Showing posts with label Computer Ethics. Show all posts
Showing posts with label Computer Ethics. Show all posts

Sunday, March 6, 2011

IT16 Case Study 12: The KILLER ROBOT

Read the fictitious KILLER ROBOT case found at the web site for the Online Ethics Center for Engineering and Science at www.onlineethics.com (look under Computer Science and Internet cases) or go directly to this link http://www.onlineethics.org/Resources/19049/killerrobot.aspx .

The case begins with the indictment of a programmer for manslaughter for writing faulty codes that resulted in the death of a robot operator. Slowly, over the course of many articles, you are introduced to several factors within the corporation that contributed to the accident. Read this case and answer the following questions.

a. Responsibility for an accident is rarely clearly defined and able to be traced to one or two individuals or causes. In this fictitious case, it is clear that a larger number of people share responsibility for the accident. Identify all the people who you think were at least partially responsible for the death of Bart Matthews, and why you think so?

b. Imagine that you are the leader of a task force assigned to correct the problems uncovered by this accident. Develop your “top-ten” list of actions that need to be taken to avoid future problems. What process would you use to identify the most critical actions?

c. If you were in Ms. Yardley’s position, what would you have done when Rays Jonhson told you to fake the test result? How would you justify your decision?

Instructions:
  • Your answers should be no less than 200 words each.
  • Due: March 14, 2011

Read more...

Tuesday, February 15, 2011

IT16 Prefinal Requirement

IT16 Prefinal Exam 100 pts

By pair

· Interview a certain IT professional. The following are some guide questions:

  • Personal Information?
  • What is his/her work in the field of IT?
  • Educational Background?
  • How much income he earns every month?
  • Why he/she chose an IT-related career?
  • What are his/her motivations in continuing his/her work?
  • As an IT professional, what are his/her contributions to his field of work? to the society? to the IT industry?
  • What are his/her plans in the future?
  • What are his/her advices for future IT Professional?

· Create a short biography of the IT professional based on the interview.


Instructions:

  • Due: March 2, 2011.
  • Format: Arial, 11, double spacing.
  • Brown folder white slider, Short sub 20 white paper.
  • Include pictures and other evidences of your interview.

Read more...

Thursday, February 10, 2011

IT16 Case Study 10: Being an IT Professional

In Italy, raccomandazione is the custom of seeking and receiving special treatment from people in power or from people who are close to someone in power. The ability to solicit favors from someone in a higher place, be it through the chief of police or the chief of the police’s chauffeur, has been part of the Italian art of getting things done for over 2000 years. In April 2001, Italy‘s highest court of appeal ruled that influence peddling is not a crime. The judges did rule, however, that it is a crime to overstate one’s power in order to exert influence.
Your firm is opening a new sales office in Rome and will be using a local employment agency to identify and screen candidates who will then undergo employment testing and interviews by members of your organization. What guidelines would you provide to the agency in regard to the practice of raccomandazione to ensure that the employment agency operates ethically and effectively?

Instructions:
  • Due: February 16, 2011
  • You can show it in a bulleted form or in an essay form.

Read more...

Tuesday, January 11, 2011

IT16 Case Study 9: Security technologies

Using the additional readings, or a suitable online search engine, research one of the following security technologies, focusing on a particular application or example. Discuss some of the problems of implementing this technology and create a SWOT (strengths, weaknesses, opportunities, threats) analysis.

  • Biometrics
  • Encryption
  • Access Control Software
  • Honeypot
Instruction:
  • Due: January 28, 2011

Read more...

IT16 Case Study 8: Technology Abuse

Watch at least two of the following movies:
  1. Die Hard 4
  2. Wall e
  3. 9
  4. Surrogates
  5. The fifth element
  6. The Island
  7. Babylon AD
  8. I, Robot
  9. Equilibrium
  10. Minority Report
  • Make a comprehensive reaction paper for the two movies in no less than 300 words each.
  • Make a comparative analysis of the two movies you chosen.
  • Short bond paper, choose your own format.
  • Due: January 24, 2011

Read more...

IT16 Case Study 7: Computer Lab Security Measures

As the use and the advancement of computer networks especially the Internet has increased dramatically during the past few years, I.T. security is fast becoming the top priority for most of the companies implementing and using I.T. as part of their business process.

