This website uses cookies to ensure you have the best experience. Learn more

Computer Ethics Essay

2395 words - 10 pages

Computer Ethics-NDex
Danielle E. Maire-Jackson
IS535ON: Managerial Applications of Information Technology
12-5-10
Professor McElyea

TABLE OF CONTENTS

I. Definition of Computer Ethics 3

II. Background of NDex 4

III. Discussion of Business Issues 5

IV. Proposed Solution 6

V. Recommendations for the Executive Committee 8

VI. References 11

I. DEFINITION OF COMPUTER ETHICS
“Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic ...view middle of the document...

Since the introduction of the World Wide Web into businesses, the definition of ethics has evolved. A new type of ethics known as computer ethics has emerged. Computer ethics is concerned with standards of conduct as they pertain to computers”. (Webster’s Dictionary, 2010).

II. BACKGROUND OF NDEX
Introduction to NDex, National Default Exchange
NDex, National Default Exchange provides comprehensive mortgage default processing services to law firms nationwide. With national reach and established relationships and a targeted, state-by-state approach, NDex provides its law firm clients with unmatched service through its proprietary, state-of-the-industry Veritas Case Management System. (NDex)
NDex allows default servicing law firms to provide industry leading processing support to their clients while maintaining the ability to adapt quickly to changing market conditions without the expense or inconvenience of adjusting staff size. With origins as the highly successful processing unit of one of the nation’s largest and most progressive law firms serving the real estate finance industry, NDex offers an efficient, productive and time-tested approach to default processing. NDex respects the value of relationships and understands the nuances of local knowledge and experience.
Some of the advantages that NDex offers are
• Support of all foreclosure-related activities, including loss mitigation.
• Advanced proprietary case management software and automated electronic filing and
processing systems.
• Compliance with lender guidelines, case audit standards and reporting formats.
• Adherence to regulatory and consumer protection laws and standards.
• Established relationships with the nation’s major servicers allows you to take on new
work without investing in processing infrastructure.
• Adaptability to foreclosure and bankruptcy case levels in without the expense,
inconvenience or disruptions associated with adjusting staff size.
• IT services and support for non-legal processing staff.
NDex’s processing staff is organized around a team concept, working under the supervision and guidance of one of the most experienced default processing management teams in the nation. Our unique team approach allows us to treat your clients like our own while delivering impeccable service.  NDex is committed to exceeding client expectations. Our people live and breathe timeframes. Our teams go above and beyond. In addition, our company settles for nothing less than outstanding.
III. DISCUSSION OF BUSINESS ISSUES
“The Information Technology Revolution is probably the most important force shaping communities today. While some of the key forces behind the IT revolution are universal, the impacts on any given community will be unique, depending on its individual make up, economic structure, attributes and responses. Technology proves...

Other Essays Like Computer Ethics

Accounting Information System Report

2045 words - 9 pages : http://www6.montgomerycountymd.gov/content/cjcc/pdf/computer_crime_study.pdf (Accessed: September 18, 2013) Thomson, A.J. & Schmoldt, D.L. (2001) ‘Ethics in computer software design and development’, Computers and Electronics in Agriculture, Volume 30, Issues 1–3, February 2001, pp. 85-102.

Are We Too Dependent on Computers?

647 words - 3 pages time outdoors but play various computer games, which are often full of violence. The main functions of computers is to store information that we can retrieve and use for our development. Education and work ethics have lost their primary importance due to the fact that computers have taken over the time we would have spent on obtaining these information that we need at various institutions, eg library, and spend time surfing entertainment on the

Evaluating Ethics and Security Within an Organization

1366 words - 6 pages types of viruses. Some types that it helps protects against are Trojan horses, and worms. These viruses get on the Evaluating Ethics and Security 5 computer they can take up space, spread to other computers, delete files, and even erase everything off the computer. Next is intermediate system security. Some things that the company should have in

Business Ethics: the Role of Culture and Values for

5965 words - 24 pages Research Quarterly Published by the Society for Human Resource Management Business Ethics: The Role of Culture and Values for an Ethical Workplace FOURTH QUARTER–2009 Whether in domestic or global companies, ultimately, the commitment to business ethics and the foundation is built through organizational culture, with ethical values reflected in the workplace. Business Ethics: The Role of Culture and Values for an Ethical Workplace

