Social Issues & Prof. Practices Ch1-2
The known history of computer crimes is not as old as computing is. One can perhaps say that the history of computer crimes started with the invention of the computer virus.
Moore’s definition focuses on the human actions that are rooted in computer technology or influenced by computer technology. In other words, it is an analysis of the values of human actions influenced by computer technology. Computer influence on human actions is widespread throughout the decision-making process preceding an action. In the previous sections of this chapter, we discussed the many problems we are facing today as a result of computer technology. We are looking for a way to deal with these problems, probably through education. So, the definition of computer ethics, as outlined by Moore, gives us a starting point on this long journey
Morality is a set of rules for right conduct, a system used to modify and regulate our behavior.
Because morality is territorial and culturally based, as long as we live in a society, we are bound to live within that society’s guidelines. The actions of individuals in a society only have moral values if taken within the context of this very society and the culture of the individual.
If morality is a set of shared values among people in a specific society, why do we have to worry about justifying those values to people who are not members of that society? In other words, why do we need moral theories? What do moral theories have to do with the moral subscripts?
INTRODUCTION THINKING ETHICALLY A Framework for Moral Decisio.docxnormanibarber20063
INTRODUCTION:
THINKING ETHICALLY A Framework for Moral Decision Making
***This article updates several previous pieces from Issues in Ethics by Manuel Velasquez - Dirksen Professor of Business Ethics at Santa Clara University and former Center director - and Claire Andre, associate Center director. "Thinking Ethically" is based on a framework developed by the authors in collaboration with Center Director Thomas Shanks, S.J., Presidential Professor of Ethics and the Common Good Michael J. Meyer, and others. The framework is used as the basis for many programs and presentations at the Markkula Center for Applied Ethics.
TAKEN FROM: http://www.scu.edu/ethics/practicing/decision/framework.html
Moral issues greet us each morning in the newspaper, confront us in the memos on our desks, nag us from our children's soccer fields, and bid us good night on the evening news. We are bombarded daily with questions about the justice of our foreign policy, the morality of medical technologies that can prolong our lives, the rights of animals or perhaps the fairness of our children's teachers dealing with diverse students in their classrooms.
Dealing with these moral issues is often perplexing. How, exactly, should we think through an ethical issue? What questions should we ask? What factors should we consider?
WHAT IS ETHICS?
Simply stated, ethics refers to standards of behavior that tell us how human beings ought to act in the many situations in which they find themselves-as friends, parents, children, citizens, businesspeople, teachers, professionals, and so on.
According to The National Institute of Health: “Ethics seeks to determine what a person should do, or the best course of action, and provides reasons why. It also helps people decide how to behave and treat one another, and what kinds of communities would be good to live in.”
“Bioethics is a subfield of ethics that explores ethical questions related to the life sciences. Bioethical analysis helps people make decisions about their behavior and about policy questions that governments, organizations, and communities must face when they consider how best to use new biomedical knowledge and innovation”.
WHAT ETHICS IS NOT:
• Ethics is not the same as feelings. Feelings provide important information for our ethical choices. Some people have highly developed habits that make them feel bad when they do something wrong, but many people feel good even though they are doing something wrong. And often our feelings will tell us it is uncomfortable to do the right thing if it is hard.
Ethics is not religion. Many people are not religious, but ethics applies to everyone. Most religions do advocate high ethical standards but sometimes do not address all the types of problems we face.
• Ethics is not following the law. A good system of law does incorporate many ethical standards, but law can deviate from what is ethical. Law can become ethically corrupt, as some totalitarian regimes have made it..
A law is basically a body of principles or rules which are the basis of a society and are abide by the
society. No system in a society can exist without a law. Human life needs a proper rule of conduct or
principle at every step. It is also important for a successful society. If it will not happen then there will b
anarchy and disturbance in a society and it will not exist for long.
