0% found this document useful (0 votes)
424 views490 pages

Ict652 (Chapter 1-8)

The document discusses the history of computer technology and unexpected developments enabled by new technologies. It covers the rapid increase in computing power from the 1940s to present day and the emergence of cell phones, social media, e-commerce, artificial intelligence, robots, and tools to help disabled people. The document also introduces some basic concepts of computer ethics, including different ethical perspectives and the distinction between ethics, law, and personal preferences.

Uploaded by

2022907921
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
424 views490 pages

Ict652 (Chapter 1-8)

The document discusses the history of computer technology and unexpected developments enabled by new technologies. It covers the rapid increase in computing power from the 1940s to present day and the emergence of cell phones, social media, e-commerce, artificial intelligence, robots, and tools to help disabled people. The document also introduces some basic concepts of computer ethics, including different ethical perspectives and the distinction between ethics, law, and personal preferences.

Uploaded by

2022907921
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 490

CHAPTER 1:

INTRODUCTION
Historical Overview of Computer
Ethics
The Pace of Change
► 1940s: First computer was built.
► 1956: First hard-drive disk weighed a ton and stored five
megabytes.
► 1991: Space shuttle had a one-megahertz computer. Ten
years later, some automobiles had 100-megahertz
computers. Speeds of several gigahertz are now common.
Change and Unexpected Developments
Cell Phones
► Relatively few in 1990s. Approximately five billion
worldwide in 2011.
► Used for conversations and messaging, but also for:
► taking and sharing pictures
► watching videos
► checking email and playing games
► finding maps, etc
► What smartphone apps do we have for:
► Muslims?
► Students?
Change and Unexpected Developments
Issues with cell phones:
► PRIVACY: location tracking, camera
► Cell phones can interfere with solitude, quiet and
concentration.
► Talking on cell phones while driving is dangerous.
► Other unanticipated negative applications: terrorists
detonating bombs, rioters organizing looting parties.
Change and Unexpected Developments
Kill switches
► Allow a remote entity to disable applications and delete
files.
► Are in operating systems for smartphones, tablets and
some computers.
► Used mainly for security, but raise concerns about user
autonomy.
Change and Unexpected Developments
Social Media or Social Networking:
► First online social networking site was classmates.com in
1995.
► Founded in 2003, Myspace had roughly 100 million
member profiles by 2006.
► Facebook was started at Harvard as an online version of
student directories
► Twitter was founded in 2006
► microblogging and social networking service
► Instagram was launched in October 2010
► photo and video-sharing owned by Facebook, Inc.
Change and Unexpected Developments
Social Media or Social Networking (cont.):
► Businesses connect with customers.
► Organizations seek donations.
► Groups organize volunteers.
► Protesters organize demonstrations and revolutions.
► Individuals pool resources through “crowd funding”.
Change and Unexpected Developments
Social Media issues:
► Stalkers
► Cyber-bully
► Jurors tweet about court cases during trials.
► Socialbots simulate humans.
► Fake info / fake news
► Fake accounts
► Many more….
Change and Unexpected Developments
Communication and the Web
► In the 1980s, email messages were short and contained
only text.
► People worldwide still use email, but texting, tweeting ,
and other social media are now preferred.
► Blogs (“Web log”) began as outlets for amateurs wanting
to express ideas, but they have become significant source
of news and entertainment.
► Inexpensive video cameras and video-manipulation tools
have resulted in a burst of amateur videos.
► Many videos on the Web can infringe copyrights owned by
entertainment companies.
Change and Unexpected Developments
Telemedicine
► the practice of caring for patients remotely when the
provider and patient are not physically present with each
other.
► performance of medical exams and procedures, including
surgery.
► Examples:
► Patient consultations via video conferencing,
► e-health (including patient portals),
► remote monitoring of vital signs,
► nursing call centers,
Change and Unexpected Developments
E-commerce
► Amazon.com started in 1994 selling books on the Web.
It has grown to be one of the most popular, reliable,
and user-friendly commercial sites.
► eBay.com facilitates online auctions.
► Shopee
► Lazada
► Zalora
► Traditional brick-and-mortar businesses have also
established web sites for their company.
Change and Unexpected Developments
E-commerce and trust concerns
► When people sell stuffs on social media, how do you
decide that this seller is trustworthy?
► Profile picture?
► Language? Bagi salam, etc?
► Testimonials?

► Reviews
Change and Unexpected Developments
► Collaboration
► Wikipedia: The online, collaborative encyclopedia
written by volunteers.
►Edit war
► Informalcommunities of programmers create and
maintain free software.
► Watch-dogs on the Web: Informal, decentralized groups
of people help investigate crimes.
►Controversial: emotionally involved
Change and Unexpected Developments
Free stuff
► Examples:
► Emailaccounts, browsers, software for viewing
documents, software to edit photos and videos etc.
► Phone services using VOIP such as Skype, Whatsapp
► University lectures
► In order for companies to earn ad revenue, many free
sites collect information about our online activities and
sell it to advertisers.
► Free games, free apps. What do they get from it?
Change and Unexpected Developments
Free stuff (cont.)
► Advertising pays for many free sites and services, but not
all.
► Wikipedia funded through donations.
► Businesses provide some services for good public relations
and as a marketing tool.
► Generosity and public service flourish on the Web. Many
people share their expertise just because they want to.
Change and Unexpected Developments
Artificial Intelligence
► A branch of computer science that makes computers
perform tasks normally requiring human intelligence.
► Researchers realized that narrow, specialized skills were
easier for computers than what a five-year-old does:
recognize people, carry on a conversation, respond
intelligently to the environment.
► Many AI applications involve pattern recognition.
► Speech and face recognition is now a common tool.
Change and Unexpected Developments
Robots
► Mechanical devices that perform physical tasks
traditionally done by humans.
► Can operate in environments that are hazardous for
people.
► Robots could:
► inspect undersea structures and communication cables
► searchfor survivors in buildings collapsed by bombs or
earthquakes
► explore volcanoes and other planets
Change and Unexpected Developments

Smart sensors, motion, and control


► Motion sensing devices are used to give robots the ability
to walk, trigger airbags in a crash, and protect laptops
when dropped.
► Sensors can detect leaks, acceleration, position,
temperature, and moisture.
Change and Unexpected Developments
Tools for disabled people
► Assistive technology devices help restore productivity and
independence to people with disabilities.
► Researchers are experimenting with chips that convert
brain signals to controls for leg and arm muscles.
Change and Unexpected Developments
► Old problems in a new context: crime, pornography,
violent fiction
► Adapting to new technology: what changes we need to
implement because of new technologies
► Global reach of Net: ease of communication with distant
countries
► Trade-offs and controversy: Increasing security means
reducing convenience.
► Patriot Act – after 9/11
► Perfection is a direction, not an option.
Basic Concepts of Computer Ethics
Ethics

What is Ethics:
► Study of what it means to “do the right thing”.
► Assumes people are rational and make free choices.
► Rules to follow in our interactions and our actions that
affect others.
► Two different perspectives that ethics are:
► Fundamental like law of science
► Rules we make up like law of football
Ethics
A variety of ethical views (cont.):
► Negative rights (liberties)
► The right to act without interference
► Freedom of religion
► Freedom of assembly
► Freedom of speech
► Freedom of association
► Positive rights (claim-rights)
► An obligation of some people to provide certain things for
others
► E.g in Malaysia: Housing developers must provide
bumiputera quotas even if they don’t want to.
Ethics
A variety of ethical views (cont.):
► Golden rules
► Treat others as you would want them to treat you.
► Contributing to society
► Doing one’s work honestly, responsibly, ethically,
creatively, and well is virtuous.
► Social contracts and a theory of political justice
► People willingly submit to a common law in order to
live in a civil society.
Ethics
A variety of ethical views (cont.):
► No simple answers
► Human behavior and real human situations are
complex. There are often trade-offs to consider.
► Ethical theories help to identify important principles or
guidelines.
► Do organizations have ethics?
► Ultimately, it is individuals who are making decisions
and taking actions. We can hold both the individuals
and the organization responsible for their acts.
Ethics
Some important distinctions:
► Right, wrong, and okay
► Can’t divide all acts into right/wrong
► Distinguishing wrong and harm
► Harm: not necessarily mean unethical, E.g: Taxes
► Separating goals from constraints
► Goal: make profit, but within constraints
► Personal preference and ethics
► Can’t force others to think the same way
► Law and ethics
► What is lawful might not be ethical. Vice versa
Computer Ethics?
► Known as standard of professional practice, codes of
conducts, aspects of computer law, public policy, corporate
ethics even certain topics in sociology and psychology of
computing.
► The efforts of professional philosophers to apply traditional
ethical theories like utilitarianism, Kantianism, or virtue
ethics to issues regarding the use of computer technology.
► Computer ethics in the broadest sense can be understood as
that branch of applied ethics which studies and analyze such
social and ethical impacts of information technology
Historical Milestone in Computer Ethics

1940s and 1950s


► Computer ethics as a field of study has its roots in the
work of Professor Norbert Wiener (early 1940s) in
Massachusetts Institute of Technology (MIT)
► Wiener develop insightful ethical conclusions about the
technology that we now call ICT (information and
communication technology)
► He perceptively foresaw revolutionary social and ethical
consequences with the effect of artificial machines.
► The presence of another social potentiality of unheard-of
importance for good and for evil.
Historical Milestone in Computer Ethics

1940s and 1950s (cont.)


► In 1950 Wiener published his monumental book, The Human
Use of Human Beings.
► Wiener's foundation of computer ethics was far ahead of its
time, and it was virtually ignored for decades.
► On his view, the integration of computer technology into
society will eventually constitute the remaking of society -- the
"second industrial revolution“.
Historical Milestone in Computer Ethics

1960s
► In the mid 1960s, Donn Parker of Stanford Research
Institute (SRI) International in California began to examine
unethical and illegal uses of computers by computer
professionals.
► He published "Rules of Ethics in Information Processing" in
Communications of the ACM in 1968
► Parker headed the development of the first Code of
Professional Conduct for the Association for Computing
Machinery
Historical Milestone in Computer Ethics

1970s
► In late 1960s, Joseph Weizenbaum, a computer scientist
from MIT in Boston, created a computer program that he
called ELIZA
► In his first experiment with ELIZA, he scripted it to
provide a crude imitation of "a Rogerian psychotherapist
engaged in an initial interview with a patient“
► The results showed that how deep people emotionally
involved with the computer, sharing their intimate
thoughts with it.
Historical Milestone in Computer Ethics
1970s (cont.)
► In mid 1970s, Walter Maner, from Bowling Green State
University in Ohio began to use the term "computer ethics"
to refer to that field of inquiry dealing with ethical
problems aggravated, transformed or created by
computer technology.
► Maner generated much interest in university-level
computer ethics courses.
► He offered a variety of workshops and lectures at
conferences across America
► Many university courses were put in place because of him,
and several important scholars were attracted into the
field.
Historical Milestone in Computer Ethics
► By the 1980s, a number of social and ethical
consequences of information technology were becoming
public issues in America and Europe
► In the mid-80s, James Moor of Dartmouth College
published his influential article "What Is Computer Ethics?"
► In 1991 Bynum and Maner convened the first international
multidisciplinary conference on computer ethics, which
was seen by many as a major milestone of the field.
► It brought together, for the first time, philosophers,
computer professionals, sociologists, psychologists, lawyers,
business leaders, news reporters and government officials.
► It generated a set of monographs, video programs and
curriculum materials
Historical Milestone in Computer Ethics
1990s
► During the 1990s, new university courses, research
centers, conferences, journals, articles and textbooks
appeared, and a wide diversity of additional scholars and
topics became involved.
► Simon Rogerson of De Montfort University (UK),
established the Centre for Computing and Social
Responsibility
► The mid-1990s has heralded the beginning of a second
generation of Computer Ethics
Defining the Field Of Computer Ethics
► The second stage is "technological permeation"
► Technology gets integrated into everyday human activities
and into social institutions,
► Technology changes the meaning of fundamental concepts,
such as "money", "education", "work", and "fair elections".
► Computer ethics identifies and analyzes the impacts of
information technology upon human values
► E.g.:health, wealth, opportunity, freedom, democracy,
knowledge, privacy, security, self-fulfillment, and so on.
Defining the Field Of Computer Ethics
► According to Moor, the computer revolution is occurring in
two stages.
► The first stage was that of "technological introduction"
► Computer technology was developed and refined.
► This already occurred in America during the first forty years
after the Second World War.
ISLAMIC
PERSPECTIVES
Prepared By:
Zuhri Arafah Zulkifli
Muhammad Hafiz Khairuddin
Mohd Shukor Abd Rahman
Moral Theories Akhlaq Theories

Social System
Belief

2
"Ethical values in Islam:
Particular reference with
Prophet Muhammad s.a.w.
Mission".

3
4
Ethics in Islam
O Islam has a comprehensive perspective regarding the
ethical issues because the lawgiver for all systems,
including the ethical system, is Allah s.w.t, who knows
everything and what is best for all human beings.

O Ethics in Islam are defined as the good principles and


values based on the Islamic sources – Quran and hadith.
The Islamic sources are the only standards for identifying
what is right and what is wrong.

O Ethics in Islam are consistent with the ability of human


beings and they cover all aspects of life.

5
Ethics from Islamic
Perspective
O Ethics is related to several Arabic terms
O ma‘ruf (approved),
O khayr (goodness),
O haqq (truth and right),
O birr (righteousness),
O qist (equity),
O ‘adl (equilibrium and justice), and
O taqwa (piety).

O The term that is most closely related to ethics in


the Quran is AKHLAQ.

6
Islamic Sources
O In Islam, the Quran is the main course of judgment.

O However, because the Quran generally speaks about general


concepts, the specific details of them are spelled out by the
Sunnah.

O In the case of ethics, the detailed practicality of what ethics is


embodied in the Prophet’s action and behavior.

7
MORAL

8
Ethics vs Moral
O Ethics and morals both relate to “right” and “wrong”
conduct.

O Ethics refer to the series of rules provided to an


individual by an external source. e.g. their profession.

O Morals refer to an individual’s own principles


regarding right and wrong.

9
Morality
O The word “morality” comes from the Latin
word moralitas meaning “manner, character, and proper
behavior”

O Morality generally refers to a code of conduct, that an


individual, group or society hold as authoritative, in
distinguishing right from wrong.

10
Standard of Judgment
in Islam
O This standard of judgment provides the nucleus around
which the whole moral conduct should revolve – whether
conduct is good or bad:

O Our faith should be true and sincere,


O We must be prepared to show it in deeds of charity to our
fellow-men,
O We must be good citizens, supporting social organizations,
O Our own individual soul must be firm and unshaken in all
circumstances.

11
Basic Principles in Islamic
Morality
O The Islamic moral system stems from its primary creed of belief in One
God as the Creator and Sustainer of the Universe.

