All Assignments Combined
All Assignments Combined
GROUP ONE
Information technology (IT) is the use of any computers, storage, networking and other physical
devices, infrastructure and processes to create, process, store, secure and exchange all forms of
electronic data
IT professionals are responsible for managing, maintaining, and supporting various aspects of
technology within organizations, ranging from hardware and software systems to networks and
cybersecurity or provision of user support for any such systems.
(b)
6. Continuous Learning: The IT field evolves rapidly. Staying up-to-date with the latest
technologies, trends, and best practices through continuous learning and professional
development demonstrates your commitment to excellence.
10. Ethical Conduct: Upholding ethical standards, particularly in areas like cybersecurity and
data privacy, is critical for maintaining trust and professional recognition.
1. Continuous Learning:
• Stay up-to-date with the latest technologies, tools, and trends in IT by regularly
reading tech news, blogs, and industry publications.
2. Certifications:
3. Hands-On Experience:
4. Networking:
• Attend IT conferences, meetups, and local tech events to network with peers,
experts, and potential mentors.
5. Specialization:
7. Mentorship:
• Seek out mentors who can provide guidance and share their experiences.
Mentorship can help you navigate your career and make informed decisions.
8. Leadership Development:
9. Ethical Conduct:
• Uphold ethical standards, especially in areas like cybersecurity and data privacy.
Integrity and trustworthiness are crucial in IT.
• Regularly assess your career goals and skill gaps. Create a professional
development plan based on your assessments and adjust it as needed.
12. Adaptability:
3. Adaptability: The tech industry evolves rapidly. Being open to change, embracing new
technologies, and quickly adapting to emerging trends and tools are essential qualities.
7. Teamwork: Many IT projects are collaborative efforts. Being a team player, cooperating
with colleagues, and contributing positively to group dynamics are valuable qualities.
9. Problem Ownership: Taking responsibility for issues and seeing them through to
resolution is important. Avoiding blame-shifting and working diligently to solve problems
demonstrate professionalism.
10. Creativity: Creativity is valuable for finding innovative solutions to complex problems
and for designing user-friendly software interfaces or efficient network architectures.
11. Ethical Conduct: Upholding ethical standards is essential, particularly when handling
sensitive data and information security. Maintaining trust and integrity is crucial in the IT
profession.
14. Leadership and Initiative: Demonstrating leadership skills and taking initiative in your
work can lead to career advancement and opportunities to lead IT projects or teams.
15. Empathy: Understanding the needs and concerns of end-users and colleagues can lead to
better problem-solving and improved user experiences.
16. Curiosity: A natural curiosity about technology and a desire to explore and experiment
can drive your professional growth.
17. Critical Thinking: The ability to evaluate information critically, make informed decisions,
and assess the potential impact of your choices is a valuable quality.
18. Resilience: The IT field can be demanding, with long hours and high-pressure situations.
Developing resilience to handle stress and bounce back from setbacks is important.
QUESTION TWO
(a)
Computer crime, often referred to as cybercrime, is a category of criminal activity that involves
the use of computers, networks, and digital technology to commit unlawful acts. Cybercriminals
exploit vulnerabilities in computer systems and the internet to carry out various illegal activities.
Here are some common types of computer crimes:
1. Hacking: Unauthorized access to computer systems or networks with the intent to steal
data, disrupt operations, or commit other malicious actions. Hackers may exploit security
weaknesses to gain access.
2. Malware: The distribution and use of malicious software (malware) such as viruses,
worms, Trojans, and ransomware. Malware can infect computers and compromise data,
systems, or networks.
4. Identity Theft: Stealing personal information, such as Social Security numbers or credit
card details, to commit fraud, make unauthorized transactions, or open financial accounts
in someone else's name.
7. Data Breaches: Unauthorized access to and theft of sensitive data, such as customer
records, credit card information, or proprietary company data. The stolen data is often sold
or used for financial gain.
8. Online Scams: Deceptive schemes conducted on the internet to defraud victims. This
includes investment fraud, online auction fraud, and romance scams, among others.
9. Ransomware: Malicious software that encrypts a victim's data, making it inaccessible
until a ransom is paid. Paying the ransom is discouraged, as it does not guarantee the
recovery of data and encourages further criminal activity.
13. Cyber Stalking: Using digital means to track, harass, or intimidate someone, often over
an extended period. Cyber stalking can escalate to physical threats.
(b)
• Install parental control software or apps on devices that minors use, including
computers, smartphones, and tablets. These tools allow you to filter and block
inappropriate content and websites.
2. SafeSearch Filters:
• Enable SafeSearch filters on popular search engines like Google, Bing, and Yahoo.
This feature filters out explicit content from search results.
• Encourage the use of child-friendly search engines like Kiddle, KidRex, or Safe
Search Kids, which are designed to provide age-appropriate search results.
• Some routers offer built-in parental control features that allow you to filter content
and set time limits on internet access for specific devices.
5. Use Parental Controls on Streaming Services:
• Many streaming services offer parental control settings that allow you to restrict
access to age-appropriate content.
• Talk to your children about the potential dangers of inappropriate content on the
internet. Encourage open and honest communication, so they feel comfortable
discussing any concerns with you.
• Encourage the use of age-appropriate websites, apps, and online communities that
are designed for children. Many educational and entertainment platforms offer
content tailored to specific age groups.
8. Supervision:
• Whenever possible, supervise your child's internet usage. Keep computers and
devices in common areas of the home, where you can monitor their online activities.
• Establish rules for screen time and enforce them consistently. Limit the amount of
time children spend online, especially on entertainment platforms.
• Use strong and unique passwords for devices and accounts to prevent unauthorized
access to age-restricted content.
• Periodically review the browsing history on devices to ensure your child is not
accessing inappropriate content.
(c)
• Enable and regularly update spam filters provided by your email service provider.
Most email platforms offer built-in spam filtering, which can automatically move
suspected spam emails to a separate folder.
2. Report Spam:
• When you receive spam emails, report them as spam within your email client. This
helps train the spam filter to recognize similar messages in the future.
• Be cautious about sharing your email address in public online spaces like forums
or social media. Spammers often harvest email addresses from websites.
• When signing up for online services or making online purchases, consider using
disposable email addresses. These can help you keep your primary email address
free from spam.
5. Educate Yourself:
• Secure your email accounts with strong, unique passwords to prevent unauthorized
access. Use two-factor authentication (2FA) for an additional layer of security.
• Avoid forwarding chain emails, as these often contain false information and can
contribute to the spread of spam.
• Configure your email client to block or filter attachments with certain file
extensions, as malicious attachments are a common delivery method for malware.
• DMARC helps prevent domain spoofing by providing a way for email receivers to
check that incoming messages from a domain are legitimate. Implement DMARC
policies for your domain.
• Keep your email client, operating system, and antivirus software up-to-date to
ensure they have the latest security features and patches
(d)
An ethical dilemma in IT, as in any profession, refers to a situation in which an individual or group
of professionals faces a complex and challenging decision that involves conflicting moral
principles, values, or obligations. These dilemmas often require individuals to make difficult
choices between two or more competing ethical considerations, and the resolution may not have a
clear-cut, straightforward answer. Here are a few examples of ethical dilemmas in IT:
• Developers often face pressure to meet tight project deadlines. In such cases, they
might be tempted to compromise on software quality, which could lead to security
vulnerabilities or subpar performance. Deciding whether to prioritize quality over
meeting deadlines can create an ethical conflict.
• Building AI systems that learn from data can inadvertently perpetuate biases
present in the training data. IT professionals working on AI projects may face
dilemmas related to addressing bias and ensuring fairness while still achieving
performance goals.
5. Vendor Relationships and Conflict of Interest:
• Developers and organizations often have to make choices about whether to use
open-source software, which is freely available but may have licensing and
intellectual property implications, or proprietary solutions. This decision involves
ethical considerations about respecting intellectual property rights and supporting
open-source communities.
• Platforms and social media companies must make decisions about content
moderation and censorship. Balancing the right to free speech with the need to
prevent harmful or illegal content from spreading presents a significant ethical
challenge in IT.
(e)
In a situation like this, where I believe that a computer-controlled crash avoidance system for
automobiles has a serious flaw that could potentially endanger people, I would prioritize the safety
and well-being of individuals over project timelines or managerial expectations. Here's how I
would approach this ethical dilemma:
1. Gather Information: Before taking any action, I would thoroughly investigate and gather
as much data and evidence as possible to support my belief that there is a safety flaw in the
system. This might involve conducting tests, reviewing system logs, and consulting with
colleagues who share my concerns.
2. Discuss Concerns Internally: I would initiate a conversation with my team members and
project manager to discuss my concerns openly and professionally. It's possible that others
may have similar concerns or insights into the issue.
4. Consult with Experts: If the issue is complex and requires technical expertise beyond my
own, I would seek guidance from experts in the field, whether they are colleagues, mentors,
or external professionals. Their insights could help validate or clarify the issue.
5. Raise the Issue Up the Chain: If discussing the concern with my project manager does
not result in a satisfactory resolution and I genuinely believe that the flaw poses a safety
risk, I would escalate the matter to higher-level management or the appropriate authorities
within the organization. This might involve presenting the documented evidence and
explaining the potential consequences.
6. Consider Legal and Ethical Obligations: Depending on the nature and severity of the
flaw, it may be necessary to consider legal and ethical obligations. This could involve
reporting the issue to relevant regulatory agencies or authorities if it poses a significant risk
to public safety.
8. Seek External Guidance: If the situation remains unresolved or if I face retaliation for
raising concerns, I may consider seeking guidance from external organizations, legal
experts, or whistleblowing hotlines to ensure that safety concerns are addressed
appropriately.
KYAMBOGO UNIVERSITY
SCHOOL OF COMPUTING AND INFORMATION
SYSTEMS
YEAR: THREE
SEMESTER: TWO
GROUP MEMBERS
NAME REG. NUMBER
BIRIJA SONIA PRISCILLA 20/U/ISD/9578/PD
KAUKI SULAIMAN 20/U/ISD/9617/PD
MOGA FALANANSI 20/U/ISD/9679/PD
SANYWA JOHN 20/U/ISD/9687/PD
LUTAAYA JAMIL 20/U/ISD/9608/PD
QUESTIONS 3
What are intellectual Property Rights?
Identify and briefly describe any four intangible intellectual rights which are contained in the
intellectual Property Rights.
With examples distinguish between personal and Non-personal data
Distinguish between a hacker and a cracker and suggest the common intentions of hacking
Suggest the precaution you need to take when setting up a firewall as a security measure.
QUESTION 4
Four intangible intellectual rights which are contained in the intellectual property rights are:
Copyright: This protects original literary, artistic, and musical works, as well as software, from
being copied, distributed, or performed without the creator's permission. Copyright typically
lasts for the lifetime of the creator plus 50-70 years.
Trademark: These are used to protect distinctive symbols, names, and logos that identify and
distinguish goods and services of one entity from another. Trademarks can be renewed
indefinitely as long as they are in use.
Patent: Patents grant inventors exclusive rights to their inventions for a set period (usually 20
years). This exclusivity allows inventors to control how their inventions are used, manufactured,
and sold.
Trade secret: Trade secrets encompass confidential business information, such as
manufacturing processes, formulas, and customer lists. These are protected as long as they
remain confidential.
Industrial Design Rights: These protect the visual design or aesthetic aspects of an object, such
as the shape, color, or surface ornamentation of a product.
Non-personal data is any information that cannot be used to identify an individual, such as the
number of visitors to a website or the average age of customers in a store. Examples of non-
personal data: The number of visitors to a website, The average age of customers in a store, The
most popular products purchased by customers, The most common search terms used on a
website.
SO, if a company collects information on the number of visitors to its website and the pages they
visit without collecting any personally identifiable information, it's dealing with non-personal
data. However, if the company also collects users' names or email addresses, that would be
considered personal data.
(d) Distinguish between a hacker and a cracker and suggest the common intentions of
hacking.
A hacker is a person who uses their programming and technical skills to gain unauthorized
access to computer systems or networks, often with the intention of identifying vulnerabilities
and improving security. Hackers can be ethical (white hat), malicious (black hat), or fall
somewhere in between (grey hat).
A cracker on the other hand, is typically associated with malicious intent. Crackers use their
skills to break into computer systems, networks, or software for illegal purposes, such as stealing
data, spreading malware, or disrupting services.
Disrupting operations: Hackers may disrupt the operations of computer systems and networks by
launching denial-of-service attacks or installing malware.
Espionage: Hackers may hack into computer systems and networks to gather intelligence on
individuals or organizations.
Vandalism: Hackers may vandalize computer systems and networks by changing websites,
deleting files, or installing malicious software.
Personal Vendettas: In some cases, hackers may have personal grudges or vendettas against
individuals or organizations. Their motivations could include revenge, embarrassment, or
causing harm to their targets.
Botnet Creation and Control: Hackers may create and control networks of compromised
computers, known as botnets, for various purposes. Botnets can be used to launch distributed
denial-of-service (DDoS) attacks, spread malware, or engage in other malicious activities.
Exploration and Learning (Ethical Hacking): Ethical hackers, also known as white hat hackers,
hack with the intention of identifying security vulnerabilities and weaknesses in systems,
networks, or software. Their goal is to improve security and help organizations protect against
malicious attacks.
(e) Suggest the precaution you need to take when setting up a firewall as a security
measure.
Here are some precautions you can take when setting up a firewall as a security measure:
Choose the right firewall: There are many different types of firewalls available, so choose one
that is appropriate for your needs. Consider the size and complexity of your network, as well as
the types of threats you want to protect against.
Configure the firewall correctly: Make sure that the firewall is configured to block all
incoming traffic that you do not need or want. This includes creating rules to allow only specific
types of traffic, such as web browsing and email.
Keep the firewall up to date: Firewalls are regularly updated to protect against new threats, so
make sure to install the latest updates as soon as they are available.
Monitor the firewall: Monitor the firewall logs to identify any suspicious activity. This can help
you to quickly detect and respond to attacks.
Use strong passwords: Use strong passwords for your firewall and enable two-factor
authentication if possible. This will help to prevent unauthorized access to your firewall.
Create separate firewall rules for different types of traffic: This will help you to better
control the flow of traffic through your network and make it more difficult for attackers to gain
access to sensitive data.
Disable unused ports and services: This will reduce the number of potential attack vectors that
attackers can exploit.
Use a firewall that supports intrusion detection and prevention (IDS/IPS): IDS/IPS systems
can help to detect and block malicious traffic before it reaches your network.
Keep your firewall software up to date: Firewall software is regularly updated to protect
against new threats, so make sure to install the latest updates as soon as they are available.
Physically secure your firewall: Place your firewall in a secure location and make sure that
only authorized personnel have access to it.
SOLUTIONS
QUESTION 4
The following are the General Moral Imperatives of the ACM Code of Ethics and Professional
Conduct:
Contribute to society and to human well-being, acknowledging that all people are
stakeholders in computing and its artifacts.
This imperative applies to IT professionals by requiring them to consider the ethical implications
of their work and to use their skills to benefit society. For example, IT professionals should avoid
developing technologies that could be used to harm people or to violate their privacy. They
should also work to ensure that everyone has access to the benefits of computing.
This imperative applies to IT professionals by requiring them to respect the intellectual property
rights of others. For example, IT professionals should avoid plagiarizing the work of others.
They should also give proper credit to the developers of technologies that they use.
How each of these imperatives applies to the professional conduct of an IT professional:
Contribute to society and to human well-being: IT professionals can contribute to society and
to human well-being by developing technologies that solve real-world problems and that make
people's lives better. They can also do this by volunteering their time and skills to help non-profit
organizations.
Avoid harm to others: IT professionals can avoid harm to others by being careful not to develop
technologies that could be used to harm people or to violate their privacy. They should also be
careful not to collect or use personal data in ways that could harm people.
Be honest and trustworthy: IT professionals can be honest and trustworthy by being truthful in
their dealings with others and by being honest about the limitations of their products and
services.
Be fair and take action not to discriminate unfairly: IT professionals can be fair and take
action not to discriminate unfairly by treating everyone fairly, regardless of their race, gender,
religion, or any other factor. They should also avoid developing technologies that could be used
to discriminate against certain groups of people.
Honor intellectual property rights and give proper credit: IT professionals can honor
intellectual property rights and give proper credit by respecting the intellectual property rights of
others and by giving proper credit to the developers of technologies that they use.
Rapid Technological Change: Technology evolves quickly, leading to new ethical challenges.
A static code of ethics may become outdated as technology advances, making it necessary for
professionals to adapt and apply ethical reasoning to novel situations.
Cultural and Legal Differences: Ethics can vary across cultures and legal jurisdictions. What is
considered ethical in one context may not be in another. A code of ethics cannot account for all
cultural and legal variations.
The digital divide is the gap between those who have access to and can use information and
communication technologies (ICTs) and those who cannot. The digital divide can be caused by a
variety of factors, such as income, education, and location.
(d) The digital divide is a various that brings many setbacks with it – economic, social,
political and psychological backwardness. Discuss.
The digital divide can have a number of negative consequences, including economic, social,
political, and psychological setbacks.
Economic Backwardness:
Limited Job Opportunities: Individuals without access to digital tools and the internet may miss
out on employment opportunities in sectors that increasingly require digital skills.
Reduced Entrepreneurship: The digital divide can hinder entrepreneurship and innovation, as
those without access may struggle to launch online businesses or startups.
Income Inequality: Unequal access to digital resources can exacerbate income inequality, as
those with digital access have a greater chance of accessing higher-paying jobs and economic
opportunities.