There are various definitions of law. Some of them are as follows
1. A rule of conduct or procedure established by custom, agreement, or authority.
2. A code of principles based on morality, conscience, or nature.
3. A law is rules of conduct of any organized society, however simple or small, that are enforced by
threat of punishment if they are violated. Modern law has a wide sweep and regulates many
branches of conduct. A body of rules of conduct of binding legal force and effect, prescribed,
recognized, and enforced by controlling authority.
4. A body of rules of conduct of binding legal force and effect, prescribed, recognized, and enforced
by controlling authority.
Need and importance of law
There are a number incidents taking place all the time which could be harmful to people. This lead to the
need of making law. People need a proper code of life. They need to know their as well as others right
only then they could lead a peaceful life. Laws were made by the kings to empower themselves .why laws
are too important for a society or for a community! In ancient periods, laws were made due to fear, like
prohibited areas in this case animals or the nature were the main force to construct laws or restrictions.
Actually, restrictions were the first source of laws that were adopted by human beings. Today, we believe
that it was our ancestors those made life very miserable in some context. On the other hand we are highly
blessed that we do not need to go in details of such things those are proved by our forefathers’
experiences. However, it is quite clear that we need some rules and regulation to live. So, that’s why we
make laws to be known as knowledgeable creature. We are ruling over other creatures because of the law
that is “Survival of the fittest”.
Natural Laws
Even nature has certain laws which are strictly obeyed by nature as well as its creatures. Such as laws of
sunrise and sun set, changing of day and nights, revolving of earth around sun, law of birth and death.
Such laws are above human control and cannot be altered. We have to obey them. Thus they also affect
our customs, culture, traditions and on the whole our whole life.
Common laws are dependent on natural laws but natural laws are not dependent on common laws. For
example let’s talk about our traffic laws. They were made to control the traffic, to bring a discipline and
organization in traffic system. If there would be no laws there would be no discipline n thus it will cause
disturbance not for an individual but for a whole society so if has given a sense to society th
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
INTRODUCTION THINKING ETHICALLY A Framework for Moral Decisio.docxnormanibarber20063
INTRODUCTION:
THINKING ETHICALLY A Framework for Moral Decision Making
***This article updates several previous pieces from Issues in Ethics by Manuel Velasquez - Dirksen Professor of Business Ethics at Santa Clara University and former Center director - and Claire Andre, associate Center director. "Thinking Ethically" is based on a framework developed by the authors in collaboration with Center Director Thomas Shanks, S.J., Presidential Professor of Ethics and the Common Good Michael J. Meyer, and others. The framework is used as the basis for many programs and presentations at the Markkula Center for Applied Ethics.
TAKEN FROM: http://www.scu.edu/ethics/practicing/decision/framework.html
Moral issues greet us each morning in the newspaper, confront us in the memos on our desks, nag us from our children's soccer fields, and bid us good night on the evening news. We are bombarded daily with questions about the justice of our foreign policy, the morality of medical technologies that can prolong our lives, the rights of animals or perhaps the fairness of our children's teachers dealing with diverse students in their classrooms.
Dealing with these moral issues is often perplexing. How, exactly, should we think through an ethical issue? What questions should we ask? What factors should we consider?
WHAT IS ETHICS?
Simply stated, ethics refers to standards of behavior that tell us how human beings ought to act in the many situations in which they find themselves-as friends, parents, children, citizens, businesspeople, teachers, professionals, and so on.
According to The National Institute of Health: “Ethics seeks to determine what a person should do, or the best course of action, and provides reasons why. It also helps people decide how to behave and treat one another, and what kinds of communities would be good to live in.”
“Bioethics is a subfield of ethics that explores ethical questions related to the life sciences. Bioethical analysis helps people make decisions about their behavior and about policy questions that governments, organizations, and communities must face when they consider how best to use new biomedical knowledge and innovation”.
WHAT ETHICS IS NOT:
• Ethics is not the same as feelings. Feelings provide important information for our ethical choices. Some people have highly developed habits that make them feel bad when they do something wrong, but many people feel good even though they are doing something wrong. And often our feelings will tell us it is uncomfortable to do the right thing if it is hard.