O Islam considers the human race to be a part of God’s creation, and as His
subjects.

O Quran and hadith, the main sources of Islam, attached great importance
to ethics.

O The Prophet Muhammad s.a.w. indicated that the main purpose Allah sent
him to the people is to improve their ethics.
He said: “I was sent only to perfect the moral excellence of human beings”
12
Basic Principles in Islamic
Morality
O The key to virtue and good conduct is a strong relation with
Allah.
O Islam enjoins moral behavior in all circumstances; Allah is aware
of each one when no one else is.
O It may be possible to deceive the world, but it’s not possible to
deceive the Creator.
O The love and continuous awareness of Allah and the Day of
Judgment enables man to be moral in conduct and sincere in
intentions, with devotion and dedication.

13
AKHLAQ

14
15
Definition
O Akhlaq (Arabic: ‫أخالق‬‎) is an Arabic term referring to
the practice of virtue, morality and manners in
Islamic theology and philosophy.
O Akhlaq refers to character or customs
O Imam Al-Ghazali define akhlaq as a nature
character (internal) of human being, and willing to
express spontaneous action.

16
Definition (cont..)
O Akhlaq derives from the Arabic Khuluk means
behavior, customs, or believe. Akhlaq will
showing identity for an individual.

O The best person to mention about akhlaq in


Islam is Prophet Muhammad SAW.

17
Akhlaq
O Akhlaq focus to goodness and badness, and will tell
us how we can practice it in our life, either with
Allah, human being, and environment.
O A Muslim is expected to be humble before Allah and
with other people.
O Islam also commands upon every Muslim to
exercise control of their passions and desires.

18
SOCIAL
SYSTEM
BELIEF
19
SOCIAL SYSTEM BELIEF
O Belief:
❑ Needs reason
❑ Arise through experience

20
O Belief System:
❑ structures of norms that are interrelated
❑ every human being has belief system to
make sense of the world
O It is shaped by:
฀ religion
฀ culture
฀ experience
฀ training
฀ stereotypes
฀ political viewpoints
฀ etc
21
22
Social System of Islam

• Equality of Mankind
• Institution of the Family
• Relatives & Neighbours

23
Equality of Mankind
Wahai umat manusia! Sesungguhnya Kami telah
menciptakan kamu dari lelaki dan perempuan dan Kami
telah menjadikan kamu berbagai bangsa dan bersuku
puak, supaya kamu berkenal-kenalan (dan beramah mesra
antara satu dengan yang lain). Sesungguhnya semulia-
mulia kamu di sisi Allah ialah orang yang lebih takwanya di
antara kamu, (bukan yang lebih keturunan atau
bangsanya). Sesungguhnya Allah Maha Mengetahui, lagi
Maha Mendalam PengetahuanNya (akan keadaan dan
amalan kamu).
(Al Hujurat: 13)

24
Equality of Mankind
O Foundation of Islamic Social System
O The equality of all Muslims is emphasized
repeatedly throughout the Qur'an.
O Islam does not distinguish between two races,
or two groups of people, or between two
colours.
O Example, performing Umrah; Friday prayers

25
Institution of the Family
O The foremost and fundamental institution of human
society is the family unit

O According to Islam the correct relationship between


man and woman is marriage, a relationship in which
social responsibilities are fully accepted and which
results in the emergence of a family.

26
Institution of the Family

O Respect and care for parents is very much stressed


in the Islamic teaching and is a very important part
of a Muslim's expression of faith.

27
Institution of the Family

28
Relatives & Neighbors
O The Qur’an has divided them into three categories:
a neighbour who is also a relation; a neighbour who
is a stranger; and a casual or temporary neighbour
with whom one happens to live or travel for a
certain time
O All of them are deserving of sympathy, affection,
kindness and fair treatment.

29
Relatives & Neighbors

30
Relatives & Neighbors
O No one among you shall be a true believer unless he likes for
others what he likes for himself (Bukhari and Muslim).

Dan hendaklah kamu beribadat kepada Allah dan janganlah kamu


sekutukan Dia dengan sesuatu apa jua dan hendaklah kamu berbuat
baik kepada kedua ibubapa, dan kaum kerabat, dan anak-anak yatim,
dan orang-orang miskin, dan jiran tetangga yang dekat, dan jiran
tetangga yang jauh, dan rakan sejawat, dan orang musafir yang
terlantar, dan juga hamba yang kamu miliki. Sesungguhnya Allah
tidak suka kepada orang-orang yang sombong takbur dan
membangga-banggakan diri.
(An Nisaa: 36)

31
VIEW/ISSUES
THAT RELATED TO
ISLAMIC PERSPECTIVES
FREE SPEECH
❖ Islam encourages the use of freedom of speech in upholding justice and preventing wrong-
doing.

❖ Below is an example of hadith on telling the truth:


“Telling of truth is a virtue and virtue leads to paradise and the servant who endeavors to
tell the truth is recorded as truthful, and lie is obscenity and obscenity leads to hell-fire, and
the servant who endeavors to tell a lie is recorded as a liar.”[1]
◦ Example of hadith on preventing wrong-doing
“Whosoever of you sees an evil, let him change it with his hand; and if he is not able to do
so, then [let him change it] with his tongue; and if he is not able to do so, then with his
heart — and that is the weakest of faith.”[2]

❖ A muslim must speaks out against evil or bad deeds, give advise in order to stop the
wrongdoings and if needed report it to the authority.

❖ A muslim must put the interest of the religion first even faced with strong opposition.
FREE SPEECH
❖ There are few situations that a Muslim should be very
cautious in their speeches. Islam prohibits kind of
speeches that bring harm to others. The speeches are:
• Backbiting
• Defaming and Slandering
• Talebearing
BACK BITING
❖ Back biting is malicious talk about someone who is not present. Back biting is a form
slander in someone’s absence. Islam prohibits backbiting. A verse from the holy Quran on
the matter:
“O you who have believed, avoid much [negative] assumption.
Indeed, some assumption is sin. And do not spy or backbite each other.
Would one of you like to eat the flesh of his brother when dead?
You would detest it.
And fear Allah ; indeed, Allah is accepting of repentance and merciful” [3]
❖ A Muslim must not smear another Muslim reputation (except when ask authority e.g.
When ask in a court). Because being a Muslim, he cannot hurt his brother of faith. A good
Muslim is who check his speech and action against a fellow Muslim. An example of hadith
is presented below:
“A Muslim is the one from whose tongue and hands the Muslims are safe; and a
muhajir (emigrant) is the one who refrains from what Allah has forbidden“[4]
DEFAMING AND
SLANDERING
❖ Defame and slander is another exclusion the freedom of speech in Islam. Defame is
damaging a person or group by saying bad things about them in their presence.

❖ While slander is damaging a person or group by saying bad things about them in their
absence. In the religious context, a slander has an almost similar meaning to backbiting.
However, slander is about telling lies about someone behind his back while backbiting is
saying something hurtful about someone even if it is the truth, but the person does not
like it to be mention to someone else.

❖ Verses from the holy Quran about prohibition of Defaming and Slandering:
“"Woe to whoever defames (the presence) and slander (in absence), which
accumulates wealth and counts them forever; he thinks that his wealth will make
him eternal. No! Surely he will be released on ripper (hell)“[5]
TALEBEARING
❖Talebearing is an act bring into conflicts between brothers of faith by telling
something bad about one person to another person with the intent that the
listener does some harm to the person who is being bad-mouthed, and this
makes the person who is saying bad things happy. This is act is very harmful AS
the prophet SAW warned the talebearer:
Narrated hudhaifa:
I heard the prophet saying,
"A qattat (talebearer) will not enter paradise.“[6]
ISSUES ON
COMPUTER & WORK
Time Management
฀ Our attitude towards time indicates our attitude towards the value of the capital
of life.

฀ Capital of life here means TIME. We must ensure that our task is done on time,
follow the deadline and not procrastinating.

฀ Technology advancement like social media would affect our task by too much
spending on them rather than finishing the task given.

Allah Says:
“I swear by the time. Most surely man is in loss. Except those who believe
and do good works, and exhort one another to accept truth, and exhort one another
to be steadfast”
(Surah Al- ’Asr, 103:1-3)
Honesty and Integrity
฀ Integrity means that data cannot be modified without authorization.

฀ A Muslim should not make a product or to provide service but


cheats through false information using Internet as it is easy and less
costly, Allah will without doubt see that and He will judge
accordingly.

฀ IT professional have to subscribe to and promote an ethical


approach to the management of software and hardware
development and maintenance. They have to show the honesty
(Amanah) and equity in performing their duty.

“O believers, fear God, and be among those who are the truthful ones”
(Al-Tawbah 9:119)
Physical Surveillance
฀ Computer-users face monitoring problems at their workplace for their use of
emails or the Internet.

฀ Organizations implement physical surveillance in offices to monitor their


employees as organizations own the ICT facilities and it should not be abused.

฀ Organization should inform their employees of the use of any surveillance


equipment.

฀ Keeping them uninformed means infringement on the part of the organizations.


Employees have their privacy rights at the workplace, even though the premise is
owned by the organizations.

“Indeed, Allah commands you to render trusts to whom they are due and when you
judge between people to judge with justice. Excellent is that which Allah instructs
you.
Indeed, Allah is ever Hearing and Seeing.”
(Al- Nisa 4:58)
COMPUTER CRIME
O In the today’s world, the form of crime has escalated through the use of
computer/cyber technology.
O Computer crime cases are usually in the form such as hacking, fraud,
theft and libel.
O All of the above is forbidden in Islam as it will cause harm or destruction.
O The Al-Quran stated:

“And when it is said to them, “Do not work corruption on


earth,”…”
(Al-Quran; 2:11)
O This verse shows that in Islam, it is forbidden to do actions that can
cause destruction/corruption.
COMPUTER CRIME
O Islam does not allow actions that can lead to destruction/corruption on
earth.
O In fact, if we look at hacking for example, it is a form of trespass.
O The Al-Quran stated:

“O you who believe! Do not enter houses other than your own, until you
have asked for permission, and greeted their occupants. That is better
for you; so that you may remember.”
(Al-Quran, 24:27)

O Through this verse, entering a property without it’s owner’s consent is


forbidden in Islam. It is also an approach by Islam to uphold the privacy
rights ( Al-A’ali, 2007).
COMPUTER CRIME
O Islam also forbids any kinds of theft. Nowadays, it is not just about the
theft of money anymore, it has escalated to information and identity
theft.

O The Al-Quran stated:


“As for the male thief and the female thief, cut their hands as a penalty
for what they have reaped—a deterrent from God. God is Mighty and
Wise.”
(Al-Quran, 5:38)

O As you can see from this verse, Islam views theft very seriously and
punishes the perpetrator with a very severe punishment.
COMPUTER CRIME
O Islam views libel (fitnah) very seriously. The existence of social media
platform has made libel very easy to commit. Islam views libel is
worst than committing the sin of murder.

O There are two verses in the Al-Quran that stated:

“..And fitnah is worse than killing.”


(Al-Quran, 2:191)

“..And fitnah is greater than killing.”


(Al-Quran, 2:217)
COMPUTER CRIME
O Any form of actions that can lead to destruction and
corruption on earth are forbidden by Islam.
O The Al-Quran and Hadith have many examples and
guides that forbade dishonesty, theft, fraud and other
forms of crime.
O Those crimes have escalated into the computer/cyber
technology platform and it is still forbidden by Islam
based on the Al-Quran and Hadith.
REFERENCES
O Al-Quran.
O Al-A’ali, M. (2007). Computer Crime and the Law from an Islamic Point of View. Journal of Applied
Sciences, 7(12), 1558-1565.
O Muslim, Abu al-Husain Muslim bin al-Hajjaj al-Qusyairi al-Naisaburi (n.d.). Sahih Muslim. Beirut: Dar Ihya
al-Turath al-’Arabi.
O [1] Sahih Muslim, book 45, hadith 135
O [2] Sahih Muslim, book 1, hadith 49
O [3] Alquran Alkareem, alHujurat, verse 12
O [4] Sahih Bukhari, book 10, hadith 6484
O [5] Alquran Alkareem, surah alHumazah, verses 1-4
O [6] Sahih Bukhari, book 78, hadith 86, reference 6056
O https://www.al-islam.org/islamic-way-life-allamah-abu-al-ala-mawdudi/islamic-social-order
O Noordin, M. F. (2013). Application of privacy, security and ethics in islamic concerned ICT.
Middle-East Journal of Scientific Research, 14(11), 1548-1554.
O Ahmadon, F. (2015). Islamic Perspective [Powerpoint slides]. Retrieved from https://i-
learn.uitm.edu.my/contents/index/556bc3df-8d78-4a0f-ab1d-
2840c0a80109/cid:ITS610

46
CHAPTER 3
3.1 PRIVACY AND PERSONAL INFO
WHAT IS PRIVACY?

 The state of being private; retirement or seclusion.


 The state of being free from intrusion or disturbance in
one's private life or affairs : the right to privacy.
-Dictionary.com-
THREE KEY ASPECTS OF PRIVACY:

1. Freedom from intrusion.


2. Control of information about oneself.
3. Freedom from surveillance.
SOME ISSUE THAT NEEDED TO BE KEPT PRIVATE:

 Health
 Relationship

 Family

 Medical information

 Religious belief

 Political view
IMPORTANCE OF PRIVACY

Safety

Security
PRIVACY THREAT IN SEVERAL CATEGORIES:

 Intentional, institutional uses of personal information.


 Unauthorized use or release.

 Theft of information.

 Inadvertent leakage of information through negligence


or carelessness of our own action.
SEARCH QUERY DATABASES:
 Anything we do online is recorded
 Save huge amounts of data
 People not aware
 Leak happen
 Collection of many small items of information
 Re-identification
 Government requestor demand sensitive personal
data
 Information on Internet is open
 Data last forever
 Misuse of data
 Cant protect privacy on our own
NEW TECHNOLOGY, NEW RISK
 GPS

 Biometric technology
TERMINOLOGY AND PRINCIPLES FOR DATA
COLLECTION AND USE

 Invisible Information Gathering


- Collection of personal information about
someone without the person knowledge.
- We not aware the data has been collected, how it will
be used and even we had no opportunity to defend our
right
 Secondary Use
- Usage of personal information for a purpose other than
the one for which it was supplied for.
- Example are:
a. Data Mining
b. Computer Matching
c. Computer Profiling
 Data Mining
- Searching and analyzing masses of data to find pattern and
develop new information or knowledge.

