In that can eliminate virus from infected area. They

Inthis article, they show how important the computer security and computer ethicsin management information system. Malaysian government commit with informationand communication technology or (ICT) for the development of their movingtowards a knowledge based society. Based on the survey that they made, theyidentified that there are 245 university students in Malaysia are aware incomputer security and computer ethics. And according to the experts in computer security discipline, universitiesare the most secure places in the world. Maybe because universities arecommonly aware by incidents of accessing inappropriate websites, copyrightinfringement and misuse including peer file sharing. They define computer security as a protection for computer systems from the theftand damage to their hardware, software or information, as well as from disruption or misdirection of the servicesthey provide. In this article they said that Malaysia is ranked 8 out of 10 top-infected countries in the Asia Pacificregion as a target for cyber attackers, so that’s why Malaysia commit withinformation and communication technology to prevent cyber attacks.

Not justthat they also aware of their computer system so they currently used other technologiesand methodologies such as anti-virus, fault-tolerant and high availability computingtechnology, firewalls, data security software and programmed procedures can be utilizedto create a control environment. They used antivirus software to check computersystems and disks for the presence of various computer viruses that caneliminate virus from infected area. They used firewall to prevent unauthorized accessto or from a private network. And also they encrypt password to their computersto secure their personal data’s. They define computer ethics as theanalysis of the nature and social impact of computer technology. There’s a lot ofpeople are using computer early as now, we all know that sincethe internet has emerged privacy is one of the major issues.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

So that’s whycomputer ethics is there, according to this article computer ethics has fourcomponents and they are access, personal privacy, responsibility and ownership.               And also there has 10 commandments of computer ethics, thefirst one is “thou shall not use a computer to harm other people” means youmust use it in a good way. In this first commandment this article said that it is thefoundation for computer ethics.  The second commandment is “thou shall notinterfere with other people computer work” means mind your own business. Thethird commandment is “thou shall not snoop around in other people’s computerfiles”. The fourth commandment is “thou shall not use computer to steal”.

Thefifth commandment is “thou shall not use computer to bear false witness”. Thesixth commandment is “thou shall not copy or use proprietary software for whichyou have not paid (without permission)”. The seventh commandment is “thou shallnot use other people resources without authorization or proper compensation”.The eighth commandment is thou shall not appropriate other peoples intellectualoutput. The ninth commandment is “thou shall not think about the socialconsequences of the program you are writing or the system you are designing”.And the last one commandment is “thou shall always use a computer in ways thatensure consideration and respect for your fellow humans. In categories of management information system/ethics relatedresearch the article shows three areas which are the Social Aspect Area, GroupDifferences Area and Technology Affects Area. In Social Aspect Area theyfocuses in identifying ethical issues regarding computer use and also theaccessibility ,property, privacy, and accuracy, of the computer.

And in theGroup Differences Area they compared the ethical beliefs of managers operatingin South Africa and Australia.   Thereare several test and survey they made to know who among the different gendersis the most aware in computer security and computer ethics. There are 103female responses to the test, the 79 females are the computer science major andthe 24 females are the non major students. And in the male category thereare142 males are response to the test, survey, the 80 male students are thecomputer science major and the 62 male students are the non major students.