Ethics and the Law. Ethics Ethics comes from a Greek word ethe’ which means character. A set of theories of value, virtue or of right action A set of.

Slides:



Advertisements
Similar presentations
COMP427 Professional Ethics
Advertisements

Social Responsibility and Ethics in Strategic Management
Slides developed by Les Wiletzky Wiletzky and Associates Copyright © 2006 by Pearson Prentice-Hall. All rights reserved. Ethics and Social Responsibility.
Computer Crimes Chapter 9. Definition  Illegal act that involves a computer system or computer-related system  Telephone, microwave, satellite telecommunications.
John J Downes International Travel and Tourism Law Consultant
Management Ethics and Social Responsibility
Module 2: Morality and the Law
2–1 4 MNG200 Dr. Salma Chad.  Ethics is a code of moral principles and values that governs the behaviours of a person or group with respect to what is.
Law for Business and Personal Use
Chapter 8 Ethics of Managers and Social Responsibility of Businesses
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Computer Ethics Overview Gordon College. Introduction  Computer ethics is growing and changing as computers are growing and changing growing and changinggrowing.
Introduction to Computer Ethics
Ethical Issues in IRM, IT, KM By Daniel P. McAlerney.
Department of Information System Faculty of Computing & Information Technology King Abdul Aziz University, Jeddah, KSA.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
Ethics in Information Technology, Second Edition 1 Chapter 1 An Overview of Ethics.
Chapter 42 Ethics and Social Responsibility of Business
Student Version.
Ethics & Professional Issues in Information Systems Development.
Ethics and Social Responsibility
UNIT 2: CONTEXT. Chapter 3: Ethics & Social Responsibility.
Principles of Management Core Principles
C4- Social, Legal, and Ethical Issues in the Digital Firm
Chapter 3: Types of Cyber Attacks Expand the definition of cyberspace to include: – hardware like computers, printers, scanners, servers and communication.
Stakeholders and Ethics Organizational Stakeholders Stakeholders: people who have an interest, claim, or stake in an organization  Inside stakeholders.
Questions, Quandaries, and Random Thoughts Laura E. Hunter
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Introduction to Computer Ethics
Marketing Ethics and Social Responsibility
Terrorism. What is going on? Brief timeline of major events of terrorism Definition of terrorism Why do terrorists commit terrorism acts? How do governments.
FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Unit 4: Monitoring Employees – CJ 315.
ETHICAL VS UNETHICAL YOU DECIDE!!!. ELIOT L. SPITZER Former NY State Attorney General Former NY State Attorney General Governor of New York Governor of.
Chapter 11 Pricing Issues in Channel Management.
Ch. 24: Social and Ethical Responsibility. Social Responsibility  What is Social Responsibility?  More than running your enterprise responsibility every.
Public law governs:  relationships between individuals and the state/government; and  the structure, administration and operation of the state/government.
Chapter 6 International crime. In this chapter, you will study the concept of international crime. You will be introduced to the main categories of international.
Chapter 5 Managing Responsibly and Ethically Copyright © 2016 Pearson Canada Inc. 5-1.
BUSINESS ETHICS BUSINESS ETHICS. Reference books  Business Ethics: An Indian Perspective by Prof. P.S. Bajaj / Dr. Raj Agrawal  Business Ethics: Text.
What is ethical behavior?  Ethics Code of moral principles. Set standards of “good” and “bad” as opposed to “right” and “wrong.”  Ethical behavior What.
IT Professionalism Ethics Modified by Andrew Poon.
Chapter 2: Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the need to protect the nation’s cyber.
Chapter 5: Social Responsibility
 the study of the rightness or wrongness of human conduct.  In any situation involving two or more individuals, values may come into conflict and ethical.
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
Chapter 3. What is Organizational Responsibility? Organizational responsibility refers to the responsibilities an organization has in order to have an.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Module 3 Ethics and Social Responsibility. Module 3 How do ethics and ethical behavior play out in the workplace? How can we maintain high standards of.
Chapter 8 Business-Government Relations Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Basic Principles: Ethics and Business
ICT CAPABILITY APPLYING SOCIAL AND ETHICAL PROTOCOLS AND PRACTICES WHEN USING ICT Typically by the end of Prep, students Typically by the end of Year 2,
“Without society and government, we would live in a state of nature, where we each have unlimited natural freedoms. The downside of this general autonomy.
 What is the mission of law enforcement in protecting a democratic society:  To _______ _______  To _______ and ________  To promote public _________.
Chapter 4 Ethics and Social Responsibility. Social responsibility - a business’s intention, beyond its legal and economic obligations, to do the right.
Professional Ethics and Responsibilities Part-II
Ethical and Social Issues - J.M. Kizza
5 Ethics, Social Responsibility, and Diversity.
Privileged Information: Confidentiality and Disclosure
BUSINESS ETHICS 1.
1 Chapter Introduction 1st Week of the Semester.
Introduction to Computer Ethics
Chapter 5 Ethical Decision Making
SOURCES AND CATEGORIES OF LAW
Introduction to Computer Ethics
Computer Ethics.
Discuss what it means to be socially responsible and what
Presentation transcript:

