StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Ethics - Case Study Example

Cite this document
Summary
Individuals involved with the industry of computer sciences are not allowed to gain access to information or enter in another individual’s computer until he/she…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.2% of users find it useful
Computer Ethics
Read Text Preview

Extract of sample "Computer Ethics"

Computer Ethics Computer Ethics Computer Ethics Issues Two computer ethics issues related with the use of ransomware includes the issue of privacy and criminal behavior. Individuals involved with the industry of computer sciences are not allowed to gain access to information or enter in another individual’s computer until he/she has the authority to do so. When individuals gain access to unauthorized information, they use it in different ways for their own self interest while ignoring the interest of the society.

The utilitarian rule of ethics state that if an activity results in damaging the society and benefiting a few, then that particular activity is regarded as unethical. On the other hand, if a computer professional or a group of professionals ask for ransom in exchange of not holding a computer as a hostage, they are indulging in criminal behavior. Ransom in previous years used to be gained by kidnapping an individual and this activity was recognized as a criminal conduct. Similarly, holding a computer hostage and acquiring ransom is even recognized as criminal behavior.

Prevention From Ransomware One way through which computer users can protect their computers from being attacked by ransomware is by protecting their computers with security software. This security software has the ability to detect and stop malicious attacks launched on a particular computer. The user needs to ensure that the security software is kept up-to-date. It is essential for the security software to remain up-to-date because new forms and software of ransomware are being launched every day and in order to tackle updated viruses, a computer needs updated security software.

Another way of preventing becoming a hostage to ransomware is having a backup of the information and data that is stored on a particular computer (Deccan Herald, 2012). In cases a computer becomes a hostage, the most probable threat that a user faces is the loss of important data. If this data is stored in a backup storage device such as a USB or an external hard drive, the user will not have to give in to the demand of ransom. Government Legislation Government can use both deterrent as well as preventive modes of legislation to counter the issue of ransomware.

The government should pass a legislation requiring all organizations and computer users to protect their computers with security systems and having backup of the data. The government can levy hefty fines for not complying with legislation. This will encourage computer users as well as organizations to protect their system in order to avoid hefty sanctions. Government can deter computer hackers who use ransomware from indulging in such acts by assigning hefty sanctions such as jail time and penalties for holding another individual’s computer hostage (Cross, 2013).

The fines should be influential and should have the ability to inhibit fear amongst computer hackers. The fear of sanctions will deter such hackers from performing these unethical activities. This is because the hackers might conduct a cost-benefit analysis of performing these acts and may perceive that the costs are much higher than the benefits.ReferencesCross, S. (2013). Shaping South East Europes security community for the twenty-first century (1st ed.). Basingstoke: Palgrave Macmillan.Deccan Herald,. (2012). Hackers holding your PC to ransom.

Retrieved 3 July 2014, from http://www.deccanherald.com/content/297460/hackers-holding-your-pc-ransom.html.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Ethics Case Study Example | Topics and Well Written Essays - 500 words”, n.d.)
Computer Ethics Case Study Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1651599-computer-ethics
(Computer Ethics Case Study Example | Topics and Well Written Essays - 500 Words)
Computer Ethics Case Study Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1651599-computer-ethics.
“Computer Ethics Case Study Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1651599-computer-ethics.
  • Cited: 3 times

CHECK THESE SAMPLES OF Computer Ethics

IPad's Security Breach

Research and development in terms of information security is evaluated due to hacking and security loop holes (Introduction to Computer Ethics n.... 1 ethics Statement Hacking is a process that is implemented to explore a security imperfection that has not been reported earlier.... Hacking ethics are important...
7 Pages (1750 words) Assignment

Ethics in Cyberspace

The Computer Ethics Institute has comprised a Computer Ethics version of the Ten Commandments that presume that the users of the Internet shouldn't use a computer to harm others, interfere with other's work, steal, bear false witness, copy and use the software for which one has not paid, appropriate other people's intellectual output, snoop around in other people's files and some others (The Ten Commandments of Computer Ethics).... What is ethics ethics is the art of determining what is right or wrong....
3 Pages (750 words) Essay

Computer Ethics and Privacy in the Social Aspect

A person can decide on issues where incorrect information is saved although they may not be able to completely erase the information from the database, which Computer Ethics Insert Computer Ethics According to Debora, the increase in computers is causing more harm than good in terms of social issues.... Computer Ethics.... ethics and Computers.... ?? In The Encyclopedia of ethics edited by 191-194.... ??Engineering ethics....
1 Pages (250 words) Essay

Philosophy: Cyber Ethics

Although the above may look like just ordinary cases in the course of computer technology, they are relevant to Computer Ethics due to the fact that computer technology is essentially involved and there is question about what policies are to be instituted in order to best detect and prevent such abuses.... Thus computer's logic can be massaged and shaped in infinite ways Philosophy: Cyber ethics Computer technology according to James Moor is revolutionary due to the nature of the computer itself....
3 Pages (750 words) Article

Commercial Free Speech

According to Spinello (2006) the ethical perspective of the problem of spam among internet users is a key issue in Computer Ethics.... ethics and Information Technology.... Spam is regarded as an unwanted bulk… In addition, junk form of email is a threat to the computer as a form of communication device as it can crush the entire system.... In addition, junk form of email is a threat to the computer as a form of communication device as it can crush the entire system....
2 Pages (500 words) Essay

Lawrence Hinman and Social Morality

The Cambridge handbook of information and Computer Ethics.... Ethical pluralism enables people to have an understanding of different theories… It is important to note that ethics are dependent on the society that applies it.... Ethical pluralism enables people to have an understanding of different theories on ethics and morality.... It is important to note that ethics are dependent on the society that applies it.... Lawrence Hinamn refers to ethics as a social responsibility that every member of the society has to take into account....
1 Pages (250 words) Essay

Nursing Informatics

Sharing of information between members treating a patient or with the patients is a practice that is necessary for the delivery of healthcare to individuals.... However, careful ethical consideration is necessary especially when disclosing health information of patients.... hellip; The patient should know the type of people to whom their health information if revealed to avoid legal cases....
2 Pages (500 words) Coursework

Ethics in Modern Computer Usage

The paper “ethics in Modern Computer Usage” looks at certain ethics, which are expected to be followed by the computer users to protect the rights of others and cause no harm to anyone.... hellip; The author states that with the incorporation of computer technology in the lives of millions of people around the world, the need for the declaration of ethical conduct seemed necessary since people started manhandling computers, data, and its services....
5 Pages (1250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us