Research paper topics, free example research papers
Free research papers and essays on topics related to: computer ethics
- 8 results found, view research papers on page:
- Computer Ethics - 1,272 words
Computer Ethics Computer Ethics Computer crime has increased in resent years. The book gives several examples of past computer crimes. Before reading chapter 2 I thought that computer crimes only involved crimes that where associated with hacks. But I learned that a computer crime is a crime that involved a computer in any way. Even if it was just to close a bank account. This chapter gave me a good understanding of what a computer crime is, it also made me think how could I make some money. By reading this chapter I was surprised to learn that most computer crimes are committed by people that don't have an extensive understanding of computers, but by opportunist. In one of the cases I read ...
Related: computer crime, computer ethics, ethics, human race, work environment
- Computer Ethics - 1,212 words
Computer Ethics Abstract The computer is considered one of the most technological advances of the twentieth century. As the general public becomes increasingly computer literate,' the gap between technology and peoples' intellect notably shrinks. The readily available computers, software, and assorted output devices have enlightened many but, in turn, have increased the using of computers for unethical activities, privacy invasion and illegal purposes. Legal sanctions against abusive use of computers are a reactive approach. A proactive approach is to teach students about computer ethics in classrooms. An effective teaching method are the presentation of ethical scenarios. It is anticipated ...
Related: computer ethics, computer information, computer science, computer security, computer systems, ethics
- Computer Ethics - 1,216 words
... different classroom procedures for exposing students to the abstract subject of computer users' ethical behavi! or. The author prefers presenting scenarios for discussions. However, all faculty members do not dive into the waters of a new teaching model.' Some prefer to stay with a teaching style that is comfortable and familiar. Therefore, what the author believes is the most desirable approach may not be everybody's approach. Before enumerating three methods for teaching the subject of ethical standards, the computer- specific ethical issues are as follows: 1. Storing and processing data. Should and unauthorized use of otherwise unused computer services or information stored in comput ...
Related: code of ethics, computer ethics, computer information, computer program, computer services, computer systems, ethics
- Computer Crime Has Become A Very Large Issue In Our Society Today This Paper Will Look At This Issue From A Sociological Pers - 1,444 words
Computer Crime has become a very large issue in our society today; this paper will look at this issue from a sociological perspective. It will analyze the various crimes that make up computer crime and see what changes it has brought about in the world in which we live in. Computer crime first is a very new problem in our society today and it is crimes that are committed from a computer. These include embezzling, breaking into other computers, cyber porn and various other crimes that have a drastic affect on the society and the institutions that each of us hold to keep our global society running. To first understand computer crime one must understand first what crime is. According to Diana K ...
Related: computer crime, computer ethics, computer hacking, computer programming, computer security, computer systems, computer technology
- Invasion Of Privacy Computer Virus Internet - 1,505 words
Invasion Of Privacy Computer Virus Internet The information age is the age we live in today, and with the information age comes an age of ethics. When we deal with the new technologies introduced every day, we need to decide what we must consider ethical and unethical. We must consider all factors so that the use of the information readily available to many persons is not abused. Information technology will be the most fundamental area of ethical concern for business in the next decade. (Ermann) The most widely used tool of the information age is the computer, whether it is a PC or a network of computer systems. As we enter the information age, the newness and power of information technology ...
Related: computer crime, computer ethics, computer software, computer systems, computer virus, invasion, invasion of privacy
- Morality And Ethics And Computers - 1,645 words
Morality and Ethics and Computers There are many different sides to the discussion on moral and ethical uses of computers. In many situations, the morality of a particular use of a computer is up to the individual to decide. For this reason, absolute laws about ethical computer usage is almost, but not entirely, impossible to define. The introduction of computers into the workplace has introduced many questions as well: Should employers make sure the workplace is designed to minimize health risks such as back strain and carpal tunnel syndrome for people who work with computers? Can employers prohibit employees from sending personal memos by electronic mail to a friend at the other side of th ...
Related: computer crime, computer ethics, computer program, computer security, computer viruses, computer world, computers
- The Bulgarian And Soviet Virus Factories - 4,639 words
... them with a debugger (YANKEE DOODLE) both are viruses, made in our country. - Hiding the true file length usually causes problems, because CHKDSK is able to detect the difference between the disk space marked as used in the FAT and the reported file length. Only two Bulgarian viruses in the world are able to handle this problem --- DIAMOND and V2100. - The first really "stealth" file infector --- the 512 virus was Bulgarian. It is true however, that the idea has been discovered independently almost at the same time in other parts of the world (the 4096 virus from Israel). - The only known stealth parasitic virus, which "stealthy" features go down to the BIOS level (i.e., it cannot be det ...
Related: bulgarian, computer virus, soviet, soviet union, virus, virus protection
- The Computer Underground - 2,136 words
... ere publicized in a 1971 Esquire magazine article. The term "phreaking" encompasses several different means of getting around the billing mechanisms of telephone companies. By using these methods, long distance phone calls can be placed without cost. In ma y cases the methods also prevent, or at least inhibit, the possibility of calls being traced to their source thereby helping the phreaker to avoid being caught. Early phreaking methods involved electro- mechanical devices that generated key tones, or altered line voltages in certain ways as to trick the mechanical switches of the phone company into connecting calls without charging. This method of phreaking is generally called "(color) ...
Related: computer crime, computer ethics, computer program, computer revolution, computer virus, computer viruses, underground
- 8 results found, view research papers on page: