Viewing papers 1-30 of 1,000+ for computer AND ethics

NOTE:  We can write a brand new paper on your exact topic!  More info.
123. . .Last ›
X Filters 

Ethics in a Computerized Society Research Paper

… Ethics in a Computerized Society

Ethics are extremely important in our society since they help to determine whether an action is right or wrong. There are different types of ethical systems that are used to determine whether the action is right or wrong. The first is ethical relativism whereby there are no morally right or wrong actions. Instead, right and wrong is determined by the social norms. In this ethical system, the norms of the society which are the basis of determining the action help to preserve the culture of the society. On the negative end, the ethical system confuses what ought to be done with what is currently being done. The second ethical system is the divine command theory whereby moral standards are based…. [read more]


Ethics in Technology Business Research Paper

… Maximum measures should be adopted in order to restrain the personal information of the user being disclosed to anyone.

There should be a limit until the private information of a user can be stored in the database of the company. After specific period, the personal information of the user must be discarded. The duration after which the personal information of the user is discarded should be clearly communicated to the user.

The personal contact information of a user such as email and telephone must not be forwarded to other parties in order to promote their business. Similarly, emails promoting a certain message or business should not be forwarded to users without their own consent.

No employee of the business should have the access to the…. [read more]


Ethics and Computing in Computer Science Term Paper

… And these giants can track anyone, such as voters, to enable them to approach him for their purposes. This is how they promote the industry and how privacy is being taken away. This is how they are turning the internet against democracy (McChesney)

These giants each have their continents and they are again out to colonize the un-chartered realm of the internet (McChesney). These few giants now monopolize the internet and to their sole advancement. They use their immense profits from the internet to assault the other continents They follow the authoritarian theory, which builds the power upon economic and political resources and advantage (McChesney).

BIBLIOGRAPHY

Jacky, J. (1989). Safety-critical computing, hazards, practices, standards and regulation.

Vol. 29, # 5, "Programmed for Disaster: Software Errors…. [read more]


Ethics of Mobile Applications Term Paper

… In ethical terms, the person is diverting most of his time towards communication through the application rather than utilizing that time for something productive and healthy and/or meeting people in person, giving rise to an ethical social dilemma.

Considering the immediate environment, mobile phone applications can easily impact the surroundings and lead to ethical implications. Some applications cannot be used most of the times without affecting the people around us in a given space. Examples of such applications can be the camera, picture and music applications. A person might play music or take pictures of anyone using their phone, but this can be seen by some people as invasion of their privacy and comfort, thus bringing in the ethical problems that these applications create. Moreover,…. [read more]


Computer Addiction Research Paper

… Computer Addiction: Causes and Potential Cures

The determinants and predictors of computer addiction cannot be isolated only to a specific series of demographic, psychographic or socioeconomic variables, it is an equal opportunity disease. Empirical studies indicate that computer addiction is contrary to popular opinion, not just reserved for male teenagers who have been known to spend 48 hours straight playing games on their computers or engaging in online chat sessions (Soule, 65, 66). The determinants of computer addiction are more based on lineless and isolation, and the reliance on the computer as a means to find autonomy, mastery and purpose in life (Quinn, 175, 176). The symptoms of computer addiction include significant swings in a person's mood when they are online or off, whether they…. [read more]


Ethics and Addiction Term Paper

… Ethics and Addiction

It is a common observation that children and teenagers these days are exposed more to technology and it is required more than ever. If teenagers and youngsters are further exposed to computer, being an important part of technology, it can expose greater risks and can have consequences in the later stages of life. There is an increased usage of MP3 players, cell phones, and laptops at ages that are not considered mature for an exposure to these technologies. Ethical or unethical, when the children reach their mature ages, they have almost learned many ways of using these technologies. Some of the main ways of using these technologies may interfere with standards and code of ethics set for the usage of technology. This…. [read more]


Ethics at Apple Essay

… In fact, Gary Marshall writing in the Tech Radar Computer website says Apple is "more secretive than the CIA and more paranoid than the Pentagon," which may be an exaggeration but according to the available literature, it's not far off. Being secretive about their products is a reasonable goal for a company like Apple, but it is clear that employees' privacy and their right to communication on social media sites is closely watched by Apple researchers.

