StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Ethical Teaching as a Solution to Computer Security Problems - Example

Cite this document
Summary
The paper 'Ethical Teaching as a Solution to Computer Security Problems" is a good example of an information technology report. This report describes was created in 2015 to raise awareness on the following issues: why software licensing is antisocial, whether ethical teaching is the solution to computer security problems, and whether the removal of the computer security measures would reduce the incidences of the computer fraud…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful

Extract of sample "Ethical Teaching as a Solution to Computer Security Problems"

ACCOUNTING SYSTEM INFORMATION REPORT by Student’s Name Code + Course Name Professor University City/State Date Table of Contents Table of Contents 2 Executive Summary 3 Introduction 3 Ethical Teaching as a Solution to Computer Security Problems 4 Removal of Computer Security Measures and Incidences of Fraud 5 Conclusion 5 Recommendations 6 References 6 Executive Summary This report describes was created in 2015 to raise awareness on the following issues: why software licensing is antisocial, whether ethical teaching is the solution to computer security problems, and whether the removal of the computer security measures would reduce the incidences of the computer fraud. The information presented herein is supported by adequate literature sources that demonstrate that indeed software licensing is antisocial and that ethical teaching could be the solution to computer security issues. Moreover, it explains why removal of computer security measures might reduce the incidences of fraud. The report also recommends that more software developers should abandon licensing in order to achieve greater impact and that there is need for greater collaboration among software developers in order to provide more effective computer security and fraud issues. Introduction Software is one of the essential components of a computer system. The non-tangible aspect interconnects different hardware and enables task performance. Ever since computers became more available to the public, software developers around the world have come up with different programs that execute different functions, thereby, increasing the importance of computer systems. In order to compensate and recognize the efforts of software developers, software licensing became one of the ways of achieving this. However, the reality is that licensing of software is antisocial and that there are better ways of making money from software development without limiting accessibility. Additionally, besides technical efforts, there are better ways of resolving computer security issues other than removing security measures in order to reduce computer fraud. Finally, educating professionals on computer security does appear to be one of the solutions to computer security issues. Licensing of software has turned out to be a lucrative business; however, there have been contention that it is an antisocial practice. Before arguing whether the action is antisocial or not it is important to recognize the effort and time that goes into the development of good software. If the conversation shifts towards this point of view then it becomes possible to ask the question whether licensing is the only way that software developers can make a living out of their trade. The simple answer is I believe that there are other ways to compensate and recognize software developers. There can be better alternatives to licensing, copyrighting, or entering into any other contract that limit usability to a selected few. Therefore, in simple terms, I believe that software licensing is antisocial for the following reasons. To begin with licensing compromises user’s ability to share and mutually engage other users in activities that promote greater cooperation within the programmers’ fraternity. This act is not only selfish but also creates avoidable innovation roadblocks in this field. The reality is that enhanced ability to exercise cooperation among software developers is likely to be more beneficial than restricting access. Thereby, engaging more collective efforts is more likely to result in more user-friendly programs and quick resolution of any resultant technical issues. Secondly, over the years, open source software has gained increased popularity, thereby, decreasing the financial gains of licensed software. According to Leslie et al (2008, p.9) more organizations are benefiting from open software than licensed ones. This demonstrates that the open software solutions offer better solutions compared to their licensed counterparts, consequently, bringing into focus the benefits of collaboration rather than exclusiveness or competition. Also concerning monetary benefits, Leslie(2008,p.10) points out that enterprising vendors of open source technologies have found innovative ways of earning an equally lucrative income from their programs as compared as that gotten from trade licenses. One of the arguments that deterrent from an action only inspires the desire to prove the contrary holds in the world of software engineering. Hackers enjoy the thrill and challenge posed by licensed software albeit to demonstrate their superiority or the inferiority of the program. Consequently, hacking becomes an unending cycle of show of might that leaves users exposed to unnecessary risks. Adopting open software eliminates this sense of exclusivity or importance, therefore, deterring hackers from focusing their efforts on exploiting the system’s vulnerabilities and instead focus on how to improve it. The act promotes collective learning and deters unethical practices. All these actions eliminate the associated antisocial practices in the field of software development. Lastly, software licensing is antisocial because it limits autonomy. By licensing software, the developers check other users’ liberty of action. It becomes difficult for people to make simple modifications that would improve performance. However, this does not mean that users should have absolute freedom that one can infringe on the liberties of others. To address this concern, Williams (2011, p.123) points that Stallman developed the General Public License (GPL) to address instances of abuse of freedoms. Ethical Teaching as a Solution to Computer Security Problems According to Bynum (2008), computer ethics refers to a set of professional ethics within the information technology sector that states out the code of conduct and practice standards that persons in this profession ought to adhere to. One of the topics many topics covered under this concept includes issues on authorized access, and intellectual property, whereby, actions such as software piracy are illegalized. To address these and other related challenges, several scholars are of the opinion that raising awareness about the ethics in the profession