 Computer Matching
- Combining and comparing information from different
databases
- Used as identifier such as SSN to match records

 Computer Profiling
- Analyzing data in computer files to determine
characteristics of people
- Businesses use this technique to grap new customer
PRIVACY PRINCIPLES FOR PERSONAL
INFORMATION
 Inform people when personally identifiable info is
collected, what is collect and how it is used
 Collect only the data needed

 Offer for people to opt out from mailing list , advertise


, transfer of their data to other
 Provide stronger protection for sensitive data

 Keep data only as long as needed

 Maintain accuracy of data

 Protect security of data

 Develop policies for responding to law enforcement


requests for data
EXAMPLE OF GOVERNMENT DATABASE
WITH PERSONAL INFORMATION

 Marriage and divorce records


 Tax records

 Medical records

 Property ownership

 Welfare record

 Motor Vehicle record


3.2 IMPACT OF COMPUTER
TECHNOLOGY
1. COMMUNICATION.
 Internet, being first and foremost, a tool of
communication has certainly made contact with
others easier and faster. Communication is done
through emails, instant messaging or voice over
internet protocol which allows one to actually call
the person.
2. FASTER ACCESS TO INFORMATION.
 One click of the mouse and all sorts of
information come out using the search
engine. We can access weather forecasts, news
and celebrity gossips in seconds online
3. BUSINESS TRANSACTIONS.
 Transacting business online like paying bills,
depositing cash, checking credit card balance,
etc. Bank statements can be accessed online too.
4. SHOPPING.
 Shopping online is the usual mode of buying
now. All kinds of products and stores are
available online. Travel time to get to the
supermarket is effectively eliminated. Shopping
can be done entirely at the convenience of home.
5. RESEARCH TOOL.
 Surf for information or to research online.
Assignments, thesis, book reviews – all kinds of
research information you need are available
through the internet.
6. EDUCATION.

 One can take virtual college classes. There is no


need to travel to school, be in the classroom,
participate in discussions, etc.
7. RECREATION.
 Downloading movies or music or even games
through the internet is fast becoming the form of
recreation these days. Some of these are
available for free.

8. MEETING PEOPLE.
 We can meet people from all parts of the world
and all walks of life through the internet. You
can chat to someone from another part of the
world without having to leave your room. The
webcam and voip (voice over internet protocol)
could enable you to actually see and hear the
person you are chatting to.
3.3 PRIVACY RISK
MARKETING, PERSONALIZATION AND
CUSTOMERS RECORDS

 Targeted marketing
 Why business do marketing?
 Find new customer
 Encourage old one to continue

 Advertise product, service

 How to price product

 To whom to offer discount

 Business use computer


technology to store, analyze
 Customer purchase
 Financial information

 Online activity

 Opinion, preferences and any other useful information.


 Mailing list
 List is in thousand of criteria(age, gender etc), recorded
when you bought something, enter contest or fill out
questionnaire.
 Mailing list manager will get the info and will sell it to
advertiser
 Most customer did not agree because it threaten the key

aspect of privacy (private information are recorded)

 Marketer side : targeted marketing is useful to customer,


reduce cost

 People did not realize/expect the company would store and use
their information for other task. People often did not see,
ignore or did not understand the implication.
 Personalized marketing
 What people like about personalization
 Recommendation based on prior purchase
 Greeted by name after log in
 What people don’t like about personalization
 People feel manipulated
 The private information might get leaked in ways that threaten
peoples privacy.

 Paying for customer information


 Enter contest (give out info) to trade with chances of
winning prize
 Supermarket want customer to use credit card so that they
can record customer buying pattern
 Provide service for free (Google provide gmail for free but
reads people email for targeting ads)
 People did not understand the potential uses of their
information and long term consequences of the agreement
(most people did not read terms)
 Data firms and customer profile
 Company that that maintain huge customer database
collect data from huge number of sources and build
personal profile
 Example – Acxiom , ChoicePoint
 These firm sell data to business for marketing an
customer management
LOCATION TRACKING
 Technology that allow location tracking (GPS,
RFID, cellphone)
 Application include
 Track people location
 The issue with intrusion of privacy when advertiser track
customer location and send them advertisement when they
are nearby
 Behavioral marketing and research
 Gather information about user behavior when they are in
certain location (supermarket, disneyland)
 Identify and track patient in hospital
 Improved inventory management system
 RFID tags
 Used in various identity document
 Easy to read the information on RFID chip and copy it to
another chip.
 Constant surveillance and risk of misuse

 Risk
 Who did not supposed to get this information?
 Thieves, stalkers, divorced lawyer, nosy neighbors.
 Storage of information of where a person location over
time.
 This records of movement pose many threat to privacy, safety
and liberty
 Ability to determine a person current location has risk
STOLEN AND LOST DATA
 Criminal steals / uses the information
 Buy the record
 Hacking
 Stealing
 Spyware collects
 Track web surfing
 Credit card numbers
 Data stolen is to be used in identity theft and
fraud
 Government agency lost data as well
 There is no law require government to inform people
who his/her personal data were stolen
 Investigator and data brokers use pretexing process
to get information
 Pretend to be someone with good reason to obtain the
data
 Obtain customer data by lying and sell it to whoever
wants it is unethical.
 Those who collect information has ethical
responsibility to protect them from misuse

 Protect personal data by


 Do not bring out the information from the
building/company without solid / urgent matters.
 Encrypt the data
 Use tracking system
 Penalty for business/government/company that
lose data
 Payment for disclosure of data, but only applied when
the person suffers harm from the information leak.
WHAT WE DO OURSELVES
 People did not realize that in web, everything is
public (blogs, social network)
 People often want their information about others
but do not want other to have the same access of
information abut themselves
 Include birth date on online profile or resume in
job hunting site.
 Exposed information that can verified our
identity.
 Post gossips opinion, not appropriate pictures
that they have trouble to clean up later.
 Web is public!
Pro Cons

•We do not need to •No access to


manage our own information when
system network is down
•We do not have to •Lost control of
make back ups files where are at
•Can access files risk of theft,
from anywhere misuse, accidental
with internet exposure.
access
•Easily share files
and collaborate
with others
PUBLIC RECORDS : ACCESS VS PRIVACY

Negative consequences
• Identity theft
• Destruction of reputation
• Personal safety risk
• Secondary uses of information
• Loss of social forgiveness

Solution
• Limiting what is posted online
• Adopting automation systems with edited
features.
• Restriction on access
NATIONAL ID SYSTEMS

 Malaysia became the first country in the world to use


an identification card that incorporates both photo
identification and fingerprint biometric data on an in-
built computer chip embedded in a piece of plastic.
 Besides the main purpose of the card as a validation
tool and proof of citizenship other than the birth
certificate, MyKad also serves as a valid driver's
license, an ATM card, an electronic purse, and
a public key, among other applications, as part of the
Malaysian Government Multipurpose Card (GMPC)
initiative.
PRIVACY RISK
 “having the smart card will probably increase
theft . . . because the attraction is there. There is
a lot of personal information stored [on the card],
including buying patterns which would attract
(card cloning) syndicates," according to industry
analyst Jafizwaty Ishahak
 The Consumers Association of Penang has
argued that the cards make individuals' personal
and confidential information too vulnerable
and has recommended that the proposed
Personal Data Protection Act address these risks
specifically ("Smart IC Open to Abuse," The Star,
April 18, 2001)
CHILDREN : THE RISK
 Inappropriate Material
 pornographic, hateful or violent in nature that
encourages activities that are dangerous or illegal,
biased
 Physical Danger
 Paedophiles
 Bullying
 they may receive email, chat or text messages that
make them feel embarrassed, upset, depressed or
afraid
 Illegal Behaviour
 Illegal Activity
 Personal Information
PROTECT A CHILD’S PRIVACY ONLINE
 Check children privacy settings on Facebook.
 Make sure kids understand the importance of not
sharing certain information
 Tell children to remember that they shouldn’t
share personal details like their schedules
 Encourage them instead to stick to “social”
information, such as music, movie and other wide
spread interests.
 Not to use their real name as their blog or chat
name that is displayed to other users.
3.4 PROTECTING PRIVACY
INTRODUCTION
 Individuals and Organization help the demand
for privacies .
o Eg : programmer provide free privacy-protecting
software on the web.
o PRC provide excellent information resource
o EPIC inform the public ,file lawsuits and advocate for
better privacy protection.
AWARENESS
 For Customer :
 Aware of the problems and potential solutions .
 More careful about information we give out .
 Consider the privacy policies of businesses and
website we use or visit .
 For business manager :
 Learn and implement techniques to respond to the
privacy demands of customer .
 Design systems with privacy protection in mind .
 Building protective features .
PRIVACY-ENHANCING TECHNOLOGIES FOR
CONSUMERS

 Browsers added option to alert user whenever


website is about to store a cookie and allow user
to reject it.
 Software to block pop-up advertisement .

 Companies sell software to scan PCs for spyware.

 Anonymizer ,user surf website anonymously .

 Registration and password .


ENCRYPTION
 Encryption is the process of
transforming information (referred to as plaintext)
using an algorithm) to make it unreadable to anyone
except those possessing special knowledge, usually
referred to as a key.
 Eg : Symantec Endpoint Encryption software (provides
advanced data encryption and file encryption for desktops,
laptops, and removable storage devices. )
BUSINESS TOOLS AND POLICIES FOR
PROTECTING PERSONAL DATA

 A well-designed database for sensitive information


includes several features to protect against leaks,
intruders, and unauthorized employee access .
 Each person with authorized access to the system
should have a unique identifier and a password .
 System can restrict users form performing certain
operations such as writing or deleting on some files.
 The Direct Marketing Association adopted a policy
requiring its member companies to inform consumers
when they will share personal information .
RIGHT AND LAW .
 Computer Software Privacy and Control Act
 To prevent deceptive software transmission practices
in order to safeguard computer privacy, maintain
computer control, and protect Internet commerce.

 Fraud and related activity in connection with


computers Acts .
 Prevent about accessing a computer without
authorization or exceeds authorized .
THE FREE-MARKET VIEW AND CONSUMER
PROTECTION VIEW .
 Free market : Provide freedom for consumer in
business to make voluntary agreement .
 Emphasize :
 Informed consent
 Freedom of contract
 Free flow of information .

 Consumer Protection : protect consumer against


abuses and carelessness
 Emphasize :
 User`s information .
PRIVACY REGULATIONS IN THE EUROPEAN
UNION
 EU has a comprehensive Data Protection
Directive .
 Forth Fair Information Principles :
 Personal data collected only for specified
 Data must be accurate and up to date
 Processing of data is permitted only if the person
consented unambiguously
 Special categories of data must not be processed
without the subject `s explicit consent .
 User must be notified of the collection and use of data
about them .
 Processing of data about criminal convictions is
severely restricted.
3.5 COMMUNICATION
PRIVACY
COMMUNICATION
 Communications Assistance for Law
Enforcement Act , which requires that technology
used in comm systems be designed of modified to
ensure ability of law enforcement agencies to
intercept communication .
WIRETAPPING AND EMAIL PROTECTION
 Telephone :
 The government can intercept or record the content of a
telephone call for a criminal investigation .
 Law enforcement agents must justify the request and the
wiretap permission is granted for a limited time period .
 Government agent permitted to determine the telephone
numbers called from a particular telephone .

 Email :
 USA PATRIOT act .
 Enforcement agent to use pen-registry authority to get
destination and information for email.
 Its allow them to get information about people`s email and
Internet use from ISP .
DESIGNING COMMUNICATION SYSTEMS
FOR INTERCEPTION
 Comm Assistance for Law Enforcement Act ,
requires the telecommunication equipment be
designed to ensure that the government can
intercept telephone calls .
 FBI requirement :
 Interception of all wire and electronic comm .
 Intercept simultaneously.
 Identify physical location of cell phone users
 Intercept of packet-mode communication on the
internet .
SECRET INTELLIGENCE GATHERING
 National Security Agency
 Collects and analyzes foreign intelligence information
related to U.S national security from others
 Monitor communication between U.S and other
countries and a lot communication within other
countries .
ENCRYPTION POLICY
 Purpose :
-The purpose is to provide guidance that limits the use
of encryption to those algorithms .
-To help ensure the security of data, and to protect
privacy, in national and global information and
communications infrastructures, networks and
systems;
CHAPTER 3: SOCIAL ISSUES IN IT
3.4 Risk of New Technology
3.5 Computer Errors and Failure
Content
• Risk of New Technology
• Computer Errors and Failure
• Safety - Critical Application
• Increasing Reliability and Safety
• Dependence, Risk and Progress
Risk

Risk is an uncertain event or outcome (good or


bad) that occurs in decision making
Risk of New Technology

Electricity lets us heat our homes, cook our food,


and enjoy security and entertainment. It also
can kill you if you’re not careful
- “Energy Notes” (Flyer sent with San Diego Gas & Electricity)
Risk of New Technology
• An organization will cope high risks when there
are new technologies being deployed or
employed in the organization.
New Technology Risks
• High cost of maintenance
• Piracy
• Insufficiency of expertise
• Loss of data
• Unachieved goals
• Loss of profit
• Difficult to be adapted
• Inexperienced users
SELF-
REFLECTION….
Error and Failure
The state or condition of being wrong, or do not
function as planned
Overview

The used of technologies in human life is not


always giving benefits to human. It also brings
harms to human especially when it does not
function as planned.
Factors of Computer System Errors
• Faulty design
• Sloppy implementation
• Insufficiency trained users
• Poor user interface
• New Technology
Faulty Design
Sloppy Implementation
Insufficiency trained users
Poor user interface
Migration from old to new technology
Impact of Computers System Errors to
Human
• Safety - Death
• Economic - Loss
• Politic – War
• Education – Fault Information
Case of The Computer System Failure
• Tragedy Description : Deadly Crash
• Problem : The car is accelerating due to
computer system failure
• Date : 02 October 2010
• Location : United States of America
Overview
• A safety critical system is a system where human
safety is dependent upon the correct operation
of the system
Type of Safety – Critical Computer
Systems
• Military
• Power plant
• Medical
• Train
• Aircraft
• Production Industries
WHAT IS REALIBILITY AND SAFETY

RELIABILITY SAFETY

In general, reliability (systemic The word safety refers to


defintion) is the ability of a person or the freedom from danger,
system to perform and maintain its injury and damage, and to
functions in routine circumstances, as personal security
well as hostile or unexpected
circumstances.
Causes of Decreasing Reliability &
Safety
• There are two general factors that makes
computer system fails:
▫ Job is difficult
▫ Job done poorly
 Jobs done poorly can be defines at any of many
stages, from system design and implementation of
system management and use.
 For example :
 Customer of AT&T lost telephone service for voice and
data for 9 hours because of software error in a four
million line program.
OVERCONFIDENCE
• Unappreciative Risk
▫ System developers that appreciative risk will use technique
that are available to build more reliable and safer system.
▫ Safety critical system
▫ Technique to analyze and quantify the risks of failure in a
system
• Ignore warning
▫ People without high regard for honesty sometimes
exaggerate safety to hide flaws, to avoid unfavorable
publicity or to avoid the expense of corrections or lawsuit.
• Don’t consult manual
▫ Some system developers does not consult manual or
technique in developing a system.
Professional Technique
• Professional technique is used to increase the reliability and safety
of system
• Guide and lesson learned that has been encounter by passed
developer
• Best practices in developing safer and reliable system
• Responsible system developer will analyze and learn technique that
is suitable for developing their project.
• For example:
▫ Software engineers who work on safety-critical application should have
special training.

