Computer Ethics
Computer Ethics
ETHICS
I D O N ’ T O W N T H E M AT E R I A L R AT H E R T H E S L I D E S
ARE ASSEMBLED USING DIFFERENT FORUMS
COMPUTING
• The use or operation of computers.
COMPUTER ETHICS
• Ethics is a set of moral principles that govern the behavior of a group or
individual. Therefore, computer ethics is set of moral principles that
regulate the use of computers. Some common issues of computer ethics
include intellectual property rights (such as copyrighted electronic content),
privacy concerns, and how computers affect society.
• As technology advances, computers continue to have a greater impact on
society. Therefore, computer ethics promotes the discussion of how much
influence computers should have in areas such as artificial intelligence and
human communication. As the world of computers evolves, computer ethics
continues to create ethical standards that address new issues raised by new
technologies.
• Walter Maner in the mid-70s introduced the term ‘computer ethics’ which
means “ethical problems aggravated, transformed or created by computer
technology”.
THE QUESTION OF VALUES
Too often, new technology develops with little
attention to its impact upon human values.
Blue Whale Game
Computing has become a complex and growing
part of society – with profound and deep social
and ethical implications!
Computer ethics is the analysis of the nature and
social impact of computer technology and the
corresponding formulation and justification of
policies for the ethical use of such technology. In a Computer or Internet
It raises ethical issues like Personal Intrusion, (Cyberspace) domain of
Deception, Breach of Privacy, Cyber-bullying, Information security,
Cyber-stalking, Defamation, Evasion Technology understanding and maintaining
ethics is very important at this
or social responsibility and Intellectual Property
stage.
Rights i.e. copyrighted electronic content.
ETHICS FOR ALL
• Basic Netiquette • Dos
• Email – Respect other people's privacy
– Verify facts before reposting
– Check your email as much as possible and
– Check messages and respond promptly
respond quickly to messages you receive;
your input may be critical to someone else. • Don'ts
– Never send anything that you wouldn’t want – Name-call or express offensive opinions
someone other than the recipient to read. – Post private or embarrassing images or
comments
– Get good virus protection software and make
– Exclude people or talk behind their backs
sure it scans your incoming emails.
• Report illegal activities or offending content
– Don’t open an attachment in an email if: You
don’t know the sender, • A report on cyber bullying on 2014 gives the
• The subject line doesn’t make sense or is
following troublesome conclusions:
suspicious in any way, – 52% off young people report being cyber
bullied
• The attachment name is suspicious, or
– 95% of teens who witnessed bullying on social
• The attachment or message text doesn’t make
media report they have ignored the behavior
sense or you aren’t expecting them.
COPYRIGHT
• Software Piracy
• Public Domain: Some software is free to use, copy, and/or change, but only do so if
there is written notice that the software is in the public domain.
– Look for this notice in the “read me” files that accompany programs.
• General Public License: GPL software has the same restrictions as public domain
software, but cannot be sold for profit.
• Shareware: Using shareware programs is free, but it is illegal to copy or modify them
without permission since they are copyrighted. Most shareware programs are really
trial versions of the software, which must be paid for after the trial period has expired.
– When you purchase a copy of a software program you are actually buying a software license,
or in the case of an organization that needs many copies, a site license. A software license
can only be copied for backup purposes while site licenses let the organization make a
specific number of copies to be used within that organization only.
– Although it seems common, software piracy is a felony and shouldn’t be taken lightly
Cited: collab-lab – University Liberary
CHALLENGES:
• Why Shouldn’t I use pirated software? Who am I hurting by doing so?
– Loss of Revenue hurts everyone
– Studies found that the software industry loses approx 12 billion dollars every
year.
– All software piracy is illegal and software piracy is unethical.
PLAGIARISM
• Plagiarism is presenting someone else’s work as your own; this includes
work represented in hard copy, on disk, or on the Internet.
• Do not use “paper mills” or sites that sell academic papers to students. You
can get caught and the penalties are not lenient.
– Make sure you summarize, or at least change the order of the words when using
someone else’s work as a reference.
– Also be sure to cite that work as something you have used to gain the
information you are presenting.
– Anything that is directly quoted from any source must be put in quotation marks
and cited as well. Copyright infringements can get you sued.
– They encompass anything that anyone has expressed in any way. A person does
not need to express their copyright or even actually register it, a person’s ideas
are their own and it is illegal to pretend that they are yours.
CHALLENGES: WORKPLACE
• 62% of employers monitor employees’ eMail and Internet use
• 68% cite legal liability as the reason to monitor
• 51% of employers have disciplined or terminated employees for violating
ePolicy.
• 10% of companies have been ordered by courts to turn over employee
eMail related to workplace lawsuits.
• 8.3% of organizations have battled sexually harassment or discrimination
claims stemming from employee eMail.
COMPUTING TECHNOLOGY AND
HUMAN VALUES
News stories about computer viruses, or software ownership (file sharing) law suits,
or computer-aided bank robbery, and other economical crime, harmful
computer malfunctions, or computerized weapons, etc.
4. Compliance with the Code contains 2 items. The first item directs
members to be supportive of others. The second item indicates that gross
misconduct is grounds for dismissal. It also makes a major point: "Adherence of
professionals to a code of ethics is largely a voluntary matter."
IEEE CODE OF
CONDUCT
IEEE_CODE (1).PDF
`REFERENCES