is one of the solutions to computer security problems. One of such scholars is Chakraborty and Chatterjee who note that at Curtin University the faculty recognized that computer security issues was a people problem that could be addressed through a comprehensive curriculum(2009,p.110). This approach focuses on helping professional to comprehend different ethical situations, theories, and principles in ethics with the objective of assisting the students to weigh situations and the correct ethical response. According to Chakraborty, and Chatterjee (2009, p. 111) one of the effective teaching strategies is allow students to engage in discussions derived from case studies highlighting different computer security issues. This approach enables students to understand the dynamics, perceptions, and consequences of unethical behavior within the computer security space. Kuzu (2009, p.17) also noted that training and education was one way of addressing issues related to computer security and essay. He concluded that many of the respondents from his study had cited that better information on computer security and related security issues would enable them well handle potential ethical scenarios. This assertion demonstrates that empowering students and professionals in computer related fields is likely to breed a generation of more morally conscious people who would promote and engage in desirable behaviors only. Weber et al (2011, p.26) also believes that the solution lies in education. However, he chooses to focus on informing the concerned parties about the legal consequences of a breach in privacy and other computer security issues. By doing so, it is hoped that persons will be deterred from engaging in unethical practices. Removal of Computer Security Measures and Incidences of Fraud The assertion of that the removal of security measures will reduce the incidence of computer fraud is a slope argument that is built on logical but fallacious reasoning. There is no evidence that shows that doing away with security measures will cause a reduction of computer frauds. This is because doing away with computer security measures addresses only one of possible reason why people engage in computer fraud, which may be the desire to demonstrate superiority over the system. Other motivators such as theft of private and confidential reasons cannot be addressed by the removal of computer security measures. Discontented staff can conduct computer fraud (Holton 2009, p. 855). Therefore, removing security measures only simplifies their task and offers no data security or protection to the affected parties. Thus, it is illogical to assume that the mere act of removing security measures can deter a disgruntled employee from committing computer fraud on the assumption that the person would know better than do that. Moreover, removing security measures only heightens the possibility of a virus attack on the system. Creators of virus programs do so with an objective to cause loss of information or interfere with access to date, and adopting lenient only makes it easier for virus attacks to occur. Conclusion The software business is big business; however, its impact on society is even greater than the monetary benefits that come along with it. Allowing open source software is definitely the best way to address the antisocial issues related to software licensing. The practice is not only selfish, but also it is impedes speedy resolution of technical issues, puts up unnecessary roadblocks to innovation, denies the end user autonomy and compromises users’ ability to freely engage with other users. These reasons depict the some of the reasons why software licensing is antisocial and why Stallman’s development of the General Public License was a critical step in making programs more accessible to people. Besides the antisocial relations, software developers constantly face computer threat issues and have technical measures such as including strict security measures. Educating professionals within the field on the ethical principles and perspectives on the issues is yet another complementary effort that addresses the issue. Several scholars have looked into the matter and they agree that empowering IT professionals with the right information increases the moral awareness of computer security as a computer ethics issue. Lastly, removing security measures is not the solution to reducing cases of fraud since the move only addresses one of the many motivators of computer fraud. Recommendations To curb antisocial practices in software development, it is crucial that software developers consider applying only for GLP licensing as it promotes accessibility to all while protecting the fundamental freedoms of users. Secondly, there is enough evidence that demonstrates that ethical teaching does solve security problems; therefore, it should be mandatory that all software developers attend such training. Thirdly, disregarding computer security measures does not reduce the incidences of computer fraud, therefore, more software developers ought to engage each other to come up with better security measures that deter fraud. References Chakraborty, S. K., & Chatterjee, S. R. (2009). Applied Ethics in Management Towards New Perspectives. Berlin, Heidelberg, Springer Berlin Heidelberg. http://dx.doi.org/10.1007/978-3-642-60151-4. Holton, C. (2009). Identifying disgruntled employee systems fraud risk through text mining: A simple solution for a multi-billion dollar problem. Decision Support Systems, 46(4), pp.853-864. Kuzu, A. (2015). Problems Related To Computer Ethics: Origins Of The Problems And Suggested Solutions. The Turkish Online Journal of Educational Technology, 8(2), pp.1-20. Leslie, N. (2008). Gartner's Top Predictions for IT Organizations and Users, 2008 and Beyond: Going Green and Self-Healing. Gatner Inc, pp.1-25. Terrell, B. (2014). "Computer and Information Ethics",. In: he Stanford Encyclopedia of Philosophy, 6th ed. \url{http://plato.stanford.edu/archives/win2014/entries/ethics-computer/. Weber, R. (2010). Internet of Things – New security and privacy challenges. Computer Law & Security Review, 26(1), pp.23-30. Williams, S. (2011). Free as in freedom: Richard Stallman's crusade for free software. Beijing, O'Reilly. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Ethical Teaching as a Solution to Computer Security Problems Report, n.d.)
Ethical Teaching as a Solution to Computer Security Problems Report. https://studentshare.org/information-technology/2084831-accounting-information-system-report
(Ethical Teaching As a Solution to Computer Security Problems Report)
Ethical Teaching As a Solution to Computer Security Problems Report. https://studentshare.org/information-technology/2084831-accounting-information-system-report.
“Ethical Teaching As a Solution to Computer Security Problems Report”. https://studentshare.org/information-technology/2084831-accounting-information-system-report.
  • Cited: 0 times

