Sunday, May 17, 2020
Computing Ethics and Cyber Law - 5632 Words
1.0 Introduction ____________________________________________________________ _ Information Technology (IT) is gradually becoming one of the hottest topics globally regardless of which age group you are in. Due to the fact that IT enables us to be more efficient and effective, the demand for technology multiplies yearly. Therefore, there is a rapid growth in the technology industry globally, especially the software industry. For the past few years, Malaysia has been slowly in the Information Technology area. Malaysians are more IT literate and the awareness towards technology usage has increased. The high demand towards technology encouraged the country to open up more technological industries. For instant, due to the demands and needsâ⬠¦show more contentâ⬠¦Cyber crime involves activities like credit card fraud, unauthorized access to computer systems, child pornography, software piracy and cyber stalking. Thus, cyber law is needed in political and legal matters related to the Internet and other communication technology. (Osiur Rahman, Mahabubur Rahman Nour Mohammad, 2004, Law Our Rights, Retrieved on November 10, 2006 from http://www.thedailystar.net/law/2004/12/04/index.htm) 3.1 Comparison between Malaysian Cyber Law and European Cyber Law Malaysian Cyber Law (Computer Crime Act 1997) European Cyber Law (Computer Misuse Act 1990) Similarity Provide for offences relating to the misuse of the computers Provide for offences relating to the misuse of the computers Implementation Of Cyber Law (We choose only 2 implementation to discuss) â⬠¢ Conduct raid operation. â⬠¢ Immediate ban towards the sales of CDs in open places (focusing on physical object piracy) â⬠¢ Conduct raid operation. â⬠¢ Quarantine unauthorized website. (focusing on online piracy) Difference â⬠¢ Acts not specific. â⬠¢ Focus more towards piracy awareness as solution. â⬠¢ The lack of effective intellectual property law (High corruption rate) â⬠¢ Acts are specific. â⬠¢ Focus more towards peopleââ¬â¢s mental model as a solution. â⬠¢ Effective intellectual property law. Table 1.0 ââ¬â Comparison between Malaysia and European Country 3.1.1 The Similarity between Malaysian Cyber Law and European Cyber Law Malaysia is one of the first few countries in the world toShow MoreRelatedCyberspace Of Business Ethics Essay1590 Words à |à 7 PagesThe cyber world has become a most important part of our everyday lives. We spend an increasingly significant portion of our lives in it and use it to communicate with friends, acquaintances, loved ones, and business associates. We make use of our computers and Internet connectivity to look for and purchase all kinds of goods and services. We use the web and all its powerful resources to educate ourselves and to gain knowledge. We are able to look for, join and keep up with special interest groupsRead MoreCyber Crime Id Theft And Credit Fraud1411 Words à |à 6 Pagesrapidly. According to Mooreââ¬â¢s law; the doubling of transistors on integrated circuits (ISSCC, 2003) it expects more powerful information technology, and also expect technologies to continue their concrescence to new more powerful appliances with new features. Since the new technol ogies/features are on the increase via ââ¬Å"accelerating returnsâ⬠(Kurzweil, 2001), there is a concern within this essay and an ever increasing global population in the context of privacy, laws and ethical considerations. IfRead MoreA Brief Note On Terrorism And The European Charter Of Human Rights1073 Words à |à 5 PagesItââ¬â¢s noted that the greatest threat Europe faces isnââ¬â¢t cyberwarfare, cyber terrorism, or espionage, but rather software and hardware failure. (Information Management Journal, 2015). One of the key challenges to resolving infrastructure weakness is that each country approaches it differently. In recent years, cybersecurity was an intermediary international concern in Europe and privacy was the principal concern for Europeans. On the Internet, Europeans promote the ââ¬Å"right to be forgottenâ⬠and theyRead MoreCyber Security : A New Cyber Attack Essay1588 Words à |à 7 PagesIn the newfound age of Cyber Security there is much that still needs to be done before the industry can function without all of the difficulties currently faced. Every day it seems like a new cyber attack has overtaken another victim. This cyber threat is so big that President Barak Obam a passed the Cybersecurity Act of 2015 . Among other things, this act calls for increases in information sharing between businesses and the federal government. It also has a hefty dollar amount behind it. In the 2017Read MoreCyber Crimes, Moral And Ethical Implication1664 Words à |à 7 PagesCyber Crimes, Moral and Ethical Implication Introduction The internetââ¬â¢s rapid growth and computer technology has helped people around the world over the past few years. This evolution has also enabled new forms of crime-dubbed cyber-crime. This phenomenon has greatly evoked feelings such as admiration and fear in people mind. Cyber-crime is defined as crimes committed on internet, with computers as the tool, Agathise E Joseph, June 28th 2006. It is not an ââ¬Å"armed robberyâ⬠, not a murder but a practiceRead MoreEthics, Compliance Auditing, and Emerging Issues1682 Words à |à 7 PagesEthics, Compliance Auditing, and Emerging Issues INTERNAL MEMO TO: John Doe CEO FROM: Glen Leonard RE: Ethics Program / Training /Compliance Auditing ------------------------------------------------- DATE: February 22, 2016 This memo serves as notice that we will soon initiate efforts to develop and implement an ethics program as well as the appropriate training and an effective way to monitor those plans. As you are aware, consumers and partners wantRead MoreThe Loss of Privacy Will Be a Major Consequence of the Computer Revolution1093 Words à |à 5 PagesCentral Intelligence Agency is a good example of a company that has the power of having any kind of information about a person according to the law, and they have the ability to acquire this information thanks to the computers. Kristyna Gordniak a Professor of Philosophy at Southern Connecticut State University argued in her article about Computer Ethics that If the CIA does not need to respect an ethical code, who else is entitled to break the rules and on what grounds? If one country can do itRead MoreThe Ethical Implications of Cloud Computing on Society1724 Words à |à 7 PagesIndividual Research Paper: The Ethical Implications of Cloud Computing on Society MGMT 505 Corporate Social Responsibility and Public Policy Spring 2013 Niki A. den Nieuwenboer Cloud Computing is a popular term for ââ¬Å"enabling on-demand network access to a shared pool of computing resources that can be rapidly provisioned and released with minimal management effort or service provider interactionâ⬠(Brian, 2012). The concept of Cloud Computing was first developed in the 1960ââ¬â¢s by scientists whoRead MoreHacking Crimes : Solutions For It1281 Words à |à 6 Pageshierarchy of hackers. McAfee defines major categoriesof hackers - Black hats, White hats and Grey hats. A white hats usually works within the laws of hacker ethic (to do no harm) or as a security experts. They are interested in improving security of computer system, operating systems, softwares and networks. They have a long tradition of trying to improve the computing community and its resources. A Black hats forces software vendors and systems administrators to fix security problems by publishing knownRead MorePrivacy and Computer Technology1813 Words à |à 7 Pageswidespread, computer ethics are boiling down distinguishing what is good from what is wrong mentality. Everyones view on computer ethics differ, however all should keep in mind the value of ethics when making decisions that are ethics based. The golden rules of computer ethics state that, one should do to one another what he/she thinks should be done to them and if at least quite a number of people obey the golden rule, then there would be no many issues concerning computer ethics as they are today
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.