Question: Using the ethical scenarios presented earlier in this module in the feature called The Use of Scenarios in Computer Ethics Studies, finish each of the

Using the ethical scenarios presented earlier in this module in the feature called The Use of Scenarios in Computer Ethics Studies, finish each of the incomplete statements and bring your answers to class to com-pare them with those of your peers.

Below are The Use of Scenarios in Computer Ethics Studies

The following vignettes can be used in an open and frank discussion of computer ethics. Review each scenario carefully and respond to each question using a form of the following statement, choosing the description you consider most appropriate: I feel the actions of this person were (very ethical/ethical/neither ethical nor unethical/unethical/very unethical). Then, justify your response.

1. A scientist developed a theory that required proof through the construction of a computer model. He hired a computer programmer to build the model, and the theory was shown to be correct. The scientist won sev-eral awards for the development of the theory, but he never acknowledged the contribution of the computer programmer. The scientists failure to acknowledge the computer programmer was:

2. The owner of a small business needed a computer-based accounting system. He identified the various inputs and outputs he felt were required to satisfy his needs. Then he showed his design to a computer programmer and asked if she could implement such a system. The programmer knew she could because she had developed much more sophisticated systems in the past. In fact, she thought the design was rather crude and would soon need several major revisions. But she didnt voice her thoughts because the business owner didnt ask, and she wanted to be hired to implement the needed revisions. The programmers decision not to point out the design flaws was:

3. A student found a loophole in his universitys computer system that allowed him access to other students records. He told the system administrator about the loophole, but continued to access student records until the problem was cor-rected two weeks later. The students action in searching for the loophole was: The students action in continuing to access others records for two weeks was: The system administrators failure to correct the problem sooner was:

4. A computer user ordered an accounting system from a popular software vendors Web site. When he received his order, he found that the store had accidentally sent him a very expensive word-processing program as well as the accounting package he had ordered. The invoice listed only the accounting package. The user decided to keep the word-processing program. The customers decision to keep the word-processing program was:

5. A programmer at a bank realized that she had accidentally overdrawn her checking account. She made a small adjust-ment in the banks accounting system so that her account would not incur a service charge. As soon as she deposited funds that made her balance positive again, she corrected the banks accounting system. The programmers modification of the accounting system was:

6. A computer programmer built and sold small computer applications to supplement his income. He worked for a mod-erately sized computer vendor, and would frequently go to his office on Saturdays when no one was working and use his employers computer to develop the applications. He did not hide the fact that he was entering the building; he had to sign a register at a security desk each time he entered. The programmers weekend use of the company computer was:

7. A student in a computer class was also employed at a local business part-time. Frequently her class homework required using popular word-processing and spreadsheet packages. Occasionally she did her homework on the office computer at her part-time job during coffee or meal breaks. The students use of the company computer was: If the student had done her homework during company time (not during a break), her use of the company computer would have been:

8. A university student learned to use an expensive accounting program in her accounting class. The student would go to the university computer lab and use the software to complete her assignments. Signs were posted in the lab indicating that copying software was forbidden. One day, she decided to copy the software anyway to complete her work assignments at home. If the student destroyed her copy of the software at the end of the term, her action in copying the software was: If the student forgot to destroy her copy of the software at the end of the term, her action in copying the software was: If the student never intended to destroy her copy of the software at the end of the term, her action in copying the software was:

9. A university student found out that a fellow students personal Web site contained a pirate section of illegally copied software programs. He accessed the Web site and proceeded to download several games and professional programs, which he then distributed to several of his friends. The students actions in downloading the games were: The students actions in downloading the programs were: The students actions in sharing the programs and games with his friends were:

10. An engineer needed a program to perform a series of complicated calculations. He found a computer programmer who was capable of writing the program, but would only hire the programmer if he agreed to share any liability that may result from an error in the engineers calculations. The programmer was willing to assume any liability due to a program malfunction, but was unwilling to share liability due to an error in the engineers calculations. The programmers position in this situation is: The engineers position in this situation is:

11. A manager of a company that sells Web hosting services bought similar services from a competitor. She used her access to the competitors computer to try to break the security system, identify other customers, and cause the system to crash. She used the service for a year and always paid her bills promptly. The managers actions were:

12. A student programmer decided to write a virus program. Such programs usually spread automatically by making copies of themselves onto other users media (like flash drives). The student wrote a program that caused the computer to ignore every fifth command entered by a user. The student took his program to the university computing lab and installed it on one of the computers. Before long, the virus had spread to hundreds of users. The students action of infecting hundreds of users flash drives was: If the virus program output the message Have a nice day, then the students action of infecting hundreds of users flash drives would have been: If the virus erased files, then the students action of infecting hundreds of users flash drives would have been:

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!