16
12/2/2014 1 Ethics in Information Technology John Lorenz R. Belanio Reference Text: Computer Ethics by Albacea et. al. (UPOU Publishing) Outline [1] Information Technology: A Gift of Fire Definitions of Ethics Computer Ethics Ten Commandments of Computer Ethics Application of Ethical Principles To Selected Issues in Computing Outline [2] Computer Abuses Privacy Issues Social Justice Issues Intellectual Property Rights Related Philippine Laws Information Technology: A Gift of Fire A Gift of Fire Prometheus, according to Greek myth, brought us the gift of fire. An awesome gift: it gives power but it can destroy. Chicago Fire, 1971, 100k people homeless Kuwait oil fields, 1990 Washington, 1990, fire sparked from automobile accident burned homes and 180k acres Information Technology: A Gift of Fire It is an awesome technology . make routine tasks quick and accurate save lives create large amounts of new wealth create powerful problems: potential loss of privacy, multi-million dollar theft, and breakdowns of large, complex systems

Computer Ethics

Embed Size (px)

DESCRIPTION

References: Computer Ethics by E. Albacea, UP Open UniversityOnline resources(sources found in Notes section of the presentation)

Citation preview

  • 12/2/2014

    1

    Ethics in Information Technology

    John Lorenz R. Belanio

    Reference Text: Computer Ethics by Albacea et. al. (UPOU Publishing)

    Outline [1]

    Information Technology: A Gift of Fire

    Definitions of Ethics

    Computer Ethics

    Ten Commandments of Computer Ethics

    Application of Ethical Principles To Selected Issues in Computing

    Outline [2]

    Computer Abuses

    Privacy Issues

    Social Justice Issues

    Intellectual Property Rights

    Related Philippine Laws

    Information Technology: A Gift of Fire

    A Gift of Fire

    Prometheus, according to Greek myth, brought us the gift of fire.

    An awesome gift: it gives power but it can destroy. Chicago Fire, 1971, 100k people homeless

    Kuwait oil fields, 1990

    Washington, 1990, fire sparked from automobile accident burned homes and 180k acres

    Information Technology: A Gift of Fire

    It is an awesome technology .

    make routine tasks quick and accurate

    save lives

    create large amounts of new wealth

    create powerful problems: potential loss of privacy, multi-million dollar theft, and breakdowns of large, complex systems

  • 12/2/2014

    2

    Definition of Ethics

    Definition of Ethics [1]

    From the Greek term ethos which means character or custom

    intertwined with customs and traditions believed in or adapted by a particular community.

    Relative view of ethics what is ethical in one community may not be ethical in another

    E.g. A community in Asia might think nothing of software piracy, whereas US anti-software piracy rules are strictly enforced.

    Definition of Ethics [2]

    Ethics is the study of the morality of human actions.

    Human actions are judged depending on the circumstances surrounding the same and based on standard generally accepted by a particular community or group of people.

    E.g. computer users are allowed to use applications and explore website, for as long as they want, and while they are not infringing on the intellectual rights of those who designed the applications, by hacking, plagiarism,etc.

    Definition of Ethics [3]

    Ethics focuses on the care for the soul

    Focus is religious or spiritual

    Unlawful, unethical or immoral acts and forbearances are considered as elements of sins that contaminate the otherwise virtuous soul.

    E.g. Paul designing a program that could transform pictures of clothed women to nude. If we accept that looking at nude pictures corrupt the soul, then Paul committed an unethical act.

    Definition of Ethics [4]

    Ethics is an area of philosophy that deals with mans pursuit of the good life

    Attainment of good life is predicated upon ones adherence to ethics

    Ethics is used as a means to reach a particular end

    E.g. a web designer and programmer who produces freeware that benefits millions of users, is doing something ethical.

    Definition of Ethics [5]

    Ethics is the study and philosophy of human conduct with emphasis on the determination of right and wrong.

    Human conduct may either be right/ethical or wrong/unethical.

    E.g. Lance selling computer software (both licensed and pirated). When a customer asks for a software product, Lance tell him of the price of a licensed product but hints that he has a copy which is cheaper. Obviously, the customer prefers the inexpensive one.

  • 12/2/2014

    3

    Definition of Ethics [6]

    Ethics deals with the basic principles of right action especially with reference to a particular person, profession and others

    Pertains to norms that govern human actions and omission in every facet of life, whether they involve people in general, or a group of people engaged in the practice of their profession or craft in particular

    E.g. Country X where Rica is a citizen, enforces a code of ethics governing computer professionals. Rica, who practices her profession in country X is covered by the said code of ethics.

