Ethics in the Computing Industry

Slides:



Advertisements
Similar presentations
Northside I.S.D. Acceptable Use Policy
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
 Ethics (relating to ICT) are about the: › Sensible › Legal › Moral uses of ICT.  They are designed to develop and make best use of technology.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
ICT Ethics 2 ICT 139.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
The AMA Code of Ethics Could Egyptian Marketing Professionals Agree on a List of Rules, Perhaps Similar to This? The IMI Journal. Members of the AMA are.
PROJECT MANAGEMENT ETHICS
Chapter 29 Ethics in Accounting
Riverside Community School District
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Software Engineering Code Of Ethics And Professional Practice
Chapter 14: Ethics, Justice and Fair Treatment at Work
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Computer Ethics – The Ten Commandments
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Ethics Lecture Dr. Christina Howe
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Computer Programming I
Introduction to Computer Science
Objective 5.02 Understand ethics and ethical decision-making.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
COMPUTER ETHICS Do you know the difference between right and wrong?
00870B2F.0/Internet%20Safety.jpg.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
ELearning Backpack Initiative Exciting Opportunity for Freshman Raiders.
Principles of LPSCS. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Copyright.
INTERNET SAFETY.
? Moral principles of right and wrong Used by individuals/organisations To guide behaviour.
+ Censorship in New Zealand. + Firstly: A brief history of censorship in New Zealand.
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
Professional Ethics and Responsibilities Part-II
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Moral, Ethical, legal and cultural issues How technical innovation leads to moral, ethical, legal and cultural issues How our own moral and ethical beliefs.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Chap (3)1 Chapter 3 Professional Codes of Ethics Almost every professional organization dealing with the field of computing has published its own code.
Acceptable Use Policy (Draft)
Computers Are Your Future Twelfth Edition
Chapter 13: The IT Professional
Instructor Materials Chapter 13: The IT Professional
Chapter 16 – Careers in Information Technology

Ethics & Social Responsibility
Technology Guidelines for Students
Unit 3- Introduction to Computer Ethics
Professional Codes of Ethics
Compliance requirements in relation to management of data
DIGITAL BUSINESS APPLICATIONS
Internet Safety and Acceptable Use Policies.
PROFESSIONAL BUSINESS PRACTICE
Understand ethics and ethical decision-making.
Computer Programming I
Technology Guidelines for Students
Objective 5.02 Understand ethics and ethical decision-making.
Code of Ethics - History
Understand ethics and ethical decision-making.
Chapter 13: The IT Professional
Office of Research Integrity and Protections
ACM Code of Ethics CSCI 362: Data Structures.
CS-480b Network Security Dick Steflik
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

Ethics in the Computing Industry EIT, Author Gay Robertson, 2017

What are Ethics? Moral principles Rules and regulations Good behaviour; fair, proper, honourable, decent, principled people Rules and regulations Of conduct and behaviour and performance Course of action Fitness or correctness of the decision for the problem at hand Clear Concepts about what is … good, right, justice, morals, values Responsibility Legal use of data, doing what is proper, right or socially acceptable

History of Computer ethics 1970 –Association of Computing Machinery adopted a Professional Code of Ethics 1988 – Robert Hauptman came up with the term Information Ethics – involving the, production, storage, access and dissemination of information 1992 – ACM adopted new ethical rules called ACM Code of Ethics and Professional Conduct (24 statements of personal responsibility) 1990s – the combination of computers with telecommunication, internet and other media raised new ethical issues 1990s – development of Privacy Acts, growth of computer crimes 1995 – US Research Center of Computing and Society developed the idea that computer ethics would eventually become a global ethical system

and … Developing Ethical Standards… Code of ethics documents were developed to give guidelines to computing professionals: Association for Computing Machinery developed: ACM Code of Ethics and Professional Conduct British Computer Society developed: BCS Code of Conduct & Code of Good Practice Institute of Electrical and Electronics Engineers Computer Society (IEEEComSoc) developed: IEEE Code of Ethics Computer Ethics Institute developed: 10 Commandments of Computer Ethics

10 Ethical Commandments…

Ethical issues for the IT industry

ITP Code of Conduct … The ITP (Information Technology Professionals) Code of Conduct document outlines the eight tenets which govern the following: Good faith (treat people with dignity, good faith and equality) Integrity (act with integrity, dignity and honour) Community-focus (responsibilities for the welfare and rights of community shall come before other interests) Using skills responsibly (to not compromise other tenets) Continuous development (to contribute to collective knowledge) Informed consent (take reasonable steps to inform all of consequences that may arise from actions taken) Conflicts of interest (manage all conflicts between clients or employers) Competence (follow recognized professional practice) Go to https://itp.nz/Members/Code-of-Ethics for the full Code of Conduct read the Tenets of the Code. Close the Browser and you will return here.

Always think about the ethics of … In the workplace … Information stored on a computer should be treated as seriously as the written or spoken word Privacy should not be violated Copying can become plagiarism (cheating) Information for public viewing should not be modified, deleted or inaccessible - these are classed as destructive acts Don’t introduce intrusive software (worms, viruses etc) this is illegal Don’t congest a computer system with a lot of unwanted information Don’t send obscene or crude messages through any type of media Don’t store or send sexually explicit content, pictures or messages

Acceptable Use Policy (AUP) should cover … Maintain system integrity Don’t divulge passwords, pins, private keys or use the identity of another Confidential data - limit access to essential employees only No unauthorised access to other users’ accounts or files Rules should be included to cover: Personal use of email any, some, none and the timing ie lunch hours or after work / before work Internet usage any, some, none and the timing ie lunch hours or after work / before work File sharing Downloading or uploading

From your Student Handbook Email and internet usage Students are expected to respect commercial business etiquette when replying and forwarding emails. Remember your emails could be used for legal evidence. When you are working in an EIT center, use of email is restricted to study matters only. We are training you to work in the workplace and email usage wastes an employer’s time and costs money. Refer to the EIT student Handbook (which you received with your enrolment pack) and the Computer Usage Policy for complete rules. Or go to http://myeit.ac.nz/ to read online

What is illegal material … Censorship in New Zealand is governed by the Films, Videos, and Publications Classification Act 1993 (the Classification Act) and associated regulations. The Act was the result of the 1987 Ministerial Committee of Inquiry into Pornography Certain images (eg child pornography) are illegal and cannot/should not be viewed, stored or owned in any circumstances The Department of Internal Affairs carries out on-line investigations of people trading in objectionable material, primarily child pornography The New Zealand Customs Service deals with the importation of objectionable material, which is a prohibited import under the Customs and Excise Act 1996 this includes acts of violence or coercion, torture or any other degrading or dehumanizing conduct

What is restricted material … Defined as material which is only made available to people who are over a certain age. Typically, this is R18 or Adult material similar to that which can be legally purchased from video or magazine outlets.

What is Objectionable material … Defined under the Films, Videos and Publications Classification Act 1993 (policed by the Internal Affairs Department) as: “a publication … that describes, depicts or expresses or otherwise deals with matters such as sex, horror, crime, cruelty or violence in such a manner that the availability of the publication is likely to be injurious to the public good.” Although general agreement of what is offensive shifts and changes with cultural norms, always err on the side of caution! Note: Internet service providers (ISPs) are in an uncertain legal position regarding liability for the Internet content to which they provide access. The Classification Act is silent regarding the position of ISPs and it is possible that they could be liable for their part in supplying, distributing or displaying an objectionable publication, even if they did no more than provide access to it. Enforcement activity has focused on those who download and trade objectionable material. ISPs have co-operated with the Department of Internal Affairs, when required to do so by a search warrant, in providing information to assist with investigations of censorship offenders.

What is … Unacceptable use …. In a workplace environment the viewing of, storing of, or sharing of, any form of illegal or objectionable images or material would be considered unacceptable use of the computer by fellow employees and your employer

The role of a Code of Conduct Principles Values Practices The role of a Code of Conduct Defines responsibilities Creates an environment of ethical behaviour Provides a guide for expected behaviour Keeps people informed as it is developed and modified with the changes that occur Provides a benchmark for qualifications and on-going educational requirements Commitment to the IT industry

Ethics in Business … Take a look at the following video – this is one explanation of ethics as it relates to business: Click on URL to view https://www.youtube.com/watch?v=vmVu66Fpd9U#t=41 Duration: 4m 35s Close the Browser and you will return here.

Conclusion Code of Conduct or Code of Practice required There must be clear rules around how to become a member of the organisation eg ITPNZ membership Members need to formally agree to the code Members accept that they are bound by it Provides a recognised background of trust and reliability Members know they will be faced with disciplinary action if they break the code

General computer ethical issues Intellectual Property Rights Copyrighted electronic (digital) content Privacy concerns - gaining personal information illegally Censorship issues Human and social networking Google street views Artificial intelligence

Let’s hope that helped! But, if it didn’t make much sense – I can go through this again!