For example, an employee has a right to a private website but no mention of Apple will be tolerated. Even mentioning on a Facebook page or Twitter that the person works at Apple can get that person fired, according to Marshall (2011). An Apple employee was fired in December,…. [read more]


Ethics and Social Responsibility Research Proposal

… Ethics and Social Responsibility

Ethics of Wireless Access

Selling broadband Internet access that includes wireless access is an area of services marketing that is troubling. The lack of quality control standards and the potential for those installing the services to potentially defraud customers by either not delivering the levels of broadband speeds paid or. The potential also for installers who are often paid below industry average and don't care if neighbors steal or use broadband access configure wireless networks in peoples' apartments and homes so anyone can use the signal. This is not only unethical to the customer paying for the service; it is unethical to their companies who subsidize thousands of free-loading Internet users as a result.

Introduction

The dilemma of enforcing wireless access…. [read more]


Ethics Words: 1,294 "Every Man Essay

… We are creatures of habit -- our future behavior can usually be predicted by our past behavior. And if we make a wrong choice, we try to convince ourselves it was right by making similar choices in the future; it's a way of easing the conscience we should have listened to in the first place. Lydia's conscience won't allow her to forget what Sophia, her boss, and coworkers would think of her character if they discovered her lie; she likely won't sleep as well at night and her self-esteem will suffer. So in fact her decision does have serious consequences that will extend into all other areas of her life. She has set the stage for a downward spiral in terms of self-esteem and character…. [read more]


Computer and Web Ethics Essay

… These codes of conduct are based on Moor's assertion that ethical decisions should be made according to respect for such basic human values as reverence for life, liberty, happiness, health, general safety and the protection of personal privacy.

Naming respect for these basic human values as the standard by which to judge an action allows for an objective perspective of many seemingly 'gray' areas of computer and web ethics. For example, should a personal networking cite such as Facebook or Linked-in share the personal information of their members with other cites without their members permission? According to respect for protection of personal privacy, the answer is 'no.' Similarly, a mature adult should not deceive a young child into thinking he is also a child in…. [read more]


Ethics of Privacy Is a Very Controversial Research Proposal

… Ethics of privacy is a very controversial ethical issue that affects just about everyone in the world today. Who can access your information stored on computer systems? What kind of information should be stored there? How can you access your own data, and how does that affect your privacy? These issues and more are ethical issues that affect privacy, and they are not easily answered or debated. Computer ethics is a growing field in the information technology arena, and it is growing more important as more data is stored on the Internet and in large-scale databases every day. Maintaining your privacy is an important issue because of activities like identity theft and computer hacking, but with such an online, mobile, and social networking society, is…. [read more]


Ethics and the Internet Term Paper

… S. Department of Defense to "provide a distributed, flexible and self-healing command network which would enable the U.S. military to continue operating even if Soviet military missiles took out certain geographical locations on the network." (INTERNET ETHICS: OXYMORON OR ORTHODOXY?) The idea of a network of computers was adopted by the academic community in order to increase research capabilities and to communicate easily over long distances with one another. The early Internet also enabled people to share and discuss large amounts of information.

The Internet then began to expand and there followed the creation of Newsgroups. This was an important development as this technology allowed anyone to share information on any subject. This also included unethical practices such as the sharing of pornographic information. This…. [read more]


Ethics of Virus Research Self-Replicating Code Essay

… Ethics of Virus Research

Self-replicating code, such as viruses and worms, are a part of the Internet landscape. The nature of their design means that they can quickly spread around the globe, causing outages and threatening Internet stability. Ford, Bush and Boulatov theorized that outbreaks of viruses are actually beneficial, comparing bouts of self-replicating code to the biological analogy known as the Intermediate Disturbance Hypothesis, and its effects of driving diversity. This paper will overview Ford, Bush and Boulatov's theory regarding these benefits and then discuss possible alternative technical measures that could achieve similar societal benefits in less ethically-suspect ways. The legal implications will be explored, including in what ways the law would have to be changed to make a deliberate release of viruses and…. [read more]


Ethics in Cyberspace Summary Term Paper

… Irrespective of the real influence of the industry in our thinking the cyberspace crucially has become a new centre point in consonance with the neo-classical economic program of global capitalism. The corporate interests have paramount prioritization in the sphere of information technology, as is evident from the regulations for piracy, privacy, competitions in cyberspace along with, to some extent, the reluctant interests put forth in support of the public benefit like universal access, diversity in cyberspace, unprofitable cyberspace however are not taking into account the digital democracy, justice, human security and freedom. It is felt by Cees that the only method of evolving a popular and acceptable global controlling system of cyberspace is active participation of the associated community in the controlling process and ensuring…. [read more]


Computer Security Briefly Support Your Own Opinion Term Paper

… Computer Security

Briefly support your own opinion about the ethical principles of the Lamers group before formation of the SecureThink Company. Briefly support your opinion about the ethics of the hiring of SecureThink by the MoneyBags record company.

The Lamers group initially gets formed out of a curiosity and sense of challenge the members have about how to crate robotic software code that can replicate itself, communicate and erase its digital trail. Groups like Lamers illustrate however how widely multidimensional security threats are, as it is impossible to manage the intentions of each member of this group (Landau, 2008). The ethics of the group therefore has to be questioned as their design objective, collectively, is to impact the SoftMicro operating system. Attacking or targeting a…. [read more]


Ethics Vary Within Different Nations. Korean Business Research Proposal

… Ethics vary within different nations.

Korean business defines ethics within a very loose individualized context; yet show unfavorable opinions regarding the ethics of foreign business and their marketing practices.

In order to improve the ethical reputation of foreign marketing campaign practices within Korea, more understanding of how Korean business professionals define proper business ethics.

Description of Recent Procedure

452 Korean managers were asked to evaluate the ethical practices of businesses within a marketing setting.

Flaws in Procedural Design

Only managerial staff was included within the context of the study. This leaves out the opinion of other classes of workers.

Analysis of Data

ANOVA was used to provide measurable elements that helped define the way Koreans saw as ethical practices.

Conclusion

Results showed that Korean managers…. [read more]


Ethics and the Internet Term Paper

… Ethics and the Internet

Use of the internet has improved immensely in the recent past. However, this improvement has brought an increase in the ethical issues. In this research paper, there is the determination of some of the ethical issues that arise from the internet. These include the issue of privacy to individuals who use social media such as Face book. Another issue is the indecency that arises out of the use of the internet. There is also a discussion on defamation in the internet and the limitations that occur from the freedom of speech within the internet. Finally, there is a discussion on the intellectual property and how it is affected by the internet.

Ethics and the Internet

Introduction

There are many ethical issues…. [read more]


Ethics Policies on 3 Companies Term Paper

… Ethics Policies on 3 companies.

Ethics Policies

Memo of transmittal

Ethics policies within companies

Microsoft Corporation

Nokia

Intel Corporation

Memo of transmittal

The current ethics policies are the outcome of years of debates as to what should define morality and fair and appropriate behavior. Nowadays, most institutions in the fields of economy, politics, medicine and law guide their activities by a set of morals rules concentrated in their internal code of ethics. To better understand the concept of ethic policies, one needs to analyze the code of ethics of at least three major organizations, preferably all three belonging to the same industrial sector, for instance electronic engineering.

