Computer Ethics

24
1 Computer Ethics Computer Ethics Revised Revised Prepared by: Ieschecia Allen Prepared by: Ieschecia Allen INST 701-05A INST 701-05A Fall 2008 Fall 2008 October 1, 2008 October 1, 2008

description

 

Transcript of Computer Ethics

Page 1: Computer Ethics

1

Computer EthicsComputer EthicsRevisedRevised

Prepared by: Ieschecia AllenPrepared by: Ieschecia AllenINST 701-05AINST 701-05AFall 2008Fall 2008October 1, 2008October 1, 2008

Page 2: Computer Ethics

2

Wow! Let me tell you about a new type of ethics that has emerged.

Since the introduction of the World Wide Web, the definition of ethics has evolved. Computer ethics is concerned with examining the social and ethical impacts of information technology. Since 1985, the field of computer ethics has grown rapidly and Goriak (1996) points out computer technology has ethically become revolutionize, requiring human beings to re-examine the foundations of ethics as it is applied to every day life.

Introduction Introduction

Page 3: Computer Ethics

3

Computer technology is the most powerful and flexible technology ever devised. This presentation will give you an overview of the three(3) areas of computer ethics:

Copyright and Licensing Issues Censorship and the Internet Information Privacy Issues.

Technology should be explored in a social and ethical way to reveal strategies that could be implement to help ensure privacy.

Page 4: Computer Ethics

4

History

Page 5: Computer Ethics

5

HistoryHistory

Computer ethics as a field of study was founded by MIT Professor Norbert Wiener during World War two (early 1940’s) while helping to develop an antiaircraft cannon capable of shooting down fast warplanes. (Bynum, 2000). Ethics, in the classical sense, refers to the rules and the states governing the conduct of an individual with others. As information technology accelerates, so does the human appetite acquire more knowledge.

Page 6: Computer Ethics

6

History (con’t)History (con’t)In 1950 Wiener published the computer ethics

book, “The Human Use of Human Beings”, which not only established him as the founder of computer ethics, but far more important, laid down a comprehensive computer ethics foundation which remains today (Bynum, 1985).

In 1960’s computers help make it possible for “big-brother” government agencies to invade others privacy. This became a public worry and led to book, articles, government studies, and proposed privacy legislation.

Page 7: Computer Ethics

7

History (con’t)History (con’t)

In 1976’s Walter Maner noticed that there is need for a separate branch of applied ethics, which he dubbed “computer ethics”.

In 1985 Deborah Johnson gave created a major textbook on the Computer Ethics and the Ethical Issues that established itself as the standard textbook for university courses.

Page 8: Computer Ethics

8

Copyright and Licensing IssuesCopyright and Licensing Issues

Page 9: Computer Ethics

9

Copyright IssuesCopyright Issues Computer professionals who design and create new Computer professionals who design and create new

information systems and devices are concern with information systems and devices are concern with copyright laws. copyright laws.

Copyright is a form of protection provided by laws to Copyright is a form of protection provided by laws to the authors of original works, otherwise know as the the authors of original works, otherwise know as the owners of intellectual property.owners of intellectual property.

The copyright protects original authorship. This, of The copyright protects original authorship. This, of course, applies only to those who wish to obtain the course, applies only to those who wish to obtain the copyright.copyright.

Page 10: Computer Ethics

10

Copyright IssuesCopyright Issues The World Intellectual Property Organization (WIPO) The World Intellectual Property Organization (WIPO)

authorizes the owner to:authorizes the owner to: Reproduce it;Reproduce it; Prepare derivate works based upon it;Prepare derivate works based upon it; Distribute copies of it to the public;Distribute copies of it to the public; Perform the work publicly; andPerform the work publicly; and Display the work publicly.Display the work publicly.

Only the owner of the copyright itself enjoys the exclusive Only the owner of the copyright itself enjoys the exclusive right of authorizing the making available to the public of right of authorizing the making available to the public of copies of the computer program. copies of the computer program.

It is unlawful to distribute copies of computer games / It is unlawful to distribute copies of computer games / software.software.

Page 11: Computer Ethics

11

Copyright IssuesCopyright Issues

Caching simply means the copying and storing of web Caching simply means the copying and storing of web pages, current laws do not clearly enough define pages, current laws do not clearly enough define what should be done in cases of caching.what should be done in cases of caching.

Increasing popularity of computer and the growth of Increasing popularity of computer and the growth of the Internet, copyright laws are more complex.the Internet, copyright laws are more complex.

