Cyber Ethic

In: Business and Management

Submitted By zaliliu
Words 3045
Pages 13
ISSUES AND CHALLENGES IN CYBER ETHICS

INTRODUCTION

According to Barquin (1992), cyber ethic guidelines consist of Ten Commandments which are: (1) Thou shall not use a computer to harm others, (2) Thou shall not interfere with others computer work (3) Thou shall not snoop around in others computers files, (4) Thou shall not use computer to steal, (5) Thou shall not to bare fall witness, (6) Thou shall not copy or use proprietary software you have not paid for, (7) Thou shall not use others computers resources without authorization or proper compensation, (8) Thou shall not appropriate other people’s intellectual property, (9) Thou shall think about the social consequences of the program you are writing or the system you are designing (10) Thou shall use a computer in ways that ensure consideration and respect for your fellow humans. These commandments or rules need to be obeyed by everyone who utilizes the cyber space facility in order to maintain the tranquility of cyber world. However, not everyone concern about these rules as we seen nowadays. In order to prevent plague from spreading and become worse in future, we have to identified the root cause of the problem and define how to solve it.

The first commandment explained that it is not ethical to harm another user by using computer and it is not limited to physical injuries but also harming or damaging other user data or files. It is unethical to create a programmed that deliberately allows someone to steal, copy, or gaining unauthorized access to others data. The waywardness to this commandment is the main reason why unethical behavior such as hacking, spamming, cyber bullying and phishing occurs in our society.


The creation of computer viruses, which are purposely to harm useful computer program or interfere with the normal function of the computers, is unethical practice in cyber world ad…...

Similar Documents

Business Ethic

... | | | | | | | |Assignment number |Mid-Test |Due date |11 September 2012 | | | |Assignment title/topic/case |Business Ethic & Law Mid-Term Examination | | | |Assignment type (choose one) | | | |(() |Midterm Exam | | | |() |Final Exam | | | |() |Individual Assignment | | | |() |Group Assignment | | | |() |Other | | | | | ......

Words: 3096 - Pages: 13

Ethic

... bankrupt and disappeared. In the case of Enron, we saw the weakness of human beings. The executives of Enron are really smart guys, but they destroyed the fortune they built in 16 years and also hurt many investors. The fundamental cause of this disaster is that they lack the idea of the business ethic and ethical priciples. Therefore, when the executives encounter dilemmas, they chose the wrong way. The accountant needs to understand the intention of the rule or regulation and to interpret it in that light. All rules require interpretation to enable them to apply to specific situations and it is in the interpretation where ethical principles come into play to indicate what the ‘reasonable’ person would do in the specific situation and how an impartial observer would view what was done. (Cheffers and Pakaluk, 2005, pp. 29–36). To interpret rules effectively for the benefit of all those affected requires the accountant to have developed sound ethical judgment as well as sound technical skills. This applies equally to rules of ethics and to rules of disclosure and measurement. Focusing on yet another set of rules (ethical codes) is unlikely, by itself, to solve the problem. To be effective, the code of ethics needs to be reinforced by the accounting profession developing effective strategies that oblige its members to pay attention to and translate fundamental ethical principles into the choices they make in their accounting practices. Without undertaking such educational...

Words: 1370 - Pages: 6

Mcdonalds Ethic

...McDonalds Ethic What is Ethics in business? The term Ethics in business refers to the morals, values, and beliefs that a company believes is the right way to doing business. This involves the way they handle customers and the quality of product that is being offered. The first function of management is planning which lays the foundation for the remaining functions. Now what McDonald’s plan to do is be as healthy as possible. This new idea is their attempt to make a list items on their menu with low calories. The idea is to wage a war against overweight people while offering good food at low price. Organizing this plan is about the setup and how they are going to delegate the task of implement these new foods. Shipping to all the stores and surveying people to get ideas on what to put on their menu needs to be setup. Directing the subordinates and influencing their ideas on this war against obesity is the next step in McDonalds plan. The idea here is to get more and more people on board with the healthier side on McDonalds in order to produce hirer profits. Profits and the moral beliefs of Mounds are hoping to attract more and more investors who want to open stores in their home locations. Now the overall effect of McDonald’s war against bad foods needs to be monitored and watched. If the idea fails in the eyes of the people and these items are not being capitalized on then they will slip off the menus. McDonalds is trying to create a menu that attracts all but...

