Preview

Problems in the Computer World: A Case Study

Satisfactory Essays
Open Document
Open Document
398 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Problems in the Computer World: A Case Study
Case study 4
Problems in Computer World

1. How many of those commandments are being broken here?

These are the commandments they are written by the Computer Ethics Institute: 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
Most all the commandments were broken only number: six, nine and ten were not broken id the story but I belie Larry will or ready brooked them all.

2. Larry seems pretty happy with the prospect of selling those ‘slightly used’ hard drives at the flea market, but what happens if the information on them doesn’t get erased? Would computer World be liable here?

If the information doesn’t get erased from the hard drive all Mr Johnson personal information can get stolen and used on illegal activities and this is very unethical and unmoral from Larry. Computer World will be liable for Larry’s actions by Vicarious Liability – LAW (When a person is held responsible for the tort of another even though the person being held responsible may not have done anything wrong. This is often the case with employers who are held vicariously liable for the damages caused by their employees)

3. What should Steve do now?
First; Steve should be professional and act on his morals values, he should talk to Larry

You May Also Find These Documents Helpful

  • Satisfactory Essays

    1) As a student explain what the Tenable Security INC software license permits you to do and what it does not permit you to do?…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It Case Study

    • 449 Words
    • 2 Pages

    The Widget Wonders distribution center is the worldwide leader in widgets. Which they're in the process of building a state of art facility to manufacture new generation of widgets. The SNHUConsulting group leads the way of consulting in information technology. SNHUConsulting has been hired to consult on new hardware that will last for at least the next three years for the different apartments.…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    Had he been regularly backing up the data on his MacBook, he wouldn’t have had to worry about losing more than a year’s worth of photos, covering the entire lifespan of his daughter, or documents…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Good Essays

    Kingpin Ananlytical Essay

    • 377 Words
    • 2 Pages

    Max committed the crimes of seizing unauthorized access to data in websites, and using that data that he acquired in a manner to steal money. “He would be stealing numbers in a system, not dollars in someone’s pocket” (Poulsen, p. 80). Max took advantage of the computer as an accessory to his crime, to make it easier to steal more data for his personal benefit.…

    • 377 Words
    • 2 Pages
    Good Essays
  • Good Essays

    As seen in the video, criminals stealing hard drives from commercial establishments is becoming more common and holds the opportunity for criminals to steal hundreds of individuals’ credit and debit card information. This growing trend puts the consumer at risk for extra charges on their credit and debit cards as well as identify theft. What is even more surprising is that consumers are unaware of the true risks that are involved in using their card at terminals in stores. Moreover, even though businesses are to swipe the hard drives clean each day, many are failing to complete this proper procedure to prevent consumer’s stolen information. To add, where the consumer’s information was compromised is not made available to the consumer.…

    • 666 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Case Study Analysis

    • 607 Words
    • 3 Pages

    In the case of Honig v. Doe, it was the first case to reach the Supreme Court dealing with discipline of special education students. This case took place in 1988 after two students from the San Francisco School District with emotional disabilities and aggressive tendencies were threatened with expulsion. John Doe (a pseudonym) was a socially and physically awkward 17 year-old who had difficulty controlling his impulses and anger. From early on in school, physical abnormalities, speech difficulties, and poor grooming habits resulted in his being the target of classmates teasing and ridiculing him. One day, in response to taunts from a fellow student at a developmental center for disabled students, he reacted in an explosive manner anticipated by his individualized education (IEP). He choked a student with enough force to leave abrasions on the boy’s neck. Afterwards, while being taken to the principal’s office, John kicked out a window. John was suspended from school for 5 days. The principal recommended that he be expelled. A lawsuit was filed, and the federal district court issued a temporary order directing the school to return John to his then current educational placement.…

    • 607 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Art Commission Statement

    • 1333 Words
    • 6 Pages

    References: 1. The Ten Commandments Bible Study. (2001-2005) Retrieved on November 3, 2005 from Website http://godstenlaws.com/…

    • 1333 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Spyware

    • 2042 Words
    • 9 Pages

    After perusing the internet Mr. Anderson’s home laptop started to perform commands on its own, without Mr. Anderson’s input. An ad for Spy-Wiper appeared on his laptop warning him that if he wanted to protect his laptop he had to sign up for the program that would clear his system of any rogue software. When Mr. Anderson arrived at work the following day he discovered that his office computers displayed similar messages from Spy-Wiper. Spy-Wiper was using coercion tactics to intimidate users into signing up for their software, holding the user’s computer hostage until they complied. Spy-Wiper created the threat and supplied the solution.…

    • 2042 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Midterm BUSN120

    • 1412 Words
    • 8 Pages

    9. Which of the following ethical frameworks directs us to decide based on overall consequences of our acts?…

    • 1412 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    10. People who follow society’s laws and rules are always people of higher moral character than those who break the rules because of their personal beliefs.…

    • 311 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    |quite reminiscent of the remaining items within Principle I: Ethical Conduct Towards Students. The remaining items are: |…

    • 471 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    References: Bott, F. (2005), Professional Issues in Information Technology, The British Computer Society, Wiltshire. Data Protection (n.d.), http://www.bcu.ac.uk/health/research/ethics-and-indemnity/ethicsapplications/data-protection. Accessed: 05/01/2013. Lee, M. (2012), ‘Professional Computing module’, http://www.cs.bham.ac.uk/ mgl/profcomp/lectures/. Filetype: Pdf, Accessed: 02/01/2013.…

    • 434 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Agencies are required to evaluate proposals based solely on the evaluation factors identified in the solicitation. Furthermore, according to Federal Acquisition Regulations, they must adequately document the reasons for their evaluation conclusions (FAR§ 15.308). GAO recommended to the agency was to, at a minimum reevaluate both proposals to ascertain if they were evaluated based on the evaluation factors and to determine if adequate rationale were articulated.…

    • 556 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    course work

    • 1740 Words
    • 6 Pages

    2)“You must under all conditions and at all times treat me considerately, kindly, loving, and fairly. If you don’t you are no damned good and is a rotten person.…

    • 1740 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    The main commandments that are broken in the book are: “no animal shall drink alcohol”, “no animal shall kill any other animal”, and “all animals are equal”.…

    • 892 Words
    • 4 Pages
    Good Essays