Ethics and the Law

Ethics Ethics comes from a Greek word ethe’ which means character. A set of theories of value, virtue or of right action A set of theories to provide general rules/principles to be used in making moral decisions –to provide justification for those rules Every human action is judged to be good/bad based on these theories

What is Computer Ethics? According to James H. Moore, who is believed to have first coined the phrase "computer ethics", computer ethics is the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology It is a study, an analysis of the values of human actions influenced by computer technology.

Computer influence on human actions is widespread throughout the decision making process preceding the action

Why study computer and information ethics Apply ethical point of view to real- world computing context Identify and solve ethical problems in specific fields of computing

Why You Should Study Computer Ethics? Moore’s contention is that the central task of computer ethics, in decision making processes that involve computer technology, should be to “determine what should be done” whenever there is a policy vacuum. It is difficult to fully explain the cause of these vacuums, but one can say that they are mainly caused by the ‘confusion’ between the known policies and what is presented.

So naturally one would come to a conclusion that since we cannot stop computer technology which causes these muddles, we need a plan of action that will work with the changing computing technology and at the same time deal with the ethical issues that do arise There are two schools of thought: – One school, believes in the study of computer ethics as remedial moral education –The other school believes in computer ethics education not as a moral education but as a field worthy of study in its own right

Walter Maner explains the existence of the two schools with the views that: – the involvement of computers in human conduct can create entirely new ethical issues, unique to computing, that do not surface in other areas.

According to Maner, we should study Computer Ethics because: – doing so will make us behave like responsible professionals – doing so will teach us how to avoid computer abuse and catastrophes –the advance of computing technology will continue to create temporary policy vacuums –the use of computing permanently transforms certain ethical issues to the degree that their alterations require independent study –the use of computing technology creates, and will continue to create, novel ethical issues that require special study.

Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the security of information, security of individuals, and a need to protect the nation’s cyber infrastructure

Will there ever be an end to these? Cyberspace infrastructure and communication protocols are inherently weak T he average user in cyberspace has very limited knowledge of the computer network infrastructure, its weaknesses and gapping loopholes. Society, as a whole, is increasingly becoming irreversibly dependent on an infrastructure and technology that it least understands. Society, as a whole, is increasingly becoming irreversibly dependent on an infrastructure and technology that it least understands.

There are no long-term, let alone immediate plans and mechanism in place or planned to educate the public. There is a high degree of compliancy in a society that still accords a "Wiz Kid" status to cyberspace vandals The only known remedy mechanisms and solutions to the problem are patching loopholes after an attack has occurred. The price of this escalating problem is yet to be known. Reporting is voluntary, haphazard, and quite often at will. The nation is yet to understand the seriousness of cyber vandalism.

