© Paradigm Publishing, Inc. 14-1 Chapter 14 Computer Ethics Chapter 14 Computer Ethics.

35
© Paradigm Publishing, Inc. 14-1 Chapter 14 Computer Ethics Chapter 14 Computer Ethics

Transcript of © Paradigm Publishing, Inc. 14-1 Chapter 14 Computer Ethics Chapter 14 Computer Ethics.

© Paradigm Publishing, Inc. 14-1

Chapter 14 Computer Ethics

Chapter 14Computer Ethics

© Paradigm Publishing, Inc. 14-2

Presentation Overview

• The Role of Ethics• Privacy Protection Issues• Property Protection Issues• Personal and Social Issues• Defining Software Companies’ Responsibilit

ies• Developing Personal Ethical Guidelines

© Paradigm Publishing, Inc. 14-3

The Role of Ethics

What are ethics?– Ethics are the rules we use to determine the

right and wrong things to do in our lives.– Normative ethics involves determining a norm

of ethical rule that underlies ethical behavior.– Applied ethics refers to the application of

normative ethical beliefs to real-life issues.– Computer ethics deals with ethical issues

related to computers.

© Paradigm Publishing, Inc. 14-4

The Role of Ethics

The Source of Ethics– In moral realism, ethical principles are thought

to have objective foundations; that is, they are not based on subjective human reasoning.

– In moral relativism (also known as situational ethics), ethical issues are thought to be subjective.

© Paradigm Publishing, Inc. 14-5

Privacy Protection Issues

Public Information Availability– Database companies comb personal

information such as birth records and marriage licenses and provide this information to anyone with a credit card and access to the Web.

– Other personal information such as salaries, and controversial information such as criminal records and sex offender information, also appears on the Internet.

© Paradigm Publishing, Inc. 14-6

Privacy Protection Issues

Threats to Privacy from Interception of Wireless Communications

– Wireless communications devices are extremely vulnerable to interception by others.

– Traditional methods of computer security don’t work well for wireless devices.• Wireless devices often don’t require authentication

to ensure the identity of the user and the device.• Encryption technology doesn’t work well because of

the devices’ limited battery power and memory.

© Paradigm Publishing, Inc. 14-7

Privacy Protection Issues

Commercial Threats to PrivacyCookies

• A cookie is a small data file created and placed on a computer’s hard drive by a Web site.

• They are meant for the convenience of Internet users and can remember user IDs and passwords.

• They can also be used to record user interests and preferences, which can then be used by companies to target advertisements.

© Paradigm Publishing, Inc. 14-8

Privacy Protection Issues

Commercial Threats to PrivacyGlobal Unique Identifiers

• A global unique identifier (GUID) is an identification number that can be coded into both hardware and software.

• The use of GUIDs would eliminate any anonymity Internet users now enjoy.

• With GUIDs, it would always be possible to track down the originators of unpopular or controversial messages—a severe blow to Internet privacy.

© Paradigm Publishing, Inc. 14-9

Privacy Protection Issues

Commercial Threats to PrivacyLocation Tracking

• Most cell phones are equipped with Global Positioning System (GPS) chips that can pinpoint their locations.

• GPS chips are useful as navigational aids and monitoring devices, and can promote safety.

• GPS chips and other location tracking technology can also be used to target advertisements and to figure out where any person is at any given time, which can encroach on the right to privacy.

© Paradigm Publishing, Inc. 14-10

Privacy Protection Issues

Protection from Commercial Threats to PrivacyIndustry Self-Regulation

• A privacy statement promises that an e-tailer will protect the confidentiality of any information a customer reveals.

– Third-party organizations like the BBBOnLine lend greater credibility to privacy statements.

• New software lets users designate that files sent to others have one-time-only viewing rights, cannot be copied, or can only be viewed for a few hours’ time.

© Paradigm Publishing, Inc. 14-11

Privacy Protection Issues

Major Privacy Protection Laws

© Paradigm Publishing, Inc. 14-12

Privacy Protection Issues

Major Privacy Protection Laws (continued)

© Paradigm Publishing, Inc. 14-13

Privacy Protection Issues

Government Threats to PrivacyEavesdropping

• To better monitor e-mail messages, the FBI developed a series of Internet wiretap programs named Omnivore, Carnivore, and DCS1000.

• The USA PATRIOT Act allows law enforcement agencies to eavesdrop on private telephone messages and to intercept and read e-mail messages.

Some fear that innocent messages will be misinterpreted, resulting in criminal charges.

© Paradigm Publishing, Inc. 14-14

Privacy Protection Issues

Government Threats to PrivacyEncryption Restrictions

• Encryption software makes it harder for the government to monitor e-mail messages.

• The FBI has warned that its role in protecting the nation will be negatively affected by this.

• The NSA restricted the use of encryption programs for many years, but control was loosened due to commercial interests in protecting consumer data.

• Given the rapid advances in technology, government control of encryption probably will not be effective.

© Paradigm Publishing, Inc. 14-15

Privacy Protection Issues

Workplace Threats to PrivacySoftware programs allow employers to monitor employees by

• Tracking the number and type of keystrokes employees enter on their keyboards

• Reading messages sent and received• Capturing what is on an employee’s computer

screen at a given time

© Paradigm Publishing, Inc. 14-16

Privacy Protection Issues

Protection from Workplace Threats to Privacy– If a company has pledged to respect any aspect

of employee privacy, it must keep that pledge.– Privacy advocates and the American Civil

Liberties Union (ACLU) question the need to monitor employees without warning and without limit.

