Premium Essay

How Ethics Relate to Computer Crimes

In:

Submitted By teveridge
Words 3580
Pages 15
How Ethics Relate To Computer Crimes
Herman T. Everidge III
Legal and Ethical Issues in Computing
CIS 4253, 847
James R. Moore, Jr.
September 29, 2012

Computer Viruses, Worms, Trojan Horses and Malware
Malware refers to software programs designed to damage or do other unwanted actions on computer systems; viruses, worms, Trojan horses, and spyware are the most common types of malware.
Computer viruses show us how vulnerable we are; viruses can have a devastating effect on businesses, they disrupt productivity and can cause billions of dollars in damages. They also show us how sophisticated and interconnected we have become.
Computer viruses are called viruses because they share some of the traits of biological viruses; computer viruses pass from computer to computer much like a biological virus passes from person to person. Computer viruses are created by people by writing code to create the virus, and designing the attack phase which could be a message or initiate the destruction of a piece of hardware. Early viruses were pieces of code embedded in legitimate programs, like games or word processors.
A virus is a small piece of software that piggybacks on real programs; it might attach itself to a program and each time the program runs the virus runs too, and they can reproduce by attaching to other programs. E-mail viruses travel as an attachments to e-mail messages and can replicate themselves by automatically mailing itself to people in the victim's e-mail address book. These viruses don't require double clicking they can launch when you view the infected message in the preview pane of your e-mail software. In 1999 the Melissa virus forced Microsoft and other large companies to shut down their e-mail systems until the virus could be contained; in 2000 a similar virus named ILOVEYOU also had devastating effects.
Over the years virus creators have

Similar Documents

Premium Essay

Ethical Issues Facing Information Technology

...information technology. I will be identifying examples of those ethical issues, situations in which they occur, and helpful ways in which organizations can avoid abuse and catastrophes. Introduction Ethics is defined as moral principles that govern a person or group’s behavior. (insert reference) Now that we know the definition of ethics, then what are ethics in information technology? Ethics in information technology are a set of moral principles that police the use of computers and all forms of telecommunications used to receive, send, and store information. With the rise of information technology, more and more professionals have encountered ethical issues in the workplace and finding out there are situations in which ethical problems are becoming more prevalent. Some examples include; (1) problems with privacy and confidentiality, (2) computer security, and (3) computer crimes and computer related crimes. This paper will focus on these examples. Problems With Privacy and Confidentiality Information privacy is the right of an individual to determine what information is collected about them and how it is used. Some people are not aware of ways in which data can be collected or how it is used. Many think they have a level of secrecy as they browse online, but websites are often collecting your personal information within seconds of you clicking on their site. Information, such as your location, address, name...

Words: 1562 - Pages: 7

Premium Essay

Ethical Issue

...Introduction Today’s world computer crimes are internet related, and in this area carrying out law barriers are either not well defined or most of the countries they don’t have arraign cyber crime laws. Those laws deliver the absence of the safe, the only substitute is protection against apparent warning exists is to develop ones own, depend on constitutional protection, a big range, and ethics to reduce constitutional entrance. Establishing information systems are grater speed than process of making legal and law, sometimes don’t have accorded legal safe opposite to the abuse of new technology. In some situations, what possible and what impossible is not clear, and so do not endure plenty of laws, or in most situations fair inadequate argue be allowed to proceed by abuse from assured technical system. The above conditions, which ethics adopt, it is very essential, in order to deliver reason to what would or else it’s being a very complicated case as with society. People who build and use the technology, it’s their responsible to confirm that it is applied in a responsible and ethical conduct. It just as with society does not suggest any real safe, because sustains complete social cooperation or noncooperation of developing moral code, for controlling the misuse of technology. Ethics in Security Most organizations bargain along very large space about online network, it apprehend unsocial barriers or general limit of influential. With various values and assents, organizations...

Words: 1182 - Pages: 5

Premium Essay

Madoff

...(2007) define ethics as the philosophical approach in which moral values are related to human conduct, with respect to the rightness and wrongness of certain actions. This definition explains that ethics are a nothing more than an indoctrinated human behavior that is base on their environmental, social, or cultural backgrounds. Humans are therefore, inherently flawed and thus, ethics becomes a huge issue in their lives as they attempt to make up for these flaws. How humans act in a given situation or how they feel about their actions, play into how they conduct themselves in their personal and business affairs. Killing, raping, and stealing are examples of such obvious actions that most people would agree are unethical. This relates to the subjective belief of rather Bernard Lawrence "Bernie" Madoff should remain in prison or out on bail because of the practicing of Ponzi schemes because it lies in the not so obvious realm of behavior. Why? There is no essential difference between someone who steals $5 and someone who steals billions it is all the same, however, in the criminal justice system the belief in crimes at different levels are arranged at different social and cultural standards. White collar vs. blue collar White collar crime is particularly interesting it provides a sharp contrast to the common crimes and street criminals that usually attract the attention of people. A white-collar is associated by individual of a higher social class. Some of the crime can be characterized...