Technique
• User interface and human factor
• Testing
• Redundancy and self checking
User interface and human factors
• Well designed user interfaces can help avoid many
computer-related problems.
• System designers and programmer need to learn
from pyschologist and human factor expert about:
▫ How user interact with the system interfaces
▫ How disable user interact with the system interfaces
▫ Does the different age user,interact with the system
differently.
• Example of failure in user interface:
▫ Crash of American Airlines Flight 965 near Cali,
Columbia, in 1995.
Redundancy and self-checking
• redundancy check - Is a system of checking for errors in
computer functioning
• Example:
▫ Space shuttle in the 1980s
▫ Used 4 indentical but independent computer system that received
input from multiple sensors and checked their result against each
other.
▫ If result from one of the computer is differ from each other.it was
taken out of service. If two of the remaining three judged the
third to be faulty,it was taken out of service, and the rest of the
flight canceled.
• Self checking - Is a system that checks and monitors itself for
errors.
• Even with best practices are followed, there is no guarantee
that such complex system are bug free.
Testing
• Software testing is an investigation conducted to provide stakeholders with
information about the quality of the product or service under test.
• Software testing can also provide an objective, independent view of the
software to allow the business to appreciate and understand the risks of
software implementation
• There are several types of testing:
▫ Alpha
▫ Beta
▫ Functional and non-functional
testing
** non-functional testing (Baseline testing, Compliance testing,
Documentation testing, Endurance testing, Load testing, Localization
testing and Internationalization testing, Performance testing, Recovery
testing, Resilience testing, Security testing, Scalability testing, Stress
testing, Usability testing, Volume testing
Law, regulation & market
• To help consumer seek justice for havoc that
caused by errors and failures of the systems they
used.

Types of approach
• Warranty for consumer software
• Regulation & safety critical
application
• Professional licensing
• Civil penalties
• Warranty for consumer software
▫ Most retail consumer software comes with “shrink wrap” or “click on”
licensing agreements that indicate the consumer has buy the product.
▫ But there is no guarantee that it works corretcly.
▫ Some of the warranty agreement provides:
 Prohibiting user from publically criticizing the software
 Provisions that the vendor may choose the state in which legal disputes
are settled, possibly at great inconvenience to the consumer.
 Legal protection for consumer for the product they purchased.
• Regulation and safety critical appliations
▫ Legislation or regulation that are created to prevent life-threatening
computer failures.
▫ Example:
 Ban of the use of computer control for applications where an error could
be fatal.
• Professional licensing
▫ Another controversial approach to improving software
quality is to mandatory licensing of software
developments professional.
▫ Professional licensing requirement usually include
specific training, the passing of competency exams,
ethical requirement and continuing education.
▫ Desired effect:
 To protect the public from poor quality and unethical
behavior.
• Taking responsibility
▫ Company or business that provide the system or
technology which is failed and damage the customer
pays the customer for the problems or damages.
▫ Good customer relations
ARE WE TOO DEPENDENT ON
COMPUTER?
• Debates about our dependence on computers has been
appears in many discussions of the social impact of
computers.
• Main point in the discussion about our dependece on
computers mainly : Is this good, bad or neutral.
• According to the website : www.debate.org, in their debates
about “Are we too dependent on computers?”. Resulted about
77% of the members agreed and 23% of the member disagree.
• Misconceptions about dependence on computers come from a
poor understanding of the:
▫ Role of risk
▫ Confusion of “dependence” with use
▫ Blaming computers for failures.
• Is the dependence on computers different from the
dependence on electricity? Or is dependence on computers
different from a farmer’s dependent on a plows.
• Computers and plows are tools, we use tools because we
better off with them than without them.
Risk and Progress
• Electricity lets us heat our homes, cook our food,
and enjoy security and entertainment.It also can kill
you if you’re not careful.(Energy notes).
• Most new technologies were not very safe when first
developed.
• As time progress, technologies improve to reduce
the risk
• Risk is not restricted to technology and machines.It
is part of life.
• Someone living in a jungle without any technology
also faces risk danger from animals.
Computers and Community
Content Outline:
• 4.1 Freedom of Speech
• 4.2 Changing Communication Paradigms
• 4.3 Censorship in Cyberspace
• 4.4 Computer and Community
• 4.5 The Digital Divide
4.1 Freedom Of Speech
“The Internet has been a revolution for censorship as much
as for free speech“ - Jo Glanville, editor of Index on
Censorship.
(Internet telah menjadi satu revolusi untuk penapisan sebanyak
mungkin kebebasan untuk bersuara)
FREEDOM OF SPEECH IN MALAYSIA
4.2 The changes in Communication
Paradigm
Print media

Broadcasting

Common
carrier
Eg:
monorail,
LRT, ERL
Regulation of Communication media
Common carrier
LAWS ON REGULATION OF
COMMUNICATION MEDIA
MEDIA CONTROL IN MALAYSIA
• Mainstream media in Malaysia is mainly
owned by political parties and heavily
regulated by government
• Censorship is applied to control media
content to avoid unnecessary disturbance to
the national security.
Should Internet be controlled by
the government as well?
4.3 Censorship in
Cyberspace
protect children
by reducing Need proof of
access to adult age from site
materials visitors

$100000 and
2 years in Limited than
Child
prison $50000 and six Development
unconstitutional month in jail Associated
(CDA)
Child Pornography
• Movies or pictures of child under 18 in sexual
positions or engaged in sexual acts.
• Considered as child abuse.
• Child Pornography Prevention Act extended the
law to include virtual children as well as other
images where real adults appear to be minors.
ALTERNATIVES
Censorship in Cyberspace
CASE 1

CASE 2
Censorship in Cyberspace
CASE 3

CASE 4
YAHOO!, FRENCH and OTHER NATION
censorship
Anonymity
• Anonymity vs. Community
– Supporters of anonymity:
• Say it is necessary to protect privacy and free speech.
– Opponents of anonymity:
• Believe it is anti-social and allows criminals to hide from law
enforcement.
– U.S. and European countries are working on laws that
require ISPs to maintain records of the true identity of
each user and maintain records of online activity for
potential use in criminal investigations
Protecting Access and Innovation
• Direct censorship is not the only factor to limit
the amount of information available on the
internet
• Sometimes laws and regulations are lobbied
by the large companies to restrict their
competition
Net neutrality
• Net neutrality is a principle that supports no restrictions by
Internet service providers or governments on consumers'
access to networks that participate in the Internet.
• It would prevent restrictions on content, sites, platforms,
types of equipment that may be attached, and modes of
communication.
• Network owners can't interfere with content, applications,
services, and devices of users' choice and remains open to
all users and uses
• Net neutrality in the common carrier sense has been
instantiated into law in many countries, including Malaysia
Net Neutrality : Control of Data
• Supporters of network neutrality want a legal
mandate ensuring that cable companies allow
Internet service providers (ISPs) free access to
cable lines and the model used for dial-up
Internet.
• To ensure that cable companies cannot
screen, interrupt or filter Internet content
without court order
Net Neutrality : Rights and Freedom
• Net neutrality ensures that the Internet
remains a free and open technology, fostering
democratic communication.
• Some opponents of net neutrality argue that
net neutrality is a violation of the property
rights of internet service providers because
they produce and own access to the Internet.
Deregulation
• Deregulation is the act or process of removing or
reducing state regulations
• Opposite of regulation
• Deregulation can be distinguished from
privatization
• Privatization is the process of transferring
ownership of a business, enterprise, agency,
public service or public property from the public
sector (a government) to the private sector,
either to a business that operate for a profit or to
a non-profit organization.
Forms of Privatization
• Share issue privatization (SIP) - selling shares on
the stock market
• Asset sale privatization - selling an entire
organization (or part of it) to a strategic investor,
usually by auction or by using the Treuhand
model
• Voucher privatization - distributing shares of
ownership to all citizens, usually for free or at a
very low price.
• Privatization from below - Start-up of new
private businesses in formerly socialist countries.
4.4 Computers and
• Community
It is human nature to form associations based on
common interests
Users of Computer and Internet
Spend less time with family Voracious consumer
on information
Early critics complained that telephone
replaced human interaction with
disembodied, remote voices….

HOWEVER!

- It expended & deepen social


relationships for isolated people.

- People who are socially awkward


communicate more because of email than
without it.
Users of Computer and Internet
• Provide convenient and cheap
ways for families and friends to
stay connected
Users of Computer and Internet
• Internet also created ‘virtual community’
(Second Life)
4.5 Digital Divide
The Digital Divide

Defined as “the gap between those individuals and communities that have,
and those who do not have, access to the information technologies that are
changing our lives rapidly”. Technology has become the driving force of
change in the world today.
Old View of Digital Divide
Focus on bridging the gap between poor people in rural areas and the rich
within the country.
New View of Digital Divide
Focus on bridging the gap between developed and poor countries.
• In order to reduce the Digital Divide..

The Computer Professionals for Social


Responsibility (CPSR) also set a minimum
requirement

฀ Everyone in the country must have access to


the Net.
฀ Hardware and software must be easy to use
and fit the needs of all users including the
disabled.
฀ Training must be available.
฀ Pricing must be structured so it is affordable.
Evaluations of the Impact of
Computer Technology
The Neo-Luddite view of Computers, Technology, and
Human Needs:
✔Computers cause massive unemployment
✔No real need (We use technologies because they are
there, not because they satisfy real needs)
Evaluations of the Impact of
Computer Technology
✔Computers cause social inequity
✔Benefit big business and the government
✔Do little or nothing to solve real problems
✔Computers separate humans from nature and
destroy the environment
Evaluations of the Impact of
Computer Technology (Cont…)
Accomplishments of Technology:
฀Prices of food are down and raw materials are
abundant
฀Real buying power is up
฀Food supplies and Gross Domestic Product
(GDP) are growing faster than the population
฀Dramatic impact on life expectancy
฀Assistive technologies benefit those with
disabilities
Making Decisions About Technology
฀The Difficulty of Prediction
฀Intelligent Machines and Super intelligent
Humans – Or the End of the Human Race?
The Difficulty of Prediction

• Each new technology finds new and unexpected uses


• The history of technology is full of wildly wrong predictions
• Weizenbaum argued against developing speech recognition
technology
– Mistaken expectations of costs and benefits
– Should we decline a technology because of potential
abuse and ignore the benefits?
– New technologies are often expensive, but costs
drop as the technology advances and the
demand increases
Intelligent Machines and Super-intelligent
Humans - Or the End of the Human Race?

• Technological Singularity - point at which


artificial intelligence or some combined
human-machine intelligence advances so far
that we cannot comprehend what lies on the
other side
• We cannot prepare for aftermath, but prepare
for more gradual developments
• Select a decision making process most likely to
produce what people want
ITS 610 : Ethical, Social, And
Professional Issues

Computer & Work


The Evolution of the Computer
Computer and work
Computer and work
Computerization and work
• Before 19th Century – Farming as a dominant
economic sector in the United States
• During 19th Century – Industrial Revolution has seen
the major shift from farm to factories as primary
workplaces
• Middle 20th Century – The rise of human service jobs
in some workplaces and the beginning use of
computers in business premises
• Today – Most workplaces are equipped with computer
system, controlled machine tools, and industrial robots
to overtake human works
• The use of computers and new technological
equipments started to change: 1) the way people work
and 2) the shape of organizations.
Impact of Computers on Work
Benefits: Problems:
•Some jobs have been created •Some jobs have been
•Repetitive or boring jobs are eliminated
done with computers •Health issues have been
•More time for creativity associated with computer usage
•Some workers “telecommute” •Need for retraining as
•Employers can better monitor technology change continuously
their workers •Less privacy to the employees
when their jobs being
monitored
Job D estruction and Creation
Computers & Unemployment: Computers & Employment:
•Automation leads to loss of •The need for computer
jobs. designers, builders, and
programmers creates jobs.
•Computerization eliminates
•Growing computer networks
some jobs. creates jobs for administrators.
•Computer efficiency means •The need for training, sales and
fewer jobs. technical support creates jobs.
•In general, computers make
many products affordable to
more people . Thus, more jobs
are created to make those
products.
Job Destruction & Creation
• A successful technology eliminates or reduces some
jobs but creates others
-Reduced the need for telephone operators, meter
readers, mid-level managers
• New industries arise
-Internet
-Cellular communications
• Lower prices increase demand and create jobs
-Music industry changed from serving the wealthy to
serving the masses, employing more than just
musicians
Job Destruction & Creation
(cont’)
Unemployment rates fluctuate
–Growth of computers has been steady, while
unemployment has fluctuated widely
Are we earning less?
–Since the 1970s, wages decreased but fringe benefits
increased
–People work fewer hours since the Industrial Revolution
–Decrease in take-home pay may be due to other factors
(e.g. increased taxes)
–Purchasing power increases as prices fall
Changing Skill Levels

• The new jobs created from computers are


different from the jobs eliminated
• New jobs such as computer engineer and
system analyst jobs require a college degree,
where jobs such as bank tellers, customer
service representatives and clerks do not
• Companies are more willing to hire people
without specific skills when they can train new
people quickly
HOTTEST IT SKILLS IN 2015
Global Workforce
•Outsourcing -phenomenon where a company pays
another company to build parts for its products or
services instead of performing those tasks itself
•Offshoring-the practice of moving business
processes or services to another country, especially
overseas, to reduce costs.
•Inshoring-when another company employs
thousands of people in the U.S. (e.g. offshoring for a
German company means inshoring for U.S.)
•Almost 5% of U.S. workers are employed by
foreign companies
Global Workforce
Problems and side effects of
offshoring
–Consumers complain about customer service
representatives, because accents are difficult
to understand
–Employees in U.S. companies need new job
skills (e.g., managing, working with foreign
colleagues)
–Increased demand for high-skill workers in
other countries forces salaries up
Getting a Job

