Upload
misy
View
2.928
Download
1
Embed Size (px)
DESCRIPTION
Citation preview
Social and Ethical Issues in Computing:Social and Ethical Issues in Computing:Doing the Right ThingDoing the Right Thing
CIS 105CIS 105
Revised March 2006
ObjectivesObjectives
Identify the social issues and ethics in computingIdentify the social issues and ethics in computing Understand the digital divide social issue and its Understand the digital divide social issue and its
effect in societyeffect in society List and describe the workplace issuesList and describe the workplace issues Describe the international and national legal issuesDescribe the international and national legal issues List different methods that are already available for List different methods that are already available for
protecting children on the Internetprotecting children on the Internet Explain the significance of the ethics in computingExplain the significance of the ethics in computing Explain the significance of intellectual property rightsExplain the significance of intellectual property rights
The Digital DivideThe Digital Divide Separates the computing haves from the have-notsSeparates the computing haves from the have-nots
Those with access to computers and the Internet take Those with access to computers and the Internet take advantage of personal and economic opportunitiesadvantage of personal and economic opportunities
Those without access fall farther behind Those without access fall farther behind Major divisions Major divisions
among nations and within countriesamong nations and within countries between urban areas and rural onesbetween urban areas and rural ones between rich and poorbetween rich and poor
Several initiatives exist to narrow the divideSeveral initiatives exist to narrow the divide Within the U.S.Within the U.S.
Universal Service Fund helps service providers to provide Universal Service Fund helps service providers to provide telecommunications services to rural areastelecommunications services to rural areas
E-Rate program provides rate subsidies for Internet access for E-Rate program provides rate subsidies for Internet access for schools and librariesschools and libraries
WorldwideWorldwide Africa ONE is creating a fiber optic network to connect the nations Africa ONE is creating a fiber optic network to connect the nations
of Africaof Africa What are some other options?What are some other options?
Workplace IssuesWorkplace Issues
Healthy computingHealthy computing ErgonomicsErgonomics: human factors related to the use : human factors related to the use
of computersof computers Employee monitoringEmployee monitoring
ToolsTools PoliciesPolicies
Environmental concernsEnvironmental concerns Power consumptionPower consumption Computer suppliesComputer supplies PC disposalPC disposal
Ergonomic EquipmentErgonomic Equipment
Chair should be Chair should be pneumatically pneumatically adjustableadjustable
Keyboard platform Keyboard platform should be set to should be set to proper heightproper height
Monitor must be Monitor must be adjustableadjustable
Lighting should be Lighting should be adjusted to minimize adjusted to minimize glare on the screenglare on the screen
Ergonomic BehaviorErgonomic Behavior
Ergonomic equipment must be used Ergonomic equipment must be used properlyproperly Turn the screen away from the window to Turn the screen away from the window to
reduce glarereduce glare Cover your screen with a glare protectorCover your screen with a glare protector Place keyboard to avoid arm and wrist fatiguePlace keyboard to avoid arm and wrist fatigue Use a raised rest for your wristUse a raised rest for your wrist Position your seat back so back is supportedPosition your seat back so back is supported Sit with your feet firmly on the floorSit with your feet firmly on the floor Enlarge fonts so they are easier to seeEnlarge fonts so they are easier to see Take frequent breaksTake frequent breaks
Employee MonitoringEmployee Monitoring
Various tools allow an employer to monitor Various tools allow an employer to monitor an employee’s performancean employee’s performance Keystroke monitors measure keystrokes per Keystroke monitors measure keystrokes per
secondsecond Other software tools monitor how long an Other software tools monitor how long an
employee is away from the computeremployee is away from the computer Monitor the files stored on the hard driveMonitor the files stored on the hard drive Monitor the sites visited on the InternetMonitor the sites visited on the Internet
Many companies have policies that notify Many companies have policies that notify employees about monitoring practicesemployees about monitoring practices
Information PrivacyInformation Privacy
UnauthorizUnauthorized ed collection & collection & use of use of informationinformation
Employee Employee MonitoringMonitoring
Helpful LinksFederal Trade CommissionHow Identify Theft WorksAnnual Credit Report
Jurisdictional IssuesJurisdictional Issues
International issuesInternational issues Applying national laws to a world-wide Applying national laws to a world-wide
medium is a difficult process. Why?medium is a difficult process. Why? Issues exist over which country’s court Issues exist over which country’s court
has jurisdictionhas jurisdiction National issuesNational issues
Issues exist over which locality’s court Issues exist over which locality’s court has jurisdictionhas jurisdiction
Imposition of sales taxes on Internet Imposition of sales taxes on Internet transactionstransactions
Protecting Children on the InternetProtecting Children on the Internet
The Internet offers many opportunities The Internet offers many opportunities for children, as well as dangersfor children, as well as dangers
Ways to protect childrenWays to protect children Blocking softwareBlocking software Child monitoringChild monitoring
Place the child’s computer in a public area Place the child’s computer in a public area instead of his or her bedroominstead of his or her bedroom
Restrict usage when parents are not presentRestrict usage when parents are not present Laws to protect childrenLaws to protect children
Blocking SoftwareBlocking Software Used to prevent children Used to prevent children
from accessing sites on from accessing sites on its updatable list of its updatable list of objectionable sitesobjectionable sites Blocks pornographic sites Blocks pornographic sites
and sites with foul and sites with foul language language
Blocks sites requesting Blocks sites requesting names, phone numbers, names, phone numbers, and credit card numbersand credit card numbers
Sometimes criticized for Sometimes criticized for being overzealousbeing overzealous
Laws to Protect ChildrenLaws to Protect Children
Children’s Online Privacy Protection ActChildren’s Online Privacy Protection Act Requires Web sites that target children under Requires Web sites that target children under
13 to post a privacy policy and obtain parental 13 to post a privacy policy and obtain parental consent before collecting dataconsent before collecting data
Children’s Internet Protection ActChildren’s Internet Protection Act Requires libraries receiving federal funding to Requires libraries receiving federal funding to
implement blocking technologyimplement blocking technology Neighborhood Children’s Internet Neighborhood Children’s Internet
Protection ActProtection Act Requires libraries receiving the E-Rate discount Requires libraries receiving the E-Rate discount
to establish an Internet safety policyto establish an Internet safety policy
Ethics in ComputingEthics in Computing
Ethics – standards of moral conductEthics – standards of moral conduct Used to help determine the proper Used to help determine the proper
course of action in difficult situationscourse of action in difficult situations Computing IssuesComputing Issues
Computer ethics Computer ethics (9-270)(9-270) Professional ethicsProfessional ethics Programmer responsibilityProgrammer responsibility Ethical use of computersEthical use of computers
Professional EthicsProfessional Ethics
Relates to ethics of those whose work Relates to ethics of those whose work focuses on computer systems focuses on computer systems (9-271)(9-271)
Code of Ethics and Professional Conduct Code of Ethics and Professional Conduct developed by the Association for developed by the Association for Computing MachineryComputing Machinery
Divided into sectionsDivided into sections General principlesGeneral principles Professional responsibilitiesProfessional responsibilities Guidelines for organizational systemsGuidelines for organizational systems
Programmer ResponsibilityProgrammer Responsibility
Bug-free software does not existBug-free software does not exist Testing can only show the presence of Testing can only show the presence of
bugs, not their absencebugs, not their absence Issues related to software qualityIssues related to software quality
How much testing is enough?How much testing is enough? How many minor bugs are acceptable in How many minor bugs are acceptable in
software about to be released?software about to be released?
Ethical Use of ComputersEthical Use of Computers
Data qualityData quality Users are responsible for the quality of data Users are responsible for the quality of data
entered into the systementered into the system Procedures must be in place to detect and Procedures must be in place to detect and
correct inaccurate informationcorrect inaccurate information Protecting customers’ personal dataProtecting customers’ personal data
Doing business over the InternetDoing business over the Internet Develop privacy policies stating how data will Develop privacy policies stating how data will
be used (opt-in vs opt-out)be used (opt-in vs opt-out) Digitally altering dataDigitally altering data
Altering RealityAltering Reality
Computers can alter Computers can alter photographsphotographs How much alteration is How much alteration is
ethical?ethical? E-mail messages can E-mail messages can
be destroyedbe destroyed In a legal action, is this In a legal action, is this
altering evidence?altering evidence?
