SlideShare a Scribd company logo
Professional Practices Lecture 1
Introduction to Ethics
Syed Saqib Raza Rizvi
Definition
• Ethics: “The science of morals; the department of study
concerned with the principles of human duty. The moral
principles by which a person is guided.” – Oxford English
Dictionary
• Moral: “Of or pertaining to character or disposition, considered as
good or bad, virtuous or vicious; of or pertaining to the distinction
between right and wrong, or good and evil, in relation to the actions,
volitions, or character of responsible beings; ethical.” – Oxford English
Dictionary
• Terms will be used interchangeably – basically, knowing
the difference between right and wrong.
Background Of Ethics
•Ethics: a set of beliefs about right and wrong
behavior.
• According to Socrates (Greek philosopher, 477 - 399 BC):People will
naturally do what is good, if they know what is right
• Evil or bad actions are the result of unawareness about right and wrong
• So, if a criminal were truly aware of the mental and spiritual
consequences of his actions, he would neither commit nor even consider
committing them
• Therefore, any person who knows what is truly right will automatically do
it
Introduction
• In the industrialized world computers are changing everything: from
education to health, from voting to making friends or making war.
• Developing countries can also fully participate in cyberspace and
make use of opportunities offered by global networks.
• We are living a technological and informational revolution.
• It is therefore important for policy makers, leaders, teachers,
computer professionals and all social thinkers to get involved in the
social and ethical impacts of this communication technology.
Cyber Ethics and Cyber Technology
• Cyber-technology refers to a broad range of technologies from
stand-alone computers to the cluster of networked computing,
information and communication technologies.
• Cyber-ethics is the field of applied ethics that examines moral, legal,
and social issues in the development and use of Cyber-technology.
• Internet ethics and information ethics.
Computer ethics: definition
• Same as cyber-ethics, or
• The study of ethical issues that are associated primarily with
computing machines and the computing profession.
• The field of applied professional ethics dealing with ethical problems
transformed, or created by computer technology
Computer Ethics:
Some historical milestones
• 1940-1950: Founded by MIT prof Norbert Wiener: cybernetics-
science of information feedback systems.
• 1960s: Donn Parker from California examined unethical and illegal
uses of computers by professionals. 1st code of professional conduct
for the ACM.
• Mid 1970: Walter Maner taught 1st course and starter kit in computer
ethics.
Computer ethics history (cont.)
• 1980: Issues like computer-enabled crime, disasters, invasion of
privacy via databases, law suits about software ownership became
public.
• Mid 80s: James Moore of Darmouth,
• Deborah Johnson of Rensselaer, Sherry Turkle of MIT, and Judith
Perrole published article and books.
Computer ethics history (cont.)
• 1990: Interest in computer ethics as a field of research had spread to
Europe and Australia.
• Simon Rogerson of De Montfort University (UK) Terrell Bynum, editor
of Metaphilosophy (USA), initiated international conferences.
• Mid 90s: Beginning of a 2nd generation of computer ethics with more
practical action.
• 2004: Interest spreads to Cotonou, Benin
Any unique moral issues?
Deborah Johnson: Ethics on-line
• The scope of the Internet is global and interactive.
• The Internet enables users to interact with privacy.
• Internet technology makes the reproducibility of information possible
in ways not possible before.
• The above features make behavior on-line morally different than off-
line.
The debate continues:
• James Moore: Computer technology is “logically malleable” unlike
previous technologies. It can create “new possibilities for human
action”.
• Brey: disclosing non-obvious features embedded in computer systems
that can have moral implications.
• Alison Adams: Take into account gender-related biases. Combine
feminist ethics with empirical studies.
Sample topics in computer ethics
• Computers in the workplace: a threat to jobs? De-skilling? Health and
safety?
• Computer security: Viruses. Spying by hackers.
• Logical security: Privacy, integrity, consistency, controlling access to
resources.
• Software ownership: Intellectual property vs. open source.
• Software development: quality, safety
Computer Security
• Viruses: programming code disguised
• Worms: propagate w/o human intervention(involvement)
• Trojan horses: gets secretly installed.
• Logic bombs: execute conditionally.
• Bacteria or rabbits: multiply rapidly.
• Computer crimes: embezzlement(theft, misuse, stealing).
• Hackers: vandalism or exploration.
Logical Security
• Privacy invasion of email, files, and
• own computer (cookies).
• Shared databases.
• Identity theft.
• Combating terrorism: USA Patriot act.
Software Ownership
• Knowledge: private greed, public good.
• Profit vs. affordability
• Freedom of expression and access to information
• Right to communicate: share and learn in a globalized world.
• Digital divide is immoral.
• Open source software: Linux. Open access.
• North-South information flow. Indigenous knowledge.
Codes of Ethics
• Avoid harm to others
• Be honest and trustworthy
• Acquire and maintain professional competence
