Premium Essay

Cis 324

In: Computers and Technology

Submitted By ismail2854
Words 1695
Pages 7
STRAYER UNIVERSITY

DR. MARK O AFOLABI

RESEARCH PAPER

WEEK 10

8/28/13

Explain computer ethics

Computers are special technology and they raise some special ethical issues. In this essay I will discuss what makes computers different from other technology and how this difference makes a difference in ethical considerations. In particular, I want to characterize computer ethics and show why this emerging field is both intellectually interesting and enormously important. On my view, computer ethics is the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology. I use the phrase "computer technology" because I take the subject matter of the field broadly to include computers and associated technology. For instance, I include concerns about software as well as hardware and concerns about networks connecting computers as well as computers themselves. A typical problem in computer ethics arises because there is a policy vacuum about how computer technology should be used. Computers provide us with new capabilities and these in turn give us new choices for action. Often, either no policies for conduct in these situations exist or existing policies seem inadequate. A central task of computer ethics is to determine what we should do in such cases, i.e., to formulate policies to guide our actions. Of course, some ethical situations confront us as individuals and some as a society. Computer ethics includes consideration of both personal and social policies for the ethical use of computer technology. Now it may seem that all that needs to be done is the mechanical application of an ethical theory to generate the appropriate policy. But this is usually not possible. A difficulty is that along with a policy vacuum there is often a conceptual vacuum....

Similar Documents

Premium Essay

Director

...he problem with Compaq is that they developed too much IT architecture using financial advisory, where R&D and openness keys to development and the culture, while ignoring the environment. Open communication and trust was barricaded and destroyed by ASK (financial IS). The workers were being motivated by fear, much like Geneen in Morgan’s Images Of Organization. From an IT architecture standpoint, numbers based on the finance division depicted the entire company, even the organizational structure. The organizational structure did not align with the IT architecture, and the culture did not align with it either. Morgan stated, “The division of labor characteristic of industrial societies creates a problem of integration, or what may be more accurately described as a problem of integration, or what may be more accurately described as a problem of “cultural management.”” Compaq started as a functional structure, changed into a divisional fairly soon and then back to functional. Culture was strongly emphasized over anything else. CASH stated, “The process encompassed a whole range of ideas, including (1) the rule of inclusion, (2) teamwork, (3) “working the issue,” and (4) consensus building.” The IS system at Compaq did allow the free-flow of information through email named “B-mail.” ASK was used for financial services so that the company could easily track orders, and know where it stood financially. The culture felt monitored by ASK operators since it “becomes responsible......

Words: 5841 - Pages: 24

Free Essay

Intellectual Property

...Intellectual Property: Protection WC Jones CIS 324 Computer Ethics Intellectual Property: Protection The two problems that I would most likely come across in my profession would be unauthorized copying and sharing. We live in a world where it only takes time for a code, security measure, or restriction to be hacked. I have come to terms that stopping it completely is next to impossible but I could put measures in place where it would take someone a very long time to figure out how to bypass protection in hopes of deterring people not to do so. The first measure would be to have registration and activation on software. This process would have the information of the owner and the machine that is installed on. Another thing to be considered is instead of making the physical disc I would distribute for sale online where customers would have a digital locker that would only give them permissions to install the program and not be able to make a copy. If there was a need to make physical disc it would have to run on a hardware dongle. Digidesign, the makers of ProTools uses this concept and calls it iLok. (support iLok, 2012) Digidesign’s iLok houses all of the customer’s authorizations and activation keys and needs to be connected in order to use software I believe these would be the steps to take in order to limit unauthorized copies and sharing. The hardware dongle would be a big key because even if the software was copied somehow it would prove to be......

Words: 285 - Pages: 2

Premium Essay

Errors, Risks, and Failures

...Errors, Risks, & Failures CIS 324-014 December 16, 2012 Errors, Risks, & Failures Errors, Risks, and Failures occur frequently in computer technology. Some of them are very simple, and others are catastrophic, costing money, time, and sometimes lives. Not all can be completely avoided, but through proper software and hardware design, development and testing, a great deal of them would be decreased. Planning and good software designs are crucial in producing a safe, functional, finished product. When you are building a large software project, you will usually be overwhelmed by the overall complexity. Humans are not good at managing complexity; they are good at finding creative solutions for problems of a specific scope. A basic strategy for reducing complexity to magageable units is to divide a system into parts that are more handy. As you divide the systems into components, and further, components into subcomponents, you will arrive at a level where the complexity is reduced to a single responsibility. (Peters, 2012) I think that if the company doing the development takes the time to really communicate with the customer and find out the specs of the project and then takes the time to devise a good design, it sets up the project to become successful. According to A Gift of Fire, some contributing factors causing computer system errors and failures include, not enough attention paid to possible safety hazards, interaction with physical......

Words: 316 - Pages: 2

Free Essay

Student

...XICN001 FUNDAMENTALS OF COLLEGE C 3.00 NEEDEVAL XICN002 ADVANCED MATHS 1 (ECONOMI 3.00 MA 1--XICN003 INTRODUCTION TO LAW OF EC 3.00 ECO 4--XICN004 MORAL CULTIVATION AND BAS 3.00 GEED2--XICN005 PE (1) 1.00 KHP 1--XICN006 MICRO-ECONOMICS 3.00 ECO 201 XICN007 COLLEGE CHINESE 2.00 GEED1--XICN008 ADVANCED MATHS 2 (ECONOMI 3.00 MA 123 XICN009 MANAGEMENT 3.00 MGT 301 XICN010 MACRO-ECONOMICS 2.00 ECO 202 XICN011 PRINCIPLE OF MARXISM 3.00 GEED2--XICN012 DATABASE APPLICATION 2.00 NEEDEVAL XICN013 PE (2) 1.00 KHP 1--XICN014 OUTLINE OF CHINESE MODERN 2.00 GEED2--Total 34.00 2011 Fall Semester Program: College of Business and Economics Bachelor of Science in Accounting Major: Pre-Accounting CRS NUM COURSE TITLE GRADE STA 210 INTRO TO STATISTICAL A REASONING CIS 110 COMP AND COM I B GLY 110 ENDANGERED PLANET INTR TO C ENVRNMNTL GEOL BIO 102 HUMAN ECOLOGY B ACC 201 FINANCIAL...

Words: 748 - Pages: 3

Free Essay

Compressor Controls

...Cas # 1 Travail présenté à la Faculté des sciences de l’administration à M. Donald Béliveau Université Laval Comme exigence partielle pour le cours MRK-6087 : Politique de prix Par Tébéreye Bâ 111 062 283 Arlette Gounouo 111 063 138 Félix Létourneau 909 331 414 Salomé Thériault 111 073 071 Le 18 septembre 2013 Question 1 : En utilisant un modèle, montrez de quelle façon la valeur économique pourrait être calculée pour ce produit. Veuillez faire toutes les hypothèses qui sont pertinentes. Pour estimer la valeur économique de notre produit, nous avons utilisé le modèle "Value-based pricing" proposé notamment par les auteurs Nagle, Hogan & Zale (2011). Cela consiste à identifier le prix de la meilleure alternative à notre produit, à évaluer tous les gains supplémentaires que procure le produit pour le consommateur, autant monétairement que psychologiquement, et finalement à soustraire les différenciations que ce dernier perçoit comme étant négatives. Dans notre cas, le produit offert est un système qui permet d’éviter une surtension des compresseurs qui pressurisent et dirigent le gaz vers les "pipelines". La valeur de notre produit est donc basée sur le fait qu’il diminue le risque (nombre) de surtensions. Ceci permet aux clients d'éviter des pertes de production potentielles et des coûts supplémentaires. Lorsqu’il n’y a aucun mécanisme de contrôle, on estime que par année, il y a 0.4 surtension mineure et 0.004 surtension......