Ethics is not religion. Many people are not religious, but ethics applies to everyone. Most religions do advocate high ethical standards but sometimes do not address all the types of problems we face.
• Ethics is not following the law. A good system of law does incorporate many ethical standards, but law can deviate from what is ethical. Law can become ethically corrupt, as some totalitarian regimes have made it..
A law is basically a body of principles or rules which are the basis of a society and are abide by the
society. No system in a society can exist without a law. Human life needs a proper rule of conduct or
principle at every step. It is also important for a successful society. If it will not happen then there will b
anarchy and disturbance in a society and it will not exist for long.
There are various definitions of law. Some of them are as follows
1. A rule of conduct or procedure established by custom, agreement, or authority.
2. A code of principles based on morality, conscience, or nature.
3. A law is rules of conduct of any organized society, however simple or small, that are enforced by
threat of punishment if they are violated. Modern law has a wide sweep and regulates many
branches of conduct. A body of rules of conduct of binding legal force and effect, prescribed,
recognized, and enforced by controlling authority.
4. A body of rules of conduct of binding legal force and effect, prescribed, recognized, and enforced
by controlling authority.
Need and importance of law
There are a number incidents taking place all the time which could be harmful to people. This lead to the
need of making law. People need a proper code of life. They need to know their as well as others right
only then they could lead a peaceful life. Laws were made by the kings to empower themselves .why laws
are too important for a society or for a community! In ancient periods, laws were made due to fear, like
prohibited areas in this case animals or the nature were the main force to construct laws or restrictions.
Actually, restrictions were the first source of laws that were adopted by human beings. Today, we believe
that it was our ancestors those made life very miserable in some context. On the other hand we are highly
blessed that we do not need to go in details of such things those are proved by our forefathers’
experiences. However, it is quite clear that we need some rules and regulation to live. So, that’s why we
make laws to be known as knowledgeable creature. We are ruling over other creatures because of the law
that is “Survival of the fittest”.
Natural Laws
Even nature has certain laws which are strictly obeyed by nature as well as its creatures. Such as laws of
sunrise and sun set, changing of day and nights, revolving of earth around sun, law of birth and death.
Such laws are above human control and cannot be altered. We have to obey them. Thus they also affect
our customs, culture, traditions and on the whole our whole life.
Common laws are dependent on natural laws but natural laws are not dependent on common laws. For
example let’s talk about our traffic laws. They were made to control the traffic, to bring a discipline and
organization in traffic system. If there would be no laws there would be no discipline n thus it will cause
disturbance not for an individual but for a whole society so if has given a sense to society th
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
2. THE EMERGENCE OF COMPUTER
CRIMES
computer virus
virus is a Latin word which means poison
A computer virus, defined as a self-propagating computer program
designed to alter or destroy a computer system resource, follows
almost the same pattern
3. THE PRESENT STATUS: AN UNEASY
CYBERSPACE
we are in for an avalanche of cyber vandalism as
society becomes more dependent on computer
networks and as more people jump on the cyber train.
4. VULNERABILITY IN CYBERSPACE
DUE TO:
• Cyberspace infrastructure and communication protocols are inherently weak.
• The average user in cyberspace has very limited knowledge of the computer network
infrastructure, its weaknesses and gapping loopholes.
• Society, as a whole, is increasingly becoming irreversibly dependent on an infrastructure
and technology that it does not fully understand.
• There are no long-term, let alone immediate, plans or mechanisms in place to better
educate the public.
• There is a high degree of complacency in a society that still accords a “Wiz Kid” status to
cyberspace vandals.
• The only known and practiced remedies are patching loopholes after an attack has
occurred.
• The price of this escalating problem is not yet known.
• Reporting is voluntary and haphazard.
• The nation has yet to understand the seriousness of cyber vandalism.
