Law 483 cyberethics

17
LAW 483 CYBERETHICS 1

description

 

Transcript of Law 483 cyberethics

Page 1: Law 483 cyberethics

1

LAW 483

CYBERETHICS

Page 2: Law 483 cyberethics

2

What is Ethics?If we are going to examine ethical issues on the Internet, it is

first necessary to define ethics.

Today, we regard ethics as a “rational process founded on certain principles.”

However, definition that is more applicable is the ethical theory that existed in ancient Greece.

There, ethics was the study of what was good for both the individual and the society.

Here, we will look at some online issues and how they may be good and/ or bad for society.

Cyberethics is the study of ethics on the Internet.

Page 3: Law 483 cyberethics

3

FOUR MAIN ETHICAL ISSUES

PRIVACY

ACCURACY

PROPERTY

ACCESS

Page 4: Law 483 cyberethics

4

A few years ago, Florida lawmakers gave the go ahead to have monitors stationed in bathrooms at Tallahassee Community College to determine if the facilities were being underutilized.

Students and faculties strongly protested that the monitors violated their privacy.

State officials said that the value of information gained through the study was more important than the threat to the privacy.

The technology around us increase so does the threat to our privacy.

PRIVACY

Page 5: Law 483 cyberethics

5

ACCURACY•Information educates.

•Misinformation effaces.

•A wealth of information resides on the Net.

•However, sometimes it is difficult to discern/distinguish the truth from the trash, the nugget of valuable information from the hearsay, supposition, inference and opinion.

•A poignant illustration of this is the Drudge Report.

Matt Drudge often reports on rumors and speculation and rarely reinforces his stories with specific sources.

Page 6: Law 483 cyberethics

6

PROPERTY

•WHO has the rights to intellectual property on the internet?

Issue : When one is constructing his Web page, whether it is ethical to lift an image from someone’s homepage and use it on his webpage without crediting the source.

Page 7: Law 483 cyberethics

7

Access

•One reason that topics such as online gambling and pornography have become such firestorms of controversy in cyberspace is the simple fact that so many people have access to the Web sites.

•Obviously, pervasive societal issues warrant more attention surreptitious issues.

•Simply put, if no one had access to online pornography no one would care.

Page 8: Law 483 cyberethics

8

Identify the Elements of Malaysian Cyber Law

i. Computer Ethicsii. Code of Ethicsiii. Intellectual Property

Ethics is the branch of philosophy concerned with:a. what is right.b. What is wrong.

Page 9: Law 483 cyberethics

9

Computer Ethics for Computer Professionals

• The field of computer ethics specifies ethical codes for computing professionals.

• The core of a computer professional’s code of ethics is to preserve and protect human life from harm.

Computer causes new ethical problems and issues:

Computer ethics also deals with the ethical principles associated with those problems.

Page 10: Law 483 cyberethics

10

What is code of ethics?

code of ethics

A group of ethical behavior rules

Developed by organizations or by a professional society

Page 11: Law 483 cyberethics

11

Code of Ethics Act with integrity, competence, diligence, respect and on an

ethical manner with the public, clients, employers, employees and colleagues.

Interest in profession and clients above personal interest.

Practice and encourage others to practice in an ethical manner.

Promote integrity of ethical markets.

Improve professional competence.

Page 12: Law 483 cyberethics

12

Computer Ethics for Computer Users

When using the college’s computers

Respect yourself Respect others

Respect academic integrity

Page 13: Law 483 cyberethics

13

Respect yourself

If you obtain an account and password to use the campus computer system, don’t give your password to others. They could do something that gets you in trouble.

In addition, don’t say or do anything on the internet that could reflect poorly on you, even if you think no one will ever found out.

Page 14: Law 483 cyberethics

14

Ten Commandments of Computer Ethics

1. Don’t use a computer to harm other people.

2. Don’t interfere with other people’s computer work.

3. Don’t snoop around in other people’s files.

4. Don’t use a computer to steal.

5. Don’t use a computer to bear false witness.

6. Don’t copy or use proprietary software for which you have

not paid.

Page 15: Law 483 cyberethics

15

7. Don’t use other people’s computer resources without authorization or proper compensation.

8. Don’t appropriate other people’s intellectual output.

9. Do think about the social consequences of the program you write or the system you design.

10. Do use a computer in ways that show consideration and respect for your fellow humans.

Page 16: Law 483 cyberethics

16

Respect Others You shouldn’t use a computer to threaten or

harass anyone.

Avoid using more than your share of computing resources, such as disk space.

If you publish a Web page on your college’s computers, remember that your page’s content affects the college’s public image.

Page 17: Law 483 cyberethics

17

Respect academic integrity

Always give credit for text you’ve copied from the internet.

Obtain permission before you copy pictures.

Don’t copy or distribute software unless the license specifically says you can.