Special limited offer! First-time customers get 20% off LEARN MORE

Computer Ethics

Executive Summary

There are particular issues that affect different fields of practice in its management in various levels. Information technology is among the leading fields that experience significant drastic changes with concerns of security privacy and information processing. In response to this status quo, the management at respective posts turns to a description of security objectives to revert the identified threats. The most used approaches are proper auditing to keep the administrator aware of the likely threats that would render the system vulnerable.

Therefore, capital credit card services have to address these issues as well as improve the system to accommodate a larger volume of customers.  A look at recent technological advancements gives a clear evidence of ethical quandary associated with developments in email applications and other social networks.

The purpose of the report – central thesis

The balance between ethics and profit to developers has cut across the globe although most computers users might not be ware of this. It takes program developers and other stakeholder in the internet business to think and critically analyze the rights and wrongs of technology to the end user. The purpose of writing this report is to address the challenges facing the current system of capital credit processing company. The system requires improvement in order to handle customers more efficiently and meet the demand of its customer all the world. The security and privacy of its customers is also of major concern need to establish a proper network infrastructure. The server needs to be integrated in such a way it is less vulnerable to hacking and fraudulent transactions (Luciano, 2010).

In software development practice, the end user has personal issues in that there is exactly what they expect from the developer. The significant issue in the world of information technology is the end user’s concern for privacy and protection from relative threats.  Information intelligence experts have the responsibility of data mining to determine the appropriate measure to take or assess patterns of information sharing within demographic groups. The IT ethics experts have put their best foot forward and brought absolute information awareness. The aspect of social networking is perhaps the unique evolution of communication in the field of information technology. However, it has brought with it a wide range of information technology issues (Rita, Gabby & Karen, 2008).

Investigation performed

The sharing of information to the extent of profile contents definitely went beyond the privacy boundaries put in place by the regulatory principles governing social networks. The various social networks are keen enough to consider the kind of security they use at the time when they are registering members.  The amount of security offered by social networking websites has become a major ethical issue especially when registering user. The ethics of social networking have forced website developers gone a step ahead to tailor mechanism to filter content in order to protect the young users.

100% Satisfaction Guarantee

100% Best Written A+Essays

Order Essay in TopDissertation

Custom Essay Writing service

premiumqualityessays.com

Method used to develop report

The protection young users are very important as internet contains explicit content that is morally unacceptable, which is likely to influence a child’s morals negatively. Besides protection of young users, developers also have to address the most crucial social ethical issue concerning email spam. The target is not doubt the spammers themselves. Although a tough task, the service providers are on the forefront trying to identify spammers.  Generally, email spams are emails with absurd messages sent to millions of users.

Email programs may identify some spammers who are bold enough to send out millions of emails, which largely rely on user feedback. In modern information technology, it is common to identify genuine websites as spammers since they are mostly target as channel of streaming email spam unsuspected. However, the common way of identifying malicious spammers is virus content and pornographic messages. The modern information technology community has gone through adverse changes to involve the issue of intellectual property (Mary-Jo, Richard & Joseph, 2010).

The issue of intellectual property rights and information technology has brought to debate the extent to which information producer in electronic world should allow permission for reproduction of images articles. Although copying of term papers is illegal and punishable, there are arguments by ethicists on basis of finding out an anonymous editor of electronic documents as well as minor articles such as blogs. This is not a case on plagiarism since the articles on many blogs are just comments or feedback from followers on what the administrators had posted. The access to such information should not be limited on basis of plagiarism on such works. On one hand, plagiarism is a killer practice among students and has so far make an enormous contribution to poor skills among undergraduates. Most institutions pose a zero tolerance to plagiarism although journal reports over the years have released statics with at least 75% admitting of cheating in exams. This major unethical act undermines the emphasis on academic excellence and competitive platform of intellectuals.

The modern education system plagiarism is a severe threat. Research has revealed disheartening evidence about facts of literally theft. There different measures put in place in order to curb plagiarism. Surveys in individuals of higher learning have given reports on how academic honor codes effectively reduce cheating. Campuses that do not have honor codes have report more cases of cheating as compared to other learning institutions that do have honor codes. Some benefits of information technology experience technical practicality due to ethical dissemination of knowledge. The main hindrance of achievements such as online learning is the disgusting issue of plagiarism. The emphasis on online learning is subject to disregard and misunderstanding. In the case of this situation, the appropriate task is to find out and apply the ethical principles in the process of learning. BrainMass take plagiarism as an academic offence and stay vigilant to stop plagiarism since it is very non-ethical. The commitment to learning and practice of academic integrity is backbone to success in scholarship endeavor. Plagiarism propagates unhealthy competition among scholars (Bill, Amelia & Christopher, 2010).

