0% found this document useful (0 votes)
63 views

LESSON 2 Computer Ethics

Uploaded by

ashleydune
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views

LESSON 2 Computer Ethics

Uploaded by

ashleydune
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

SOCIAL AND

PROFESSIONAL
ISSUES
Lesson 2: Computer Ethics
Intended Learning
Outcomes
At the end of this chapter, the student is expected to:
1. State the Code of Ethics of Filipino IT Professionals;

2. Apply the Principles formulated by the Association of Computing Machinery in dealing


with other people, in making judgement, in software designs and all other dealings in the
exercise of the IT Profession;
3. Explain the Ten Commandments of Computer Ethics;
4. Identify problems in a work scenario;
5. Be a morally responsible student; and
6. Manifest ethical thinking skills in analyzing and justifying computing issues.
Professional
Code of Ethics
Is a set of guidelines which are
designed to set of acceptable
behavior of member of a
particular group, association or
profession.
-Cengage learning (2008)
Main Parts:

a. Outlines what the


organizations aspires to
become, and
b. Typically lists rules and
principles by which members
of the organization are
expected to abide.
Laws vs. Ethics:
A Fundamental Distinction

Laws: Provide a legal framework for behavior, outlining what is permissible


and punishable by law.
• Limitations: Laws can't cover every situation, especially in rapidly
evolving fields like IT. Just because something is legal doesn't mean
it's ethical.
Ethics: Involves principles that guide behavior based on what is morally
right or wrong.
• Broader Scope: Ethics addresses situations where the law might be
silent, helping professionals navigate gray areas.
1.Ethical Decision Making
2.High Standard of Practice and
Ethical Behavior
3.Trust and Respect from the
General Public
4.Evaluation Benchmark
CODE OF ETHICS of Filipino IT Professional
1. I will promote public knowledge, understanding and
appreciation of information technology;
2. I will consider the general welfare and public good in the
performance of my work;
3. I will advertise goods or professional services in a clear and
truthful manner;
4. I will comply and strictly abide by the intellectual property
laws, patent laws and other related laws in respect of
information technology;
5. I will accept full responsibility for the work undertaken and
will utilize my skills with competence and professionalism;
CODE OF ETHICS of Filipino IT Professional
6. I will make truthful statements on my areas of competence as well
as the capabilities and qualities of my products and services;
7. I will not disclose or use any confidential information obtained in
the course of professional duties without the consent of the parties
concerned, except when required by law;
8. I will try to attain the highest quality in both the products and
services I offer;
9. I will not knowingly participate in the development of Information
Technology Systems that will promote the commission of fraud and
other unlawful acts;
10. I will uphold and improve the IT professional standards through
continuing professional development in order to enhance the IT
profession.
CODE OF ETHICS
CODE OF ETHICS
READINGS:

•PLEASE READ THE ATTACHED


MATERIALS
CODE OF ETHICS OF AITP
Rule #1: Thou Shalt Not Use a Computer to Harm Other People

:
•Key Point

THE TEN COMMANDMENTS


Rule #1: Thou shalt not use a computer to harm other people.

Rule #2: Thou shalt not interfere with other people’s


computer work.
Rule #3: Thou shalt not snoop around in other people’s
computer files.
Rule #4: shalt not use a computer to steal.

Rule #5: Thou shalt not use a computer to bear false witness.
Rule #1: Thou Shalt Not Use a Computer to Harm Other People

:
•Key Point

THE TEN COMMANDMENTS


• Rule #6: Thou shalt not copy or use proprietary software for which you have
not paid.

• Rule #7: Thou shalt not use other people’s computer resources without
authorization or proper compensation.

• Rule #8: Thou shalt not appropriate other people’s intellectual output.

• Rule #9: Thou shalt think about the social consequences of the program you
are writing or the system you are designing.

• Rule #10 : Thou shalt always use a computer in ways that ensure consideration
and respect for your fellow humans.
The Hacking Community’s Constitution:
1. We believe: That every individual should have the right to be
free speech in cyber space.
2. We believe: That every individual should be free of worry
when pertaining to oppressive governments that control the
cyber space.
3. We believe: That democracy should exist in cyber space to
set a clear example as to how a functioning element of society
can prosper with equal rights and free speech to all.
4. We believe: That hacking is a tool that should and is used to
test the integrity of networks that hold and safe guard out
valuable information.
The Hacking Community’s Constitution:
5. We believe: Those sovereign countries in the world
community that do not respect respect democracy should be
punished.
6. We believe: That art, music, politics and crucial social
elements of all world societies can be achieved on the
computer and in cyber space.
7. We believe: That hacking, cracking and phreaking are
instruments that can achieve three crucial goals:
a. Direct Democracy in cyber space.
b. The belief that information should be free to all.
c. The idea that one can test and know the dangers and
exploits of systems that store the individuals’ information.
The Hacking Community’s Constitution:
8. We believe: That cyber space should be a governing body in the
world community, where people of all nations and cultures can
express their ideas and beliefs has to how our world politics
should be played.
9. We believe: That there should be no governing social or political
class or party in cyber space.
10. We believe: That the current status of the internet is as clear
example as to how many races, cultures, and people can
communicate freely and without friction or conflicts.
11. We believe: In free enterprise and friction free capitalism.
The Hacking Community’s Constitution:
12. We believe: In the open source movement fully, as no government
should adopt commercial or priced software for it shows that a
government may be biased to something that does not prompt the
general welfare of the technology market and slows or stops the
innovation of other smaller company’s products.
13. We believe: That technology can be wielded for the better
placement of mankind and the environment we live in.
14. We believe: That all sovereign countries in the world community
should respect these principles and ideas released in this
constitution.
The above declared constitution is like a bill of rights which should be
read in relation to the ten commandments.
WHAT IS COMPUTER
ETHICS?
Computer Ethics

Computer ethics is a set


of moral principles that
guide the use and
development of
computers and
technology.
Ethical Theories
•Utilitarianism:
• Focuses on maximizing overall happiness and minimizing harm.
• Example: Evaluating software that increases productivity but may lead to
job displacement.
•Kantianism:
• Emphasizes duty and respect for individuals.
• Example: Upholding user privacy as a moral obligation, regardless of the
consequences.
Problems in Computer
Ethics

•Moor’s Framework: Logically Malleable

•Technology's flexibility allows for ethical ambiguity in its use.

•Two Stages of Technological Revolution:


1. Technological Introduction: Initial launch of new technologies
and their capabilities.
2. Technological Permeation: The deep integration of technology
into all aspects of life, leading to complex ethical issues.
Impact on Society –
Moor's Invisibility Factor

1.Invisible Abuse: Misuse of technology that is not


readily apparent, such as cyberbullying or data
theft.

2.Invisible Programming Values: The biases and


values embedded in algorithms that shape user
experiences and decisions.

3.Invisible Complex Circulation: The hidden flow of


information and the implications of data sharing,
often leading to ethical concerns.
Three Levels of Computer
Ethics
Levels Defined by the Research Center
on Computing & Society (2007):
• Pop Level: Common, everyday ethical issues encountered by users,
such as plagiarism or online harassment.
• Para Level: Ethical challenges faced by professionals in specific
contexts, including workplace ethics and compliance with laws.
• Theoretical Level: Abstract ethical theories and philosophies that
provide a framework for understanding complex moral issues in
computing.
Moral Responsibilities of
Computer Professionals

•Herman Tabani (2009):


• Emphasizes the ethical responsibilities of computing professionals in society.
•Gotterbarn's Principles (2001):
•Do Good or Cause Harm: Professionals must ensure their actions benefit
society.
•Enable Others to Do Good or Cause Harm: Professionals should provide
tools and systems that empower ethical behavior.
•Influence Others to Do Good or Cause Harm: Professionals can advocate
for ethical practices and influence the behavior of peers and users.
Social
Networking
Ethical Issues
Current Trends in
Social Networking:

•The Philippines is noted for its active


social media engagement (Yahoo News).
•Ethical issues arise from the use of social
networking sites, including privacy
concerns, misinformation, and
cyberbullying.
Posting a Picture
Message
Ethical considerations
when sharing images
online:

• Consent: Obtaining permission before


posting pictures of others.
• Context: Being aware of how images
may be perceived and the potential
for misuse.
• Impact on Reputation: Understanding
the long-term consequences of
sharing content that may affect
personal or professional lives.
Exception:
• 1. NEWS OF THE DAY / PRESS INFORMATION
• 2. FOR THE GENERAL WELFARE
• 3. FOR PUBLIC FIGURES/ PUBLIC PERSONALITIES
CASE STUDY:
• You are a member of a specialized investigation team handling a high-
profile murder case involving a local businessman. In your investigation you
got the recorded tape in CCTV camera shown the girl killing her boss, but
the video was blurred . You gave the video to the computer expert to be
scanned using the special program the footage to make the video clearer
and identify the suspect, but the specialist told you that it would take 48
hours to clearly view the image. On the day your sister confessed that she
was the one who killed the man. Will you report your sister to authorities?
Why?
CASE STUDY:
• You are a member of a specialized investigation team handling a high-profile
murder case involving a local businessman. The case has garnered significant
media attention, and your team is under pressure to solve it quickly.
Situation:
• While reviewing evidence and witness statements, your sister confesses to you in a
private conversation that she was the one who killed the businessman. She
explains that it was an act of self-defense, but the circumstances surrounding the
incident are murky. She begs you to keep this information confidential, fearing
severe consequences and legal repercussions.
RESOURCES:
IMAGE:
https://www.workplaceethicsadvice.com/2017/09/the-ethics-of-using-
social-media-in-the-workplace.html
https://empowermenttechnology301.wordpress.com/2017/08/13/how-
the-philippines-spends-time-in-social-media/
https://cmfr-phil.org/media-ethics-responsibility/journalism-
review/documenting-social-media-abuse/
Thank you

You might also like