0% found this document useful (0 votes)
19 views

All Assignments Combined

The document appears to be notes from a class on social issues in computing taken by students at Kyambogo University in Uganda. It lists the names and registration numbers of 6 students in Group 1 for the class.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

All Assignments Combined

The document appears to be notes from a class on social issues in computing taken by students at Kyambogo University in Uganda. It lists the names and registration numbers of 6 students in Group 1 for the class.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 75

KYAMBOGO UNIVERSITY

SCHOOL OF COMPUTING AND INFORMATION SCIENCES

DEPARTMENT OF COMPUTER SCIENCE

BACHELOR OF INFORMATION SYSTEMS

SIS3202 SOCIAL ISSUES IN COMPUTING

LECTURER: Mr. SSEGUYA RONALD

GROUP ONE

NAME REGISTRATION NUMBER SIGNATURE

AKANDINDIRA JOAB 20/U/ISD/9600/PD

RUKUNDO ELVIS 20/U/ISD/9626/PD

ANYONGYEIRE HEZEKIAH 20/U/ISD/9567/PD

NAMUGA FAITH 20/U/ISD/9643/PD

MUGABE COWEN 20/U/ISD/9620/PD

LUNGULI JAMES 20/U/ISD/9669/PD

KIRUNI HELLEN 20/U/ISD/9686/PD


(a)

Information technology (IT) is the use of any computers, storage, networking and other physical
devices, infrastructure and processes to create, process, store, secure and exchange all forms of
electronic data

A professional is an individual who possesses specialized knowledge, skills, and expertise in a


particular field or occupation. Professionals are typically characterized by their commitment to
high ethical and quality standards, a dedication to continuous learning and improvement, and a
sense of responsibility to serve their clients, organizations, or the public to the best of their abilities.

Thus, An Information Technology Professional is an individual whose position is assigned work


associated with the establishment and enforcement of standards and specifications for network
computer systems; or the development of computer systems applications; or the development,
installation and maintenance of local area network and mainframe computer systems or server
environments; or the development, installation and maintenance of telecommunications systems.
A person who has undergone training in computer-related field colleges, universities and computer
institutes

IT professionals are responsible for managing, maintaining, and supporting various aspects of
technology within organizations, ranging from hardware and software systems to networks and
cybersecurity or provision of user support for any such systems.

(b)

1. Education and Qualifications: A strong educational background in IT-related fields, such


as computer science, information systems, or software engineering, is often the foundation
for recognition. Earning relevant degrees or certifications demonstrates your commitment
to building a solid foundation of knowledge.

2. Certifications: Industry-recognized certifications from organizations like CompTIA,


Cisco, Microsoft, AWS, or others can validate your expertise in specific IT domains, such
as networking, cybersecurity, cloud computing, or programming.

3. Professional Experience: Hands-on experience working with IT systems, networks,


software, or hardware is crucial. The depth and breadth of your experience, as well as your
ability to handle complex projects, can enhance your professional reputation.
4. Specializations: Developing expertise in specialized areas of IT, such as cybersecurity,
data analysis, cloud computing, or artificial intelligence, can set you apart from generalists
and make you valuable in high-demand niches.

5. Problem-Solving Skills: IT professionals often encounter challenging problems. Your


ability to diagnose and resolve issues efficiently can earn you recognition among your peers
and within your organization.

6. Continuous Learning: The IT field evolves rapidly. Staying up-to-date with the latest
technologies, trends, and best practices through continuous learning and professional
development demonstrates your commitment to excellence.

7. Contributions to Projects: Successfully contributing to IT projects, whether as a team


member or a leader, showcases your ability to deliver results. Documenting your
achievements and the impact of your work can bolster your reputation.

8. Technical Skills: Proficiency in programming languages, system administration, network


management, or other technical skills relevant to your role is essential. Demonstrating
mastery of these skills can make you a sought-after IT professional.

9. Networking: Building a professional network within the IT community can provide


opportunities for collaboration, learning, and career advancement. Participating in industry
events, forums, and online communities can help you connect with peers and mentors.

10. Ethical Conduct: Upholding ethical standards, particularly in areas like cybersecurity and
data privacy, is critical for maintaining trust and professional recognition.

11. Communication Skills: Effective communication, including the ability to explain


technical concepts to non-technical stakeholders, can set you apart as a well-rounded IT
professional.
(c)

1. Continuous Learning:

• Stay up-to-date with the latest technologies, tools, and trends in IT by regularly
reading tech news, blogs, and industry publications.

• Enroll in online courses, attend webinars, and participate in workshops or training


programs to acquire new skills and knowledge.

2. Certifications:

• Pursue industry-recognized certifications relevant to your area of expertise.


Certifications from organizations like CompTIA, Cisco, Microsoft, AWS, and
others can enhance your credibility.

• Update your certifications as needed to reflect changes in technology.

3. Hands-On Experience:

• Work on personal or side projects to gain practical experience with emerging


technologies or to deepen your expertise in specific areas.

• Volunteer for challenging projects at work to expand your skill set.

4. Networking:

• Attend IT conferences, meetups, and local tech events to network with peers,
experts, and potential mentors.

• Engage in online IT communities and forums to exchange knowledge and learn


from others in the field.

5. Specialization:

• Consider specializing in a niche area within IT, such as cybersecurity, cloud


computing, data science, or artificial intelligence. Deep expertise can set you apart.

• Stay informed about industry-specific certifications and training related to your


chosen specialization.
6. Soft Skills:

• Develop soft skills such as communication, problem-solving, teamwork, and


adaptability. These skills are valuable in IT, especially when working with non-
technical colleagues.

7. Mentorship:

• Seek out mentors who can provide guidance and share their experiences.
Mentorship can help you navigate your career and make informed decisions.

8. Leadership Development:

• Consider taking on leadership roles or projects to develop your leadership skills


and demonstrate your ability to lead technical teams.

9. Ethical Conduct:

• Uphold ethical standards, especially in areas like cybersecurity and data privacy.
Integrity and trustworthiness are crucial in IT.

10. Contribute to the Community:

• Share your knowledge by writing blog posts, articles, or creating tutorials.


Participate in discussions and forums to help others in the IT community.

11. Continuous Self-Assessment:

• Regularly assess your career goals and skill gaps. Create a professional
development plan based on your assessments and adjust it as needed.

12. Adaptability:

• Embrace change and stay adaptable to evolving technologies and methodologies.


The ability to quickly learn and adapt is a valuable asset in IT.
(d)

1. Technical Proficiency: A strong foundation of technical knowledge and skills is


fundamental. You should be competent in the technologies and tools relevant to your
specific role, whether it's programming languages, networking protocols, hardware
components, or software applications.

2. Problem-Solving Skills: Computer professionals often encounter complex technical


challenges. The ability to analyze problems, break them down into manageable parts, and
develop effective solutions is crucial.

3. Adaptability: The tech industry evolves rapidly. Being open to change, embracing new
technologies, and quickly adapting to emerging trends and tools are essential qualities.

4. Continuous Learning: A commitment to lifelong learning is vital in the ever-changing IT


field. Stay updated with the latest technologies, attend training, and pursue certifications to
enhance your skills.

5. Attention to Detail: Precision is essential in coding, system configuration, and


troubleshooting. A keen eye for detail can help you identify and fix issues efficiently.

6. Communication Skills: Effective communication is crucial, both when explaining


technical concepts to non-technical stakeholders and when collaborating with peers and
team members. Good computer professionals can convey complex ideas clearly.

7. Teamwork: Many IT projects are collaborative efforts. Being a team player, cooperating
with colleagues, and contributing positively to group dynamics are valuable qualities.

8. Time Management: Computer professionals often work on multiple tasks simultaneously.


Effective time management and the ability to prioritize tasks can help meet deadlines and
maintain productivity.

9. Problem Ownership: Taking responsibility for issues and seeing them through to
resolution is important. Avoiding blame-shifting and working diligently to solve problems
demonstrate professionalism.

10. Creativity: Creativity is valuable for finding innovative solutions to complex problems
and for designing user-friendly software interfaces or efficient network architectures.
11. Ethical Conduct: Upholding ethical standards is essential, particularly when handling
sensitive data and information security. Maintaining trust and integrity is crucial in the IT
profession.

12. Cybersecurity Awareness: Understanding and implementing security best practices to


protect systems and data is increasingly important in the age of cyber threats and data
breaches.

13. Patience: Troubleshooting technical issues can be frustrating and time-consuming.


Patience is necessary when dealing with challenging problems and when assisting non-
technical users.

14. Leadership and Initiative: Demonstrating leadership skills and taking initiative in your
work can lead to career advancement and opportunities to lead IT projects or teams.

15. Empathy: Understanding the needs and concerns of end-users and colleagues can lead to
better problem-solving and improved user experiences.

16. Curiosity: A natural curiosity about technology and a desire to explore and experiment
can drive your professional growth.

17. Critical Thinking: The ability to evaluate information critically, make informed decisions,
and assess the potential impact of your choices is a valuable quality.

18. Resilience: The IT field can be demanding, with long hours and high-pressure situations.
Developing resilience to handle stress and bounce back from setbacks is important.
QUESTION TWO

(a)

Computer crime, often referred to as cybercrime, is a category of criminal activity that involves
the use of computers, networks, and digital technology to commit unlawful acts. Cybercriminals
exploit vulnerabilities in computer systems and the internet to carry out various illegal activities.
Here are some common types of computer crimes:

1. Hacking: Unauthorized access to computer systems or networks with the intent to steal
data, disrupt operations, or commit other malicious actions. Hackers may exploit security
weaknesses to gain access.

2. Malware: The distribution and use of malicious software (malware) such as viruses,
worms, Trojans, and ransomware. Malware can infect computers and compromise data,
systems, or networks.

3. Phishing: Cybercriminals impersonate legitimate entities (such as banks or government


agencies) to trick individuals into revealing sensitive information like passwords, credit
card numbers, or personal data.

4. Identity Theft: Stealing personal information, such as Social Security numbers or credit
card details, to commit fraud, make unauthorized transactions, or open financial accounts
in someone else's name.

