If I were a representative of the BSA (Business Software Alliance) it is my duty to help stop copyright infringement of software produce by the members of BSA. By definition, software piracy is stealing of legally protected software. If we take into account the Kantian Ethics, we have to ask "what if everybody does it? can... Continue Reading →
Security Technologies: Problems, Strengths and Weaknesses
LOGICAL ACCESS CONTROL BIOMETRICS Logical access control Logical access control is a major area of application for biometric technology. When we say, “It’s time to kill the password,” this is the tech we’re talking about. Whether it’s securing the apps on your smartphone, gaining access to a work email or enabling an effective BYOD policy,... Continue Reading →
The Robert Morris Internet Worm launched in November of 1988
Defendant Robert Tappan Morris was charged under the Computer Fraud and Abuse Act of 1986 for launching a “worm” on the Internet. Morris became the first individual to be tried under the new Computer Fraud and Abuse Act of 1986, 18 U.S.C. Section 1030(a)(5)(A) (Kelty, n.d.). On appeal, he argues that the United States government failed... Continue Reading →
Why is it important to follow computer ethics?
In the past decades, we have witnessed several technological advancements which has greatly changed the way we communicate, learn, and do business with each other, such as the emergence of cell phones, computers and the Internet. While it is absolutely true that these technological advancements have greatly helped the way we lived, we should consider... Continue Reading →