Premium Essay

Ifsm B-1

In:

Submitted By derpingderp
Words 1300
Pages 6
Applying decision-making frameworks to IT related ethical issues: Computer-Based Crimes

INTRODUCTION/PROBLEM STATEMENT Today’s technology has opened up a new realm of criminal activity, and new ways to exploit innocent people. Cyber-related crimes have been increasing for the past decade and include a number of different illegal activities to include: identity theft, phishing, cyber-stalking, and the use of malware. Criminal activities are of course, unethical, and cyber-crimes are no exception. It is a problem plaguing our society, and people have to be diligent to avoid being attacked and exploited. “It seems that everything relies on computers and the internet now — communication, entertainment, transportation (car engine systems, airplane navigation), shopping, and medicine (equipment, medical records). How much of your daily life relies on computers? How much of your personal information is stored either on your own computer or on someone else's system? Cyber security involves protecting that information by preventing, detecting, and responding to attacks” (US CERT, 2013). Today, we’ll look at an ethical approach (Reynolds' Seven-Step Ethical Decision-Making Approach) to develop protective measures that could help in mitigating cyber-crimes Ethically, cyber-crimes really boil down to what’s right and wrong. Deontological theories focus on the right action, doing the right thing, no matter the consequences. All humans on this planet have a deontological duty to do what’s right for fellow man; and committing crimes over the internet is clearly wrong. It is a basic duty of existence to treat others how you would want to be treated, and I’m sure that no one wants their identity stolen. I’m sure that the cyber-actors committing these cyber-crimes aren’t thinking about their ethical duties to mankind, but maybe, these crimes could be

Similar Documents

Free Essay

The B-1 Bomber

...THE B-1 Bomber: Victim of a “Buy before you Fly: Philosophy December 17, 2015 THE B-1 Bomber: Victim of a “Buy before you Fly: Philosophy     Introduction The B-1 Bomber is a four-engine supersonic variable-sweep wing, jet-powered heavy strategic Bomber that is used by the U.S. Air Force. It was first envisioned in the 1950’s as a supersonic Bomber with Mach 2 speed, and sufficient range and payload to replace the Boeing B-52 Stratofortress. However, when it was brought into full operation, it was developed into the B-1B, primarily a low level penetrator with long range and Mach 1.25 speed capability at high altitude. The initial B-1 Bomber program was cancelled, partly because it was becoming obsolete, and also for political reasons. It was designed by the Rockwell international developers and it started service in the year of 1986 with the help of Strategic Air Command SAC. Customer and Expectations The United States Air Force USAF was the primary customer for the B-1B program, and the Strategic Air Command was the direct customer responsible for operating the B-1 Bomber. During development of the B-1 Bomber the Air Force had varying expectations which lead to it initial cancellation and regeneration of the B-1B that we know today. (Brook, 2012). The United Sates Air Force USAF expected the B-1B program to provide the advanced capability that was needed to improve their defense system. The major expectation associated with this program for the United Sates...

Words: 1754 - Pages: 8

Premium Essay

Ifsm 300 All Weeks Quizzes 1 -8

...IFSM 300 All Weeks Quizzes 1 -8 Click Link Below To Buy: http://hwaid.com/shop/ifsm-300-weeks-quizzes-1-8/ IFSM 300 Quiz 1 Question 1 1 / 1 point Which of the following is defined as the ability of customers to drive down the price of goods and services? A) supplier power B) buyer power or the bargaining power of customers C) rivalry among competitors D) threat of price reduction Question 2 1 / 1 point Are there any direct variables that have no effect on a business' competitive position? A) yes B) No Question 3 1 / 1 point Which of the following are components of an information system? (select all that apply) A) data B) hardware C) people D) process E) software View Feedback Question 4 1 / 1 point According to the Five Forces Model developed by Harvard Business professor Michael Porter, all of the following are major factors that determine a company’s standing in an industry, except for which one? A) Threat of entry of new competitors B) Political and/or economic factors C) Bargaining power of suppliers D) Threat of substitute products/services View Feedback Question 5 1 / 1 point True or false: Early research could not draw any connections between IT and profitability, but later research has shown that the impact can be positive...

