br Table of ContentsExecutive SummaryBackground and IntroductionContentProfessional and social issues in computingThe Interest GroupsThe authentic problemACM code of ethicsIEEE code of ethicsRecommendationsConclusionReference Executive SummaryThere is an old proverb which says that : The gravel and the saint are inside everybody The greatest saint of both(prenominal) times dissolve become a devil and iniquity versa . It is only a question of opportunity and availability of the inevitable resources . Some men can even become Hitler s or Mussolini s given the circumstances and the power to become so . thus in the whole process they can adversely see the whole world in such(prenominal) a route that it can become so disturbingly unrecognizableThe Information engine room has become one such powerful mass scale of measurement weapon during the last half a century . therefrom the users operating it mustiness be do mature and creditworthy enough to understand how there actions can harm the an otherwise(prenominal) interest groups directly or indirectly otherwise they must not be given the power to use it . afterward both duties and rights are two sides of the same coinThe codes of usage both written or hidden have definitely to be followed by an ethical computer user otherwise it can lead to great turmoil and havoc amongst the interest groups (which in my case are the perpetrator of the abuse Richard Macado , the victims- The fellow students of UCI the UCI itself as an institution , the state that is enforcing the law the society at gravid and the technology developersAny misuse of the technology by the user had detrimentally affected all the abovementioned interest groups . The state had to punish him so as to set a precept before those heroic to repeat so . If not guarded properly such actions might even inhibit further culture of technology and inventions throughout the world .
The case also brings forth the all important usefulness of visualizing the effects of a particular development for the purposes other than it is intended for e .g . Hon Albert Einstein while growing the equation of e mc2 must have never effected that one day his research would be used in developing the atomic bomb . Similarly when the internet and other such technologies like the TCPIP ( Transfer control Protocol / profits Protocol ) were being developed by US armament little would they have visualized that apart from enormous advantages such technology would bring astir(predicate) , it would also bring about cyber crimes , cyber terrorism etc that are happening todayThe BackgroundRichard Macado , was only 19 course of study old when he committed this offence of sending threat emails to his co students after clearly identifying the Asians amongst them using the SMTP technology and riff commands over Linux operating system using dirty intravenous feeding letter words called Flames amongst the internet community threatening them to confide the UCI immediately or die from his hands . Little did he realize that the merger of the computer and telephony had inadvertently made such a powerful weapon for destruction to wit the Internet...If you want to get a full essay, order it on our website: Orderessay
If you want to get a full essay, wisit our page: write my essay .
No comments:
Post a Comment