5. Distributed Denial of Service (DDoS) Attacks: Overwhelming a target website or


network with traffic from multiple sources, causing it to become unavailable to users.
DDoS attacks are often used for extortion or to disrupt services.

6. Cyberbullying: Using digital communication platforms to harass, threaten, or intimidate


individuals or groups, often via social media or email.

7. Data Breaches: Unauthorized access to and theft of sensitive data, such as customer
records, credit card information, or proprietary company data. The stolen data is often sold
or used for financial gain.

8. Online Scams: Deceptive schemes conducted on the internet to defraud victims. This
includes investment fraud, online auction fraud, and romance scams, among others.
9. Ransomware: Malicious software that encrypts a victim's data, making it inaccessible
until a ransom is paid. Paying the ransom is discouraged, as it does not guarantee the
recovery of data and encourages further criminal activity.

10. Child Exploitation: The creation, distribution, or possession of explicit materials


involving minors. This is a severe and illegal form of cybercrime.

11. Cyber Espionage: State-sponsored or corporate-sponsored hacking to steal sensitive


information, intellectual property, or trade secrets for economic or political gain.

12. Insider Threats: Employees or individuals with privileged access to an organization's


systems or data misuse their access for personal gain or to harm the organization.

13. Cyber Stalking: Using digital means to track, harass, or intimidate someone, often over
an extended period. Cyber stalking can escalate to physical threats.

(b)

1. Parental Control Software:

• Install parental control software or apps on devices that minors use, including
computers, smartphones, and tablets. These tools allow you to filter and block
inappropriate content and websites.

2. SafeSearch Filters:

• Enable SafeSearch filters on popular search engines like Google, Bing, and Yahoo.
This feature filters out explicit content from search results.

3. Child-Friendly Search Engines:

• Encourage the use of child-friendly search engines like Kiddle, KidRex, or Safe
Search Kids, which are designed to provide age-appropriate search results.

4. Parental Control Routers:

• Some routers offer built-in parental control features that allow you to filter content
and set time limits on internet access for specific devices.
5. Use Parental Controls on Streaming Services:

• Many streaming services offer parental control settings that allow you to restrict
access to age-appropriate content.

6. Educate and Communicate:

• Talk to your children about the potential dangers of inappropriate content on the
internet. Encourage open and honest communication, so they feel comfortable
discussing any concerns with you.

7. Create Safe Online Environments:

• Encourage the use of age-appropriate websites, apps, and online communities that
are designed for children. Many educational and entertainment platforms offer
content tailored to specific age groups.

8. Supervision:

• Whenever possible, supervise your child's internet usage. Keep computers and
devices in common areas of the home, where you can monitor their online activities.

9. Set Screen Time Limits:

• Establish rules for screen time and enforce them consistently. Limit the amount of
time children spend online, especially on entertainment platforms.

10. Password Protection:

• Use strong and unique passwords for devices and accounts to prevent unauthorized
access to age-restricted content.

11. Check Browser History:

• Periodically review the browsing history on devices to ensure your child is not
accessing inappropriate content.
(c)

1. Use Spam Filters:

• Enable and regularly update spam filters provided by your email service provider.
Most email platforms offer built-in spam filtering, which can automatically move
suspected spam emails to a separate folder.

2. Report Spam:

• When you receive spam emails, report them as spam within your email client. This
helps train the spam filter to recognize similar messages in the future.

3. Avoid Publicly Displaying Your Email Address:

• Be cautious about sharing your email address in public online spaces like forums
or social media. Spammers often harvest email addresses from websites.

4. Use Disposable Email Addresses:

• When signing up for online services or making online purchases, consider using
disposable email addresses. These can help you keep your primary email address
free from spam.

5. Educate Yourself:

• Learn to recognize common spam characteristics, such as suspicious sender


addresses, subject lines, or generic greetings. Be wary of emails that ask for
personal information or financial details.

6. Use Strong Passwords:

• Secure your email accounts with strong, unique passwords to prevent unauthorized
access. Use two-factor authentication (2FA) for an additional layer of security.

7. Avoid Unsubscribe Links:


• Be cautious about clicking on unsubscribe links in suspicious emails, as this can
confirm your email address to spammers. Only use unsubscribe links in emails from
trusted sources.

8. Check Sender Authenticity:

• Verify the authenticity of email senders, especially if you receive unexpected


messages. Check for email header information and domain authenticity to ensure
the email is legitimate.

9. Don't Forward Chain Emails:

• Avoid forwarding chain emails, as these often contain false information and can
contribute to the spread of spam.

10. Filter Attachments:

• Configure your email client to block or filter attachments with certain file
extensions, as malicious attachments are a common delivery method for malware.

11. Implement Sender Policy Framework (SPF):

• SPF is an email authentication protocol that helps prevent email spoofing by


verifying the sender's domain. Configure SPF records for your domain to prevent
spammers from using your domain for phishing.

12. Use Domain-Based Message Authentication, Reporting, and Conformance


(DMARC):

• DMARC helps prevent domain spoofing by providing a way for email receivers to
check that incoming messages from a domain are legitimate. Implement DMARC
policies for your domain.

13. Regularly Update Your Email Client:

• Keep your email client, operating system, and antivirus software up-to-date to
ensure they have the latest security features and patches
(d)

An ethical dilemma in IT, as in any profession, refers to a situation in which an individual or group
of professionals faces a complex and challenging decision that involves conflicting moral
principles, values, or obligations. These dilemmas often require individuals to make difficult
choices between two or more competing ethical considerations, and the resolution may not have a
clear-cut, straightforward answer. Here are a few examples of ethical dilemmas in IT:

1. Data Privacy vs. Security:

• An IT professional might face a situation where enhancing cybersecurity measures


could potentially compromise user data privacy. For instance, implementing
extensive monitoring or data collection to detect security threats might infringe on
users' privacy rights. Balancing the need for security with the obligation to protect
user privacy presents an ethical dilemma.

2. Whistleblowing and Reporting Security Breaches:

• An IT employee who discovers a security breach within their organization faces a


dilemma. Should they immediately report the breach to the appropriate authorities,
which might lead to negative consequences for the company, or should they first
inform their superiors internally, giving the company a chance to resolve the issue
internally? This dilemma involves concerns about corporate loyalty and public
interest.

3. Software Development and Quality vs. Deadlines:

• Developers often face pressure to meet tight project deadlines. In such cases, they
might be tempted to compromise on software quality, which could lead to security
vulnerabilities or subpar performance. Deciding whether to prioritize quality over
meeting deadlines can create an ethical conflict.

4. Artificial Intelligence Bias:

• Building AI systems that learn from data can inadvertently perpetuate biases
present in the training data. IT professionals working on AI projects may face
dilemmas related to addressing bias and ensuring fairness while still achieving
performance goals.
5. Vendor Relationships and Conflict of Interest:

• IT professionals responsible for selecting technology vendors for their


organizations may face ethical dilemmas related to potential conflicts of interest.
For example, if a decision-maker has a personal relationship with a vendor, they
may need to choose between the vendor with the best product and one with whom
they have a personal connection.

6. Intellectual Property and Open Source:

• Developers and organizations often have to make choices about whether to use
open-source software, which is freely available but may have licensing and
intellectual property implications, or proprietary solutions. This decision involves
ethical considerations about respecting intellectual property rights and supporting
open-source communities.

7. Censorship and Content Moderation:

• Platforms and social media companies must make decisions about content
moderation and censorship. Balancing the right to free speech with the need to
prevent harmful or illegal content from spreading presents a significant ethical
challenge in IT.

8. Environmental Impact of Technology:

• Designing energy-efficient data centers, reducing electronic waste, and minimizing


the carbon footprint of technology products raise ethical questions about the
environmental impact of IT decisions.

(e)

In a situation like this, where I believe that a computer-controlled crash avoidance system for
automobiles has a serious flaw that could potentially endanger people, I would prioritize the safety
and well-being of individuals over project timelines or managerial expectations. Here's how I
would approach this ethical dilemma:

1. Gather Information: Before taking any action, I would thoroughly investigate and gather
as much data and evidence as possible to support my belief that there is a safety flaw in the
system. This might involve conducting tests, reviewing system logs, and consulting with
colleagues who share my concerns.

2. Discuss Concerns Internally: I would initiate a conversation with my team members and
project manager to discuss my concerns openly and professionally. It's possible that others
may have similar concerns or insights into the issue.

3. Document Concerns: To ensure a clear record of my concerns, I would document the


flaw, including its nature, potential consequences, and any supporting evidence. This
documentation would be essential for any future discussions or actions.

4. Consult with Experts: If the issue is complex and requires technical expertise beyond my
own, I would seek guidance from experts in the field, whether they are colleagues, mentors,
or external professionals. Their insights could help validate or clarify the issue.

5. Raise the Issue Up the Chain: If discussing the concern with my project manager does
not result in a satisfactory resolution and I genuinely believe that the flaw poses a safety
risk, I would escalate the matter to higher-level management or the appropriate authorities
within the organization. This might involve presenting the documented evidence and
explaining the potential consequences.

6. Consider Legal and Ethical Obligations: Depending on the nature and severity of the
flaw, it may be necessary to consider legal and ethical obligations. This could involve
reporting the issue to relevant regulatory agencies or authorities if it poses a significant risk
to public safety.

7. Whistleblower Protections: If the internal discussions and escalations do not lead to


corrective actions, I would familiarize myself with whistleblower protections and policies
that may exist within the organization or under the law. These protections are in place to
encourage individuals to report concerns without fear of retaliation.

8. Seek External Guidance: If the situation remains unresolved or if I face retaliation for
raising concerns, I may consider seeking guidance from external organizations, legal
experts, or whistleblowing hotlines to ensure that safety concerns are addressed
appropriately.
KYAMBOGO UNIVERSITY
SCHOOL OF COMPUTING AND INFORMATION
SYSTEMS

DEPARTMENT OF COMPUTER SCINCE

BACHELOR OF INFORMATION SYSTEMS -(BIS)


COURSE UNIT: SIS3202 SOCIAL ISSUES IN COMPUTING

LECTURER: Mr. SEGUYA RONALD

TASK: GROUP COURSEWORK

YEAR: THREE

SEMESTER: TWO

GROUP MEMBERS
NAME REG. NUMBER
BIRIJA SONIA PRISCILLA 20/U/ISD/9578/PD
KAUKI SULAIMAN 20/U/ISD/9617/PD
MOGA FALANANSI 20/U/ISD/9679/PD
SANYWA JOHN 20/U/ISD/9687/PD
LUTAAYA JAMIL 20/U/ISD/9608/PD
QUESTIONS 3
What are intellectual Property Rights?

