-Jackson IS535ON: Managerial Applications of Information Technology 12-5-10 Professor McElyea TABLE OF CONTENTS I. Definition of Computer Ethics 3 II. Background of NDex 4 III. Discussion of Business Issues 5 IV. Proposed Solution 6 V. Recommendations for the Executive Committee 8 VI. References 11 I. DEFINITION OF COMPUTER ETHICS “Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society”. (Brotman, 2001). Ethics vary from one individual to another. Laws are written rules that govern. Ethics and information services have become very important. Computer ethics are key in today's modernized world. Social rights and the computer. This is really saying or giving you rights. For example, right to privacy. This allows your personal information to be kept just what it is, personal. Right to computer access, right to computer skills, etc. (Gorniak-Kocikowska, 1996). Code of ethics states what conduct is allowed and what is not allowed. There must always be a plan on how to maintain ethical practices in the business world. Many times people have valuable information to be stored into computer systems and therefore we...

Words: 2376 - Pages: 10

Premium Essay

Computer Ethics

...Computer ethics Computer ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. The term "computer ethics" was first coined by Walter Maner in the mid-1970s, but only since the 1990s has it started being integrated into professional development programs in academic settings. The conceptual foundations of computer ethics are investigated by information ethics, a branch of philosophical ethics established by Luciano Floridi. Computer ethics is a very important topic in computer applications. The importance of computer ethics increased through the 1990s. With the growth of the Internet, privacy issues as well as concerns regarding computing technologies such as spyware and web browser cookies have called into question ethical behavior in technology. Identifying issues Identifying ethical issues as they arise, as well as defining how to deal with them, has traditionally been problematic in computer ethics. Some have argued against the idea of computer ethics as a whole. However, Collins and Miller proposed a method of identifying issues in computer ethics in their Paramedic Ethics model. The model is a data-centered view of judging ethical issues, involving the gathering, analysis, negotiation, and judging of data about the issue. In solving problems relating to ethical issues, Davis proposed a unique problem-solving method. In Davis's model, the ethical problem is stated, facts...

Words: 6774 - Pages: 28

Free Essay

Computer Ethics

...Computer Ethics Angel L Rivera CIS106020VA016-1146-001 (Intro to Info Technology) Prof MERRITT, JENNIFER 8.7.2014 1-Describe two (2) potential computer ethics issues associated with holding computers hostage. A- Computer Crime: Attacks on Software through Back Doors or Trojan Horses- The intruder creates a malicious code just like they would to create other types of malware. The code is specifically designed to take control of your computer and then hijack all of your files. The files are then placed in an encrypted format so you no longer have access to them. B- Computer Crime: Attacks on People - Sabotage/Destruction of Data
-If you fail to pay, the intruder is capable of creating additional malicious code that will destroy the content of your PC a little bit at a time until you pay up. Another type of ransomware presents itself in the form of a Trojan, which scans all of your PC's directories and drives, and then automatically encrypts all of your files so you cannot access them. The Trojan places the finishing touch on the intrusion by leaving a ransom note. 2-Propose two (2) methods that computer users could use to prevent this type of attack. A- Your best defense is to not click on e-mail attachments from unknown sources and avoid clicking anything in a pop up window that you receive while browsing the Internet. B- Make sure your anti-malware software has the latest and greatest definition files so that it is prepared for the current batch...

Words: 512 - Pages: 3

Free Essay

Computer Ethics

...1. Thou shall not use a computer to harm other people. Example: A person should do something which could cause any type of harm to others like cyber bullying, publishing false information about a person, harassment, etc. 2. Thou shall not interfere with other people's computer work. Example: I believe this could mean two things - the first one being that one should not develop programs or systems which could cause damage to a persons computer and disable it from fully functioning, such as malicious viruses and spreading them. Secondly, this commandment could mean that a person should not modify a persons work and shouldn't snoop around in it. 3. Thou shall not snoop around in other people's computer files. Example: If a person is logged into a website and you happen to be using the computer, it would be polite to log out. Also, one should never browse through a persons email, data and/or files (pictures, documents, etc.) without exclusive permission from the other person whom it belongs to. 4. Thou shall not use a computer to steal. Example: Although unethical, it is also unlawful to steal in any way shape, form or fashion. This would include, computer-hacking with the intent of secretly collecting personal information or running scams in order to benefit while conning the victim. Piracy is also a form of stealing which should be avoid. 5. Thou shall not use a computer to bear false witness. Example: To “bear false witness” is to lie, so a person should...

