This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Computer Ethics

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Computer Ethics

 

The tremendous growth in information technology has contributed to the emergence of computer ethics. The creation of the ten commandments has reduced the rate of malicious acts. Nowadays, computers are a significant source of ethics abuse (Weckert, 2007). Social responsibility should be applied to ensure that commandments such as software piracy, stealing, and unauthorized access to computer resources are not violated when using computers.

In the cyber world, copying software without buying it is a violation of computer ethics. Therefore, the employee violated the sixth commandment since the software used was not paid. Creating new software is a challenge due to the high costs and time needed; therefore, the violator should be jailed and terminated (Conrad, Misenar, & Feldman, 2016). Since the software is intellectual property, an individual should ensure that they pay before using it to avoid violating the sixth law.

Assessing a computer lab without permission is unethical behavior. The two students violated the seventh law that emphasizes proper computer resources compensation because the student entered the lab without permission (Conrad, Misenar, & Feldman, 2016). Therefore, the two students should be punished. Authorization of computer resources is essential according to the seventh commandment since valuable information is compromised.

Stealing and snooping around people’s information is a violation of computer ethics. The teller violated the third rule by illegally spying the customer’s account to transfer money. He also broke the fourth commandment by using a computer to steal money from the customer (Conrad, Misenar, & Feldman, 2016). The manager of the bank should fire the teller. Spyware is used to access people’s finances, and this act is misconduct to computer ethics.

Computer ethics mitigation has enabled people’s conduct to be evaluated to protect sinful interests such as stealing, software piracy, and unauthorized access to computer resources.  Most people depend on computers to run operations in finance, businesses, and social institutions; hence computer ethics should be obeyed to ensure there are no violations.

 

 

References

Conrad, E., Misenar, S., & Feldman, J. (2016). Eleventh Hour CISSP (3rd ed.). Syngress.

Weckert, J. (2007). Computer Ethics. Routledge.

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask