Wednesday, February 26, 2020

Information technology ethics Essay Example | Topics and Well Written Essays - 750 words

Information technology ethics - Essay Example On the other hand the biggest pessimistic use of a computer is for crime purposes. As people make use of the computers they typically think that their activities are confidential and also their personal information is protected. For instance, web sites of business nature often gather details from many visitors; later on many web sites sell these personal details against the desires of the visitors (Turban, Rainer and Potter; NCSI-Net). This is a kind of computer crime. There are many other kinds of a crime which are performed using a computer however most of the computer crimes are covered under the term ‘phishing’. In their book, (Laudon and Laudon 147) define â€Å"computer crime as the unlawful activities by making use of a computer or against a computer system. The Internet's user-friendliness and convenience have fashioned modern ways for computer crime, well-known forms of which is phishing.† Additionally, the computer crimes appear in a wide variety of ways and also cause a number of serious problems for different people. For instance, nowadays online frauds or frauds using the Internet are modern form of the online criminal activities in which an authorized person (normally acknowledged as a hacker) hacks some useful data and information and later on use it to conduct illegal and criminal tasks, such as cash related scandals. In this scenario, the basic intentions of criminals are to earn money, tease other or play games with others. In fact, the Internet is open for everyone which gives the opportunities to criminal people, to steal, new ways to steal them, and new techniques to harm others (Laudon and Laudon 147). As discussed above, there are many kinds of a computer crime and criminals do it intentionally. For instance, sometimes a dissatisfied employee or terminated worker can be dangerous to an organization. In this scenario, these people want to damage business with their extensive criminal activities (Parker; Turban, Rainer a nd Potter). Therefore, employers should properly scrutinize the background of persons being connected with critical computer related tasks. Some people falsify resume to get jobs. Also, the company should hire trustworthy personnel to minimize crimes related to computers. In addition, Hacker and Cracker are most widely used terms in computer crimes. In this scenario, Hacker is an external person who can break through a computer system, typically with no illegal intention. On the other hand, a Cracker is a nasty hacker, who may perhaps produce a stern crisis for the organization (Parker; Turban, Rainer and Potter). Moreover, Phishing is an emerging problem regarding online data security and information safety. There are a number of cases of identity theft and online frauds using Phishing and other hacking techniques. At the present, Phishing is normally carried out through E-mail or the instant messaging. In many cases its basic purpose is to direct online traffic to a particular web site whose appearance or interface are approximately similar to the actual one. Even though server cannot differentiate between false and original web site so a hacker successfully passes through these security walls. Normally, Phishing techniques are aimed at making fool to the internet users, and making use of the attractive usability of present web expertise. In this scenario,

Monday, February 10, 2020

The Cannabis (Licensed Premises) Act 2000 (CLIP) (a fictitious act) Essay

The Cannabis (Licensed Premises) Act 2000 (CLIP) (a fictitious act) permits cannabis to be sold lawfully from licensed premises. Anyone wishing to sell cannabis - Essay Example Under the law, you are entitled to a fair assessment of your application and in the event of a denial such denial must be communicated to you replete with the reasons that the Council has for refusing your application. It is rudimentary under public and administrative law that a public agency must apprise a denied applicant the grounds for denying his application for license so that the applicant can prepare himself or herself with the appropriate rejoinders to such grounds for denial in the event that the applicant will elevate and appeal his case to the same board or a higher authority. In addition, flatly refusing you to put your case in person before the council, again without justification, so that you can appeal is in contravention of all known administrative procedural processes. The acts of the Bumbling Council, has in effect, denied you of your basic rights to notice and hearing under the fundamental tenets of due process constitutionally guaranteed by our laws. Existing statutory laws on premises licensing all enshrine these basic principles. The Licensing Act of 2003, for example, which is the current legislation and basis for premises licensing for use on licensable activities like alcohol sale and certain entertainment related businesses provide a mechanism for approving and denying applications. Specifically, Section 23 of Part 3 of the said law mandates the licensing authority to give notice of such denial with reasons, to wit: The CLIP, an older legislation, although silent on the matter is presumed to follow the elementary precepts of due process. In addition, the rationale for giving notice to the applicant of his denial and laying down therewith the grounds and reasons for such denial is founded not only on the basic principle of due process but for practical considerations as well. A denied applicant in premises licensing may seek to subsequently elevate his denied application to the magistrate court which will then