ISAT 615   Cyber Ethics         ByDrs. Alkadi & Acosta        ISAT 615       1
Cyber Ethics The majority of the slides were taken from  the book, “Cyber Ethics” by Halbert Ingulli,  which is reference...
Intellectual Property & Cyberspace If seven million people are stealing, they aren’t stealing.                           ...
Ethics Case: Napster Is it ethical to listen to as many times as you want a song that you  didn’t buy? You will probably...
Intellectual Property Law Our legal system has developed ways of protecting intellectual  property. Congress passed copy...
ISAT 615   6
Ten Commandments Of Computer Ethics    Created by the Computer Ethics Institute 1.Thou Shalt Not Use A Computer To Harm O...
Ten Commandments Of Computer Ethics               Continued 8.Thou Shalt Not Appropriate Other People’s Intellectual  Out...
ISAT 615   9
Workplace Surveillance 90% of all companies with more than 1,000 employees  currently use e-mail. Sixty billion messages...
ISAT 615   11
Interesting Quotes I find the information age to be a healthy thing…the more  you know about somebody else, the better of...
Government Regulation Vs. Industry         Self-Policing In 1998, several major companies such as, IBM, HP, AOL  and MS f...
ISAT 615   14
What Cyberspace Knows About You If you go to http://www.cdt.org you will learn how much  government and employers can dis...
ISAT 615   16
ISAT 615   17
ISAT 615   18
ISAT 615   19
Big Brother in Cyberspace The government is doing its part in educating Internet   users especially our most valuable ass...
ISAT 615   21
ISAT 615   22
Medical Privacy In his book, The Limits of Privacy, Amitai Etzioni says “it’s  Big Bucks we need to worry about, not Big ...
The Library Bills of RightsI.   Books and other library resources should be provided for the interest,     information, an...
ISAT 615   25
Questions Should children be protected from offensive  online speech? Should adults? Who should do the protecting: Gover...
Internet Anonymity In 1997, in ACLU v. Reno the supreme court noted that the  Internet “provides relatively unlimited low...
Internet Anonymity Cont’d. The Supreme Court goes on to say, “Anonymity is  a shield from the tyranny of the majority. …I...
Democracy and the Internet I’m very optimistic about the role of human beings in the Information  Age, because this is an...
Ethics and Professionalism    “Engineers shall hold paramount the safety, health and     welfare of the public in the per...
References Ingulli, Halbert, Cyber Ethics, West Thomas  Learning, 2002 Martin, Mike W., Schinzinger, Roland,  Ethics in ...
Upcoming SlideShare
Loading in …5
×

MELJUN CORTES Cyber Ethics

377 views
282 views

Published on

MELJUN CORTES Cyber Ethics

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
377
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

MELJUN CORTES Cyber Ethics

  1. 1. ISAT 615 Cyber Ethics ByDrs. Alkadi & Acosta ISAT 615 1
  2. 2. Cyber Ethics The majority of the slides were taken from the book, “Cyber Ethics” by Halbert Ingulli, which is referenced later. For more information, go to: http://halbert.westbuslaw.com ISAT 615 2
  3. 3. Intellectual Property & Cyberspace If seven million people are stealing, they aren’t stealing. David Post, Prof. of law, Temple Univ. Today’s Internet pirates try to hide behind some contrived New Age arguments of cyberspace, but all they are really doing is trying to make a case for Age Old Thievery. When they hack a DVD and then distribute it on the web, it is no different that if someone puts a quarter in a newspaper machine and then takes out all the papers, which of course would be illegal and morally wrong. Michael Eisner, Chairman & CEO, The Walt Disney Company ISAT 615 3
  4. 4. Ethics Case: Napster Is it ethical to listen to as many times as you want a song that you didn’t buy? You will probably send it to a dozen of your closest fiends and relatives. Napster operates on a (P2P) computing model. Users who have downloaded the free S/W from its site can then access the directory of available music and add tunes of their own. Napster’s server is an intermediary, allowing one user to reach the files of another. In other words, you are able to broadcast your request to millions of other music lovers in the Napster’s community. Does anyone else have this CD on their PC, are they online? What happened to Napster? http://archives.cnn.com/2001/LAW/02/20/napster.settlement.03/ ISAT 615 4
  5. 5. Intellectual Property Law Our legal system has developed ways of protecting intellectual property. Congress passed copyrights, patent and trademark laws. What is protected is the expression of an idea, not the idea itself. This follows from the high value we place on freedom of speech and expression. Copyright law protects the tangible expression of an idea from being reproduced without the permission of the copyright holder. A copyrighted work of art must be original, and created independently by the artist. The law curbs this right, making it last only for a set time period. It also permits reproduction of portions of copyrighted work for limited work such as criticism or classroom instruction. Visit http://www.copyright.gov ISAT 615 5
  6. 6. ISAT 615 6
  7. 7. Ten Commandments Of Computer Ethics Created by the Computer Ethics Institute 1.Thou Shalt Not Use A Computer To Harm Other People. 2.Thou Shalt Not Interfere With Other People’s Computer Work. 3.Thou Shalt Not Snoop Around In Other People’s Computer Files. 4.Thou Shalt Not Use A Computer To Steal. 5.Thou Shalt Not Use A Computer To Bear False Witness. 6.Thou Shalt Not Copy Or Use Proprietary Software For Which You have Not Paid. 7.Thou Shalt Not Use Other People’s Computer Resources Without Authorization Or Proper Compensation. ISAT 615 7
  8. 8. Ten Commandments Of Computer Ethics Continued 8.Thou Shalt Not Appropriate Other People’s Intellectual Output. 9.Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are Designing. 10.Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect For Your Fellow Humans. http://www.brook.edu/its/cei/overview/Ten_Commanments_of_Computer_Ethics.htm ISAT 615 8
  9. 9. ISAT 615 9
  10. 10. Workplace Surveillance 90% of all companies with more than 1,000 employees currently use e-mail. Sixty billion messages are sent annually. Employees are under the impression that their messages are private. Old and deleted messages are archived and easily accessible by the management. In the US there is no comprehensive, uniform legal standard protecting privacy. http://www.PrivacyExchange.org ISAT 615 10
  11. 11. ISAT 615 11
  12. 12. Interesting Quotes I find the information age to be a healthy thing…the more you know about somebody else, the better off everybody is. Owner of personal database company There is the possibility of becoming an even more satisfied society based on unequal access to information in which individuals live in glass houses, while the external walls of large corporations are one-way mirrors. Gary T. Marx, Professor of Sociology, MIT ISAT 615 12
  13. 13. Government Regulation Vs. Industry Self-Policing In 1998, several major companies such as, IBM, HP, AOL and MS formed the Online Privacy Alliance (OPA). The Website is: http://www.privacyalliance.com The AOL incident in 1998 stepped up the self-policing on the part of businesses to protect themselves against lawsuits. It has forced AOL to revise its privacy policy in 1999. MS and IBM announced that their companies would pull their advertising from Websites that failed to post privacy policies in sync with their own. ISAT 615 13
  14. 14. ISAT 615 14
  15. 15. What Cyberspace Knows About You If you go to http://www.cdt.org you will learn how much government and employers can discover about you. Go to http://www.aclu.org/privacy and you will find that a lot of information about you could be available to anyone. Spy Technology has become increasingly sophisticated, check out some of the sites that retail surveillance technology: http://www.intercept-spytech.com http://eaglevision1.com ISAT 615 15