5. WHAT IS COMPUTER ETHICS?
According to James H. Moore, who is believed to have
first coined the phrase “computer ethics,” computer
ethics is the analysis of the nature and social impact of
computer technology
6. WHY YOU SHOULD STUDY
COMPUTER ETHICS
One school believes in the study of computer ethics as remedial
moral education. The other school believes in computer ethics
education not as a moral education but as a field worthy of study
in its own right. But for it to exist as a separate independent field of study, there
must be a unique domain for computer ethics distinct from the domain for moral
education, distinct even from the domains of other kinds of professional and applied
ethics
23. MORALITY
Morality is a set of rules for right conduct, a system used to
modify and regulate our behavior.
Because morality is territorial and culturally based, as long as
we live in a society, we are bound to live within that society’s
guidelines. The actions of individuals in a society only have
moral values if taken within the context of this very society and
the culture of the individual.
24. MORAL THEORIES
According to MacDonnell, moral theories “seek to introduce a
degree of rationality and rigor into our moral deliberations”
25. MORAL DECISION MAKING
A good moral decision embodies nearly all moral theories and
usually takes into consideration the following:
All the facts surrounding the situation, taking into account the
interests of all parties involved.
The moral principles involved and how they will affect all
others involved
26. MORAL CODES
The Internet Encyclopedia of Philosophy defines moral codes as
rules or norms within a group for what is proper behavior for
the members of that group
In a way, moral codes are shared behavioral patterns of a
group.
27. UNIVERSAL MORAL CODES
1. The Golden Rule: “Do unto others as you would have them do unto you.”
Versions of the Golden Rule golden in Different Religions
BUDDHIST: Hurt not others in ways that you would find hurtful.
CHRISTIAN: All things whatsoever ye would that men should do to you, do ye even so to
them.
CONFUCIAN: Do not do unto others what you would not have them do unto you.
HINDU: This is the sum of duty; do naught unto others which if done to thee would cause
thee pain.
ISLAMIC: No one of you is a believer until he desires for his brother that which he desires
for himself.
JAIN: In happiness and suffering, in joy and grief, we should regard all creatures as we
regard our own self.
JEWISH: Whatever thou hatest thyself, that do not to another.
SIKH: As thou deemest thyself, so deem others.
TAOIST: Regard your neighbor’s gain as your own gain, and your neighbor’s loss as your
28. 2. The Silver Rule: “Do not do unto others what you would not have
them do unto you.” Great men like Mahatma Gandhi followed this rule
almost to the letter.
3. The Bronze Rule: “Repay kindness with kindness.” This rule is
widely observed because of its many varying interpretations. Some
people “carrot-and-stick” rule. However you interpret it, it seems to
support the vendetta syndrome.
4. The Iron Rule: “Do unto others as you like, before they do it unto
you.” This rule, if followed by a leader, can create dictatorships. It
seems to say, “He who is on the floor cannot make rules” or “Do it if
you can get away with it.”
5. The Tin Rule: “Pay homage to those above you and intimidate those
below you.” This is what many call the bully rule.
6. The Nepotism Rule: “Give precedence in all things to close
relatives, and do as you like to others.” This rule legitimizes
corruption.
29. CULTURE-FREE AND TIMELESS
UNIVERSAL SET OF MORAL CODES
1. Be friendly at first meeting.
2. Do no envy.
3. Be generous; forgive your enemy if he or she forgives you.
4. Be neither a tyrant nor a patsy.
5. Retaliate proportionately to an intentional injury (within the
constraints of the rule of the law).
6. Make your behavior fair (although not perfectly) clear and
consistent.
The known history of computer crimes is not as old as computing is. One can perhaps say that the history of computer crimes started with the invention of the computer virus.
For generations, even before the birth of modern medicine, the term had remained mostly in medical circles, meaning a foreign agent injecting itself into a living body, feeding on it to grow and multiply. As it reproduces itself in the new environment, it spreads throughout the victim’s body, slowly disabling the body’s natural resistance to foreign objects, weakening the body’s ability to perform needed life functions, and eventually causing serious, sometimes fatal, effects to the body.
Computer virus - but instead of using the living body; it uses software to attach itself, grow, reproduce, and spread in the new environment. As it spreads in the new environment, it attacks major system resources that include the surrogate software itself, data, and sometimes hardware, weakening the capacity of these resources to perform the needed functions. Eventually, it brings the system down.The word “virus” was first assigned a nonbiological meaning in the 1972 science fiction stories about the G.O.D. machine, which were compiled in the book When Harly Was One by David Gerrod (Ballantine Books, New York, 1972). In the book, according to Karen Forchat, the term was first used to describe a piece of unwanted computer code [8]. Later association of the term with a real-world computer program was made by Fred Cohen, then a graduate student at the University of Southern California. Cohen first presented his ideas to a graduate seminar class on information security in 1983. His seminar advisor, Len Adleman, was the first to assign the term “virus” to Cohen’s concept. During his student days at the University of Southern California, Cohen did more theoretical research and practical experiments regarding viral-type programs. As part of these experiments, Cohen wrote five programs, actually viruses, to run on a VAX 11/750 running Unix —not to alter or destroy any computer resources but for class demonstration. During the demonstration, each virus obtained full control of the system within an hour [8]. From that simple beginning, computer viruses, and hence computer crimes, have been on the rise. To many, the growth of the Internet, together with massive news coverage of virus incidents, has caused an explosion of all types of computer viruses [9].
As the level of computer crimes increases on the one hand and our reliance and dependence on computer and telecommunications technology increase on the other, we are becoming more and more susceptible and exposed to cyberspace evils and insecurity. In addition, all critical components of the national infrastructure such as telecommunication, electrical power grids, gas and oil storage, water supply systems, banking and finance, transportation, and emergency services that include medical, police, fire, and rescue—all of which are connected to cyberspace in some form—are becoming unreliable and vulnerable as well. This makes cyberspace an important security concern not only to those in government and those charged with the security of the nation but to all of us, for our personal individual security and well-being, because of the potential for a cyberspace attack, a kind of “cyber Pearl Harbor,” is high.
If we as a society are concerned about individual as well as collective security, privacy, and civil liberties, we need to start finding solutions. A good national cyberspace security policy is needed to [10]:
Make everyone aware of the vulnerability and consequences of a cyberspace attack on their well-being.
Ensure that everyone is well equipped to safely deal with a cyber attack in this technology-driven and fast-changing society.
Help put in place a set of mechanisms to detect, prevent, and handle any cyber attack. 4. Devise a legal and regulatory framework to handle cyberspace’s social consequences.
Moore’s definition focuses on the human actions that are rooted in computer technology or influenced by computer technology. In other words, it is an analysis of the values of human actions influenced by computer technology. Computer influence on human actions is widespread throughout the decision-making process preceding an action. In the previous sections of this chapter, we discussed the many problems we are facing today as a result of computer technology. We are looking for a way to deal with these problems, probably through education. So, the definition of computer ethics, as outlined by Moore, gives us a starting point on this long journey
Moore’s contention is that the central task of computer ethics in decision-making processes that involve computer technology should be to “determine what should be done” whenever there is a policy vacuum. Moore first observed that there are times when policy vacuums are created in the decision-making processes, especially those that involve processes in which computer technology is “essentially involved.” It is difficult to fully explain the cause of these vacuums, but one can say that they are mainly caused by the “confusion” between the known policies and what is presented. Moore tries to explain these muddles by a software example. As we will see in Chap. 6, software can either be a product in which case patent laws apply or it can be a service where no intellectual property laws apply. The multiplicity of choices like this, presented to a decision maker by computer technology, can result in policy vacuums. Several other factors contribute to the creation of these muddles. It is likely that computer users, especially computer professionals, may be unprepared to deal effectively with the ethical issues that arise in their places of work and everywhere else computers, and computer-related technology is used. So, naturally, one would come to the conclusion that since we cannot stop computer technology that causes these muddles, we need a plan of action that will work with the changing computing technology and at the same time deal with the ethical issues that do arise. We need computer ethics education.