Words: 6510 - Pages: 27

Free Essay

Ifsm 300 Input Process Output Learning Activity

...IFSM 300 Input Process Output Learning Activity Question 1 Which of the following is not a business process? Question 1 options: A) Hiring employees B) Paying taxes C) Running the business D) Ringing up a sale Question 2 Question 2 options: The result of a process is the Question 3 In the process "Grade final exams" which of the following are inputs? (select all that apply) Question 3 options: A) Final exam papers submitted B) Answer key C) Student grades on final exam D) Faculty marks the correct and incorrect answers on the exams Question 4 Question 4 options: The information needed for a process to occur is called Question 5 For the process "Make a peanut butter and jelly sandwich" which of the following are the outputs? Question 5 options: A) Peanut butter B) a sandwich C) a full stomach D) the recipe for how to make a peanut butter and jelly sandwich Question 6 True or false: Processes contain action words, or verbs, in their description, whereas inputs and outputs usually do not contain verbs. Question 6 options: Question 7 Question 7 options: The steps taken to change input to output is called a Question 8 For the process of enrolling a student in a class, which of the following are the inputs? (select all that apply) Question 8 options: A) list of names of students in the class B) student name C) ...

Words: 295 - Pages: 2

Free Essay

Ifsm 300 Input Process Output Learning Activity

...IFSM 300 Input Process Output Learning Activity Question 1 Which of the following is not a business process? Question 1 options: A) Hiring employees B) Paying taxes C) Running the business D) Ringing up a sale Question 2 Question 2 options: The result of a process is the Question 3 In the process "Grade final exams" which of the following are inputs? (select all that apply) Question 3 options: A) Final exam papers submitted B) Answer key C) Student grades on final exam D) Faculty marks the correct and incorrect answers on the exams Question 4 Question 4 options: The information needed for a process to occur is called Question 5 For the process "Make a peanut butter and jelly sandwich" which of the following are the outputs? Question 5 options: A) Peanut butter B) a sandwich C) a full stomach D) the recipe for how to make a peanut butter and jelly sandwich Question 6 True or false: Processes contain action words, or verbs, in their description, whereas inputs and outputs usually do not contain verbs. Question 6 options: Question 7 Question 7 options: The steps taken to change input to output is called a Question 8 For the process of enrolling a student in a class, which of the following are the inputs? (select all that apply) Question 8 options: A) list of names of students in the class B) student name C) ...

Words: 295 - Pages: 2

Premium Essay

Stage 5 Umuc

...IFSM 300 415 Homework Assignment 5 Student Name: Class/Section: Professor Name: Assignment Due Date: UMUC Haircuts Case Study Annotated Outline of Next Steps (Stage 5) I. Proposed Technology Solution A. Utilize the TouchSuite to manage products B. Utilize Bar scanning of each product to check out and to in-process inventory C. Utilize employee ID’s, to track usage of products by employees D. Utilize TouchSuite notification services to notify management when inventory is below 5 items for a supply. II. Project Management A. Project team 1. Project Manager: UMUC Haircuts Shift Manager 2. Executive Sponsor: Myra Morningstar 3. Project Team Members: UMUC Haircuts Staff\Employees, 4. Supplementary Staff, as and when needed. B. Schedule 1. A detailed Schedule will be established by the Project Manager for TouchSuite implementation, based on planning that will be completed by the development team. 2. The schedule will include all required activities that will lead to project success. 3. It will include the detailed actions required by the steps of the SDLC and identify deliverables and dates that they must be completed. C. Resources 1. Monetary resource has been provided by UMUC Haircuts management. 2. Initial installation of the TouchSuite hardware and software will be installed by TouchSuite staff. 3. Based on the schedule and the tasks required at various times the project...