Words: 430 - Pages: 2

Business Ethic

... structures (characterized by chains of command, as in most business and government organizations) as part of the problem.  Democratization and decentralization of our institutions, they maintain, would help foster a similar attitude of cooperation with nature in place of the current emphasis on domination over it.  9. Deep Ecology/ ecological ethic Humans are deeply connected with nature. If humans identify with nature, then taking care of the natural world will become part of taking care of one's self. Nonhuman parts of the environment deserve to be preserved for their own shake, regardless of whether this benefits human beings. Human have duty not to harm them without sufficient serious reason. >> Argue anthropocentric views. 10. Distributive Justice If firm pollutes, its stockholder benefit because their firm doesnt absorb the external cost of pollution. Customer also receive the benefit. However, the bearing of external costs of pollution largerly by those who dont enjoy net benefit from the activity which produce pollution (Environmental injustice). Environmental racism: higher proportion of racial minorities are subject the pollution. Internalizing costs seems consistent with the demands of distributive justice, since the external costs of pollution are borne unequally (mainly by the poor) without justification; and also with the demands of retributive and compensatory justice which maintain that those who are responsible for and benefit from the......

Words: 10613 - Pages: 43

Business Ethic

... the care and concern towards others and treat others fairly. Leaders are credible because they are trustworthy and practice what they said. In an organisation, leaders implement or enhance the ethical knowledge of employees by communicating about ethics, provide ethical guidance and making the ethics message salient. In addition, they set clear and high ethical standards and to be followed by themselves and employees. And also use punishment and rewards to affect followers’ ethical behaviour. Employees always pay attention to how the others behave in an organisation and learn what is acceptable and unacceptable. 3.0 Discussion There have various theories to demonstrate the leadership role in business ethic. All of these have differences among them and each theory will apply to different circumstances. Transformational leadership theory is the leaders to motivate followers to achieve performance beyond expectations by transforming followers’ attitudes, beliefs, and values as opposed to simply gaining compliance (Bass,1985; Yukl, 1999a, 1999b). In which leadership involves an exchange relationship between leaders and followers (Rafferty, & Griffin, 2004). This theory had been discussed and modified in various researches for several years ago, and it is widely studied theory (Conger, 1999). This kind of theory had disadvantage, as leader use this theory will waste of time and will not so effective when accomplish a task, and leader must have a strong persuade power so...

Words: 5500 - Pages: 22

Cyber

... for second-year analysts, the bonus will dramatically increase for those second-years who demonstrate high performance. At this level, bonuses depend mostly on an analyst’s contribution, attitude, and work ethic, as opposed to the volume of business generated by the bankers with whom he or she works. Associates Customized for: Triston Francis (tfran@wharton.upenn.edu) SEO Online Career Library Much like analysts, associates hit the grindstone hard. Working 80- to 100 hour weeks, usually fresh out of top-tier MBA programs, associates stress over pitchbooks and models all night, become experts with financial modeling on Excel, and sometimes shake their heads wondering what the point is. Unlike analysts, however, associates more quickly become involved with clients and, most importantly, are not at the bottom of the totem pole. Associates quickly learn to play quarterback and hand-off menial modeling work and research projects to analysts. However, treatment from vice presidents and managing directors doesn’t necessarily improve for associates versus analysts, as bankers sometimes care more about the work getting done, and not about the guy or gal working away all night to complete it. Usually hailing directly from top business schools (sometimes law schools or other grad schools), associates often possess only a summer’s worth of experience in corporate finance, so they must start almost from the beginning. Associates who worked as analysts before grad school have a...

Words: 68989 - Pages: 276

Business Ethic

...1. Identify the nuggets from the two-day sessions of Business Ethics class and explain how would you apply those nuggets in your work place. ANSWER: Nuggets from the lecture Ethics defined as the study of right or wrong and as broadly as the general inquiry into what is good. Ethics examines the right or wrong within the context of moral duty. Business ethics is a form of applied ethic in business activity that examines ethical principle and moral or ethical problem that may occurred on business environment. It is applies to all business activity either to the conduct of individual or entire organization. Some business may have same issue related to the business ethic such as problem of product quality, transparency of the financial statement, environmental issues, human right, workplace quality and safety issue etc. In business a company shall create a regulation and code that will regulate the daily life and how business should perform in ethical way. Those we call it Code of Business ethic and Conduct. Code of business ethic and conduct for the company is very important to set up and regulate the life of company. It’s collection of principle in term how they believe and aims to live by. It is also reflected the corporate culture and its vision and mission of the company. How the code of conduct applied in Chevron which they call it “The Chevron Way”. The Chevron code of conduct built in line with their company’s vision and mission. Integrity is one of...

