Ethics Objective: Describe ethical considerations resulting from technological advances.
-
Upload
janis-joseph -
Category
Documents
-
view
215 -
download
0
Transcript of Ethics Objective: Describe ethical considerations resulting from technological advances.
Ethics• What is Ethics?
– motivation based on ideas of right and wrong; the philosophical study of moral values and rules
– A set of principles of right conduct. – The rules or standards governing the conduct of a
person or the members of a profession: medical ethics.
– An old adage tells us "Character is what you do when no one is watching."
Definitions from www.dictionary.comOther resource: http://www.cybercitizenship.org/ethics/ethics.html
Ethics in Technology• How do ethics affect technology?• What are some ethical issues dealing with
technology?– Hacking– Privacy– Restricted Sites– Copyright laws– Spreading Viruses– Misuse of Technology– Citing electronic information properly
Upholding Ethics• What is the code of conduct and
unofficial rules that govern online interaction and behavior?
Netiquette
THE TEN COMMANDMENTS FOR COMPUTER ETHICS
from the Computer Ethics Institute
1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not use or copy software for which you have not paid. 7. Thou shalt not use other people's computer resources without
authorization. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you
write. 10. Thou shalt use a computer in ways that show consideration and
respect.
Resource: http://wise.fau.edu/netiquette/net/ten.html
Misuse of Technology• How can people misuse technology?
– Hacking– Viruses– spam– Using others work as their own (breaking
Copyright law)– Others
Hacking• Hacking means illegally accessing other
people's computer systems for destroying, disrupting or carrying out illegal activities on the network or computer systems.
• Examples of Hacking?
Copyright• The legal protection automatically given to
creative products, (such as music, books or paintings), that prevents them from being copied and distributed without permission of the copyright owner. Sending a music file over the Web may be considered a violation of copyright law.
Resource http://www.enquirer.com/editions/2004/03/22/loc_loc1acomp.html
Fair Use• Images or other creative works can be
used for education purposes, like a book report, without permission from the copyright owner.
Resource http://www.enquirer.com/editions/2004/03/22/loc_loc1acomp.html
What is “fair use”?Fair Use is a part of the United States Copyright law. It allows people to use and make copies of copyrighted works if they are using them for:
– criticism,– comment, – news reporting, – teaching, – scholarship, or– research
What is not protected by copyright law?
• Works that have not been written or recorded (your stories, if they are not written down, are not protected by copyright law)
• Ideas, procedures, methods, discoveries
• Works that contain no original authorship (for example: standard calendars, height and weight charts, tape measures and rulers, etc.)
• Lists of data (such as the telephone book)
• Items in the public domain (meaning works that are available for anyone to use. All works created before 1923 and most between 1923-1963 are in the public domain)
• Most U.S. government materials (some items created by contractors for the government might be copyrighted)
• Facts
Before using copyrighted work, ask yourself:
• Is the copying for educational use?• Is the original material mainly facts, not very
original, and published?• Are you using small amounts, not whole
sections? • Is the original material freely available? (Meaning,
the author is not trying to make money on it)
If any answers are “no” – be careful! The use of that work might not fall under “fair use.”
The “Fair Use Guidelines to Educational Multimedia” help us know how much to use…
Motion Media 10% or 3 minutes
Text 10% or 1000 words
Poetry 250 words; no more than 3 poems by same author
Music, Lyrics, Video 10% or 30 seconds
Photos & Illustrations 5 images from one author
Numerical Data Sets 10% of 2500 fields or cells
Use the smallest amount of:
Giving Credit to the Author/Creator
• Always credit the author:– On a “Works Cited” or References page of a
report or presentation, include (if available):• The author’s name
• The title of the work
• The publisher
• The place and date of publication
– List the copyright information underneath any copyrighted images. Example:
© 2002 Author’s Name
Under the image: © Date Company/Person’s Name
© 2002 John Doe
How to Give Acknowledgement for a
Copyrighted Image
Giving Credit to the Author/Creator
• For copyrighted works from a Web site, include:– The Author’s name
– The Title of the Work– The name of the Site– The date it was posted on the Web or revised– The date you obtained the work from the Web– The Web site’s address (URL)
Citing Sources Properly• MLA - Modern Language Association• APA - American Psychological Association • Example of MLA Format
An article in an online journal or magazine
Author(s). "Title of Article." Title of Journal Volume. Issue (Year):
Pages/Paragraphs. Date of Access <electronic address>.
Wheelis, Mark. "Investigating Disease Outbreaks Under a Protocol to the Biological and Toxin Weapons Convention." Emerging Infectious Diseases 6.6 (2000): 33 pars. 5 Dec. 2000 <http://www.cdc.gov/ncidod/eid/vol6no6/wheelis.htm>.
Piracy• The unauthorized duplication and
distribution of copyright-protected software.
• the act of illegally copying software, music, or movies that are copyright-protected
SIIA: Software Information & Industry Association
• 10 Commandments of Software Use
• Software Use Law
• Resource: http://www.siia.net/piracy/education.asp
Activity• Go to the following website:
http://www.siia.net/piracy/faq.asp
• Find a fact on the page that you did not know.
• Then, I will give you time to share your findings with a partner.