Executive summary

The term ethics generally refers to the conduct and behavior of individuals and groups within our…. [read more]


Computer Crime as Computers Term Paper

… In addition, to avoid security breaches, many companies are moving away from traditional methods of storing documents in computer files and sending confidential files over email. Encryption technology can also keep data safe while it is in transit over public networks. According to most security professionals, every business needs to have a secure network, an enforced security policy, and a dedicated security team.

Legalities of Virtual Child Pornography

As the Internet continues to grow and provide increased access to the world and other people, we have access to an enormous amount of resources. However, it also opens a whole new area of dangers, especially for children.

One of these dangers lies in the area of child pornography. Criminals can easily use computers to communicate with…. [read more]


Ethics Are Often Stronger Essay

… 6. Sustainability is not a viable concept for America's businesses. Businesses seek growth. Growth cannot be sustainable forever. Many businesses contribute nothing useful to society and can only be sustainable or responsible by going out of business. Would the world really miss Taco Bell? Anyway, while it is good to be less destructive, that is about all that can be hoped for when companies are rewarded for growth, and the world's non-renewable resources are a zero sum game.

Chapter 9.

1. DSS and marketing research are two completely different concepts that have nothing to do with one another. It would take a novel to explain how many differences they have.

2. Knowledge can make these exchanges more efficient, and more frequent.

3. 1) you learn…. [read more]


Labor Ethics Essay

… Bringing a change to an environment that is highly deterrent to ethically-driven whistleblowing is critical to our shared economic future.

Chapter 2

Following the contextualization provided by Chapter 1, Chapter 2 offers a more detailed look into the ethical implications of the various legal and organizational constructs relating to business practice and labor. Entitled "An Historical Perspective on Business Ethics, the chapter offers an exhaustive look into the evolution of business practices, private enterprising and worker's rights.

With respect to the evolution of business practices, the author illustrates that in no uncertain terms, ethical practice was scarcely a consideration in the earliest stages of American profiteering. From Columbus and Jamestown through to the voyage of the Mayflower, Collins details events of grotesque abuse by European…. [read more]


Ethics and Promoting Your Site Essay

… Popular unethical SEO practices cover link farming, putting duplicate content, page cloaking, mirror sites etc. Hence, websites should always avoid resorting to such practices.

Part -2 Site Application

Introduction:

Ethical SEO i.e. 'White Hat' SEO are those which conform to search engine guidelines and best practices. Here no deceiving or banned techniques are employed to manipulate search engine results. Invariably, it is desirable to employ ethical SEO practices due to which an enterprise's website does not get blacklisted or penalty imposed for infringing the search engine's best practice guidelines. The following procedures must not be resorted to by any means (i) adopt methodologies that harms one's client or any of their ranking. Specifically Black hat SEO tactics must not be resorted to. (ii) Wilfully indulge…. [read more]


Information Technology (IT) Professionals: Code of Conduct and Ethics Essay

… (ICCP, 2011, p. 1)

Components of the ethical code of the ICCP include the following stated components:

Disclosure: This relates to the confidential relationship that exist between the individual and their client or employer and the expectation that they will keep confidential information acquired that might result in a serious effect on a third party. (ICCP, 2011, p. 1)

Social Responsibility: This relates to the individual's acceptance of a responsibility to clear any confusion or wrong perceptions related to the information processing industry and the cognition to act in accordance with procedures and regulations in improving public safety. (ICCP, 2011, p. 1)

Conclusions and Opinions: The professional should only state a conclusion that is founded on knowledge that is adequate. (ICCP, 2011, p. 1)

Identification:…. [read more]


Ethical Considerations in Computer Crimes Essay

… This has led to the younger generation to follow the route of computer hacking and cracking to be acknowledged as computer experts.

