• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Ethics and professionalism in computing - examples from Facebook and Google

Extracts from this document...

Introduction

Ethics and Professionalism in Computing

DC201

Facebook and Google

Name:

Gaffar Rahmadi Achda

2012

Table of Contents

Content

Abstrak………………………………………………………………………………….        3

Introduction…………………………………………………………………………..        3

Property….…………………………………………………………………………….        3

Privacy…………………………………………………………………………………..        4

Anonymity…………………………………………………………………………….        5

Liability………………………………………………………………………………….        7

Security………………………………………………………………………………….        8

Regulation……………………………………………………………………………..        9

Access and equity………………………………………………………………….        11

Conclusion……………………………………………………………………………..        11

References…………………………………………………………………………….        12

ABSTRACT

All organization who work with computers have to create system and codes of conduct that ensure, as much as possible, that business activities are undertaken ethically. This assessment will outline about the organzational and system in place to ensure that the ethical issues of the following are addressed.

INTRODUCTION

Facebook and Google are two of the famous online organization around the world. They grow big and bigger every day. Despite of that, Facebook and Google have ethical issues in their organization regarding of their policies. They try their best to decrease the problem about ethical issues with renew their policy every year. In 2007, Facebook made controversial issues regarding of their advertisement systems named Beacon. Beacon created considerable controversy soon after it was launched, due to privacy concerns. Beacon created considerable controversy soon after it was launched, due to privacy concerns. After 2 years operation, on September 21, 2009, Facebook announced that it would shut down the service. Since the controversy was shut down, Facebook always mantains their privacy policy to make it better for user.

  1. Property

FACEBOOK

Facebook is committed to protecting the intellectual property of third parties. On this page, rights holders will find information regarding how to report copyright and other intellectual property infringements by people posting content on Facebook and answers to some frequently asked questions regarding Facebook policies.

If you are concerned about the removal of your content, you may file a counter-notice. You can do so through the email notification you received, or in the warning at the top of your home page.

To report an infringement of a copyright or other intellectual property right (for example, trademark)

...read more.

Middle

According to the Anonymity problem, Facebook users must provide their real names and information. Here are some commitments user’s make to them relating to registering and maintaining the security of user account:

  1. You will not provide any false personal information on Facebook, or create an account for anyone other than yourself without permission.
  2. You will not create more than one personal profile.
  3. If we disable your account, you will not create another one without our permission.
  4. You will not use your personal profile for your own commercial gain (such as selling your status update to an advertiser).
  5. You will not use Facebook if you are under 13.
  6. You will not use Facebook if you are a convicted sex offender.
  7. You will keep your contact information accurate and up-to-date.
  8. You will not share your password, (or in the case of developers, your secret key), let anyone else access your account, or do anything else that might jeopardize the security of your account.
  9. You will not transfer your account (including any page or application you administer) to anyone without first getting our written permission.
  10. If you select a username for your account we reserve the right to remove or reclaim it if we believe appropriate (such as when a trademark owner complains about a username that does not closely relate to a user's actual name).
     

GOOGLE

Former Google CEO Eric Schmidt has also made this suggestion, calling online anonymity “dangerous” and predicting that governments will eventually “demand” that people use their names for all online activity.

But the proposal to tie real-world identities to online actions is a controversial one, with many privacy and free speech advocates countering that anonymity is necessary to protect dissidents and other individuals, such as sexual abuse victims.

...read more.