The information technology community is not complete without the mention of forensics as applied by private and government investigators and detectives. The information technology professionals major in different branches of IT inclusive of computer forensics. These professional in computer forensic are charged with the duty of recovery, analysis and data presentation from computers as evidence in legal cases. The DNA technology has benefited forensic science and has enabled investigators to find clues successfully to identify individuals responsible for a particular crime. The use of DNA fingerprinting gives crime investigators the platform to analyze DNA samples from the scene of crime to samples of the defendants. The course of its application, DNA has added to the variety of available means to handle legal disputes that require evidence of the kind (Australian Bureau of Statistics, 2005).

Proposed solution

Capital credit card processing should acquire new fourth generation network infrastructure software to ensure up to date practice compliance in the industry. The change also requires replacement of the current hardware with new hardware of higher speed and capacity to improve services and record keeping. The database management software should be upgraded to sql server to keep the clients detail orderly for a good response to inquiries and processing. Document any assumptions, limitations or constraints

Order Essay in TopDissertation

There are legal issues pertaining to computer ethics that regulate moral conduct with a computer. Stealing of other’s work is termed as piracy and is strictly unacceptable. All forms of computer piracy are unacceptable and restrict consumers to turn to ethical alternatives. At no any time has computer ethics tolerated the price excuse as thee reason behind software piracy. In case where users cannot meet the cost of particular software, there alternative software designed to serve the same purpose available at the open source resource. The high cot of a Microsoft windows operating system can be avoided by using the open source Linux operating system. It is not ethical to steal a service, similarly, it not right to pirate software.

The act of piracy itself kills the morale of application developers, software programmers and game designers. Another form of piracy is use of software on more computers than the user has bought licenses for. Piracy is capable of destroyed the beautiful and creative work of developers.  This is likely to happen in instances where a programmer does not realize the expected income after creating software. Due to human nature, the programmer may give up developing more software since it does not bear fruits due to piracy. The scorn of piracy requires better attention to cut it down to minimal level if not completely. Piracy does not only rob off the programmer a lot of income but also denies the government millions of dollars in form tax revenue (Steven, 2010).

Current situation

Business Opportunities

Social responsibility is very important in regards to the boom of changes occurring in the information technology sector. This is necessary in order to bring sanity in information sharing and guarding individual information privacy. A look at recent technological advancements gives a clear evidence of ethical quandary associated with developments in email applications and other social networks.  The balance between ethics and profit to developers has cut across the globe although most computers users might not be ware of this. It takes program developers and other stakeholder in the internet business to think and critically analyze the rights and wrongs of technology to the end user (Luciano, 2010).

Business Problem

In software development practice, the end user has personal issues in that there is exactly what they expect from the developer. The significant issue in the world of information technology is the end user’s concern for privacy and protection from relative threats.  Information intelligence experts have the responsibility of data mining to determine the appropriate measure to take or assess patterns of information sharing within demographic groups. The IT ethics experts have put their best foot forward and brought absolute information awareness. The aspect of social networking is perhaps the unique evolution of communication in the field of information technology. However, it has brought with it a wide range of information technology issues (Rita, Gabby & Karen, 2008).

Description of software

The data system has ability to accept cards and process results. The data system makes use of the front end processing networks, that way, it communicates with the hardware to process a transaction. The vitual terminal is based on internet with no software installation requirements.

Hardware description

Capital Credit Card Services’ IT department requires the latest version of the SQL server from to run on Apple hardware  and client workstations that is a variety of PCs from different vendors such as Dell and Acer this is appropriate infrastructure to run the workloads from clients worldwide.

Management Issues

The sharing of information to the extent of profile contents definitely went beyond the privacy boundaries put in place by the regulatory principles governing social networks. The various social networks are keen enough to consider the kind of security they use at the time when they are registering members.  The amount of security offered by social networking websites has become a major ethical issue especially when registering user. The ethics of social networking have forced website developers gone a step ahead to tailor mechanism to filter content in order to protect the young users. The protection young users are very important as internet contains explicit content that is morally unacceptable, which is likely to influence a child’s morals negatively. Besides protection of young users, developers also have to address the most crucial social ethical issue concerning email spam.

The target is not doubt the spammers themselves. Although a tough task, the service providers are on the forefront trying to identify spammers.  Generally, email spams are emails with absurd messages sent to millions of users. Email programs may identify some spammers who are bold enough to send out millions of emails, which largely rely on user feedback. In modern information technology, it is common to identify genuine websites as spammers since they are mostly target as channel of streaming email spam unsuspected. However, the common way of identifying malicious spammers is virus content and pornographic messages. The modern information technology community has gone through adverse changes to involve the issue of intellectual property (Mary-Jo, Richard & Joseph, 2010).