Learning about jobs and companies


–Online company histories and annual reports
–Job search and resume sites
–Online training
Learning about applicants and employees
–Search online newsgroups and social networks
–Hire data-collection agencies such as ChoicePoint
–Prospective employees may craft an online profile
and presence geared towards the job they want
Job Dispersal and Telecommuting
Telecommuting
–Working at home using a computer
electronically linked to one's place of
employment
–Mobile office using a laptop, working out of
your car or at customer locations
–Fulltime and part-time telecommuting
Telecommuting Isn't For Everyone
Benefits
–Reduces overhead for employers
–Reduces need for large offices
–Employees are more productive, satisfied, and loyal
–Reduces traffic congestion, pollution, gasoline use,
and stress
–Reduces expenses for commuting and money
spent on work clothes
–Allows work to continue after blizzards,
hurricanes, etc.
Problems
–Employers see resentment from those who
have to work at the office
–For some telecommuting employees,
corporation loyalty weakens
–Odd work hours
–Cost for office space has shifted to the
employee
–Security risks when work and personal
activities reside on the same computer
Changing Structure of Business
•Increase in smaller businesses and independent
consultants (‘information entrepreneurs’)
•‘Mom and pop multi-nationals’, small businesses
on the Web
•Growth of large, multi-national corporations
•Not all changes due to technology
Employee Crime
• Embezzlement
• Sabotage
- Logic bomb
What is Embezzlement?
• Embezzlement is “fraudulent appropriation of
property by a person to whom it has been
entrusted.”
• Embezzlement is a crime that involves the
unlawful conversion of property by someone who
has been entrusted with it.
• The offender generally has some type of
relationship to the victim, such as an employee, a
fiduciary, a bank or a government official.
Example of embezzlement
• Volkswagen may have lost more than $200
million in a foreign exchange fraud
perpetrated by high-level employees
Examples for complexities of
modern financial transaction that
increase the opportunities for
embezzlement:
• Employees of insurance companies set up
phony insurance policies and make claims on
them.
Embezzlement
Sabotage
• The fired employees will get make angry at
their employer for some reason and
sometimes will make sabotage the company
computer systems.
Example of sabotage

• The employee who are fired from insurance


company destroyed more than 160,000
records with logic bomb
– Logic bomb is software that destroys the critical
files such as inventory payroll records.
– An employee sabotaged a system in the hopes to
earn extra money.
Motivation of sabotage
• The saboteurs can cause a great amount of
damage which is ease for them to make it.
Employee Monitoring
• Employee monitoring is the act of watching and
monitoring employees' actions during working
hours using employer equipment/property
(Raposa & Mujtaba, 2003)
Situation of employee monitoring
Past Present
Employee monitored by logs, time Technology computers has made old
clocks, and boss patrolled. methods more efficient
It also cause several big issue on
privacy
Employers use of technology to
monitor their employees
Categories of Employee Monitoring
• Keystroke Data entry, phone work, and retail
• Location
• E-mail, Web surfing, and voice mail
Keystroke Data entry, phone
work, and retail
Type of Monitoring: Keystroke data entry
– Purpose: to determine if quotas are met or
employee is on task.
Keystroke Data entry, phone
work, and retail
• Types of Monitoring: Phone Work
– Purpose: to determine customer satisfaction and
proper use of phone resources
Keystroke Data entry, phone
work, and retail
• Types of Monitoring: Retail
– Purpose : training, measuring (increasing
productivity), and to reduce theft (eg. monitor
transactions at cash register)
Categories Location
• Types of Monitoring: Location surveillance
– Badges: to replace worker keys or track down
worker movement ( eg. Nurses in hospitals- can
be located quickly in emergencies)
– GPS tracking systems: to locate vehicles; employee
driving speed and driving habits – long haul
truckers.
Categories E-mail, Web surfing,
and Voice mail at Work
Type of monitoring: E-mail, Web surfing, and
Voice mail at Work
– System manager can access anything on the
system so employers can read the e-mail of
employees, listen to voice-mail messages, and read
computer files.
Categories E-mail, Web surfing,
and Voice mail at Work
Categories E-mail, Web surfing,
and Voice mail at Work
Reasons for Monitoring E-mail,
Voice Mail, and Computer Files
• protect security of proprietary information
and data.
Reasons for Monitoring E-mail,
Voice Mail, and Computer Files
• prevent personal use of employer facilities (if
prohibited by company policy).
• check for violations of company policy against
sending offensive or pornographic e-mail.
• investigate complaints of harassment.
• check for illegal software.
Employee Monitoring
Employee Monitoring
Health Issue
• Radiation exposure from computer
terminals.
• A possible link between cell-phone use and
cancer.
• Disposal of old computers (because of
potentially toxic parts).
• Wrist problems (repetitive strain injury -
RSI) from frequent use of computer
keyboards and other automated systems (such
as supermarket check-out scanners).
Repetitive Strain Injury (RSI)
 What is RSI?
• Also known as carpal tunnel syndrome.
• RSI causes pain in the wrist, hand, arm, neck and
shoulders.
RSI
• Ergonomic Solution
 Some people emphasize physical design of keyboards,
furniture, and so on are the factors of RSI afflicts people.
 Some laptop computer makers redesigned the machines to
include a wrist rest.
 Now split, twisted, and otherwise nontraditionally shaped
keyboards have been produced.
 The National Safety Council reported that 90% of
companies surveyed said that redesigning workstations and
jobs was successful in reducing severe RSI problems.
 In the future, speech input may reduce RSI caused by
keyboard use.
RSI
• The Role of Management
• Be proactive.
• Give credence to employee complaints.
• Money spent to prevent injury is less than money
needed for treatment.
• Study and modify work tools and procedures to
reduce or prevent RSI.
Ergonomic Solution
Computer Crime
 Computer crime
 Hacking
 Identity Theft and Credit Card
Fraud
 Scams and Digital Forgery
 Analytical Tool in Cybercrime
 Crime Fighting Versus Privacy and
Civil Liberties
 Whose Laws Rule The Web
 any crime that involves a computer and a network
 divided into two categories:
◦ Crimes that primarily target computer networks
or devices:
 Malware (malicious code)
◦ Crimes that use computer networks or devices to
advance other ends include:
- Hacking
- Fraud and identity theft
- Phishing scams
What is hacking?
 to gain illegal or unauthorized access to a file,
computer, or network
 It was a positive term
 Phase 1: early 1960s to 1970s
◦ It was a positive term
◦ A "hacker" was a creative programmer who wrote
elegant or clever code
◦ A "hack" was an especially clever piece of code
 Phase 2: from the 1970s to mid 1990s
◦ Hacking took on negative term
◦ Breaking into computers for which the
hacker does not have authorized access
◦ Includes the spreading of computer worms
and viruses
◦ ‘phone phreaking’: manipulating phone
systems
◦ Examples:
 1980’s: German hacker broke into US
military computers to find info to sell to
Russians
 1986: hacker broke into Stanford
University, 15 silicon valley companies
 Phase 3: beginning with the mid 1990s (The
growth of the web)
◦ Hacktivism surfaced
◦ Denial-of-service (DoS) attacks used to
shut down Web sites
◦ Large scale theft of personal and financial
information
Examples:
 1990’s: teenager crippled air traffic tower
communications
 1998: two teens attacked US military computers
 2000: email virus (MS Windows), destroyed files,
affected large corporations (FORD, NASA,
Pentagon), $10billion in damages
 2000: Denial-of–Service attacks, Yahoo, eBay,
Amazon, performed by 15-year old named
“mafiaboy”
Hacktivism: political hacking

 Use of hacking to promote a political cause


 Disagreement about whether it is a form of
civil disobedience and how it should be
punished
 Some use the appearance of hacktivism to
hide other criminal activities
◦ Examples:
 Prodrug message appeared on US
police antidrug web site
 Pro-zapatista hackers hit Mexican
government sites
 Teenagers hacked India’s atomic
research center to protest nuclear
weapons
The Law: Catching and Punishing Hackers:

 1986 Congress passed the Computer Fraud and


Abuse Act (CFAA)
◦ Covers government computers, financial and
medical systems, and activities that involve
computers in more than one state, including
computers connected to the Internet
◦ The USA Patriot Act expanded the definition of
loss to include the cost of responding to an
attack, assessing damage and restoring systems
The Law: Catching and Punishing Hackers (cont.):

 A variety of methods for catching hackers


◦ Law enforcement agents read hacker newsletters
and participate in chat rooms undercover
◦ Security professionals set up interesting Web
sites that attract hackers, to record and study
◦ Computer forensics is used to retrieve evidence
from computers
The Law: Catching and Punishing Hackers (cont.):

 Penalties for young hackers


◦ Many young hackers have matured and gone on
to productive and responsible careers
◦ depends on intent and damage done
◦ Most young hackers receive probation,
community service, and/or fines
◦ Not until 2000 did a young hacker receive time in
juvenile detention
◦ In Malaysia, the punishment may range from
3 years to 10 years imprisonment and/or a
monetary fine of between RM 25,000 to
RM150,000 but stiffer penalties will be given if it
is found that the guilty party had intention to
cause injury when committing the crime.(SANS
Institute, 2002).
The Law: Catching and Punishing Hackers
(cont.):

 Security
◦ Internet started with open access as a
means of sharing information for research
◦ Firewalls are used to monitor and filter out
communication from untrusted sites or
that fit a profile of suspicious activity
◦ Security is often playing catch-up to
hackers as new vulnerabilities are
discovered and exploited
The Law: Catching and Punishing Hackers (cont.):

 Responsibility for Security


◦ Developers have a responsibility to develop with
security as a goal
◦ Businesses have a responsibility to use security
tools and monitor their systems to prevent
attacks from succeeding
◦ Home users have a responsibility to ask
questions and educate themselves on the tools to
maintain security (personal firewalls, anti-virus
and anti-spyware)
 Identity Theft –various crimes in which a criminal or
large group uses the identity of an unknowing,
innocent person
◦ Use credit/debit card numbers, personal
information, and social security numbers
◦ 18-29 year-olds are the most common victims
because they use the web most and are unaware
of risks
◦ E-commerce has made it easier to steal card
numbers and use without having the physical
card
 Techniques used to steal personal and financial
information
◦ Phishing - e-mail fishing for personal and
financial information disguised as legitimate
business e-mail
◦ Pharming - false Web sites for personal and
financial information by planting false URLs in
Domain Name Servers
◦ Online resumes and job hunting sites may reveal
SSNs, work history, birth dates and other
information that can be used in identity theft
 Techniques used to protect personal and financial
information
◦ Activation for new credit cards
◦ Retailers do not print the full card number and
expiration date on receipts
◦ Software detects unusual spending activities and
will prompt retailers to ask for identifying
information
◦ Services, like PayPal, act as third party allowing a
customer to make a purchase without revealing
their credit card information to a stranger
Responses to Identity Theft:
 Authentication of e-mail and Web sites
 Use of encryption to securely store data, so
it is useless if stolen
 Authenticating customers to prevent use of
stolen numbers, may trade convenience for
security
 In the event information is stolen, a fraud
alert can flag your credit report; some
businesses will cover the cost of a credit
report if your information has been stolen
Auctions:
 Federal Trade Commission (for US customer
protection) reports that online auction sites are one
of the top sources of fraud complaints
◦ Some sellers do not send items or send inferior
products
◦ Sellers give themselves or friends glowing reviews
to garner consumer trust

 Auction sites use various techniques to counter


dishonest sellers
 Click fraud - repeated clicking on an ad to
either increase a site’s revenue or to use up
a competitor's advertising budget
 Stock fraud - most common method is to
buy a stock low, send out e-mails urging
others to buy, and then sell when the price
goes up, usually only for a short time
 Digital Forgery - new technologies
(scanners and high quality printers) are
used to create fake checks, passports,
visas, birth certificates, etc., with little skill
and investment
Percentage of computer crime for the past 11 years in Malaysia

Year Numbers of complaints received Percentage (%)


2000 503 1.3 (lowest)
2001 932 2,4
2002 739 1,91
2003 4295 11.08
2004 15286 39.42(highest)
2005 835 2.15
2006 1372 3.54
2007 1038 2.68
2008 2123 5.47
2009 3564 9.19
2010 8090 20.86
Total 38777 100
Percentage of computer crime for the past 11 years in USA

Year Numbers of complaints received Percentage (%)


2000 16838 0.8 (lowest)
2001 50412 2.42
2002 75064 3.61
2003 124515 5.99
2004 200449 9.64
2005 231493 11.14
2006 207492 9.98
2007 206884 9.95
2008 275284 13.24
2009 346655 16.67 (highest)
2010 343809 16.54
Total 2078895 100
Comparison between numbers of complaints
or cases between Malaysia and USA.

: Malaysia: 38777 complaints


: USA : 2078895 complaints

USA is higher than Malaysia in the numbers


of complaints because of the difference in:

1.Numbers of citizen
2.Numbers of computer or internet users
3.Users' awareness regarding cyber crime
Comparison between percentage of complaints or cases between
Malaysia and USA.

Malaysia: Highest – 39.42 % (2004) and lowest – 1.3 % (2000)


USA: Highest – 16.67 % (2009) and lowest – 0.8 % (2000)

Although, USA is higher in the number of complaints regarding


cyber crime. But, the percentage is lower than in Malaysia when
refer to the percentage of highest and lowest complaints from the
year 2000 to the year 2010.

This is due to :
1.End users' awareness on cyber crime is more higher in USA than
in Malaysia.
2.The roles played by cyber security agency in USA is better than in
Malaysia.
3.Lack of cyber crimes researches in Malaysia than in USA.
4.The cyber technology in preventing and curbing cyber crimes in
the USA is more advanced than in Malaysia.
 Fraud Analytical Tool
◦ Detect fraud early
◦ Identify the right claims to focus on
◦ Automate time-consuming processes
◦ Streamline workflow
◦ Quickly identify suspicious participants or patterns in
claims.
 Hacking Analytical Tool
◦ sense and detect suspicious/doubtful applications which
are able to leak private information / financial settlement /
company’s secret.


