Software Engineering (10th Edition)
10th Edition
ISBN: 9780133943030
Author: Ian Sommerville
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 1, Problem 1.10E
Explanation of Solution
Ethics required in development of systems:
Many computer systems have been developed to fight against or to reduce the terrorism. One of the ways is to keep the track of the citizens and their actions. The necessary ethics while working on the development of such systems are as follows:
- It intrudes the privacy of the citizens.
- Sometimes it may intervene the work of some citizens as they lack privacy...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What does the term "digital privacy" mean in the context of technology's evolution? Can you provide concrete examples of cyber security?
The study of computer ethics covers a wide range of subjects, some of which include government, crime, privacy, social interactions, and even security. These are only a few of the subjects that are investigated. How important do you think it is for chief information officers to make ethics in computer use a high priority so that sensitive customer information may be kept secure?
How far along are we in the realm of computer security in terms of stopping hacker attempts?
Chapter 1 Solutions
Software Engineering (10th Edition)
Ch. 1 - Explain why professional software that is...Ch. 1 - What is the most important difference between...Ch. 1 - What are the four important attributes that all...Ch. 1 - Prob. 1.4ECh. 1 - Prob. 1.5ECh. 1 - Explain why the fundamental software engineering...Ch. 1 - Prob. 1.7ECh. 1 - Prob. 1.8ECh. 1 - Prob. 1.9ECh. 1 - Prob. 1.10E
Knowledge Booster
Similar questions
- Under the umbrella term "personal data," several various forms of information fall. Countries must strike a compromise between safeguarding the privacy of their people and guaranteeing national security.arrow_forwardThe study of computer ethics covers a wide range of subjects, some of which include government, criminal activity, privacy, social interactions, and even security. How important do you think it is for chief information officers to make the ethics of utilising computers a high concern in order to ensure that sensitive customer information remains secure?arrow_forwardThe study of computer ethics covers an extremely broad range of subjects, some of which include government, crime, privacy, social interactions, and even security. How important do you think it is for chief information officers to make the ethics of utilising computers a high concern in order to ensure that sensitive customer information remains secure?arrow_forward
- Computer ethics examines a wide variety of topics, some of which include governance, crime, social interactions, privacy, and even security and privacy. How important do you think it is for chief information officers to make the adherence to ethical standards in the use of computers a core component of their strategy for the protection of private data?arrow_forwardWhat exactly does "privacy" entail in terms of protecting sensitive information? Does one's sense of privacy alter as they get older, and if so, how does that shift manifest?arrow_forwardMost hackers start their careers breaking into computer systems as teenagers. What can we as a community of computer professionals do to reduce the temptation to become a hacker? What is the difference between a white hat hacker and a black hat hacker? Is there such a thing as a gray hat hacker?arrow_forward
- Nearly a decade has passed since the National Academy of Engineers declared Cyber Security a "grand challenge for the next century." Every day there is news on ways in which cyber security challenges and responses are complicating every aspect of our lives. Can the challenge be solved? As a first step to solving any problem, one must understand its nature. So, it is important for all cyber security analysts to keep on top of news stories in the field. In this discussion forum we will do just that with the hope that everyone will make it a daily habit throughout their career. Today, some cyber news has been flooded out of the headlines by Hurricane Harvey, but as noted in this article, cyber concerns are front and center as students return to school.arrow_forwardWhat is the purpose of surveillance? What types and levels of surveillance are there? As it relates to widespread use of CCTV surveillance in Europe, do you believe the US is embracing that practice? Whether your answer is yes or no, provide a legal rationale for whether you believe it is allowable, or not, under our laws.arrow_forwardSecurity, crime, privacy, social relationships, and even government are just few of the many areas that computer ethics explores. To what extent do you believe that chief information officers should make computer ethics a central tenet of their plan for safeguarding private data?arrow_forward
- Why has computer security evolved into what it is now?arrow_forwardWhat aspects of computer security have changed through time to become what they are today?arrow_forwardWhat does "privacy" imply in the context of computer security? Is the sense of privacy shared by people of all ages the same?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education