© Paradigm Publishing, Inc. 14-1 Chapter 14 Computer Ethics Chapter 14 Computer Ethics.
-
Upload
olivia-mckenzie -
Category
Documents
-
view
221 -
download
0
Transcript of © Paradigm Publishing, Inc. 14-1 Chapter 14 Computer Ethics Chapter 14 Computer Ethics.
© Paradigm Publishing, Inc. 14-2
Presentation Overview
• The Role of Ethics• Privacy Protection Issues• Property Protection Issues• Personal and Social Issues• Defining Software Companies’ Responsibilit
ies• Developing Personal Ethical Guidelines
© Paradigm Publishing, Inc. 14-3
The Role of Ethics
What are ethics?– Ethics are the rules we use to determine the
right and wrong things to do in our lives.– Normative ethics involves determining a norm
of ethical rule that underlies ethical behavior.– Applied ethics refers to the application of
normative ethical beliefs to real-life issues.– Computer ethics deals with ethical issues
related to computers.
© Paradigm Publishing, Inc. 14-4
The Role of Ethics
The Source of Ethics– In moral realism, ethical principles are thought
to have objective foundations; that is, they are not based on subjective human reasoning.
– In moral relativism (also known as situational ethics), ethical issues are thought to be subjective.
© Paradigm Publishing, Inc. 14-5
Privacy Protection Issues
Public Information Availability– Database companies comb personal
information such as birth records and marriage licenses and provide this information to anyone with a credit card and access to the Web.
– Other personal information such as salaries, and controversial information such as criminal records and sex offender information, also appears on the Internet.
© Paradigm Publishing, Inc. 14-6
Privacy Protection Issues
Threats to Privacy from Interception of Wireless Communications
– Wireless communications devices are extremely vulnerable to interception by others.
– Traditional methods of computer security don’t work well for wireless devices.• Wireless devices often don’t require authentication
to ensure the identity of the user and the device.• Encryption technology doesn’t work well because of
the devices’ limited battery power and memory.
© Paradigm Publishing, Inc. 14-7
Privacy Protection Issues
Commercial Threats to PrivacyCookies
• A cookie is a small data file created and placed on a computer’s hard drive by a Web site.
• They are meant for the convenience of Internet users and can remember user IDs and passwords.
• They can also be used to record user interests and preferences, which can then be used by companies to target advertisements.
© Paradigm Publishing, Inc. 14-8
Privacy Protection Issues
Commercial Threats to PrivacyGlobal Unique Identifiers
• A global unique identifier (GUID) is an identification number that can be coded into both hardware and software.
• The use of GUIDs would eliminate any anonymity Internet users now enjoy.
• With GUIDs, it would always be possible to track down the originators of unpopular or controversial messages—a severe blow to Internet privacy.
© Paradigm Publishing, Inc. 14-9
Privacy Protection Issues
Commercial Threats to PrivacyLocation Tracking
• Most cell phones are equipped with Global Positioning System (GPS) chips that can pinpoint their locations.
• GPS chips are useful as navigational aids and monitoring devices, and can promote safety.
• GPS chips and other location tracking technology can also be used to target advertisements and to figure out where any person is at any given time, which can encroach on the right to privacy.
© Paradigm Publishing, Inc. 14-10
Privacy Protection Issues
Protection from Commercial Threats to PrivacyIndustry Self-Regulation
• A privacy statement promises that an e-tailer will protect the confidentiality of any information a customer reveals.
– Third-party organizations like the BBBOnLine lend greater credibility to privacy statements.
• New software lets users designate that files sent to others have one-time-only viewing rights, cannot be copied, or can only be viewed for a few hours’ time.
© Paradigm Publishing, Inc. 14-12
Privacy Protection Issues
Major Privacy Protection Laws (continued)
© Paradigm Publishing, Inc. 14-13
Privacy Protection Issues
Government Threats to PrivacyEavesdropping
• To better monitor e-mail messages, the FBI developed a series of Internet wiretap programs named Omnivore, Carnivore, and DCS1000.
• The USA PATRIOT Act allows law enforcement agencies to eavesdrop on private telephone messages and to intercept and read e-mail messages.
Some fear that innocent messages will be misinterpreted, resulting in criminal charges.
© Paradigm Publishing, Inc. 14-14
Privacy Protection Issues
Government Threats to PrivacyEncryption Restrictions
• Encryption software makes it harder for the government to monitor e-mail messages.
• The FBI has warned that its role in protecting the nation will be negatively affected by this.
• The NSA restricted the use of encryption programs for many years, but control was loosened due to commercial interests in protecting consumer data.
• Given the rapid advances in technology, government control of encryption probably will not be effective.
© Paradigm Publishing, Inc. 14-15
Privacy Protection Issues
Workplace Threats to PrivacySoftware programs allow employers to monitor employees by
• Tracking the number and type of keystrokes employees enter on their keyboards
• Reading messages sent and received• Capturing what is on an employee’s computer
screen at a given time
© Paradigm Publishing, Inc. 14-16
Privacy Protection Issues
Protection from Workplace Threats to Privacy– If a company has pledged to respect any aspect
of employee privacy, it must keep that pledge.– Privacy advocates and the American Civil
Liberties Union (ACLU) question the need to monitor employees without warning and without limit.
