Case Study Example: UML Use Cases and Operating System/Computer Components

6 pages
1456 words
Carnegie Mellon University
Type of paper: 
Case study
This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

The internet has provided many people with the power to capture, produce, and distribute text images as well as videos. However, it is becoming an integral part of the daily activities of people and is continuing to transform their lives in they way they communicate and relate to one another. This highly attributes to the moral responsibility in the society; thus, if misused by its users it can lead to child porn, sexting, hate speech, forgery, fraud, and copyright among others hence destroying the society morality. The government should come up with laws that ensures that the under age and the venerable are highly protected from such elements.

Security refers to a broad range of technologies, policies, and controls which are deployed to protect applications, data, and the associated infrastructure that entails cloud computing. It is regarded as a sub-domain of network security, computer security, and information security. With the increased level of technology, the issue of cyber-attack has been one of the major problems government as well as companies faces. People are improvising new means of hacking into network system and steal information from other agencies. As such, it is important to secure such data since it can disclose important information once stolen. One of the ways of strengthening cloud security is the use of MIST Algorithms (Suh, & Han, 2003). Cloud computing is increasing in popularity in eth field of the computer since. Due to the increased usage, the aspect of data protection and reliable has become paramount.

Ethics is an integral part of IT professionals operations. Ethics can be described as set of principles that guide the actions or behavior of an individual or a group of individuals. An IT professional is regarded as conducting himself or herself ethically if they adhere to the generally set codes of conduct of the group that establish that consideration. The conducts that are most ethically accepted are nearly general across human traditions and are more so as a result of cultural hegemony and globalization. For instance, the use of cookies to track software, whereby businesses are in a position of collecting information to monitor their search behavior as well as their patterns of purchasing online all appear in the same ethical and moral discussions in different areas. In addition, whereas these subjects remain open for discussion in their nuances, we find that they are intrinsically perceived as unethical and eventually not necessary and avoidable. Every community retains certain principles that sets the limits for acceptable conduct, which are usually expressed in the statements regarding the manner in which one is to carry out himself or herself. Such statements combine to create a moral code whereby a member of the community is expected to adhere to. Morals refer to those ideas that define the right thing and those that are wrong, which at times can clash or come into conflict.

On the scenario of the client wanting me to cut the costs by not installing enough security measures on their system, it would be right to do as they wish. First, many clients or individuals always want to spend the least possible amount on getting their things done. Regarding the IT systems, also many clients do not always understand how they work and how serious they are supposed to be taken when building. It would be unethical to go against the wish of the client and develop what they did not want. In this case, I would just be developing the system according to the clients instructions. After explaining to them about the importance of installing strong security measures and they do not want to hear any of it due to financial constraints, the best thing is doing it according to their budgets.

Another alternative would be covering the costs on behalf of the client. I do not think this option is viable because I am also in business and nearly all the resources being used are acquired from somewhere and money is involve; so it would also not be fair on the side of the developer or IT specialist. It should also be remembered that there is an agreement between the developer and the client regarding the components of the system. Meaning that the client is well aware of the risk that he or she is getting into. It would have only been wrong of I developed the system then the client gets to realize later that the work done was not complete, and that it has resulted to various damages.

Technology users have the responsibility to ensure that they do not misuse it. However, neither the public policy nor technology is able to effectively address and control the dangers and concerns on the internet. For instance, the law has been out of step with adolescent sex texting. Therefore, use of snapchat will help to ensure that unnecessary materials are not shared on the internet by self-destructing after ten minutes. To this extent, the client is protected and as the developer of the system, I would ensure that I do not go against any of these basic principles. This has made the government to focus on social and education strategies. These strategies are not effective enough because internet users have misuse it because they are no consequences. Therefore, the government has really tried to modify its laws in order to ensure that individuals and the society are protected from the misuse (Ernest Chang, & Ho, 2006).

First, the government should assist in funding the development of computer systems that can independently detect and monitor internet misuse. This would protect individuals such as the client in this scenario, who would like their systems developed but not complete due to financial limitations; this is to ensure that they are protected from potential attackers. For instance, it can encourage the development of a camera apps that will allow users to take videos and photos inconspicuously while directly uploading the files to a chosen location. This would ensure that individual use the internet as required by the law and crucial would be information is protected. Second, the government should enact very strict laws to internet offenders. This will help to change the mindset of individual on internet misuses because of its aftermath as enforced by the law. Furthermore, the government should create awareness on the dangers and consequences.

Third, the law should ensure that personal privacy is protected by ensuring that personal information is not shared on the internet. For example, twitter and Facebook amplify thing through sharing inappropriate information. Additionally, individuals that buys materials or information obtained as a result of internet misuse should also be punished by the law. This will ensure intellectual property is protected because the law will protects people from piracy.

Fourth, the government should ensure that the law protects its citizens from cyber theft. This will protect personal information and minimize fraud. Moreover, it should allow internet serves provider to copy their tariffs and then redirecting it to a new computing center that the government can built for security purposes. This will help to collect the terrific data that will be used to map the movement of communication among individuals. Fifth, the law should ensure that internet users are not misguided by the information they acquire or share (Bulgurcu, Cavusoglu, & Benbasat, 2010). This will ensure that they do not risk their lives when trying to do or visit dangerous places such as visiting the wedding cake rock.

All countries across the world should come together and agree on cyber-crime laws. This will ensure that networks are monitored and traffic data will be stored. Critically, this will help countries to gather information and creating faultless web surveillance across the world. It will also assist the world to fight against terrorism because of those individuals that use the internet to organize protests.



Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 34(3), 523-548.

Ernest Chang, S., & Ho, C. B. (2006). Organizational factors to the effectiveness of implementing information security management. Industrial Management & Data Systems, 106(3), 345-361.

Suh, B., & Han, I. (2003). The impact of customer trust and perception of security control on the acceptance of electronic commerce. International Journal of electronic commerce, 7(3), 135-161.

Cutter, S. L., Burton, C. G., & Emrich, C. T. (2010). Disaster resilience indicators for benchmarking baseline conditions. Journal of Homeland Security and Emergency Management, 7(1).

Ernest Chang, S., & Lin, C. S. (2007). Exploring organizational culture for information security management. Industrial Management & Data Systems, 107(3), 438-458.

Huang, D. L., Rau, P. L. P., Salvendy, G., Gao, F., & Zhou, J. (2011). Factors affecting perception of information security and their impacts on IT adoption and security practices. International Journal of Human-Computer Studies, 69(12), 870-883.


Have the same topic and dont`t know what to write?
We can write a custom paper on any topic you need.

Request Removal

If you are the original author of this essay and no longer wish to have it published on the website, please click below to request its removal: