22
Computer Ethics Prepared by

Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

Embed Size (px)

Citation preview

Page 1: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

Computer Ethics

Prepared by

Page 2: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

Discuss

“Character is what you do when no one is watching.”

--old adage

Page 3: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

Relatively New Terms

• “Cyber ethics" and "netiquette" refer to responsible cyber social behavior.

• These terms refer to what people do online when no one else is looking.

Page 4: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

Defining Computer Ethics”

• Ethics refers to the rules and standards governing the conduct of an individual with others.

• As technology and computers become more a part of our everyday lives, business conduct will continue to be even more of a problem. 

Page 5: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

The Internet

Online, people can feel invisible and capable of doing things they normally wouldn't do in person or in public -- things that they know might be wrong.

Page 6: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

Defining“Computer Ethics”

• Since the introduction of the World Wide Web, the cyber definition of ethics has also evolved. • A new type of ethics known as computer ethics has emerged. • Computer ethics is concerned with standards of conduct as they pertain to computers.

Page 7: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

Why do we need to study computer ethics?

Two of the more pressing concerns in computer ethics today are questions of copyright and privacy.

Page 8: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

Why do we need to study computer ethics?• Many people have been

tricked by e-mail scams, claiming that they will make you a millionaire.

• It is the same kind of pyramid scheme that exists over telephone or mail, but no laws covered it for a while.   

Page 9: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

Why do we need to study computer ethics?

• Many email chain letters have allowed urban legends to spread at an accelerated rate and created alarm over hoaxes concerning many food and drug products. 

• These emails only bog down email systems and servers. 

• Some advertisers also email unsolicited ads to email users in a practice known as spamming.  

Page 10: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

• The most controversial areas in Internet cases today seem to be those involving copyright laws.

• An issue that has become fundamental to computer usage and computer ethics, therefore, is copyright.

• Copying is defined as the use of someone else's intellectual property, and it is therefore illegal.

Copyright

Page 11: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

How do you know when copyright ownership belongs to you and when it belongs to others? The following rules resolve the problem:

1. If you produced the work yourself, then you are the natural author and own the copyright yourself.

2. If you as an employee created the work in the scope of employment, your employer owns the copyright and is in fact considered the author.

Copyright

Page 12: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

Privacy• Do you have a secret?• Have you ever lied?• Are there certain things you don't want your parents to know?

• How about your friends?• How would you feel if in twenty years, someone told your boss that once, when you were 17, you tried some drugs at a party?

Page 13: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

PrivacyWhat if they got this information from an email that you fully

expected would not go beyond yourself and

the recipient, but was intercepted and posted on a web page?  That

would be an unfair violation of your

privacy.

Page 14: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

Basic Definitions to KNOW• To discuss online privacy, you

need to know some basic computer definitions.

• No matter how little time you have spent online, you have been asked if you would like to accept a cookie, or told that a cookie has been sent.  Well, of  course, you think at first,  Mmmmm....cookie. 

• Unfortunately, you cannot eat these cookies.  A cookie is a piece of data that a web site collects about you when you visit the site. 

Page 15: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

Basic Definitions to KNOW• The data varies with the web site -

a commercial web site will collect demographics (that is, sex, age, and other advertising information) to learn more about you, while an e-mail service may collect identifying or personal (name, mailing address) information to recognize you.

• Cookies allow a web site to be tailor made for you as long as you stay in that domain name or each time you visit.  If you have ever checked a box saying "Remember My Password,"you have set a cookie. 

Page 16: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

Two Aspects of Privacy Online

One aspect of privacy online is a need for protection for

yourself.  Online stalking has been a problem, with people

harassing new 'friends' online and sometimes even threatening them, or

confronting them in person.  The second is a need to protect your data from strangers.  This

comes not from the fear of physical, but financial harm. 

Page 17: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

Ten Commandments

of Computer Ethics

The Computer Ethics Institute offers the Ten Commandments of Computer Ethics to help reinforce

acceptable online behavior.

Page 18: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

1. Thou shalt not use a computer to harm other people.

2. Thou shalt not interfere with other people's computer work.

3. Thou shalt not snoop around in other people's files.

4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false

witness. 6. Thou shalt not use or copy software for which

you have not paid. 7. Thou shalt not use other people's computer

resources without authorization. 8. Thou shalt not appropriate other people's

intellectual output. 9. Thou shalt think about the social

consequences of the program you write. 10.Thou shalt use a computer in ways that show

consideration and respect.

Page 19: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

ScenarioImagine that you own a

business in which you have spent a great amount of

time writing and designing a Web-based game, only to find that someone else has copied much of the game

for their own site.Is this okay? Is it fair? Is

it legal?

Page 20: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

Discussion Situations

• Copying and selling music files: These works are copyrighted and the creators may have not given permission to copy them.

• Copying and giving away software: The software creator is being denied a right to earn a living because the friend would otherwise have to purchase the word processor. This is illegal. Software typically comes with information about the purposes for which copies can be made.

• Copying movies for personal use: Movies are copyrighted works. By not paying to see the movie, you are denying the creators a right to earn a living.

Page 21: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

Discussion Situations• Copying photos, animations, greeting

cards: These are all copyrighted works and should not be displayed on a personal site without obtaining permission.

• Copying photos and paragraphs of text for a school report: School reports are considered fair use, but the creators should be credited.

• Copying and rearranging paragraphs of text for a school report: Rearranging copied paragraphs is plagiarism, unless credit is given to each source. If the intent was to make it the student's work, then the ideas would have to be put in the student's own words.

Page 22: Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage

www.animationfactory.com (PowerPoint template)

http://www.cybersmartcurriculum.org/lesson_plans/68_09.asp

http://wise.fau.edu/netiquette/net/ten.html

(10 Commandments of Computer Ethics)

Sources