Intellectual Property RightsIntellectual Property Rights
Refers to results of intellectual Refers to results of intellectual activity in the industrial, scientific, activity in the industrial, scientific, literary, or artistic fieldsliterary, or artistic fields
U.S. Copyright Act provides U.S. Copyright Act provides protection in three areasprotection in three areas CopyrightsCopyrights PatentsPatents TrademarksTrademarks
CopyrightsCopyrights
Provides the creator of a literary or artistic Provides the creator of a literary or artistic work with control over its use and distributionwork with control over its use and distribution Widespread distribution of music and video over Widespread distribution of music and video over
the Internet has created quite a controversythe Internet has created quite a controversy Defining fair use has been difficultDefining fair use has been difficult
Under fair use, you may use copyrighted works for Under fair use, you may use copyrighted works for limited purposeslimited purposes
Digital issuesDigital issues More Info? Go to: More Info? Go to:
http://www.mc.maricopa.edu/dept/d07/cis105/copyrightposter.http://www.mc.maricopa.edu/dept/d07/cis105/copyrightposter.htmhtm
Digital Fair Use IssuesDigital Fair Use Issues Copy-protection schemes make it Copy-protection schemes make it
impossible to copy CDs and DVDsimpossible to copy CDs and DVDs Users claim that violates their fair use rightsUsers claim that violates their fair use rights
SoftwareSoftware Users may not modify copyrighted softwareUsers may not modify copyrighted software
Digital imagesDigital images Images on the Web may be downloaded and Images on the Web may be downloaded and
used as screen savers, but they may not be used as screen savers, but they may not be distributed or altereddistributed or altered
PlagiarismPlagiarism Work taken from the Internet must be cited if it Work taken from the Internet must be cited if it
is used in a paper or other presentation is used in a paper or other presentation
PatentsPatents
Designed to protect inventions and Designed to protect inventions and encourage inventorsencourage inventors Grant patent holder exclusive rights to Grant patent holder exclusive rights to
the inventionthe invention Patent Office will grant patent Patent Office will grant patent
protection to software algorithms protection to software algorithms and techniquesand techniques Will also grant patents for business Will also grant patents for business
methods implemented in softwaremethods implemented in software
TrademarksTrademarks
A word, name, symbol, or device used A word, name, symbol, or device used to distinguish one company and its to distinguish one company and its products from anotherproducts from another
Two issues in the digital arenaTwo issues in the digital arena Unauthorized use of one company’s Unauthorized use of one company’s
trademarks on another’s Web sitetrademarks on another’s Web site Cybersquatting – obtaining a domain Cybersquatting – obtaining a domain
name that includes another company’s name that includes another company’s trademark, then selling that domain name trademark, then selling that domain name at a profitat a profit
If asked, can you….If asked, can you…. Identify the social issues and ethics in computingIdentify the social issues and ethics in computing Understand the digital divide social issue and its Understand the digital divide social issue and its
effect in societyeffect in society List and describe the workplace issuesList and describe the workplace issues Describe the international and national legal Describe the international and national legal
issuesissues List different methods that are already available List different methods that are already available
for protecting children on the Internetfor protecting children on the Internet Explain the significance of the ethics in computingExplain the significance of the ethics in computing Explain the significance of intellectual property Explain the significance of intellectual property
rightsrights
SourcesSources
Capron; Computers: Tools for An Capron; Computers: Tools for An Information Age, 8Information Age, 8thth Ed. 2003 Ed. 2003
Pfaffenberger; Computers in Your Pfaffenberger; Computers in Your Future 2003Future 2003
Microsoft ClipartMicrosoft Clipart How Stuff Works: Identify TheftHow Stuff Works: Identify Theft FTCFTC