Wednesday, December 4, 2019

Professional Computing Issues in Management and Development Issue

Question: Q1: As discussed in the course that there is no money to be made from open source code, why would a developer release software under an open source license? Q2. Why do employers monitor workers? Do you think they should be able to do so? Why or why not? Q3: Discuss that why information privacy is important on public networks? Answer : 1. The developers sell the code under the open source code because the government grant the authors temporary monopoly when handling the distribution of their work. [1]This is referred as copyright. Other people can download the copy, use their work but they cannot make copies to redistribute them to resell. The developer can sell their royalties such as selling their warranties and other assurances. 2. The employers are monitoring the workers to know if they are doing their jobs appropriately. Moreover, the companies are monitoring the company phones, as well as the internet access to make sure they are being used for only the purpose of the business and not the employees personal use. I think the employers should be able to monitor the employees. The employers have the access to the employees communications while they are on the job.[2] Moreover, the organization should have established a policy in order not to bring any confusion on whether a given form of communication would be monitored or not. There should be a clear policy, which outline what forms of communications are monitored. 3. Privacy of information on the public network is essential for several reasons. A number of them have to do with the outcomes for not having the privacy. People might be debilitated in case there was clearly absolutely no restriction on the public access to of the personal data. Additional reasons tend to be more fundamental, touching on the essence for the human personhood. [3]The privacy could be considered a facet of security. Information privacy is essential to permit people to stop details about themselves to turn out to be recognized by others particularly who are not acquitted to them. Further, it really is for protection from the misuse of private information. There are numerous techniques wherein a person could be harmed in case they have revelation of the sensitive personal information, which could leave a person vulnerable to many abuses. References Bynum, Terrell Ward, and Rogerson Simon. Computer ethics and professional responsibility. 2004. Rogerson, S., and T. Ward-Bynum. "Computer ethics and professional responsibility." Malden, MA: Blackwell (2004): 319-326. Tavani, Herman T. "Ethics and technology: Ethical issues in an age of information and communication technology." (2003). [1] Bynum, Terrell Ward, and Rogerson Simon. Computer ethics and professional responsibility. 2004. [2] Rogerson, S., and T. Ward-Bynum. "Computer ethics and professional responsibility." Malden, MA: Blackwell (2004): 319-326. [3] Tavani, Herman T. "Ethics and technology: Ethical issues in an age of information and communication technology." (2003).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.