(IJCSIS) International Journal of Computer Science and Information Security,Vol. 9, No.1, 201
the curriculum starting at the point when children first becomecomputer users in school. In particular, there are a set of guidelines regarding what students in general need to knowabout computer ethics. The preparation of future computer professionals should be examined at both the high school anduniversity computer science curriculum . The researchers are in the process of developing new recommendations at both levels of curriculum. In the high school curriculum, therewill be both general and specific approaches to ethics andsocial impact issues.The general approach is to incorporate these concernsacross the curriculum, not just in computer courses. This is inkeeping with the philosophy that computers should beintegrated across the curriculum as a tool for all disciplines.The specific approach is to develop social impact moduleswithin the computer courses that will focus on these concerns(, 2004). At the university level the researchers faces a yet-to-be resolved dilemma of how to implement the proposedsocietal strand in the new curriculum recommendations. Thereis much discussion, but little action, regarding the necessity of preparing ethically and socially responsible computer scientists, especially in light of the highly publicized computer viruses that are an embarrassment to the profession.When combined with other computer science core material,the teaching of ethics is made complicated by the fact that it isnot as concrete as the rest of the curriculum. In accepting thevalue-laden nature of technology, researchers should recognizethe need to teach a methodology of explicit ethical analysis inall decision-making related technology. The moraldevelopment is at the heart of interest in the morality element.In this model , researchers wanted to create educationalopportunities that allow students to examine their existing beliefs regarding ethical and technical issues and in relation toexisting technical, professional, legal, and cultural solutions. Inan earlier section, it described how students examine thesesolutions with an external, objective point of view. Now, the student is positioned at the centre of theintersecting circles. The is aim to create educationalopportunities that allow and encourage students to explore“who am I now” in relation to technical, professional, cultural,and legal solutions to these ethical and security issues, and asksquestions such as “what is the relationship between who am I,who I want to be, and these issues and solutions”? The mostimportant factor in effective computer security is people`sattitudes, actions, and their sense of right and wrong .Problems and issues raised in the computing environment,Topics to be discussed include misuse of computers, conceptsof privacy, codes of conduct for computer professionals,disputed rights to products, defining ethical, moral, and legal parameters, and what security practitioners should do aboutethics.The issue of computer security has fallen into the gray areathat educators and industry alike have avoided for fear that toolittle knowledge could be hazardous and too much could bedangerous. Most organizations acknowledge the need for datasecurity, but, at the same time, approach security as hardware.It may be more important, and far more successful to addressthe issue of data security as an attitude rather than atechnology.
According to  decision makers place such a high valueon information that they will often invade someone's privacy toget it. Marketing researchers have been known to go through people's garbage to learn what products they buy, andgovernment officials have stationed monitors in restrooms togather traffic statistics to be used in justifying expansion of thefacilities.These are examples of snooping that do not use thecomputer. The general public is aware that the computer can beused for this purpose, but it is probably not aware of the easewith which personal data can be accessed. If you know how togo about the search process, you call obtain practically anytypes of personal and financial information about privatecitizens. Here four major aspect of Mason`s theory shall bestudied:
Privacy may define as the claim of individuals to determinefor themselves when, to whom, and to what extent individuallyidentified data about them is communicated or used. Mostinvasions of privacy are not this dramatic or this visible.Rather, they creep up on us slowly as, for example, when agroup of diverse files relating to a student and his or her activities are integrated into a single large database. Collectionsof information reveal intimate details about a student and canthereby deprive the person of the opportunity to form certain professional and personal relationships.This is the ultimate cost of an invasion of privacy. So whyintegrate databases in the first place. It is because the bringingtogether of disparate data makes the development of newinformation relationships possible.
Accuracy represents the legitimacy, precision andauthenticity with which information is rendered. Because of the pervasiveness of information about individuals andorganizations contained in information systems, special caremust be taken to guard against errors and to correct knownmistakes. Difficult questions remain when inaccurateinformation is shared between computer systems. Anyframework should describe the legal liability issues associatedwith information. Who is held accountable for the errors? Thisis an important question may come across every researcher`smind or which party liable for inexact or incorrect informationthat leads to devastation of another.
One of the more controversial areas of computer ethicsconcerns the intellectual property rights connected withsoftware ownership. Some people, like Richard Stallman whostarted the Free Software Foundation, believe that softwareownership should not be allowed at all. He claims that allinformation should be free, and all programs should beavailable for copying, studying and modifying by anyone whowishes to do so. Others argue that software companies or programmers would not invest weeks and months of work and