Words: 1162 - Pages: 5

Premium Essay

Eth/316 Week 1 Dqs

...1(A) How does ethical conduct affect your job?  Consider both your own conduct and the conduct of others.  What specific benefit do you hope to achieve from taking this course? My Answer: Ethical conduct effects my job on a everyday stand point I own and run a computer repair shop, therefore if I was to have unethical conduct I would not have any customers and it would give my business a bad reputation. My business depends on my conduct because it is a small business that my husband and I run together. We put our customers first and listen to their needs. We also honor quality work and try to be understanding and take time to make each of our customers feel like they are special because they are special without them we would not have a business. I am not sure what specific benefits that I hope to receive from this class but I do believe that it will help me learn more about how to be a successful business owner. 1(B) Based upon what you have read so far, how do you think the study of ethics might be different from other courses you have taken?  How does that modify your approach to the course? My Answer: I believe that it is going to be different because we are learning about ethics and conduct where with other classes we learned about what to do in a business such as accounting and such. With this class we get the chance to learn how to act and treat others in a business way. I believe that everyone who is a business owner should take this class to learn about how to suceed...

Words: 1551 - Pages: 7

Premium Essay

It Law and Ethics

...Chapter 11 Law and Ethics Chapter Overview Chapter 11 covers the topics of law and ethics. In this chapter readers will learn to identify major national and international laws that relate to the practice of information security as well as come to understand the role of culture as it applies to ethics in information security. Chapter Objectives When you complete this chapter, you will be able to: Differentiate between law and ethics Identify major national and international laws that relate to the practice of information security Understand the role of culture as it applies to ethics in information security Access current information on laws, regulations, and relevant professional organizations Set-up Notes This chapter could be completed in a single class session, if there is sufficient time to cover the material. Unless the students have not had the opportunity to read the material in advance (in some settings, the textbooks are not made available until the first class meeting), it may be prudent to have a general discussion of the topic, with detailed lecture to follow at the next class meeting. The subject matter can be covered in 1.25 to 2.5 hours. Lecture Notes and Teaching Tips with Quick Quizzes Introduction As a future information security professional, it is vital that you understand the scope of an organization’s legal and ethical responsibilities. To minimize the organization’s liabilities the information security practitioner must understand...

Words: 4470 - Pages: 18

Premium Essay

Computer Cthics

...------------------------------------------------- Computer Ethics Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society. For example, while it is easy to duplicate copyrighted electronic (or digital) content, computer ethics would suggest that it is wrong to do so without the author's approval. And while it may be possible to access someone's personal information on a computer system, computer ethics would advise that such an action is unethical. As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as artificial intelligence and human communication. As the world of computers evolves, computer ethics continues to create ethical standards that address new issues raised by new technologies. Computer Ethics is a part of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.[1] Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into 3 primary influences: ...

Words: 3631 - Pages: 15

Free Essay

Management

...[pic] MASTER OF MANAGEMENT CORPORATE GOVERNANCE, ETHICS AND VALUES GSGM7253 TERM PAPER Issues and challenges in cyber ethic PREPARED BY: |MEOR NORULAZMI BIN MAT SALLEH |MD1409MD0030 | Contents Introduction 2 Literature Review 3 Recommendations 6 Conclusion 8 References 10 Introduction This article will highlight the issue and challenges in cyber ethic. It will cover general outlined the concept of cyber ethic and tries to relate it with the globalization of internet which was a way of living nowadays. Have you noticed that the whole world is now watching the same movies, listening to the same music and reading the same books? Of course not 100%, but the majority of the people on the planet do it the same thing as mentioned above. Why these activities happen, whereas they live not at the same location or place? This is what we call it as internet culture. Since the 1990’s, the Internet has a revolutionary impact on our culture. People around the world, start to use communication by instant messaging, electronic mail, interactive video call. Also, watching a movie, discussion and shopping they're using a World Wide Web or website.   Today, internet become part of living. I define frequent use of the Internet as...