 Fraud detection tools:
◦ Fraud.net Guardian
◦ Splunk – for e-commerce purposes - protect customers
and reputation, and avoid fraud-related costs
◦ FICO – Fraud Management System
◦ Fractals - Class-leading integrated, intelligent fraud
detection and prevention framework for payment card
issuers and acquirers.
 Hack detection tools
◦ NetPatrol
◦ sXe Injected
◦ SMS – smishing hacking detector
Search and Seizure of Computers:
 Requires a warrant to search and seize a computer
 Automated searches
 Charges are generally filed where the crime occurs
 Laws differ between states and countries
 The FBI usually files in the state where the crime was
discovered and the investigation began
 Purpose: to foster international cooperation
among law agencies at different countries to
fight cybercrime
When Digital Actions Cross Borders:
 Laws vary from country to country
 Corporations that do business in multiple
countries must comply with the laws of all the
countries involved
 Someone whose actions are legal in their own
country may face prosecution in another
country where their actions are illegal
 A Russian citizen was arrested for violating
the DMCA when he visited the U.S. to present
a paper at a conference; his software was not
illegal in Russia (hacking adobe e-books)
 An executive of a British online gambling site
was arrested as he transferred planes in
Dallas (online sports betting is not illegal in
Britain)
 Digital Signature Act 1997
 Copyright (Amendment ) Act 1997
 Telemedicine Act 1997
 Computer Crimes Act 1997
 Communications & Multimedia Act (CMA)
1998
 Information Technology Act 2000
 The Induce Act
 (http://www.mycert.org.my/en/services/stati
stic/mycert
 http://www.scribd.com/doc/71214912/Cybe
r-Crime-in-Malaysia-and-USA
 A gift of fire
ITS 610
Ethical, Social, And Professional
Issues
Chapter 7:
“IT Ownership”
Content Outline:
• 7.1 - Intellectual Property and Changing
Technology
• 7.2 – Intellectual Property Laws
• 7.3 – Search Engine and Online Libraries
• 7.4 – Fair-Use Doctrine
• 7.5 – International Piracy
• 7.6 – Analytical Tools in Plagiarism
Intellectual Property
Property
• means possession or something to which the
owner has the rights.
Intellectual Property
• The intangible creative work, not its particular
physical form
• Value of intelligence and artistic work comes
from creativity, ideas, research, skills, labor,
non-material efforts and attributes the creator
provides
• Protected by copyright and patent law.
Intellectual Property
• Copyright holders have exclusive rights:
– To make copies
– To produce derivative works, such as translations into
other languages or movies based on books
– To distribute copies
– To perform the work in public (e.g. music, plays)
– To display the work in public (e.g. artwork, movies,
computer games, video on a Web site)
World Intellectual Property
Organization ( WIPO )

• was founded in 1967 as one of the specialized


agencies of United Nations organizations and
responsible for the protection of the
intellectual property.
Intellectual Property Corporation of
Malaysia(MyIPO)

• Also known as Perbadanan Harta Intelek Malaysia.


• Prior to 1983, intellectual property rights (IPR) in Malaysia
was administered by Pejabat Cap Dagangan dan Jaminhak.
• This Office changed its name to Pejabat Cap Dagangan dan
Paten in 1983 and was placed under the jurisdiction of the
then Ministry of Trade and Industry.
World Intellectual Property
Organization (WIPO)
• World Intellectual Property Organization (WIPO)
– was founded in 1967 as one of the specialized agencies of United
Nations organizations and responsible for the protection of the
intellectual property
Intellectual Property
• three different routes/ways for protecting
intellectual property:
– copyright
– patent
– trademark
Challenging of new technologies
Challenges of New Technology:
• Digital technology and the internet has made
copyright infringement easier and cheaper
• New compression technologies have made
copying large files (e.g. graphics, video and audio
files) feasible
• New tools allow us to modify graphics, video and
audio files to make derivative works
• Scanners allow us to change the media of a
copyrighted work, converting printed text,
photos, and artwork to electronic form
Challenging of new technologies
• Problems from new technologies that affect
intellectual property owners
– High-quality copying.
– High-quantity distribution.
– Easier to use.
– Less expensive.
Copyright
• a form of protection provided by laws to the
authors of original works known as the owner
of intellectual property
• a copyright applies to the expression of an
idea, whether published or not.
• once an original work is created and fixed,
copyright exists.
• copyright may subsist in creative and artistic
works (books, articles, plays, movies, music,
paintings, photographs, and software).
Copyright
• the copyright in the work of authorship immediately becomes
the property of the author (copyright holder) who created the
work
• it is “the right to copy”, but gives the copyright holder to be
credited for the work, to determine who may adapt the work
to other forms, who may perform the work, who may
financially benefit from it and other related right
• only the copyright holder or those deriving their rights
through the copyright holder can rightfully claim copyright.
Copyright
• Copyright protects against copying the "expression" in a work, not against
copying the work's ideas.
• The difference between "idea" and" expression" is one of the most
difficult concepts in copyright law.
• The most important point to understand is that one can copy the
protected expression in a work without copying the literal words (or the
exact shape of a sculpture, or the exact "look" of a stuffed animal)
• when a new work is created by copying an existing copyrighted work,
copyright infringement exists if the new work is "substantially similar" to
the work that was copied
Copyright Law
• Section 106 of the 1976 Copyright Act generally gives the
owner of copyright the exclusive right to do and to authorize
others to do the following:

– To reproduce/make copies the work


– To prepare derivative works based upon the work(
translation, etc.)
– To distribute copies of the work to the public by sale or
other transfer of ownership
– To perform & display the work publicly
Copyright Law(cont.)
• A copyright owner has five exclusive rights in the
copyrighted work :
1) reproduction right - The reproduction right is the
right to copy, duplicate, transcribe, or imitate the
work in fixed form.
2) modification right - The modification right (also
known as the derivative works right) is the right to
modify the work to create a new work. A new work
that is based on a preexisting work is known as a
"derivative work.
Copyright Law(cont.)
3) distribution right - the distribution right is the right
to distribute copies of the work to the public by sale,
rental, lease, or lending
4) public performance right - the public performance
right is the right to recite, play, dance, act, or show
the work at public place or to transmit it to the
public. In the case of a motion picture or other
audiovisual work, showing the work's images in
sequence is considered "performance." Sound
recordings:
- recorded versions of music or other sounds
- do not have a public performance right
Copyright Law(cont.)
• 5) public display right - the public display right
is the right to show a copy of the work directly
or by means of a film, slide, or television
image at a public place or to transmit it to the
public. In the case of a motion picture or
other audiovisual work, showing the work's
images out of sequence is considered display
Copyright Law(cont.)
Happy Birthday Song.
• The copyright to the most popular song in the English
language belongs to Warner Music Group, and the
company regularly charges up to $30,000 to anyone who
wants to use the song for profit -- whether it's played in a
film, sampled in a song, downloaded as a ring tone or sung
at a chain restaurant. Even the Girl Scouts have been
warned that singing it to campers could result in a fine.
• Though there have been some questions posed about the
validity of the copyright, up until this point, it has proven
more cost-effective to simply pay to use the song than take
the issue to court.
Copyrightable Works
• may include the following categories:
– literary and artistic works
– musical works, including any accompanying words
– dramatic and musical works
– motion pictures and other audiovisual works
– photographic works
– choreographic works
– sound recordings
– architectural works
How Long Can Copyright Protection
Last??
• Generally, for literary, musical or artistic works
published during the author’s lifetime, the
protection period is for the life of the author
plus 50 years after his death.
• However, for works published after the death
of the author, copyright shall subsist until 50
years from the publication of the work.
Patent
• an intellectual property right relating to inventions – i.e. to
advances made in a technical field
• a patent may be granted by government for a new, useful, and
non-obvious invention
• it gives the patent holder the right to stop others from
practicing the invention (making, using or selling) without the
permission of the inventor for a certain period of time
(typically 20 years from the filing date of a patent application)
• a patent allows you to prevent anyone from producing, using
or selling your invention unless you are paid for the privilege
• Patents protect inventions of new things or processes
• Like any other form of property, a patent can be bought, sold,
licensed or mortgaged
Things That Patents Cover
• cover products or processes that possess or contain
new functional or technical aspects
– how things work,
– what they do,
– how they do it,
– what they are made of
– how they are made
Patent Protection
• 176 countries in the world that grant patents permit the
patenting of software-related inventions
• the adoption of the TRIPs ("Trade-Related Aspects of
Intellectual Property") mandates member countries to
provide patent protection for inventions in all fields of
technology.
• patent protection for software-related inventions is the
"technical effects" doctrine that was first disseminated by the
European Patent Office ("EPO").
• Patent on Web Technologies
Patents on Web Technologies
• Amazon agreed to pay IBM who holds patents for online
catalogs and targeted advertising
• Friendster applied for a patent on its social-networking Web
techniques. While the patent was pending, sites such as
MySpace sprang up. Friendster's patent was granted and it
may now charge licensing fees to businesses using the
technology.
Trademark
• a distinctive sign which is used to distinguish the products or
services of different businesses
• a trademark is a word, name, phrase, logo, image, symbol,
design, slogan or a combination of these elements, secured by
legal registration that identifies a manufacturer’s or trader’s
product or service from other products and services
• The owner of a registered trademark may commence legal
proceedings for trademark infringement to prevent
unauthorized use of that trademark in a manner that might
create a likelihood of confusion in the marketplace
• a trademark is created through the use of the mark in
commerce
• represented by the symbols ™ and ®
Trademark
• trade mark is different from copyright and patent
• a copyright provides protection for an artistic or literary work
• a patent provides protection for an invention. Unlike
copyrights and patents, trademarks rights can last forever, if
the trademark continues to be used
• trademarks is being enforceable in state court as well as
federal court
• only the owner of the trademark can register the trade mark.
The owner can be an individual, partnership or a company.
Trademark
TM vs ®
• (TM) is what you can put on a product before it is actually
registered (R).
• With (TM) you are making a claim that you are the first to use
the wording or symbol in business.
• (R) means you have proven it to government officials etc.
Search Engine and Online Libraries
Issues derived from this technology
• Plagiarism
• Big data
• Infobesity / information overload
Intellectual Property Laws in Malaysia
• Intellectual Property Corporation of Malaysia Act 2002 (Act 617)
• Trade Marks Act 1976 (Act 175)
• Patents Act 1983 (Act 291)
• Industrial Designs Act 1996 (Act 552)
• Geographical Indications Act 2000 (Act 602)
• Copyright Act 1987 (Act 332)
• Layout Designs and Integrated Circuit Act 2000 (Act 601)

http://www.myipo.gov.my/perundangan
Fair Use Doctrine
• Fair use is a limitation and exception to the exclusive
right granted by copyright law to the author of a creative
work. In US copyright law, fair use is a doctrine that permits
limited use of copyrighted material without acquiring
permission from the rights holders.
• Examples of fair use include commentary, search engines,
criticism, news reporting, research, teaching, library archiving
and scholarship. It provides for the legal, unlicensed citation
or incorporation of copyrighted material in another author's
work under a four-factor balancing test.
Fair Use Doctrine
• term fair use originated in the United States.
• Four factors considered
– Purpose and nature of use – commercial (less
likely) or non-profit purposes
– Nature of the copyrighted work
– Amount of significance or portion used
– Effect of use on potential market or value of the
copyright work (will it reduce sales of work?)
• No single factor alone determines
• Not all factors given equal weight, varies by
circumstance
Fair Use Doctrine
• Producers or creators of parodies of a copyrighted work have
been sued for infringement by the targets of their ridicule,
even though such use may be protected as fair use.
• These fair use cases distinguish between parodies (using a
work in order to poke fun at or comment on the work itself)
and satires (using a work to poke fun at or comment on
something else - the use of humor, irony, exaggeration, or
ridicule to expose and criticize people's stupidity or vices,
particularly in the context of contemporary politics and other
topical issues. – e.g: Caricature).
• Courts have been more willing to grant fair use protections to
parodies than to satires, but the ultimate outcome in either
circumstance will turn on the application of the four fair use
factors.
Scenarios of Fair Use
• A student uses a picture of a frog that she found through a Google search for her
Power Point presentation in her Introduction to Biology class.

It is fall under the protection of Fair Use?

Purpose: Academic Presentation


Nature of Work: In this case, an image from
National Geographic
Amount Used: One image from the article

Answer: YES.it is a Fair use because no


effect on future value
Scenarios of Fair Use
• A teacher scans three complete chapters from a textbook to put on course
reserves in the library so his students won’t have to buy the textbook.

It is fall under the protection of Fair Use?

Purpose: Educational( technically)


Nature of Work: Textbook
Amount Used: Three chapters

Answer: NO. Definite negative effect on


financial gain for the creator .
Breaking the copyright law.
Copying and Sharing
• Unauthorized copying and sharing of music,
and now video, continue at a huge rate on the
Web.
• It has cause a lot of major dropped of those
industries since 2000. Entertainment
companies are losing income and potential
income they could earn form their intellectual
property.
Copying and Sharing(cont.)
Responses from the Content Industries:
• Ideas from the software industries
– Expiration dates within the software
– Dongles (a device that must be plugged into a
computer port)
– Copy protection that prevents copying
– Activation or registration codes
– Obtained court orders to shut down Internet
bulletin boards and Web sites
Copying and Sharing(cont.)
Responses from the Content Industries (cont.):
• Banning, suing and taxing
– Ban or delay technology via lawsuits
• CD-recording devices
• Digital Audio Tapes (DAT)
• DVD players
• Portable MP3 players
– Require that new technology include copyright
protections
– Tax digital media to compensate the industry for
expected losses.
Copying and Sharing(cont.)
Digital Rights Management (DRM):
• Collection of techniques that control uses of
intellectual property in digital formats
• Includes hardware and software schemes
using encryption
• The producer of a file has flexibility to specify
what a user may do with it
• Apple, Microsoft and Sony all use different
schemes of DRM.
Copying and Sharing(cont.)
Ethical Arguments About Copying:
• Unlike physical property, copying or distributing a
song, video, or computer program does not
decrease the use or enjoyment by another
person
• Copying can decrease the economic value of
creative work produced for sale
• The fair use guidelines are useful ethical
guidelines
• There are many arguments for and against
unauthorized copying
Copying and Sharing(cont.)
International Piracy:
• Some countries do not recognize or protect
intellectual property
• Countries that have high piracy rates often do
not have a significant software industry
• Many countries that have a high amount of
piracy are exporting the pirated copies to
countries with strict copyright laws
• Economic sanctions often penalize legitimate
businesses, not those they seek to target.
International Piracy
• Software Piracy
• Software considered as literary work. Three main categories
of copyright software piracy:
– produce and sell unauthorized copies of popular software packages
– buy one or a few copies software package
and install on dozens or hundreds of computers.
– download from Internet
• Number of approaches to reduce software copyright piracy:
– Technical devices to prevent or deter copying  using serial number
– Enforcement and revision of copyright law  through government
and enforce the law
– Education  from college students to big organization
International Piracy
countries with the highest and lowest piracy
rates are :
International Piracy
Countries rank with high rate of software piracy
International Piracy
• Android Piracy
Piracy in Malaysia
• In order to protect the software engineering
industries , Bussiness Software Alliance (BSA)
was established. – in order to protect any
software piracy
• BSA was founded by groups of computer
software in the world to deal with illegal
software.
Protecting Software Copyrights
• Digital Rights Management :
– Collection of techniques that control uses of intellectual property in
digital formats
– Includes hardware and software schemes using encryption
– The producer of a file has flexibility to specify what a user may do with
it
– Apple, Microsoft and Sony all use different schemes of DRM
• Microsoft Product Activation
– It is an anti-piracy technology designed to verify that the product has
been legitimately licensed. This technology is aimed at reducing
software piracy as well as ensuring that Microsoft's customers are
receiving the product quality that they expect.
Piracy in Malaysia

• To protect the showbiz industries in Malaysia,


government has established an organization
called The Recording Industry Association of
Malaysia (RIM).
• One of the purposes of RIM is by providing
valuable services to its members through
activities such as anti-piracy enforcement action,
in and out of court.
Which unit in charge for IP matters in
UiTM??
Analytical Tools in Plagiarism
• Turnitin
• Viper
• DupliChecker
• PaperRater
• SeeSources.com
1
 8.1 Innovation Social Issues in IT

 8.2 Culture: Eastern, Western and Malaysian


Societies

 8.3 Evolution of computer technology impact in


digital generation

 8.4 Professional Ethics and responsibilities

 8.5 The ethical guidelines for computer


professionals

2
3
Invention Innovation
creation of a product improves on or makes
or introduction of a a significant
process for the first contribution to
time something that has
already been invented
*Thomas
Edison *Steve Jobs
Source: Business Insider

4
Produce new goods previously unknown for customers.

Introduce new production process previously unknown in


industry (remove empty container by using fan rather than high
end machine).