    Definition of Ethics [7]

    Ethics as a concept suggests the notion of correct or incorrect practices relative to various concerns or fields of study.

    Growing need to address moral issues and unethical practices with the boundaries of various areas of study

    Applied ethics (e.g. environmental ethics, legal ethics, nursing ethics, computer ethics)

    Computer Ethics

    Computer Ethics [1]

    There are many definitions of ethics in general

    The advent of globalization and proliferation of highly advanced technology, including computer technology, pose many moral concerns. (aided by technology: cloning, nuclear bombs, sex transplants etc.)

    Continual technological advancement causes a lot of possibilities for human actions.

    Computer Ethics [3]

    Deborah Johnson, Computer Ethics

    Many laws and policies have been created in the last two or three decades but vacuums still exist. They are most apparent when one looks at newer computer applications. (cont)

    Computer Ethics [4]

    There are for example, few rules or conventions regarding various forms of online communications such as electronic mail and bulletin boards. Are such communications private?

    Who is liable for inaccurate, slanderous, or illegal information that appears on

    electronic bulletin boards? (cont)

  • 12/2/2014

    4

    Computer Ethics [5]

    And what about computer graphics? Should computer graphical recreations of incidents such as automobile accidents, be allowed to be used in courtrooms?

    Is it right for an individual to electronically reproduce and then alter an artistic image originally created by someone else?

    Vacuums still surround computers and more are likely to arise as new applications develop

    Computer Ethics [6]

    Computer Ethics simply refers to the guiding precepts and norms that are adopted and applied to regulate and control the use of computers and its applications.

    Ten Commandments for Computer EthicsSource: Computer Ethics Institute

    Ten Commandments of Computer Ethics [1]

    1. Thou shalt not use a computer to harm other people.

    2. Thou shalt not interfere with other peoples computer work.

    3. Thou shalt not snoop around in other peoples files.

    4. Thou shalt not use a computer to steal.

    5. Thou shalt not use a computer to bear false witness.

    Ten Commandments of Computer Ethics [2]

    6. Thou shalt not use or copy software for which you have not paid.

    7. Thou shalt not use other peoples resources without authorization.

    8. Thou shalt not appropriate other peoples intellectual output.

    9. Thou shalt think about social consequences of the program you write.

    10. Thou shalt use a computer in ways that show consideration and respect.

    Thou shalt not use a computer to harm other people.

    Prohibits the use of computers to harm others

    The harm that is contemplated here is that which affects the emotions or the mental health of people.

    E.g. psychologically harmful act circulation of nude photos of women, mostly altered or faked, thus, damaging to the womens reputation

  • 12/2/2014

    5

    Thou shalt not interfere with other peoples computer

    work. Any form of alteration of someone

    elses computer work is considered unethical practice.

    E.g. not only look at what is stored in their neighbors computers; they also alter them, in minute or in ways that are really destructive

    Thou shalt not snoop around in other peoples files.

    Computer users sometimes surf even private domains just to satisfy their curiousity

    E.g. even though you just browse without copying or altering, the fact is, those files are private and should not be read without the owners permission.

    Thou shalt not use a computer to steal.

    The computer has the capacity to facilitate theft and robbery especially in banks

    E.g. counterfeiting signatures, debugging programs, and breaking codes and passwords

    The technology used does not change the

    fact that the act is one of theft and robbery and therefore, illegal.

    Thou shalt not use a computer to bear false witness.

    Utilized by people to facilitate the commission of fraud and to circulate false information--- both unethical actions.

    Thou shalt not use or copy software for which you have not paid.

    This pertains to piracy of software and other programs

    Support to piracy means also support to theft and infringement of intellectual property rights

    Thou shalt not use other peoples computer resources without authorization.

    Penetrating websites and debug programs, assuming other peoples computer ID and resources

    Violates the norm of honesty and integrity

  • 12/2/2014

    6

    Thou shalt not appropriate other peoples intellectual output.

    Engaging in trading software without license and agreement by its owner, then you are misappropriating

    another persons intellectual property

    Thou shalt think of the social consequences of the programs you write.

    Assessing whether the program or software you design would be of great social significance to others

    Where it could be destructive, rather than favorable to society, a computer program should not be designed

    Thou shalt use a computer in ways that show consideration and respect.

    Computing entails the maintenance of propriety and integrity

    Each user should use computers in such a way that the rights of others are not violated or infringed upon.

    Case 1 [1]

    Dan is a computer buff. He loves to surf the Internet and try all available applications. Dan also does web design and programming, among others. In one of his computer explorations, Dan discovered a virus that destroys the computer motherboard.

