Software Engineering (10th Edition)
10th Edition
ISBN: 9780133943030
Author: Ian Sommerville
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 1, Problem 1.10E
Explanation of Solution
Ethics required in development of systems:
Many computer systems have been developed to fight against or to reduce the terrorism. One of the ways is to keep the track of the citizens and their actions. The necessary ethics while working on the development of such systems are as follows:
- It intrudes the privacy of the citizens.
- Sometimes it may intervene the work of some citizens as they lack privacy...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What does the term "digital privacy" mean in the context of technology's evolution? Can you provide concrete examples of cyber security?
How far along are we in the realm of computer security in terms of stopping hacker attempts?
How can privacy be maintained while using communal facilities like a printer and many
computers?
Chapter 1 Solutions
Software Engineering (10th Edition)
Ch. 1 - Explain why professional software that is...Ch. 1 - What is the most important difference between...Ch. 1 - What are the four important attributes that all...Ch. 1 - Prob. 1.4ECh. 1 - Prob. 1.5ECh. 1 - Explain why the fundamental software engineering...Ch. 1 - Prob. 1.7ECh. 1 - Prob. 1.8ECh. 1 - Prob. 1.9ECh. 1 - Prob. 1.10E
Knowledge Booster
Similar questions
- Theft of one's identity is a common kind of criminal behavior that sadly is on the increase due to the prevalence of the internet. Please provide a description of the many methods that cybercriminals may use to steal your identity as well as the preventative measures that, in your opinion, need to be implemented to avoid having this occur.arrow_forwardNearly a decade has passed since the National Academy of Engineers declared Cyber Security a "grand challenge for the next century." Every day there is news on ways in which cyber security challenges and responses are complicating every aspect of our lives. Can the challenge be solved? As a first step to solving any problem, one must understand its nature. So, it is important for all cyber security analysts to keep on top of news stories in the field. In this discussion forum we will do just that with the hope that everyone will make it a daily habit throughout their career. Today, some cyber news has been flooded out of the headlines by Hurricane Harvey, but as noted in this article, cyber concerns are front and center as students return to school.arrow_forwardWhy has computer security evolved into what it is now?arrow_forward
- What does "privacy" imply in the context of computer security? Is the sense of privacy shared by people of all ages the same?arrow_forwardWhy has computer security advanced to where it is now?arrow_forwardInvestigate the legal and ethical aspects of encryption, particularly in the context of government access to encrypted data. How do different countries approach this issue, and what are the implications for privacy and security?arrow_forward
- What elements of computer security have evolved through time to become what they are today?arrow_forwardWhat aspects of computer security have changed through time to make it what it is today?arrow_forwardIn the context of information security, what exactly is privacy? Is there a difference in the sense of privacy across different age groups?arrow_forward
- What is the reason why computer security has grown into what it is today?arrow_forwardHow has the state of the art of computer security changed over the course of the last several decades?arrow_forwardIn the world of information and communication technology, what does the word "security" mean in particular? What would you say are some of the most important issues about physical security in the modern world? Attacks on organizations can take many different forms, depending on what the target is.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education