Ethique en Informatique Computer Ethics ou CyberEthique CyberEthics 2004.

Slides:



Advertisements
Similar presentations
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Advertisements

2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
COMPUTER AND INFORMATION ETHICS By: Richard Ramos.
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Computer Ethics Overview Gordon College. Introduction  Computer ethics is growing and changing as computers are growing and changing growing and changinggrowing.
Introduction to Computer Ethics
Fall 2014 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering What is Computer Ethics? Fall 2014 Marco Valtorta.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Computer Ethics in Information Technology
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Computer ethics.
Ethics Lecture Dr. Christina Howe
Ethics and Computing : A NEW PARADIGM Benjamin Wage.
Professional Practice Lecture 1: Introduction to Course.
Ethics and the Information Revolution Terrell Ward Bynum
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer Programming I
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer Ethics A Necessity for the new era. Why is Computer Ethics Important? The creation and existence of new questions that older laws cannot answer.
Unit 3- Introduction to Computer Ethics
Information Ethics Prof. Madya Dr. Rozinah Jamaludin 11 March 2010.
University of Sunderland COMM93 R.E.P.L.I. Unit 2A Ethical, Professional and Legal Issues In Computing Ethical, Professional and Legal Issues In Computing.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
Chapter 1 Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics Introduction Cybertechnology, Ethical Concepts,
Readings in Cyberethics Notes from book by Spinello.
Information Technology Issues How has the proliferation of IT impacted society? Adapted from Prof. Brenda Timmerman.
Do software developers have an ethical duty? KELLEN STUART.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Professional Ethics and Responsibilities Part-II
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Moral, Ethical, legal and cultural issues How technical innovation leads to moral, ethical, legal and cultural issues How our own moral and ethical beliefs.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Computer Safety and Ethics
Ethique en Informatique Computer Ethics ou
Unit 3- Introduction to Computer Ethics
Video: Digital citizenship is defined as the norms of appropriate,
Introduction to Computer Ethics
Chapter 13 Security and Ethical Challenges.
Societal Issues in Computing (COMP466)
Computer Programming I
Computer Ethics: Its birth and its future
Introduction to Computer Ethics
Ethique en Informatique Computer Ethics ou
Introduction to Computer Ethics
CS-480b Network Security Dick Steflik
Presentation transcript:

Ethique en Informatique Computer Ethics ou CyberEthique CyberEthics 2004

By Netiva Caftori Institut de Mathematiques et de Sciences Physiques, Porto-Novo et Northeastern Illinois University, Chicago 2004

Ethique en general Chaque societe etablit des regles et limites pour une conduite acceptable. Ces regles forment un code morale. Des contradictions parfois entre ces regles. En general ce sont des croyances ou des conventions sur le bon et le mal, bonne ou mauvaise conduite, juste et injuste. Les regles parfois ne couvrent pas des situations nouvelles.

Examples: Employee monitoring. Downloading music using Napster software at no charge. Robert Hansen, FBI agent, convicted for providing information to Russia. DoubleClick sued for planning to reveal Web users identities. Plagiarism. Hackers defaced Web sites.

The world is changing

Introduction In the industrialized world computers are changing everything: from education to health, from voting to making friends or making war. Developing countries can also fully participate in cyberspace and make use of opportunities offered by global networks. We are living a technological and informational revolution. It is therefore important for policy makers, leaders, teachers, computer professionals and all social thinkers to get involved in the social and ethical impacts of this communication technology.

Cyberethics and cybertechnology Definitions. Cyberethics is the field of applied ethics that examines moral, legal, and social issues in the development and use of cybertechnology. Cybertechnology refers to a broad range of technologies from stand-alone computers to the cluster of networked computing, information and communication technologies. Internet ethics and information ethics.

