SlideShare a Scribd company logo
Computer
Ethics
 Computer ethics are morally acceptable use of computers.
 i.e. using computers appropriately
 Standards or guidelines are important in this industry,
because technology changes are outstripping the legal
system’s ability to keep up.
 Cyber-ethics:
The study of moral, legal, and social issues involving
cybertechnology
Computer Ethics
 Computers in the Workplace
 Computer Crime
 Privacy and Anonymity
 Intellectual Property
 Professional Responsibility
 Computers as an engineering tool
 Autonomous computers
 Other issues
Computer Ethics Issues
LOST JOBS: Economic incentives to replace humans with
computerized devices are very high
NEW JOBS: Computer industry already has generated a
wide variety of new jobs
ALTERED JOBS:
“de-skilling”
New skilled jobs
Computers in the Workplace
Four primary issues
Privacy – responsibility to protect data about individuals
Accuracy - responsibility of data collectors to authenticate
information and ensure its accuracy
Property - who owns information and software and how can
they be sold and exchanged
Access - responsibility of data collectors to control access and
determine what information a person has the right to obtain about
others and how the information can be used
Computer Ethics – Primary Issues
Spreading information without consent
Some large companies use medical records and credit records
as a factor in important personnel decisions
Spreading inaccurate information
Mistakes in one computer file can easily migrate to others
Inaccurate data may linger for years
Problems with Large Databases
Internet issues
Inflammatory interchange of messages via internet (email, chat
rooms, etc.)
Chain mail
Virus warning hoaxes
“Spam” – unsolicited, bulk email
Information on internet includes hate, violence, and information
that is harmful for children
• How much of this should be regulated?
• Do filters solve problems or create more?
Is web site information used for course work and research
reliable?
Internet Content Issues
Privacy
Inappropriate access
Hacking
Ethical hacking
Legal responses
• Free Software Foundation –
Software ownership should not be allowed at all.
One can own the following aspects of a program:
• source code
• object code
• algorithm
• look and feel
Copyright infringement
IPR
 Software developers (or the companies they work for) own their
programs.
 Software buyers only own the right to use the software according to
the license agreement.
 No copying, reselling, lending, renting, leasing, or distributing is legal
without the software owner’s permission.
Copyright Laws
 There are four types of software licenses:
 Public Domain
 Freeware
 Shareware
 All Rights Reserved
Software Licenses
 Public domain software has no owner and is not protected by
copyright law.
 It was either created with public funds, or the ownership was
forfeited by the creator.
 Can be copied, sold, and/or modified
 Often is of poor quality/unreliable
Public Domain License
 Freeware is copyrighted software that is licensed to be copied and
distributed without charge.
 Freeware is free, but it’s still under the owner’s control.
 Examples:
 Eudora Light
 Netscape
Freeware License
• A shareware software license allows you to use the software for a
trial period, but you must pay a registration fee to the owner for
permanent use.
• Some shareware trials expire on a certain date
• Payment depends on the honor system
• Purchasing (the right to use) the software may also get you a
version with more powerful features and published documentation.
Shareware License
 May be used by the purchaser according the exact details spelled
out in the license agreement.
 You can’t legally use it--or even possess it-- without the owner’s
permission.
All Rights Reserved License
 SPA (Software Publishers Association) polices software piracy and
mainly targets:
 Illegal duplication
 Sale of copyrighted software
 Companies that purchase single copies and load the software on multiple
computers or networks
 They rely on whistle-blowers.
 Penalties (for primary user of PC) may include fines up to $250,000
and/or imprisonment up to 5 years in jail
Software Piracy
• Bug-free software is difficult to produce
• It must be carefully designed, developed, and tested
• Mistakes generated by computers can be far reaching
• Commenting and documenting software is required for effective
maintenance throughout the life of the program
System Quality
5 aspects of computer crime
Malicious kinds of software, or "programmed threats", provide a significant
challenge to computer security.
"viruses
"worms"
"Trojan horses"
"logic bombs"
