Article Writing Homework Help

Hello, I am looking for someone to write an article on Computer Ethics. It needs to be at least 500 words.

Hello, I am looking for someone to write an article on Computer Ethics. It needs to be at least 500 words. Computer Ethics Computer Ethics Computer Ethics Issues Two computer ethics issues related with the use of ransomware includes the issue of privacy and criminal behavior. Individuals involved with the industry of computer sciences are not allowed to gain access to information or enter in another individual’s computer until he/she has the authority to do so. When individuals gain access to unauthorized information, they use it in different ways for their own self interest while ignoring the interest of the society. The utilitarian rule of ethics state that if an activity results in damaging the society and benefiting a few, then that particular activity is regarded as unethical. On the other hand, if a computer professional or a group of professionals ask for ransom in exchange of not holding a computer as a hostage, they are indulging in criminal behavior. Ransom in previous years used to be gained by kidnapping an individual and this activity was recognized as a criminal conduct. Similarly, holding a computer hostage and acquiring ransom is even recognized as criminal behavior.

Prevention From Ransomware

One way through which computer users can protect their computers from being attacked by ransomware is by protecting their computers with security software. This security software has the ability to detect and stop malicious attacks launched on a particular computer. The user needs to ensure that the security software is kept up-to-date. It is essential for the security software to remain up-to-date because new forms and software of ransomware are being launched every day and in order to tackle updated viruses, a computer needs updated security software. Another way of preventing becoming a hostage to ransomware is having a backup of the information and data that is stored on a particular computer (Deccan Herald, 2012). In cases a computer becomes a hostage, the most probable threat that a user faces is the loss of important data. If this data is stored in a backup storage device such as a USB or an external hard drive, the user will not have to give in to the demand of ransom.

Government Legislation

Government can use both deterrent as well as preventive modes of legislation to counter the issue of ransomware. The government should pass a legislation requiring all organizations and computer users to protect their computers with security systems and having backup of the data. The government can levy hefty fines for not complying with legislation. This will encourage computer users as well as organizations to protect their system in order to avoid hefty sanctions. Government can deter computer hackers who use ransomware from indulging in such acts by assigning hefty sanctions such as jail time and penalties for holding another individual’s computer hostage (Cross, 2013). The fines should be influential and should have the ability to inhibit fear amongst computer hackers. The fear of sanctions will deter such hackers from performing these unethical activities. This is because the hackers might conduct a cost-benefit analysis of performing these acts and may perceive that the costs are much higher than the benefits.

References

Cross, S. (2013). Shaping South East Europes security community for the twenty-first century (1st ed.). Basingstoke: Palgrave Macmillan.

Deccan Herald,. (2012). Hackers holding your PC to ransom. Retrieved 3 July 2014, from http://www.deccanherald.com/content/297460/hackers-holding-your-pc-ransom.html.

 
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"