Words: 654 - Pages: 3

Premium Essay

Computer Ethics

...Commandments of Computer Ethics 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans. Exegesis * Commandment 1 Simply put: Do not use a computer in ways that may harm other people. Explanation: This commandment says that it is unethical to use a computer to harm another user. It is not limited to physical injury. It includes harming or corrupting other users' data or files. The commandment states that it is wrong to use a computer to steal someone's personal information. Manipulating or destroying files of other users is ethically wrong. It is unethical to write programs, which on execution lead to stealing, copying or gaining unauthorized access to other users' data. Being involved in practices like hacking, spamming, phishing or cyber bullying does not conform to computer ethics. * Commandment...

Words: 1766 - Pages: 8

Free Essay

Computer Ethics

...Computer Ethics and Cyber Crimes Computer ethics has become a vital and necessary aspect in the world today. With the growth of computer use and technology it is imperative that some standards and guidelines are set to protect the public. Today it is common that each household has multiple computers that is utilized by everyone in the household, including children. According to Wall, the term ‘cybercrime’ is widely used today to describe the crimes or harms that result from opportunities created by networked technologies. With the increase of user knowledge comes the increase potential for crimes committed with the use of technology. Cybercrimes can be committed without ever leaving the comfort of ones home and is getting harder to prevent. In this paper specific cybercrimes such as hacking, identify thief, embezzlement, and secure fraud will be analyzed. The one of the most common cybercrimes is hacking. Computer hacking is when someone gains access to another individual's or company's computer network without their knowledge or permission. There are several different types of hacking. Bluetooth hacking is one form. Bluetooth hacking is when the Java programming language is used to gain access to various cellular phones. For this process to work the phone that is targeted to be hacked must be able to support JSR-82, this is the official Java Bluetooth Application Programming Interface. The best way to prevent your phone from being hacked using a bluetooth is to set your...

Words: 1560 - Pages: 7

Premium Essay

Computer Ethics

...Privacy and Policy By Amanda Mullens Heales Computer Ethics 324 Professor Abedin May 2, 2012 Abstract Can we protect ourselves on the internet? Although the internet is a wonderful place to shop, explore and interact with other people we should always keep our guard up, to protect our privacy. Privacy and Policy Many services are very diverse, so sometimes additional terms or products may apply. Terms of Service for You Tube/Google states that using services do not give you ownership of any intellectual property rights in content you access. And you must obtain permission from its owner or are otherwise permitted by law. Many terms do not grant you the right to use any branding or logo’s used in services. Privacy policy for MySpace describes that use and sharing of personally identifiable information (PII). You must obtain written permission from the member directly. Profile information in a member profile is provided at his or her sole discretion. Facebook privacy states that you must respect others people’s rights. That member will not use Facebook copyrights or trademarks without written permission. Members are not allowed to infringe others peoples intellectual property rights. Or your account will be disabled. If you collect information from users including video, you must obtain their consent and must state clearly what information you are collecting and why. Facebook has changed its privacy policies making information more public...

