You are on page 1of 5

USAGE OF

COMPUTER ETHIC

NAME: TAIF AHMED ALMAGHDRI

1|Page
 REASON FOR THE LICENSE OF THE SOFTWARE ENGINEER, ITS
DRAW BACK AND ADVANTAGE

Software engineers are the ones who are specialized and engineered in the design of
the software development and also, they maintain the software by improving the level
of quality and standards. This is the reason for which the software engineer has to be
licensed in order to maintain the quality of the software design. (Lucy, 2016)

License is granted to the people who are specialized in their qualitative work. It gives
an individual, a special permission to practice their specialized work. As software
development and design is considered to be specialized skills. So, it becomes
necessary for the software engineers to be licensed. (Barkhatt, 2015)

o ADVANTAGES

 It standardizes the licensing professionals with the minimum standards


which will be guaranteed to the licensed software engineers to practice
their specialized skills.

 It ensures that the licensed software engineers are well qualified with
the knowledge of the software development which will help them to
improve the quality of the software.

 License is given to the person who are specialized in their work, so the
licensed software engineers will indicate that they are specialized in
their work and there will not be any reduction in the quality of their
work. (Barkhatt, 2015)

o DRAWBACKS

 The licensing of the software engineers would not necessarily be called


as the body of the knowledge, because licensing doesn’t mean that they
are actually specialized in their work.

2|Page
 There are no strict criteria in issuing the license for the professionals, if
the strict criteria are applied to the software engineers, then 50% of the
professional software engineers would lose their Jobs and Microsoft
office will be closed. (Barkhatt, 2015)

 OMAN PRIVACY CHALLENGES AND ISSUES OF COMPUTER

Oman is having issues related to the cyber crime as many of the other countries are
also facing the same problem in the Globe. As per the report there is loss of $140
billion every year which includes the stolen information from credit card in Oman.
The CEO of Oman (Information Technology Authority)- ITA Dr. Al Ruzaiki have
said the computer privacy issues would have a devasting effect on the Economy of the
Oman as in 2018 there where more than 69000 attacks on the websites of the Oman
which had affected on the infrastructure sectors of Logistic, banks, gas and Oil
industries. So, like many other countries even the Oman is facing the challenges of the
computer privacy. (Robert, 2020)

Oman is among the third country to fight and prepare against the cyber security after
Canada and U.S, it is ranked in the Global security of index. Oman applied a high
security strategy to strengthen its organizational structure and international co-
operation of all the companies. The Oman country took the challenges of the
computer privacy where there was a checks and audit of all the Cyber securities to
keep the data of computer secured and safe. (David, 2018)

In 2010 the Oman country launched (Oman Computer Emergency Readiness Team)-
OCERT, which helped them to keep the privacy of both private and public internet
users. But still it becomes the challenging for the Oman country to safeguard the
privacy of the computer due to the cyber security threats. But still Oman is a country
which is well prepared to deal with the threat of the cyber-crime and computer
privacy. (Salina, 2018)

3|Page
 MAJOR DIFFERENCE OF CRIME COMMITTED ON INTERNET AND
CRIME COMMITTED WITHOUT THE USE OF INTERNET

Cyber crime is committed with the use of the technology, Traditional crime is method
of committing the crime without the use of the internet and both of the crimes
intention might be for same purpose. i.e. Revenge, extortion, terrorism and accessing
and obtaining the data. So, there is no much difference in the crime committed with or
without internet, eventually the intention of the criminal in both are of the crime.
(Adam, 2017)

In method of cybercrime, the criminal gathers the data and attacks the websites
through the use of the internet, this is done by the professional hackers, disgruntled
youths for their personal benefit. For example: The robbers might attack the bank to
steal all the moneys of the bank, gang of cyber criminal might break the computer
networks to steal the data of the Bank. From this illustration clearly, we come to know
that the intention of the crime of both the criminal was same, that was to steal the
money from bank. Methods of stealing might be different but their intention was of
criminal mind. (Adam, 2017)

Cyber-crime is extremely very dangerous for the country and several countries having
a law related to the crime activities. Where in Oman, if the person who commits the
cyber crime activity will be sentenced to jail for several years. Both the traditional
crime and cybercrimes are extremely dangerous for the society and also country’s like
Oman, USA and Canada are having a high level of security strategy to avoid this
crime. (Adam, 2017)

4|Page
 REFERENCE

Lucy, 2016. Licensing | Improving Software Quality. [online] Cs.stanford.edu. Available at:


<https://cs.stanford.edu/people/eroberts/courses/cs181/projects/2010-
11/Licensure/indexba53.html?page_id=2> [Accessed 14 November 2020].

Barkhatt, 2015. Software Licensing: Why It's Important And How It Can Help You. [online]
WorkingMouse. Available at: <https://workingmouse.com.au/innovation/software-licensing-
why-its-important-and-how-it-can-help-you> [Accessed 14 November 2020].

Robert, 2020. A New ‘Cyber Defence’ System In Oman Raises Human Rights Concerns ·
Global Voices Advocacy. [online] Global Voices Advocacy. Available at:
<https://advox.globalvoices.org/2020/09/18/a-new-cyber-defence-system-in-oman-raises-
human-rights-concerns/> [Accessed 14 November 2020].

David, 2018. Oman Third Best Prepared In World To Thwart Cyber Attacks. [online] Itu.int.
Available at: <https://www.itu.int/en/ITU-D/Cybersecurity/Pages/Oman-third-best-prepared-in-
world-to-thwart-cyber-attacks.aspx> [Accessed 14 November 2020].

Salina, 2018. Oman Reported 430,000 Cyber Attack Attempts In 2018. [online] Oman
Observer. Available at: <https://www.omanobserver.om/oman-reported-430000-cyberattack-
attempts-in-2018/> [Accessed 14 November 2020].

Adam, 2017. What Is The Difference Between Cyber Crime And Traditional Crime? - PGI.
[online] PGI. Available at: <https://www.pgitl.com/blog/what-is-the-difference-between-cyber-
crime-and-traditional-crime/> [Accessed 14 November 2020].

5|Page

You might also like