In his paper “Is Computer Ethics Unique?” Walter Maner explains the existence of the two schools with two views that:
Certain ethical issues are so transformed by the use of computers that they deserve to be studied on their own, in their radically altered form.
The involvement of computers in human conduct can create entirely new ethical issues, unique to computing, which do not surface in other areas.
According to Maner, there are six levels of justifications for the two views: the first two for the first school and the last four for the second school [12]:
1. We should study computer ethics because doing so will make us behave like responsible professionals.
2. We should study computer ethics because doing so will teach us how to avoid computer abuse and catastrophes.
3. We should study computer ethics because the advance of computing technology will continue to create temporary policy vacuums.
4. We should study computer ethics because the use of computing permanently transforms certain ethical issues to the degree that their alterations require independent study.
5. We should study computer ethics because the use of computing technology creates and will continue to create, novel ethical issues that require special study. 6. We should study computer ethics because the set of novel and transformed issues is large enough and coherent enough to define a new field.
7. Whatever school one falls in, there is enough justification to study computer ethics
What options does Rogan have?
If you were Dr. Rogan, what would you do?
Is Dr. Rogan bound by the legislation?
Whether you believe in a supreme being or you are an atheist, you acknowledge the existence of human life because you are alive. You are alive because someone nurtured you and protected you from all adversities. Whoever did so followed a set of rules of conduct that kept both of you alive. Such shared rules, written or not, play a vital role in all human existence. Human beings do not live randomly. We follow a script—a life script. In that script are hundreds of subscripts we follow both for survival (e.g., eating and sleeping) and for specific tasks. For example, when you meet a stranger, you follow a subscript different from the one you follow when you meet a long-lost friend. If you are hungry, the subscript you follow is different from the one you use to overcome anger. Within each subscript are variations we introduce to suit the situation. For example, when meeting an old friend, some people cry and others jump up and down, but both responses remain within the same subscript of meeting an old friend. The most important purpose of all these subscripts is human life, our own as well as others. Believing in human life implies that we also believe life has a purpose. And because no one wants to live a life of pain, every human being believes in happiness as a purpose for life. To be happy, we need those conditions that create happiness, namely, life, liberty, and property. Each condition is embodied in each of the three basic human survival subscripts: morality, ethics, and law. In this chapter, we discuss morality and law, and in Chap. 3, we discuss ethics
Danny Menardo & Clifford Calimot
35
LAPASANDA & JARALVE
JABAGAT & MOCTAR - 30
PASILAN & TORADO -
TROPEZADO & SY - 40
ALGADEPE & GOMEZ - 30
VELASCO & BRIONES
TUBAT & CADILIG
FORTUITO & ENOPIA - 30
CALLAO & YU
It is a quality system in human acts by which we judge them right or wrong, good or bad. This system creates moral persons who possess virtues like love for others, compassion, and a desire for justice; thus, it builds character traits in people. In particular, morality is a survival script we follow in our day-to-day living. According to Wikipedia [1], morality has three different definitions
• A descriptive definition according to which morality means a set of rules (code) of conduct that governs human behavior in matters of right and wrong. An example of the descriptive usage could be “common conceptions of morality have changed significantly over time.”
• A normative and universal definition which is more prescriptive and refers to an ideal code of conduct that would be observed by all rational people, under specified conditions. An example is a moral value judgment such as “murder is immoral.”
• A definition of morality that is synonymous with ethics. Ethics is the systematic philosophical study of the moral domain. We will define and discuss ethics in the coming chapter.
In each one of these definitions, morality concerns itself with a set of shared rules, principles, and duties, independent from religion, applicable to all in a group or society, and having no reference to the will or power of any one individual whatever his or her status in that group or society. Although moral values are generally shared values in a society, the degree of sharing these values varies greatly. We may agree more on values like truth, justice, and loyalty than on others. To paraphrase Shakespeare, life is but a stage on which there is continuous acting from the subscript of morality. Every time we interact in a society or group, we act the moral subscript that was developed by that society or group for its members over time.