© Paradigm Publishing, Inc. 14-17

Privacy Protection Issues

Fair Electronic Monitoring Policy for Employers (proposed by the ACLU)

© Paradigm Publishing, Inc. 14-18

Property Protection Issues

Intellectual Property– Intellectual property includes anything that

can be created by the human mind.– A patent awards ownership of an idea or

invention to its creator for a fixed number of years.• This allows the inventor the right to charge others

for the use of the invention.

– A copyright protects artistic and literary endeavors.

© Paradigm Publishing, Inc. 14-19

Property Protection Issues

Intellectual PropertyThe World Intellectual Property Organization (WIPO) is a specialized agency of the United Nations dealing with intellectual property rights.• The WIPO administers international treaties dealing

with intellectual property.• The WIPO divides intellectual property into two

categories: industrial property and copyright.

© Paradigm Publishing, Inc. 14-20

Property Protection Issues

WIPO Intellectual Property Classifications

© Paradigm Publishing, Inc. 14-21

Property Protection Issues

Fair UseUnder Fair Use law, it is permissible to use another person’s material without permission as long as this use

• Is acknowledged• Is for noncommercial purposes• Involves only limited excerpts of protected material

© Paradigm Publishing, Inc. 14-22

Property Protection Issues

Fair Use and the Digital Millennium Copyright Act

The Digital Millennium Copyright Act (DMCA) brings U.S. copyright law in line with WIPO treaties to which the U.S. is a signatory.

• It prohibits the circumventing of copyright protection systems.

• It clarifies the concept of Fair Use for digital works.• It deals with the issue of an ISP’s liability for

hosting copyrighted materials.

© Paradigm Publishing, Inc. 14-23

Property Protection Issues

Damage Due to Hacking, Phishing, and Viruses

– Identity theft is theft of personal data which is then used to assume that person’s identity and make purchases in his or her name.

– Phishing uses sophisticated tricks to “fish” for users’ financial information and passwords.

– Viruses cause damage to a user’s computer or the software running on it.

© Paradigm Publishing, Inc. 14-24

Property Protection Issues

Protection from Hacking, Phishing, and Viruses

Consumers can protect themselves by• Dealing only with merchants who encrypt credit

card numbers and other private data• Never opening e-mails from unknown sources• Installing antivirus programs to destroy viruses• Installing firewall software to protect against

Internet-connected computer hackers

© Paradigm Publishing, Inc. 14-25

Personal and Social Issues

Gambling Online– Online gambling is attracting a growing

number of gamblers, including teenagers.– The Internet gambling industry is based almost

entirely outside the United States.– The U.S. House of Representatives passed

legislation allowing authorities to work with Internet providers to block access to online gambling and prevent users from using credit cards to gamble.

© Paradigm Publishing, Inc. 14-26

Personal and Social Issues

Protecting Freedom of Speech– Hate speech sites incite hatred against people

of certain races, religions, or beliefs. They may also post dangerous material such as information for making drugs or bombs.

– Cyberbullying is sending harassing texts, e-mail messages, or photos with the purpose of harming another person’s reputation.

– Pornography sites contain sexually explicit material or script deemed harmful by society.

© Paradigm Publishing, Inc. 14-27

Personal and Social Issues

Protecting Against Unwanted Material– The Child Protection Pornography

Prevention Act of 1996 enacts harsh penalties for those distributing or possessing child pornography.

– The Children’s Internet Protection Act (CIPA) requires public schools and libraries to install Internet filtering software on their computers.

© Paradigm Publishing, Inc. 14-28

Personal and Social Issues

Protecting Against Unwanted Material– A filtering program can prevent access to

sites, keep track of sites visited, limit connection time, etc.

Certain organizations provide schools with guidelines for evaluating Internet filtering programs.

– The Consortium for School Networking recommends that every school adopt an acceptable use policy to guide Internet use.

© Paradigm Publishing, Inc. 14-29

Personal and Social Issues

Bridging the Digital Divide– The gap between those who have access to

computers and the Internet and those who do not has been called the digital divide.

– Only 5 percent of the population in developing countries has Internet access.

© Paradigm Publishing, Inc. 14-30

Personal and Social Issues

Demographics of U.S. Internet UsersAccording a 2008 report by the Pew Internet & American Life Project, English-speaking Hispanic Americans lead the U.S. in Internet usage, with 80 percent online.

• Caucasian Americans – 75%• African Americans – 59%• Spanish-dominant Hispanics – 32%

© Paradigm Publishing, Inc. 14-31

Defining Software Companies’ Responsibilities

Protecting Against Poorly Designed Software– Bad software costs U.S. businesses an

estimated $100 billion in lost productivity annually.

– Customers may sue if bad software causes damages, but a better solution is for companies to produce better software in the first place.

© Paradigm Publishing, Inc. 14-32

Defining Software Companies’ Responsibilities

Improving Accessibility– In late 2000, the government issued new rules

requiring almost all government websites to be fully accessible to the disabled.

– Hardware must also be adapted to accommodate the disabled.

Apple Computer has pioneered these efforts with the invention of the “sticky keys” feature.

© Paradigm Publishing, Inc. 14-33

Defining Software Companies’ Responsibilities

Software Engineering Code of Ethics and Professional Practice

© Paradigm Publishing, Inc. 14-34

Developing Personal Ethical Guidelines

All Internet users should read, think about, and consider adapting for their own use a computer code of ethics.

The following are the top ten themes found in effective codes of ethics:

© Paradigm Publishing, Inc. 14-35

On the Horizon

Based on the information presented in this chapter and your own experience, what do you think is on the horizon?