"bacteria" or "rabbits" which multiply rapidly and fill up the computer's memory.
Computer crimes, such as / embezzlement or planting of logic bombs /, are
normally committed by /trusted personnel/ who have permission to use
the computer system. Computer security, therefore, must also be concerned
with the actions of trusted computer users.
COMPUTER CRIME can be costly for cleanup and investigation
Computer Crime
• Computer criminals -using a computer to commit an illegal act
• Who are computer criminals?
• Employees – disgruntled or dishonest --the largest category
• Outside users - customers or suppliers
• “Hackers” and “crackers” - hackers do it “for fun” but crackers have
malicious intent
• Organized crime - tracking illegal enterprises, forgery, counterfeiting
Computer Crime
• Damage to computers, programs or files
• Viruses - migrate through systems attached to files and programs
• Worms - continuously self-replicate
• Theft
• Of hardware, software, data, computer time
• Software piracy - unauthorized copies of copyrighted material
• View/Manipulation
• “Unauthorized entry” and “harmless message” still illegal
Types of Computer Crime
Computers as an Engineering Tool
• Computer Design Tools
• Integration of Computers into Engineered Systems
Autonomous Computers
• Autonomy refers to the ability of a computer to make decisions
without the intervention of humans.
• Stock trading
• Military weapons
Computer ethics: other issues
• Health Conditions.
Engineers who supervise computer personnel or design computer terminals
should check that ergonomic considerations are in effect to reduce back
problems,
provide wrist support, offer good keyboard layouts to prevent carpal tunnel
syndrome, and offer good lighting and flicker control.
• Computer Failures.
Failures can occur because of errors in hardware or software. Hardware errors do
not occur often, and when they do they usually do so quite obviously. An exception
was Intel’s highly touted Pentium chip, introduced in 1993. It produced very slight
and rare errors in floating-point arithmetic. Perhaps more serious was the loss of
confidence Intel suffered by not revealing the error before it was detected by a
user.
 Rapid Change:
 Reduced response time to competition
 Maintaining Boundaries:
 Family, work, leisure
 Dependence And Vulnerability
 Employment:
 Re-engineering job loss
 Equity & Access:
 Increasing gap between haves and have nots
 Health Issues
Quality of Life Issues
 Ergonomics:
 helps computer users to avoid physical and mental health risks
 and to increase productivity
 Avoid eyestrain and headache
 Take regular breaks every couple of hours
 Control ambient light and insure adequate monitor brightness
 Avoid back and neck pain
 Have adjustable equipment with adequate back support
 Keep monitor at, or slightly below eye level
Ergonomics and Physical Health Issues
• Avoid effects of electromagnetic fields (VDT radiation)
• Possible connection to miscarriages and cancers, but no statistical support
yet
• Use caution if pregnant
• Avoid repetitive strain injury (RSI)
• Injuries from fast, repetitive work
• Carpal tunnel syndrome (CTS) - nerve and tendon damage in hands and
wrists
Physical Health Issues
• Microcomputers are the greatest user of electricity in the
workplace
• “Green” PCs
• System unit and display - minimize unnecessary energy consumption and
power down when not in use
• Manufacturing - avoids harmful chemicals in production, focus on
chlorofluorocarbons (CFC’s) which some blame for ozone layer depletion
The Environment
• Conserve
• Turn computers off at end of work day
• Use screen savers
• Recycle
• Most of the paper we use is eligible
• Dispose of old parts via recycling programs – most computer parts are dangerous
in landfills
• Educate
• Know the facts about ecological issues
Personal Responsibility of Users
• Computer professionals find themselves in a variety of professional
relationships with other people.
• Association for Computing Machinery (ACM) and the Institute of Electrical
and Electronic Engineers (IEEE), have established codes of ethics, curriculum
guidelines and accreditation requirements.
Professional Responsibility and Code of Ethics
• According to the Association for Computing Machinery (ACM) code, a
computing professional:
• Contributes to society and human well-being
• Avoids harm to others
• Is honest and trustworthy
• Is fair and takes action not to discriminate
• Honors property rights, including copyrights and patents
• Gives proper credit when using the intellectual property of others
• Respects other individuals’ rights to privacy
• Honors confidentiality
The ACM Code of Conduct
THANK YOU!!