Words: 2841 - Pages: 12

Premium Essay

Legal and Ethical Issues Relating to Business Information

...Legal and Ethical Issues Relating to Business Information Introduction I this task I’m going to explain the legal and ethical issues in relation to the use of businesses information and also I’m going to explain operational issues as well in the last park of the task i going to analyse the legal ethical and operational issues using appropriate examples . Most people do not feel safe in putting or giving their personal details on different social networks like Facebook and Twitter and another organization who uses the personal detail from the people or customers , the reason being of many hackers invading other people's privacy this also can happen with many businesses as well such as Tesco ,Asda e.g. if they do not have a security system to keep them safe . Legal Issues These are various items of legislation to protect the use of business information. Data Protection Act 1998 is one of the legal issue business information. Many businesses store use information about people. The Data Protection Act protects information held about people from being misused. The information stored by businesses on databases must be: ✓ Obtained fairly and lawfully ✓ Used only for the purposes stated during collection ✓ Adequate, relevant and not excessive in relation to the intended use ✓ Accurate and up to date ✓ Not kept for longer than necessary ✓ Processed in line with your rights ✓ Subject to procedures to prevent unlawful processing, accidental loss, destruction...

Words: 2188 - Pages: 9

Premium Essay

Ethical Use of Information Technoloby in Modern Society

...The problem to be investigated is the ethical use of information technology in a modern society. “Information technology basically refers to the employment of computer hardware and software applications to manage data” (K Alliance). Historically, information technology had limited applications and its impact on society was also limited. Information technology has come a long way since Jean Hoerni first developed the planar transistor whereby microscopic circuit boards could be laid out on the silicon surface, thus allowing the compacting of these circuits onto integrated circuits (“Darby consulting”). Today, however, information technology is a part of nearly every business and personal activity (Brooks, 2010). Because information technology is so widely used, the opportunity for individuals to engage in information technology in an unethical manner is abundant. This is why it is essential for education systems and businesses to address the ethical concerns of information technology usage. It is imperative that education systems and businesses develop a practical code of ethics to prevent ethical dilemmas and infractions, or at least try to mitigate them. Information technology has caused widespread society ethical changes. To previous generations, information technology was reserved for very specific industries. There was a selective segregation who worked with information technology and what pieces of information were impacted by information technology (Brooks, 2010). With...

Words: 1620 - Pages: 7

Premium Essay

Criminolgy in the Future

...Criminology in the Future Taylor Strong CJS/231 September 21, 2015 Jacqueline Waltman Criminology in the Future Future directions of crime fighting and its role in social policy implication would be the advancement of technology and its impact that it will potentially have on crime fighting in the future. Technology is ever changing and it something that we have all witnessed advance over the course of time, whether that is the progression of a tape recorder, to a CD, a CD to a Mp3, and Mp3 to iPods and iPhones. The only difference is that with criminal justice technology takes them much further than to just being able to listen to music but rather to get ahead of crime and to get a grasp on the criminals who are committing the acts. Technology is insightful in every aspect of the criminal justice system, from the examination to the trial of crimes. The advancement of technology is already in its most profound stage of conformity. It is allowing us to be visually able to see individuals from space via satellite and target their intellect by viewing what it is they are arranging criminally and for us to use that information to our advantage. Other directions of crime fighting and its role in social policy implications suggest that we are also setting up to not only visually be ahead of the game and criminals in the future but also that we are asking it possible for us to listen more openly to conversations that are being exchanged between criminals. This alone is substantial...

Words: 2184 - Pages: 9

Free Essay

Business

...Understand the issues and constraints in relation to the use of business information in organisations Aminath Inasha Afeef Understand the issues and constraints in relation to the use of business information in organisations ● Legal issues: relevant data protection legislation eg Data Protection Act 1998, Freedom of Information Act 2000; other relevant legislation, eg Computer Misuse Act 1990 ● Ethical issues: codes of practice, eg on use of email, internet, ‘whistle blowing’; organisational policies; information ownership ● Operational issues: security of information; backups; health and safety; organisational policies; business continuance plans; costs, eg additional resources required, cost of development; impact of increasing sophistication of systems, eg more trained personnel, more complex software Legal Issues Legal Issues ● When companies deal with business information, what legal issues will they have to be concerned about? ● There are various items of legislation (law) to protect the use of business information. ○ ○ ○ ○ Data Protection Act 1998 Freedom of information Act 2000 Computer Misuse Act 1990 Other relevant legislation Data Protection Act 1998 ● Many businesses store and use information about people. ● The Data Protection Act protects the information held about people from being misused. ● According to the Data Protection Act, the information stored by businesses on databases must be: ○ obtained fairly and lawfully ○ used only for the purposes...