CHECK THESE SAMPLES OF Ethical Teaching as a Solution to Computer Security Problems

Internet Security Issues

The problems that are present particularly in the three areas require a little different type of ethical decisions.... The paper "Internet security Issues" discussed ethical issues of information systems connected on the Internet, session key protocols attacks and defense, simple distributed security infrastructure, group memberships & certificates, pros and cons of implementing cryptographic protocols, etc.... Modern computer technologies are utilized for assembling, storing, and communicating information....
11 Pages (2750 words) Term Paper

Computer Ethics and Professional Responsibility

They may consider that the chapter three is better than chapter two because of the presence of critical thinking, logical argument, and the problems with fallacious arguments.... To manage with this several works of different writers will be discussed in the paper such as 'computer ethics and professional responsibility', 'Ethics and Technology' and 'Leonardo's Laptop'.... This is regarding the computer communications and sciences.... The analysis and judgment combined with practicality will give a complete idea about computer ethics to readers....
6 Pages (1500 words) Annotated Bibliography

Computer Security Licensing

The paper "computer security Licensing" states that generally, computer users should be taught on the varied solutions to computer problems.... Users should, therefore, be taught the various computer security measures such as encryption of computer software to prevent and reduce fraud and fraud-related acts.... es, it is ethical and widely acknowledged learning the solutions to computer problems.... People should be trained and taught about computer problems so as to know what it is they should anticipate when using the devices (Tompsett 2009)....
6 Pages (1500 words) Essay

Computer Security Problems and Measures

The paper 'computer security problems and Measures' is a great example of an Information Technology Case Study.... The paper 'computer security problems and Measures' is a great example of an Information Technology Case Study.... The paper 'computer security problems and Measures' is a great example of an Information Technology Case Study.... This paper will analyze whether software licensing is antisocial, whether computer security problems can be solved by ethical teachings, and whether incidences of computer fraud can be reduced by the removal of computer security measures....
6 Pages (1500 words) Case Study

Challenge of Removing Computer Security and Encouraging Ethical Teaching

The paper "Challenge of Removing computer security and Encouraging Ethical Teaching" is a good example of an information technology report.... The paper "Challenge of Removing computer security and Encouraging Ethical Teaching" is a good example of an information technology report.... The paper "Challenge of Removing computer security and Encouraging Ethical Teaching" is a good example of an information technology report.... The question of whether fraud can be reduced through the removal of security measures has also been explored....
8 Pages (2000 words)

Software Licensing and Computer Frauds

This report firstly looks to present the point of whether software should be licensed or not which is followed by a mechanism of ethical teaching which will help to reduce security problems.... The report then deals with the issue and the manner in which reducing computer security will help to deal with computer frauds and finally some recommendations based on my personal view regarding the entire situation are provided.... The overall analysis will thereby help to understand the different facets of computer security and licensing and will help to understand the manner in which it impacts society....
6 Pages (1500 words) Assignment

Computer Security Measures and the Impact of Licensing to Sharing of Information

One cannot be so sure that ethical teaching is the solution to computer security challenges.... he majority of systems consultants and security experts see ethical teaching as a vital solution to most security problems.... mpact of ethical teaching on computer security problems ... To some extent, ethical teaching can reduce computer security problems to users who are still young but cannot eliminate completely the incidents of fraud....
6 Pages (1500 words)

Cyber Ethics for Business

The paper "Cyber Ethics for Business" is an outstanding example of an information technology essay.... This research work deals with issues concerning cyber ethics pertaining to businesses, as well as individuals.... In the present global era, cybersecurity is of great importance for businesses and individuals....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us