Ethics In Computer Forensics Essay

820 words - 4 pages

Ethics are principles of right and wrong that individuals as moral agents use to

make choices to influence their behavior. When using ethics in information systems you

have to be aware of the rewards and consequences to the actions made. In Information

Systems ethics has changes toward power, money, rights, and obligations (Efraim

Turban). A social issue in Information’s Systems is a key factor because it also has

influence in making decisions both right and wrong. In Information systems social issues

consists of culture, relationships, ethics, interactions, security, and design.

Ethics issues and social issues in information systems have five moral

dimensions. These moral ...view middle of the document...

Data Storage and costs are, networking advances consists of data being

shuffled from one location to the next, it accesses personal data from remote locations.

Information Systems has many theories of ethics and some of them are

Consequentialism which is maintaining the majority of an action. Depending on the type

of action the consequences maybe nonmoral. Another theory is Value Clarification, it

teaches that an important aspect is not what one believes but it is being aware of your

feelings, beliefs, and values. This type of theory presents values of what a person likes to

do not want to do or start to do. This theory puts heavy value on feelings, and is a term of

Philosophical Relativism.

Utilitarianism is a theory founded on predicting consequences of an action (Nine

Theories of ethics that ruled the world), to people who believe in this theory the choice

that is yielded has greater benefits and then that choice is considered correct. One benefit

of this theory is that people can compare predicted solutions and use a point system.

Legalistic Moralism is when there are pluralities of absolutes, they are considered as one

each covering an area of the human experience. The absolute of this theory doesn’t

conflict with any other absolutes. Some believe that there is not any moral responsibility

for the consequences of the actions.

Situation Ethics decision-making is based on middle ground, which has two

different extremes and then the outcome is usually in the middle (Fletcher, 1995). Ethical

Realism is...

Find Another Essay On Ethics in Computer Forensics

Computer Crime Investigations Forensics Research Essay

546 words - 2 pages presented an opportunity for research of my choice in Computer Crime Investigations Forensics and Tools and Technology by preparing keys points, to define the business research and its purpose, explain the business problem(s) under investigation, identify the parties involved in conducting the research and describing the method(s) used to conduct the research.Research and PurposeThe Computer Crime Investigation Forensic Tools and Technology research

CBSC301 Final Essay

1472 words - 6 pages Profession According to (ISFCE, 2014), All CCEs (certified computer examiner) and CCE Candidates must concur to abide by the ISFCE (international society of forensic computer examiner) Code of Ethics and Professional Responsibility in order to receive and maintain the CCE certification. If an individual does not abide by this code, their behavoir will be subject to examination by the ISFCE Ethics and Professional Responsibility Committee and their

Computer Forensics

1581 words - 6 pages the growing importance of computer security today and the seriousness of cyber crime, it is important for computer professionals to understand the technology that is used in computer forensics. This paper will discuss the need for computer forensics to be practiced in an effective and legal way. It promotes the idea that the competent practice of computer forensics and awareness of applicable laws is essential for today's organizations.Computer

Research Conclusion

1770 words - 8 pages standard of ethics enforced within the field of digital forensics, there may be ethical dilemmas when collecting the evidence from digital forensic investigators taking part in the experiment. While there are “codes of ethics” required for membership within private digital forensic organizations, there is no central authority which oversees the enforcement of a universal code of ethics within the field. Therefore the ethical standards of each

A History of the FBI Regional Computing Forensics Laboratory

1219 words - 5 pages One of the most important aspects of studying a history of a place is why that place came into existence in the first place. The FBI's Regional Computer Forensics Laboratories are perhaps not a terribly well-known entity within the general public, yet they play an essential part in both our justice system, and our everyday lives. So this begs the question, why would a laboratory centered strictly around computers, even more specifically the

A Forensics Memory Study of Malware in Android Operating Systems

2744 words - 11 pages attacks when they occur on mature operating system platforms such as Windows and Linux. However, due to the immaturity of Android memory image forensics, it is relatively problematic and time consuming to conduct such investigations on Android systems. In this research, we take advantage of recent advances in Android memory forensics technologies to explore a sample of these malware attacks, utilizing the open source digital forensics Volatility, a

The NIST Computer Forensics Tool Testing Program

728 words - 3 pages In order for computer forensics findings to be admissible in a court of law, the tools and methods used to collect such data must ensure its integrity. According to Marie-Helen Maras (2012), “As with other forms of evidence, the original captured network traffic data must be kept intact. An investigator must ensure that any programs that are run to obtain evidence do not modify data on the system” (p.286). The National Institute of Standards

Criminal Justice Fields

978 words - 4 pages forensics relating to the recovery of digital evidence or data from a mobile device under forensically sound conditions. The use of phones in crime was widely recognized for some years, but the forensic study of mobile devices is relatively new field, dating from the early 2000s. Smartphones, the news technology in mobile devices, have caused a demand for forensic examination of the devices, which could not be met by existing computer forensics

Cloud Forensics

1033 words - 5 pages Detection System) or PDS (Intrusion Prevention System) solution to the network, which is only analysing traffic for malicious behaviour and alerting the provider of such activity. Storage Since there is no ultimate perfect computer crime, storage is the major reason why digital forensics hatched in the first place as data or trail would be left behind after any attack or intrusion. When hardware access to the machine is determined, one knows exactly

Data Acquisition

1869 words - 7 pages verified. In addition, failures can and do occur, so you should learn how to use several acquisition tools and methods. Storage Formats: The data a computer forensics acquisition tool collects is stored as an image file in one of three formats. Two formats are open source and the third is proprietary. Each vendor has unique features, so several different proprietary formats are available. Depending on the proprietary format, many computer

Digital Collection

935 words - 4 pages 1. Describe at least 5 steps in a process to collect digital evidence to the time you testify that you consider important. Please explain why they are important. For this particular example we will assume that the warrant for search and seizure was requested and executed lawfully and did not violate any part of the Fourth Amendment. 1. First and Foremost… Having the right person to do the job. Computer forensic investigators have the tough job

Similar Essays

Computer Forensics: Issues In Preserving Digital Evidence And Forensic Investigation

1931 words - 8 pages tools are not used and followed. An existing issue in FIT is computer forensics, in regards to preserving digital evidence and effectively conducting a computer forensics investigation. Computer forensics can be defined as the who, what, when, and how of digital (electronic) evidence and how techmology is used to preserve, authentic, and analyze the evidence collected (citation 17utah). If obtained evidence is not handled propely, this could

Computer Ethics Integrity In The Work Place

1751 words - 7 pages Ethical issues emerge everyday in the computer software industry. Often the employees receive immense pressure from their manager and other project team members to get a product finished to meet a deadline. Receiving pressure from these parties are normal, the problem comes in when the parties are pressuring to complete the project by unethical means.During my work experience the previous summer, I have experienced such a situation where I

Questions Of Ethics In Computer Systems And Their Future

4883 words - 20 pages just too much government agency in everyone's face.Not only will the federal government want their piece of the action, let's not forget cash strappedstates like New York will also be looking for their's to. I will discuss this more in question #3.3) Discuss ethics and surveillance concepts that pertain to this situation.The ethics problems I would like to discuss from both sides of the equation. From thestandpoint of the trader the ethics problems

Cbsc301 Midterm Essay

1236 words - 5 pages Companies Specializing in Computer Forensics and Updates on Computer Crime Prosecution Computer forensics is defined as the act of analyzing digital information in an attempt to discover evidence and report the findings in a legally admissible form. Computer forensics teams are highly trained individuals with ongoing training that helps them keep up with the current trends in computer crime. Certifications qualify these individuals to conduct