Identify and briefly describe any four intangible intellectual rights which are contained in the
intellectual Property Rights.
With examples distinguish between personal and Non-personal data

Distinguish between a hacker and a cracker and suggest the common intentions of hacking
Suggest the precaution you need to take when setting up a firewall as a security measure.

QUESTION 4

Association for computing machinery (ASM) consists of 24 imperatives formulated as


statements of personal responsibility. Identify the ones categorized under general moral
imperatives and explain how each applies to the professional conduct of an IT professional.
Why would it be inappropriate to consider a code of professional ethics to an exhaustive ethical
check-list?
What do you understand by the term digital divide?
The digital divide is a various that brings many setbacks with it – economic, social, political and
psychological backwardness. Discuss.
In general, suggest what is not being done correctly in bridging Digital Divide and what steps
can be taken towards changing/influencing the situation.
SOLUTIONS
QUESTION 3

(a) What are intellectual property rights?


Intellectual property rights (IPRs) are a set of legal rights that give creators of original works
control over their creations. These rights are designed to encourage innovation and creativity by
providing creators and inventors with exclusive rights and control over their intellectual assets
for a specified period of time. Intellectual property rights cover various forms of creative and
intellectual works.
(b) Identify and briefly describe any four intangible intellectual rights which are contained
in the intellectual property rights.

Four intangible intellectual rights which are contained in the intellectual property rights are:
Copyright: This protects original literary, artistic, and musical works, as well as software, from
being copied, distributed, or performed without the creator's permission. Copyright typically
lasts for the lifetime of the creator plus 50-70 years.
Trademark: These are used to protect distinctive symbols, names, and logos that identify and
distinguish goods and services of one entity from another. Trademarks can be renewed
indefinitely as long as they are in use.

Patent: Patents grant inventors exclusive rights to their inventions for a set period (usually 20
years). This exclusivity allows inventors to control how their inventions are used, manufactured,
and sold.
Trade secret: Trade secrets encompass confidential business information, such as
manufacturing processes, formulas, and customer lists. These are protected as long as they
remain confidential.
Industrial Design Rights: These protect the visual design or aesthetic aspects of an object, such
as the shape, color, or surface ornamentation of a product.

(c) With examples distinguish between personal and Non-personal data.


Personal data is any information that can be used to identify an individual, such as their name,
address, date of birth, and Social Security number. Examples of personal data: Name, Address,
Date of birth, Social Security number, Phone number, Email address

Non-personal data is any information that cannot be used to identify an individual, such as the
number of visitors to a website or the average age of customers in a store. Examples of non-
personal data: The number of visitors to a website, The average age of customers in a store, The
most popular products purchased by customers, The most common search terms used on a
website.

SO, if a company collects information on the number of visitors to its website and the pages they
visit without collecting any personally identifiable information, it's dealing with non-personal
data. However, if the company also collects users' names or email addresses, that would be
considered personal data.
(d) Distinguish between a hacker and a cracker and suggest the common intentions of
hacking.
A hacker is a person who uses their programming and technical skills to gain unauthorized
access to computer systems or networks, often with the intention of identifying vulnerabilities
and improving security. Hackers can be ethical (white hat), malicious (black hat), or fall
somewhere in between (grey hat).

A cracker on the other hand, is typically associated with malicious intent. Crackers use their
skills to break into computer systems, networks, or software for illegal purposes, such as stealing
data, spreading malware, or disrupting services.

Common intentions of hacking include:


Stealing data: Hackers may steal personal data, such as credit card numbers and Social Security
numbers, or corporate data, such as trade secrets and customer lists.

Disrupting operations: Hackers may disrupt the operations of computer systems and networks by
launching denial-of-service attacks or installing malware.
Espionage: Hackers may hack into computer systems and networks to gather intelligence on
individuals or organizations.
Vandalism: Hackers may vandalize computer systems and networks by changing websites,
deleting files, or installing malicious software.

Personal Vendettas: In some cases, hackers may have personal grudges or vendettas against
individuals or organizations. Their motivations could include revenge, embarrassment, or
causing harm to their targets.
Botnet Creation and Control: Hackers may create and control networks of compromised
computers, known as botnets, for various purposes. Botnets can be used to launch distributed
denial-of-service (DDoS) attacks, spread malware, or engage in other malicious activities.
Exploration and Learning (Ethical Hacking): Ethical hackers, also known as white hat hackers,
hack with the intention of identifying security vulnerabilities and weaknesses in systems,
networks, or software. Their goal is to improve security and help organizations protect against
malicious attacks.

(e) Suggest the precaution you need to take when setting up a firewall as a security
measure.
Here are some precautions you can take when setting up a firewall as a security measure:

Choose the right firewall: There are many different types of firewalls available, so choose one
that is appropriate for your needs. Consider the size and complexity of your network, as well as
the types of threats you want to protect against.

Configure the firewall correctly: Make sure that the firewall is configured to block all
incoming traffic that you do not need or want. This includes creating rules to allow only specific
types of traffic, such as web browsing and email.
Keep the firewall up to date: Firewalls are regularly updated to protect against new threats, so
make sure to install the latest updates as soon as they are available.

Monitor the firewall: Monitor the firewall logs to identify any suspicious activity. This can help
you to quickly detect and respond to attacks.
Use strong passwords: Use strong passwords for your firewall and enable two-factor
authentication if possible. This will help to prevent unauthorized access to your firewall.

Create separate firewall rules for different types of traffic: This will help you to better
control the flow of traffic through your network and make it more difficult for attackers to gain
access to sensitive data.

Disable unused ports and services: This will reduce the number of potential attack vectors that
attackers can exploit.
Use a firewall that supports intrusion detection and prevention (IDS/IPS): IDS/IPS systems
can help to detect and block malicious traffic before it reaches your network.

Keep your firewall software up to date: Firewall software is regularly updated to protect
against new threats, so make sure to install the latest updates as soon as they are available.
Physically secure your firewall: Place your firewall in a secure location and make sure that
only authorized personnel have access to it.
SOLUTIONS
QUESTION 4

(a) Association for computing machinery (ACM) consists of 24 imperatives formulated as


statements of personal responsibility. Identify the ones categorized under general moral
imperatives and explain how each applies to the professional conduct of an IT professional.

The following are the General Moral Imperatives of the ACM Code of Ethics and Professional
Conduct:
Contribute to society and to human well-being, acknowledging that all people are
stakeholders in computing and its artifacts.

This imperative applies to IT professionals by requiring them to consider the ethical implications
of their work and to use their skills to benefit society. For example, IT professionals should avoid
developing technologies that could be used to harm people or to violate their privacy. They
should also work to ensure that everyone has access to the benefits of computing.

Avoid harm to others.


This imperative applies to IT professionals by requiring them to be careful not to cause harm to
others through their work. For example, IT professionals should avoid developing software that
could contain security vulnerabilities or that could be used to deceive people. They should also
be careful not to collect or use personal data in ways that could harm people.

Be honest and trustworthy.


This imperative applies to IT professionals by requiring them to be truthful in their dealings with
others. For example, IT professionals should avoid making false claims about their skills or
experience. They should also be honest about the limitations of their products and services.
Be fair and take action not to discriminate unfairly.
This imperative applies to IT professionals by requiring them to treat everyone fairly, regardless
of their race, gender, religion, or any other factor. For example, IT professionals should avoid
developing technologies that could be used to discriminate against certain groups of people.
They should also be fair in their hiring and promotion practices.
Honor intellectual property rights and give proper credit.

This imperative applies to IT professionals by requiring them to respect the intellectual property
rights of others. For example, IT professionals should avoid plagiarizing the work of others.
They should also give proper credit to the developers of technologies that they use.
How each of these imperatives applies to the professional conduct of an IT professional:
Contribute to society and to human well-being: IT professionals can contribute to society and
to human well-being by developing technologies that solve real-world problems and that make
people's lives better. They can also do this by volunteering their time and skills to help non-profit
organizations.

Avoid harm to others: IT professionals can avoid harm to others by being careful not to develop
technologies that could be used to harm people or to violate their privacy. They should also be
careful not to collect or use personal data in ways that could harm people.

Be honest and trustworthy: IT professionals can be honest and trustworthy by being truthful in
their dealings with others and by being honest about the limitations of their products and
services.
Be fair and take action not to discriminate unfairly: IT professionals can be fair and take
action not to discriminate unfairly by treating everyone fairly, regardless of their race, gender,
religion, or any other factor. They should also avoid developing technologies that could be used
to discriminate against certain groups of people.
Honor intellectual property rights and give proper credit: IT professionals can honor
intellectual property rights and give proper credit by respecting the intellectual property rights of
others and by giving proper credit to the developers of technologies that they use.

(b) Why would it be inappropriate to consider a code of professional ethics to an exhaustive


ethical check-list?
It would be inappropriate to consider a code of professional ethics as an exhaustive ethical
checklist for several reasons:
Complexity of Ethical Dilemmas: Ethical dilemmas in the IT field can be highly complex and
context-specific. A code of ethics provides general principles, but it may not cover every
possible situation an IT professional encounters.

Rapid Technological Change: Technology evolves quickly, leading to new ethical challenges.
A static code of ethics may become outdated as technology advances, making it necessary for
professionals to adapt and apply ethical reasoning to novel situations.
Cultural and Legal Differences: Ethics can vary across cultures and legal jurisdictions. What is
considered ethical in one context may not be in another. A code of ethics cannot account for all
cultural and legal variations.

Individual Judgment: Ethical decision-making often requires personal judgment and


consideration of unique circumstances. A checklist may oversimplify complex ethical decisions.
Professional Discretion: IT professionals must exercise professional discretion and critical
thinking to navigate ethical issues effectively. Relying solely on a checklist may discourage
critical thinking and personal responsibility.
(c) What do you understand by the term digital divide?

The digital divide is the gap between those who have access to and can use information and
communication technologies (ICTs) and those who cannot. The digital divide can be caused by a
variety of factors, such as income, education, and location.

(d) The digital divide is a various that brings many setbacks with it – economic, social,
political and psychological backwardness. Discuss.
The digital divide can have a number of negative consequences, including economic, social,
political, and psychological setbacks.

Economic Backwardness:
Limited Job Opportunities: Individuals without access to digital tools and the internet may miss
out on employment opportunities in sectors that increasingly require digital skills.

Reduced Entrepreneurship: The digital divide can hinder entrepreneurship and innovation, as
those without access may struggle to launch online businesses or startups.
Income Inequality: Unequal access to digital resources can exacerbate income inequality, as
those with digital access have a greater chance of accessing higher-paying jobs and economic
opportunities.
Social Disparities:
Isolation and Exclusion: Lack of digital access can lead to social isolation, with individuals
missing out on online social networks and communication tools, potentially leading to feelings of
exclusion.
Educational Gaps: Students without access may face educational setbacks, as online learning
becomes increasingly common. This can perpetuate educational inequalities.

Political Disempowerment:
Limited Civic Participation: Those without digital access may have restricted ability to engage in
the political process, access government services, or participate in civic activities.

Digital Divides in Information: Differences in digital access can lead to disparities in access to
news and information, affecting citizens' ability to make informed decisions.
Psychological Impact:

Low Self-Esteem: The digital divide can lead to feelings of inadequacy and low self-esteem
among those who are excluded from the benefits of digital technologies.
Frustration and Stress: Individuals unable to access digital resources may experience frustration
and stress when facing challenges or limitations in their daily lives.

e) In general, suggest what is not being done correctly in bridging Digital Divide and what steps can be
taken towards changing/influencing the situation.

1. Insufficient Infrastructure Investment:


Challenge: Inadequate investment in digital infrastructure, especially in remote or underserved
areas, leaves many without access.

Solution: Increase funding for the expansion of broadband networks, focusing on regions with
limited connectivity. Encourage private sector participation through incentives and subsidies.
2. High Internet Costs:

Challenge: The cost of internet access can be prohibitively high for low-income individuals and
families.
Solution: Subsidize internet costs for low-income households, provide discounted plans, and
regulate pricing to ensure affordability.
3. Lack of Digital Literacy:

Challenge: Many people lack the digital skills needed to use technology effectively.
Solution: Implement comprehensive digital literacy programs that teach basic computer skills,
online safety, and how to navigate digital resources. These programs should target various age
groups and skill levels.

4. Content Relevance and Language Barriers:


Challenge: Digital content and services may not always be culturally or linguistically relevant to
specific communities.

Solution: Promote the creation of local and culturally relevant content and applications.
Translate and adapt digital resources to cater to diverse linguistic and cultural backgrounds.
5. Unequal Access in Education:

Challenge: Disparities in access to digital tools and internet connectivity can hinder educational
opportunities.
Solution: Equip schools in underserved areas with the necessary technology infrastructure,
including devices and reliable internet connections. Train teachers in integrating technology into
their teaching methods.
6. Lack of Accessibility for Persons with Disabilities:
Challenge: Digital technologies often do not cater to the needs of individuals with disabilities.
Solution: Enforce accessibility standards and regulations to ensure that digital platforms and
content are usable by individuals with disabilities. Promote the development of assistive
technologies.
7. Limited Public-Private Collaboration:

Challenge: Effective collaboration between governments, private industry, and non-profit


organizations is often lacking.
Solution: Encourage public-private partnerships to pool resources and expertise. Governments
can provide incentives for private companies to invest in digital inclusion initiatives.

8. Complex Policies and Regulations:


Challenge: Complex or unclear policies and regulations can hinder efforts to bridge the digital
divide.

Solution: Streamline and clarify policies related to digital access, net neutrality, and fair
competition. Ensure that regulations prioritize equitable access and competition.
9. Insufficient Advocacy and Awareness:

Challenge: Many people may not be aware of the importance of digital inclusion, and advocacy
efforts may be limited.
Solution: Launch awareness campaigns to highlight the social and economic benefits of digital
inclusion. Engage with communities, stakeholders, and policymakers to drive advocacy efforts.

10. Inadequate Data and Monitoring:


Challenge: Lack of comprehensive data and monitoring mechanisms can make it challenging to
assess the true extent of the digital divide.
Solution: Invest in data collection and research to continuously assess the state of the digital
divide and measure progress accurately. Use data-driven insights to adjust strategies and allocate
resources effectively.

11. Limited Integration in Education:


Challenge: Digital literacy and technology education may not be integrated effectively into
curricula.

Solution: Collaborate with educational institutions to integrate digital literacy and technology
education seamlessly into existing curricula. Ensure that educators receive training and resources
to facilitate this integration.
REFERENCES
Murray, James (2011-12-18). "Cloud network architecture and ICT - Modern Network
Architecture". TechTarget =ITKnowledgeExchange.

• Howard, P. N., & Dutton, W. H. (2012). The wired society: Social science research on the
information highway. Cambridge, MA: MIT Press.
• National Academies of Sciences, Engineering, and Medicine. (2016). Expanding access to
information and communication technologies (ICTs) in developing countries:
DEPARTMENT OF COMPUTER SCIENCE
SCHOOL OF COMPUTING AND INFORMATION SCIENCE
SOCIAL ISSUES IN COMPUTING SIS3202
GROUP THREE

BAGUMA OSCAR 20/U/ISD/9691/PD


LUSWATA CHARLES 20/U/ISD/9638/PD
KIYINGI SAMUEL 20/U/ISD/9653/PD
MPUNGU WILLIAM ANDREW 20/U/ISD/9601/PD
OKWAJJA JONATHAN 20/U/ISD/9628/PD
HENRY KIGOZI ABDALLA 20/U/ISD/9584/PD
OKELLO JOEL 20/U/ISD/16819/PD
KISAKYE BRENDAH PROSPER 20/U/ISD/9596/PD
SSERUNKUMA STEPHEN 20/U/ISD/9605/PD
QUESTION FIVE:
Why must computer security include concern about trusted
personnel within a company or organization?
• Insider threats: Trusted personnel, such as employees and contractors,
have access to sensitive systems, data and resources. If they decide to
misuse this access, they can pose a significant security threat. Insider
threats can be intentional(malicious) or unintentional(accidental), but
both can have detrimental consequences.
• Data theft. Employees and other trusted personnel are well positioned
to steal sensitive data, such as customer information, trade secrets, or
propriety research. They may have knowledge of data locations,
encryption keys, and other security measures that can aid in unauthorized
data access and theft.
CONT’D
• Sabotage: Disgruntled employees or those with malicious intent can
engage in acts of sabotage. This may involve deleting or altering critical
data, disrupting systems or services or introducing malware or
vulnerabilities into the organization’s infrastructure.
• Social Engineering. Insider threats can also involve social engineering
tactics, where trusted personal are manipulated into providing access or
sensitive information to malicious actors. This is a common method used
by attackers to gain unauthorized access.
CONT’D
• Privilege Abuse. Trusted personnel often have elevated privileges and
access rights to perform their job responsibilities. If these privileges are
abused, they can lead to unauthorized access to systems and data as if
they were legitimate user.
• Credential theft. Even trusted personnel are typically subject to less
scrutiny than external threats. This lack of suspicion can make it easier
for them to engage in malicious activities without being detected.
• Compliance and legal requirements. Many industries and jurisdictions
require to have safeguards in place against insider threats. Neglecting to
address this aspect of security can lead to non-compliance with
regulations and legal consequences.
CONT’D
• Reputation and Trust: Security incidents involving trusted personnel
can have severe impact on an organization’s reputation and
trustworthiness. Customers, partners and stakeholders may lose
confidence in the organization’s ability to protect sensitive information.
B)Why should computer security be called “ a double-edged
sword”?
Computer technology is often referred to as a double-edged sword,
because it has both positive and negative aspects, and its impact on society
and individual can be both beneficial and detrimental. Here’s why this
metaphor is apt;
CONT’D
• 1. Positive Side
• Efficiency and Productivity: Computers have revolutionized industries,
making tasks faster and more efficient. They enable automation, data
processing, and complex calculations, leading to increased productivity in
various fields.
• Communication. Computer technology facilitates global
communication through the internet and email, connecting people across
distances and improving information sharing.
• Access to information. The internet provides access to vast amounts of
information, enhancing education, research and knowledge sharing.
CONT’D
• Medical Advancements; Computers are vital in medical research,
diagnostics and treatment, leading to improved healthcare outcomes.
• Privacy concerns. The digital age has raised significant privacy issues.
Data breaches, cyberattacks, and surveillance threaten individual’s privacy
and security.
• 2.Negative Side:
• Job Displacement. Automation and artificial intelligence can lead to job
displacement and economic inequality as certain tasks become
automated.
CONT’D
• Addiction and Mental health. Excessive use of technology, especially
in the form of smartphones and social media has been linked to
addiction and negative mental health.
• Ethical Dilemmas: The development of advanced technologies, such as
AI and facial recognition raises ethical dilemmas related to surveillance ,
bias and autonomy.
• Dependence and Vulnerability: Society has become increasingly
dependent on computer technology which can make us vulnerable to
disruptions like cyberattacks, power outages or system failures.
CONT’D
• Environmental Impact: The production and disposal of electronic devices
contribute to electronic waste and environmental degradation.
• Digital Divide. Not everyone has equal access to computer technology and the
internet, resulting in a digital divide that can exacerbate societal inequalities.
• C) What is the meaning of a hacker?
The term “hacker” has two different meanings. The “old fashioned” positive meaning
refers to a person who is a “computer whiz”, someone who can push computer
technology to its outer limits to achieve very good or helpful results.
The negative meaning is the most common meaning, also referred to as a cracker. This
is associated with individuals who engage in unauthorized or malicious activities related
to computer systems and networks. These individuals use their technical skills to gain
unauthorized access to computers, networks, and data with the intent of causing harm,
stealing information or committing various forms of cybercrimes.
CONT’D
D) Why is every successful “break in” to a computer systems – even one
that changes nothing within the system – harmful?
Security breach: The very act of breaking into a computer systems signifies a
security breach. Unauthorized access to a system is a violation of trust and
confidentiality. Even if the intruder doesn’t make immediate changes, they may
have obtained sensitive data or established a foothold for future attacks.
Data Exposure: Intruders can access, steal or manipulate data without
necessary altering it. Data breaches can lead to the exposure of sensitive
information, such as personal data, financial records or intellectual property.
This can result in identity theft, financial loss or reputational damage.
CONT’D
• Persistence: Intruders often aim to remain undetected in a system for as long
as possible. Even if they don’t make changes immediately, they might be
hiding their time to launch more significant attacks, gather intelligence or
maintain unauthorized access.
• Vulnerability Exploration: Successful intrusions can be used can be used as
stepping stones to exploit vulnerabilities, in other systems. Attackers may pivot
from one compromised system to another, potentially causing more significant
damage or carrying out attacks on external targets.
• Trust Erosion: When a system is breached, it erodes trust in the security and
integrity of the system. Users, customers and stakeholders may lose
confidence in the organization’s ability to protect their data, leading to
reputational damage and potential consequences.
CONT’D
• Resource Drain: Responding to security incident, even if they don’t seem
immediately harmful, requires resources. Organizations must invest time and
effort in investigating, mitigating, and recovering from breaches. This diverts
resources from other critical tasks.
• Legal and Regulatory Consequences: Many jurisdictions have laws and
regulations regarding data protection and breach notification. Even if no harm
is done, failing to report a security breach can lead to legal consequences and
fines.
• Insider Threats: Not all security breaches are the work of external hackers.
Insider threats, where employees or individuals with authorized access misuse
their privileges, can also lead to seemingly harmless intrusions. These can be
just as damaging, if not more so, due to the insider’s knowledge and access.
CONT’D
E) Even though codes of professional ethics are not laws, they nevertheless
have some enforcement power. Explain why.
Peer pressure and reputation: Professional communities often place a strong
emphasis on maintaining a positive reputation and upholding ethical standards.
Members who violate the code of ethics may face backlash from their peers, which
can harm their professional standing and career prospects. This peer pressure can
serve as a powerful deterrent against unethical behavior.
Self- regulation: Many professionals are granted a degree of autonomy and self-
regulation by governments and regulatory bodies. In return for this autonomy,
professionals are expected to establish and enforce their own ethical standards.
Failure to do so can result in increased government regulation or oversight, which
professionals generally prefer to avoid.
CONT’D
• Membership associations and licensing bodies: Most professionals
have membership associations or licensing bodies that are responsible for
setting and enforcing ethical standards. These organizations can take a
range of actions against members who violate the code of ethics,
including warnings, fines, suspension or revocation of professional
licenses or membership.
• Legal consequences: While the code of ethics itself is not a law,
violating it can sometimes lead to legal consequences. For example, if an
accountant breaches their professional code of ethics by committing
fraud, they may face legal action and potential criminal charges. Legal
consequences can act as a powerful enforcement mechanism.
CONT’D
• Civil Liability; Professionals who breach their ethical obligations may
also be exposed to civil liability. Clients, patients, or customers who suffer
harm as a result of unethical behavior may file lawsuits against the
professional, seeking damages for their losses.
• Ethical training and education: Many professionals require ongoing
education and training to stay current with ethical guidelines and best
practices. Failure to adhere to these standards can result in a loss of
professional competence, making it more difficult for individuals to
maintain their careers.
CONT’D
• Whistleblower protections: In some cases, individuals who witness
unethical behavior within professional may be protected by
whistleblower laws or policies that encourage reporting of such behavior.
This can lead to investigations and disciplinary actions against the
offending professional
QUESTION SIX
In your view, how did information technology bring about
a crisis for intellectual property?
Ease of Reproduction: Digital technology makes it extremely
easy to reproduce and distribute intellectual property such as
music, movies, software and written content without the need
for physical copies. This has led to wide spread piracy and
unauthorized sharing, which can result in significant financial
losses for creators and right holders.
CONT’D
• Digital piracy: The internet has facilitated the rapid spread of pirated
content through file sharing platforms without permission, torrent
websites and streaming services that host copyrighted material without
permission. This undermines the ability of content creators to control
and profit from their work.
• Challenges in enforcement: Policing intellectual property violations in
the digital realm can be challenging. Jurisdictional issues, anonymizing
technologies and encryption make it difficult to track down and
prosecute digital pirates.
CONT’D
• Fair use and Remix Culture: The digital age has given rise to a culture
of remixing and repurposing existing content, often blurring the lines
between fair use and copyright infringement. Determining what
constitutes fair use in the digital area can be a complex legal issue.
B) Evaluate some of the important intellectual property issues being
presented by ICT.
Copyright infringement: The unauthorized reproduction and
distribution of copyrighted material, including software, music, and written
content is a significant issue. Digital platforms, social media and file
sharing networks facilitate copyright infringement on a global scale.
CONT’D
• Patent Trolling. Companies or individuals that acquire patents not for
innovation but to engage in litigation and extract licensing fees from
others can stifle innovation and hinder technological progress.
• Digital Rights Management: The use of DRM technologies can restrict
user’s ability to access, copy and share digital content they have legally
purchased. This raises questions about the balance protecting IP rights
and users.
• Privacy and Data Ownership: The collection and use of personal data by
tech companies raise concerns about who owns and controls this
information and how it can be monetized without infringing on
individuals’ privacy rights.
CONT’D
• Open Source and Intellectual Property: The open source software
movement challenges traditional notions of propriety software and
licensing. It raises questions about how intellectual property can coexist
with collaborative and community driven development.
• C) With examples illustrate that ownership is not absolute and can
justly be limited by law and by ethics.
Fair Use Doctrine: In copyright law, the fair use doctrine allows limited
use of copyrighted material without permission from the rights holder. For
instance, criticism, commentary, news reporting, teaching and research may
qualify as their use. This limitation ensures that IP rights do not stifle free
expression and public discourse.
CONT’D
• Compulsory Licensing; Some countries may allow compulsory licensing of
patents in specific situations, such as when public health is at stake. For
example, pharmaceutical companies may be required to license their patents
for essential medications to ensure wider access.
• Creative Common Licensing; Creators can use creative commons licenses to
allow certain uses of their work while retaining certain rights. For example, a
musician may permit others to remix their music but require attribution.
• Privacy Laws: In the context of personal data, privacy laws and regulations
restrict how organizations can collect, use, and share individual’s information.
These laws balance the interests of businesses and individuals, limiting
ownership and control of personal data.
CONT’D
• Ethical considerations; Ethical codes and principles may guide creators and
organizations to use their intellectual property for socially responsible
purposes. For instance, a company might choose to open source a software
project to promote collaboration and innovation in the tech community.
• D)Describe the basic features of patents.
Exclusive Rights: A patent grants the inventor exclusive rights to make, use and
sell the patented invention for a limited period, typically 20 years from the filing
date.
Novelty; To be eligible for a patent, the invention must be novel, meaning it is
not known or used by others before the filing date of the patent application.
CONT’D
• Non-Obviousness; The invention must not be obvious to someone
skilled in the relevant field. It should involve an inventive step that goes
beyond what is commonly known or practiced.
• Utility: The invention must have a practical use or utility. It should be
functional and serve a specific purpose.
• Enablement: The patent application must provide enough information
for others skilled in the field to replicate the invention based on the
patents' description and claims.
• Limited duration: Patents have a limited duration, typically 20 years after
which the invention enters the public allowing others to use and build
upon it.
CONT’D
• Disclosure: In exchange for exclusive rights, the patent holder must fully
disclose the details of the invention in the patent application, which
becomes public information.
• Government Oversight: Patent applications are examined by government
patent officers to ensure they meet the criteria for patentability. Patents
can be challenged and invalidated if they do not meet these criteria.
KYAMBOGO UNIVERSITY
SCHOOL OF COMPUTING AND INFORMATION SCIENCE
DEPARTMENT OF COMPUTER SCIENCE
BACHELORS OF INFORMATION SYSTEMS
COURSE UNIT: LEGAL, ETHICAL & SOCIAL ISSUES IN COMPUTER
LECTURER: MR. SSEGUYA RONALD

GROUP FOUR
NAME REG NO. WATTSAPP NO.

SSENONO ROBERT 20/U/ISD/9586/PD 0789359314

NAMITALA PATRICIA 20/U/ISD/9593/PD 0705772121

JAGWE ANTHONY 20/U/ISD/9690/PD 0755847602

KABANDA DAVID GENESIS 20/U/ISD/13662/PD 0759296397

SSEBUGWAWO DENIS PIUS 20/U/ISD/9585/PD 0775948951

ANGIDI GABRIEL BRIAN 20/U/ISD/9677/PD 0708916222

SSEKABIRA TIMOTHY 20/U/ISD/9623/PD 0781306634

NAMOMA DERRICK JAMES 20/U/ISD/9695/PD 0742190629

QNS: 7 & 8
QN 7 SOLUTIONS
a) Examine numerous aspects of ICT that make technology a threat to privacy.

Information and Communication Technology (ICT) has revolutionized the way we live and
work, bringing countless benefits. However, it also poses a significant threat to privacy.

Privacy, in this context, refers to the right of individuals to control their personal information
and keep it confidential. Information and Communication Technology (ICT) has brought about
numerous privacy concerns due to the ways in which it can compromise individuals' personal
information and data.

Below are various aspects of ICT that undermine privacy, highlighting specific terms and
explaining key points.