More Related Content

Similar to Computer Ethics_Satyajit Patil.pptx

Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
Fizaril Amzari Omar
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
Fizaril Amzari Omar
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
Online
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
jonspav
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
GooglePay16
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
Haa'Meem Mohiyuddin
 
Chap11
Chap11Chap11
Chap11
nitin_009
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
rizwanshafique4321
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
AnkitTripathi159
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 
Questions of Ethics in Software Development
Questions of Ethics in Software DevelopmentQuestions of Ethics in Software Development
Questions of Ethics in Software Development
Jane Prusakova
 
cyberhygiene regular hygien of computer at office
cyberhygiene regular hygien of computer at officecyberhygiene regular hygien of computer at office
cyberhygiene regular hygien of computer at office
RajeshKumarSharma71
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
GAURAV. H .TANDON
 
Safety and security in distributed systems
Safety and security in distributed systems Safety and security in distributed systems
Safety and security in distributed systems
Einar Landre
 
Safety and security in distributed systems
Safety and security in distributed systemsSafety and security in distributed systems
Safety and security in distributed systems
Einar Landre
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
ChristoanSmit
 
Cyber ethics.pptx
Cyber ethics.pptxCyber ethics.pptx
Cyber ethics.pptx
GagandeepSinghJass
 

Similar to Computer Ethics_Satyajit Patil.pptx (20)

Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
Chap11
Chap11Chap11
Chap11
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Chap11
Chap11Chap11
Chap11
 
Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Questions of Ethics in Software Development
Questions of Ethics in Software DevelopmentQuestions of Ethics in Software Development
Questions of Ethics in Software Development
 
cyberhygiene regular hygien of computer at office
cyberhygiene regular hygien of computer at officecyberhygiene regular hygien of computer at office
cyberhygiene regular hygien of computer at office
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Safety and security in distributed systems
Safety and security in distributed systems Safety and security in distributed systems
Safety and security in distributed systems
 
Safety and security in distributed systems
Safety and security in distributed systemsSafety and security in distributed systems
Safety and security in distributed systems
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
Cyber ethics.pptx
Cyber ethics.pptxCyber ethics.pptx
Cyber ethics.pptx
 

Recently uploaded

space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 

Recently uploaded (20)

