Upload
jlorenzb
View
9
Download
5
Tags:
Embed Size (px)
DESCRIPTION
References: Computer Ethics by E. Albacea, UP Open UniversityOnline resources(sources found in Notes section of the presentation)
Citation preview
12/2/2014
1
Ethics in Information Technology
John Lorenz R. Belanio
Reference Text: Computer Ethics by Albacea et. al. (UPOU Publishing)
Outline [1]
Information Technology: A Gift of Fire
Definitions of Ethics
Computer Ethics
Ten Commandments of Computer Ethics
Application of Ethical Principles To Selected Issues in Computing
Outline [2]
Computer Abuses
Privacy Issues
Social Justice Issues
Intellectual Property Rights
Related Philippine Laws
Information Technology: A Gift of Fire
A Gift of Fire
Prometheus, according to Greek myth, brought us the gift of fire.
An awesome gift: it gives power but it can destroy. Chicago Fire, 1971, 100k people homeless
Kuwait oil fields, 1990
Washington, 1990, fire sparked from automobile accident burned homes and 180k acres
Information Technology: A Gift of Fire
It is an awesome technology .
make routine tasks quick and accurate
save lives
create large amounts of new wealth
create powerful problems: potential loss of privacy, multi-million dollar theft, and breakdowns of large, complex systems
12/2/2014
2
Definition of Ethics
Definition of Ethics [1]
From the Greek term ethos which means character or custom
intertwined with customs and traditions believed in or adapted by a particular community.
Relative view of ethics what is ethical in one community may not be ethical in another
E.g. A community in Asia might think nothing of software piracy, whereas US anti-software piracy rules are strictly enforced.
Definition of Ethics [2]
Ethics is the study of the morality of human actions.
Human actions are judged depending on the circumstances surrounding the same and based on standard generally accepted by a particular community or group of people.
E.g. computer users are allowed to use applications and explore website, for as long as they want, and while they are not infringing on the intellectual rights of those who designed the applications, by hacking, plagiarism,etc.
Definition of Ethics [3]
Ethics focuses on the care for the soul
Focus is religious or spiritual
Unlawful, unethical or immoral acts and forbearances are considered as elements of sins that contaminate the otherwise virtuous soul.
E.g. Paul designing a program that could transform pictures of clothed women to nude. If we accept that looking at nude pictures corrupt the soul, then Paul committed an unethical act.
Definition of Ethics [4]
Ethics is an area of philosophy that deals with mans pursuit of the good life
Attainment of good life is predicated upon ones adherence to ethics
Ethics is used as a means to reach a particular end
E.g. a web designer and programmer who produces freeware that benefits millions of users, is doing something ethical.
Definition of Ethics [5]
Ethics is the study and philosophy of human conduct with emphasis on the determination of right and wrong.
Human conduct may either be right/ethical or wrong/unethical.
E.g. Lance selling computer software (both licensed and pirated). When a customer asks for a software product, Lance tell him of the price of a licensed product but hints that he has a copy which is cheaper. Obviously, the customer prefers the inexpensive one.
12/2/2014
3
Definition of Ethics [6]
Ethics deals with the basic principles of right action especially with reference to a particular person, profession and others
Pertains to norms that govern human actions and omission in every facet of life, whether they involve people in general, or a group of people engaged in the practice of their profession or craft in particular
E.g. Country X where Rica is a citizen, enforces a code of ethics governing computer professionals. Rica, who practices her profession in country X is covered by the said code of ethics.
Definition of Ethics [7]
Ethics as a concept suggests the notion of correct or incorrect practices relative to various concerns or fields of study.
Growing need to address moral issues and unethical practices with the boundaries of various areas of study
Applied ethics (e.g. environmental ethics, legal ethics, nursing ethics, computer ethics)
Computer Ethics
Computer Ethics [1]
There are many definitions of ethics in general
The advent of globalization and proliferation of highly advanced technology, including computer technology, pose many moral concerns. (aided by technology: cloning, nuclear bombs, sex transplants etc.)
Continual technological advancement causes a lot of possibilities for human actions.
Computer Ethics [3]
Deborah Johnson, Computer Ethics
Many laws and policies have been created in the last two or three decades but vacuums still exist. They are most apparent when one looks at newer computer applications. (cont)
Computer Ethics [4]
There are for example, few rules or conventions regarding various forms of online communications such as electronic mail and bulletin boards. Are such communications private?
Who is liable for inaccurate, slanderous, or illegal information that appears on
electronic bulletin boards? (cont)
12/2/2014
4
Computer Ethics [5]
And what about computer graphics? Should computer graphical recreations of incidents such as automobile accidents, be allowed to be used in courtrooms?
Is it right for an individual to electronically reproduce and then alter an artistic image originally created by someone else?
Vacuums still surround computers and more are likely to arise as new applications develop
Computer Ethics [6]
Computer Ethics simply refers to the guiding precepts and norms that are adopted and applied to regulate and control the use of computers and its applications.
Ten Commandments for Computer EthicsSource: Computer Ethics Institute
Ten Commandments of Computer Ethics [1]
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other peoples computer work.
3. Thou shalt not snoop around in other peoples files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
Ten Commandments of Computer Ethics [2]
6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other peoples resources without authorization.
8. Thou shalt not appropriate other peoples intellectual output.
9. Thou shalt think about social consequences of the program you write.
10. Thou shalt use a computer in ways that show consideration and respect.
Thou shalt not use a computer to harm other people.
Prohibits the use of computers to harm others
The harm that is contemplated here is that which affects the emotions or the mental health of people.
E.g. psychologically harmful act circulation of nude photos of women, mostly altered or faked, thus, damaging to the womens reputation
12/2/2014
5
Thou shalt not interfere with other peoples computer
work. Any form of alteration of someone
elses computer work is considered unethical practice.
E.g. not only look at what is stored in their neighbors computers; they also alter them, in minute or in ways that are really destructive
Thou shalt not snoop around in other peoples files.
Computer users sometimes surf even private domains just to satisfy their curiousity
E.g. even though you just browse without copying or altering, the fact is, those files are private and should not be read without the owners permission.
Thou shalt not use a computer to steal.
The computer has the capacity to facilitate theft and robbery especially in banks
E.g. counterfeiting signatures, debugging programs, and breaking codes and passwords
The technology used does not change the
fact that the act is one of theft and robbery and therefore, illegal.
Thou shalt not use a computer to bear false witness.
Utilized by people to facilitate the commission of fraud and to circulate false information--- both unethical actions.
Thou shalt not use or copy software for which you have not paid.
This pertains to piracy of software and other programs
Support to piracy means also support to theft and infringement of intellectual property rights
Thou shalt not use other peoples computer resources without authorization.
Penetrating websites and debug programs, assuming other peoples computer ID and resources
Violates the norm of honesty and integrity
12/2/2014
6
Thou shalt not appropriate other peoples intellectual output.
Engaging in trading software without license and agreement by its owner, then you are misappropriating
another persons intellectual property
Thou shalt think of the social consequences of the programs you write.
Assessing whether the program or software you design would be of great social significance to others
Where it could be destructive, rather than favorable to society, a computer program should not be designed
Thou shalt use a computer in ways that show consideration and respect.
Computing entails the maintenance of propriety and integrity
Each user should use computers in such a way that the rights of others are not violated or infringed upon.
Case 1 [1]
Dan is a computer buff. He loves to surf the Internet and try all available applications. Dan also does web design and programming, among others. In one of his computer explorations, Dan discovered a virus that destroys the computer motherboard.
Case 1 [2]
To test his discovery, Dan surreptitiously installed the virus in his friend Kaels PC. After a week, Kael broke the sad news to Dan. His PC has bogged down and he needs to buy a new motherboard. Dan finds himself torn between whether to tell Kael or not.
Computer Abuses
12/2/2014
7
Issues Classified as Computer Abuses
Denial of Service Attacks
Hacking
Flaming
Spamming
Worms and Virus
Internet Hoaxes
Denial of Service Attack
Characterized by an explicit attempt by attackers to prevent or bar legitimate users of computers from availing themselves of computer services.
Basic types of attacks: (1) consumption of scarce resources, (2) destruction or alteration of configuration information and (3) physical destruction or alteration of network components
Consumption of Scarce Resources
Targets network connectivity
The goal is to prevent hosts (or network servers) from communicating on the network
E.g. establishing connection to the victim machine but does it in such a way as to prevent the ultimate completion of the connection
E.g. an intruder may consume all of the available bandwidth by generating large number of packets directed to your network (ICMP ECHO packets), but in principle, they may be anything
Destruction or Alteration of Configuration
An intruder may be able to alter or destroy configuration information that prevents you from using your computer or network
E.g. changing routing information in the routers may disable the network.
E.g. modifying registry on a Win NT
machine, certain functions may be unavailable
Physical Destruction or Alteration of Network Components
Primary concern is physical security
You should guard against unauthorized access to computers, routers, network, wiring closets, network backbone segments, power and cooling stations, and any other critical components of the network
Hacking
Unauthorized access to a computer, its files, and programs
Reasons: (1) theft of service, (2) take valuable files, (3) vengeance and hatred, (4) thrill and excitement, and (5) sake of knowledge and experimentation.
12/2/2014
8
Theft of Service
If the system offers some type of service and a hacker has a use for it, he will hack he system
E.g. use of wireless Internet
Take Valuable Files
Valuable files can be credit card information and list of customers
The hacker may sell the information gathered to rival companies.
Vengeance and Hatred
E.g. a hacker may get into the homepage of the university that kicked him out and deface the homepage
Thrill and Excitement
Being somewhere they are not authorized to be
Knowledge and Experimentation
Hackers learn a great deal every time they break into a new type of system
Hackers Code of Ethics [1]
1. Do not intentionally damage any system.
2. Do not alter any system files other than ones needed to ensure your escape from detection and your future access.
3. Do not leave your (or anybody elses) real name, real handle, or real phone number on any system that you access illegally.
4. Be careful who you share information with.
5. Do not leave your real telephone number with anyone you do not know.
12/2/2014
9
Hackers Code of Ethics [2]
6. Do not hack government computers.7. Dont use codes unless there is no way
around it. If you use codes long enough, you will get caught.
8. Be paranoid. Remember, you are breaking the law.
9. Watch what you post on boards.
10. Dont be afraid to ask questions. Thats what more experienced hackers are for.
11. Finally, you have to actually hack.
Source: Legion of Doom/ Legion of Hackers. 1989. A Novice Guide
to Hacking. Mentor.
Flaming
Sending of abusive email or messages to other people or newsgroups
You flame people when you disrespect their opinion and attack them personally, calling them names or questioning their parentage.
Flaming Example
Exchange of messages in one newsgroupSubject: Idiot Mozcom.com users
To those idiots from Mozcom.com who insist on posting irrelevant topics in this newsgroup, better form your own newsgroup so that you can write what you want
_____Subject: Re: Idiot Mozcom.com usersYou pompous turd. What happened to free exchange of
information in cyberspace. I am tired of your smarter than you quips about Mozcom.com users. I happen to be an educated professional and I am in here to stay. In fact, folks like you will be left in the egghead backwaters of the pure thinkers while the great unwashed take over the net. Get over it or die of an embolism, or maybe get a girlfriend or a life.
Spamming
Sometimes called unsolicited commercial email, is the Internet version of junk mail
Attempt to deliver a message over the Internet to someone who would not otherwise choose to receive it.
Automated searches are used to retrieved email addresses for spamming.
Currently, unless the spammer offers to sell illegal items, there is no legal way of putting a stop to it.
Many ISP now have policies on spamming, including disabling the offenders account.
Worm and Virus
A virus is a program that produces its own code by attaching itself to other executable files in such a way that the viruses code is executed when the infected executable file is executed.
A worm is a self-replicating program designed to spread across a network without requiring any outside actions to take place.
Spreading viruses and worms is unethical. Some viruses can have destructive effects on affected individuals.
Internet Hoaxes
Messages about free money, children in trouble, and other items designed to grab you and get you to forward the message to everyone you know.
Do not infect system like virus, but they are time consuming and costly to remove from the systems where they exist.
E.g. transfer of money to account, winning lottery, chain letters
12/2/2014
10
Privacy Issues
Privacy
In the Internet, website owners allow surfers to explore their sites with very little restrictions
In computing, emails and letters, your database and your personal information are considered private.