Words: 1080 - Pages: 5

Premium Essay

Ifsm201 Final Exam

...Final Exam "OL1" Spring 2014 IFSM 201 –Section 6391 By typing my signature below, I pledge that this is my own work done in accordance with the UMUC policy on academic dishonesty and plagiarism http://www.umuc.edu/policies/academicpolicies/aa15025.cfm. I have not received or given any unauthorized assistance on this assignment/examination _____________________________________ (Typed signature represents actual signature) Instructions: Your responses should demonstrate your understanding of the course content and your analysis and critical thinking; you are not expected to just re-iterate what is in the textbook and the course modules, but to integrate the information and apply it to the specific question. Proper APA style must be used for any citations and references that you use. Place your answers within this document directly below each question (add sufficient space/extra lines as needed) and submit to your UMUC Assignments Folder as an attached MS Word document. This exam is worth 15 points towards the final course grade. Filename: yourlastname Final (example: Brown Final) 1. (15%) Design a wireless network for your home network. A. What is a network? B. How will you and your family members use a home network? C. Name at least five devices you would connect to your network. D. In order to fully implement your home network, what types of hardware, software, connectivity components, etc., would be required? E. Security issues will be needed. What...

Words: 747 - Pages: 3

Premium Essay

Ifsm 201

...Specification for*********, IFSM 201 Due: June 22 Our educational company is a small business with users who will use specialized applications and customized configurations. Staff needs to use desktop computers that are connected together and capable of running sophisticated software programs. The office handles multimedia contents which demand a lot of the PCs’ processor time, resources as well as upload/download contents from the internet. Given the needs of our office, my recommendations are: desktop computers with fast processors preferably, Intel® Core™ i5-4570 Processor (Quad Core, 3.20GHz Turbo, 6MB) plenty of memory (ram); graphic cards for smooth video presentation; video capture cards for multimedia input; and at least 6 USB ports for attaching any extra peripherals. A solid state drive will improve read/write performance of the PCs. A Gigabit Ethernet cards will ensure fast internet speed when uploading or downloading media contents. I have recommended specific details in the following tables, with references to websites where the items can be purchased. Hardware Table: GROUP | DEVICE- Make/Model/Vendor | REQUIRMENTS | INPUT | Key board | US English (QWERTY) Dell KB212-B Quiet USB Keyboard | | | Mouse | Dell MS111 USB Optical Mouse | | | Scanner | HP Officejet Pro 8600 e-All-In-One Printer, Copier, Scanner | scan and edit the photos | | Digital Camera | Canon - Bundle S110 12.1 MP Camera with 5x Wide-Angle...

Words: 921 - Pages: 4

Premium Essay

Pc Vrs Mac

...PC VERSUS MAC Quinston B. Barfield University of Maryland University College IFSM 201 E222 Concepts and Applications of Information Technology (2148) Abstract Mac vs. PC has been a debate for over 20 years on which is better for conventional use. Since the creation of PC and the birth of MAC, many owners of both have arguable stated that one is better than the other. The truth of the matter is that it is simply based off user preference. Both offer a myriad of tools necessary to accommodate any need that you may have, whether it's for business use or just gaming. Based on the information researched on the operating systems, technical specifications, reliability, and user options PC vs. MAC I will have made my verdict on which is ranked number 1. PC Versus MAC Over the last decade, many computer users have argued that PC is better than MAC and MAC is better than PC. Although it is difficult to prove, there are a facts about both that may have their users in the emotional state about who's better. This very debate has ruined friendships, business and inspired some controversial yet creative advertisement, but with all of the debates not many users understand the difference between them. With assistance from a few sources I will share why this debate has yet to be solved. The difference between the Operating Systems The operating system is what significantly separates the two, Windows versus OS X Mavericks. "OS X is the operating system...