Words: 2908 - Pages: 12

Premium Essay

Qnt/351: Quantitative Analysis for Business

...PROFESSIONAL DEVELOPMENT |3 |07/31/2001 | |08/28/2001 | |TIMOTHY COLLINS |A- | |  |MGT/330 | |MANAGEMENT: THEORY,PRACTICE, APPLICATION |3 |09/04/2001 | |10/02/2001 | |LEE HOFFMAN |A | |  |MGT/331 | |ORGANIZATIONAL BEHAVIOR |3 |10/09/2001 | |11/06/2001 | |NORMAN ANDROSS, II |A | |  |MGT/436 | |CRITICAL THINKING AND DECISION-MAKING |3 |02/12/2002 | |03/12/2002 | |ROBERT STRETCH |A- | |  |MKT/421 | |MARKETING |3 |05/28/2002 | |06/25/2002 | |BARBARA CHRONOWSKI |A- | |  |FIN/324 | |FINANCIAL ANALYSIS FOR MANAGERS I |3 |07/02/2002 | |07/30/2002 | |JOHN BUSHBY |B+ | |  |FIN/325 | |FINANCIAL ANALYSIS FOR MANAGERS II |3 |08/06/2002 | |09/03/2002 | |STEVEN HARRIS |A | |  |QNT/321 | |STATISTICS IN BUSINESS I |3 |09/12/2002 | |10/10/2002 | |DONALD STELL |B+ | |  |QNT/322 | |STATISTICS IN BUSINESS II |3 |10/17/2002 | |11/14/2002 | |DONALD STELL |A- | |  |ECO/360 | |ECONOMICS FOR BUSINESS I |3 |04/15/2004 | |05/13/2004 | |GEORGE SHARGHI |B+ | |  |MKT/438 | |PUBLIC RELATIONS |3 |05/20/2004 | |06/17/2004 | |BARBARA CHRONOWSKI |A | |  |CIS/319 | |COMPUTERS AND INFORMATION PROCESSING |3 |07/14/2004 | |08/11/2004 | |KENNETH POORMAN |A | |  |MGT/431 | |HUMAN RESOURCES MANAGEMENT |3 |08/31/2004 | |09/28/2004 | |MICHAEL REILLY |A | |  |MGT/448 | |GLOBAL BUSINESS STRATEGIES |3 |01/11/2005 | |02/08/2005 | |JAMES LANE |A | |  |MGT/449 | |QUALITY MANAGEMENT AND PRODUCTIVITY |3 |02/15/2005 | |03/15/2005 | |PAUL HENNESSY |A | |  |MGT/434 | |EMPLOYMENT LAW |3 |03/31/2005 | |04/28/2005 | |RICHARD RADOSH......

Words: 418 - Pages: 2

Premium Essay

Econ Project 1

...| | |Econ 545 Project 1 | |Situation A | | | |Drucinda Sexton | |9/10/2015 | Introduction Since I have just finished a course in Business Economics my niece Jenny has asked me advice on if she should become a doctor she felt I was the best person to ask advice about whether or not to pursue her career choice in becoming a doctor. She also wanted to get my opinion if she did become a doctor what demographic location in my experience should she look into. I wanted to provide her with the best possible information possible. This is the research I have found on this matter.......

Words: 1714 - Pages: 7

Free Essay

The Comparison of Large Websites Versus Small Websites

...CIS 324 | | Examples of Privacy Policies: The Comparison of Large Websites versus Small Websites | By | Arlene Mack | April 15, 2012 In this paper I will discuss and summarize the privacy policy for a large popular website, as well as summarize and discuss the privacy policy for a smaller website. I will discuss as a large website, is, money mutual or (moneymutual.com), a website that promotes same day, pay day loans by multiple financial lenders endorsed by Montel Williams. The privacy policy and practice of the websites that this privacy document links are reviewed and hosted by Trustee. This is in compliance with Trustee’s program requirements, including transparency. The parts of the Privacy Policy that are confusing to me, is the reference to the policy compliance being transparent to accountability and choice regarding the collection of people’s information; but it says the Trustee’s does not cover information that may be collected through downloadable software. Trustee, who defines itself as the independent party to accelerate online trust among consumers and organizations globally through its leading privacy Trustmark and innovative trust solutions; Trustee at the end of the privacy policy does say that it has the right to share, rent, sell or otherwise disclose your information with/ to third party in accordance with applicable laws; i.e. marketing services, and applications, email marketers, wireless services, or postal mailings. In my opinion......