Words: 261 - Pages: 2

Free Essay

Computer Ethics

...02/25/2014 SP14 CIS-PHI 3270 ETRA SHVETS VARGAS BYRNE PAPER 1 [Document subtitle] Computer Ethics Every day that passes society is becoming more and more dependent on technology, to the point where a majority of people cannot live without gadgets, such a smart phones or tablets. Technology is constantly changing, especially in the past decade, has made the lives of many individuals much more convenient, however it can come with a consequence. The usage of technology has become a key essential in the business world. Computers and cellphones have many applications that are convenient for the users, such as storage for music, school assignments, pictures, games, and many more. Keeping all this information available instantly requires some sort of storage device of platform. Flash drives, hard drives, and cloud storage are some of the most well know storage alternatives that are used. Due to advances in technology the usage of hard drives and flash drives has diminished because of the growing development and improvement of the cloud storage system. The usage of storage systems has been rapidly growing and has been predicted to continue increase during the upcoming years. Although the innovation of new storage systems brings many conveniences to its users, it is exploring new fields of technology in which many unanswered ethical questions have surfaced in society. “One of the first milestones for cloud computing was the arrival of Salesforce.com in 1999, which pioneered...

Words: 1912 - Pages: 8

Premium Essay

Computer Ethics

...How Facebook is Changing the United States Military Nathan Haselhorst CI3155 Computer Ethics 9 August 2013 Abstract This paper details how social media, specifically Facebook, has made an impact on the different branches of the United States military. Throughout the work, manuals, periodicals, news stories, and an interview with a Lieutenant General are used to distinguish the advantages and risks associated with social media as a whole, with an overwhelming reoccurrence of Facebook references. The ability to communicate around the world, whether a General’s speech becomes available to the public five minutes after he or she delivers it or just a service member telling their loved one “good night” from thousands of miles away, is the greatest attribute Facebook provides the military and its service members. With every great benefit comes a risks and Facebook is not immune to those risks; identity theft, loss of personal and operational information, and negative feedback to a leaders post are what drives the military crazy about Facebook. How Facebook is Changing the United States Military Since 1775, the members of the Armed Forces have held a respect amongst this country’s population. As time has passed and technology has evolved, the United States military has become more accessible, attractive, and engaging to the public. Facebook, the world’s largest social media website, has played a key role in recruiting, training, communicating and planning. Facebook...

Words: 2605 - Pages: 11

Premium Essay

Computer Ethics

...Google Street View Invasion of Privacy Gustavo Barraza Google Street View Invasion of Privacy The enthusiasm was evident in social networks by the entry of Google Street View. For many of us was practical for others this development can mean a violation of privacy. The pictures of house numbers, which are taken from doors and fences on its Street View mapping service, appear on Google’s websites. According to the article of Consumer Affairs Editor (Hall, 2012), campaign groups said that the use of pictures of real house numbers presents “serious” security issues, and accused the internet company of being “underhand and crude”. Earlier this year, a Frenchman shown urinating in his front yard on Google Street View sued the company already facing criticism over privacy policy changes, PC World reported. Other embarrassing moments captured by the cars' cameras include men entering adult-entertainment stores and a naked man emerging from the trunk of a car. In 2010, Google's cars also collected Wi-Fi data in several countries, prompting independent investigations, according to the Electronic Privacy Information Center. Information gathered included email passwords and content and device and network IDs related to private wireless networks (Poulnot, 2012). Not formal legal action against Google's street imagery has been filed yet. Hence, privacy law attorneys say taking pictures of public places is legal. "The law allows you to take a picture of anything you can see as long...

Words: 441 - Pages: 2

Premium Essay

Computer Ethics

...Introduction As an intern software developer for a retail bank, you have been tasked with developing use cases to support the ATM service. Body • Describe a use case, complete with typical and alternate courses, that documents the event of a bank customer withdrawing money from an ATM. Illustrate the use case using Visio or a similar product. This use case describes how the Bank Account Holder uses the ATM to withdraw money his/her bank account. The actors are the Account Holder and the bank. Some of the preconditions that already in us is that: (1) there is an active network connection to the Bank; and (2) the ATM has cash available. In this use case the basic flow of events consists of the following: (1) The Account Holder places card in card slot; (2) the system prompts Account Holder for PIN; (3) the Account Holder enters in PIN; (4)the system verifies the card and PIN are valid and prompts user to select a transaction; (5) the bank customer selects an account; (6) the Account Holder selects Withdrawal; (7) the system retrieves account information and prompts account holder for amount to withdraw; (8) the Account Holder enters the amount; (9) the system verifies that there is enough money in the account to support the withdrawal; (10) the system verifies there is enough cash in the machine to support the withdrawal and replies with a go/no go reply telling if the transaction is ok; (11) The system reduces the account by the amount requested and dispenses money to the...