There are many reasons why there is a need to hide your real identity e.g. you might be wanting to protect yourself from an oppressive government, or simply be trying to hide yourself from advertisers
Database Privacy
The information you supply to databases should be used only for their intended purpose. Such information should not be distributed openly.
E.g. it is unethical for a bank to sell client account information to other banks
Email Privacy
Only you and the intended recipients and nobody else, should read what you write in your emails.
It is unethical for system administrators to have access to your account to read your mail sent folders and mail boxes.
Privacy on the Web
Ideally, only you should know the websites you visited. However, because of access logs, the websites you visited may be known especially to system administrators to have access to these logs.
An issue related to privacy is the establishment of the national ID system.
To enhance privacy, use encryption in every transaction you make.
Social Justice Issues
12/2/2014
11
Social Justice in General
The promotion of the welfare of the people
Latin maxim, salus populi est suprema lex, which means the welfare of the people is the supreme law
The government as parent of the peoplemust maintain proper economic and social
stability that would ensure the promotion of the peoples welfare.
Social Justice in Computing
Pertain to the promotion of the welfare of computer users and professionals.
Concerned with equity of access
Issues: digital divide and use of computers in the workplace and occupational hazards
Digital Divide [1]
Term used for the division of the world into people who have access to ICTs and those who do not have access
Are women more disadvantaged in the Information Age? In a research entitled, Gender, IT and Developing Countries: An Analytic Study,Nancy Hafkin and Nancy Taggart argue that Women within developing countries are in the deepest part of the digital divide, further removed from the information age than are the men whose poverty they share.
Digital Divide [2]
What about access to the Internet for those with physical disabilities? Korea is a leader in the effort to build an information environment that encourages persons with disabilities to use IT. In December 2000, it passed the Digital Divide Law
Are people unable to access the Net because of language?Digital divide is seen in the languages used in the Internet. English is the dominant language used in the Internet. There are more than 1.2B speakers of Chinese but only 3.9% of web content is written in Chinese. Japanese in only the 10 th most widely spoken language but Japanese is the second most important language in terms of content on the web.
Because computers and the Internet are the enabling technologies in the Information Age, the digital divide is an important concern of the 21st century
The Use of Computers in the Workplace and Occupational Hazards
Electronic monitoring: tracking employees activities in the office
Repetitive Strain injuries: injury you get if you continuously sit in from of your computer. The issue is whether you are entitled to compensation for this.
Electromagnetic radiation: radiation emitted by monitors is harmful to health.
Sickness acquired from work are compensable under law.
Intellectual Property Rights
12/2/2014
12
Intellectual Property
Separate and distinct types of intangible property, collectively known as intellectual property: patents, trademarks, copyrights and trade secrets
Intellectual property, like real and personal property, is an asset, and as such, it can be bought, sold, licensed, exchanged, or gratuitously given away like any other form of property.
It cannot be identified by physical parameters, and must be expressed in some discernable way to be protectable.
Copyright
Copyright may subsist in creative and artistic works (e.g. books, movies, music, paintings, photographs, and software) and give a copyright holder the exclusive right to control reproduction or adaptation of such works for a certain period of time (historically a period of between 10 and 30 years depending on jurisdiction, more recently the life of the author plus several decades).
Source: Wikipedia
Patent
A patent may be granted for a new, useful, and non-obvious invention, and gives the patent holder a right to prevent others from practicing the invention without a license from the inventor for a certain period of time (typically 20 years from the filing date of a patent application).
Source: Wikipedia
Trademark
A trademark is a distinctive sign which is used to distinguish the products or services of different businesses.
Source: Wikipedia
Trade Secret
A trade secret(which is sometimes either equated with, or a subset of, "confidential information") is secret, non-public information concerning the commercial practices or proprietary knowledge of a business, public disclosure of which may sometimes be illegal.
Source: Wikipedia
IP in Computing
Algorithm can be patented
A program or online textbook is copyrightable
Domain names could be considered trademark
Issues: software piracy, plagiarism, and the software and copyright law of the US
12/2/2014
13
Software Piracy
Act of using software without paying the appropriate license
Software pirates not only steal from the companies that make the software; their acts also redound to less money for research and development of new software. Thus, all users are hurt by software piracy.