Social Disparities:
Isolation and Exclusion: Lack of digital access can lead to social isolation, with individuals
missing out on online social networks and communication tools, potentially leading to feelings of
exclusion.
Educational Gaps: Students without access may face educational setbacks, as online learning
becomes increasingly common. This can perpetuate educational inequalities.
Political Disempowerment:
Limited Civic Participation: Those without digital access may have restricted ability to engage in
the political process, access government services, or participate in civic activities.
Digital Divides in Information: Differences in digital access can lead to disparities in access to
news and information, affecting citizens' ability to make informed decisions.
Psychological Impact:
Low Self-Esteem: The digital divide can lead to feelings of inadequacy and low self-esteem
among those who are excluded from the benefits of digital technologies.
Frustration and Stress: Individuals unable to access digital resources may experience frustration
and stress when facing challenges or limitations in their daily lives.
e) In general, suggest what is not being done correctly in bridging Digital Divide and what steps can be
taken towards changing/influencing the situation.
Solution: Increase funding for the expansion of broadband networks, focusing on regions with
limited connectivity. Encourage private sector participation through incentives and subsidies.
2. High Internet Costs:
Challenge: The cost of internet access can be prohibitively high for low-income individuals and
families.
Solution: Subsidize internet costs for low-income households, provide discounted plans, and
regulate pricing to ensure affordability.
3. Lack of Digital Literacy:
Challenge: Many people lack the digital skills needed to use technology effectively.
Solution: Implement comprehensive digital literacy programs that teach basic computer skills,
online safety, and how to navigate digital resources. These programs should target various age
groups and skill levels.
Solution: Promote the creation of local and culturally relevant content and applications.
Translate and adapt digital resources to cater to diverse linguistic and cultural backgrounds.
5. Unequal Access in Education:
Challenge: Disparities in access to digital tools and internet connectivity can hinder educational
opportunities.
Solution: Equip schools in underserved areas with the necessary technology infrastructure,
including devices and reliable internet connections. Train teachers in integrating technology into
their teaching methods.
6. Lack of Accessibility for Persons with Disabilities:
Challenge: Digital technologies often do not cater to the needs of individuals with disabilities.
Solution: Enforce accessibility standards and regulations to ensure that digital platforms and
content are usable by individuals with disabilities. Promote the development of assistive
technologies.
7. Limited Public-Private Collaboration:
Solution: Streamline and clarify policies related to digital access, net neutrality, and fair
competition. Ensure that regulations prioritize equitable access and competition.
9. Insufficient Advocacy and Awareness:
Challenge: Many people may not be aware of the importance of digital inclusion, and advocacy
efforts may be limited.
Solution: Launch awareness campaigns to highlight the social and economic benefits of digital
inclusion. Engage with communities, stakeholders, and policymakers to drive advocacy efforts.
Solution: Collaborate with educational institutions to integrate digital literacy and technology
education seamlessly into existing curricula. Ensure that educators receive training and resources
to facilitate this integration.
REFERENCES
Murray, James (2011-12-18). "Cloud network architecture and ICT - Modern Network
Architecture". TechTarget =ITKnowledgeExchange.
• Howard, P. N., & Dutton, W. H. (2012). The wired society: Social science research on the
information highway. Cambridge, MA: MIT Press.
• National Academies of Sciences, Engineering, and Medicine. (2016). Expanding access to
information and communication technologies (ICTs) in developing countries:
DEPARTMENT OF COMPUTER SCIENCE
SCHOOL OF COMPUTING AND INFORMATION SCIENCE
SOCIAL ISSUES IN COMPUTING SIS3202
GROUP THREE
GROUP FOUR
NAME REG NO. WATTSAPP NO.
QNS: 7 & 8
QN 7 SOLUTIONS
a) Examine numerous aspects of ICT that make technology a threat to privacy.
Information and Communication Technology (ICT) has revolutionized the way we live and
work, bringing countless benefits. However, it also poses a significant threat to privacy.
Privacy, in this context, refers to the right of individuals to control their personal information
and keep it confidential. Information and Communication Technology (ICT) has brought about
numerous privacy concerns due to the ways in which it can compromise individuals' personal
information and data.
Below are various aspects of ICT that undermine privacy, highlighting specific terms and
explaining key points.
1. Data Collection and Profiling. ICT enables the collection of vast amounts of personal data
through online activities, IoT devices, and more. For example, Data mining techniques are
used to analyze this data, often without consent, leading to privacy invasion.
2. Surveillance and Monitoring. Governments and corporations can employ ICT for mass
surveillance programs, tracking citizens' online activities, communications, and movements,
eroding the expectation of privacy. Also, Government laws like the USA PATRIOT Act
enable authorities to access and monitor electronic communications, including emails and
phone records, with implications for citizens' privacy rights.
3. Social Media and Data Harvesting. Social media platforms often harvest user data,
including preferences, habits, and connections, to target users with personalized ads, raising
privacy invasion concerns. This practice compromises user privacy.
4. Internet of Things (IoT) and Smart Devices. IoT devices, like smart home appliances and
wearable’s, constantly collect and transmit data. Poor security measures can make these
devices vulnerable to hacking, putting personal information at risk.
5. Biometrics and Facial Recognition. Facial recognition technology, used for authentication
and surveillance, can infringe on privacy rights by capturing and analyzing individuals' facial
features without their knowledge or consent posing privacy and security risks.
6. Cloud Storage and Data Breaches. Storing personal data in the cloud poses risks as data
breaches can occur due to hacking or security lapses, exposing sensitive information to
unauthorized parties.
7. Location Tracking and Geolocation Data. Mobile devices and apps often track users'
locations. This data can be exploited by advertisers, law enforcement, or cybercriminals,
compromising individuals' privacy.
8. Online Tracking and Cookies. Websites use cookies and tracking pixels to monitor users'
online behavior. This data is used for targeted advertising, creating a digital footprint that
invades user privacy.
9. Big Data Analytics and Predictive Analytics. Big data analytics can predict individuals'
behavior and preferences based on their online activities and interactions. While beneficial
for businesses, it can be invasive and lead to privacy concerns.