Words: 822 - Pages: 4

Premium Essay

Computer Ethics

...People are increasingly sharing their lives online through social networking sites with little concern for who may be viewing their information. This has become an issue in current times and is up for debate based on the ethical issues associated with Social Media. People don’t realize joining a social network is like joining a community. As any community in real life, your business has a place in the community but should not invade one’s privacy. Social networking is one of the most popular methods apart from forum marketing that is available to Internet users today. Places like MySpace, Facebook, and twitter among others have gone from just social interaction spaces to a part time marketing program as well. With all this popularity, there are a few ethical issues that presents itself including cyber-bullying, stocking, destroyed relationships, and so on. A utilitarian perspective is looked to the expected outcomes or consequences of an act to determine whether or not that act is morally permissible. Being that social networking allows one to get connected with others and sometimes form meaningful relationships also includes some of the illegal and ethical activities like hacking and posting of threatening online messages that highlight possible harms of this service. For this reason, the social networks are now considered as a way of cyber-bullying and online-predation to attack the interest of a utilitarian. MySpace, FaceBook, and other sites have been the scene of cyber bullying...

Words: 282 - Pages: 2

Premium Essay

Computer Ethics

...Technology; friend or foe? There was certainly a time that the use of computer generated technology would have been a welcome relief to most crime scene investigators. The value of accuracy, eliminating most human error had value beyond words. Enter: technology that is as much a friend as it is a criminal. Technology and the brilliance it is made up of is only as good as the person utilizing it. On the flip side, it can also be as bad; incredibly harmful at best. When a crime has been committed, in this day in age, a computer is often the accomplice. That being said, the sooner the evidence within the computer accomplice is collected by the attending computer forensics specialists, the more likely the data that has been accessed, even if deleted, is remaining evidence on the computer; whether only in part or true to form detail. The longer the forensic team takes to collect this invaluable data, the more likely it is that the computer will overwrite key pieces of evidence, which would ultimately result in the prosecution or release of a potential criminal mind. Even partial data is extracted from the hard drive of the accomplice computer; it can still be very much useful in a prosecution, as partial data is also admissible in court today (Krehel, 2011). Securing the hard drive in the exact manner in which the computer has been found is absolutely vital to any forensic expert hoping to do their job with attention to detail and accuracy. This can be done by duplicating or...

Words: 691 - Pages: 3

Premium Essay

Computers and Ethics in the Workplace

...Computers and Ethics in the Workplace Executive Summary This paper discusses issues with ethics that have derived in the workplace as a result of the use of business computers. The definition of computer ethics is simple; they are a set of moral principles that intend to help with the regulation of the use of computers. Some common problems with computer ethics consist of privacy concerns, intellectual property rights, and the way computers have an effect on people. In other words, computer ethics refers to the ways people take ethical traditions and test, stretch, apply, negotiate and break in the realm of computer technology. As technology continues to evolve, there are a great deal of ethical issues and principles of behavior concerning privacy and accurateness for managerial leaders to deal with. In finding the issues of ethics that the Technology Age has brought to the workplace, organizations must be hands-on when it is time to highlight ethical use of technology by employees. Making sure that employees are knowledgeable on the proper policies the organization has on computer ethics. Promoting good computer ethics is a great way for companies to keep morale high and unnecessary issues from arising in the workplace. Introduction As technology like computers progresses, they will continue to contain a larger impact on people in today’s society. For that reason, computer ethics supports the how some debate on just how much influence computers need to have in human communication...

Words: 311 - Pages: 2