28 Aralık 2008 Pazar

COMPUTER ETHICS

Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.
The term "computer ethics" was first coined by Walter Maner in the mid-1970's, but only since the 1990s has it started being integrated into professional development programs in academic settings.
The conceptual foundations of computer ethics are investigated by information ethics, a branch of philosophical ethics established by Luciano Floridi. Computer ethics is a very important topic in computer applications.


IDENTIFYING ISSUES


Identifying ethical issues as they arise, as well as defining how to deal with them, has traditioaly been problematic in computer ethics.Some have argued against the idea of computer ethichs as a whole. However,Collins and Miller proposed a method of identifying issues in computer ethichs in their Paramedic Ethics model.The model is a data-centered view of judging ethical issues, involving the gathering, analysis,negotiation,and judging of data about the issue.
In solving problems relating to ethical issues, Micael Davis proposed a unique problem-solving method.In davis's model, the ethical problem is started, facts are checked, and a list of options are generated by considering relevant factors relating to the problem. The actual action taken is influenced by specific ethical standards.


SOME QUESTIONS IN COMPUTER ETHICS

There are a number of questions that are frequently discussed under the rublic of computer ethics. One set of issues deak with some of the new ethical dilemmas that have emergend, or taken on new form, whit the rise of the internet. For example, there is a wide range of behaviors that fall under the heading of "hacking" many of which have been variously defended and opposed by ethicists.
Question about software piracy are also widely incssued especially in light of file sharing programs such as Napster. Is it immoral or wrong to copy software, music, or movies ? Is so why ? A second set of questions pertaining to the Internet that are becoming more widely discussed are questions relating to the values that some way wish to promote via the Internet. Some have claimed that the internet is a "democratic technology", or an e-democracy. But is it really? Does the Internet foster democracy ? Should it ? Does the dgigital divide raise ethical issues that society is morally obligated to ameliorate ?


ETHICAL STANDARS

One of the most definitive sets of ethical standards is the Association for Computing Machinery Code of ethic. The code is a four-point standard governing ethical behavior among computing professionals. It cover the core set of computer ethics from professional responsibility to the consequences of technology in society.
Another computer ethics body is the British Computer Society, which has published a code of conduct and code of practice for computer professionals in the UK
The uniform Computer Information Transaztions act (UCITA) defines ethical behavior from the standpoint of legality, specifically during the contracting process of computing .It defines how valid computing contracts are formed, and how issues such as breach of contract are defined and settled. However, legality does not completely encompass computer ethics. It is just one facet of the constantly expanding field of computer ethics.

Computer Security

Purpose of computer security is person and associations must take acuse and analyse security risks while they are using computer technology. Computer security is often more technical and mathematical than some computer science.
Data security which protect form growing harmenss , and stop to gain b y exact technology , exact aim from the undesirable person.
Generally data and computer security is one branch of security engineering which is concerned particularly about security.

Computer security could be avoid by this steps:

*Antivirus programs should be installed.
*This programs , operating system packages , error covering and updates should be done periodically.
*Pasword secured screensavers should be used.
*System should be logged of if it wont be used for a long time.
*Paswords should be choosen hard to predict.
*This passwords should be hiden as secret and should be replaced with new ones periodically.
*Disk sharing should be concerned.
*Files which are downloaded and received by e-mails should be concerned.
*Communication to important files should be saved by paswords or saved with paswords.
*Secret and importan files should not be send by e- mails and the internet pages which does'nt have security sertificates.
*Internet connection shoul be turned of if it's not used.
*Important files should be backed up periodically.
This steps could seem simple but they are also vital for computer security.

What is Computer ?

History Of Computer


A computer is a machine that manipulates data according to a list of instructions
The first devices that resemble modern computers date to the mid-20th century (1940–1945), although the computer concept and various machines similar to computers existed earlier. Early electronic computers were the size of a large room, consuming as much power as several hundred modern personal computers PC.Modern computers are based on tiny integrated circuits and are millions to billions of times more capable while occupying a fraction of the space.Today, simple computers may be made small enough to fit into a wristwatch and be powered from a watch battery Personal computer in various forms, are icons of the Information age and are what most people think of as "a computer"; however, the most common form of computer in use today is the embeded computer.Embedded computers are small, simple devices that are used to control other devices — for example, they may be found in machines ranging from fighter aircarft to industrial robots digital cameras and children's toys
The ability to store and execute lists of instructions called programs makes computers extremely versatile and distinguishes them from calculators The Church-Turing thesis is a mathematical statement of this versatility: any computer with a certain minimum capability is, in principle, capable of performing the same tasks that any other computer can perform. Therefore, computers with capability and complexity ranging from that of a personal digital assitant to a supercoputers are all able to perform the same computational tasks given enough time and storage capacity.
Danger Of Internet
There is a great of veriety of information on the internet. Quite a bit of it is compute nonsense.Relying on unched very dangerous.Also computer crime is done by using internet.Computer or network is source ,tooli target, or place of a crime.For example, when a person starts to steal information from web sites or cause damage to, a computer or computer network....