10. Privacy Policies and Legalese. Complex and lengthy privacy policies often contain legal
jargon that makes it challenging for users to understand how their data is being used and
shared, hindering informed consent
11. Online Advertising and Ad Targeting. ICT enables advertisers to target users with highly
personalized ads based on their online behavior and interests, sometimes without clear
disclosure, raising concerns about user tracking and profiling.
12. Eavesdropping and Voice Assistants. Voice-activated assistants like Siri and Alexa can
unintentionally record conversations and send them to the cloud for processing, potentially
exposing private discussions to unauthorized parties.
13. Social Engineering and Phishing. Cybercriminals use ICT to trick individuals into
revealing personal information through phishing emails, websites, or phone calls, leading to
identity theft and privacy breaches.
14. Data Retention and Retention Policies. Many ICT services retain user data for extended
periods, even after it's no longer necessary. Prolonged data retention increases the risk of data
breaches and unauthorized access.
b) Assess how the working environment of ICT professionals is challenging and has an
impact on their conduct. Briefly describe this environment, stating the
corresponding challenges in each case.
Below is a description of the ICT working environment along with corresponding challenges in
each case:
The ICT field is characterized by rapid advancements in technology, which require professionals
to stay up-to-date with the latest developments.
Challenge: Keeping pace with constantly evolving technologies can be mentally taxing and may
lead to burnout if professionals don't manage their learning effectively.
ICT professionals often collaborate with colleagues and clients from diverse cultural
backgrounds worldwide.
Challenge: Navigating cultural differences and communication styles can be challenging,
potentially leading to misunderstandings or conflicts.
The ICT industry encompasses a wide range of roles, from software development to
cybersecurity, each requiring specific skills and expertise.
Challenge: Balancing the need for specialization with the need for a broad understanding of the
field can be a challenge, as individuals must decide where to focus their careers.
The tech industry has embraced remote work, offering flexibility in work arrangements.
Challenge: Remote work can blur the boundaries between professional and personal life,
affecting work-life balance and potentially leading to burnout or isolation.
5. Interdisciplinary Collaboration.
Many ICT projects involve cross-disciplinary teams with professionals from various
backgrounds.
Challenge: Differences in terminology, approaches, and perspectives among team members can
lead to communication challenges and potential conflicts.
The ICT field thrives on innovation, with a constant need for creative solutions and new
technologies.
Challenge; The pressure to innovate can lead to a high-stress environment, where professionals
may feel compelled to take risks that impact the quality of their work.
7. Fast-Paced Projects.
ICT projects often have aggressive timelines, demanding quick problem-solving and efficient
project management.
Challenge: The pressure to meet tight deadlines can impact decision-making, potentially leading
to shortcuts or rushed work.
8. Environmental Awareness.
Increasing concerns about the environmental impact of technology have led to a greater
emphasis on sustainability.
Challenge: Addressing sustainability concerns while maintaining technological advancements
and profitability can be a complex ethical challenge.
Data privacy and cybersecurity are paramount in ICT, given the increasing volume of data
collected and the rising cyber threats.
Challenge: Ensuring the security and privacy of user data while maintaining functionality and
usability can be an ongoing challenge, requiring constant vigilance.
c) Outline any five rules under public interest in as far as the British computer
society code of conduct is concerned.
1. Promote Public Interest.
ICT professionals must actively promote the public interest and ensure that their work benefits
society as a whole. This rule emphasizes that professionals should prioritize the welfare of the
general public over individual or organizational interests. They are encouraged to consider the
broader implications of their work on society.
2. Avoid Harm.
ICT professionals should avoid actions that might harm the well-being of individuals,
organizations, or society. This rule underscores the importance of minimizing negative
consequences resulting from ICT-related activities. It encourages professionals to act responsibly
to prevent harm.
The term "digital divide" refers to the unequal access and usage of digital technologies,
particularly the internet and information and communication technologies (ICT), among different
groups of people or communities. This divide is primarily driven by disparities in socio-
economic, geographical, educational, and demographic factors.
In essence, the digital divide highlights the gap between those who have access to and can
effectively use digital tools and resources and those who do not, thus limiting their participation
in the digital age and its associated opportunities.
e) The digital divide is a virus that brings many setbacks with it – economic, social,
political, and psychological backwardness. Elaborate.
ECONOMIC BACKWARDNESS:
Limited Job Opportunities. People without access to digital technologies may miss out on a wide
range of job opportunities in the modern job market, which often requires digital skills.
1. Income Inequality. The digital divide can exacerbate income inequality, as those with
limited access may struggle to participate in the digital economy, which often offers higher-
paying jobs and entrepreneurial opportunities.
2. Reduced Economic Mobility. A lack of digital access can hinder individuals' ability to
acquire new skills, access online education and training, and start or expand businesses,
limiting economic mobility.
3. Reduced Innovation. Like a virus that weakens an immune system, the digital divide
hampers innovation by excluding talented individuals who could otherwise contribute to
technological advancements.
4. Limited Economic Growth. The digital divide virus stifles economic development as it
restricts access to digital tools necessary for modern businesses and entrepreneurship.
SOCIAL BACKWARDNESS:
1. Education Disparities. Students without access to digital resources may face challenges in
accessing quality education and suffer from disparities in learning outcomes.
2. Social Isolation. Lack of digital connectivity can lead to social isolation, especially in the
context of remote work, online social interaction, and staying connected with friends and
family.
3. Healthcare Access. The digital divide can hinder access to telehealth services, preventing
individuals from receiving timely medical advice and care.
POLITICAL BACKWARDNESS:
1. Limited Civic Engagement. Digital exclusion can lead to reduced civic participation,
making it difficult for individuals to engage in political processes, access government
services, or stay informed about public affairs.
2. Democratic Inequity. Like a virus that weakens immune responses, the digital divide can
undermine democratic processes, as some citizens are unable to participate fully in elections,
advocacy, or accessing government services online.
