CSC 510 Vocation and Ethical Computing

 

All Subjects

All Subjects

Guaranteed Success

quality-guaranteed-at-professional-essay-writing-service

First Class Honors

First Class Honors

CSC 510 Vocation and Ethical Computing

 

CSC 510 Vocation and Ethical Computing

Order 100% Plagiarism Free Vocation and Ethical Computing Now!

I will work with you for 5 weeks each week we will complete one order to finish this paper, in the fifth week we will have 12 pages paper relating the concepts of vocation and ethical computing to (Intellectual property: what is the right balance?) I choose this topic as long as it relates to Information Technology and is ethically significant.
My paper must include references from different books or websites.
My paper must include two significant references from each of the following texts book that I will give you access to them later:
1. ETHICS DISCOVERING RIGHT AND WRONG FOR LOUIS P. POJMAN AND JAMES FIESER
2. COMPUTER ETHICS and PROFESSIONAL RESPONSIBILITY FOR TERRELL BYNUM AND SIMON ROGERSON.
3.GOD AT WORK FOR GENE EDWARD VEITH, JR
The references must be relevant to your topic.
First Order:
Identify a topic (Intellectual property: what is the right balance?) within computer ethics.You should develop and submit (1) your topic and (2) a position or thesis on the topic (maintaining that certain practices are right or wrong)
Ensure your thesis statement takes an ethical position on the topic, and doesn’t merely define your topic. The thesis should state that certain technological activities or practices are good or bad, right or wrong.
This document will be 2 pages in length, APA, 12 font, single spaced .

CSC 510 Vocation and Ethical Computing

Order 100% Plagiarism Free Vocation and Ethical Computing Now!

This section is about how the physical conception of space influences the human interaction with cyberspace; a man-made dimension of space. Thus, this section is an attempt at how cyberspace can be approached, be secured, and be nationally regulated. Accordingly, my argument acknowledges how cyberspace was imagined and then created. Cyberspace was created in reference to the perpetual human fantasy: finding a space devoid of social inequality, specifically, a space where the fair use of information will be protected by law.
Cyberspace in Formation
William Gibson is the science fiction writer who first came up with the word cyberspace. In his novel, Neuromancer, the term refers to “a 21st century virtual dimension, entered into via a neuro-electronic interface, in which the world’s data networks unfold before the user as a sensually vivid geography[9].” As early as 1984, Gibson describes the Internet with its present and constantly metamorphosing features.
Historically speaking, “the Internet began in the 1970’s as a U.S. Defense Department network called ARPAnet[9].” As ARPAnet progressed, the access to this electronic information network was at first restricted to professional elites. Professional researchers within governmental institutions, universities, and corporations, were the first groups of individuals to access the Internet. In this space, information of considerable value is shared. Such information belongs to the institutions which utilize it. The information became intellectual property. By intellectual property, I simply mean a copyrighted set of information, or any set of information that depicts sets of unique ideas constructed by a person or by a group, without even being legally certified as a subject to copyright regulation.
Restricted to professionals, the Internet was a professional tool that presupposed work-ethics behavior that applies to information sharing in the physical world. For example, if an employee breaks into private company files, she knows she will get fired. In the process of using the Internet the employee understands that breaking into information databases she is not supposed to access can get her fired. In other words, professionals who access information databases do so under the assumption that the mishandling of information is against professional conduct. It would be no different than literally, physically burglarizing or raiding a set of files. As it progressed, as this information acquired 2D forms, the Internet later becomes referred to as cyberspace. While the Internet and cyberspace may be interchangeably used, I claim that each term applies a particular aspect of informational space. Cyberspace emphasizes the spatiality of this information medium. The Internet emphasizes the electronic network of this information medium. On the other hand, the terms, the web, I use interchangeably with the term, the Internet.
The evolution of information space allows cyberspace to be more available to the general public. Being accessible to the public, it can no longer assume that all users of the Internet are aware of rules of handling and accessing information. And the fact that it was accessible to the public allowed the public to expand the function of cyberspace. The Internet became a wire through which the public could take out information. And cyberspace became a space on which the public put up information. “As innovations, the technologies of electronic space are intended to function as alternatives to physical location and transportation. In actual use, they also function as social environments, as human beings adapt the technologies to fulfill their own needs and desires[9].” However, the desires and needs of one person may become the nightmare of another. For example, I may find information on the web about the secrets of making good hushpuppies. Martha Stewart posted this information. On my iMac, I choose Edit / Copy. I open my web page and paste the information without bothering to give credit to Martha Stewart. I do not refer to her as the owner of this recipe. In fact, I find that this information is the final touch that makes my website unique. I’m happy. The secret on hushpuppies appears to be mine. Soon Martha Stewart finds out. And she wants to put me in jail, where she was two or three months ago. My argument against her is that I did not know I had to quote her. Besides, everything on the web belongs to everybody. At least this is the way I see it. Why can’t I say that the secret to hushpuppies belongs to me as much as Martha Stewart? In conclusion, Martha Stewart and I have become each other’s nightmare. The public access to cyberspace makes it more apparent that this space may be subject to some form of regulation. The regulation of cyberspace as an information space became a priority in the Clinton-Gore Administration[9]. For example, in 1993, President Clinton formed the Information Infrastructure Task Force (IITF) to assists in “the formation and execution of his Administration’s ‘vision’ for the National Information Infrastructure[10].

CSC 510 Vocation and Ethical Computing

Order 100% Plagiarism Free Vocation and Ethical Computing Now!

Why Choose US

quality-guaranteed-at-professional-essay-writing-service

Order Now

professional-essay-writing-services-take-action-button

Discounted Rates

essay-writing-discounted-services

Secure Gateway

pay-with-paypal-the-most-secured-payment-gateway