Words: 1302 - Pages: 6

Free Essay

Essay

...IFSM 304 – Ethics in the Information Age Learning Portfolio Assignment Descriptions Here are the detailed Assignment Requirements and Summary (Reflection Paper) that comprise activities for a Learning Portfolio for IFSM 304. These activities, along with class discussion and any other assignments your professor may require will enable you to achieve the course objectives and demonstrate knowledge of key concepts and apply this understanding to real-world digital ethics topics and situations. Understand that your work will comprise a Learning Portfolio for the course and these assignments are linked! You will be faced with work that advances with a progression from a general basic framework for decision making to more specific analysis and critical thinking about more complex ethical issues. Current Events 5% Conference Posting of articles on IT-related Ethical Global issues (multi-national corporation) The purpose of this assignment is to analyze a current event article on global ethical issues from a multi-national corporation perspective. This assignment is designed to increase your knowledge from a corporate viewpoint and enable you to analyze ethical issues from a current GLOBAL situation or event. This will also enhance your research and writing skills and your critical-thinking abilities. Select a current topic (2010 source or later) and find an appropriate article on the topic. Provide the persistent URL (one that anyone can click on to read the...

Words: 3771 - Pages: 16

Free Essay

Identity Theft

...The Dangers of Identity Theft Sharae Ernst IFSM 201 – Summer 2012 8/3/2012 “Identity theft occurs when someone uses your personally identifying information (PII), like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.” (Fighting Back Against Identity Theft: Federal Trade Commission). According to the Federal Trade Commission, identity theft complaints have decreased since year 2008 (314,521 to 250,854). It is estimated by the FTC that as many as 9 million Americans have their identities stolen each year. As information technology progresses along with society, there is always an increased risk of having one’s identity stolen. “Identity theft was the number one complaint category in the CSN for calendar year 2010 with 19% of the overall complaints, followed by Debt Collection (11%); Internet Services (5%); Prizes, Sweepstakes and Lotteries (5%); Shop-at-Home and Catalog Sales (4%); Imposter Scams (4%); Internet Auction (4%); Foreign Money Offers and Counterfeit Check Scams (3%); Telephone and Mobile Services (3%); and Credit Cards (2%).” (Consumer Sentinel Network Data Book: For January - December 2010, 2011). Although the numbers have slightly decreased, overall, identity theft is on the rise. “According to a February 2012 Javelin Study, identity theft rose 13% from 2010 to 2011.  More than 11.6 million adults became a victim of identity theft in the United States during 2011.” (Coping with Identity Theft:...

Words: 1352 - Pages: 6

Premium Essay

Introduction to the Internet Final for Umuc Ifsm 201

...Final Exam Spring 2013 IFSM 201 –Section [insert #] By typing my signature below, I pledge that this is my own work done in accordance with the UMUC policy on academic dishonesty and plagiarism http://www.umuc.edu/policies/academicpolicies/aa15025.cfm. I have not received or given any unauthorized assistance on this assignment/examination _____________________________________ (Typed signature represents actual signature) Instructions: Your responses should demonstrate your understanding of the course content and your analysis and critical thinking; you are not expected to just re-iterate what is in the textbook and the course modules, but to integrate the information and apply it to the specific question. Proper APA style must be used for any citations and references that you use. Place your answers within this document directly below each question (add sufficient space/extra lines as needed) and submit to your UMUC Assignments Folder as an attached MS Word document. This exam is worth 15 points towards the final course grade. Filename: yourlastname Final (example Brown Final) 1. (15%) Design a wireless network for your home network. A. What is a network? A network is group of two or more computer systems linked together. B. Describe how the home network would be used by your family members. A home network would be used by family members that have access to mobile computing devices, printers, and other accessories. Everyone in that family that...

Words: 2012 - Pages: 9

Premium Essay

Test

...IFSM 310 Software and Hardware Infrastructure Concepts Final Assessment You must post this into your Assignments Folder no later than Sunday, March, 6 at 11:59 PM Eastern Time. LATE EXAMS WILL NOT BE ACCEPTED. By signing this exam, I confirm that the work contained on this exam is my own, I have received no outside assistance and have properly cited and referenced any external research that has been incorporated in my answers. I have fully complied with UMUC's Policy on Academic Dishonesty and Plagiarism (Policy 150.25). I understand that failure to properly credit my research sources is a violation of this policy. ____Vincent Wang_________________________________ (Typed signature represents actual signature) Exams without signature will not be accepted Information & Instructions * This is an individual assignment. You must work on your own. * The Final Assessment is valued at 20 points. * There 10 assessment items valued at 2 points each. * You have 72 hours to complete the Final Assessment. * Place your responses under each assessment item. * Some external research is required. You must include the appropriate APA format references after your response. * Do not just copy and paste materials. You must write complete mini essays that express your response in your own words with as much original thought as possible. * You must post the completed Final Assessment by the due date shown in the Course Schedule...

