StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Ethical Perspectives Related to Computer Science - Coursework Example

Cite this document
Summary
The paper "Ethical Perspectives Related to Computer Science" describes that the software, hardware and firmware are of importance for technological advancement if they are maintained without the errors. The errors are often caused due to a lack of ethical concerns…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Ethical Perspectives Related to Computer Science
Read Text Preview

Extract of sample "Ethical Perspectives Related to Computer Science"

Computer Science & Ethics - Research & Analysis Paper INTRODUCTION Computer ethics can be termed as moral regulations that control the usage of the computers. In the modern world, professionals receive mixed ethical approach messages from various sections in the field of computer science. The ethicality of computer science rotates around the ownership of the intellectual property as well as unlawful usage of the software. It is witnessed that the maximum portion of companies budget is mainly spend on the software, amplifying the cost. Thus, in order to maximise the profit along with reducing the cost, steps such as copying the required software are often observed to be taken by concerned administrators. Purchasing of one single copy of the software can enable to form several copies of software reducing the cost effectively. This kind of activities significant hinders the ethics of computer science. Software piracy is a major issue as it affects the business, colleges and also students (DeRoos, n.d.). Software is a program that helps in running the hardware. It is also an operating system that facilitates in controlling the hardware. The software operates on disks and it is used in the memory when required. Software often incurs various errors which hamper the process of operations of a computer system. The software errors lead to the reduction of the quality and reduce the process of computing. The software errors bring about inconsistencies, time wastage as well as displays bugs i.e. disappearing of the cursors, misleading information and communication. These can be identified through the use of software error techniques (Netgear, 2014). Correspondingly, hardware is a type of electronic device which is physical in nature. The hardware error is associated with the breakdown of hardware constituents in the computer system. The hardware error is of two forms i.e. corrected errors and uncorrected errors. The source of any of hardware error essentially is its hardware units that create a hurdle in the operating system (Netgear, 2014; Microsoft, 2013). A blend of persistent memory and program code is known as firmware. In other words, it is a mix of software along with hardware. Firmware is accountable for the low level operations for the device to function. Without the firmware, the system becomes completely non-functional. The firmware errors affect the operating process, the security level and also the hardware. The firmware errors are reflected in the fax and emails and one of the common firmware errors is ‘900 firmware error’ (Netgear, 2014; Ganssle, 2004). THESIS STATEMENT The paper intends to evaluate different ethical perspectives related to computer science. It reflects the errors that cause the ethical issues such as hardware, software and firmware errors. The paper further evaluates the injuries as well as damages that the errors can cause in the field of computers. ERRORS IN SOFTWARE, FIRMWARE, AND HARDWARE Injuries and Damage. The software, firmware and the hardware errors cause various issues in the operations. The errors caused affect the business of a company at large as the programming of a company depends on the computer sciences for quick and easy assessment. The software errors are often caused due to the increase in the number of piracy. In the present day context, it is determined that the quality of software is decreasing and hence the software is becoming ineffective pertaining to the business operations. It is noticed that an error in the software increases the threat from viruses which affects the business operations. The damage caused due to the software errors would lead to the breakdown of the network causing the loss of the valuable data (Microsoft, 2013). Besides, any error of software causes issues related to functionality and loss of the data which might create a negative impact on the business. Software error causes negative impact on the business as it minimises the profit and increases the cost of the budget allocated. This causes financial loss and damage to the business. The networking process slows down due to the software error. This results in damage to the operations of the business due to the failure of the computers. Moreover, the software error also affects the hardware thus impacting the whole operations. The hardware errors can be caused in the hard disks. The damage in the hardware can materialise in the loss of data stored in the hard disk. Additionally, the error in the hardware leads to the crash of the hard disk which damages the organisation as the data of the business would be lost. On the other hand, the firmware error hampers the disks as it becomes unreadable and also damages the operating system which upsets the total process of the business on the basis of the computer management (Microsoft, 