Traditional copyright laws often seem outdated in the Traditional copyright laws often seem outdated in the ever-changing technological world. ever-changing technological world.

Page 12: Computer Ethics

12

Licensing IssuesLicensing Issues Copying is defined as the use of someone else’s Copying is defined as the use of someone else’s

intellectual property, and it is therefore illegal. intellectual property, and it is therefore illegal.

Ethics will using the internet raises a number of Ethics will using the internet raises a number of questions about matters like privacy, the security and questions about matters like privacy, the security and confidentiality of data, copyright and intellectual confidentiality of data, copyright and intellectual property law, pornography, hate sites, the dissemination property law, pornography, hate sites, the dissemination of character assassination under the quise of news.of character assassination under the quise of news.

Some cases you may request from the author(s) Some cases you may request from the author(s) permission to reproduce their work. Many authors and permission to reproduce their work. Many authors and publisher have agreement with organizations such as publisher have agreement with organizations such as universities and school systems regarding printing and universities and school systems regarding printing and copying materials.copying materials.

Page 13: Computer Ethics

13

Licensing IssuesLicensing Issues

It is risky to use anybody else’s work without explicit It is risky to use anybody else’s work without explicit permission from the owner. permission from the owner.

Courts have not fully elucidated the relationship Courts have not fully elucidated the relationship between copyright laws and computer. between copyright laws and computer. Responsible Responsible users can minimize the chances of lawsuits by users can minimize the chances of lawsuits by always taking care, and ask before using.always taking care, and ask before using.

Page 14: Computer Ethics

14

Censorship and the InternetCensorship and the Internet

Page 15: Computer Ethics

15

CensorshipCensorship Information is now the life and Information is now the life and

blood of society, its helps to blood of society, its helps to organizations our daily lives. organizations our daily lives. With the advancement of global With the advancement of global information and multimedia we information and multimedia we are more dependant than ever.are more dependant than ever.

To censor something is to look To censor something is to look at it more closely, in order to at it more closely, in order to determine whether or not it is determine whether or not it is obscene, or to ban it if it is obscene, or to ban it if it is obscene. obscene.

Items such as e-mails, blogs, Items such as e-mails, blogs, and spam mail. and spam mail.

The First Amendment makes the The First Amendment makes the possibilities of censorship possibilities of censorship difficulty. difficulty.

Schools and Universities have Schools and Universities have specific rules and guidelines specific rules and guidelines regarding sending unwanted e-regarding sending unwanted e-mails, to minors, and spam mail.mails, to minors, and spam mail.

It is imperative that the new It is imperative that the new technological process and technological process and advancements give the advancements give the opportunity to block and protect opportunity to block and protect your information while surfing your information while surfing the internet. the internet.

Page 16: Computer Ethics

16

The InternetThe Internet The internet has brought The internet has brought

information to those who never information to those who never could have accessed it before.could have accessed it before.

By using computers, the user By using computers, the user sometimes loses site of what it sometimes loses site of what it appropriate behavior.appropriate behavior.

People all over the world can People all over the world can communicate in a matter of communicate in a matter of minutes, and families can minutes, and families can research their heritage from the research their heritage from the comfort of home. comfort of home.

When trying to determine if When trying to determine if the server you are using for the server you are using for your e-mailing process is your e-mailing process is correct, just research to make correct, just research to make sure that carrier allows for sure that carrier allows for spasm blocking.spasm blocking.

In receiving and sending e-In receiving and sending e-mails make sure that your are mails make sure that your are no obscene information no obscene information passing. Please report any passing. Please report any spasm or unwanted spasm or unwanted information to your carrier. information to your carrier.

Page 17: Computer Ethics

17

The InternetThe Internet

The Center for Democracy and Technology (CDT) is the heaviest The Center for Democracy and Technology (CDT) is the heaviest regulated communications medium in the USA. regulated communications medium in the USA.

Several organizations try to maintain the privacy of minors, the most Several organizations try to maintain the privacy of minors, the most important factor is to those unwanted users off the web.important factor is to those unwanted users off the web.

In Technological aspects using computers there are many In Technological aspects using computers there are many regulations and rules govern in the school and university system. regulations and rules govern in the school and university system.

It users must abide by the rules and if they are broken than the user It users must abide by the rules and if they are broken than the user may lose the privileges of there web site and e-mail carrier. may lose the privileges of there web site and e-mail carrier.