space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 

Computer Ethics_Satyajit Patil.pptx

  • 2.  Computer ethics are morally acceptable use of computers.  i.e. using computers appropriately  Standards or guidelines are important in this industry, because technology changes are outstripping the legal system’s ability to keep up.  Cyber-ethics: The study of moral, legal, and social issues involving cybertechnology Computer Ethics
  • 3.  Computers in the Workplace  Computer Crime  Privacy and Anonymity  Intellectual Property  Professional Responsibility  Computers as an engineering tool  Autonomous computers  Other issues Computer Ethics Issues
  • 4. LOST JOBS: Economic incentives to replace humans with computerized devices are very high NEW JOBS: Computer industry already has generated a wide variety of new jobs ALTERED JOBS: “de-skilling” New skilled jobs Computers in the Workplace
  • 5. Four primary issues Privacy – responsibility to protect data about individuals Accuracy - responsibility of data collectors to authenticate information and ensure its accuracy Property - who owns information and software and how can they be sold and exchanged Access - responsibility of data collectors to control access and determine what information a person has the right to obtain about others and how the information can be used Computer Ethics – Primary Issues
  • 6. Spreading information without consent Some large companies use medical records and credit records as a factor in important personnel decisions Spreading inaccurate information Mistakes in one computer file can easily migrate to others Inaccurate data may linger for years Problems with Large Databases
  • 7. Internet issues Inflammatory interchange of messages via internet (email, chat rooms, etc.) Chain mail Virus warning hoaxes “Spam” – unsolicited, bulk email
  • 8. Information on internet includes hate, violence, and information that is harmful for children • How much of this should be regulated? • Do filters solve problems or create more? Is web site information used for course work and research reliable? Internet Content Issues
  • 10. • Free Software Foundation – Software ownership should not be allowed at all. One can own the following aspects of a program: • source code • object code • algorithm • look and feel Copyright infringement IPR
  • 11.  Software developers (or the companies they work for) own their programs.  Software buyers only own the right to use the software according to the license agreement.  No copying, reselling, lending, renting, leasing, or distributing is legal without the software owner’s permission. Copyright Laws
  • 12.  There are four types of software licenses:  Public Domain  Freeware  Shareware  All Rights Reserved Software Licenses
  • 13.  Public domain software has no owner and is not protected by copyright law.  It was either created with public funds, or the ownership was forfeited by the creator.  Can be copied, sold, and/or modified  Often is of poor quality/unreliable Public Domain License
  • 14.  Freeware is copyrighted software that is licensed to be copied and distributed without charge.  Freeware is free, but it’s still under the owner’s control.  Examples:  Eudora Light  Netscape Freeware License
  • 15. • A shareware software license allows you to use the software for a trial period, but you must pay a registration fee to the owner for permanent use. • Some shareware trials expire on a certain date • Payment depends on the honor system • Purchasing (the right to use) the software may also get you a version with more powerful features and published documentation. Shareware License
  • 16.  May be used by the purchaser according the exact details spelled out in the license agreement.  You can’t legally use it--or even possess it-- without the owner’s permission. All Rights Reserved License
  • 17.  SPA (Software Publishers Association) polices software piracy and mainly targets:  Illegal duplication  Sale of copyrighted software  Companies that purchase single copies and load the software on multiple computers or networks  They rely on whistle-blowers.  Penalties (for primary user of PC) may include fines up to $250,000 and/or imprisonment up to 5 years in jail Software Piracy
  • 18. • Bug-free software is difficult to produce • It must be carefully designed, developed, and tested • Mistakes generated by computers can be far reaching • Commenting and documenting software is required for effective maintenance throughout the life of the program System Quality
  • 19. 5 aspects of computer crime Malicious kinds of software, or "programmed threats", provide a significant challenge to computer security. "viruses "worms" "Trojan horses" "logic bombs" "bacteria" or "rabbits" which multiply rapidly and fill up the computer's memory. Computer crimes, such as / embezzlement or planting of logic bombs /, are normally committed by /trusted personnel/ who have permission to use the computer system. Computer security, therefore, must also be concerned with the actions of trusted computer users. COMPUTER CRIME can be costly for cleanup and investigation Computer Crime
  • 20. • Computer criminals -using a computer to commit an illegal act • Who are computer criminals? • Employees – disgruntled or dishonest --the largest category • Outside users - customers or suppliers • “Hackers” and “crackers” - hackers do it “for fun” but crackers have malicious intent • Organized crime - tracking illegal enterprises, forgery, counterfeiting Computer Crime
  • 21. • Damage to computers, programs or files • Viruses - migrate through systems attached to files and programs • Worms - continuously self-replicate • Theft • Of hardware, software, data, computer time • Software piracy - unauthorized copies of copyrighted material • View/Manipulation • “Unauthorized entry” and “harmless message” still illegal Types of Computer Crime
  • 22. Computers as an Engineering Tool • Computer Design Tools • Integration of Computers into Engineered Systems
  • 23. Autonomous Computers • Autonomy refers to the ability of a computer to make decisions without the intervention of humans. • Stock trading • Military weapons
  • 24. Computer ethics: other issues • Health Conditions. Engineers who supervise computer personnel or design computer terminals should check that ergonomic considerations are in effect to reduce back problems, provide wrist support, offer good keyboard layouts to prevent carpal tunnel syndrome, and offer good lighting and flicker control. • Computer Failures. Failures can occur because of errors in hardware or software. Hardware errors do not occur often, and when they do they usually do so quite obviously. An exception was Intel’s highly touted Pentium chip, introduced in 1993. It produced very slight and rare errors in floating-point arithmetic. Perhaps more serious was the loss of confidence Intel suffered by not revealing the error before it was detected by a user.
  • 25.  Rapid Change:  Reduced response time to competition  Maintaining Boundaries:  Family, work, leisure  Dependence And Vulnerability  Employment:  Re-engineering job loss  Equity & Access:  Increasing gap between haves and have nots  Health Issues Quality of Life Issues
  • 26.  Ergonomics:  helps computer users to avoid physical and mental health risks  and to increase productivity  Avoid eyestrain and headache  Take regular breaks every couple of hours  Control ambient light and insure adequate monitor brightness  Avoid back and neck pain  Have adjustable equipment with adequate back support  Keep monitor at, or slightly below eye level Ergonomics and Physical Health Issues
  • 27. • Avoid effects of electromagnetic fields (VDT radiation) • Possible connection to miscarriages and cancers, but no statistical support yet • Use caution if pregnant • Avoid repetitive strain injury (RSI) • Injuries from fast, repetitive work • Carpal tunnel syndrome (CTS) - nerve and tendon damage in hands and wrists Physical Health Issues
  • 28. • Microcomputers are the greatest user of electricity in the workplace • “Green” PCs • System unit and display - minimize unnecessary energy consumption and power down when not in use • Manufacturing - avoids harmful chemicals in production, focus on chlorofluorocarbons (CFC’s) which some blame for ozone layer depletion The Environment
  • 29. • Conserve • Turn computers off at end of work day • Use screen savers • Recycle • Most of the paper we use is eligible • Dispose of old parts via recycling programs – most computer parts are dangerous in landfills • Educate • Know the facts about ecological issues Personal Responsibility of Users
  • 30. • Computer professionals find themselves in a variety of professional relationships with other people. • Association for Computing Machinery (ACM) and the Institute of Electrical and Electronic Engineers (IEEE), have established codes of ethics, curriculum guidelines and accreditation requirements. Professional Responsibility and Code of Ethics
  • 31. • According to the Association for Computing Machinery (ACM) code, a computing professional: • Contributes to society and human well-being • Avoids harm to others • Is honest and trustworthy • Is fair and takes action not to discriminate • Honors property rights, including copyrights and patents • Gives proper credit when using the intellectual property of others • Respects other individuals’ rights to privacy • Honors confidentiality The ACM Code of Conduct