2013). Arithmetic Rounding. Arithmetic rounding is a technique wherein the computer converts the decimal number above 5 to a round up figure into a whole integer. The issue faced by the rounding is regarding the conversion of the number which is 1.5. Through the implementation of the arithmetic rounding the conversion is made to 2. This can create and provide an unrealistic view regarding the derived results. This rounding figure is of great relevance when the computer calculates the sales tax. The calculation regarding arithmetic rounding relates to the software error which creates an issue regarding the financial calculations. The error determined here is the rounding off of the numbers which are above 5. This causes an issue for the people involved in the financial institution as it does not reflect the correct accurate data of the finances. This can lead to biases in the use of numerical while making calculation in the Visual Basics for Applications (UIO 87-107). Race Conditions. It is a situation which is undesirable that is caused when the system tries to perform more operations simultaneously. This creates a problem in the operational performance as it creates an error. In the memory of the computer, a race condition might occur if the read along with the write command is received by the computer at a given time while computing large data hardware and software, error might occur. The computer might face crash, shutdown and error retrieving the old data which can lead to the loss of the organisations (1The Trustees of Princeton University, 2013). Memory Leaks. In terms of the domain of computer science, memory leak might occur when the memory is consumed by the computer programs but is unable to retrieve it back to the operating system. A leak in the memory can decline the level of performance of the computer by dropping the amount of the available memory. It affects the business to a large extent and impacts the operating system as it hinders working of the system (2The Trustees of Princeton University, 2013). Intel Microprocessor Floating Point Not IEEE Compliant. Intel Microprocessor floating point faced an ethical issue related to the failure of non-compliance of The Institute of Electrical and Electronics Engineers (IEEE). The reason for such failure can be due to the lack of personal obligation and highest ethical conducts. The ethical issue was caused due to failure of taking responsibility while making decisions in a safe manner. Inability to avoid the conflict of interests within the members along with providing honest as well as realistic claims based on the data was the other ethical issues. Moreover, the inability of the professionals in understanding technology, its applications and potential consequences was the other key reason behind the ethical failure (IEEE 1-3). Therac-25 System. The Therac 25 System is a radiography unit which faced a failure on the ethical ground. It was observed that a software engineering failure was the reason for the disaster. The faulty software engineering operation caused it to massively overdose people and affect their life to the extreme. The reason for the failure was due to the software issue faced by the company while inputting the instructions. The ethical failure was that due to the software error the i.e. “malfunction 54” an overdose or under dose was provided to the people causing severe issue to their life. The ethicality associated with this consequence is regarding the design of the software and the implementation of the software without following the engineering principles. Moreover, the codes provided were not tested before being administered causing a malfunction related issue. This scenario can be termed to raise an ethical failure as the code was not tested with the combination of required hardware and software (Leveson 1-49). Typical US Legal consequences, criminal and civil. The errors caused by hardware and software are common in the business environment. There are several cases that have taken place in the US legal environment due to such errors caused. Death or Serious Injury Medical malpractice law in United States saw legal issues regarding the death of a person due to the software error in the programing system. It is observed that a person faced death due to the malfunctioning error caused within the operation of radiography. The software failed in proper functioning and caused death. This created a legal scenario due to a lack of proper control and use of effective radiography products for the treatment (Rose, 1994). Financial Loss The case of Step-Saver Data Systems, Inc. v. Wyse Technology highlights financial losses due to the problem in software. In the case, defendant sold programs of the computers to the plaintiff. The plaintiff sold the software to the customers. It was noticed that the customer faced software errors due to the faulty system. Plaintiff was sued and hence had to face financial losses due to the error caused by the system (Quimbee, 2013). CONSEQUENCES OF AI, ROBOTICS, CYBERNETIC AUGMENTATION TO HUMANS Turing Machine AI Test. The turning machine test was developed in order to evaluate a question “Can machines Think.” The test was being used in order to assess the level of performance. Artificial Intelligence (AI) was pioneered by Alan Turing several years back. The motive of the test was to evaluate whether a computer program can replace an individual. The