Words: 678 - Pages: 3

Premium Essay

This Is Good

...Sign In  (Create a Free Personal Account)  | Subscribe Search Annals of Internal Medicine Advanced Search Register for Alerts Information for Authors Submit a Manuscript Home Current Issue All Issues Online First Collections In the Clinic Journal Club CME Audio & Video Authors 17 December 2013, Vol 159, No. 12> Advertisement Email Share Get Permissions Get Citation Figures Slideset (.ppt) PDF Reviews | 17 December 2013 Vitamin and Mineral Supplements in the Primary Prevention of Cardiovascular Disease and Cancer: An Updated Systematic Evidence Review for the U.S. Preventive Services Task Force FREE Stephen P. Fortmann, MD; Brittany U. Burda, MPH; Caitlyn A. Senger, MPH; Jennifer S. Lin, MD, MCR; and Evelyn P. Whitlock, MD, MPH [+] Article and Author Information See Also: Published Letter: Padayatty et al Published Letter: Dror et al Published Letter: Hemilä Published Letter: Bolland et al Published Letter: Fortmann et al Oral High-Dose Multivitamins and Minerals After Myocardial Infarction: A Randomized Trial Long-Term Multivitamin Supplementation and Cognitive Function in Men: A Randomized Trial Enough Is Enough: Stop Wasting Money on Vitamin and Mineral Supplements Ann Intern Med. 2013;159(12):824-834. doi:10.7326/0003-4819-159-12-20131217000729 Text Size: A Related Articles Filter By Topic > Vitamin, Mineral, and Multivitamin Supplements for the Primary Prevention of Cardiovascular Disease......

Words: 5120 - Pages: 21

Premium Essay

Ethics in Cyberspace

...Title: Ethics in Cyberspace Ethics in Cyberspace Chris Jones Strayer University CIS 324 Professor Luis ACEVEDO March 15, 2012 Ethics in Cyberspace What is Cyberspace? Cyberspace is a global community of people using computers in networks. For ensured functionality, virtual communities with Internet support depend on rules of conduct, likewise with any other society. Business people like librarians and information technologists must have matured knowledge about ethical issues for their companies’ welfare and to protect and mentor other users. What is ethics? Ethics is the art of determining what is good or right. It can also be defined as a way of life or general pattern, a set of rules of conduct or moral code. Ethical guidelines are based on values. The Association of Computing Machinery (ACM) is a national organization that has a developed statement of its values. ACM’s every member is expected to uphold the Code of Ethics and Professional Conduct which includes these morals: 1) contribute to society and human well-being 2) avoid harm to others 3) be honest and trustworthy 4) be fair and take action not to discriminate 5) honor property rights including copyrights and patents 6) give proper credit for intellectual property 7) respect the privacy of others 8) honor confidentiality. New moral issues occur due to the nature of electronic...

Words: 851 - Pages: 4

Premium Essay

Ethical Hacking

...Ethical Hacking – Is There Such A Thing? Alexander Nevermind Nelson Stewart, PhD CIS 324 December 9, 2011 ABSTRACT ------------------------------------------------- When someone hears the word hacker, many things come to mind. Bad, thief, terrorist, crook and unethical are some words that may be used to describe a hacker. The reputation of a hacker is well deserved as many company networks have been compromised with viruses and spyware causing untold millions in damage, the theft of sensitive consumer information such as Social Security numbers and financial data and the unauthorized access of classified government information. To combat these issues, many companies employ individuals called ethical hackers who, by their direction and supervision look for vulnerabilities in network systems. There are naysayers who bristle at the term “ethical hacker” saying that a hacker is a hacker but those who hold such views could be missing the point. These subjects will be discussed in detail later in the text. ------------------------------------------------- Is there such a thing as “Ethical Hacking?” Define ethical hacking and support an argument in favor or against the concept. Consider who might believe/use ethical hacking and discuss if hacking, even for the purpose of protecting human rights, is ethical. You should extend the paper beyond the topics suggested in the questions within the paper description. Ethical hacking does exist, in fact, companies...

Words: 904 - Pages: 4

Premium Essay

Standard

...apply, giving appropriate consideration to the cost of applying such technology within the period of time available to manufacturers and to noise, energy, and safety factors associated with the application of such technology." This chapter presents the technical analyses and information that form the basis of EPA's belief that the proposed emission standards are technically achievable accounting for all the above factors. 4.1 CI Recreational Marine The proposed emission standards CI recreational marine engines are summarized in the Executive Summary. We believe that manufacturers will be able to meet these standards using technology similar to that required for the commercial marine engine standards. This section discusses technology currently used on CI recreational marine engines and anticipated technology to meet the proposed standards. In addition, this section discusses the emission test procedures and not-to-exceed requirements. 4.1.1 Baseline Technology for CI Recreational Marine Engines We developed estimates of the current mix of technology for CI recreational marine engines based on data from the 1999 Power Systems Research (PSR) database and from conversations with marine manufacturers. Based on this information, we estimate that 97 percent of new marine engines are turbocharged, and 80% of these turbocharged engines use aftercooling. The majority of these engines are four-strokes, but about...

