Software Engineering (10th Edition)
10th Edition
ISBN: 9780133943030
Author: Ian Sommerville
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 1, Problem 1.10E
Explanation of Solution
Ethics required in development of systems:
Many computer systems have been developed to fight against or to reduce the terrorism. One of the ways is to keep the track of the citizens and their actions. The necessary ethics while working on the development of such systems are as follows:
- It intrudes the privacy of the citizens.
- Sometimes it may intervene the work of some citizens as they lack privacy...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
The study of computer ethics covers a wide range of subjects, some of which include government, crime, privacy, social interactions, and even security. These are only a few of the issues that are investigated. How important do you think it is for chief information officers to make ethics in computer use a high priority so that sensitive customer information may be kept secure?
The study of computer ethics covers a wide range of subjects, some of which include government, crime, privacy, social interactions, and even security. These are only a few of the subjects that are investigated. How important do you think it is for chief information officers to make ethics in computer use a high priority so that sensitive customer information may be kept secure?
What does the term "digital privacy" mean in the context of technology's evolution? Can you provide concrete examples of cyber security?
Chapter 1 Solutions
Software Engineering (10th Edition)
Ch. 1 - Explain why professional software that is...Ch. 1 - What is the most important difference between...Ch. 1 - What are the four important attributes that all...Ch. 1 - Prob. 1.4ECh. 1 - Prob. 1.5ECh. 1 - Explain why the fundamental software engineering...Ch. 1 - Prob. 1.7ECh. 1 - Prob. 1.8ECh. 1 - Prob. 1.9ECh. 1 - Prob. 1.10E
Knowledge Booster
Similar questions
- Computer ethics covers a wide range of topics, including security, cybercrime, personal privacy, social interaction, and governance, to name just a few. To what degree do you agree with the concept that chief information officers (CIOs) should make the practise of computer ethics a major element of their strategy for protecting sensitive information?arrow_forwardThe study of computer ethics covers a wide range of subjects, some of which include government, criminal activity, privacy, social interactions, and even security. How important do you think it is for chief information officers to make the ethics of utilising computers a high concern in order to ensure that sensitive customer information remains secure?arrow_forwardWhat exactly does "privacy" entail in terms of protecting sensitive information? Does one's sense of privacy alter as they get older, and if so, how does that shift manifest?arrow_forward
- The study of computer ethics covers an extremely broad range of subjects, some of which include government, crime, privacy, social interactions, and even security. How important do you think it is for chief information officers to make the ethics of utilising computers a high concern in order to ensure that sensitive customer information remains secure?arrow_forwardNearly a decade has passed since the National Academy of Engineers declared Cyber Security a "grand challenge for the next century." Every day there is news on ways in which cyber security challenges and responses are complicating every aspect of our lives. Can the challenge be solved? As a first step to solving any problem, one must understand its nature. So, it is important for all cyber security analysts to keep on top of news stories in the field. In this discussion forum we will do just that with the hope that everyone will make it a daily habit throughout their career. Today, some cyber news has been flooded out of the headlines by Hurricane Harvey, but as noted in this article, cyber concerns are front and center as students return to school.arrow_forwardComputer ethics examines a wide variety of topics, some of which include governance, crime, social interactions, privacy, and even security and privacy. How important do you think it is for chief information officers to make the adherence to ethical standards in the use of computers a core component of their strategy for the protection of private data?arrow_forward
- In the context of evolving technology, what does the term "digital privacy" mean? Can you provide any specific instances of cyber security?arrow_forwardWhat is the purpose of surveillance? What types and levels of surveillance are there? As it relates to widespread use of CCTV surveillance in Europe, do you believe the US is embracing that practice? Whether your answer is yes or no, provide a legal rationale for whether you believe it is allowable, or not, under our laws.arrow_forwardSecurity, crime, privacy, social relationships, and even government are just few of the many areas that computer ethics explores. To what extent do you believe that chief information officers should make computer ethics a central tenet of their plan for safeguarding private data?arrow_forward
- Laws set security restrictions, while ethics provide guidance on what is morally correct to protect. This is what distinguishes them when it comes to information security. Privacy Which do you believe?arrow_forwardHow has hacking evolved since 1950? Given the range of actors evident in the hacker subculture, is it possible that ethical and unethical hackers may share similar motives? If so, what might those motives be, and is it possible to identify an individual’s ethical stance based solely on their motives?arrow_forwardWhy has computer security advanced to where it is now?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education