    Case 1 [2]

    To test his discovery, Dan surreptitiously installed the virus in his friend Kaels PC. After a week, Kael broke the sad news to Dan. His PC has bogged down and he needs to buy a new motherboard. Dan finds himself torn between whether to tell Kael or not.

    Computer Abuses

  • 12/2/2014

    7

    Issues Classified as Computer Abuses

    Denial of Service Attacks

    Hacking

    Flaming

    Spamming

    Worms and Virus

    Internet Hoaxes

    Denial of Service Attack

    Characterized by an explicit attempt by attackers to prevent or bar legitimate users of computers from availing themselves of computer services.

    Basic types of attacks: (1) consumption of scarce resources, (2) destruction or alteration of configuration information and (3) physical destruction or alteration of network components

    Consumption of Scarce Resources

    Targets network connectivity

    The goal is to prevent hosts (or network servers) from communicating on the network

    E.g. establishing connection to the victim machine but does it in such a way as to prevent the ultimate completion of the connection

    E.g. an intruder may consume all of the available bandwidth by generating large number of packets directed to your network (ICMP ECHO packets), but in principle, they may be anything

    Destruction or Alteration of Configuration

    An intruder may be able to alter or destroy configuration information that prevents you from using your computer or network

    E.g. changing routing information in the routers may disable the network.

    E.g. modifying registry on a Win NT

    machine, certain functions may be unavailable

    Physical Destruction or Alteration of Network Components

    Primary concern is physical security

    You should guard against unauthorized access to computers, routers, network, wiring closets, network backbone segments, power and cooling stations, and any other critical components of the network

    Hacking

    Unauthorized access to a computer, its files, and programs

    Reasons: (1) theft of service, (2) take valuable files, (3) vengeance and hatred, (4) thrill and excitement, and (5) sake of knowledge and experimentation.

  • 12/2/2014

    8

    Theft of Service

    If the system offers some type of service and a hacker has a use for it, he will hack he system

    E.g. use of wireless Internet

    Take Valuable Files

    Valuable files can be credit card information and list of customers

    The hacker may sell the information gathered to rival companies.

    Vengeance and Hatred

    E.g. a hacker may get into the homepage of the university that kicked him out and deface the homepage

    Thrill and Excitement

    Being somewhere they are not authorized to be

    Knowledge and Experimentation

    Hackers learn a great deal every time they break into a new type of system

    Hackers Code of Ethics [1]

    1. Do not intentionally damage any system.

    2. Do not alter any system files other than ones needed to ensure your escape from detection and your future access.

    3. Do not leave your (or anybody elses) real name, real handle, or real phone number on any system that you access illegally.

    4. Be careful who you share information with.

    5. Do not leave your real telephone number with anyone you do not know.

  • 12/2/2014

    9

    Hackers Code of Ethics [2]

    6. Do not hack government computers.7. Dont use codes unless there is no way

    around it. If you use codes long enough, you will get caught.

    8. Be paranoid. Remember, you are breaking the law.

    9. Watch what you post on boards.

    10. Dont be afraid to ask questions. Thats what more experienced hackers are for.

    11. Finally, you have to actually hack.

    Source: Legion of Doom/ Legion of Hackers. 1989. A Novice Guide

    to Hacking. Mentor.

    Flaming

    Sending of abusive email or messages to other people or newsgroups

    You flame people when you disrespect their opinion and attack them personally, calling them names or questioning their parentage.

    Flaming Example

    Exchange of messages in one newsgroupSubject: Idiot Mozcom.com users

    To those idiots from Mozcom.com who insist on posting irrelevant topics in this newsgroup, better form your own newsgroup so that you can write what you want

    _____Subject: Re: Idiot Mozcom.com usersYou pompous turd. What happened to free exchange of

    information in cyberspace. I am tired of your smarter than you quips about Mozcom.com users. I happen to be an educated professional and I am in here to stay. In fact, folks like you will be left in the egghead backwaters of the pure thinkers while the great unwashed take over the net. Get over it or die of an embolism, or maybe get a girlfriend or a life.

    Spamming

    Sometimes called unsolicited commercial email, is the Internet version of junk mail

    Attempt to deliver a message over the Internet to someone who would not otherwise choose to receive it.

    Automated searches are used to retrieved email addresses for spamming.

    Currently, unless the spammer offers to sell illegal items, there is no legal way of putting a stop to it.

    Many ISP now have policies on spamming, including disabling the offenders account.

    Worm and Virus

    A virus is a program that produces its own code by attaching itself to other executable files in such a way that the viruses code is executed when the infected executable file is executed.

    A worm is a self-replicating program designed to spread across a network without requiring any outside actions to take place.