Exploiting new markets (direct selling to e-marketing).

New sources of purchasing raw materials and semi-prepared


products (frozen raw materials, Tesco online)

New ways of organizing business activities (video conferencing).

5
Innovators need to defend
their innovation

Often overlooked because


the focus is on technology

6
1. Innovations are new to a community.
 Are we assuming a new community will react similarly to a community that
is currently using the technology?

2. People affected by and have an effect on an innovation.


 Analyze the community impacted by their innovation.

3. Innovation disrupt the status quo.


 Who is adversely (badly) affected by innovation?

4. Innovations are a shared responsibility.


 Community : use technology within a given range of permissible behaviors
and to incorporate rules and norms to support technology.
 Innovating firm : Understand the community into which the innovation is

being introduced.

5. Successful innovations require continual modifications.


 Innovations have a lifespan while the needs of stakeholder keep changing.

6. Features matter.
 How to accommodate the stakeholder’s needs in the design of the

technology (esp. in convergence technology era)? 7


To adapt with innovation trend…change the communication
paradigm…

Communication may include (form of communication):


 Online office hours, involving real-time conversation with
one or many students via chat room.

 Discussion groups, where participants can exchange and


respond to open messages visible to all with access.

 Email links to individual addresses or to a list of email


addresses identified by a single name, which automatically
forward messages to all the people in the list.

8
 Communication (definition)
 Imparting, conveying or exchange of ideas, knowledge,
information, etc. (whether by speech, writing or signs).

 any action by which one person gives to or receives from a


person information about people’s need, knowledge and
desires.

 is the process of exchanging information between two or more


people through a common medium.

 may be intentional or unintentional in nature, conventional or


unconventional signals, may take linguistic or nonlinguistic
form, and may be occur through spoken or other modes

 E.g. Boboiboy, Ejen Ali (cross culture, language, etc.). How do


they communicate?
9
• Paradigm (definition)
 describe the set of experiences, beliefs and values
that affect the way an individual perceives reality
and responds to that perception.

 when a significant change happen from one


fundamental view to a different view and some type
of major discontinuity occurs as well.

 Communication paradigm
 A pattern or model that allows people to
communicate to another person in order to give
information about people needs and desires.

10
11
12
1. Community and Isolation
 Many observers worry that the impact of computers on community,
social and interpersonal interaction is negative and will get worse.
 Some fear that the use of computers in schools will have negative
effects on children and ultimately society.
 spending more time working alone with the machine
 social skills may not develop as well as they would without computers
 The formation of electronic relationships with people scattered
around the country and the world may further weaken local
communities

2. The access issue:


 access to information may give some people such a large advantage
over those without access that our society will be divided sharply
between those who have access and those who don’t.
13
Benefit to all sectors of the community
• Education
enhance learning and the learning process.
students learned to live and work productively
with technology
• Health care
bring benefit in medical sector
make the life of handicapped community easier.
•Local government
 more productive with high speed communication system and
information services.
•Business
 Telecommuting provides benefit to business and
enhance the quality of life for employees
 many strategies and solution in business
• Home
 create security in our home
 with information device family nowadays can communicate more often
with distance relatives
 many families nowadays have a better knowledge of IT.
14
14
15
16
17
INDIA

Mansukhbhai Prajapati with his $50 low-cost clay fridge (CNN)


18
Created a trend known as “frugal
innovation.”

Aadhar project

The India Innovation Growth


Programme

19
 2001 earthquake in Gujarat causes thousands of people to lose their
home and properties.

 Prajapati found an innovative way to get back on his feet by


designing a low-cost fridge that requires no electricity.

 India created a trend known as frugal innovation that can be describe


as a low-cost solutions to local problems.

 Frugal innovation is all about creating advantages out of constraint.

 India created Aadhar project with the objective to provide its people
with biometric ID
20
 India also work with other countries in The India Innovation
Growth Programme that is designed to accelerate innovative
India technologies into global markets.

 11 May is announced as India National Technology Day due to


the advancement in technology such as three successful
nuclear tests in 1999.

 India falls short in recent innovation culture due to many


reasons including its environment (overpopulation and
poverty) and lack of infrastructure.
21
Process of TIIGP – selection of the best award
22
Narenda Modi; Prime Minister of India
23
“India also lacks some of that infrastructure piece
and (faces) challenges when it comes to ease of doing
business. These factors inhibit (hinder) India from
having a high level of innovation.”

Gary Coleman ;
Managing Director, Global Industries, of Deloitte Touche Tohmatsu Limited

24
CHINA

“Most Chinese start-ups are not founded by


designers or artists, but by engineers who don’t
have the creativity to think of new ideas or
designs,”
Jason Lim, editor of TechNode

25
 Government failed to protect intellectual property rights.
 The existence of an Apple store that sells replication of Apple
products
 Strict hierarchy
 Education system that are too focused on test scores
 Discrimination towards merchants
 Imitation over innovation

Now, China is making a breakthrough in B2C & B2B sectors. (eg: Alibaba.
Below are some of the reasons:
Deeply
understanding Retaining local
Chinese talent
customers

Instilling a
Promoting
culture of risk
collaboration
taking
Source: McKinsey & Co. 26
United States of America

 US dominance in technological innovation has been


demonstrated most prominently through its
development of advanced, iconic technologies that
project power to the international community.

27
WESTERN CULTURE

Innovation Disruptive
START interest innovation

Fosters Actively
“Creative entrepreneurs
encourage
destruction” hip and risk
taking innovation

Dominance International Maximizing


patent data innovation culture

28
 Innovation interest veer towards incremental change & efficiencies.

 Disruptive (unsettling) innovation become the central to America’s


entrepreneurial culture.
 This type of innovation is the central to America’s entrepreneurial
culture.
 It describe the process by which a product/services takes root initially
in simple applications at the bottom of the market and relentlessly
(persistently) moves up the market, eventually displacing established
competitors.
 Eg: Disruptor: Cellphones; Disruptee: Fixed line telephone

29
 Creative destruction drives market, displaces older technology/idea with
new and offers consumers value they did not dream up yet.

 America’s culture is to foster entrepreneurship and-risk taking.

 They constantly encourage innovation by establishing websites such as


Quirky.com and Kickstarter.com that helps innovator to put forward their
innovation by giving support in financial and providing platform into
market.

 US is dominant in technological innovation because of its continuous effort


to stay in trend.

 International patent data became the evidence of US strength in


technological innovation.

 They maximize innovation culture by increasing number of graduates in


science and engineering, reform immigration policies and invest in
technological innovation.

30
“organizations have been aggressively instilling
innovation in its culture, especially high-tech
companies”

31
• Malaysia’s Innovation Year
• Resource based economy  Innovation-
2010 driven economy

• Agensi Inovasi Malaysia (AIM) was created.


• Work with PEMANDU to promote innovation
2013

• MOSTI: National Innovation Conference and


Exhibition (NICE) 2015; “Beyond Innovation”
2015 • Various Innovation Competitions

32
Team Creating
Empowerment
innovation change

Capability Customer Organizational


development focus learning

What are the cultural dimensions that would


promote innovation?

33
Open mind Curiosity Empathy

Take risks Trust

-Tim Brown, CEO and President of IDEO

34
China
 In China, piracy and innovation go hand in hand.
 Some of the most innovative products and business models coming out of the country are
the result, either directly or indirectly, of copycats.
 And for China, that’s not necessarily a bad thing.
 piracy can deter innovation, since it prevents companies from profiting off their
copyrighted products and thus diminishes the incentive to create.
 The same factors that make Chinese manufacturing so appealing to big companies like
Apple—speed, flexibility, cheap parts and labor—make it a pirate’s paradise
 Piracy goes back to the China world view that individual rights don’t matter.
 The courts have never evolved to protect innovative individuals.
 There is still very much the ethos that economic growth has to be managed, so individual
and intellectual property, where the spoils go to one entity or one person, is not a
cultural value

35
 China’s domestic internet sector has developed some doubtful business
ethics.

 Two very different recent cases raise a number of ethical issues.

 First off, Alibaba, the country’s largest B2B site matching foreign
sources to Chinese manufacturers.

 Alibaba is a significant force in the Chinese manufacturing economy


but, in February, a fraud scandal rocked the service and dented its
reputation with users.

 Alibaba’s chief executive, David Wei, and chief operating officer, Elvis
Lee, resigned after an internal investigation found that more than
2,300 sellers on the site committed fraud with the help of Alibaba sales
staff.

 Alibaba founder, admitted the problems, launched an investigation,


fired those responsible, accepted the resignations of others and then
publicly went on a media campaign to try to restore trust.
36
In Malaysia
 Piracy over mobile devices has grown in Malaysia, including over mobile phones,
tablets, flash drives and other mobile technologies.

 These devices can either be pre-loaded with illegal content before being sold to
customers, or customers can directly download infringing content.

 Hard Goods Piracy Harming Domestic Market.

 Hard goods piracy continues to harm copyright owners in Malaysia. Such piracy
includes distribution of mostly burned-to-order recordable discs.

 Unauthorized photocopying on and around university campuses continues to cause


harm to publishers in Malaysia.

 Pirates print, photo copy, or “clone,” meaning they print-on-demand directly from
high-quality soft-copy scans of physical books, which are then printed on high-
quality paper and include high-quality covers, making detection and identification
of infringement more difficult.

 In many instances, the copy shops have been the subject of previous enforcement
actions by the MDTCC but due to the lack of follow-on actions by law enforcement
and the lack of any deterrence, the shops simply re-engage in the illegal production
or printing of unauthorized copies.

37
 Piracy of books online is also reportedly on the rise, with
students claiming that certain titles are available either for
download or for copying (even from their university library).

 For 2011, the software piracy rate was 55%,representing a


commercial value of unlicensed software of $657 million.

 Internet-based piracy harms independent film producers since it


prevents the establishment of legitimate online distribution
platforms and services , which independent producers may use
to finance future productions.

38
Australia
 An extensive survey conducted by respected analysis house Essential Research has
found that a huge proportion of Australians would continue to pirate content such as TV
shows and movies online, even if such content was made available everywhere globally
at the same time for a low price.

 According to on going global research, Australians pirate more content online than
almost any other nation.

 For example, when the series finale of popular AMC show Breaking Bad was released in
the US through cable networks in early October, the episode quickly made an
appearance on popular file-sharing sites, predominantly using the BitTorrent protocol

 According to file-sharing news site TorrentFreak, the show was downloaded more than
500,000 times just 12 hours after the first copy appeared online.

 Based on a sample of more than 10,000 people who shared the site via a BitTorrent
client, we see that Australia is once again in the lead with 18 percent of the total.

 This means that a large group of Aussies prefer to torrent the episode instead of
watching it on the pay TV network Foxtel.

39
 Those analysing Internet piracy in Australia have constantly pointed to the
fact that shows such as Breaking Bad are pirated locally by many Australians
because of the fact that the shows are not readily available on our own free
to air television stations or through Internet television platforms

 The survey respondents claimed that the main reason they downloaded
material online was because they wished to access TV shows or movies not
yet available in Australia (32 percent), while others downloaded such content
because it was free (20 percent) or because accessing content that way was
“convenient” (24 percent). A small number of respondents said they
downloaded content because films and movies were too expensive

40
41
42
43
 Technological developments like digital cameras,
projectors, mind training software, computers,
PowerPoint presentations, 3D visualization tools; all
these have become great sources for teachers to help
students grasp a concept easily.

 It has to be understood that visual explanation of


concepts makes learning fun and enjoyable for
students. They're able to participate more in the
classroom and even teachers get a chance to make
their classes more interactive and interesting.

44
 When schools in different parts of the state ,
students can “meet" their counterparts through
video conferencing without leaving the
classroom.

 Some sites, such as www.glovico.com are used


to help students learn foreign languages online
by pairing a group of students with a teacher
from another country.

45
 With the introduction of online degree programs
there is hardly any need of being present
physically in the classroom. Even several foreign
universities have started online degree courses
that student can join.

 Distancelearning and online education have


become very important part of the education
system nowadays.

46
47
 Due to the excessive usage of online chatting
and shortcuts, the writing skills of today’s young
generation have declined quite tremendously.

 These days, children are relying more and more


on digital communication that they have totally
forgot about improving their writing skills.

 They don’t know the spelling of different words,


how to use grammar properly or how to do
cursive writing
48
 Technological developments like graphing
calculators, high tech watches, mini cameras
and similar equipment have become great
sources to cheat in exams.

 It is easier for students to write formulas


and notes on graphing calculators, with least
chances of being caught.

49
 SMS or text messaging has become a
favourite pastime of many students. Students
are seen playing with their cell phone,
iPhones day and night or driving and very
often even between lectures.

 Beingever-connected to the online world has


resulted in lack of focus and concentration in
academics and to some extent, even in
sports and extra curricular activities.

50
 Many experts and experienced people say
that, due to such technology in education,
students imagination is affected, their
thinking ability is reduced

 It is costly to install such technology

 There can be health issues too when used


over limits

51
52
 Without doubt, medical technology is
indispensable to people’s health and improved
quality of life. It also contributes billions of
dollars to the economy. There are many
benefits that innovative technology brings to
the table when it comes to healthcare.

 Technology can also bring hidden dangers if you


aren’t careful. The internet in particular is
known for this. Though some would disagree,
the infinite stream of medical knowledge
available online is not necessarily a good thing.

53
 the widespread adoption of electronic health records has
resulted in significant savings in health care costs as well as
improved patient health and safety. In more and more
healthcare facilities, patient files are being kept in databases
that can be accessed from anywhere in the facility.

 Minimally invasive surgeries, especially within the disciplines of


cardiovascular and thoracic surgery, have also become more
common in recent years. The development of better instruments
and more advanced technology have allowed surgeons to
perform procedures in minimally invasive ways that just wasn’t
possible a few years ago.

54
 the internet provides a cheap and “easy” way to
avoid going to the doctor. In the long term, however,
it may wind up costing you much more than you ever
expected.

 Websites like WebMD can be a great resource for


living a healthy lifestyle, but they should never be
used to replace your physician. Far too often a
simple ache can be misconstrued as something far
more serious.