There have been various laws made against the computer crimes but the law enforcing agencies find it extremely difficult to implement those laws. Security agencies of the state themselves have engaged themselves in computer crimes, as they monitor the movement of each and every user that come under the domain of the state. This information is accessed without any prior permission taken which makes it a privacy breach for the users made by the state or the agencies. Another issue for law enforcing agency is that they do not have any control over the Internet activities and hence cannot interfere in the electronic…. [read more]


Ethics of Discarded Computers Term Paper

… Moreover, the odor of burning plastic is so strong that classes at a nearby school are forced to close at times. Sixty percent of students and as many teachers cough and have breathing problems (Fackler 2002).

Villagers are becoming richer, however it is at the health of their neighbors as well as their own. This region now has an estimated 2,500 computer waste businesses. The majority of them are family owned, employing as many as 100,000 people, many of them are migrants from other parts of China. Where once they picked through pig bones and duck feathers, now they deal in integrated circuits, e-trash (Fackler 2002). Most villagers welcome the computer trash, even though it does poison their water and creates an unnatural, unsightly landscape…. [read more]


Computers Think? First Coming Essay

… When it comes to the issue of finding out if computers can think, it seems the answer is most definitely not. The understanding of thinking came in a two-pronged explanation- the mechanical and the emotional. In the case of the computer, it seems that though the mechanical aspect is present, there is no emotional component that can be observed. When imagining a laptop computer, it begs the question: in what way is this laptop computer feeling when someone bangs on the keyboard to hard? Computers and other mechanical devices are programmed to perform in a certain way because they are made that way. The missing link to make an electric device, like a computer, to think is the emotional component- these devices have no ability…. [read more]


Code of Ethics Thesis

… Ethics and Morality Online: Sample Guidelines

Two of the most famous ethical statements known to humanity are that of "an eye for an eye and a tooth for a tooth" and "do unto others as you would have done unto yourself." These two statements are often contrasted with one another. The second statement is usually depicted as compassionate; the first precept is said to be harsh and unyielding. However, in the case of Hammurabi's Code, at the time of its conception this philosophy was considered relatively compassionate. A dictator could not extract a punishment from the convicted individual that was worse than the crime that was committed. And in Hammurabi's day and age, simply having a code of ethics at all, harsh or not, was…. [read more]


Problem With Psychology Essay

… Ethics remain important in the field of psychology, which is concerned ultimately with human behavior. As most of human behavior has an ethical component, it is helpful to understand the motives and diversity of ethics.

I can apply psychological principles to personal, spiritual, social, and organizational issues. For example, if I am disinterested in class material, I have the choice to maximize my own happiness and subscribe to utilitarian values by outsourcing my work. Doing this could be perceived as unethical by people with a different ethical orientation such as those who operate with obligation or character values, but for someone who is results-oriented, outsourcing my work has no ethical conundrum associated with it. The goal is to achieve the best possible results, which can…. [read more]


Computer What Is Going to Be Next Term Paper

… ¶ … Computer: What is going to be next?

The development of computers is a process that has been going on for the last 70 years or so. The nature of development has been different over the years and the changes have come due to the realization of mankind of the possible utilities of computers also. The first attempts were mainly laboratory experiments to help men calculate faster through the use of mechanical-electrical methods. The developments were also more scientific than developments of technology. At the same time, other scientists came up with their own version of a computer which was used in the Navy. The next development came with the armed forces giving a contract for the development and building of a computer exclusively…. [read more]


Computer Ethics Term Paper

… Computer Ethics

The Internet's rapid evolution as a publishing and commerce platform further extends its ability to serve as another marketing, selling, and service channel for companies globally, yet with this potential for revenue growth comes the ethical responsibility of managing customers' data vigilantly. The issue of benevolent or benign surveillance or the providing of personal information by the public to complete transactions at ATM machines, automated pay terminals in shops or restaurants, or the online purchase of products or services is considered by many to be one of the characteristics of living in a highly developed technological society. Included in this papers' discussion of benign surveillance are technologies including personalization, cookies (small files that capture a website visitors' specific information items), and use of…. [read more]

123. . .Last ›
NOTE:  We can write a brand new paper on your exact topic!  More info.