Words: 2497 - Pages: 10

Premium Essay

It Strategic Plan

...Rusty Rims IT Strategic Plan, Part 2 IFSM 301 February 6, 2016 Part One 1. Business Statement- Rusty Rims is a regional transportation and distribution company that has been in operation for over 60 years. The company serves major cities in the Mid-Atlantic region. They are headquartered in Wilmington, Delaware and have a staff of 400 employees including truck drivers. There are 6 distribution terminals (Philadelphia, PA, Baltimore, MD, New York City, Washington, DC, Newark, NJ and Wilmington, DE) for consolidating freight and 100 delivery vehicles including 20 tractor/semi-trailer units, 40 box trucks and 40 panel vans. The company operates in a highly competitive business environment. Due to slow economy, growth has been stagnant. John, the president of the company, would like to see growth at 5% per year. He would also like to see expenses cut by 5% to help fund new initiatives. Current revenue is about $39 million a year with profit running at 4%. 2. Business Strategic Objectives- A. Provide warehousing services for customers who want to reduce delivery time to their customers by having product available locally. a. Make sure local distribution is available for customers B. Improve the percent of loaded mile in their fleet to reduce costs by coordinating the pickup and delivery of freight at the same time in the same geographic area b. Increase delivery time c. Increase shipments into and out of the terminals as quickly as possible...

Words: 3703 - Pages: 15

Free Essay

Eletronica Bascica

...material tenha sido desenvolvido inicialmente para a disciplina de Eletrônica Básica do curso de Eletrônica em nível técnico, não há impedimento para a sua utilização em disciplinas pertencentes a cursos técnicos de áreas afins, ou até mesmo em outros segmentos da educação profissional cujo conteúdo programático seja compatível. Os assuntos são abordados em uma seqüência lógica respeitando a visão consagrada por muitos professores no que diz respeito a progressiva complexidade na abordagem do tema, com exemplos e exercícios propostos que ajudarão o aluno na retenção do item estudado e no desenvolvimento do raciocínio exigido para a aprendizagem da Eletrônica. Índice Analítico CAPÍTULO 1: DIODO_______________ 1.1 POLARIZAÇÃO DIRETA 1.2 POLARIZAÇÃO REVERSA (INVERSA) ______ 1 1 1 CAPÍTULO 2: CURVA CARACTERÍSTICA DO DIODO 2.1 POLARIZAÇÃO DIRETA 2.2 POLARIZAÇÃO REVERSA 2.3 TENSÃO DE CONDUÇÃO DO DIODO 2.4 RESISTÊNCIA INTERNA DO DIODO(RI) 3 3 3 4 4 5 5 5 5 5 5 5 6 6 6 7 7 7 7 8 8 8 9 9 11 11 11 11 11 11 11 13 13 13 13 14 14 14 15 17 17 17 18 18 18 18 18 19 20 CAPÍTULO 3: ESTURUTURA INTERNA DO DIODO 3.1 O ELÉTRON 3.2 ÁTOMO 3.3 CARGA ELÉTRICA 3.4 ELÉTRONS LIVRES 3.5 SEMICONDUTORES 3.6 LIGAÇÃO COVALENTE 3.7 ELÉTRON LIVRE NO SEMICONDUTOR 3.8 CRISTAL PURO 3.9 CORRENTE DE ELÉTRONS LIVRES E DE LACUNAS 3.10 JUNÇÃO PN 3.11 CAMADA DE DEPLEÇÃO E BARREIRA DE POTENCIAL 3.12 DIODO DE JUNÇÃO 3.13 POLARIZAÇÃO DIRETA 3.14 POLARIZAÇÃO REVERSA 3.15 CORRENTE REVERSA 3.16 TENSÃO...

Words: 18269 - Pages: 74