The National Cyber Security Alliance (NCSA) provided some guides to both the home and corporate users to help prevent their computer systems from being compromised. Here are the top ten security tips that you should always put in mind:
1. Use anti-virus software and keep it up to date.
Make sure you have anti-virus software on your computer. Anti-virus software is designed to protect you and your computer against known viruses. But with new viruses emerging daily, anti-virus programs need regular updates. The more often you keep it updated, the better.
2. Don’t open emails or attachments from unknown sources.
A simple rule of thumb is that if you don't know the person who is sending you an email, be very careful about opening the email and any file attached to it. Should you receive a suspicious email, the best thing to do is to delete the entire message, including any attachment. Remember that
even friends and family may accidentally send you a virus or the e-mail may have been sent from their machines without their knowledge.
3. Protect your computer from Internet intruders by using firewalls and internet security appliance.
Equip your computer with a firewall and with internet security appliance. They work by filtering out unauthorized or potentially dangerous types of data from the Internet, while still allowing other valid data/request to reach your computer.
4. Regularly download security updates and patches for operating systems and other software.
Most major software companies today release updates and patches to close newly discovered vulnerabilities in their software. You need to be sure you download and install the patches and getting it from the correct patch update site.
5. Use hard-to-guess passwords.
Passwords will only keep outsiders out if they are difficult to guess. Don’t share your password, and don’t use the same password in more than one place. If someone should happen to guess one of your passwords, you don’t want them to be able to use it in other places.
6. Back-up your computer data on disks or CDs regularly.
Back up small amounts of data on floppy disks and larger amounts on CDs. If you have access to a network, save copies of your data on another computer in the network.
7. Don’t share access to your computers with strangers.
Unless you really need this ability, make sure you turn off file-sharing. Check your operating system and your other program help files to learn how to disable file sharing. Don’t share access to your computer with strangers.
8. Disconnect from the Internet when not in use.
Remember that the Digital Highway is a two-way road. You send and receive information on it. Disconnecting your computer from the Internet when you’re not online lessens the chance that someone will be able to access your computer. Someone could infect your computer or use it to
harm someone else on the Internet.
9. Check your security on a regular basis.
You should evaluate your computer security and policies at least twice a year. Look at the settings on applications that you have on your computer. Check what settings you have and make sure you have the security level appropriate for you.
10. Make sure your family members and/or your employees know what to do if your computer becomes infected.
It’s important that everyone who uses a computer be aware of proper security practices. People should know how to update virus protection software, how to download security patches from software vendors and how to create a proper password.

Instruction:
  • In your own little way, suggest 10 more ways to help prevent the computer systems from being compromised. Also suggest ways to HELP our laboratory from being compromised.
  • Due: January 17, 2011

Read more...

Sunday, December 26, 2010

IT16 Case Study 6: Malicious Programs

You have learned that a friend of yours is developing a worm to attack the administrative systems at your institution of learning. The worm is “harmless” and will simply cause a message – “Let’s party” – to be displayed on all workstations connected to the computers on Friday at 3 pm to 4 pm the virus will erase itself and destroy all evidence of its presence. What would you do?


Instructions:

  • Your answers should be in no less than 300 words
  • Due: January 5, 2011

Read more...

IT16 Case Study 5: Hacking

What would you do...

You have just been hired as an IT security consultant to “fix the security problem” at Acme United Global Manufacturing. The company has been hacked mercilessly over the last six months, with three of the attacks making the headlines of the business section for the negative impact they had on the firm and its customers. You have been given 90 days and a budget of $ 2 million. Where would you begin, and what steps would you take to fix the problems?

Instructions:

  • Your answers should be in no less than 300 words.
  • Due: January 5, 2011

Read more...

Thursday, December 9, 2010

IT16 Prelim Exam Postponed

The scheduled prelim exam for IT16 will be moved to December 13, 2010 (Monday) due to test questionnaire reproduction problems.

Read more...

Sunday, December 5, 2010

IT16 Activity: Virus Development Timeline

Create an ILLUSTRATIVE EXAMPLE of the history of VIRUS development.

  • Be creative. Creativity and Design is an IT Competency.
  • You can use magazine/newspaper pictures.
  • 1/4 illustration board.
  • By 3s or 4s (3 or members per group)
  • Submit it on December 15, 2010

Read more...

Monday, November 22, 2010

IT 16 Case Study 3: Applying Ethical Theories

A programmer, after returning from a holiday to an underdeveloped country, was deeply affected by the level of poverty. when he returned to his job in a large international corporation, it occurred to him that he could write a program that filtered off small amounts of money from the advertising account and pay it to a private account. His idea was to collect enough money to provide IT equipment and training to the people in the town he had visited on holiday. However, he is not sure about his decision. What should he do?
a) What solution does a Kantian approach offer?
b) What solution does a consequentialist approach offer?
c) Are their conclusions the same?
d) What do you think he should do?

Instructions:
  • Due of submission: November 26, 2010

Read more...

Tuesday, November 16, 2010

IT 16 Case Study 2: Ethics and the Law

Download the case study 2 problem here.
If it doesn't work, follow this link: http://projectarchive.comuf.com/upload/303.doc
Due: November 19, 2010

Read more...

Thursday, November 11, 2010

IT16 Case Study 1: What is Computer Ethics?

Read James Moor’s article about computer ethics.

Click here to download the article.
If it doesn't work, follow this link:
http://www.blackwellpublishing.com/content/BPL_Images/Content_store/Sample_chapter/9781855548442/CEAC01.pdf
A. Cite some important concepts that is related to the following properties:
• Logical malleability
• Impact on society
• Invisibility factor

B. Make a reaction paper about the article in not less than 300 words.

Printed, Short Bond Paper, Choose your own format.
Date of submission: November 15, 2010
Submission beyond the said date will have grade deductions.
Quote statements or phrases that are not yours.

PLAGIARISM IS A CRIME!!!

Read more...
Web Marketingdrive recovery software