reason for such design was to create a difference between the human as well as the machine, who would be able to locate the variances. Artificial intelligence is part of computer science wherein the machines are created that would react like the human beings with the features such as speech recognition, learning and problem solving (Sharkey, 2012). The key shortcoming faced by the AI test was that can it be of intelligence in every aspect. It was of the opinion “that computer that fools a fool hardly proves the ability of the artificial intelligence” (Halpern 42-63). The other shortcoming faced was that the AI was not able to respond to all the situations in a sensible manner like the human being. If the AI not operated properly might lead to the destruction of the mass. Error in the programming might affect the functioning of the AI (Halpern 42-63). Chinese Room AI Test. The Chinese Room AI was termed by John Searle, who rejected the concept of “Strong Artificial Intelligence”. The Chinese room AI Test supports the weak intelligence which defines that it is a valuable device for simulating and learning mental process (Motzkin, 2014). The shortcoming faced by the Chinese room test is that it was misunderstood which created a false environment regarding the AI. The other shortcoming was that it projected that machine can think and the Chinese room AI test is of the view that formal computation on the basis of symbols can yield thoughts (Motzkin, 2014). Advantages of AI Mr. Data from Star Trek Example Data is a character portrayed in Star Trek. It is a robotics based constituent with artificial intelligence which was developed to make Mr. Data work similar to a human being. The advantage of the AI was that it made Mr. Data self-aware and a fully functional robot who can act as an officer. Moreover, due to the AI it acted with sentiments. Besides, it incurs few errors which helped in assisting in complex and stressful jobs at a fast rate. It also worked as a solving machine of the problems and also acted emotionally in relation to life (Clocksin 1-5). Dangers of AI Terminator Example AI is a part of the computer science and an intelligent machine as portrayed in Terminator. The capabilities of an AI robot are infinite and it can act for mass destruction which was reflected in the movie terminator. The disadvantage is that it at times moves out of the control of the human being and works irrationally. It does act as a threat to the life of the people as robots through the AI can create a negative environment due to the programming. If the AI based robots are given more power, it performs against the originator and causes destruction which is no more in the control of the human being to reduce the effects. Human Machine Hybrids (Cybernetic Organisms) Therapeutic Purposes Human Machine Hybrid is a system which is based on efficiency of the human operator in effective use of the machine. The intervention of both the human being as well as the machine together works for the effectiveness of the social wellbeing. Human Machine Hybrid is used for the therapeutic purpose to increase the accuracy level of the results and to replace the organism for the effective usage of human beings. The injuries regarding spinal cord along with paralysis can be effectively determined through the use of the human machine hybrids such as cybernetic organism and can be replaced. Through the use of the cybernetic organism, significant mechanism enhancement can be derived in the human body (Quinn and Bederson 1-4). Consequences and Benefits The consequences through the use of the hybrid machine are that it might lead to the availability of inaccurate data due to software error. In this respect, this error is caused during the functioning of the machine. This might lead to wrong treatment of a person. On the other hand, the key benefit derived is that it would provide a quick and accurate report regarding the injuries and help in delivering treatment at a faster pace. The effectiveness of the human beings would increase and the medical field would be cost effective due to a lack of the errors (Quinn and Bederson 1-4). Augmentation Purposes Such As The Addition Of Physical Capabilities Beyond What Is Possible For An Un Augmented Human Body, Perhaps To Create A "Super Soldier" Or A "Super Athlete" The purpose of human augmentation leads to several advantages of the people by providing them with physical capabilities beyond normal human body. The consequences thus faced by the people would be the presence of the foreign particles in the body creating problems such as severe diseases. Moreover, adding of external memory would lead to damage of the brain due to hardware and software error. The errors caused are due to a lack of the ethical prospect i.e. lack of control over the systems. The benefit derived through the use of the augmentation is that better quality and enhanced features would be provided to the people through the ethical use of the computer system. It is effective as it facilitates in providing better service and increased efficiency for the people. SOCIETAL CONSEQUENCES OF COMPUTER SCIENCE AND THE TECHNOLOGIES The societal consequences of computer science and the technologies have been accelerated in the recent scenario for the improvement of the society by following the ethics associated with computer sciences. The consequences of the deployment of computer sciences would increase the level of dependency of the people on the technology. Also, it will limit the value for human life due to improper use. The non-deployment of computer science on the other hand would lead to a hindrance in the development of the society as it would limit the use of e technology for the advancement. Arguments Made By McChesney Ethical Systems The ethical system stated by McChesney is related to the improvement of quality of life by implementing the digital concepts in the society. The system has been used as it contributed to the society and worked for the wellbeing of the human beings. The ethical concern related to the arguments is to avoid negative consequences affecting the people and the society. Moreover, the functioning of the system would be effective if it is abided by honesty and trust. The information technology (IT) must be used to provide fair actions in the society. It is also argued that the use of pirated software leads to the non-performance of the system in an ethical domain for the wellbeing of the society (ACM Council, 1992). Code Violations McChesney argues that the future of computer science depends on the ethical as well as the technical aspects. It is of importance to follow the code of principles to provide ethical performance through the use of the computer system. Adherence of the code is an intentional matter and should not be violated to reduce misconduct (ACM Council, 1992). CONCLUSION The paper has provided an insight towards the usefulness of computer science in the various fields of life. It is determined that at times it becomes difficult to adhere to computer ethical dimensions due to various system errors. The software, hardware and firmware are of importance for the technological advancement if they are maintained without the errors. The errors are often caused due to a lack of ethical concerns and thus create issues such as race condition. The field of computer science has exhibited a sustained level of technological advancement over the years in relation to the areas such as medical domain. However, due to certain errors related to software and hardware that might crop up it can be bring about uncalled-for errors in system. Thus, it can be concluded that it crucial to maintain software, hardware and firmware based systems in an error-free manner so that any undesired ethical and legal consequences do not emerge. Works Cited ACM Council. “ACM Code of Ethics and Professional Conduct.” Preamble. (1992): 1-8. Print. Clocksin, W.F. “Memory and Emotion in the Cognitive Architecture.” Documents. (2003): 1-5. Print. DeRoos, J.B. (n.d.). Ethics in Computer Science. Retrieved March 14, 2014, from the World Wide Web: http://home.messiah.edu/~deroos/personal/copy.htm Ganssle, J. (2004). The Firmware Handbook. UK: Newnes. Halpern, Mark. (2006). "The Trouble with the Turing Test." The New Atlantis 11 (2006): 42-63. Print. IEEE. “IEEE - IEEE Code of Ethics.” Template. (2010): 1-3. Print. Leveson, Nancy. “Medical devices: the therac- 25.” University of Washington (n.d.): 1-49. Print. Microsoft. (2013). Hardware Errors and Error Sources. Retrieved March 14, 2014, from the World Wide Web: http://msdn.microsoft.com/en-us/library/windows/hardware/ff559382(v=vs.85).aspx Motzkin, E. (2014). Artificial Intelligence and the Chinese Room: An Exchange. Retrieved March 14, 2014, from the World Wide Web: http://www.nybooks.com/articles/archives/1989/feb/16/artificial-intelligence-and-the-chinese-room-an-ex/ Netgear. (2014). Defining the Terms Driver, Firmware, Hardware, Software, and Utility. Retrieved March 14, 2014, from the World Wide Web: http://kb.netgear.com/app/answers/detail/a_id/1070/~/defining-the-terms-driver,-firmware,-hardware,-software,-and-utility Quimbee. (2013). Step-Saver Data Systems, Inc. V. Wyse Technology. Retrieved March 14, 2014, from the World Wide Web: https://www.quimbee.com/cases/step-saver-data-systems-inc-v-wyse-technology--2 Quinn, Alexander J. and Bederson, Benjamin B. “Human-Machine Hybrid Computation.” Paper (2011): 1-4. Print. Rose, B.W. (1994). Fatal Dose. Retrieved March 14, 2014, from the World Wide Web: http://www.ccnr.org/fatal_dose.html Sharkey, N. (2012). Alan Turing: The Experiment That Shaped Artificial Intelligence. Retrieved March 14, 2014, from the World Wide Web: http://www.bbc.com/news/technology-18475646 1The Trustees of Princeton University. (2013). Race Condition. Retrieved March 14, 2014, from the World Wide Web: https://www.princeton.edu/~achaney/tmve/wiki100k/docs/Race_condition.html 2The Trustees of Princeton University. (2013). Memory leak. Retrieved March 14, 2014, from the World Wide Web: http://www.princeton.edu/~achaney/tmve/wiki100k/docs/Memory_leak.html UIO. “Computer arithmetic and round-off errors.” Chapter 5 (n.d.): 87-107. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer science & ethics - research & analysis paper”, n.d.)
Retrieved from https://studentshare.org/information-technology/1633469-computer-science-ethics-research-analysis-paper
(Computer Science & Ethics - Research & Analysis Paper)
https://studentshare.org/information-technology/1633469-computer-science-ethics-research-analysis-paper.
“Computer Science & Ethics - Research & Analysis Paper”, n.d. https://studentshare.org/information-technology/1633469-computer-science-ethics-research-analysis-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Ethical Perspectives Related to Computer Science