• Know and respect existing laws pertaining to professional work
• No personal interest
• Be honest and realistic in stating claims or estimates based on
available data
Cases in 2012
• Cyber criminals target Skype, Facebook and Windows
users
• Cyber criminals targeted users of Skype, Facebook and
Windows using multiple Black hole exploits in October,
according to the latest threat report from security firm
GFI Software.
• Researchers uncovered a large number of Black hole
exploits disguised as Windows licenses, Facebook
account verification emails, Skype voicemail
notifications and spam messages.
Cases Continues
• Cyber attackers increasingly targeting applications,
research shows
• Web and mobile applications are the new frontiers in the war against
cyber attack, according to a top cyber security risks report from
Hewlett Packard (HP) published in May.
• The report reveals that SQL injection (SQLi) attacks on web
applications increased sharply from around 15 million in 2010 to
more than 50 million in 2011.
Ashley Madison Hack 2015: 37 Million Users
The Conficker Worm 2008: Still Infecting a Million
Computers a Year
Stuxnet Worm 2010: Iran's Nuclear Program
Blocked
Home Depot Hack 2014: Over 50 Million Credit Cards
eBay Hack 2014: 145 Million Users Breached
The Melissa Virus 1999: 20% of the World's
Computers Infected
• Melissa is a fast-spreading macro virus that is distributed as an e-mail
attachment that, when opened, disables a number of safeguards in
Word 97 or Word 2000, and, if the user has the Microsoft Outlook e-
mail program, causes the virus to be resent to the first 50 people in
each of the user's address books. While it does not destroy files or
other resources, Melissa has the potential to disable corporate and
other mail servers as the ripple of e-mail distribution becomes a
much larger wave. On Friday, March 26, 1999, Melissa caused the
Microsoft Corporation to shut down incoming e-mail.
Case Continues
•Therac-25
• Therac-25 was a medical linear accelerator, a
device used to treat cancer. What made Therac-
25 unique at the time of its use was the software.
Not only did the software ease the laborious set-
up process, but it also monitored the safety of the
machine. In this case on safety critical software,
you will find that some patients received much
more radiation than prescribed despite the
software safety programming.
Case Continues
• Machado
• At age19, Richard Machado was the
first individual to be convicted of a
federal electronic mail (e-mail) hate
crime. The Machado case is one
example of a handful of similar
incidents that have occurred since
the advent of the Internet.
Case Continues
• Hughes Aircraft
• Between 1985 and 1987, the
Microelectronic Circuits Division of Hughes
Aircraft shipped hybrid microelectronics to
every branch of the U.S. military without
completing various environmental chip
testing processes required by contract. This
is a whistle-blower case where the
allegations against Hughes Aircraft resulted
in a criminal case and a civil case.
Cyber-Crime Cases
• For more Cyber cases follow the link below
• http://www.computerweekly.com/news/2240174301/Top-10-cyber-
crime-stories-of-2012
• http://abcnews.go.com/US/harvard-ethics-student-charged-hacking-
mit-computer/story?id=14110364
Ten Commandments
• 1. Not use a computer to harm other people. This is the foundation
for computer ethics.
Ten Commandments
• 2. Not interfere with other people’s computer work. Such as sending
numerous thoughtless e-mails to larger issues like purposely sending
computer viruses.
Ten Commandments
• 3. Not snoop around in other people’s computer files. Don’t go
looking through other people’s computer files unless given
permission.
Ten Commandments
• 4. Not use a computer to steal.
Ten Commandments
• 5. Not use a computer to bear false witness. Don’t spread rumors or
change your email address so that the receiver of an email believes
that it came from someone other than yourself.
Ten Commandments
• 6. Not copy or use proprietary software for which you have not paid.
Once you buy a software system, music CD or DVD you should not
make copies of that information and distribute it to your friends.
Ten Commandments
• 7. Not use other people’s computer resources without
authorization or proper compensation. This means do not surf the
internet or print off large amounts of paper for personal use
during work hours.
Ten Commandments
• 8. Not appropriate other people’s intellectual output. Don’t upload
information and take credit for it such as music, images and text.
Ten Commandments
• 9. Think about the social consequences of the program you are
writing or the system you are designing.
Ten Commandments
• 10. Use a computer in ways that ensure consideration and respect for
your fellow humans. Just because you can’t always see someone face
to face doesn’t give you the right to offer any less respect then you
would offer in a personal encounter.
CASE STUDY
• http://www.mit.edu/activities/safe/safe/cases/umich-baker-
story/Baker/timeline.html
• http://www.mit.edu/activities/safe/safe/cases/umich-baker-
story/throwout.1
International Papers Links
• http://www.ijie.org, International Journal of Information Ethics.
• www.sans.org/topten.htm Top ten Internet security flaws that system
administrators must eliminate to avoid becoming an easy target.
• http://ethics.csc.ncsu.edu/ Computer ethics as a map.
• http://www.neiu.edu/~ncaftori/ethics-course.htm
• The ethics course I borrowed these overheads from.

