br Table of ContentsExecutive SummaryBackground and IntroductionContentProfessional and social issues in computingThe Interest GroupsThe real problemACM code of ethicsIEEE code of ethicsRecommendationsConclusionReference Executive SummaryThere is an erstwhile(a) pr overb which says that : The go and the saint are inside everybody The greatest saint of twain(prenominal) generation dissolve fetch a devil and iniquity versa . It is l superstarsome(prenominal) a question of opportunity and availability of the inevitable resources . some(a) men can even blend Hitler s or Mussolini s wedded the circumstances and the power to become so . thus in the on the whole process they can adversely see the whole world in such(prenominal)(prenominal) a route that it can become so disturbingly unrecognizableThe Information engine room has become one such powerful mass scale of measuring stick weapon during the last half a century . thus the users operating it mustiness be do mature and creditworthy enough to understand how there actions can harm the an other(a)wise(prenominal) concern groups directly or indirectly otherwise they must not be given the power to use it . afterward both duties and rights are two sides of the same coinThe codes of usage both pen or hidden have definitely to be followed by an ethical computer user otherwise it can aim to great turmoil and havoc amongst the interest groups (which in my example are the perpetrator of the abuse Richard Macado , the victims- The fellow students of UCI the UCI itself as an origin , the state that is enforcing the law the society at gravid and the engine room developersAny misuse of the applied science by the user had detrimentally stirred all the abovementioned interest groups . The state had to punish him so as to set a precept b efore those heroic to take on so . If not ! guarded properly such actions big businessman even inhibit further culture of technology and inventions passim the world .

The case also brings forth the all Copernican usefulness of visualizing the effects of a particular development for the purposes other than it is intended for e .g . Hon Albert Einstein while growing the comparison of e mc2 must have never effected that one day his research would be used in exploitation the atomic bomb . Similarly when the internet and other such technologies like the TCPIP ( Transfer control communications protocol / profits Protocol ) were being developed by US armament littler would they hav e visualized that apart from enormous advantages such technology would bring astir(predicate) , it would also bring about cyber crimes , cyber terrorism etc that are happening todayThe BackgroundRichard Macado , was only 19 course of study old when he committed this offence of sending threat emails to his co students after clearly identifying the Asians amongst them using the SMTP technology and riff commands over Linux operating system using dirty intravenous alimentation letter words called Flames amongst the internet community threatening them to give the UCI immediately or die from his hands . Little did he realize that the merger of the computer and telephony had inadvertently make such a powerful weapon for destruction to mind the Internet...If you want to get a full essay, order it on our website:
BestEssayCheap.comIf you want to get a full essay, visit our page: write my paper
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.