3. Digital Disinformation Vulnerability. Those without digital literacy skills may be more
susceptible to online disinformation and manipulation, impacting their ability to make
informed political decisions.
PSYCHOLOGICAL BACKWARDNESS:
1. Missed Personal Growth Opportunities. The inability to access online resources for
personal growth, such as learning new skills or hobbies, can hinder psychological well-being.
2. Digital Stress and Anxiety. Similar to the emotional toll of a virus outbreak, the digital
divide can cause stress and anxiety. Those left behind may feel overwhelmed by their
inability to access critical digital services or opportunities. Those excluded from the digital
world may experience feelings of stress, frustration, and alienation, especially when they
perceive others benefiting from digital technologies.
QN 8 SOLUTIONS
a) Explain the term "computer crime" stating any three common examples.
"Computer crime," also known as cybercrime, refers to illegal activities that involve the use of
computers or computer networks to commit unlawful acts. These crimes can range from
relatively simple actions, such as hacking into someone's email account, to highly complex and
sophisticated schemes, such as large-scale data breaches.
1. Hacking:
Hacking involves unauthorized access to computer systems, networks, or devices. Hackers gain
access by exploiting vulnerabilities in software or by using techniques like phishing to trick
individuals into revealing their login credentials. Once inside, they may steal sensitive data,
disrupt operations, or carry out other malicious activities.
2. Phishing:
Phishing is a type of social engineering attack in which cybercriminals use deceptive emails,
messages, or websites to trick individuals into disclosing personal information, such as login
credentials, credit card numbers, or social security numbers. These stolen details are often used
for identity theft or financial fraud.
3. Ransomware:
Ransomware is a type of malware that encrypts a victim's files or locks them out of their
computer system. Cybercriminals then demand a ransom, usually in cryptocurrency, in exchange
for a decryption key or to unlock the system. Ransomware attacks can cause significant financial
losses and disrupt critical services, affecting both individuals and organizations.
Other computer crimes may include:
• Malware: Malicious software causing harm.
• DoS/DDoS Attacks: Overwhelming networks or websites.
• Identity Theft: Stealing personal information.
• Data Breaches: Unauthorized data access or exposure.
• Cyberbullying: Harassment using digital tools.
• Online Scams: Deceptive schemes for financial gain.
• Child Exploitation: Illegal content involving minors.
• Unauthorized Access: Misusing insider privileges.
b) Publishing indecent and deceitful material are some of unethical conduct over the
internet. Suggest 10 ways you can prevent the immature to access indecent materials on
the internet.
Here are 10 ways to prevent the immature from accessing indecent materials on the internet:
1. Talk to your children about the internet. Explain to them what indecent content is and
why it is harmful. Let them know that they can come to you if they ever see something that
makes them uncomfortable.
2. Use parental controls. Most browsers and devices have parental controls that can be used to
block certain websites and apps. You can also use parental control software to monitor your
children's online activity.
3. Place the computer in a public area of the house. This will make it less likely that your
children will be able to access indecent content without your knowledge.
4. Monitor your children's internet usage. Pay attention to what websites they are visiting
and what apps they are using. If you see anything suspicious, talk to them about it.
5. Educate your children about online safety. Teach them how to be critical of the
information they find online and how to protect themselves from online predators.
6. Use a safe search engine. Most search engines have safe search settings that can be used to
filter out adult content.
7. Use a kid-friendly search engine. There are a number of search engines that are specifically
designed for children. These search engines filter out adult content and provide age-
appropriate results.
8. Use a kid-friendly browser. There are a number of browsers that are specifically designed
for children. These browsers block adult websites and provide a safe and secure online
environment.
9. Use a kid-friendly device. There are a number of devices that are specifically designed for
children. These devices have parental controls that can be used to block adult content and
monitor online activity.
10. Talk to your children's school. Many schools have internet safety programs in place. Find
out what your children are learning in school about online safety and talk to them about it at
home.
c) Spam is a menace to the internet and specifically to email users. What measures can be
undertaken to fight against the menace?
1. Use a spam filter. Most email providers have built-in spam filters that can block most spam
messages. However, spam filters are not perfect and some spam messages may still sneak
through.
2. Report spam messages. If you receive a spam message, report it to your email provider.
This will help them to improve their spam filters and block the spammer.
3. Be careful about giving out your email address. Only give out your email address to
trusted websites and businesses.
4. Be wary of phishing scams. Phishing scams are emails that try to trick you into revealing
your personal information, such as your passwords or credit card numbers. Phishing emails
often look like legitimate emails from banks, government agencies, or other well-known
organizations.
5. Use strong passwords and two-factor authentication. Strong passwords and two-factor
authentication can help to protect your accounts from being hacked and used to send spam.
d) There are ethical dilemmas in IT just like any other profession. With reference to
examples of your choice in IT. Explain what is meant ethical dilemma.
Refers to situations where individuals or organizations face complex decisions that involve
competing moral principles, values, or obligations. In these situations, there is often no clear-cut
or universally accepted solution, and individuals must carefully consider the ethical implications
of their choices.
1. Privacy vs Security:
In the realm of cybersecurity, there is often a tension between protecting individuals' privacy and
ensuring the security of systems and data. For example, should a company or government agency
be allowed to access personal data to prevent potential security threats, even if it means
infringing on individuals' privacy rights?
Considerations: Protecting privacy is an important ethical principle, as is safeguarding against
cyber threats. Balancing these concerns is challenging, and finding the right approach that
respects privacy while maintaining security is an ongoing ethical dilemma in IT.
2. Whistleblowing:
IT professionals may encounter situations where they discover unethical or illegal activities
within their organizations, such as data breaches, fraud, or misconduct. They face a dilemma:
should they report these issues (whistleblowing), potentially risking their own career and
relationships, or should they remain silent, allowing unethical behavior to continue?
When developing AI algorithms, IT professionals must make choices about the data they use to
train these systems. Biased or unfair data can lead to AI systems that perpetuate discrimination or
inequality. The ethical dilemma arises when deciding whether to prioritize the accuracy and
effectiveness of AI systems over the potential harm they can cause by reinforcing bias.