Conclusion

References

  1. http://www.thecre.com/ftcpd/?p=72. Lobbyists Want Fair Trade Regulation Of Facebook. September, 8th 2011
  2. http://www.huffingtonpost.com/2011/07/27/randi-zuckerberg-anonymity-online_n_910892.html.
  3. http://mashable.com/2011/11/29/facebook-privacy-poll/. November 30, 2011 by Brian Anthony Hernandez
  4. http://www.dynamicbusiness.com.au/legal/is-facebook-a-business-liability.html/2. MARCH 10, 2009.
  5. https://www.facebook.com/legal/copyright.php
  6. https://www.facebook.com/careers/perks.php
  7. http://en.wikipedia.org/wiki/Facebook#Privacy
  8. https://www.facebook.com/safety
  9. http://www.google.com/intl/en/policies/terms/
  10. http://www.thecre.com/ftcpd/?p=72. Lobbyists Want Fair Trade Regulation Of Facebook and Google. September, 8th 2011
  11. http://en.wikipedia.org/wiki/Google#Employees
  12. http://www.networkworld.com/community/blog/google-ceo-schmidt-no-anonymity-future-web. By Ms. Smith on Mon, 08/09/10 - 9:21pm.
  13. ^ Shinal, John (August 22, 2004). "Google IPO achieved its major goal: It's all about raising cash for the company and rewarding employees, early investors". San Francisco Chronicle (Hearst Communications, Inc.): p. J-1. Retrieved June 20, 2010.
  14. ^ La Monica, Paul R. (March 31, 2006). "Google leaders stick with $1 salary". Cable News Network. Retrieved June 20, 2010.
  15. ^ "Another Googler goes to Facebook: Sheryl Sandberg becomes new COO". Venture Beat. March 4, 2008. Retrieved March 31, 2008.
  16. ^ Moritz, Scott (March 4, 2008). "Top Google exec jumps to Facebook". Fortune. Retrieved March 31, 2008.
  17. ^ Liedtke, Michael (March 5, 2008). "Facebook Raids Google for Executive". Washington Post. Retrieved March 31, 2008.
  18. ^ "Netshops Inc. Appoints Ash ElDifrawi as Company's First Chief Marketing Officer". PR Newswire. March 26, 2008. Retrieved March 31, 2008.
  19. ^ "Google Announces Fourth Quarter and Fiscal Year 2010 Results and Management Changes". Investor.google.com. Retrieved 2011-04-25.
  20. ^ Mediratta, Bharat (October 21, 2007). "he Google Way: Give Engineers Room". The New York Times (The New York Times Company). Retrieved June 20, 2010.
  21. ^ Mayer, Marissa (speaker) (June 30, 2006). Marissa Mayer at Stanford University (Seminar). Martin Lafrance. Event occurs at 11:33. Retrieved June 20, 2010. "Fifty percent of what Google launched in the second half of 2005 actually got built out of 20% time."
  22. ^ "Google ranks number one on list of ideal employers". New York Post. Mar 22, 2011.
  23. ^ "The 100 Best Companies To Work For". Fortune 165 (2): 117. February 6, 2012.

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Marked by a teacher

    UK Copyright and File Sharing

    5 star(s)

    alone, but just a few months later, the Recording Industry Association of America (RIAA) filed a lawsuit against the company, and it was forced to shut down due to a court injunction. The legacy that Napster left behind was enormous.

  2. Marked by a teacher

    Cisc v risc. To begin this assignment , I will outline the definition ...

    The power design was brought about from the earlier cpu the 801 and this was classed as the first risc deisgn . the risc architecture is the basis for most of the work stations today and including the unix systems.

  1. Design a web based online Appointment System for vehicle service centres in town to ...

    or die ('Could not connect to the database.'); mysql_selectdb ($db_database) or die ('Could not select database.');//error msg // Seed the random number generator srand(); // Include functions include 'user_functions.php';?> register.php this script is to register the customer with the system.

  2. Project management and risk assessment

    A key lesson learned is that contractual obligations must be underpinned by recognition on all sides of the need for openness about risks identified and emerging. UNIVERSITY OF CAMBRIDGE C.A.P.S.A PROJECT The University of Cambridge developed a new accounting system that did not work for its first 6 weeks of operation.

  1. Management Information Systems plays a very important role in business. The purpose of ...

    Leverage IT investment in mass customization production processes. IT controlled production technology can facilitate collaborative, adaptive, transparent, or cosmetic customization. This flexibility can increase margins, increase customer satisfaction, and be a significant barrier to entry. 9. Leverage IT investment in computer aided design (1).

  2. Introduction to Internet Report- - creating a website

    color: #F1FCFF; margin-top: 10px; } #news p { background-color: #F1FCFF; padding: 15px; } <!--This is the setting for Random section table, size, color and pictures--> #recentwork { width: 243px; float: right; background-color: #FDFFFF; margin: 5px; margin-left: 0; border: 1px solid #A9B9BF; } #recentwork ul { list-style-type: none; } <!--Header 5

  1. The project explains various algorithms that are exercised to recognize the characters present on ...

    as mentioned in Table 3.2. This reference field is the confidence factor that tells the user that, this is the best match achieved from all the 36 characters and matching ratio gives the match between the two (plate characters and template characters)

  2. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    Another data flow present is Prescription, leading out of the process this identifies if a pet requires a prescribed treatment which is given to the external entity the client to give to the pet. * Process 1.4 labelled Process referral Details involves a number of happenings.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work