Because morality is territorial and culturally based, as long as we live in a society, we are bound to live within that society’s guidelines. The actions of individuals in a society only have moral values if taken within the context of this very society and the culture of the individual. A number of factors influence the context of morality, including time and place
If morality is a set of shared values among people in a specific society, why do we have to worry about justifying those values to people who are not members of that society? In other words, why do we need moral theories? What do moral theories have to do with the moral subscripts?
? If you write a script for a play, you want both the audience and the cast to understand the message of the play. If you can find a way to help them get that message and believe it, then you have put credibility in the script. This is where moral theories come in
They give our deliberations plausibility and help us to better understand those values and the contradictions therein. Because many philosophers and others use the words moral and ethical synonymously, we delay the discussion of moral theories until we discuss ethics.
Combining 1 and 2 implies there must be reasoning and impartiality in any moral decision. Moral and ethical theorists have outlined four ways of ensuring reason and impartiality in moral decision making:
The use of rational intuition of moral principles, which helps us perceive moral principles such as the notion of justice and deciding what is good.
The use of reason to determine the best way to achieve the highest moral good.
The ability to distinguish between primary and secondary moral principles. Primary moral principles are more general; secondary principles are more specific and are generally deduced from the primary ones.
The rational calculation of the consequences of our actions. The calculation should tell us whether the action is good or bad depending on the consequences
The norm itself is a rule, standard, or measure for us to compare something else whose qualities we doubt. Moral codes are often complex definitions of right and wrong that are based upon well-defined group’s value systems.
In a way, moral codes are shared behavioral patterns of a group.
These patterns have been with us since the beginning of human civilization and have evolved mainly for the survival of the group or society. Societies and cultures survive and thrive because of the moral code they are observing. History has shown failures of societies and cultures like the once mighty civilizations and great empires of the Babylonians, the Romans, and the Byzantines probably because their code failed to cope with the changing times. Although different cultures have different codes, and we have established that morality is relative to time, there have been some timeless and culture-free (moral) codes that have been nearly universally observed. S
Because most of these rules seem vindictive, corruptible, dictatorial, and abusive, Sagan proposes the following as what seems to be a good culture-free and timeless universal set of moral codes
Other timeless, culture-free, but less widely practiced and less universally accepted, codes are those observed by small groups of people with similar interests (e.g., religious and professional groups). Examples of such moral codes include the Native American Ten Commandments, the Jewish and Christian Ten Commandments, and the Unix Users Group Ten Commandments as outlined here:
2.2.3.1 Native American Ten Commandments [4]
Treat the Earth and all that dwell thereon with respect.
2. Remain close to the Great Spirit.
3. Show great respect for your fellow beings.
4. Work together for the benefit of all Mankind.
5. Give assistance and kindness wherever needed.
6. Do what you know to be right.
7. Look after the well being of mind and body.
8. Dedicate a share of your efforts to the greater good.
9. Be truthful and honest at all times.
(a) Take full responsibility for your actions.
2.2.3.2 The Christian Ten Commandments [5]
I, the Lord, am your God. You shall not have any other gods besides Me.
2. You shall not take the name of the Lord, your God, in vain.
3. Remember to keep holy the Sabbath day.
4. Honor your father and your mother.
5. You shall not kill.
6. You shall not commit adultery.
7. You shall not steal.
8. You shall not bear false witness against your neighbor.
9. You shall not covet your neighbor’s wife.
10. You shall not covet anything that belongs to your neighbor
The purpose of moral codes in a society is to exert control over actions of members of the group resulting from emotions. Observance of moral codes in most societies is almost involuntary because members grow up with these codes, so they tend to follow them without questioning. In some societies, observance is enforced through superstition, and in others, it is done through folklore and customs. In Chap. 4, we show that professions need to have codes for their members to adhere to in order for them to be ethical and moral in their day-to-day professional activities.