1. Data Collection and Profiling. ICT enables the collection of vast amounts of personal data
through online activities, IoT devices, and more. For example, Data mining techniques are
used to analyze this data, often without consent, leading to privacy invasion.
2. Surveillance and Monitoring. Governments and corporations can employ ICT for mass
surveillance programs, tracking citizens' online activities, communications, and movements,
eroding the expectation of privacy. Also, Government laws like the USA PATRIOT Act
enable authorities to access and monitor electronic communications, including emails and
phone records, with implications for citizens' privacy rights.
3. Social Media and Data Harvesting. Social media platforms often harvest user data,
including preferences, habits, and connections, to target users with personalized ads, raising
privacy invasion concerns. This practice compromises user privacy.
4. Internet of Things (IoT) and Smart Devices. IoT devices, like smart home appliances and
wearable’s, constantly collect and transmit data. Poor security measures can make these
devices vulnerable to hacking, putting personal information at risk.
5. Biometrics and Facial Recognition. Facial recognition technology, used for authentication
and surveillance, can infringe on privacy rights by capturing and analyzing individuals' facial
features without their knowledge or consent posing privacy and security risks.
6. Cloud Storage and Data Breaches. Storing personal data in the cloud poses risks as data
breaches can occur due to hacking or security lapses, exposing sensitive information to
unauthorized parties.
7. Location Tracking and Geolocation Data. Mobile devices and apps often track users'
locations. This data can be exploited by advertisers, law enforcement, or cybercriminals,
compromising individuals' privacy.
8. Online Tracking and Cookies. Websites use cookies and tracking pixels to monitor users'
online behavior. This data is used for targeted advertising, creating a digital footprint that
invades user privacy.
9. Big Data Analytics and Predictive Analytics. Big data analytics can predict individuals'
behavior and preferences based on their online activities and interactions. While beneficial
for businesses, it can be invasive and lead to privacy concerns.
10. Privacy Policies and Legalese. Complex and lengthy privacy policies often contain legal
jargon that makes it challenging for users to understand how their data is being used and
shared, hindering informed consent
11. Online Advertising and Ad Targeting. ICT enables advertisers to target users with highly
personalized ads based on their online behavior and interests, sometimes without clear
disclosure, raising concerns about user tracking and profiling.
12. Eavesdropping and Voice Assistants. Voice-activated assistants like Siri and Alexa can
unintentionally record conversations and send them to the cloud for processing, potentially
exposing private discussions to unauthorized parties.
13. Social Engineering and Phishing. Cybercriminals use ICT to trick individuals into
revealing personal information through phishing emails, websites, or phone calls, leading to
identity theft and privacy breaches.
14. Data Retention and Retention Policies. Many ICT services retain user data for extended
periods, even after it's no longer necessary. Prolonged data retention increases the risk of data
breaches and unauthorized access.
b) Assess how the working environment of ICT professionals is challenging and has an
impact on their conduct. Briefly describe this environment, stating the
corresponding challenges in each case.

The working environment of ICT (Information and Communication Technology) professionals


can be both dynamic and challenging, impacting their conduct in various ways.

Below is a description of the ICT working environment along with corresponding challenges in
each case:

1. Highly Dynamic Environment.

The ICT field is characterized by rapid advancements in technology, which require professionals
to stay up-to-date with the latest developments.
Challenge: Keeping pace with constantly evolving technologies can be mentally taxing and may
lead to burnout if professionals don't manage their learning effectively.

2. Global and Cross-Cultural Workforce

ICT professionals often collaborate with colleagues and clients from diverse cultural
backgrounds worldwide.
Challenge: Navigating cultural differences and communication styles can be challenging,
potentially leading to misunderstandings or conflicts.

3. Diverse Roles and Specializations.

The ICT industry encompasses a wide range of roles, from software development to
cybersecurity, each requiring specific skills and expertise.
Challenge: Balancing the need for specialization with the need for a broad understanding of the
field can be a challenge, as individuals must decide where to focus their careers.

4. Remote Work Opportunities.

The tech industry has embraced remote work, offering flexibility in work arrangements.
Challenge: Remote work can blur the boundaries between professional and personal life,
affecting work-life balance and potentially leading to burnout or isolation.
5. Interdisciplinary Collaboration.

Many ICT projects involve cross-disciplinary teams with professionals from various
backgrounds.
Challenge: Differences in terminology, approaches, and perspectives among team members can
lead to communication challenges and potential conflicts.

6. High Demand for Innovation.

The ICT field thrives on innovation, with a constant need for creative solutions and new
technologies.
Challenge; The pressure to innovate can lead to a high-stress environment, where professionals
may feel compelled to take risks that impact the quality of their work.

7. Fast-Paced Projects.

ICT projects often have aggressive timelines, demanding quick problem-solving and efficient
project management.
Challenge: The pressure to meet tight deadlines can impact decision-making, potentially leading
to shortcuts or rushed work.

8. Environmental Awareness.

Increasing concerns about the environmental impact of technology have led to a greater
emphasis on sustainability.
Challenge: Addressing sustainability concerns while maintaining technological advancements
and profitability can be a complex ethical challenge.

9. Privacy and Security Considerations.

Data privacy and cybersecurity are paramount in ICT, given the increasing volume of data
collected and the rising cyber threats.
Challenge: Ensuring the security and privacy of user data while maintaining functionality and
usability can be an ongoing challenge, requiring constant vigilance.
c) Outline any five rules under public interest in as far as the British computer
society code of conduct is concerned.
1. Promote Public Interest.
ICT professionals must actively promote the public interest and ensure that their work benefits
society as a whole. This rule emphasizes that professionals should prioritize the welfare of the
general public over individual or organizational interests. They are encouraged to consider the
broader implications of their work on society.

2. Avoid Harm.
ICT professionals should avoid actions that might harm the well-being of individuals,
organizations, or society. This rule underscores the importance of minimizing negative
consequences resulting from ICT-related activities. It encourages professionals to act responsibly
to prevent harm.

3. Duty to Relevant Authorities.


Professionals must respect the authority of relevant regulatory bodies and comply with their
guidelines and requirements. This rule emphasizes the importance of complying with laws and
regulations that govern ICT activities. It underscores the need for professionals to work within
the legal framework that serves the public interest.

4. Professional Competence and Integrity.


ICT professionals should maintain and develop their professional competence and act with
integrity. This rule highlights the responsibility of professionals to continually improve their
skills and knowledge to ensure the quality and safety of their work. Acting with integrity is
crucial to building trust with the public.

5. Duty to Relevant Parties.


Professionals must respect the confidentiality of information and the privacy of individuals,
disclosing information only when it is in the public interest or with proper authorization. This
rule stresses the importance of respecting individuals' privacy and confidentiality while also
recognizing that there may be circumstances where public interest justifies disclosing
information.
d) What do you understand by the term digital divide?

The term "digital divide" refers to the unequal access and usage of digital technologies,
particularly the internet and information and communication technologies (ICT), among different
groups of people or communities. This divide is primarily driven by disparities in socio-
economic, geographical, educational, and demographic factors.

In essence, the digital divide highlights the gap between those who have access to and can
effectively use digital tools and resources and those who do not, thus limiting their participation
in the digital age and its associated opportunities.

e) The digital divide is a virus that brings many setbacks with it – economic, social,
political, and psychological backwardness. Elaborate.

ECONOMIC BACKWARDNESS:
Limited Job Opportunities. People without access to digital technologies may miss out on a wide
range of job opportunities in the modern job market, which often requires digital skills.

1. Income Inequality. The digital divide can exacerbate income inequality, as those with
limited access may struggle to participate in the digital economy, which often offers higher-
paying jobs and entrepreneurial opportunities.
2. Reduced Economic Mobility. A lack of digital access can hinder individuals' ability to
acquire new skills, access online education and training, and start or expand businesses,
limiting economic mobility.
3. Reduced Innovation. Like a virus that weakens an immune system, the digital divide
hampers innovation by excluding talented individuals who could otherwise contribute to
technological advancements.
4. Limited Economic Growth. The digital divide virus stifles economic development as it
restricts access to digital tools necessary for modern businesses and entrepreneurship.
SOCIAL BACKWARDNESS:

1. Education Disparities. Students without access to digital resources may face challenges in
accessing quality education and suffer from disparities in learning outcomes.
2. Social Isolation. Lack of digital connectivity can lead to social isolation, especially in the
context of remote work, online social interaction, and staying connected with friends and
family.
3. Healthcare Access. The digital divide can hinder access to telehealth services, preventing
individuals from receiving timely medical advice and care.

POLITICAL BACKWARDNESS:

1. Limited Civic Engagement. Digital exclusion can lead to reduced civic participation,
making it difficult for individuals to engage in political processes, access government
services, or stay informed about public affairs.
2. Democratic Inequity. Like a virus that weakens immune responses, the digital divide can
undermine democratic processes, as some citizens are unable to participate fully in elections,
advocacy, or accessing government services online.
3. Digital Disinformation Vulnerability. Those without digital literacy skills may be more
susceptible to online disinformation and manipulation, impacting their ability to make
informed political decisions.

PSYCHOLOGICAL BACKWARDNESS:

1. Missed Personal Growth Opportunities. The inability to access online resources for
personal growth, such as learning new skills or hobbies, can hinder psychological well-being.
2. Digital Stress and Anxiety. Similar to the emotional toll of a virus outbreak, the digital
divide can cause stress and anxiety. Those left behind may feel overwhelmed by their
inability to access critical digital services or opportunities. Those excluded from the digital
world may experience feelings of stress, frustration, and alienation, especially when they
perceive others benefiting from digital technologies.
QN 8 SOLUTIONS

a) Explain the term "computer crime" stating any three common examples.

"Computer crime," also known as cybercrime, refers to illegal activities that involve the use of
computers or computer networks to commit unlawful acts. These crimes can range from
relatively simple actions, such as hacking into someone's email account, to highly complex and
sophisticated schemes, such as large-scale data breaches.

