Computer Ethics and Policies: Coordinator Dr. Balsam A. Mustafa
Computer Ethics and Policies: Coordinator Dr. Balsam A. Mustafa
Mobile Phones on silent / off Complete appropriate pre-reading Participate in open discussion
Subject Details
Weekly
Lectures (3 hours) Quizs - 10% Assignments - 25% marks Project - 25% marks Final Exam 40% marks
You have to pass all individually i.e. you will need 40% marks in tutorials, assignments and final examination.
Reference Books:
Deborah G. Johnson, Computer Ethics. Pearson Prentice hall, 2003. Stacy L. Edgar. Morality and Machines: perspectives on Computer Ethics. Jones and Bartlett Publishers, 1997. Many sites on the internet.
Remember
You MUST pass the quizzes, assignments, and exams individually (>40%) in order to pass this subject overall.
GOOD LUCK!
5
Overview
In this lecture we look at - What is Computer Ethics? - What is Computer Policy? - Computers Used in a Social Contexts - Moral and Legal Issues - The Role of Analogy in Computer Ethics
Computer Ethics
Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is a set of moral principles that regulate the use of computers. Computer ethics is concerned with standards of conduct as they pertain to computers.
Computer Ethics
As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as artificial intelligence and human communication.
The growth of the WWW has created several novel legal issues The existence of new questions that older laws cannot answer Traditional laws are outdated/anachronistic in this world, a more coherent body of law is needed to govern Internet and computers
10
Ethical issues
1. Privacy
- Privacy is the limitation of others' access to an individual. - It refers to the protection of personalized information from being freely distributed.
11
Individuals provide and registering for services. Ethical business practice protects the privacy of their customers by securing information which may contribute to the loss of their privacy. Credit card information, social security numbers, phone numbers, addresses, which in case it freely collected and shared over the internet may lead to a loss of Privacy.
12
Identity theft (using another's identity to obtain credit, goods and services)
is a form of stealing another person's Identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name (medical identity). Organizations and individuals who are defrauded by the identity thief may suffer adverse consequences and losses that affect their lives and business.
13
Hacking
- Attack toolkits are becoming more accessible and easier to use, allowing criminals with little technical expertise to turn to cybercrime. - Hackers interested in credit card theft may be able for accessing all kinds of information online and infecting users computers using malicious software.
14
2. Property
One philosophy of the internet is centred around the freedom of information. The controversy in the world of cyberethics over ownership occurs when the property of information is infringed upon or uncertain.
15
16
3. Gambling
In societies that allow gambling, opinions on what types of gambling the government should permit and where it should be allowed to take place. The accessibility of the internet and its ability to cross geographic-borders have led to illegal online gambling. Over the years online gambling, both legal and illegal, has grown exponentially which has led to difficulties in regulation.
17
What is Policy?
A policy is typically described as a principle or rule to guide decisions and achieve rational outcome(s). The term is not normally used to denote what is actually done, this is normally referred to as either procedure or protocol. Policies are generally adopted by the Board of or senior governance body within an organization. Policy can be considered as a "Statement of Intent" or a "Commitment". For that reason at least, the decision-makers can be held accountable for their "Policy".
18
What is Policy?
Intended effects The intended effects of a policy vary widely according to the organization and the context in which they are made. Broadly, policies are typically instituted to avoid some negative effect that has been noticed in the organization, or to seek some positive benefit.
19
Policy Content
A purpose statement, outlining why the organization is issuing the policy, and what its desired effect or outcome of the policy should be. An applicability and scope statement, describing who the policy affects and which actions are impacted by the policy. The applicability and scope may expressly exclude certain people, organizations, or actions from the policy requirements. A responsibilities section, indicating which parties and organizations are responsible for carrying out individual policy statements Policy statements indicating the specific regulations, requirements, or modifications to organizational behavior that the policy is creating.
20
What is Policy?
A computer security policy defines the goals and elements of an organization's computer systems. Security policies are enforced by organizational policies or security mechanisms. A technical implementation defines whether a computer system is secure or insecure.
21
Reasoning by analogy involves looking for familiar situations comparable to the one involving computer and information technology, then accepting the equivalence of correct action, or identify the difference between the cases. Ex: computer hacking
23
1. Please read the articles uploaded in moodle and understand the main ideas and issues in them. 2. Prepare yourself for discussion questions related to these issues. 3. You may bring hard copy of the articles with you in the class.
24
25