SlideShare a Scribd company logo
1 of 40
Moral and Legal Issues of Computer Ethics
Computer Ethics
 Computers are involved to some extent in almost
every aspect of our lives
 They often perform life-critical tasks
 Computer science is not regulated to the extent
of medicine, air travel, or construction zoning
 Therefore, we need to carefully consider the
issues of ethics
These principles consider the effective code of conducts for the proper use of
information technology.
• 1. You shall not use a computer to harm other people.
• 2. You shall not interfere with other people's computer work.
• 3. You shall not snoop around in other people's computer files.
• 4. You shall not use a computer to steal.
• 5. You shall not use a computer to bear false witness.
• 6. You shall not copy or use proprietary software for which you have not paid.
• 7. You shall not use other people's computer resources without authorisation or
proper compensation.
• 8. You shall not appropriate other people's intellectual output.
• 9. You shall think about the social consequences of the program you are writing
or the system you are designing.
• 10. You shall always use a computer in ways that ensure consideration and
respect for your fellow humans.
THE TEN COMMANDMENTS OF COMPUTER ETHICS
Ethics
 Ethics are standards of moral conduct
 Standards of right and wrong
behavior
 A gauge of personal integrity
 The basis of trust and cooperation
in relationships with others
Ethical Principals
 Ethical principals are tools which are used to
think through difficult situations.
 Three useful ethical principals:
 An act is ethical if all of society benefits from
the act.
 An act is ethical if people are treated as an end
and not as a means to an end.
 An act is ethical if it is fair to all parties
involved.
Computer Ethics
 Computer ethics are morally acceptable use of
computers
 i.e. using computers appropriately
 Standards or guidelines are important in this
industry, because technology changes are
outstripping the legal system’s ability to keep up
Ethics for Computer Professionals
Computer Professionals:
 Are experts in their field,
 Know customers rely on their knowledge, expertise, and
honesty,
 Understand their products (and related risks) affect many
people,
 Follow good professional standards and practices,
 Maintain an expected level of competence and are up-to-date
on current knowledge and technology, and
 Educate the non-computer professional
Computer Ethics
 Four primary issues
 Privacy – responsibility to protect data about
individuals
 Accuracy - responsibility of data collectors to
authenticate information and ensure its accuracy
 Property - who owns information and software
and how can they be sold and exchanged
 Access - responsibility of data collectors to control
access and determine what information a person
has the right to obtain about others and how the
information can be used
Problems with Large Databases
Spreading information without consent
 Some large companies use medical records and
credit records as a factor in important personnel
decisions
Spreading inaccurate information
 Mistakes in one computer file can easily migrate
to others
 Inaccurate data may linger for years
U.S. Federal Privacy Laws
General Federal Privacy Laws:
 Freedom Of Information Act, 1968
 Privacy Act Of 1974
 Electronic Communications Privacy Act Of 1986
 Computer Matching And Privacy Protection Act Of
1988
 Computer Security Act Of 1987
 Federal Internet Privacy Protection Act Of 1997
U.S. Federal Privacy Laws
Privacy Laws Affecting Private Institutions:
 Fair Credit Reporting Act, 1970
 Right To Financial Privacy Act Of 1978
 Privacy Protection Act Of 1980
 Cable Communications Policy Act Of 1984
 Electronic Communications Privacy Act Of 1986
 Video Privacy Protection Act Of 1988
 Consumer Internet Privacy Protection Act Of 1997
 Communications Privacy & Consumer Empowerment Act Of 1997
 Data Privacy Act Of 1997
Private Networks
 Employers may legally monitor electronic mail
1. In 2001, 63% of companies monitored
employee Internet connections including about
two-thirds of the 60 billion electronic messages
sent by 40 million e-mail users.
 Most online services reserve the right to censor
content
 These rights lead to contentious issues over
property rights versus free speech and privacy
The Internet and the Web
 Most people don’t worry about email privacy on the
Web due to illusion of anonymity
 Each e-mail you send results in at least 3 or 4 copies
being stored on different computers.
 Web sites often load files on your computer called
cookies to record times and pages visited and other
personal information
 Spyware - software that tracks your online
movements, mines the information stored on your
computer, or uses your computer for some task you
know nothing about.
General Internet Issues
 Inflammatory interchange of messages
via internet (email, chat rooms, etc.)
 Chain mail
 Virus warning hoaxes
 “Spam” – unsolicited, bulk email
E-Mail Netiquette
 Promptly respond to messages.
 Delete messages after you read them if you don’t
need to save the information.
 Don’t send messages you wouldn’t want others
to read.
 Keep the message short and to the point.
 Don’t type in all capital letters.
 Be careful with sarcasm and humor in your
message.
Internet Content & Free Speech Issues
 Information on internet includes hate, violence,
and information that is harmful for children
 How much of this should be regulated?
 Do filters solve problems or create more?
 Is web site information used for course work
and research reliable?
Information Ownership
Issues
 Illegal software copying (pirating)
 Infringement of copyrights by copying of pictures
or text from web pages
 Plagiarism by copying text from other sources
when original work is expected
Terms
INTELLECTUAL PROPERTY: Intangible
creations protected by law
TRADE SECRET: Intellectual work
or products belonging to a business, not in public domain
COPYRIGHT: Statutory grant
protecting intellectual property from copying by others for
28 years
PATENT: Legal
document granting owner exclusive monopoly on an
invention for 17 years
Copyright Laws
 Software developers (or the companies they work
for) own their programs.
 Software buyers only own the right to use the
software according to the license agreement.
 No copying, reselling, lending, renting, leasing,
or distributing is legal without the software
owner’s permission.
Software Licenses
 There are four types of software licenses:
 Public Domain
 Freeware
 Shareware
 All Rights Reserved
Public Domain License
 Public domain software has no owner and is not
protected by copyright law.
 It was either created with public funds, or the
ownership was forfeited by the creator.
 Can be copied, sold, and/or modified
 Often is of poor quality/unreliable
Freeware License
 Freeware is copyrighted software that is licensed
to be copied and distributed without charge.
 Freeware is free, but it’s still under the owner’s
control.
 Examples:
 Eudora Light
 Netscape
Shareware License
 A shareware software license allows you to use the
software for a trial period, but you must pay a
registration fee to the owner for permanent use.
 Some shareware trials expire on a certain date
 Payment depends on the honor system
 Purchasing (the right to use) the software may also
get you a version with more powerful features and
published documentation.
All Rights Reserved License
 May be used by the purchaser according the
exact details spelled out in the license
agreement.
 You can’t legally use it--or even possess it--
without the owner’s permission.
Software Piracy
 SPA (Software Publishers Association) polices
software piracy and mainly targets:
 Illegal duplication
 Sale of copyrighted software
 Companies that purchase single copies and load
the software on multiple computers or networks
 They rely on whistle-blowers.
 Penalties (for primary user of PC) may include fines
up to $250,000 and/or imprisonment up to 5 years in
jail
System Quality
 Bug-free software is difficult to produce
 It must be carefully designed, developed, and
tested
 Mistakes generated by computers can be far
reaching
 Commenting and documenting software is
required for effective maintenance throughout the
life of the program
System Quality
ETHICAL ISSUES: When is software, system or service ready for release?
SOCIAL ISSUES: Can people trust quality of software, systems, services, data?
POLITICAL ISSUES: Should congress or industry develop standards for
software, hardware, data quality?
Computer Crime
 Computer criminals -using a computer to commit
an illegal act
 Who are computer criminals?
 Employees – disgruntled or dishonest --the
largest category
 Outside users - customers or suppliers
 “Hackers” and “crackers” - hackers do it “for
fun” but crackers have malicious intent
 Organized crime - tracking illegal enterprises,
forgery, counterfeiting
Types of Computer Crime
 Damage to computers, programs or files
 Viruses - migrate through systems attached to files and
programs
 Worms - continuously self-replicate
 Theft
 Of hardware, software, data, computer time
 Software piracy - unauthorized copies of copyrighted
material
 View/Manipulation
 “Unauthorized entry” and “harmless message” still illegal
Computer Security
 Computer security involves protecting:
 information, hardware and software
 from unauthorized use and damage and
 from sabotage and natural disasters
 Restricting access both to the hardware locations
(physical access) and into the system itself (over the
network) using firewalls
 Implementing a plan to prevent break-ins
 Changing passwords frequently
 Making backup copies
 Using anti-virus software
 Encrypting data to frustrate interception
 Anticipating disasters (disaster recovery plan)
 Hiring trustworthy employees
Measures to Protect Computer
Security
Computer Ethics for Computer Professionals
 Competence– Professionals keep up with the
latest knowledge in their field and perform
services only in their area of competence.
 Responsibility– Professionals are loyal to their
clients or employees, and they won’t disclose
confidential information.
 Integrity– Professionals express their opinions
based on facts, and they are impartial in their
judgments.
The ACM Code of Conduct
 According to the Association for Computing Machinery (ACM)
code, a computing professional:
 Contributes to society and human well-being
 Avoids harm to others
 Is honest and trustworthy
 Is fair and takes action not to discriminate
 Honors property rights, including copyrights and
patents
 Gives proper credit when using the intellectual
property of others
 Respects other individuals’ rights to privacy
 Honors confidentiality
Quality of Life Issues
 Rapid Change:
Reduced response time to competition
 Maintaining Boundaries:
Family, work, leisure
 Dependence And Vulnerability
 Employment:
Re-engineering job loss
 Equity & Access:
Increasing gap between haves and have nots
 Health Issues
Ergonomics
 Ergonomics:
 helps computer users to avoid
 physical and mental health risks
 and to increase
 productivity
Physical Health Issues
 Avoid eyestrain and headache
1. Take regular breaks every couple of hours
2. Control ambient light and insure adequate monitor
brightness
 Avoid back and neck pain
1. Have adjustable equipment with adequate back
support
2. Keep monitor at, or slightly below eye level
Physical Health Issues
1. Avoid effects of electromagnetic fields (VDT radiation)
 Possible connection to miscarriages and cancers, but no
statistical support yet
 Use caution if pregnant
2. Avoid repetitive strain injury (RSI)
 Injuries from fast, repetitive work
 Carpal tunnel syndrome (CTS) - nerve and tendon damage in
hands and wrists
The Environment
1. Microcomputers are the greatest user of electricity in the
workplace
2. “Green” PCs
 System unit and display - minimize unnecessary energy
consumption and power down when not in use
 Manufacturing - avoids harmful chemicals in production,
focus on chlorofluorocarbons (CFC’s) which some blame for
ozone layer depletion
Personal Responsibility of Users
1. Conserve
 Turn computers off at end of work day
 Use screen savers
2. Recycle
 Most of the paper we use is eligible
 Dispose of old parts via recycling programs –
most computer parts are dangerous in landfills
3. Educate
 Know the facts about ecological issues
THANK YOU

More Related Content

Similar to Computer ethics cyber security and technology of it

Similar to Computer ethics cyber security and technology of it (20)

Issues with computers
Issues with computersIssues with computers
Issues with computers
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
ComputingEthics.pptx
ComputingEthics.pptxComputingEthics.pptx
ComputingEthics.pptx
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Security issues ethics in education chapter 8
Security issues ethics in education chapter 8Security issues ethics in education chapter 8
Security issues ethics in education chapter 8
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Computer
ComputerComputer
Computer
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Online ethics
Online ethicsOnline ethics
Online ethics
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 

Computer ethics cyber security and technology of it

  • 1. Moral and Legal Issues of Computer Ethics
  • 2. Computer Ethics  Computers are involved to some extent in almost every aspect of our lives  They often perform life-critical tasks  Computer science is not regulated to the extent of medicine, air travel, or construction zoning  Therefore, we need to carefully consider the issues of ethics
  • 3. These principles consider the effective code of conducts for the proper use of information technology. • 1. You shall not use a computer to harm other people. • 2. You shall not interfere with other people's computer work. • 3. You shall not snoop around in other people's computer files. • 4. You shall not use a computer to steal. • 5. You shall not use a computer to bear false witness. • 6. You shall not copy or use proprietary software for which you have not paid. • 7. You shall not use other people's computer resources without authorisation or proper compensation. • 8. You shall not appropriate other people's intellectual output. • 9. You shall think about the social consequences of the program you are writing or the system you are designing. • 10. You shall always use a computer in ways that ensure consideration and respect for your fellow humans. THE TEN COMMANDMENTS OF COMPUTER ETHICS
  • 4. Ethics  Ethics are standards of moral conduct  Standards of right and wrong behavior  A gauge of personal integrity  The basis of trust and cooperation in relationships with others
  • 5. Ethical Principals  Ethical principals are tools which are used to think through difficult situations.  Three useful ethical principals:  An act is ethical if all of society benefits from the act.  An act is ethical if people are treated as an end and not as a means to an end.  An act is ethical if it is fair to all parties involved.