Here are three common examples of computer crimes:

1. Hacking:
Hacking involves unauthorized access to computer systems, networks, or devices. Hackers gain
access by exploiting vulnerabilities in software or by using techniques like phishing to trick
individuals into revealing their login credentials. Once inside, they may steal sensitive data,
disrupt operations, or carry out other malicious activities.
2. Phishing:
Phishing is a type of social engineering attack in which cybercriminals use deceptive emails,
messages, or websites to trick individuals into disclosing personal information, such as login
credentials, credit card numbers, or social security numbers. These stolen details are often used
for identity theft or financial fraud.
3. Ransomware:
Ransomware is a type of malware that encrypts a victim's files or locks them out of their
computer system. Cybercriminals then demand a ransom, usually in cryptocurrency, in exchange
for a decryption key or to unlock the system. Ransomware attacks can cause significant financial
losses and disrupt critical services, affecting both individuals and organizations.
Other computer crimes may include:
• Malware: Malicious software causing harm.
• DoS/DDoS Attacks: Overwhelming networks or websites.
• Identity Theft: Stealing personal information.
• Data Breaches: Unauthorized data access or exposure.
• Cyberbullying: Harassment using digital tools.
• Online Scams: Deceptive schemes for financial gain.
• Child Exploitation: Illegal content involving minors.
• Unauthorized Access: Misusing insider privileges.
b) Publishing indecent and deceitful material are some of unethical conduct over the
internet. Suggest 10 ways you can prevent the immature to access indecent materials on
the internet.
Here are 10 ways to prevent the immature from accessing indecent materials on the internet:

1. Talk to your children about the internet. Explain to them what indecent content is and
why it is harmful. Let them know that they can come to you if they ever see something that
makes them uncomfortable.
2. Use parental controls. Most browsers and devices have parental controls that can be used to
block certain websites and apps. You can also use parental control software to monitor your
children's online activity.
3. Place the computer in a public area of the house. This will make it less likely that your
children will be able to access indecent content without your knowledge.
4. Monitor your children's internet usage. Pay attention to what websites they are visiting
and what apps they are using. If you see anything suspicious, talk to them about it.
5. Educate your children about online safety. Teach them how to be critical of the
information they find online and how to protect themselves from online predators.
6. Use a safe search engine. Most search engines have safe search settings that can be used to
filter out adult content.
7. Use a kid-friendly search engine. There are a number of search engines that are specifically
designed for children. These search engines filter out adult content and provide age-
appropriate results.
8. Use a kid-friendly browser. There are a number of browsers that are specifically designed
for children. These browsers block adult websites and provide a safe and secure online
environment.
9. Use a kid-friendly device. There are a number of devices that are specifically designed for
children. These devices have parental controls that can be used to block adult content and
monitor online activity.
10. Talk to your children's school. Many schools have internet safety programs in place. Find
out what your children are learning in school about online safety and talk to them about it at
home.
c) Spam is a menace to the internet and specifically to email users. What measures can be
undertaken to fight against the menace?
1. Use a spam filter. Most email providers have built-in spam filters that can block most spam
messages. However, spam filters are not perfect and some spam messages may still sneak
through.
2. Report spam messages. If you receive a spam message, report it to your email provider.
This will help them to improve their spam filters and block the spammer.
3. Be careful about giving out your email address. Only give out your email address to
trusted websites and businesses.
4. Be wary of phishing scams. Phishing scams are emails that try to trick you into revealing
your personal information, such as your passwords or credit card numbers. Phishing emails
often look like legitimate emails from banks, government agencies, or other well-known
organizations.
5. Use strong passwords and two-factor authentication. Strong passwords and two-factor
authentication can help to protect your accounts from being hacked and used to send spam.

d) There are ethical dilemmas in IT just like any other profession. With reference to
examples of your choice in IT. Explain what is meant ethical dilemma.

Refers to situations where individuals or organizations face complex decisions that involve
competing moral principles, values, or obligations. In these situations, there is often no clear-cut
or universally accepted solution, and individuals must carefully consider the ethical implications
of their choices.

Here are a couple of examples in IT that illustrate ethical dilemmas:

1. Privacy vs Security:

In the realm of cybersecurity, there is often a tension between protecting individuals' privacy and
ensuring the security of systems and data. For example, should a company or government agency
be allowed to access personal data to prevent potential security threats, even if it means
infringing on individuals' privacy rights?
Considerations: Protecting privacy is an important ethical principle, as is safeguarding against
cyber threats. Balancing these concerns is challenging, and finding the right approach that
respects privacy while maintaining security is an ongoing ethical dilemma in IT.

2. Whistleblowing:

IT professionals may encounter situations where they discover unethical or illegal activities
within their organizations, such as data breaches, fraud, or misconduct. They face a dilemma:
should they report these issues (whistleblowing), potentially risking their own career and
relationships, or should they remain silent, allowing unethical behavior to continue?

Considerations: Whistleblowing is often seen as an ethical duty to expose wrongdoing and


protect the greater good. However, it can also have negative consequences for the whistleblower,
including job loss or legal actions. This dilemma revolves around the conflict between personal
and professional ethics.

3. Artificial Intelligence and Bias:

When developing AI algorithms, IT professionals must make choices about the data they use to
train these systems. Biased or unfair data can lead to AI systems that perpetuate discrimination or
inequality. The ethical dilemma arises when deciding whether to prioritize the accuracy and
effectiveness of AI systems over the potential harm they can cause by reinforcing bias.

Considerations: IT professionals must weigh the ethical responsibility of addressing bias and
discrimination in AI against the practical challenges of creating unbiased AI models.

4. Open Source Software and Intellectual Property:

The open-source software community promotes the sharing and collaboration of code for the
common good. However, IT professionals often encounter situations where they must decide
whether to use open-source software that may contain components with unclear intellectual
property rights. This dilemma involves respecting intellectual property rights while embracing
the open-source ethos.

Considerations: Striking a balance between open-source principles and intellectual property


rights can be challenging. IT professionals must navigate these ethical considerations when
choosing software solutions.
e) You are a member of a team working on a computer-controlled crash avoidance system
for automobiles. You think the system has a flaw that could endanger people. The
project manager does not seem concerned and expects to announce completion of the
project soon, what would you do?

• Document the Flaw: Thoroughly document the flaw in the system, including evidence
and potential consequences. Ensure you have a clear understanding of the technical
details.
• Raise Concerns Internally: Initiate a discussion with your project manager and express
your concerns regarding the flaw and its potential risks. Share your documentation and
any supporting evidence.
• Consult Colleagues: Discuss the issue with trusted colleagues and seek their input. They
may offer valuable insights or alternative perspectives.
• Review Ethical Guidelines: Refer to your organization's code of ethics, industry
standards, and any relevant legal requirements to understand your obligations.
• Escalate If Necessary: If your concerns are not addressed adequately within the
organization, consider escalating the matter to higher-level management or an internal
ethics committee, if available.
• Whistleblowing: If all internal avenues are exhausted, and you genuinely believe that
lives are at risk, you may need to consider external reporting channels, such as regulatory
authorities or industry watchdogs. Be aware of legal protections and potential
consequences when blowing the whistle.
• Document Your Actions: Keep a record of all your actions, discussions, and
communications related to the flaw and your efforts to address it. This documentation
may be crucial if you need to defend your actions later.
KYAMBOGO UNIVERSITY
P. O. BOX 1, KYAMBOGO – KAMPALA, UGANDA
TEL: +256-41-287347/288492, email: www.kyu.ac.ug
FACULTY OF SCIENCE
DEPARTMENT OF COMPUTER SCIENCE
SCHOOL OF COMPUTING AND LIBRARY SCIENCE
COURSE: BACHELOR OF INFORMATION SYSTEMS
COURSE UNIT: SOCIAL, LEGAL AND ETHICAL ISSUES IN
COMPUTING
YEAR: III
SEMESTER: TWO
GROUP 5
NAMES REG NO.
NABYONGA CHRISTINE 20/U/ISD/9582/PD
MASIGE MICHEAL 20/U/ISD/9627/PD
MURAMUZI JONAS 20/U/ISD/9560/PD
MWAJE STEVEN 20/U/ISD/9694/PD
MUHUMUZA TADEO 20/U/ISD/9579/PD
OWOMUGISHA AHABU 20/U/ISD/9568/PD
AKECH SANDRA 20/U/ISD/9622/PD

Question 9
a) What are computer ethics?
b) Why is it important to study computer ethics?
c) There are three categories of computer software. Discuss these categories giving an
example of each?
Question 10
a) Define the word ethics?
b) There are several ethical theories which have been developed tested, revised and debated.
Discuss at least six of these theories?
Question 9
a). According to (Kimppa,2008). Moor (1985) defines computer ethics as “the analysis of the
nature and social impact of computer technology and the corresponding formulation and
justification of polices for the ethical use of technology’.
It can also be defined as the standards adopted for computer usage signifying the prevention of
copyright infringement, invasion of privacy, and circulation of objectionable material. It is a
normal belief that computer ethics rely on moral principles that help a computer user to make the
right decision or to act right, accordingly.
Historical Background of Computer Ethics
The unethical use of IT risk is on the increase due to the global increase in interconnectivity of
computer system and online storage systems (Reynold, 2007). Computer ethics was first
mentioned by a MIT professor in his books where he established the theoretical framework for
computer ethics.
b). The following are the reasons as to why computer ethics are important to study;