Words: 1419 - Pages: 6

Ethic

...Personal Ethical Statement T. Thorn GEN 200 August 21, 2013 Holliday Personal Ethical Statement This essay will illustrate my personal ethical statement. It will describe what I learned from the ethical lens inventory activity. How personal ethics is define in my life. How I would react to a situation with my personal ethics. The ethical lens inventory identified my preferred lens to be the rights and responsibility and relationship. This lens is the one that uses rational thinking, independence by following the rules and the same treatment no favoritism. My blind spot in this lens is I have a habit of trying to fix and control everything even when it is unnecessary. My strengths are that I believe that everyone should be treated fairly, able to problem solve for fairness and loyal. My weaknesses are I can be a judgmental, over ambitious, guilty if I can’t fix the situation and bossy. My values and behavior tend to conflict causing a personal confusion. (Ethic Game, 2013) I researched the definition of personal ethic is basic principles and values govern interactions among individuals. (Business Dictionary, 2013) My definition of personal ethics is my value and beliefs that help me decide my actions in moral situations. When particular situations occur I have the ability to make sound and fair decisions. If I feel that my point is correct that I will fight for my opinion or to get my point across. My overall definition is to give everyone a chance, consider......

Words: 348 - Pages: 2

Cyber Ethic

...ISSUES AND CHALLENGES IN CYBER ETHICS INTRODUCTION According to Barquin (1992), cyber ethic guidelines consist of Ten Commandments which are: (1) Thou shall not use a computer to harm others, (2) Thou shall not interfere with others computer work (3) Thou shall not snoop around in others computers files, (4) Thou shall not use computer to steal, (5) Thou shall not to bare fall witness, (6) Thou shall not copy or use proprietary software you have not paid for, (7) Thou shall not use others computers resources without authorization or proper compensation, (8) Thou shall not appropriate other people’s intellectual property, (9) Thou shall think about the social consequences of the program you are writing or the system you are designing (10) Thou shall use a computer in ways that ensure consideration and respect for your fellow humans. These commandments or rules need to be obeyed by everyone who utilizes the cyber space facility in order to maintain the tranquility of cyber world. However, not everyone concern about these rules as we seen nowadays. In order to prevent plague from spreading and become worse in future, we have to identified the root cause of the problem and define how to solve it. The first commandment explained that it is not ethical to harm another user by using computer and it is not limited to physical injuries but also harming or damaging other user data or files. It is unethical to create a programmed that deliberately allows someone to steal...

Words: 3045 - Pages: 13

Ethic Paper

... set up permanently over time to set how financial statements are prepared and presented (FASAB, 2010). All organizations that do the dealing with any type of financial data must act in accordance with GAAP standards so that outside creditors can view their financial statements with any difficulty. Corporate Ethics In all groups composed there is a corporate ethics committee or a set number of employees who work together to deal with the ethics of the organization. All organizations are different so normally corporate behavior is based mostly on the ethics of the corporation or organization. Most organizations focus on the organizations surroundings, social and human rights, and responsibilities when looking at what emotions the ethics have within the organization. The GAAP standards are combined into all corporations’ ethic policies and have reference to the way they handle all their financial guidelines cut out throughout the organization financial accountants. With some health care organizations operating differently and with different principles and techniques each needs to look at their own code of ethics when they grasp the corporation’s business affairs. Each organization, exercise the power of sight at ethics in different ways. One organization may not see that by making an offering of a few dollars on a piece of health care equipment or special supply a patient needs worth the ethics involved thou the lack of patient process.......

Words: 859 - Pages: 4

Cyber Security: Cyber Terrorism

...Introduction Cyber security refers to the practices and processes that are used in technologies such as networks, computers, information and programs from damages by unwarranted entities (Ahmad, Yunos & Sahib, 2012). There are different attacks towards technology which may distort information or be used to create tension in an organization. Information stored in computers has some level of privacy and this depends on the level of sensitivity that such information may have towards that organization. Business strategies, political discussions and government documents are some of the documents that require a higher degree of privacy. However, there are individuals who cause deliberate attacks on the information systems of organizations and governments in order to unlawfully access information or distort the meaning of such data. The intention of cyber attacks has led to the classification of these attacks into particular classes. For example, we have cyber bullying and cyber terrorism. Under cyber bullying, the attackers use technology to abuse and intimidate their targets. Cyber bullying has been common through the presence of the social media where an individual will use pseudo-accounts to publish half truths about others with a bid to embarrass them. On the other hand, cyber terrorism involves the use of technology to access vital government sites in order to cause harm and fear in the society through terrorism activities. Brunst (2010) indicates that cyber terrorist...