Current Information Systems

Capital Credit Card Services’ IT department has historically provided all of the enterprises’ IT services. Their current application systems are proprietary. They were designed, implemented, and maintained by Capital Credit Card employees. All of the application systems run in a heterogeneous server farm on 5000 thousand Linux severs (from Dell, HP, Sun and IBM) that use the Sybase database management system to manage the corporation’s data, with the exception of the Credit Card Processing System which uses a home grown hierarchical DBMS.) All client machines are intelligent workstations (PCs from a variety of vendors including Apple, Dell, IBM, HP, Sun, Acer and others) and are connected to the applications that run on these Linux servers. Capital believes that the current systems and infrastructure are inadequate to perform the increased workloads brought on by the merger and must be upgraded.

Also each international company that is part of the merger has its own information technology infrastructure. Each merger location has similar applications systems, although not all are custom-built systems and run on either Linux or Windows servers (from a variety of different vendors) providing the computing resources. Even though each company has a working solution there have been reported persistent outages and general poor performance. After the merger Capital will have over 1,000 application systems in its application development portfolio running on over 25,000 servers to support and maintain.

The issue of intellectual property rights and information technology has brought to debate the extent to which information producer in electronic world should allow permission for reproduction of images articles. Although copying of term papers is illegal and punishable, there are arguments by ethicists on basis of finding out an anonymous editor of electronic documents as well as minor articles such as blogs. This is not a case on plagiarism since the articles on many blogs are just comments or feedback from followers on what the administrators had posted. The access to such information should not be limited on basis of plagiarism on such works. On one hand, plagiarism is a killer practice among students and has so far make an enormous contribution to poor skills among undergraduates.

Most institutions pose a zero tolerance to plagiarism although journal reports over the years have released statics with at least 75% admitting of cheating in exams. This major unethical act undermines the emphasis on academic excellence and competitive platform of intellectuals. The modern education system plagiarism is a severe threat. Research has revealed disheartening evidence about facts of literally theft. There different measures put in place in order to curb plagiarism. Surveys in individuals of higher learning have given reports on how academic honor codes effectively reduce cheating. Campuses that do not have honor codes have report more cases of cheating as compared to other learning institutions that do have honor codes.

Some benefits of information technology experience technical practicality due to ethical dissemination of knowledge. The main hindrance of achievements such as online learning is the disgusting issue of plagiarism. The emphasis on online learning is subject to disregard and misunderstanding. In the case of this situation, the appropriate task is to find out and apply the ethical principles in the process of learning. Brain Mass take plagiarism as an academic offence and stay vigilant to stop plagiarism since it is very non-ethical. The commitment to learning and practice of academic integrity is backbone to success in scholarship endeavor. Plagiarism propagates unhealthy competition among scholars (Bill, Amelia & Christopher, 2010).

Alternatives Explored

The information technology community is not complete without the mention of forensics as applied by private and government investigators and detectives. The information technology professionals major in different branches of IT inclusive of computer forensics. These professional in computer forensic are charged with the duty of recovery, analysis and data presentation from computers as evidence in legal cases. The DNA technology has benefited forensic science and has enabled investigators to find clues successfully to identify individuals responsible for a particular crime. The use of DNA fingerprinting gives crime investigators the platform to analyze DNA samples from the scene of crime to samples of the defendants. The course of its application, DNA has added to the variety of available means to handle legal disputes that require evidence of the kind (Australian Bureau of Statistics, 2005).

Conclusion      

There are legal issues pertaining to computer ethics that regulate moral conduct with a computer. Stealing of other’s work is termed as piracy and is strictly unacceptable. All forms of computer piracy are unacceptable and restrict consumers to turn to ethical alternatives. At no any time has computer ethics tolerated the price excuse as thee reason behind software piracy. In case where users cannot meet the cost of particular software, there alternative software designed to serve the same purpose available at the open source resource. The high cot of a Microsoft windows operating system can be avoided by using the open source Linux operating system. It is not ethical to steal a service, similarly, it not right to pirate software. The act of piracy itself kills the morale of application developers, software programmers and game designers. Another form of piracy is use of software on more computers than the user has bought licenses for. Piracy is capable of destroyed the beautiful and creative work of developers. 

This is likely to happen in instances where a programmer does not realize the expected income after creating software. Due to human nature, the programmer may give up developing more software since it does not bear fruits due to piracy. The scorn of piracy requires better attention to cut it down to minimal level if not completely. Piracy does not only rob off the programmer a lot of income but also denies the government millions of dollars in form tax revenue.