55
56
 Sleep deprivation: Teens need about 9 hours sleep
each day, but often text late into the night. That
means they can’t focus at school and cope well
with social pressures

 No alone time: Phones and social-media sites


prevent teens from experiencing solitude, setting
them up to be lonely when they don’t have a
connection. As a result, they often suffer from
“fear of missing out,

 Too much codependence: Modern teens are failing


to separate from their parents and become
independent thinkers, a major developmental step
for adolescents.
57
 About 40% of optometrists’ patients experienced
eye strain due to computer vision syndrome
(conditions related to “near work”).

 45% complained of neck and back pain associated


with computer or handheld device use

 Many computer users assume awkward postures to


position their eyes for better performance,
according to the association.

 Close computer work can cause light sensitivity, dry


eye, blurred vision, double vision, fatigue and
headache.

58
 Teens, in particular, crank up their phones loudly to
drown out traffic noise, conversation and even
other ambient music. About half of college students
in urban settings risk hearing loss.

 Tech solution: To avoid hearing loss:


Make sure your ear buds fit snugly.
Limit your exposure to loud . You may listen to
music at half the maximum volume all day without
any risk. That level is acceptable to most people.

59
60
61
Talking with friends
face to face has In the next 10 years,
Today, technology is Internet and mobile
been an important
transforming modern technology will destroy the
existing human
society and daily life quality of human social
connection tool for
years interactions

Group that effect

Friend and Militarist /


Working
Family Hospitals /
neighbor places
Factories

62
TECHNOLOGY “PROS”
 The invention of the printing press in the 15th century and continuing up
through the proliferation of the internet in the 1990s, has allowed more
people access to an amount of information that would have once been
impossible. It helps them to become better educated and more informed.

 Developments such as the Internet and satellite television have created new
medium and audiences through which and to which these organizations can
disseminate their information. News reports can be received which highlight
many different sides of an international conflict.

 In the 20th century alone, the average lifespan of a human has increased
dramatically. This is due primarily to technology.

 With new agricultural methods and equipment, the world is able to produce
more food with less work at a cheaper price. With better medicines and more
effective treatments, people can survive diseases that would have once easily
killed them.
63
TECHNOLOGY “PROS”

 Individuals then have the ability to interact with other individuals through
such developments as e-mail, chat-rooms and the Usenet.

 This proliferation of Internet technologies has enabled people with


disabilities such as those who are blind or visually impaired, physical
disabilities or others to be able to enjoy access to sources of information and
ways of communicating they may not have had the opportunity to have used
before.

 Developments in information technology has helped governments to improve


their “service” to their citizens. Advances in Database technology for
example have enabled the governments of various countries to collate and
monitor statistical information that they can use to combat fraud, manage
the economy in a more informed way.

64
TECHNOLOGY “PROS”

 Revolution of technology has also had a major impact on the defense


capabilities of governments. This covers both a government’s capability
towage war and their intelligence gathering capability.

 Advances in weapons technology and weapons design has increased the


effectiveness of various governments’ armed forces.

 The revolution of computer also helps people in secure the privacy and
personal right

65
TECHNOLOGY “PROS”
The work can be done in very less time.

 Everything can be done at home . Online shopping are nowadays easier with
help of faster and wider range of internet. Thus the business transaction can
be done faster and time saving

 Automated billing and Electronic Fund transfer - Saving time

Data Security
 Data are more secure and can be kept secret with the technologies.
Information Technology has also had a major impact on a government’s
intelligence agencies. Encryption of sensitive information has enabled
government’s to obtain added security.

Job issue
 Revolution of computer technology develop new careers. Thus gain more
job opportunities
 Home as workplace . Eg Online Business

66
TECHNOLOGY “CONS”

 Although the proliferation of communications technology has made it


easier than to ever to have a conversation with or write a letter to another
person, it has also rendered us more isolated.

 Computers have significantly reduced the amount of face-to-face


interaction people once enjoyed. In place of the richness of human
contact, many now settle for the comparatively pale pleasures of
computer social networking.

 Computers can distract a person so much they lose contact with the reality
around them such as taking time with family, husbands, boyfriends,
girlfriends, wives and children.

67
TECHNOLOGY “CONS”

 While technology has greatly improved the overall health of humankind, it has
also afforded it the means to kill more people in a shorter period of time than
was once possible.

 Although the ultimate usefulness of nuclear weapons is a matter of ongoing


debate, they do, for the first time in history, provide humans with the means
of bringing themselves to a rapid extinction.

 Revolution of technology increase the number of


unemployment because the computer can do everything.

68
TECHNOLOGY “CONS”

 Fraudulent in transaction
 Piracy – Data / Software
 Personal data can be stole easily because of the sharing
of personal information on various social network.
 Various game which will gives negatives impact to the
younger generation who tend to follow and imitate it
 A high percentage of people sit at their computer far too
long and some people lose reality as far as social
activities and learning social skills. Not to mention
packing on the weight and the lack of exercise.

69
70
 Professional ethics refers to the ethics that a person
must adhere to in respect of their interactions and
business dealings in their professional life.
 Professional ethics includes relationships with and
responsibilities toward customers, clients, coworkers,
employees, employers, others who use one’s products
and services, and others whom they affect

 A professional has a responsibility to act ethically. Many


professions have a code of ethics that professionals are
expected to abide by
 Medical doctors
 Lawyers and judges
 Accountants
 Teachers

71
• Responsible computer
• Professional Ethics is • Includes professional confront
relationships with issues such as
concerned with
one’s behaviour and and responsibilities • 1) How much risk
towards customers, (safety, privacy,
conduct when
clients, coworkers, security)
carrying out
employees, • 2) Is acceptable in
professional work. It
employer, people systems
is codified and
varies across who use one’s • 3) what uses of
products and another company's
different cultures.
services and others intellectual property
whom one are acceptable
products affect

72
 Maintaining relationship toward customers, clients,
coworker, employees and employers.

 Making critical decisions that have significant


consequences for many people.

 Determining how to manage, select, or use


computer in a professional setting.

 Thinking about potential risk to privacy and security


of data, safety, reliability and ease of use.

73
 Knowing and learning enough about the
application field to do a good job.

 We must be honest in our professional dealings,


giving due credit for other peoples' ideas and not
claiming credit for work that we have not done.

 We cannot use the institution's resources


(computers, copying machines, postage) for
nonbusiness purposes without permission.

74
 “Do the Right Thing”
 Behaving Ethically includes:
 Being honest
 Keeping promises
 Doing your job well
 Not stealing
 Honestly is one of the most fundamental ethical
values; however, many ethical problems are
more subtle than the choice of being honest or
dishonest
 Some ethical issues are controversial.

75
1. General more imperatives
2. More specific professional responsibilities
3. Organizational leadership imperatives
4. Compliance with code

76
 Deontological
 Emphasizes duty and absolute rules.
 Rules should apply to everyone.
 Use logic or reason to determine what is good.
 Treat people as an ends (not a means).

 Natural Rights
 Derived from the nature of humanity
 Focus is on the process by which people
interact.
 Respect the fundamental rights of others,
including life, liberty, and property.

77
 Consequentialist
 includes Utilitarianism
 Strive to increase “utility” for the most people
 Consider the consequences for all affected
people.
 Rule-Utilitarianism: Choose rules, or guidelines
for behavior, that generally increase utility.
 Act-Utilitarianism: Analyze each action to
determine if it increases utility.

78
 Reaching the Right Decision
 There is no formula to solve ethical problems.
 The computer professional must consider
trade-offs.
 Ethical theories help to identify important
principles or guidelines.

79
 Some Important Distinctions
 Right, Wrong, and Okay: acts may be ethically obligatory,
ethically prohibited, or ethically acceptable.
 Negative rights (liberties): the right to act without coercive
interference.
 Positive rights (claim-rights): imposing an obligation on some
people to provide certain things.
 Causing harm: some acts may cause harm to others but are
not necessarily unethical
 Goals vs. actions: the actions we take to achieve our goals
should be consistent with our ethical constraints.
 Personal preference vs. ethics: some issues we disapprove of
because of our dislikes, rather than on ethical grounds.
 Law vs. ethics: some acts are ethical, but illegal; other acts
are legal, but unethical.
80
81
 Professional organizations provide a general statement of
ethical values reminding people in the profession that
ethical behavior is an essential part of their job.

 Provide reminders about specific professional


responsibilities.

 Provide valuable guidance for new or young members of


the profession who want to behave ethically but do not
know what is expected of them, people whose limited
experience has not prepared them to be alert to difficult
ethical situations and handle them appropriately.

82
 Professional Codes
 ACM and IEEE CS
 Software Engineering Code of Ethics and Professional Practice

 ACM
 ACM Code of Ethics

 Ethical Behaviors Expected of the Computer Professional:


 Honest and fair

 Respects confidentiality

 Maintains professional competence

 Understands relevant laws

 Respects and protection of personal privacy

 Avoids harming others

 Respects property rights

83
1. PUBLIC

• Software engineers shall acts consistently with the public interest.

2. CLIENT AND EMPLOYER

• Software engineers shall act in a manners that is in the best interests


of their client and employer consistent with the public interest.

3. PRODUCT

• Software engineers shall ensure that their products and related


modifications meet the highest professional standards possible.

4. JUDGMENT

• Software engineers shall maintain integrity and independence in their


professional judgment.
84
5. MANAGEMENT

•Software engineering managers and leaders shall subscribe to and promote


an ethical approach to the management of software development and
maintenance.

6. PROFESSION

•Software engineers shall advance the integrity and reputation of the


profession consistent with the public interest.

7. COLLEAGUES

•Software engineers shall be fair to and supportive of their colleagues.

8. SELF

•Software engineers shall participate in lifelong learning regarding the


practice of their profession and shall promote an ethical approach to the
practice of the profession.

85
 The Malaysia Board of Technologists shall protect the
technologist and technician professional system by:

Investigating all
Ensuring only registered complaints brought to it Conducting disciplinary
persons provides against registered hearing for complaints
technology services. person or technology with prima facie case.
consultancy practice.

Issuing Notification,
Take action against
Guidelines, and Circular
registered person
as benchmarks for
pursuant to Section
quality of service in the
27(1).
technology profession.

86
 The Malaysia Board of Technologists Code of Ethics require
registrants to comply with:

•Professionalism

Integrity

Competence

Benevolence

Diligence

•Strive to Perfection
Refer:
https://www.mbot.org.my/MBOT/files/44/443e3c13-8349-4295-acd2-0bb78c8984cb.pdf
87
Some Strengths and Weaknesses of Professional Codes (Tavani, 2013)
Strengths Weaknesses
Codes inspire the members of a profession Codes include directives that tend to be too
to behave ethically. general and too vague.
Codes guide the members of a profession in Codes are not always helpful when two or
ethical choices. more directives conflict.
Codes educate the members about their Codes comprise directives that are neither
professional obligations. complete nor exhaustive.
Codes discipline members when they violate Codes are ineffective (have no "teeth")in
one or more directives. disciplinary matters.
Codes inform the public about the nature Codes sometimes include directives that are
and roles of the profession. inconsistent with one another.
Codes "sensitize" members of a profession to Codes do not always distinguish between
ethical issues and alert them to ethical microethics issues and macroethics issues.
aspects they otherwise might overlook.

Codes enhance the profession in the eyes of Codes can be self-serving for the profession.
the public.
Responsibility, Legal Liability, and Accountability (Source: Tavani, 2013)
Moral Responsibility Legal Liability Accountability
Attributes blame (or Does not attribute blame Does not necessarily
praise) to individuals. or fault to those held attribute blame (in a
liable. moral sense).
Usually attributed to Typically applies to Can apply to individuals,
individuals rather than corporations and property groups of individuals, and
collectivities or groups. owners. corporations.
Notions of guilt and shame Compensation can be Someone or some group is
apply, but no legal required even when answerable (i.e., it goes
punishment or responsibility in a formal beyond mere liability).
compensation need result. sense is not admitted.
Be open and
Understand what honest about
Require a
success means capabilities,
convincing case for
safety, and
safety
limitations of
software
Include users (such as
medical staff,
technicians, pilots, office Don’t assume
workers) in the design existing software is Pay attention to
and testing stages to safe or correct, defaults
provide safe and useful review and test it
systems

Do a thorough, careful
job when planning and Develop
Design for real
scheduling a project communication
users
and when writing bids skills
or contracts
90
 Analyzing a Professional Ethical Scenario
 Brainstorming phase
 List risks, issues, problems, consequences.
 List all the stakeholders.
 List possible actions.

Q: What is the purpose of this stage?


 Analyzing Professional Responsibilities (cont’d)
 Analysis phase
 Identify the responsibilities of the decision-maker.
 Identify the rights of stakeholders.
 Consider the impact of the action options on the stakeholders.
 Find sections in codes of ethics that apply. Categorize each
potential action or response as ethically obligatory, ethically
prohibited, or ethically acceptable.
 Consider the ethical merits of each option and select one.

Q: What is the value of this stage?


 Scenario
 Sam Shaw calls the Department of Computer Science at East Dakota
State University seeking advice on how to improve the security of his
business’s local area network. A secretary in the department routes Mr.
Shaw’s call to Professor Jane Smith, an internationally recognized
expert in the field. Professor Smith answers several questions posed by
Mr. Shaw regarding network security. When Mr. Shaw asks Professor
Smith to recommend a software package to identify security problems,
Professor Smith tells him that NetCheks got the personal computer
magazine’s top rating. She does not mention that the same magazine
gave a “best buy” rating to another product with fewer features but a
much lower price. She also fails to mention that NetCheks is a product
of a spin-off company started by one of her former students and that
she owns 10 percent of the company.
 Scenario (Analysis)
 Be impartial. .
 Disclose information that others ought to know. .
 Share your knowledge, expertise, and values.
 1.06. Be fair and avoid deception in all statements, particularly public ones, concerning
software or related documents, methods and tools. Professor Smith was deceptive when
she mentioned the most highly rated software package but not the one rated to be a
“best buy.” .
 1.08. Be encouraged to volunteer professional skills to good causes and contribute to
public education concerning the discipline.
 4.05. Disclose to all concerned parties those conflicts of interest that cannot reasonably
be avoided or escaped. .
 6.02. Promote public knowledge of software engineering. Professor Smith freely provided
Sam Shaw with valuable information about network security. .
 6.05. Not promote their own interest at the expense of the profession, client or
employer. Professor Smith did not tell Sam Shaw that she had a personal stake in the
success of the NetCheks software. She did not tell him about the “best buy” package that
may have provided him every feature he needed at a much lower price
 1. What are the special responsibilities for
Search Engine Companies?
 2. What are the special responsibilities for
Companies that Develop Autonomous Systems?
 3. What kinds of ethical challenges do research
in nanotechnology and nanocomputing pose?
 4. What implications does ambient intelligence
have for concerns involving individual freedom
and autonomy, as well as for privacy and
security?
 5. What are the ethical issues associated with
bioinformatics?

You might also like