Words: 1810 - Pages: 8

Cyber

... CYBER WARFARE Student’s Name Institution of Affiliation CYBER WARFARE Cyber warfare is also commonly referred to as the cyber attack. It involves both the attacks and the counter cyber warfare. By definition, it is an intentional breaching of a person’s or community computer system with an intended to fraud money or steal knowledge from the system. Therefore, it involves manipulation of the computer systems, disabling or to wipe out the aggregate information contained in the system of equipment. It has thus been a stern challenge in the economic and national and the world security. As thus, it has become a primary concern for all business people protecting their ideas not to be leaked, in the military due to the protection of national security and also by the government which has to keep it a secret of all what is happening within it. The issue of the cyber attacks has not been one event but something that has occurred over time as a result of inventions and innovations by the governments and security agencies. It was triggered by the need to safeguard one's interests and at the same time keep secrets that if they leak the competitors or the enemies can use them against you. One of the periods that can be credited to giving birth to the period of developments that led to cyber attacks is 1918 all the way to 1939 whereby there was increased military revolution...

Words: 1263 - Pages: 6

Cyber

... that while you can use antivirus (anti-malware) software, this only mitigates part of the problem, which would be any additional viruses or Trojans downloaded to your system. If the system gets infected and you find your files become encrypted, the only safeguard is to have a clean backup from which you can pull clean data. (Ducklin, 2013) If you did the research, you might be able to “black hole” at least some of the domains through policies to modify the localhosts file in computer systems and add the black hole list to your proxy server (if you use one). As an added layer of defense, network administrators could try to resolve known domains to IP address blocking them at the perimeter to prevent actual communication with the command and control server(s) involved in passing the encryption keys. Also, if possible, “enable Inbound and Outbound inspection of HTTP, FTP, IMAP, SMTP, POP3, CIFS/NetBIOS and TCP Stream.”(Best Practices, 2014) User awareness training is the keystone to all of this: if you are not educating them, they will show you they are the weakest link in the chain. A multilateral defense strategy is necessary to defend against this and other threats as they evolve over time; if you aren’t vigilant in the cyber realm, you are as good as hacked. References Alert (TA13-309A). (2013, November 5). Retrieved June 24, 2015, from https://www.us-cert.gov/ncas/alerts/TA13-309A Best Practices to protect against CryptoWall and CryptoLocker (SW12434). (2014,......

Words: 833 - Pages: 4

Ethic

...Austin Gray Business Ethics BUS 390 April 05, 2016 Lived Code of Ethics For the past three months, I was involved in organizing an event called the China Form. This conference is designed to connect Brigham Young University students with international corporate leaders. In addition, our keynote speakers provided necessary training and workshops to help those who are interested in doing business in China. As a part of the leadership committee, I have many opportunities to apply my personal ethical codes. A part of my roles involved reporting all expenses to the Department of Education, and in return, they would provide the fund. We received 10,000 dollars and ended up spending only 8000 dollars. We were strictly told to return all the remaining budget to the Department. At the end of the China Form, several members proposed the idea to use a portion of the leftover budget to celebrate. Facing this ethical dilemma, I explained to our group that it would be unethical to use the budget for personal enjoyment. I believe it was the right thing to do. By following My code of ethic, I was able to develop better organizational, communication skills as I gave complete effort in doing my tasks. When I was tempted to procrastinate or unload work to other teammates, I was reminded of the importance of hardworking and accountability. On one occasion, our meeting got heated, and committee members started blaming each other for not doing their parts. As a way to demonstrate my......

Words: 282 - Pages: 2

Work Ethic

...The New Work Ethic BUS 309: Business Ethics The New Work Ethic It is becoming harder to find good work ethics in this day and time. A lot of employees view their job as one the worst jobs to be in. In the article that Sheehy wrote, “A new work ethic”, he describes his employees as having a carefree attitude. He writes about how many employees just want to go to their place of work, but actually do no work. Employers have said that it is becoming such a big issue in finding reliable employees with a drive and willingness to actually perform their job duties. Companies are trying to reintegrate that they need greatly devoted and dedicated people that love the job that they are doing and are willing to help with the continuing growth and profit of making the business a success. Sheehy talks about his employees having a do what you want and get away with what you can kind of attitude (Shaw, 2010). Sometime you could even see them slow down the pace of their tasks or even put it on hold so that someone other than them would have to finish the job at hand. Most of the employees were either upper or middle class college student that just saw the job as a way to make some extra cash. Their customer relations skills were getting rid of the customer as fast as possible and with hardly any effort. This made the integrity, reliability, quality and service of the business very poor. Many researchers fear that college students have no realistic concept of the term “a day’s...

Words: 1489 - Pages: 6