IT541_Unit8 - Unit 8 1 Running Head: LEGAL AND ETHICAL...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Unit 8 1 Running Head: LEGAL AND ETHICAL ASPECTS Legal and Ethical Aspects Project Paper Jennifer Angel Kaplan University IT 541 Dr. Steven Case February 28, 2010
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Unit 8 2 Abstract Ethical designs taught to many individuals include the use of the internet. Some people do not understand the reasons behind the way they act online and in public. Cybercrimes and Computer crimes are often thought to be carried out because of the lack of ethical morals. Stealing Intellectual property is another form of ethical choices people make to create harm, do grave damage or even to gain glory for something they did not write. It is very seldom the inter supports the well being or people or groups of people who believe in the golden rule of give respect, get respect. Through careful studying and applied principals from the text this paper will attempt to correctly answer the following problems.
Background image of page 2
Unit 8 3 Table of Contents Title page………………………………………………………………………………………….1 Abstract……………………………………………………………………………………………2 Project.……………………………………………………………………………. ..……………. .3 References…………………………………………………………………………………………9
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Unit 8 4 Project 18.1 For each of the cybercrimes cited in table 18.1, indicate whether it falls into the category of computer as target, computer as storage device, or computer as communications tool. In the first case, indicate whether the crime is primarily an attack on data integrity, system integrity, data confidentiality, privacy, or availability. Article 2 Illegal Access - Computer as Targets - deals with all 5 items. Article 3 Illegal Interception - Computers as Targets Article 4 Data Interference - Computers as Targets Article 5 System Interference - Computers as Targets Article 6 Misuse of devices - Computers as Targets Article 7 Computer-related forgery - computer as communications tools Article 8 Computer-related fraud - Computer as Communications tools Article 9 Offenses related to child pornography - Computer as Communications tools Article 10 Infringements of copyright and related rights - Computer as Communications tools Article 11 Attempt and aiding or abetting - Computer as targets 18.8 A management briefing lists the following as the top five actions that improve privacy. Compare these recommendations to the information privacy standard of Good Practice in
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/09/2010 for the course IT 541 taught by Professor Cs during the Winter '10 term at Kaplan University.

Page1 / 9

IT541_Unit8 - Unit 8 1 Running Head: LEGAL AND ETHICAL...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online