Words: 1660 - Pages: 7

Premium Essay

Redn

...of Business information ‘issues and constraints’ Handbook Contents Legal issues in relation to the use of information --- 3 Ethical issues in relation to the use of information --- 5 Operational issues in relation to the use of information --- 8 Legal issues in relation to the use of information As a big organization there various types of information pass through our company on daily basis, however there are three main legislations that are on place to protect the use of business information, which are: * Data protection 1998 * The Freedom of information Act 2000 * The Computer misuse Act 1990 Data Protect Act 1998 protects the information held about people whether they are employees or the customers from being misused by our organisation which hold the information. For example our organisation has to make sure in order to comply with the Data Protect Act by ensuring the information we stored in our database is: * Gathered fairly and lawfully (for example when our customers are applying our club card rewarding scheme they are all given the same application form to fill to make sure there is not any bias involved in the process). * Used only for the purpose we stated during the collection, for example when our customers are applying the Tesco’s club card we stated we will keep their details safe and...

Words: 2424 - Pages: 10

Premium Essay

The Brainstorming Method

...References 5 Introduction The introduction of information technology (IT) has brought a great change in the business world, for instance, the use of computers has facilitated the global business by linking the people together hence advanced business transactions and communication globally. Although the introduction of IT facilitated global business interaction accompanied with other advantages. There has been a real problem ensuring efficient use of IT due to various problems associated with it, thus challenging various scientists to discover techniques on how to solve such problems. Therefore, by views arguments on different methods of solving problems, the following points are more applicable; it is very important to discover the cause and the effect of the problem, the application of brainstorming may easily help in correcting the problem. Checklists, impact diagrams and the“5-whys” strategy is also applicable in solving any IT problem (Johnson, 2005, pp. 213-215). Brainstorming method The key method of this paper is brainstorming; According to Johnson, 2005, pp. 213-215, it is more useful when a group of people gathers to discuss a certain issue by sharing ideas from each other through giving suggestions on how to solve the issue on hand. For example, a computer might be having a problem of connecting to the Internet, by coming together as a group it may be easier to solve such a problem; the problem might be usage of unregistered broadband...

Words: 2373 - Pages: 10

Premium Essay

Brooks

..._______________________________________________________ _______________________________________________________ Report Information from ProQuest May 15 2012 20:05 _______________________________________________________ Table of Contents 1. The Development Of A Code Of Ethics: An Online Classroom Approach To Making Connections Between Ethical Foundations And The Challenges Presented By Information Technology.............................................. 14 May 2012 1 ProQuest Document 1 of 1 The Development Of A Code Of Ethics: An Online Classroom Approach To Making Connections Between Ethical Foundations And The Challenges Presented By Information Technology .. Author: Brooks, Rochelle. .. Publication info: American Journal of Business Education 3. 10 (Oct 2010): 1-13. .. ProQuest document link .. Abstract: In today's organizations, ethical challenges relate to areas like fraud, right to privacy for consumers, social responsibility, and trade restrictions. For Information Technology (IT) specifically, these can translate to considerations on how technology is used to violate people's privacy, how automation leads to job reductions, or how management information and its corresponding systems are used and abused for personal gain. In the last 25 years, people have seen an overwhelming technology infusion affecting business, education, and society. Virtually all areas of the society have been transformed by the usage of technology...

Words: 8895 - Pages: 36

Free Essay

Cyber Law

...Report On Cyber law LEGAL ASPECTS OF MANAGEMENT Submitted to: Mr. Maneesh Yadav Submitted by: Ankita Bhatnagar (JL12PGDM030) Introduction: Computers and their use is a day to day activity of all the students, professionals, teachers, Universities, banks, Supermarkets, in the entertainment field, in medical profession and also in higher education. The use of this Weapon is spreading very widely in all parts of our society. As every weapon has two ways of operation. One is good and essential and the other are bad and not essential. Many times, whenever a new weapon is invented, many people use it unknowingly for the wrong purpose. So to aware them and to make the proper use of the Power of the newly invented weapon, laws is to be formulated and should be implemented. This chapter introduces the cyber law and many terms involved in it. There are two basic definitions of cyber crime. (a) One definition says that ‘cyber crime’ consists of only those offences provided in the Information technology Act, 2000. As per this definition, cyber crimes would mainly be restricted to tampering with the computer source code, hacking and cyber pornography. Cyber fraud, defamation, harassment, e – mail abuse and IPR thefts, would not classify as cyber crimes. (b) In second definition, ‘cyber crime’ is said to be an act of commission or omission with the internet, committed on the internet or through the internet or with the help of the internet or connected with the internet, whether...

Words: 3963 - Pages: 16