Words: 4514 - Pages: 19

Free Essay

Ovarian Cancer

...Ovarian Cancer Samantha Massoth BIO 342—Genetics April 15, 2013 Abstract Ovarian cancer is described as a malignant tumor located in the ovaries. Malignant tumors can invade only one or both ovaries. Malignant tumors can also shed cancerous cells from the original tumor and “seed” these shedding on the surface of tissues and organs near the ovaries. The final way for ovarian cancerous cells to move is through “spreading” (metastasis). This is done by the cancerous cells entering the lymphatic system and/or bloodstream to other organs in the body. Ovarian cancer has many risk factors such as non pregnancy, menopause, family history of cancer, personal history of cancer, and others. The studies in this paper were to discuss three major themes of ovarian cancer. The first theme is the screening process of people suspected to have ovarian cancer yet show no signs or symptoms of the disease. The capability of doctors to detect, diagnose, and treat ovarian cancer is researched in these studies. The second major theme is the general prevention of ovarian cancer mainly in women who are at high risk of the disease. The third major theme of ovarian cancer is the general treatment of ovarian cancer and the affects over the counter drugs have as treatment of the disease. Introduction: Cancer is a disease that affects the basic building block of tissues, the human cell. Cells will grow and divide to provide the body with new cells when......

Words: 3524 - Pages: 15

Free Essay

Ethical Hacking

...Ethical Hacking Computer Ethics – CIS 324 Dr. Nelson Stewart June 7, 2013 INTRODUCTION When most people hear the term “hacker” they think of an evil person committing crimes by hacking into their computers to steal, destroy and/or steal identities. This is so in some cases, but not all hackers are bad. Hackers are merely curious technically skilled individuals who gain unauthorized access to computers, networks of various companies, organizations and individuals. Good hackers are considered white hat hackers. They are the ones that are hired to break into systems as a way of testing the vulnerabilities and security issues that may be present in the computer system. Bad hackers are considered black hat hackers. They are the “evil” hackers, or should I say “crackers” who hack into systems to steal identities, information, crack into software programs and create nasty viruses. What is Ethical Hacking? Ethical hacking provides a way to determine the security of an information technology environment – at least from a technical point of view. As the name ethical hacking already tells, the idea has something to do with hacking. But what does “hacking” mean? The word hacking has two definitions. The first definition refers to the hobby/profession of working with computers. The second definition refers to breaking into computer systems. While the first definition is older and is still used by many computer enthusiasts (who refer to cyber-criminals as “crackers”),......

Words: 1280 - Pages: 6

Premium Essay

Phishing

...Phishing Jatarra Rodman Professor Romero CIS 324 November 15, 2013 Is it Legitimate? Today, the Internet plays a very important part in the lives of many people. Users are now able to bank online, shop online, apply for jobs online, and perform a number of other tasks that users decades ago were not able to do. Even though the Internet provides users with many conveniences, unfortunately, the Internet is also used to commit many crimes. Phishing is a very common method that thieves use to “steal personal information through spamming and other deceptive means” (“History”, n.d.). The first recorded phishing scam occurred with AOL users in the late 1990s, and was very successful, simply because users did not know any better. Once users became aware of such scams, security meaures were increased, but that did not stop thieves from becoming more creative. Today, the most common phishing scams consist of “an e-mail message [that] tells the victim to click on a link to what purport to be the Web site of a well-known bank or online company” (Baase, 2008). It has become increasingly important for Internet users to be alert and aware of the type of scams that are designed to steal information and potentially identities. Internet users that fall into phishing traps quickly become victims of identity theft and credit card fraud. On average, these scams cost individuals about $1200 (SonicWALL, 2012). To avoid these scams, Internet users should be extra careful when opening......

Words: 1415 - Pages: 6