More Related Content

What's hot

INTRODUCTION TO ETHICS
INTRODUCTION TO ETHICSINTRODUCTION TO ETHICS
INTRODUCTION TO ETHICS
bina gadhiya
 
Introduction to ethics first class ppt
Introduction to ethics first class pptIntroduction to ethics first class ppt
Introduction to ethics first class ppt
RAJI THOMAS MUIGUA
 
Ethical Dilemma
Ethical DilemmaEthical Dilemma
Ethical Dilemmapurval
 
Ethics
EthicsEthics
Phi 105: Virtue ethics
Phi 105: Virtue ethicsPhi 105: Virtue ethics
Phi 105: Virtue ethics
dborcoman
 
Moral Dilemma and Ethical Decision Making
Moral Dilemma and Ethical Decision MakingMoral Dilemma and Ethical Decision Making
Moral Dilemma and Ethical Decision Making
Prájwòl Khädkå
 
Basic ethics
Basic ethics Basic ethics
Basic ethics
HARISA MARDIANA
 
Importance of Ethics
Importance of EthicsImportance of Ethics
Importance of Ethics
Sayak Sarkar
 
Professional Ethics Module 1 Notes
Professional Ethics Module 1 NotesProfessional Ethics Module 1 Notes
Professional Ethics Module 1 Notes
Bella Meraki
 
Theories of ethics
Theories of ethicsTheories of ethics
Theories of ethicsmymnm08
 
1.ethics
1.ethics1.ethics
Ethics
EthicsEthics
Ethics
satu12
 
Ethical theories
Ethical theoriesEthical theories
Ethical theories
Somya Aggarwal
 
Ethics & value s ppt
Ethics & value s ppt Ethics & value s ppt
Ethics & value s ppt
Babasab Patil
 
Ethics and morality
Ethics and moralityEthics and morality
Ethics and morality
Filosofía Mery
 
Ethics, definitions & theories
Ethics, definitions & theoriesEthics, definitions & theories
Ethics, definitions & theoriesTobore Oshobe
 
Chapter 2: Ethical Relativism
Chapter 2: Ethical RelativismChapter 2: Ethical Relativism
Chapter 2: Ethical Relativism
dborcoman
 
Aristotle virtueethics
Aristotle virtueethicsAristotle virtueethics
The study of ethics
The study of ethicsThe study of ethics
The study of ethics
Naej Morena
 

What's hot (20)

INTRODUCTION TO ETHICS
INTRODUCTION TO ETHICSINTRODUCTION TO ETHICS
INTRODUCTION TO ETHICS
 
Introduction to ethics first class ppt
Introduction to ethics first class pptIntroduction to ethics first class ppt
Introduction to ethics first class ppt
 
Ethical Dilemma
Ethical DilemmaEthical Dilemma
Ethical Dilemma
 
Ethics
EthicsEthics
Ethics
 
Phi 105: Virtue ethics
Phi 105: Virtue ethicsPhi 105: Virtue ethics
Phi 105: Virtue ethics
 