Best Approach to Address Computer Technology Related Ethical Problems

Some of the main benefits of computer technology include advanced communications, scientific discovery, and quick information processing (Lietz, n.... The advancement in computer… However, computer technology has also given rise to many ethical problems, such as, helping people copy private information from computers of computer SCIENCES AND INFORMATION TECHNOLOGY goes here] s [Due the paper] Best Approach To Address computer Technology Related Ethical Problems“computer technology has improved our life style far better than before” (Hassan, 2010)....
2 Pages (500 words) Research Paper

Hacking: Definition, Types, and Facts

An example of a computer crime is use of various techniques to corrupt or compromise data stored in a computer system.... For the purpose of this paper, Hacking is defined to “unauthorized access to a computer network” (Kumar, 2012, P.... According to Kumar (2012), hacking can be stated as unauthorized intrusion; hence the act of gaining access to a computer network with an absence of legal authority.... However, it must be noted that not all hackers are bad (Kumar, 2012), since the government and some huge companies use hackers to maintain their computer network security in order (Rogers 1994)....
9 Pages (2250 words) Essay

Oracle Corporation: A Profile of Power, Influence, and Dominance

It deals mainly with the development and production of computer software and hardware.... It is the leading producer of computer software and it seeks to maintain this position through the strategies it adopts.... This essay analyzes the forms of interpersonal power used, how the forms of power used relate, whether the power is used effectively and the influence tactics used....
4 Pages (1000 words) Case Study

Ethical Principles of Home Depot

Boston: Springer science & Business Media.... The author examines the ethical principles of the Home Depot that ensures the growth of business operations.... In order to serve this mission, it has ethical principle governing the customer relationship.... nbsp; ethical Principles ethical Principles Overview Home depot has emerged to be a big organization with over 300,000 employees and operates in more than 2,200 stores in America....
2 Pages (500 words) Essay

Bad Impacts of Computers on People and Society

For example, usage of computers is relevant in academics and professional life as computercomputer usage has the benefit of connecting friends in spite of distance, increasing the efficiency of file storage and consequently work output and creating new learning platforms (Berleur, 2009).... In addition, excessive usage of computers results in development of health problems among the computer users.... Over the last few decades, the volume of computer usage has been increasing due to innovations and advancements in technology....
6 Pages (1500 words) Research Paper

Technology and Its Philosophy

At an early phase of indication, we may solely pursue to combine the different perspectives into a wider interpretation.... However different philosophers differ greatly from each other in their primary perspectives, opinions, and point of view, but it still remains a very prominent attribute and feature of philosophy that the search for truth is primary....
5 Pages (1250 words) Essay

Professionalism and Ethics in IT

For instance, a manager should not access personal files on an employee's computer.... The purpose of this paper “Professionalism and Ethics in IT” is to analyze four factors that hinder ethics and professionalism in IT.... The four factors selected for evaluation are privacy, accuracy, property and access....
9 Pages (2250 words) Coursework

The Red 5 Staff Login System, Computer-Based Monitoring and Data Security

The paper “The Red 5 Staff Login System, computer-Based Monitoring and Data Security” involves creating a staff log-in system that can be used by the staff of RED 5 to do various tasks, such as to have a user-friendly system to log in and view their employment details.... There are also ethical issues where the rights of the company and the rights of the individual may be in conflict....
9 Pages (2250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us