Page 18: Computer Ethics

18

Information Privacy Issues

Information Privacy Issues

Page 19: Computer Ethics

19

Information Privacy IssuesInformation Privacy Issues Over the past 223- years the Supreme court has granted privacy Over the past 223- years the Supreme court has granted privacy

protections under, the Fifth and Fourth Amendment. protections under, the Fifth and Fourth Amendment.

There are no specific laws regarding ethics. Individuals maintain the There are no specific laws regarding ethics. Individuals maintain the right to know and see what data is being collected from them, data right to know and see what data is being collected from them, data collection should be limited, specific, and that data collectors will be collection should be limited, specific, and that data collectors will be responsible. responsible.

There are two aspects of privacy online dealing with computer There are two aspects of privacy online dealing with computer ethics.ethics. Need for protection for yourself.Need for protection for yourself. Need to protect your data from strangers. Need to protect your data from strangers.

Page 20: Computer Ethics

20

Information Privacy IssuesInformation Privacy Issues

Online staling has been a problem, with people harassing each other, Online staling has been a problem, with people harassing each other, threatening them, or confronting them in person.threatening them, or confronting them in person.

The CDA state that telecommunications, meaning the internet, e-mail, chat The CDA state that telecommunications, meaning the internet, e-mail, chat and chat programs, should not be used to purposely harass or intimidate. and chat programs, should not be used to purposely harass or intimidate.

There are three levels of online privacy provided by systems administrators:There are three levels of online privacy provided by systems administrators: Complete Privacy: The administrators agrees not to read any of your e-Complete Privacy: The administrators agrees not to read any of your e-

mail or keep track of where you go on the web.mail or keep track of where you go on the web. Almost Complete Privacy: The administrators will look at your e-Almost Complete Privacy: The administrators will look at your e-

mails and chats if they suspect any sort of illegal activity.mails and chats if they suspect any sort of illegal activity. No Privacy: here administrators are allowed to look at any email you No Privacy: here administrators are allowed to look at any email you

send.send.

Page 21: Computer Ethics

21

SummarySummaryComputers have become one the most powerful technology devices in our

world today. The newly emerging field of information technology demonstrates that

ethics will be a key factor. Computers provide us with new capabilities and these in turn

give us new choices for action. A central task of computer ethics is to determine what we

should do in such case to formulate policies to guide our actions. Of course, some

ethical situations confront us as individuals and some as a society. Computer ethics

includes consideration of both personal and social policies for the ethical use of

computer technology.

By monitoring the three(3) concepts: a. Copyright and Licensing Issues, b.

Censorship and the Internet, and c. Information Privacy. Factors about computer ethics

must be address and solved to ensure our constitutional right to privacy.

Page 22: Computer Ethics

22

References References Bynum, T. (2000). A Very Short History of Computer Ethics. The

Research center on Computer Ethics. Retrieved September 9, 2008, from http://www.southernct.edu/organizations/rcs/text-

only/resources_t/reserach_t/introducation

Bynum, T. & Rogerson, S.(1995).Cyberspace: the ethical frontier. Retrieved September 7, 2008, from

http://www.ccsr.cse.dmu.ac.uk/resources./professionalism/developme/theart.html.

Copyright: Guardian of Intellectual Property. (n.d). Retrieved September 8, 2008, from http://library.thinkquest.org/26658/cgi-bin/e-1.cgi

Goriak, G. (1996). The Computer Revolution and the Problem of Global Ethics in Terrell Ward Bynum and Simon Rogers, eds. Retrieved September 9, 2008, from

http://www.southernct.edu/organizations/rcs/text only/resources_t/reserach_t/introducation

Page 23: Computer Ethics

23

ReferencesReferencesJohnson, D. (1999).Computer Ethics in the 21st Century. Retrieved

September 9, 2008, from http://www.southernct.edu/organizations/rcs/text-

only/resources_t/reserach_t/introducation

Johnson, D. (1985). Computer Ethics (2nd Ed). Upper Saddle Rive,

NJ: Prentice Hall.

Maner, W. (1978). Starter Kit on Teaching Computer Ethics. Retrieved

September 9, 2008, from http://www.southernct.edu/organizations/rcs/text-

only/resources_t/reserach_t/introducation

Page 24: Computer Ethics

24

ReferencesReferencesThe Intersection of Copyright and ComputersThe Intersection of Copyright and Computers. (n.d.). . (n.d.). RetrievedRetrieved

September 8, 2008, from September 8, 2008, from http://library.thinkquest.org/26658/cgi-http://library.thinkquest.org/26658/cgi-

bin/e-1.cgibin/e-1.cgi