• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Science Info-Age & Ethics

Extracts from this document...

Introduction

Computer Science Info-Age & Ethics New times bring new crimes. It's a story as old as humanity and as new as the Internet. First come cars, and then car thieves. Telephones are followed by telephone fraud. Now we've got computers . . .. To make home, school, and office life easier, society relies on computers. As a result of this dependency, computer use grows everyday. Along with the growing use of computers comes widespread computer crime. With the Internet becoming increasingly popular, more and more people are becoming computer literate, and networks are becoming more readily accessible. The rise in computer crime can easily be blamed upon the increasing number of users. The Internet is widely deemed as a new community. Either way you look at it, the Internet offers cover for con artists and plenty of places where larceny can lurk. The most common crimes committed via technology media are the same basic variations of the four main time-tested, real-world crimes: 1. Forgery (of E-mail) 2. Assault (on your Web site, E-mail box, or computer system) 3. ...read more.

Middle

Many can be found on underground Internet sites, discussion groups, or private bulleting boards on the web. A few sites I have mistakenly come across are: * Astalavista.com, * Illegalworld.com * Gamecopyworld.com * Cheathouse.com * Totally.net * Etc... the list goes on for ages. We must learn to respect patents and copyrights thus the 'intellectual property' of other professionals like us. Even though as student of computer science we may posses the knowledge to do some of the unethical situations mentioned, such as: * Produce viruses, Trojans, etc. * Pirate software or download copyrighted music. * Steal work or plagiarise work and pass it off as ours. * Hack or Crack security systems. * Etc... the list goes on. We must remember as educated individuals, ethics are just the factors that relate to principles and the honourable outcomes from a specific situation, whereas we as students must use our morals and distinguish between just and unjust circumstances, to do what is right not wrong... In this world of computer crimes, we student can be victims also!!! We must be aware of this and take measures to protect ourselves with, simple things such as privatising our e-mail by using anonymous remailers. ...read more.

Conclusion

This knowledge and the accompanying skills are critical for productive and constructive professional careers, as eventual BCS members at the end of our course's we must honor our morals and our profession thus. Conflicts of interest exist at all levels, institutional as well as personal, and we're in danger of forgetting how deleterious they are. One way of trying to avoid the issue is to pretend that it doesn't exist. Let me leave you with the thought that these issues are not other people's problems, they are our problem, and they are everyone's problem. If too many of us cut corners, then science can come to a dead stop. What JOBS in the computer world are ethically worthwhile, which evil, which OK but not very worthwhile? What job is REALLY WORTHWHILE in computing? Should people be allowed to use prewritten material to their benefit? Or should we respect the originality of those brilliant minds that created the highly sought after literary works in the first place? These are questions we must answer at University and especially when we leave and begin work in the real world. BAD uses of computer skills such as virus writing and cracking to cause damage are not ethical. ?? ?? ?? ?? Words: 1181 Page 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

4 star(s)

Response to the question

In summary the report is quite good. The student clearly shows that there have a detailed understanding of how computers can be accessed by hackers and similar people. However some of their bullet-points could be explained, which would give them ...

Read full review

Response to the question

In summary the report is quite good. The student clearly shows that there have a detailed understanding of how computers can be accessed by hackers and similar people. However some of their bullet-points could be explained, which would give them high marks. The report's opening paragraph is quite good, and describes how the use of computers causes an upward trend in crime. However the student has listed four different crimes that certain people are undertaking. The bullet point 4, is in-correct, as this states 'theft of valuable information'. The report should re-place the word to 'data', as data is valuable and this may include credit/debit card details, consumer's delivery address, etc.

Level of analysis

The report states six common types of computer attacks. The student could describe a little regrading each bullet point. The report could include 'A hacker may want to hack into a business, to acquire their supplier's list, which may be beneficial to other business or person'. By explaining in-depth regrading these points, this would show the examiner that the student understands the reason to why a hacker may target the six given examples. The student has stated how patents could be acquired by a number of companies/people, although didn't state what this means for the victim. As this could bankrupt a company, by costing the company too much in legal fees, and could cause a number of employee's to be unemployed due to this effect.

Quality of writing

The report states the term 'hacker', however the term is part in-correct and correct. The part were it states 'enjoy' may be in-correct, as some people may hack for a financial benefit, but may not enjoy the work due to it's unethical. I believe that the student is a little confused over what an 'hacker' and an 'cracker' are, and this should be corrected within the report.


Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 01/03/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    the time and money constraints, then I shall proceed to the analysis stage. During the analysis stage, I will investigate in detail how the current system operates, its strengths and weaknesses, what can be improved and what will be required of the new system.

  2. Marked by a teacher

    I have been asked to create an ICT solution for a local events and ...

    This would be created in a database type format as it will improve functionality and accessibility and prevent errors and allow for alterations to be made. Identifying Clients, Users and Audience for a company Traditionally a client in terms

  1. The Impact of Mobile Phones on social Interaction

    I therefore feel that these three objectives combined will allow me to gain a good understanding of the impact of mobile phones on social interaction and allow me to form appropriate conclusions. Similarly, they will allow me to make recommendations on how to maintain the balance of social interaction in the face of the growth in mobile phone technology.

  2. Threats to Data

    Threats from outside the Organisation Threats from outside the organisation tend to be mainly from hackers. These are people who try to get into someone else's computer. There are four major types of hackers: The first type of hacker do it mainly to show people that they can and do

  1. Communications Technology - Assignment 1

    Each of these binary digits (bits) makes one byte because there are 8 bits in a byte (the 0 column does not count as one). Before being transmitted, bit sequences are also given a source and destination IP address so they know where they are going and who has sent them.

  2. A2 ICT CouseWork

    She finally finished university with two Second-class Honours, lower division degrees. She has now accumulated a large portfolio including dozens of job's at the Age of 32 , and has developed many skills such as people skills, IT Skills and the dedication to stick to a job.

  1. Using examples, discuss the advantages/disadvantages of proportional representation systems compared to the ‘first past ...

    However, STV cannot guarantee a proportional result nationally and the result depends on the size of constituencies, which must be large and uniform multi-member seats for true proportionality. A commission set up by the Hansard Society in 1976 pointed out that Britain's population is too great (Hain 1986).

  2. What is Non-verbal (NVC) Communication?

    Non-verbal signals are more acceptable, though these too may be misleading. "...the mind of the hearer is just as active in transforming and creating as the mind of the speaker." (Moore and Carling 1982 p145) What is language? Language is "the institution whereby humans communicate and interact with each other by means of habitually used oral-auditory arbitrary symbols."

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work