Moral Dilemma and Ethical Decision Making
Moral Dilemma and Ethical Decision MakingMoral Dilemma and Ethical Decision Making
Moral Dilemma and Ethical Decision Making
 
Basic ethics
Basic ethics Basic ethics
Basic ethics
 
Importance of Ethics
Importance of EthicsImportance of Ethics
Importance of Ethics
 
Professional Ethics Module 1 Notes
Professional Ethics Module 1 NotesProfessional Ethics Module 1 Notes
Professional Ethics Module 1 Notes
 
Theories of ethics
Theories of ethicsTheories of ethics
Theories of ethics
 
G7 virtue ethics
G7 virtue ethicsG7 virtue ethics
G7 virtue ethics
 
1.ethics
1.ethics1.ethics
1.ethics
 
Ethics
EthicsEthics
Ethics
 
Ethical theories
Ethical theoriesEthical theories
Ethical theories
 
Ethics & value s ppt
Ethics & value s ppt Ethics & value s ppt
Ethics & value s ppt
 
Ethics and morality
Ethics and moralityEthics and morality
Ethics and morality
 
Ethics, definitions & theories
Ethics, definitions & theoriesEthics, definitions & theories
Ethics, definitions & theories
 
Chapter 2: Ethical Relativism
Chapter 2: Ethical RelativismChapter 2: Ethical Relativism
Chapter 2: Ethical Relativism
 
Aristotle virtueethics
Aristotle virtueethicsAristotle virtueethics
Aristotle virtueethics
 
The study of ethics
The study of ethicsThe study of ethics
The study of ethics
 

Similar to Introduction to ethics

Introduction to ethics 1
Introduction to ethics 1Introduction to ethics 1
Introduction to ethics 1
syedsaqibrazarizvi
 
Ethics
EthicsEthics
Ethics
EthicsEthics
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
OxfordRiNorth
 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
Kashif Sohail
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Faraz Ahmed
 
Chapter 1 a
Chapter 1 aChapter 1 a
Chapter 1 akibrutry
 
An ABC of cyberethics
An ABC of cyberethicsAn ABC of cyberethics
An ABC of cyberethics
Yamith José Fandiño Parra
 
Introduction to modern computerethics.ppt
Introduction to modern  computerethics.pptIntroduction to modern  computerethics.ppt
Introduction to modern computerethics.ppt
eastitech
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentation
shannoncmorris
 
a.pptx
a.pptxa.pptx
a.pptx
angadveer4
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Saptarshi Ghosh
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
Param Nanavati
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
jennyJey2
 

Similar to Introduction to ethics (20)

Introduction to ethics 1
Introduction to ethics 1Introduction to ethics 1
Introduction to ethics 1
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Chapter 1 a
Chapter 1 aChapter 1 a
Chapter 1 a
 
An ABC of cyberethics
An ABC of cyberethicsAn ABC of cyberethics
An ABC of cyberethics
 
Introduction to modern computerethics.ppt
Introduction to modern  computerethics.pptIntroduction to modern  computerethics.ppt
Introduction to modern computerethics.ppt
 
Hacking
HackingHacking
Hacking
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentation
 
a.pptx
a.pptxa.pptx
a.pptx
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
P.p lect1-
P.p lect1-P.p lect1-
P.p lect1-
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
why ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptxwhy ethics computer ethics 10 commandments.pptx
why ethics computer ethics 10 commandments.pptx
 

More from Saqib Raza

The Design and Analysis of Algorithms.pdf
The Design and Analysis of Algorithms.pdfThe Design and Analysis of Algorithms.pdf
The Design and Analysis of Algorithms.pdf
Saqib Raza
 
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
Saqib Raza
 
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdfData_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
Saqib Raza
 
Social Impacts of Artificial intelligence
Social Impacts of Artificial intelligenceSocial Impacts of Artificial intelligence
Social Impacts of Artificial intelligence
Saqib Raza
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course Outline
Saqib Raza
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Saqib Raza
 
12 security policies
12 security policies12 security policies
12 security policies
Saqib Raza
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
Saqib Raza
 
Software Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional PracticeSoftware Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional Practice
Saqib Raza
 
7 Engineering Profession
7 Engineering Profession7 Engineering Profession
7 Engineering Profession
Saqib Raza
 
6 software contracts
6 software contracts6 software contracts
6 software contracts
Saqib Raza
 
Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual Property
Saqib Raza
 
Itroduction to Business Ethics
Itroduction to Business EthicsItroduction to Business Ethics
Itroduction to Business Ethics
Saqib Raza
 
Types of Ethics
Types of EthicsTypes of Ethics
Types of Ethics
Saqib Raza
 
Project Management Concepts
Project Management ConceptsProject Management Concepts
Project Management Concepts
Saqib Raza
 
Software Re-Engineering
Software Re-EngineeringSoftware Re-Engineering
Software Re-Engineering
Saqib Raza
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurance
Saqib Raza
 
User Interface Analysis and Design
User Interface Analysis and DesignUser Interface Analysis and Design
User Interface Analysis and Design
Saqib Raza
 
Architecture Design
Architecture DesignArchitecture Design
Architecture Design
Saqib Raza
 
REQUIREMENT ENGINEERING
REQUIREMENT ENGINEERINGREQUIREMENT ENGINEERING
REQUIREMENT ENGINEERING
Saqib Raza
 

More from Saqib Raza (20)

The Design and Analysis of Algorithms.pdf
The Design and Analysis of Algorithms.pdfThe Design and Analysis of Algorithms.pdf
The Design and Analysis of Algorithms.pdf
 
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
An Introduction to the Analysis of Algorithms (2nd_Edition_Robert_Sedgewick,_...
 
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdfData_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
Data_Mining: Practical Machine Learning Tools and Techniques 2ndEd.pdf
 
Social Impacts of Artificial intelligence
Social Impacts of Artificial intelligenceSocial Impacts of Artificial intelligence
Social Impacts of Artificial intelligence
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course Outline
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
12 security policies
12 security policies12 security policies
12 security policies
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Software Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional PracticeSoftware Engineering Code Of Ethics And Professional Practice
Software Engineering Code Of Ethics And Professional Practice
 
7 Engineering Profession
7 Engineering Profession7 Engineering Profession
7 Engineering Profession
 
6 software contracts
6 software contracts6 software contracts
6 software contracts
 
Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual Property
 
Itroduction to Business Ethics
Itroduction to Business EthicsItroduction to Business Ethics
Itroduction to Business Ethics
 
Types of Ethics
Types of EthicsTypes of Ethics
Types of Ethics
 
Project Management Concepts
Project Management ConceptsProject Management Concepts
Project Management Concepts
 
Software Re-Engineering
Software Re-EngineeringSoftware Re-Engineering
Software Re-Engineering
 
Software Quality Assurance
Software Quality AssuranceSoftware Quality Assurance
Software Quality Assurance
 
User Interface Analysis and Design
User Interface Analysis and DesignUser Interface Analysis and Design
User Interface Analysis and Design
 
Architecture Design
Architecture DesignArchitecture Design
Architecture Design
 
REQUIREMENT ENGINEERING
REQUIREMENT ENGINEERINGREQUIREMENT ENGINEERING
REQUIREMENT ENGINEERING
 

Recently uploaded

Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 

Recently uploaded (20)

Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 

Introduction to ethics

  • 1. Professional Practices Lecture 1 Introduction to Ethics Syed Saqib Raza Rizvi
  • 2. Definition • Ethics: “The science of morals; the department of study concerned with the principles of human duty. The moral principles by which a person is guided.” – Oxford English Dictionary • Moral: “Of or pertaining to character or disposition, considered as good or bad, virtuous or vicious; of or pertaining to the distinction between right and wrong, or good and evil, in relation to the actions, volitions, or character of responsible beings; ethical.” – Oxford English Dictionary • Terms will be used interchangeably – basically, knowing the difference between right and wrong.
  • 3. Background Of Ethics •Ethics: a set of beliefs about right and wrong behavior. • According to Socrates (Greek philosopher, 477 - 399 BC):People will naturally do what is good, if they know what is right • Evil or bad actions are the result of unawareness about right and wrong • So, if a criminal were truly aware of the mental and spiritual consequences of his actions, he would neither commit nor even consider committing them • Therefore, any person who knows what is truly right will automatically do it
  • 4. Introduction • In the industrialized world computers are changing everything: from education to health, from voting to making friends or making war. • Developing countries can also fully participate in cyberspace and make use of opportunities offered by global networks. • We are living a technological and informational revolution. • It is therefore important for policy makers, leaders, teachers, computer professionals and all social thinkers to get involved in the social and ethical impacts of this communication technology.
  • 5. Cyber Ethics and Cyber Technology • Cyber-technology refers to a broad range of technologies from stand-alone computers to the cluster of networked computing, information and communication technologies. • Cyber-ethics is the field of applied ethics that examines moral, legal, and social issues in the development and use of Cyber-technology. • Internet ethics and information ethics.
  • 6. Computer ethics: definition • Same as cyber-ethics, or • The study of ethical issues that are associated primarily with computing machines and the computing profession. • The field of applied professional ethics dealing with ethical problems transformed, or created by computer technology
  • 7. Computer Ethics: Some historical milestones • 1940-1950: Founded by MIT prof Norbert Wiener: cybernetics- science of information feedback systems. • 1960s: Donn Parker from California examined unethical and illegal uses of computers by professionals. 1st code of professional conduct for the ACM. • Mid 1970: Walter Maner taught 1st course and starter kit in computer ethics.
  • 8. Computer ethics history (cont.) • 1980: Issues like computer-enabled crime, disasters, invasion of privacy via databases, law suits about software ownership became public. • Mid 80s: James Moore of Darmouth, • Deborah Johnson of Rensselaer, Sherry Turkle of MIT, and Judith Perrole published article and books.
  • 9. Computer ethics history (cont.) • 1990: Interest in computer ethics as a field of research had spread to Europe and Australia. • Simon Rogerson of De Montfort University (UK) Terrell Bynum, editor of Metaphilosophy (USA), initiated international conferences. • Mid 90s: Beginning of a 2nd generation of computer ethics with more practical action. • 2004: Interest spreads to Cotonou, Benin
  • 10. Any unique moral issues? Deborah Johnson: Ethics on-line • The scope of the Internet is global and interactive. • The Internet enables users to interact with privacy. • Internet technology makes the reproducibility of information possible in ways not possible before. • The above features make behavior on-line morally different than off- line.
  • 11. The debate continues: • James Moore: Computer technology is “logically malleable” unlike previous technologies. It can create “new possibilities for human action”. • Brey: disclosing non-obvious features embedded in computer systems that can have moral implications. • Alison Adams: Take into account gender-related biases. Combine feminist ethics with empirical studies.
  • 12. Sample topics in computer ethics • Computers in the workplace: a threat to jobs? De-skilling? Health and safety? • Computer security: Viruses. Spying by hackers. • Logical security: Privacy, integrity, consistency, controlling access to resources. • Software ownership: Intellectual property vs. open source. • Software development: quality, safety
  • 13. Computer Security • Viruses: programming code disguised • Worms: propagate w/o human intervention(involvement) • Trojan horses: gets secretly installed. • Logic bombs: execute conditionally. • Bacteria or rabbits: multiply rapidly. • Computer crimes: embezzlement(theft, misuse, stealing). • Hackers: vandalism or exploration.
  • 14. Logical Security • Privacy invasion of email, files, and • own computer (cookies). • Shared databases. • Identity theft. • Combating terrorism: USA Patriot act.
  • 15. Software Ownership • Knowledge: private greed, public good. • Profit vs. affordability • Freedom of expression and access to information • Right to communicate: share and learn in a globalized world. • Digital divide is immoral. • Open source software: Linux. Open access. • North-South information flow. Indigenous knowledge.
  • 16. Codes of Ethics • Avoid harm to others • Be honest and trustworthy • Acquire and maintain professional competence • Know and respect existing laws pertaining to professional work • No personal interest • Be honest and realistic in stating claims or estimates based on available data
