Friday, August 9, 2019
Chapter exercise Essay Example | Topics and Well Written Essays - 750 words
Chapter exercise - Essay Example While deceit is considered as occurring via commission, omission also counts, whereby not all the relevant facts are presented. It is essential to develop relationships with people who adhere to the moral conduct code; people of integrity. People who do not honour early commitments will most likely disappoint you in the future. An organizationââ¬â¢s code of ethics refers to the ACM code of ethics in this paper, which consists of 24 principles. Examples include principle 1.5, which requires one to honour intellectual property rights and principle 1.7 that implies that invasion of privacy by sharing information about other people on social media is wrong. Cyber bullying, as it is referred to, means the posting of information on social media with intent to hurt someone. Additionally, those who post information on social networks run the risk of identity theft. An example of identity theft involves theft of oneââ¬â¢s social security number and accessing credit card accounts. Selecting a new e-mail address or changing email providers after a hack is often discouraged by switching costs, which is incurred by moving from one product to another. This is especially so given that most of your friends already know your address and this would mean starting all over. While switching costs may sometimes be low, for example, for those that used Netscape as their earlier browser, some are also perceived. Hackers will usually attempt to make their signatures look authentic, for example, by attaching a copyright symbol into their signature. Copyright should be taken seriously since breaking these laws is a serious offence. Even if, the information is free, the user cannot sell this information. Plagiarism is another concept that is considered as an offence and breach of ethics. With so many sellers and buyers on the internet, it is important to take security measures. People stealing personal information and credit cards then sell the information to on-line auction buyers
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.