What are the causes? Vendetta/Revenge Demonstrations at World Trade Organization (WTO) in Seattle, Washington, the World Bank and the International Monetary Fund in Washington, D.C., Prague, Hungry, and Geneo Italy – against globalization. Joke/Hoax/Prank The Hacker's Ethics All information should be free Terrorism Political and Military Espionage Business ( Competition) Espionage Hate (national origin, gender, and race) Personal gain/Fame/Fun/Notoriety Ignorance

Challenges in Tracking Cyber Criminals Nearly in all countries there is no required reporting mechanism in government agencies, even the private sector, to detect intrusions and report such intrusions In the private sector, there is very little interest in reporting of any system related intrusions. This is a result of the fear of marketplace forces that would expose management’s weaknesses to the shareholder community and competitors.

There is no adequate enforcement of existing reporting mechanisms The insider effect, it is reported in some studies that most e-attacks are generated and started by inside employees. This makes the job of detection and reporting very murky. It is like having an arsonist working in the fire department Many nations have no required and trained security agencies to fight e-attacks.

Social and Ethical Consequences

Psychological effects – these include hate and joke especially on an individual. – may lead to individual reclusion, –increasing isolation, and such trends may lead to dangerous and costly repercussions on the individual, corporations and society as a whole. Moral decay – There is a moral imperative in all our actions. When human actions, whether bad or good, become so frequent, they create a level of familiarity that leads to acceptance as “normal”. This type of acceptance of actions formerly viewed as immoral and bad by society lead to moral decay.

Loss of privacy – After an attack, there is usually an over reaction and a resurgence in the need for quick solutions to the problem that seems to have hit home. Many businesses are responding with patches, filters, ID tools, and a whole list of “solutions”. profile scanners and straight scanners like Echlon. Echlon is a high-tech U.S. government spying software housed in England. It is capable of scanning millions of s given specific keywords. Tracking technology to lead to virus writers. Trust – Along with privacy lost, is trust lost. Individuals once attacked, lose trust in a person, group, company or anything else believed to be the source of the attack or believed to be unable to stop the attack.

Law Rules of conduct or actions recognized by customs or decreed by a formal body and enforceable by some instrument. We obey two types of laws: Natural and Conventional

Natural Law Unwritten but universal Unwritten but universal consists of rights: consists of rights: –Self-defense (preservation) –Individual property –Liberty It is a higher form of human law, therefore, independent of human preferences and applies to all rational creatures of nature Before organized human societies, humans existed because of natural law. Civilization is based on it.

Conventional Law It is a system of rules created by and for human beings – through, though not always, public deliberations It varies from society to society Its purpose is to: –Protect human life, property and liberty. –prescribe a system or punishments for unlawful acts – Penal Code

Law and Ethics Most laws are derived from moral codes Though law often embodies ethical principals, law and ethics are far from co-extensive. There are many acts that would be widely condemned as unethical but are not prohibited by law, that is there are not illegal-- lying or betraying the confidence of a friend, for example. There are also many acts that are considered illegal but ethical. –In much that the law does it is not simply codifying ethical norms.

WHAT CONSTITUTES A COMPUTER CRIME? The United States Department of Justice states that computer crime is any illegal act for which – –knowledge of computer technology is essential for either its perpetration, investigation, or prosecution. ( Of course, this presupposes knowledge of whether or not an act is illegal).

CODES OF ETHICS Codes of ethics establish broad rules of conduct for a profession and its members, and thus can be differentiated from an individual moral code which governs particular decisions in both private and professional life. Codes of ethical conduct for the professional and moral decisions for the individual overlap with legal requirements but are distinct from them.

Codes of Ethics and Law Legal provisions and professional codes of ethics are often in agreement--that is, professional conduct is usually both legal and ethical, or occasionally both illegal and unethical. Sometimes, however, the two may not clearly coincide and the resulting conflict may pose some real dilemmas for the professional. Professional conduct may be unethical and yet remain legal; in some instances conduct may be illegal and yet still be ethical. A simple topology will illustrate the relation between law and ethics.

Computer Laws: Federal

Computer Laws: States Computer Crime Laws by State - /computerlaw/statelaws.html