Types of Software Piracy
End user piracy
Reseller piracy
Internet piracy
End User Piracy
using multiple copies of a single software package on several different systems or distributing copies of software to others.
Reseller Piracy
occurs when an unscrupulous reseller distributes multiple copies of a single software package to different customers
Sell counterfeit versions of software
Indications: multiple users with the same serial number, lack of original
documentation or an incomplete set, and non-matching documentation
Internet Piracy
Occurs when there is an electronic transfer of copyrighted software
System operators upload or download copyrighted software and materials onto or from bulletin boards or the Internet for others to copy and use without the proper license
Arguments in Support of Software Piracy and Illegal Copying and its Counterpoints [1]
I cannot afford to buy the product. There are many things we cannot afford;
not being able to afford something is not an excuse for taking it.
The company is a large, wealthy corporation.
The size and success of the company do not justify taking from it. Programmers, writers and performing artists lose income too when copying is common.
12/2/2014
14
Making a copy for a friend is an act of generosity. Nissenbaum argues that someone who copies
software for a friend has a countervailing claim against the programmers right to prohibit making the copy.
This violation is insignificant compared to the millions of dollars lost to piracy by dishonest resellers making big profits.
Yes, large-scale commercial piracy is worse. That does not imply that individual copying is ethical. And if the practice is widespread, the losses become significant.
Arguments in Support of Software Piracy and Illegal Copying and its Counterpoints [2]
Everyone does it. You would be foolish not to.
The number of people doing something does not determine whether it is right. A large number of people in one peer group could share similar incentives and experience (or lack thereof) that affect their point of view.
Arguments in Support of Software Piracy and Illegal Copying and its Counterpoints [3]
Plagiarism
Occurs anytime that a person copies any written work and claims it as his/her own.
Failure to use citation to wholesale cheating
cut-and-paste plagiarism e.g. term papers downloaded and submitted as owned
Software and Copyright Laws in the US
Apple vs. Microsoft, 1989: Windows GUI infringed Apples copyright on the look and feel of the Macintosh desktop
Jaslow vs. Whelan, 1985: Whelans Dentcom program infringed Jaslows copyright even though both were written using different programming language.
Lotus vs. Paperback & Mosaic: menu structure or arrangement of commands in the menu hierarchy in Lotus 1-2-3 is copyrightable.
Related Philippine Laws
The Intellectual Property Code of the Philippines (RA 8293)
E-Commerce Law (RA 8792)
12/2/2014
15
Ethical CaseAre you ready?
Source: A Gift of Fire by Baase
The Case
You are a computer system manager. An employee is out sick and another employee requests that you copy all
files from the sick persons computer to his so he can do some work.
Analysis [1]
One risk here is invasion of privacy; the sick employee might have personal files stored. Also, the sick employee could have files related to secret or proprietary company information to which other
employees are not suppose to have access
On the other hand, the employee making the request and the company might suffer if important work is not completed on time
Analysis [2]
Obvious stakeholders: the sick employee, the employee requesting and you (systems manager)
Other stakeholders: people working on the same project (they might suffer negative consequences if lack of access to needed files delays its completion.
Simple solution: call the sick employee and ask permission to copy files, but he or she may not be reachable.
Another option: request authorization form the manager of the project on which the employees are working
Analysis [3]
The right thing to do depends in large part on the policies, practices and expectations at the particular company. If there is a strong policy against personal use of the computer system, if it is a routine practice for employees to share files while working on a project, and if it is reasonable to believe that all files to be copied are related to the project the employees are working on, there might be no ethical problem with copying the file.
Things to PonderSource: A Gift of Fire by Baase
12/2/2014
16
From Ken Thomson, one of the inventors of Unix
The act of breaking into a computer system has to have the same social stigma as breaking into a neighbors house. It should not matter that the
neighbors door is unlocked.
From Jim Hightower
While all razzle-dazzle connects us electronically, it disconnects us from each other, having us interfacingmore with computers and TV screens than looking in the face of our fellow human beings. Is this progress?
Thank you for listening!Any questions?