© Paradigm Publishing, Inc. 14-17
Privacy Protection Issues
Fair Electronic Monitoring Policy for Employers (proposed by the ACLU)
© Paradigm Publishing, Inc. 14-18
Property Protection Issues
Intellectual Property– Intellectual property includes anything that
can be created by the human mind.– A patent awards ownership of an idea or
invention to its creator for a fixed number of years.• This allows the inventor the right to charge others
for the use of the invention.
– A copyright protects artistic and literary endeavors.
© Paradigm Publishing, Inc. 14-19
Property Protection Issues
Intellectual PropertyThe World Intellectual Property Organization (WIPO) is a specialized agency of the United Nations dealing with intellectual property rights.• The WIPO administers international treaties dealing
with intellectual property.• The WIPO divides intellectual property into two
categories: industrial property and copyright.
© Paradigm Publishing, Inc. 14-20
Property Protection Issues
WIPO Intellectual Property Classifications
© Paradigm Publishing, Inc. 14-21
Property Protection Issues
Fair UseUnder Fair Use law, it is permissible to use another person’s material without permission as long as this use
• Is acknowledged• Is for noncommercial purposes• Involves only limited excerpts of protected material
© Paradigm Publishing, Inc. 14-22
Property Protection Issues
Fair Use and the Digital Millennium Copyright Act
The Digital Millennium Copyright Act (DMCA) brings U.S. copyright law in line with WIPO treaties to which the U.S. is a signatory.
• It prohibits the circumventing of copyright protection systems.
• It clarifies the concept of Fair Use for digital works.• It deals with the issue of an ISP’s liability for
hosting copyrighted materials.
© Paradigm Publishing, Inc. 14-23
Property Protection Issues
Damage Due to Hacking, Phishing, and Viruses
– Identity theft is theft of personal data which is then used to assume that person’s identity and make purchases in his or her name.
– Phishing uses sophisticated tricks to “fish” for users’ financial information and passwords.
– Viruses cause damage to a user’s computer or the software running on it.
© Paradigm Publishing, Inc. 14-24
Property Protection Issues
Protection from Hacking, Phishing, and Viruses
Consumers can protect themselves by• Dealing only with merchants who encrypt credit
card numbers and other private data• Never opening e-mails from unknown sources• Installing antivirus programs to destroy viruses• Installing firewall software to protect against
Internet-connected computer hackers
© Paradigm Publishing, Inc. 14-25
Personal and Social Issues
Gambling Online– Online gambling is attracting a growing
number of gamblers, including teenagers.– The Internet gambling industry is based almost
entirely outside the United States.– The U.S. House of Representatives passed
legislation allowing authorities to work with Internet providers to block access to online gambling and prevent users from using credit cards to gamble.
© Paradigm Publishing, Inc. 14-26
Personal and Social Issues
Protecting Freedom of Speech– Hate speech sites incite hatred against people
of certain races, religions, or beliefs. They may also post dangerous material such as information for making drugs or bombs.
– Cyberbullying is sending harassing texts, e-mail messages, or photos with the purpose of harming another person’s reputation.
– Pornography sites contain sexually explicit material or script deemed harmful by society.
© Paradigm Publishing, Inc. 14-27
Personal and Social Issues
Protecting Against Unwanted Material– The Child Protection Pornography
Prevention Act of 1996 enacts harsh penalties for those distributing or possessing child pornography.
– The Children’s Internet Protection Act (CIPA) requires public schools and libraries to install Internet filtering software on their computers.
© Paradigm Publishing, Inc. 14-28
Personal and Social Issues
Protecting Against Unwanted Material– A filtering program can prevent access to
sites, keep track of sites visited, limit connection time, etc.
Certain organizations provide schools with guidelines for evaluating Internet filtering programs.
– The Consortium for School Networking recommends that every school adopt an acceptable use policy to guide Internet use.
© Paradigm Publishing, Inc. 14-29
Personal and Social Issues
Bridging the Digital Divide– The gap between those who have access to
computers and the Internet and those who do not has been called the digital divide.
– Only 5 percent of the population in developing countries has Internet access.
© Paradigm Publishing, Inc. 14-30
Personal and Social Issues
Demographics of U.S. Internet UsersAccording a 2008 report by the Pew Internet & American Life Project, English-speaking Hispanic Americans lead the U.S. in Internet usage, with 80 percent online.
• Caucasian Americans – 75%• African Americans – 59%• Spanish-dominant Hispanics – 32%
© Paradigm Publishing, Inc. 14-31
Defining Software Companies’ Responsibilities
Protecting Against Poorly Designed Software– Bad software costs U.S. businesses an
estimated $100 billion in lost productivity annually.
– Customers may sue if bad software causes damages, but a better solution is for companies to produce better software in the first place.
© Paradigm Publishing, Inc. 14-32
Defining Software Companies’ Responsibilities
Improving Accessibility– In late 2000, the government issued new rules
requiring almost all government websites to be fully accessible to the disabled.
– Hardware must also be adapted to accommodate the disabled.
Apple Computer has pioneered these efforts with the invention of the “sticky keys” feature.
© Paradigm Publishing, Inc. 14-33
Defining Software Companies’ Responsibilities
Software Engineering Code of Ethics and Professional Practice
© Paradigm Publishing, Inc. 14-34
Developing Personal Ethical Guidelines
All Internet users should read, think about, and consider adapting for their own use a computer code of ethics.
The following are the top ten themes found in effective codes of ethics: