Computers are the core technology of our times and apparently, the most important technology to be invented and used by man . Without computers and computer networks, especially, the Internet, activities of most organizations, such as banks, schools, government agencies would simply grind to a halt. Modern society's dependence on the use of information technology, make it more vulnerable to computer malfunction caused by unreliable software and to computer misuse (Forrester and Morrison, 2001). According to Forrester and Morrison (2001), this unethical use of computer have created a whole new range of social problems, which include computer crime, software theft, hacking, the creation of viruses, invasion of privacy, overreliance on intelligent machines and workplace stress.
This unethical behaviour related to Information System (IS) have caused significant losses to businesses and the society at large. Professional IT bodies are concerned about these ethical problems because of their potential harm to the society and to the integrity of the IT profession. The Association Computing Machinery (ACM), Institute of Electrical and Electronics Engineers (IEEE), the British Computer Society and International Federation for Information Processing (IFP) came together to formulate codes of ethics and professional conduct for IT professionals, as a way to check or reduce unethical conduct in the IT profession. The 1991 report of the ACM/IEEE-CS Curriculum Task Force recommended the introduction of computer ethics into Computer Science Curriculum at University level (Martin & Yale-Weltz, 1999). The report stressed the importance to expose students to ethical and societal issues that are associated with the co...
... middle of paper ...
...is study, the following research questions were formulated:
Do they see some of their activities as computer crime?
Has the teaching of computer ethics changed their perception of computer crime?
Does age and gender affect students' judgment of what they perceive as computer crime?
What are the similarities and differences between the findings of this study and that of related studies
1.4 Limitations of the Study
This study evaluates computer ethics awareness among university students. It involves only students of masters in Computer and Systems Science Stockholm University. Other graduate students are excluded from the study. These group of students were chosen because they are readily accessible by the researcher and due to limited time that is available for the conduct of the study. The scope of the study is limited to computer crimes aspect of computer ethics.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Accord to Brian N. Williams of The co-production of campus safety and security: a case study at the University of Georgia said: “Campus safety and security is a noteworthy issue and an area of increasing concern facing educational institutions in the United States.” Before I came to America, I saw a lot of news about the US school shootings which were so terrible, but still I think it won’t be happen on me. The shooting things are really far away from me until few days before. There had a shooting threat announcement post on Internet said ASU would be his shooting target few days ago.... [tags: Security, Computer security, Physical security]
786 words (2.2 pages)
- This study is useful for creating recruitment plans because it shows that although many institution’s recruitment plans follow the same guidelines and emphasize the same values, it is the differences and uniqueness of each school that ultimately changes a student’s decision. This article exposed that the recruitment strategies used by all the institutions studied are implemented to strengthen their current institutional profile rather than change it to match other/more successful schools. This study demonstrates that good recruitment strategies keep up with current trends but also maintain the institutions personal characteristics.... [tags: College, High school, Computer science, Student]
1203 words (3.4 pages)
- DEVOXX on Security TL;DR We, the DEVOXX 2015 Security track team, want to increase security awareness among software and hardware developers. We want to make this year 's track about understanding how to break things, and knowing that this understanding allows developers to design and build more secure systems. Security has to be by design, not by feature, use case or layer. In this spirit, we would like to invite you to submit talks around the subjects on how to stress security of software projects and on how to deal with these aspects as a developer and architect.... [tags: Computer security, Security, Design]
884 words (2.5 pages)
- We live in a world that can’t live without binary code anymore. Computers have pervaded so deep in our lives that they are now being called ubiquitous. With phenomenal increase in users, has come a phenomenal increase in data. We generate a vast amount of data through activities on our computing devices making it necessary to employ intelligent algorithms which enable the system to learn from and analyze this vast dataset. Fortunately, the advent of Distributed Computing has created avenues to access virtually limitless computing power even through mobile devices thus, allowing us to use highly complex and large scale algorithms.... [tags: technology, computers, academics]
1047 words (3 pages)
- PURPOSE BACKGROUND Universiti Teknologi MARA Universiti Teknologi MARA or UiTM, established in 1956. UITM can be considered as the largest university in the Malaysia with a main campus, three cable campuses, 12 branch campuses, six city campuses, 25 affiliated campuses and a smart campus for the future. Presently, the Shah Alam campus is host to 45% of the total 100,000 students. Information system management(ISM) is the one of the course that offered by Universiti Teknologi MARA.ISM is the study of people, technology, organizations and the relationships among them.... [tags: university evaluation and comparison]
1118 words (3.2 pages)
- SANS Securing the Human (STH) is online computer-based security and awareness training to raise awareness concerning internet security. Our organization utilizes this training in order to train employees to be aware of the dangers that exist and how to safely use internet resources. Our information security team conducted a survey before the training and they intend to conduct another survey after the training is completed to measure awareness of cyber security issues. We are in the process of a year’s worth of training consisting of 43 modules (videos) with several modules assigned to us each month for us to watch.... [tags: Computer security, Security]
737 words (2.1 pages)
- It seems that persons presently in the workforce and those students who are now graduating college know less about the computer, its functions and the internet when compared to the younger generation. These days the children in elementary, middle and high school have more access to the computer and the internet than we did when we were younger. The internet has become the modern way of communication and research for the younger generation. The coming generation knows more about links, search engines, and "surfing the web".... [tags: Exploratory Essays Research Papers]
1059 words (3 pages)
- Conceptual frameworks serve as guides allowing people to view complex organizations from different perspectives. Morgan (2006) presents nine frames in the form of metaphors: (a) Machines, (b) Organisms, (c) Brains, (d) Cultures, (e) Political Systems, (f) Psychic Prisons, (g) Flux and Transformation, and (h) Instruments of Domination. Bolman and Deal (2008) present four frames: (a) Structural, (b) Human Resource, (c) Political, and (d) Symbolic. No single framework can provide a complete picture of an organization, so using multiple frames provide a more complete organizational perspective.... [tags: The Disengaged Commuter Student]
2951 words (8.4 pages)
- 1. Introduction As human beings we have a plethora of senses that provide us with information about our proximate surroundings. Our sight, hearing and touch predominantly define how we perceive our environment and fathom the world . Hundreds of thousands of years of evolution taught us to use the information gathered from our senses to efficiently communicate ideas among us and to respond fittingly. Therefore, when people interact, they can use inherent situational information to increase the conversation flow.... [tags: human-computer communication]
2788 words (8 pages)
- The University of Arizona's Computer Science Department is a quality research program. The most recent National Research Council rankings place the department 33rd out of 108 PhD-granting institutions nationwide, despite the fact that we are a comparatively small department. In addition, we are the best Computer Science department of our size among publicly funded Universities, with the highest in number of citations (references) per faculty, and 17th overall in the number of publications per faculty.... [tags: essays research papers]
505 words (1.4 pages)