Pearson eText for Software Engineering -- Instant Access (Pearson+)
10th Edition
ISBN: 9780137503148
Author: Ian Sommerville
Publisher: PEARSON+
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 1, Problem 1.10E
Explanation of Solution
Ethics required in development of systems:
Many computer systems have been developed to fight against or to reduce the terrorism. One of the ways is to keep the track of the citizens and their actions. The necessary ethics while working on the development of such systems are as follows:
- It intrudes the privacy of the citizens.
- Sometimes it may intervene the work of some citizens as they lack privacy...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Identity theft is a frequent kind of criminal activity that, regrettably, is on the rise owing to the widespread use of the internet. Please describe the many techniques that hackers may use to steal your identity as well as the precautionary steps that, in your view, ought to be taken to ensure that this doesn't happen.
The study of computer ethics covers a wide range of subjects, some of which include government, crime, privacy, social interactions, and even security. These are only a few of the subjects that are investigated. How important do you think it is for chief information officers to make ethics in computer use a high priority so that sensitive customer information may be kept secure?
What does the term "digital privacy" mean in the context of technology's evolution? Can you provide concrete examples of cyber security?
Chapter 1 Solutions
Pearson eText for Software Engineering -- Instant Access (Pearson+)
Ch. 1 - Explain why professional software that is...Ch. 1 - What is the most important difference between...Ch. 1 - What are the four important attributes that all...Ch. 1 - Prob. 1.4ECh. 1 - Prob. 1.5ECh. 1 - Explain why the fundamental software engineering...Ch. 1 - Prob. 1.7ECh. 1 - Prob. 1.8ECh. 1 - Prob. 1.9ECh. 1 - Prob. 1.10E
Knowledge Booster
Similar questions
- The study of computer ethics covers an extremely broad range of subjects, some of which include government, crime, privacy, social interactions, and even security. How important do you think it is for chief information officers to make the ethics of utilising computers a high concern in order to ensure that sensitive customer information remains secure?arrow_forwardThe study of computer ethics covers a wide range of subjects, some of which include government, criminal activity, privacy, social interactions, and even security. How important do you think it is for chief information officers to make the ethics of utilising computers a high concern in order to ensure that sensitive customer information remains secure?arrow_forwardComputer ethics covers a wide range of topics, including security, cybercrime, personal privacy, social interaction, and governance, to name just a few. To what degree do you agree with the concept that chief information officers (CIOs) should make the practise of computer ethics a major element of their strategy for protecting sensitive information?arrow_forward
- Computer ethics examines a wide variety of topics, some of which include governance, crime, social interactions, privacy, and even security and privacy. How important do you think it is for chief information officers to make the adherence to ethical standards in the use of computers a core component of their strategy for the protection of private data?arrow_forwardWhat exactly does "privacy" entail in terms of protecting sensitive information? Does one's sense of privacy alter as they get older, and if so, how does that shift manifest?arrow_forwardNearly a decade has passed since the National Academy of Engineers declared Cyber Security a "grand challenge for the next century." Every day there is news on ways in which cyber security challenges and responses are complicating every aspect of our lives. Can the challenge be solved? As a first step to solving any problem, one must understand its nature. So, it is important for all cyber security analysts to keep on top of news stories in the field. In this discussion forum we will do just that with the hope that everyone will make it a daily habit throughout their career. Today, some cyber news has been flooded out of the headlines by Hurricane Harvey, but as noted in this article, cyber concerns are front and center as students return to school.arrow_forward
- In the context of evolving technology, what does the term "digital privacy" mean? Can you provide any specific instances of cyber security?arrow_forwardSecurity, crime, privacy, social relationships, and even government are just few of the many areas that computer ethics explores. To what extent do you believe that chief information officers should make computer ethics a central tenet of their plan for safeguarding private data?arrow_forwardWhat is the purpose of surveillance? What types and levels of surveillance are there? As it relates to widespread use of CCTV surveillance in Europe, do you believe the US is embracing that practice? Whether your answer is yes or no, provide a legal rationale for whether you believe it is allowable, or not, under our laws.arrow_forward
- Laws set security restrictions, while ethics provide guidance on what is morally correct to protect. This is what distinguishes them when it comes to information security. Privacy Which do you believe?arrow_forwardWhy has computer security advanced to where it is now?arrow_forwardSecurity, crime, privacy, social interactions, and even government are just few of the many areas that computer ethics explores. How important do you think it is for chief information officers to make computer ethics a priority when it comes to safeguarding private data?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education