• To deal with the true nature of computing as a service to other human beings. (Gotterbarn
1991)
• To convey a sense of professional responsibility not covered in other courses
• To sensitize students to computer ethics issues
• To provide tools and methods for analyzing cases
• To provide practice in applying the tools and methods to actual or realistic cases
• To develop in the student good judgment and helpful intuitions - ethical autonomy.
c). Software is a set of instructions, data or programs used to operate computers and execute
specific tasks.
There are two main categories of software and include application software and system
software.
An application software is software that fulfills a specific need or performs specific tasks. The
most common type of software, application software is a computer software package that performs
a specific function for a user, or in some cases, for another application. An application can be self-
contained, or it can be a group of programs that run the application for the user.
Examples of modern application software include office suites, graphics software, databases
and database management programs, web browsers, word processors, software development tools,
image editors and communication platforms.
System software is designed to run a computer's hardware and provides a platform for
applications to run on top of.
System software coordinates the activities and functions of the hardware and software. In addition,
it controls the operations of the computer hardware and provides an environment or platform for
all the other types of software to work in. The OS is the best example of system software; it
manages all the other computer programs.
Other examples of system software include the firmware, computer language translators and
system utilities;
Driver software. Also known as device drivers, this software is often considered a type of system
software.
Device drivers control the devices and peripherals connected to a computer, enabling them to
perform their specific tasks. Every device that is connected to a computer needs at least one device
driver to function.
Examples include software that comes with any nonstandard hardware, including special game
controllers, as well as the software that enables standard hardware, such as USB storage devices,
keyboards, headphones and printers.
Programming software, which provides the programming tools software developers need
Middleware, which sits between system software and applications; and driver software, which
operates computer devices and peripherals.
Question 10
a). Ethics was derived from the greek word “ethos”, which means “custom”, “habit”, and “way
of living”.
Ethics refers to standards of conduct, standards that indicate how one should behave based on
moral duties and virtues, which themselves are derived from principles of right and wrong.
b). There are several ethical theories that have been developed, tested, revised, and debated
in the field of ethics. Here are six prominent ethical theories:
Utilitarianism: This was founded by Jeremy Bentham and John Stuart Mill
Key Idea: The morality of an action is determined by its overall consequences. The goal is to
maximize happiness or utility and minimize suffering. Actions are evaluated based on the principle
of "the greatest good for the greatest number."
Deontology: This was founded by Immanuel Kant. Deontology emphasizes the moral duty or
obligation of individuals. It asserts that some actions are inherently right or wrong, regardless of
their consequences. The most famous expression is the "categorical imperative," which outlines
universal moral principles that should guide actions.
Virtue Ethics: This was founded by Aristotle. Virtue ethics focuses on the character of individuals
and emphasizes the development of virtuous traits or qualities, such as honesty, courage, and
compassion. It asserts that moral actions arise from virtuous character.
Social Contract Theory: This was founded by Hobbes, John Locke, Jean-Jacques Rousseau
Social contract theory proposes that individuals come together to form a society and agree upon a
set of rules or a social contract. Morality is based on this contract, and actions are judged based on
their conformity to these agreed-upon rules.
Ethical Egoism: Ethical egoism asserts that individuals should act in their own self-interest. It is
a normative theory that argues that people ought to do what is best for themselves, and this is the
morally right thing to do.
Feminist Ethics: Feminist ethics seeks to address and correct gender-based injustices and
inequalities in traditional ethical theories. It emphasizes the importance of empathy, care, and
relationships in ethical decision-making, and it critiques traditional ethics for being male-centered.
In conclusion, these six ethical theories represent a range of perspectives on what constitutes
ethical behavior and the foundations for ethical decision-making. Ethical discussions often involve
weighing these theories against each other and considering their strengths and weaknesses in
various moral dilemmas and real-world situations.
The use of code of ethics among IT general users and professionals has a positive effect on the
ethical use of information technology as reveal in this paper. The policy vacuum created by the
advancement of IT can easily be addressed by constant research and study in field of computer
ethics by computer science and information technology related students (Gotterbarn,1992). The
teaching of computer ethics courses will be of great importance in reducing computer disasters,
lead to the development of error-free computer applications and eradicating unethical computer
activity in this 21st century (Gotterbarn, 1992).
REFERENCES
Kizza, J. M. (2002). Ethical and social issues in the information age. New York: Springer Verlag.
Lee, W. W. & Chan, K. C. C. (2008). Computer Ethics: A Potent Weapon for Information Security
Management.
Retrieved from http://www.isaca.org/Journal/Past-Issues/2008/Volume-6/Documents/jpdf0806-
computerethics.pdf
Moor, J. H. (2004). Reason, relativity and responsibility in computer ethics. T. W. Bynum, S.
Rogerson eds. Computer Ethics and Professional Responsibility. Malden, MA: Blackwell
Publishing.
Alexandra, A., & Miller, S. (2010). Law, Ethics and Governance Series: Integrity Systems for
Occupations. England:
Asgate. pp: 61, and 113. Ben-Jacob, M. G. (2005). Integrating Computer Ethics across the
Curriculum: A Case Study. Educational Technology & Society, 8(4), 198 – 204.
KYAMBOGO UNIVERSITY
SCHOOL OF COMPUTING AND INFORMATION
SCIENCE

COURSE : BACHELOR OF INFORMATION


SYSTEMS

GROUP SIX COURSE WORK

COURSE UNIT: SOCIAL ISSUES IN COMPUTING

COURSE CODE: SIS 3202

LECTURER: SEGUYA RONALD


NAME REG.NO
OLUKA JOB JEROME 20/U/ISD/9678/PD
MUSIIMENTA ISRAEL MAGYEZI 20/U/ISD/9755/PD
ALION ALFRED 20/U/ISD/9696/PD
MUHWEZI MARVIN 20/U/ISD/9640/PD
ODONGO ANDREW OLUK 21/U/ISD/16802/PD
Question 1

a. Differentiate between the following

Morality and Law


Morality is the differentiation of intentions, decisions and actions between those that are
distinguished as proper (right) and those that are improper.

Morality refers to the set of standards that enable people to live cooperatively in groups.

While

Law is a set of rules that are created and are enforceable by social or governmental institutions to
regulate behavior, with its precise definition a matter of longstanding debate.

Law is the discipline and profession concerned with the customs, practices, and rules of conduct
of a community that are recognized as binding by the community.

Civil case and Criminal case


A civil case relates to the legal rights and obligations between two or more persons or institutions.
In the event that the parties concerned cannot resolve a dispute themselves, either party may start
a civil litigation.

"Civil" cases are the cases in which private citizens (or companies) sue each other in court. Civil
cases are not about breaking a criminal law.

While

A criminal case is a lawsuit brought by the state against a person who has broken a criminal law.

A criminal charge is a violation of the criminal law and considered an offense against the
community.

Conventional law and Natural law


Conventional law is a set of rules that people agree to follow when they interact with each other.

Conventional international law is the body of international legal principles contained in treaties
versus customary international law or other sources of international law.

While
Natural law is a system of law based on a close observation of human nature, and based on values
intrinsic to human nature that can be deduced and applied independently of positive law.

Natural law is a theory in ethics and philosophy that says that human beings possess intrinsic
values that govern their reasoning and behavior.

a. Why are laws needed in any society?


 To regulate people’s behaviour in accordance with the norms of the society eg. Regulatory
laws, prohibitory laws, contract laws etc. So law changes with the change in the norms of
our society.
 To collect and generate revenue eg. Taxation laws.
 Laws help us live together peacefully: Laws help avoid conflict by clearly stating what’s
right and wrong. Laws can also help settle disputes when conflicts arise.
 Laws protect us: laws protect our individual and collective freedoms and ensure that we
live in a safe, free, and democratic society. They also protect us from others who might try
to harm us or otherwise take unfair advantage of us.
 Laws keep us safe: for example, rules such as speed limits and traffic signs on the roads
make sure we drive safely. They keep pedestrians safe by making sure cars stop at
crosswalks.
 Laws regulate how animals should be treated to protect them from abuse or neglect.
 Laws enable us to live happily together: Without police, fire departments and hospitals,
without public places like parks and libraries, without an education system or other support
systems in our community, life would be very difficult – and not very happy
 To deal with the harm done by the offender against the individual and society at large.
Everyone is aware of HOW to act in the society we live in and we can live with each other
peacefully. A country without rule of law result in total chaos and the destruction of a
civilised society because you are allowed to do whatever you wish to do.

Question 2

a. Define the following terms as applied in society

Encryption is the process of protecting information or data by using mathematical models to


scramble it in such a way that only the parties who have the key to unscramble it can access it.
Authentication is the process of validating the identity of a registered user or process before
enabling access to protected networks and systems.

Confidentiality refers to the duty to protect privileged information and to share entrusted
information responsibly.

Availability is the ability for users to access systems and information when needed, even under
duress.

Password is a string of characters used to verify the identity of a user during the authentication
process.

Firewall is a network security device that monitors and filters incoming and outgoing network
traffic based on an organization’s previously established security policies.

Integrity is the accuracy and consistency of data as well as the completeness and reliability of
systems.

b. Anonymity is the absence of identity. There are several types of anonymity. Briefly
discuss

Anonymity can be defined either as acting or communicating without using or presenting one's
name or identity, or as acting or communicating in a way that protects the determination of one's
name or identity, or using an invented or assumed name that may not necessarily be associated
with one's legal or customary identity.

Anonymity is the state of being not identifiable within a set of subjects, the anonymity set.

Pseudonymity. Sometimes a person may desire a long-term relationship (such as a reputation) with
another party without necessarily disclosing personally identifying information to that party. In
this case, it may be useful for the person to establish a unique identifier, called a pseudonym.
Examples of pseudonyms are pen names, nicknames, credit card numbers, student numbers, bank
account numbers, etc. A pseudonym enables the other party to link different messages from the
same person and, thereby, to establish a long-term relationship. Pseudonyms are widely used in
social networks and other virtual communication, although recently some important service
providers like Google try to discourage pseudonymity
Personal Anonymity: Serves to protect individuals. It enables the act of sharing sensitive
information and/or undertaking risky endeavors as it provides the actor with control over the
consequences that might follow.

Social Anonymity: Serves to create social equality among members of a group/participants of a


program. It enables developing a common attitude of mutual identification, solidarity and/or
support albeit social differences between group members.

Collective Anonymity: Serves to establish and distribute an idea/program as common good. It


enables breaking through patterns of individual possession, greed and big-shotism, conceptualising
ideas, practices and programs as common rather than as personalized achievements.

Notion of anonymity

Identifiability is the possibility to know the real identity of some party in the system by means of
actual data exchanged in the system.

Traceability is the ability to obtain information about the communicating parties by observing the
communication context (e.g. via the IP address).

Unlinkability of two or more items of interest (IOI) means that within this system, these items are
no more and no less related than they are related with respect to the a-priori knowledge.

References

Alcoholics Anonymous (2013): Anonymity. Our spiritual responsibility in a digital world.

Boyd, P. and C. Budnick (2011) ‘Narcotics anonymous. Its history and culture’,

Counselor Magazine, 12 (2): 1-40.

Coleman, G. (2014) Hacker, hoaxer, spy. The many faces of anonymous. London:

Verso Books

You might also like