    Spreading viruses and worms is unethical. Some viruses can have destructive effects on affected individuals.

    Internet Hoaxes

    Messages about free money, children in trouble, and other items designed to grab you and get you to forward the message to everyone you know.

    Do not infect system like virus, but they are time consuming and costly to remove from the systems where they exist.

    E.g. transfer of money to account, winning lottery, chain letters

  • 12/2/2014

    10

    Privacy Issues

    Privacy

    In the Internet, website owners allow surfers to explore their sites with very little restrictions

    In computing, emails and letters, your database and your personal information are considered private.

    There are many reasons why there is a need to hide your real identity e.g. you might be wanting to protect yourself from an oppressive government, or simply be trying to hide yourself from advertisers

    Database Privacy

    The information you supply to databases should be used only for their intended purpose. Such information should not be distributed openly.

    E.g. it is unethical for a bank to sell client account information to other banks

    Email Privacy

    Only you and the intended recipients and nobody else, should read what you write in your emails.

    It is unethical for system administrators to have access to your account to read your mail sent folders and mail boxes.

    Privacy on the Web

    Ideally, only you should know the websites you visited. However, because of access logs, the websites you visited may be known especially to system administrators to have access to these logs.

    An issue related to privacy is the establishment of the national ID system.

    To enhance privacy, use encryption in every transaction you make.

    Social Justice Issues

  • 12/2/2014

    11

    Social Justice in General

    The promotion of the welfare of the people

    Latin maxim, salus populi est suprema lex, which means the welfare of the people is the supreme law

    The government as parent of the peoplemust maintain proper economic and social

    stability that would ensure the promotion of the peoples welfare.

    Social Justice in Computing

    Pertain to the promotion of the welfare of computer users and professionals.

    Concerned with equity of access

    Issues: digital divide and use of computers in the workplace and occupational hazards

    Digital Divide [1]

    Term used for the division of the world into people who have access to ICTs and those who do not have access

    Are women more disadvantaged in the Information Age? In a research entitled, Gender, IT and Developing Countries: An Analytic Study,Nancy Hafkin and Nancy Taggart argue that Women within developing countries are in the deepest part of the digital divide, further removed from the information age than are the men whose poverty they share.

    Digital Divide [2]

    What about access to the Internet for those with physical disabilities? Korea is a leader in the effort to build an information environment that encourages persons with disabilities to use IT. In December 2000, it passed the Digital Divide Law

    Are people unable to access the Net because of language?Digital divide is seen in the languages used in the Internet. English is the dominant language used in the Internet. There are more than 1.2B speakers of Chinese but only 3.9% of web content is written in Chinese. Japanese in only the 10 th most widely spoken language but Japanese is the second most important language in terms of content on the web.

    Because computers and the Internet are the enabling technologies in the Information Age, the digital divide is an important concern of the 21st century

    The Use of Computers in the Workplace and Occupational Hazards

    Electronic monitoring: tracking employees activities in the office

    Repetitive Strain injuries: injury you get if you continuously sit in from of your computer. The issue is whether you are entitled to compensation for this.

    Electromagnetic radiation: radiation emitted by monitors is harmful to health.

    Sickness acquired from work are compensable under law.

    Intellectual Property Rights

  • 12/2/2014

    12

    Intellectual Property

    Separate and distinct types of intangible property, collectively known as intellectual property: patents, trademarks, copyrights and trade secrets

    Intellectual property, like real and personal property, is an asset, and as such, it can be bought, sold, licensed, exchanged, or gratuitously given away like any other form of property.

    It cannot be identified by physical parameters, and must be expressed in some discernable way to be protectable.

    Copyright

    Copyright may subsist in creative and artistic works (e.g. books, movies, music, paintings, photographs, and software) and give a copyright holder the exclusive right to control reproduction or adaptation of such works for a certain period of time (historically a period of between 10 and 30 years depending on jurisdiction, more recently the life of the author plus several decades).

    Source: Wikipedia

    Patent

    A patent may be granted for a new, useful, and non-obvious invention, and gives the patent holder a right to prevent others from practicing the invention without a license from the inventor for a certain period of time (typically 20 years from the filing date of a patent application).

    Source: Wikipedia

    Trademark

    A trademark is a distinctive sign which is used to distinguish the products or services of different businesses.

    Source: Wikipedia

    Trade Secret

    A trade secret(which is sometimes either equated with, or a subset of, "confidential information") is secret, non-public information concerning the commercial practices or proprietary knowledge of a business, public disclosure of which may sometimes be illegal.

