Here is the synopsis of our sample research paper on Computers and Ethical Issues. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This is a 3 page paper which discusses the ethics associated with computer security personnel.
The bibliography has 4 sources.
Page Count:
3 pages (~225 words per page)
File: D0_JHHack.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
personnel, who often have access to a great deal of confidential data and knowledge about individuals and companies networks and systems, receive no formal ethical training (Shinder, 2005). There are
no standardized training requirements for a computer consultant or an in-house security specialist (Shinder, 2005). Because security is now a primary concern for many companies, various associations and organizations are
beginning to address the ethical side of the computer consultant or in-house security specialists job (Shinder, 2005). Still, there is no requirement, as of yet, for any technology security
personnel to belong to any of these organizations (Shinder, 2005). DEFINITION OF A HACKER Generally speaking, a hacker is someone who likes to modify and subvert any type of systems
whether it is technological, bureaucratic or sociological in nature (Lemos, 2002). However, with the advent of computer technology, the term hacker is more often used to describe someone who has
learned about technology by picking systems apart or a person who has a hand on interest in computer security and circumventing that security (Lemos, 2002). Hackers are intelligent people. They
have worked with computers for years, examined them inside and out. Some have created new additions to their home computers; some have even designed their own machines. Put simply, the
workings of a computer hold as much interest for hackers as the workings of a 57 Chevy do for the car fanatic. This interest is due to curiosity. There
is nothing sinister or destructive about it. Hackers are eager to learn as much as possible in computer classes at school or in user groups and computer clubs, where other
hobbyists share their insatiable curiosity (Patrick, 2006). Recently more hackers of all backgrounds are being forced to rethink their practices which facing heightened law enforcement activity and more and closer
...