  • 17. Cases in 2012 • Cyber criminals target Skype, Facebook and Windows users • Cyber criminals targeted users of Skype, Facebook and Windows using multiple Black hole exploits in October, according to the latest threat report from security firm GFI Software. • Researchers uncovered a large number of Black hole exploits disguised as Windows licenses, Facebook account verification emails, Skype voicemail notifications and spam messages.
  • 18. Cases Continues • Cyber attackers increasingly targeting applications, research shows • Web and mobile applications are the new frontiers in the war against cyber attack, according to a top cyber security risks report from Hewlett Packard (HP) published in May. • The report reveals that SQL injection (SQLi) attacks on web applications increased sharply from around 15 million in 2010 to more than 50 million in 2011.
  • 19. Ashley Madison Hack 2015: 37 Million Users
  • 20. The Conficker Worm 2008: Still Infecting a Million Computers a Year
  • 21. Stuxnet Worm 2010: Iran's Nuclear Program Blocked
  • 22. Home Depot Hack 2014: Over 50 Million Credit Cards
  • 23. eBay Hack 2014: 145 Million Users Breached
  • 24. The Melissa Virus 1999: 20% of the World's Computers Infected • Melissa is a fast-spreading macro virus that is distributed as an e-mail attachment that, when opened, disables a number of safeguards in Word 97 or Word 2000, and, if the user has the Microsoft Outlook e- mail program, causes the virus to be resent to the first 50 people in each of the user's address books. While it does not destroy files or other resources, Melissa has the potential to disable corporate and other mail servers as the ripple of e-mail distribution becomes a much larger wave. On Friday, March 26, 1999, Melissa caused the Microsoft Corporation to shut down incoming e-mail.
  • 25. Case Continues •Therac-25 • Therac-25 was a medical linear accelerator, a device used to treat cancer. What made Therac- 25 unique at the time of its use was the software. Not only did the software ease the laborious set- up process, but it also monitored the safety of the machine. In this case on safety critical software, you will find that some patients received much more radiation than prescribed despite the software safety programming.
  • 26. Case Continues • Machado • At age19, Richard Machado was the first individual to be convicted of a federal electronic mail (e-mail) hate crime. The Machado case is one example of a handful of similar incidents that have occurred since the advent of the Internet.
  • 27. Case Continues • Hughes Aircraft • Between 1985 and 1987, the Microelectronic Circuits Division of Hughes Aircraft shipped hybrid microelectronics to every branch of the U.S. military without completing various environmental chip testing processes required by contract. This is a whistle-blower case where the allegations against Hughes Aircraft resulted in a criminal case and a civil case.
  • 28. Cyber-Crime Cases • For more Cyber cases follow the link below • http://www.computerweekly.com/news/2240174301/Top-10-cyber- crime-stories-of-2012 • http://abcnews.go.com/US/harvard-ethics-student-charged-hacking- mit-computer/story?id=14110364
  • 29. Ten Commandments • 1. Not use a computer to harm other people. This is the foundation for computer ethics.
  • 30. Ten Commandments • 2. Not interfere with other people’s computer work. Such as sending numerous thoughtless e-mails to larger issues like purposely sending computer viruses.
  • 31. Ten Commandments • 3. Not snoop around in other people’s computer files. Don’t go looking through other people’s computer files unless given permission.
  • 32. Ten Commandments • 4. Not use a computer to steal.
  • 33. Ten Commandments • 5. Not use a computer to bear false witness. Don’t spread rumors or change your email address so that the receiver of an email believes that it came from someone other than yourself.
  • 34. Ten Commandments • 6. Not copy or use proprietary software for which you have not paid. Once you buy a software system, music CD or DVD you should not make copies of that information and distribute it to your friends.
  • 35. Ten Commandments • 7. Not use other people’s computer resources without authorization or proper compensation. This means do not surf the internet or print off large amounts of paper for personal use during work hours.
  • 36. Ten Commandments • 8. Not appropriate other people’s intellectual output. Don’t upload information and take credit for it such as music, images and text.
  • 37. Ten Commandments • 9. Think about the social consequences of the program you are writing or the system you are designing.
  • 38. Ten Commandments • 10. Use a computer in ways that ensure consideration and respect for your fellow humans. Just because you can’t always see someone face to face doesn’t give you the right to offer any less respect then you would offer in a personal encounter.
  • 39. CASE STUDY • http://www.mit.edu/activities/safe/safe/cases/umich-baker- story/Baker/timeline.html • http://www.mit.edu/activities/safe/safe/cases/umich-baker- story/throwout.1
  • 40. International Papers Links • http://www.ijie.org, International Journal of Information Ethics. • www.sans.org/topten.htm Top ten Internet security flaws that system administrators must eliminate to avoid becoming an easy target. • http://ethics.csc.ncsu.edu/ Computer ethics as a map. • http://www.neiu.edu/~ncaftori/ethics-course.htm • The ethics course I borrowed these overheads from.