  16. 16. ISAT 615 16
  17. 17. ISAT 615 17
  18. 18. ISAT 615 18
  19. 19. ISAT 615 19
  20. 20. Big Brother in Cyberspace The government is doing its part in educating Internet users especially our most valuable asset, our kids. Go to: http://www.cybercrime.gov/links1.htm and select the following link: Safety Tips for Kids on the Internet from the Federal Bureau of This is a hyperlink to the following: http://www.fbi.gov/publications/pguide/pguidee.htm ISAT 615 20
  21. 21. ISAT 615 21
  22. 22. ISAT 615 22
  23. 23. Medical Privacy In his book, The Limits of Privacy, Amitai Etzioni says “it’s Big Bucks we need to worry about, not Big government.” Etzioni continues that in 1996, 35% of the Fortune 500 companies acknowledged that they draw on personal health information in making employment decisions. These companies employ millions of people. Kathleen A. Frawley, VP of the American Health Info. Mgmt. Assoc. says “There is a whole market of people buying and selling medical information.” A.G. Breitenstein, Health Law Institute Director, said, “People are not going to go to feel comfortable going to the doctor, b/c now you are going to have a permanent record that will follow you around for the rest of your life that says you have syphilis, or depression, or an abortion or whatever else.” ISAT 615 23
  24. 24. The Library Bills of RightsI. Books and other library resources should be provided for the interest, information, and enlightenment of all people of the community the library serves. Materials should not be excluded because of the origin, background, or views of those contributing to their creation.II. Libraries should provide materials and information presenting all points of view on current and historical issues. Materials should not be proscribed or removed because of partisan or doctrinal disapproval.III. Libraries should challenge censorship in the fulfillment of their responsibility to provide information and enlightenment.IV. Libraries should cooperate with all persons and groups concerned with resisting abridgment of free expression and free access to ideas.V. A person’s right to use a library should not be denied or abridged because of origin, age, background, or views.VI. Libraries which make exhibit spaces and meeting rooms available to the public they serve should make such facilities available on an equitable basis, regardless of the beliefs or affiliations of individuals or groups requesting their use. ISAT 615 24
  25. 25. ISAT 615 25
  26. 26. Questions Should children be protected from offensive online speech? Should adults? Who should do the protecting: Government? Schools? Public Libraries? Parents? ISAT 615 26
  27. 27. Internet Anonymity In 1997, in ACLU v. Reno the supreme court noted that the Internet “provides relatively unlimited low-cost capacity for communication of all kinds. This dynamic, multifaceted category of communication includes not only traditional print and news service, but also audio, video, and still images, as well as interactive, real-time dialogue. Through the use of chat rooms, any person with a phone line can become a town crier with a voice that resonates farther than it could from any soapbox. Through the use of Web pages, mail exploders, and newsgroups, the same individual can become pamphleteer.” ISAT 615 27
  28. 28. Internet Anonymity Cont’d. The Supreme Court goes on to say, “Anonymity is a shield from the tyranny of the majority. …It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation– and their ideas from suppression– at the hand of an intolerant society.” What do you think about the Supreme Court’s stance? ISAT 615 28
  29. 29. Democracy and the Internet I’m very optimistic about the role of human beings in the Information Age, because this is an era where people – their knowledge, and their ability to put that knowledge to work – will be more important than ever before. … The Information Age is enabling people who were previoulsy forced to pursue a single means of wealth creation –those, for example, who lived in remote areas had no option but to work on the land – to choose from a far wide range of work. Technology such as the PC; the Internet and cheap telecommunications have brought amazing mobility to the factors of production.” Bill Gates, 1999 What about non-democratic countries? ISAT 615 29
  30. 30. Ethics and Professionalism “Engineers shall hold paramount the safety, health and welfare of the public in the performance of their professional duties.” Accreditation Board for Engineering and Technology (ABET) http://www.abet.org/ Websites for general resources on Engineering Ethics:1. http://www.niee.org “National Institute for Engineering Ethics”2. http://www.nspe.org “National Society of Professional Engineers”3. http://www.onlineethics.org/ “The online Ethics Center for Engineering and Science” ISAT 615 30
  31. 31. References Ingulli, Halbert, Cyber Ethics, West Thomas Learning, 2002 Martin, Mike W., Schinzinger, Roland, Ethics in Engineering, Fourth Edition, McGraw Hill, 2005 ISAT 615 31

×