Principles of Marketing Midterm Exam

974 words - 4 pages marketplaces in order to determine how a business can optimally compete in them. The market planning process typically results in a marketing strategy that can be used to enhance sales for the business producing it. 3. List three ways an organization will benefit from the development and use of a code of ethics. Mutual Respect and Integrity A code of ethics creates a sense of respect based on integrity with in a business. When people know

Business Ethics

1460 words - 6 pages Running head: Business Ethics Persuasive Draft Business Ethics Persuasive Draft Jamesina Charles Kaplan University CM225-08 March 16, 2010 Business Ethics Persuasive Draft Despite the bad economy, a percentage of businesses have increased their ethical culture from 9 percent to 18 percent in the past two years based on the study done by the Ethics Resource Center. (Nortz, 2010) All businesses should have an ethics code that links

Hacking And Ethics

1202 words - 5 pages Hacking should not be considered a crime, but rather, a pursuit of knowledge. Computers and microprocessors have given rise to new types of crime. Computer hacking is, seemingly, one of these crimes. People hack for various reasons, but to say they all intend to steal or purposefully cause disruption would be unjust.A hacker is an individual who enjoys the intellectual challenge of creatively overcoming limitations, namely in the fields of

Computer Crime

621 words - 3 pages Computer Crime Question #2 Computer Crime Daniel Kilburn Computer Science 300 Professor Christensen May 11, 2007 Question #2 Computer Crime The Penetration Attack: This type of attack involves breaking into a system using the known security flaws of the system. Once the intruder has penetrated the system he has access to the entire systems resources. Acting as an authorized user the intruder can perform any task that

Importance of Ethics to Business Success

844 words - 4 pages Ethics commonly refers to the rules and principles that define right and wrong conduct. Ethics is defined by Miner (1998) as a philosophy of human conduct; reflecting prevailing values especially those of a moral nature. According to Kiston, (1996) ethics are moral principles that explain what is right or wrong, good or bad and what is appropriate or inappropriate in various setting. Blanchard and Peale (1988) defined ethics as the guiding

Ethics in Software Industry

1183 words - 5 pages the unethical and illegal uses of computers by professionals 26. The general guideline on computer ethics is needed for Protection of Personal data, Computer Crime, Cracking 27. The personal data can be protected using Physical Security, Personal Security, Personnel Security 28. Physical Security is protecting the h/w, magnetic disks that can be damaged / destroyed 29. Personal Security refers to permit only authorized to access the system

Ethical Issues for It and Information Professionals

601 words - 3 pages Ethical Issues for IT and Information Security Professionals Sandra J. Crossin Information Security Management- MGMT 394 Embry Riddle Aeronautical University Abstract This paper summarizes and evaluates an article addressing the ethical issues involved with being information security personnel. It will attempt to show several areas where ethics can become an issue and stimulate questions regarding activities that are not illegal, but

Related Papers

Computer Science Info Age And Ethics Essay

1199 words - 5 pages Computer Science Info-Age and Ethics New times bring new crimes. It's a story as old as humanity and as new as the Internet. First come cars, and then car thieves. Telephones are followed by telephone fraud. Now we've got computers . . .. To make home, school, and office life easier, society relies on computers. As a result of this dependency, computer use grows everyday. Along with the growing use of computers

Ethical Issue Essay

1204 words - 5 pages Introduction Today’s world computer crimes are internet related, and in this area carrying out law barriers are either not well defined or most of the countries they don’t have arraign cyber crime laws. Those laws deliver the absence of the safe, the only substitute is protection against apparent warning exists is to develop ones own, depend on constitutional protection, a big range, and ethics to reduce constitutional entrance. Establishing

Draft Scientific Paper

3506 words - 15 pages PROJECT MANAGEMENT “The state of software engineering ethics in Nigeria’s fast improving information and communications technology, implications and way forward”. WRITTEN BY AHMED SHAFII BU/11a/IT/0019 INTERACTION DESIGN ABSTRACT Software engineering (SE) is the profession concerned with specifying, designing, developing and maintaining software applications by applying technologies and practices from computer science, project

Ethics In Cyberspace Essay

870 words - 4 pages , copyright, and commercial uses of the network. AUP also known as Acceptable Use Policy is recommended as the way an organization should inform users of expectations and responsibilities. Sample AUPs are available on gopher sites and can be retrieved by using Veronica to search keywords "acceptable use policies" or "ethics." The Computer Ethics Institute in Washington, D.C. has developed a "Ten Commandments of Computing": 1) Thou shalt not