  • 6. Computer Ethics  Computer ethics are morally acceptable use of computers  i.e. using computers appropriately  Standards or guidelines are important in this industry, because technology changes are outstripping the legal system’s ability to keep up
  • 7. Ethics for Computer Professionals Computer Professionals:  Are experts in their field,  Know customers rely on their knowledge, expertise, and honesty,  Understand their products (and related risks) affect many people,  Follow good professional standards and practices,  Maintain an expected level of competence and are up-to-date on current knowledge and technology, and  Educate the non-computer professional
  • 8. Computer Ethics  Four primary issues  Privacy – responsibility to protect data about individuals  Accuracy - responsibility of data collectors to authenticate information and ensure its accuracy  Property - who owns information and software and how can they be sold and exchanged  Access - responsibility of data collectors to control access and determine what information a person has the right to obtain about others and how the information can be used
  • 9. Problems with Large Databases Spreading information without consent  Some large companies use medical records and credit records as a factor in important personnel decisions Spreading inaccurate information  Mistakes in one computer file can easily migrate to others  Inaccurate data may linger for years
  • 10. U.S. Federal Privacy Laws General Federal Privacy Laws:  Freedom Of Information Act, 1968  Privacy Act Of 1974  Electronic Communications Privacy Act Of 1986  Computer Matching And Privacy Protection Act Of 1988  Computer Security Act Of 1987  Federal Internet Privacy Protection Act Of 1997
  • 11. U.S. Federal Privacy Laws Privacy Laws Affecting Private Institutions:  Fair Credit Reporting Act, 1970  Right To Financial Privacy Act Of 1978  Privacy Protection Act Of 1980  Cable Communications Policy Act Of 1984  Electronic Communications Privacy Act Of 1986  Video Privacy Protection Act Of 1988  Consumer Internet Privacy Protection Act Of 1997  Communications Privacy & Consumer Empowerment Act Of 1997  Data Privacy Act Of 1997
  • 12. Private Networks  Employers may legally monitor electronic mail 1. In 2001, 63% of companies monitored employee Internet connections including about two-thirds of the 60 billion electronic messages sent by 40 million e-mail users.  Most online services reserve the right to censor content  These rights lead to contentious issues over property rights versus free speech and privacy
  • 13. The Internet and the Web  Most people don’t worry about email privacy on the Web due to illusion of anonymity  Each e-mail you send results in at least 3 or 4 copies being stored on different computers.  Web sites often load files on your computer called cookies to record times and pages visited and other personal information  Spyware - software that tracks your online movements, mines the information stored on your computer, or uses your computer for some task you know nothing about.
  • 14. General Internet Issues  Inflammatory interchange of messages via internet (email, chat rooms, etc.)  Chain mail  Virus warning hoaxes  “Spam” – unsolicited, bulk email
  • 15. E-Mail Netiquette  Promptly respond to messages.  Delete messages after you read them if you don’t need to save the information.  Don’t send messages you wouldn’t want others to read.  Keep the message short and to the point.  Don’t type in all capital letters.  Be careful with sarcasm and humor in your message.
  • 16. Internet Content & Free Speech Issues  Information on internet includes hate, violence, and information that is harmful for children  How much of this should be regulated?  Do filters solve problems or create more?  Is web site information used for course work and research reliable?
  • 17. Information Ownership Issues  Illegal software copying (pirating)  Infringement of copyrights by copying of pictures or text from web pages  Plagiarism by copying text from other sources when original work is expected
  • 18. Terms INTELLECTUAL PROPERTY: Intangible creations protected by law TRADE SECRET: Intellectual work or products belonging to a business, not in public domain COPYRIGHT: Statutory grant protecting intellectual property from copying by others for 28 years PATENT: Legal document granting owner exclusive monopoly on an invention for 17 years
  • 19. Copyright Laws  Software developers (or the companies they work for) own their programs.  Software buyers only own the right to use the software according to the license agreement.  No copying, reselling, lending, renting, leasing, or distributing is legal without the software owner’s permission.
  • 20. Software Licenses  There are four types of software licenses:  Public Domain  Freeware  Shareware  All Rights Reserved
  • 21. Public Domain License  Public domain software has no owner and is not protected by copyright law.  It was either created with public funds, or the ownership was forfeited by the creator.  Can be copied, sold, and/or modified  Often is of poor quality/unreliable
  • 22. Freeware License  Freeware is copyrighted software that is licensed to be copied and distributed without charge.  Freeware is free, but it’s still under the owner’s control.  Examples:  Eudora Light  Netscape
  • 23. Shareware License  A shareware software license allows you to use the software for a trial period, but you must pay a registration fee to the owner for permanent use.  Some shareware trials expire on a certain date  Payment depends on the honor system  Purchasing (the right to use) the software may also get you a version with more powerful features and published documentation.
  • 24. All Rights Reserved License  May be used by the purchaser according the exact details spelled out in the license agreement.  You can’t legally use it--or even possess it-- without the owner’s permission.
  • 25. Software Piracy  SPA (Software Publishers Association) polices software piracy and mainly targets:  Illegal duplication  Sale of copyrighted software  Companies that purchase single copies and load the software on multiple computers or networks  They rely on whistle-blowers.  Penalties (for primary user of PC) may include fines up to $250,000 and/or imprisonment up to 5 years in jail
  • 26. System Quality  Bug-free software is difficult to produce  It must be carefully designed, developed, and tested  Mistakes generated by computers can be far reaching  Commenting and documenting software is required for effective maintenance throughout the life of the program
  • 27. System Quality ETHICAL ISSUES: When is software, system or service ready for release? SOCIAL ISSUES: Can people trust quality of software, systems, services, data? POLITICAL ISSUES: Should congress or industry develop standards for software, hardware, data quality?
  • 28. Computer Crime  Computer criminals -using a computer to commit an illegal act  Who are computer criminals?  Employees – disgruntled or dishonest --the largest category  Outside users - customers or suppliers  “Hackers” and “crackers” - hackers do it “for fun” but crackers have malicious intent  Organized crime - tracking illegal enterprises, forgery, counterfeiting
  • 29. Types of Computer Crime  Damage to computers, programs or files  Viruses - migrate through systems attached to files and programs  Worms - continuously self-replicate  Theft  Of hardware, software, data, computer time  Software piracy - unauthorized copies of copyrighted material  View/Manipulation  “Unauthorized entry” and “harmless message” still illegal
  • 30. Computer Security  Computer security involves protecting:  information, hardware and software  from unauthorized use and damage and  from sabotage and natural disasters
  • 31.  Restricting access both to the hardware locations (physical access) and into the system itself (over the network) using firewalls  Implementing a plan to prevent break-ins  Changing passwords frequently  Making backup copies  Using anti-virus software  Encrypting data to frustrate interception  Anticipating disasters (disaster recovery plan)  Hiring trustworthy employees Measures to Protect Computer Security
  • 32. Computer Ethics for Computer Professionals  Competence– Professionals keep up with the latest knowledge in their field and perform services only in their area of competence.  Responsibility– Professionals are loyal to their clients or employees, and they won’t disclose confidential information.  Integrity– Professionals express their opinions based on facts, and they are impartial in their judgments.
  • 33. The ACM Code of Conduct  According to the Association for Computing Machinery (ACM) code, a computing professional:  Contributes to society and human well-being  Avoids harm to others  Is honest and trustworthy  Is fair and takes action not to discriminate  Honors property rights, including copyrights and patents  Gives proper credit when using the intellectual property of others  Respects other individuals’ rights to privacy  Honors confidentiality
  • 34. Quality of Life Issues  Rapid Change: Reduced response time to competition  Maintaining Boundaries: Family, work, leisure  Dependence And Vulnerability  Employment: Re-engineering job loss  Equity & Access: Increasing gap between haves and have nots  Health Issues
  • 35. Ergonomics  Ergonomics:  helps computer users to avoid  physical and mental health risks  and to increase  productivity
  • 36. Physical Health Issues  Avoid eyestrain and headache 1. Take regular breaks every couple of hours 2. Control ambient light and insure adequate monitor brightness  Avoid back and neck pain 1. Have adjustable equipment with adequate back support 2. Keep monitor at, or slightly below eye level
  • 37. Physical Health Issues 1. Avoid effects of electromagnetic fields (VDT radiation)  Possible connection to miscarriages and cancers, but no statistical support yet  Use caution if pregnant 2. Avoid repetitive strain injury (RSI)  Injuries from fast, repetitive work  Carpal tunnel syndrome (CTS) - nerve and tendon damage in hands and wrists
  • 38. The Environment 1. Microcomputers are the greatest user of electricity in the workplace 2. “Green” PCs  System unit and display - minimize unnecessary energy consumption and power down when not in use  Manufacturing - avoids harmful chemicals in production, focus on chlorofluorocarbons (CFC’s) which some blame for ozone layer depletion
  • 39. Personal Responsibility of Users 1. Conserve  Turn computers off at end of work day  Use screen savers 2. Recycle  Most of the paper we use is eligible  Dispose of old parts via recycling programs – most computer parts are dangerous in landfills 3. Educate  Know the facts about ecological issues