Computer ethics: definition Same as cyberethics, or The study of ethical issues that are associated primarily with computing machines and the computing profession. The field of applied professional ethics dealing with ethical problems aggravated, transformed, or created by computer technology (1970, Maner)

Computer Ethics: Some historical milestones : Founded by MIT prof Norbert Wiener: cybernetics-science of information feedback systems. 1960s: Donn Parker from California examined unethical and illegal uses of computers by professionals. 1 st code of professional conduct for the ACM. 1970: Joseph Weizenbaum, prof at MIT, created Eliza. Mid 1970: Walter Maner taught 1 st course and starter kit in computer ethics.

Computer ethics history (cont.) 1980: Issues like computer-enabled crime, disasters, invasion of privacy via databases, law suits about software ownership become public. Mid 80s: James Moore of Darmouth, Deborah Johnson of Rensselaer, Sherry Turkle of MIT, and Judith Perrole published article and books.

Computer ethics history (cont. 2) 1990: Interest in computer ethics as a field of research had spread to Europe and Australia. Simon Rogerson of De Montfort University (UK) initiated with Terrell Bynum, editor of Metaphilosophy (USA), some international conferences. Mid 90s: Beginning of a 2 nd generation of computer ethics with more practical action. 2004: Interest spreads to Cotonou, Benin

Any unique moral issues? Deborah Johnson: Ethics on-line. The scope of the Internet is global and interactive. The Internet enables users to interact with anonymity. Internet technology makes the reproducibility of information possible in ways not possible before. The above features make behavior on-line morally different than off-line.

The debate continues: James Moore: Computer technology is “logically malleable” unlike previous technologies. It can create “new possibilities for human action”. Brey: disclosing non-obvious features embedded in computer systems that can have moral implications. Alison Adams: Take into account gender-related biases. Combine feminist ethics with empirical studies.

Sample topics in computer ethics Computers in the workplace: a threat to jobs? De-skilling? Health and safety? Computer security: Viruses. Spying by hackers. Logical security: Privacy, integrity, unimpaired service, consistency, controlling access to resources. Software ownership: Intellectual property vs. open source. Software development: quality, safety

Computers in the workplace Monitoring of employees: employer vs. employee point of view. Loyalty- Whistle blowing. Health issues. Use of contingent workers. A threat to jobs. De-skilling.

Computer security Viruses: programming code disguised Worms: propagate w/o human intervention Trojan horses: gets secretly installed. Logic bombs: execute conditionally. Bacteria or rabbits: multiply rapidly. Computer crimes: embezzlement. Hackers: vandalism or exploration. Denial of service attack: flood a target site.

Logical security Privacy invasion of , files, and own computer (cookies). Shared databases. Identity theft. Combating terrorism: Patriot act.

Software ownership Knowledge: private greed, public good. Profit vs. affordability Freedom of expression and access to information Right to communicate: share and learn in a globalized world. Digital divide is immoral. Open source software: Linux. Open access. North-South information flow. Indigenous knowledge.

Professional responsibility Codes of ethics. Professional organizations: ACM. IEEE, CPSR Licensing Industry certifications Common ethical issues: Piracy, inappropriate sharing of information, inappropriate usage of computing resources.

Codes of ethics Avoid harm to others Be honest and trustworthy Acquire and maintain professional competence Know and respect existing laws pertaining to professional work Avoid real or perceived conflicts of interest Be honest and realistic in stating claims or estimates based on available data

Global Information Ethics Freedom of speech in the USA Control of pornography Protection of intellectual property Invasion of privacy Global cyberbusiness Global education: free press Information rich and poor

The future Gorniak hypothesis: Computer Ethics, a branch now of applied ethics, will evolve into a system of global ethics applicable in every culture on earth. The computer revolution will lead to a new ethical system, global and cross-cultural. It will supplant parochial theories like Bentham and Kant based on isolated cultures. The Johnson hypothesis: Opposite.

Web sites International Journal of Information Ethics. Top ten Internet security flaws that system administrators must eliminate to avoid becoming an easy target. Computer ethics as a map. course.htmhttp:// course.htm My ethics course.

The end