Considerations: IT professionals must weigh the ethical responsibility of addressing bias and
discrimination in AI against the practical challenges of creating unbiased AI models.
The open-source software community promotes the sharing and collaboration of code for the
common good. However, IT professionals often encounter situations where they must decide
whether to use open-source software that may contain components with unclear intellectual
property rights. This dilemma involves respecting intellectual property rights while embracing
the open-source ethos.
• Document the Flaw: Thoroughly document the flaw in the system, including evidence
and potential consequences. Ensure you have a clear understanding of the technical
details.
• Raise Concerns Internally: Initiate a discussion with your project manager and express
your concerns regarding the flaw and its potential risks. Share your documentation and
any supporting evidence.
• Consult Colleagues: Discuss the issue with trusted colleagues and seek their input. They
may offer valuable insights or alternative perspectives.
• Review Ethical Guidelines: Refer to your organization's code of ethics, industry
standards, and any relevant legal requirements to understand your obligations.
• Escalate If Necessary: If your concerns are not addressed adequately within the
organization, consider escalating the matter to higher-level management or an internal
ethics committee, if available.
• Whistleblowing: If all internal avenues are exhausted, and you genuinely believe that
lives are at risk, you may need to consider external reporting channels, such as regulatory
authorities or industry watchdogs. Be aware of legal protections and potential
consequences when blowing the whistle.
• Document Your Actions: Keep a record of all your actions, discussions, and
communications related to the flaw and your efforts to address it. This documentation
may be crucial if you need to defend your actions later.
KYAMBOGO UNIVERSITY
P. O. BOX 1, KYAMBOGO – KAMPALA, UGANDA
TEL: +256-41-287347/288492, email: www.kyu.ac.ug
FACULTY OF SCIENCE
DEPARTMENT OF COMPUTER SCIENCE
SCHOOL OF COMPUTING AND LIBRARY SCIENCE
COURSE: BACHELOR OF INFORMATION SYSTEMS
COURSE UNIT: SOCIAL, LEGAL AND ETHICAL ISSUES IN
COMPUTING
YEAR: III
SEMESTER: TWO
GROUP 5
NAMES REG NO.
NABYONGA CHRISTINE 20/U/ISD/9582/PD
MASIGE MICHEAL 20/U/ISD/9627/PD
MURAMUZI JONAS 20/U/ISD/9560/PD
MWAJE STEVEN 20/U/ISD/9694/PD
MUHUMUZA TADEO 20/U/ISD/9579/PD
OWOMUGISHA AHABU 20/U/ISD/9568/PD
AKECH SANDRA 20/U/ISD/9622/PD
Question 9
a) What are computer ethics?
b) Why is it important to study computer ethics?
c) There are three categories of computer software. Discuss these categories giving an
example of each?
Question 10
a) Define the word ethics?
b) There are several ethical theories which have been developed tested, revised and debated.
Discuss at least six of these theories?
Question 9
a). According to (Kimppa,2008). Moor (1985) defines computer ethics as “the analysis of the
nature and social impact of computer technology and the corresponding formulation and
justification of polices for the ethical use of technology’.
It can also be defined as the standards adopted for computer usage signifying the prevention of
copyright infringement, invasion of privacy, and circulation of objectionable material. It is a
normal belief that computer ethics rely on moral principles that help a computer user to make the
right decision or to act right, accordingly.
Historical Background of Computer Ethics
The unethical use of IT risk is on the increase due to the global increase in interconnectivity of
computer system and online storage systems (Reynold, 2007). Computer ethics was first
mentioned by a MIT professor in his books where he established the theoretical framework for
computer ethics.
b). The following are the reasons as to why computer ethics are important to study;
• To deal with the true nature of computing as a service to other human beings. (Gotterbarn
1991)
• To convey a sense of professional responsibility not covered in other courses
• To sensitize students to computer ethics issues
• To provide tools and methods for analyzing cases
• To provide practice in applying the tools and methods to actual or realistic cases
• To develop in the student good judgment and helpful intuitions - ethical autonomy.
c). Software is a set of instructions, data or programs used to operate computers and execute
specific tasks.
There are two main categories of software and include application software and system
software.
An application software is software that fulfills a specific need or performs specific tasks. The
most common type of software, application software is a computer software package that performs
a specific function for a user, or in some cases, for another application. An application can be self-
contained, or it can be a group of programs that run the application for the user.
Examples of modern application software include office suites, graphics software, databases
and database management programs, web browsers, word processors, software development tools,
image editors and communication platforms.
System software is designed to run a computer's hardware and provides a platform for
applications to run on top of.
System software coordinates the activities and functions of the hardware and software. In addition,
it controls the operations of the computer hardware and provides an environment or platform for
all the other types of software to work in. The OS is the best example of system software; it
manages all the other computer programs.
Other examples of system software include the firmware, computer language translators and
system utilities;
Driver software. Also known as device drivers, this software is often considered a type of system
software.
Device drivers control the devices and peripherals connected to a computer, enabling them to
perform their specific tasks. Every device that is connected to a computer needs at least one device
driver to function.
Examples include software that comes with any nonstandard hardware, including special game
controllers, as well as the software that enables standard hardware, such as USB storage devices,
keyboards, headphones and printers.
Programming software, which provides the programming tools software developers need
Middleware, which sits between system software and applications; and driver software, which
operates computer devices and peripherals.
Question 10
a). Ethics was derived from the greek word “ethos”, which means “custom”, “habit”, and “way
of living”.
Ethics refers to standards of conduct, standards that indicate how one should behave based on
moral duties and virtues, which themselves are derived from principles of right and wrong.
b). There are several ethical theories that have been developed, tested, revised, and debated
in the field of ethics. Here are six prominent ethical theories:
Utilitarianism: This was founded by Jeremy Bentham and John Stuart Mill
Key Idea: The morality of an action is determined by its overall consequences. The goal is to
maximize happiness or utility and minimize suffering. Actions are evaluated based on the principle
of "the greatest good for the greatest number."
Deontology: This was founded by Immanuel Kant. Deontology emphasizes the moral duty or
obligation of individuals. It asserts that some actions are inherently right or wrong, regardless of
their consequences. The most famous expression is the "categorical imperative," which outlines
universal moral principles that should guide actions.
Virtue Ethics: This was founded by Aristotle. Virtue ethics focuses on the character of individuals
and emphasizes the development of virtuous traits or qualities, such as honesty, courage, and
compassion. It asserts that moral actions arise from virtuous character.
Social Contract Theory: This was founded by Hobbes, John Locke, Jean-Jacques Rousseau
Social contract theory proposes that individuals come together to form a society and agree upon a
set of rules or a social contract. Morality is based on this contract, and actions are judged based on
their conformity to these agreed-upon rules.
Ethical Egoism: Ethical egoism asserts that individuals should act in their own self-interest. It is
a normative theory that argues that people ought to do what is best for themselves, and this is the
morally right thing to do.
Feminist Ethics: Feminist ethics seeks to address and correct gender-based injustices and
inequalities in traditional ethical theories. It emphasizes the importance of empathy, care, and
relationships in ethical decision-making, and it critiques traditional ethics for being male-centered.
In conclusion, these six ethical theories represent a range of perspectives on what constitutes
ethical behavior and the foundations for ethical decision-making. Ethical discussions often involve
weighing these theories against each other and considering their strengths and weaknesses in
various moral dilemmas and real-world situations.
The use of code of ethics among IT general users and professionals has a positive effect on the
ethical use of information technology as reveal in this paper. The policy vacuum created by the
advancement of IT can easily be addressed by constant research and study in field of computer
ethics by computer science and information technology related students (Gotterbarn,1992). The
teaching of computer ethics courses will be of great importance in reducing computer disasters,
lead to the development of error-free computer applications and eradicating unethical computer
activity in this 21st century (Gotterbarn, 1992).
REFERENCES
Kizza, J. M. (2002). Ethical and social issues in the information age. New York: Springer Verlag.
Lee, W. W. & Chan, K. C. C. (2008). Computer Ethics: A Potent Weapon for Information Security
Management.
Retrieved from http://www.isaca.org/Journal/Past-Issues/2008/Volume-6/Documents/jpdf0806-
computerethics.pdf
Moor, J. H. (2004). Reason, relativity and responsibility in computer ethics. T. W. Bynum, S.
Rogerson eds. Computer Ethics and Professional Responsibility. Malden, MA: Blackwell
Publishing.
Alexandra, A., & Miller, S. (2010). Law, Ethics and Governance Series: Integrity Systems for
Occupations. England:
Asgate. pp: 61, and 113. Ben-Jacob, M. G. (2005). Integrating Computer Ethics across the
Curriculum: A Case Study. Educational Technology & Society, 8(4), 198 – 204.
KYAMBOGO UNIVERSITY
SCHOOL OF COMPUTING AND INFORMATION
SCIENCE
Morality refers to the set of standards that enable people to live cooperatively in groups.
While
Law is a set of rules that are created and are enforceable by social or governmental institutions to
regulate behavior, with its precise definition a matter of longstanding debate.
Law is the discipline and profession concerned with the customs, practices, and rules of conduct
of a community that are recognized as binding by the community.
"Civil" cases are the cases in which private citizens (or companies) sue each other in court. Civil
cases are not about breaking a criminal law.
While
A criminal case is a lawsuit brought by the state against a person who has broken a criminal law.
A criminal charge is a violation of the criminal law and considered an offense against the
community.
Conventional international law is the body of international legal principles contained in treaties
versus customary international law or other sources of international law.
While
Natural law is a system of law based on a close observation of human nature, and based on values
intrinsic to human nature that can be deduced and applied independently of positive law.
Natural law is a theory in ethics and philosophy that says that human beings possess intrinsic
values that govern their reasoning and behavior.
Question 2
Confidentiality refers to the duty to protect privileged information and to share entrusted
information responsibly.
Availability is the ability for users to access systems and information when needed, even under
duress.
Password is a string of characters used to verify the identity of a user during the authentication
process.
Firewall is a network security device that monitors and filters incoming and outgoing network
traffic based on an organization’s previously established security policies.
Integrity is the accuracy and consistency of data as well as the completeness and reliability of
systems.
b. Anonymity is the absence of identity. There are several types of anonymity. Briefly
discuss
Anonymity can be defined either as acting or communicating without using or presenting one's
name or identity, or as acting or communicating in a way that protects the determination of one's
name or identity, or using an invented or assumed name that may not necessarily be associated
with one's legal or customary identity.
Anonymity is the state of being not identifiable within a set of subjects, the anonymity set.
Pseudonymity. Sometimes a person may desire a long-term relationship (such as a reputation) with
another party without necessarily disclosing personally identifying information to that party. In
this case, it may be useful for the person to establish a unique identifier, called a pseudonym.
Examples of pseudonyms are pen names, nicknames, credit card numbers, student numbers, bank
account numbers, etc. A pseudonym enables the other party to link different messages from the
same person and, thereby, to establish a long-term relationship. Pseudonyms are widely used in
social networks and other virtual communication, although recently some important service
providers like Google try to discourage pseudonymity
Personal Anonymity: Serves to protect individuals. It enables the act of sharing sensitive
information and/or undertaking risky endeavors as it provides the actor with control over the
consequences that might follow.
Notion of anonymity
Identifiability is the possibility to know the real identity of some party in the system by means of
actual data exchanged in the system.
Traceability is the ability to obtain information about the communicating parties by observing the
communication context (e.g. via the IP address).
Unlinkability of two or more items of interest (IOI) means that within this system, these items are
no more and no less related than they are related with respect to the a-priori knowledge.
References
Boyd, P. and C. Budnick (2011) ‘Narcotics anonymous. Its history and culture’,
Coleman, G. (2014) Hacker, hoaxer, spy. The many faces of anonymous. London:
Verso Books