    Source: Wikipedia

    IP in Computing

    Algorithm can be patented

    A program or online textbook is copyrightable

    Domain names could be considered trademark

    Issues: software piracy, plagiarism, and the software and copyright law of the US

  • 12/2/2014

    13

    Software Piracy

    Act of using software without paying the appropriate license

    Software pirates not only steal from the companies that make the software; their acts also redound to less money for research and development of new software. Thus, all users are hurt by software piracy.

    Types of Software Piracy

    End user piracy

    Reseller piracy

    Internet piracy

    End User Piracy

    using multiple copies of a single software package on several different systems or distributing copies of software to others.

    Reseller Piracy

    occurs when an unscrupulous reseller distributes multiple copies of a single software package to different customers

    Sell counterfeit versions of software

    Indications: multiple users with the same serial number, lack of original

    documentation or an incomplete set, and non-matching documentation

    Internet Piracy

    Occurs when there is an electronic transfer of copyrighted software

    System operators upload or download copyrighted software and materials onto or from bulletin boards or the Internet for others to copy and use without the proper license

    Arguments in Support of Software Piracy and Illegal Copying and its Counterpoints [1]

    I cannot afford to buy the product. There are many things we cannot afford;

    not being able to afford something is not an excuse for taking it.

    The company is a large, wealthy corporation.

    The size and success of the company do not justify taking from it. Programmers, writers and performing artists lose income too when copying is common.

  • 12/2/2014

    14

    Making a copy for a friend is an act of generosity. Nissenbaum argues that someone who copies

    software for a friend has a countervailing claim against the programmers right to prohibit making the copy.

    This violation is insignificant compared to the millions of dollars lost to piracy by dishonest resellers making big profits.

    Yes, large-scale commercial piracy is worse. That does not imply that individual copying is ethical. And if the practice is widespread, the losses become significant.

    Arguments in Support of Software Piracy and Illegal Copying and its Counterpoints [2]

    Everyone does it. You would be foolish not to.

    The number of people doing something does not determine whether it is right. A large number of people in one peer group could share similar incentives and experience (or lack thereof) that affect their point of view.

    Arguments in Support of Software Piracy and Illegal Copying and its Counterpoints [3]

    Plagiarism

    Occurs anytime that a person copies any written work and claims it as his/her own.

    Failure to use citation to wholesale cheating

    cut-and-paste plagiarism e.g. term papers downloaded and submitted as owned

    Software and Copyright Laws in the US

    Apple vs. Microsoft, 1989: Windows GUI infringed Apples copyright on the look and feel of the Macintosh desktop

    Jaslow vs. Whelan, 1985: Whelans Dentcom program infringed Jaslows copyright even though both were written using different programming language.

    Lotus vs. Paperback & Mosaic: menu structure or arrangement of commands in the menu hierarchy in Lotus 1-2-3 is copyrightable.

    Related Philippine Laws

    The Intellectual Property Code of the Philippines (RA 8293)

    E-Commerce Law (RA 8792)

  • 12/2/2014

    15

    Ethical CaseAre you ready?

    Source: A Gift of Fire by Baase

    The Case

    You are a computer system manager. An employee is out sick and another employee requests that you copy all

    files from the sick persons computer to his so he can do some work.

    Analysis [1]

    One risk here is invasion of privacy; the sick employee might have personal files stored. Also, the sick employee could have files related to secret or proprietary company information to which other

    employees are not suppose to have access

    On the other hand, the employee making the request and the company might suffer if important work is not completed on time

    Analysis [2]

    Obvious stakeholders: the sick employee, the employee requesting and you (systems manager)

    Other stakeholders: people working on the same project (they might suffer negative consequences if lack of access to needed files delays its completion.

    Simple solution: call the sick employee and ask permission to copy files, but he or she may not be reachable.

    Another option: request authorization form the manager of the project on which the employees are working

    Analysis [3]

    The right thing to do depends in large part on the policies, practices and expectations at the particular company. If there is a strong policy against personal use of the computer system, if it is a routine practice for employees to share files while working on a project, and if it is reasonable to believe that all files to be copied are related to the project the employees are working on, there might be no ethical problem with copying the file.

    Things to PonderSource: A Gift of Fire by Baase

  • 12/2/2014

    16

    From Ken Thomson, one of the inventors of Unix

    The act of breaking into a computer system has to have the same social stigma as breaking into a neighbors house. It should not matter that the

    neighbors door is unlocked.

    From Jim Hightower

    While all razzle-dazzle connects us electronically, it disconnects us from each other, having us interfacingmore with computers and TV screens than looking in the face of our fellow human beings. Is this progress?

    Thank you for listening!Any questions?