Information Ethics Prof. Madya Dr. Rozinah Jamaludin 11 March 2010.

Slides:



Advertisements
Similar presentations
Ethics in Social Science Research and Experiments.
Advertisements

Vladimir Misic: 10 Professionalism and Ethics Ownership and Protection.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
PROJECT MANAGEMENT ETHICS
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
SWEBOK & U. Ottawa SE1 SWEBOK Compared to the University of Ottawa Undergraduate SE Program CSEET March, 2000 Timothy C. Lethbridge.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
CS 305 Topics Covered. Chapter 1: Overview of Ethics What is ethics? Ethics is a set of beliefs about right and wrong behavior. These beliefs are guided.
COMPUTER AND INFORMATION ETHICS By: Richard Ramos.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
These courseware materials are to be used in conjunction with Software Engineering: A Practitioner’s Approach, 6/e and are provided with permission by.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Computer Ethics Overview Gordon College. Introduction  Computer ethics is growing and changing as computers are growing and changing growing and changinggrowing.
Department of Information System Faculty of Computing & Information Technology King Abdul Aziz University, Jeddah, KSA.
THE INTELLECTUAL PROPERTY OF SOURCE CODE Michael Musick.
CSCE 431: Licensing and Software Engineering Code of Ethics
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
K. Salah1 Legal, Privacy, & Ethical Issues. K. Salah2 Overview Human Controls Applicable to Computer Security The Basic Issues Computer Crime Privacy.
Chapter Two Ethical & Legal Issues.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Computer Ethics.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Website on Computer Security By: Brittany Freeman.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Introduction to Computer Science
What does “secure” mean? Protecting Valuables
Copyright © 2014 Pearson Education, Inc. 1 Managers are facing unique challenges as Digital Technologies permeate the workplace Chapter 1 - Managing in.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
CHAPTER 10 Technology Issues.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Information Warfare Playgrounds to Battlegrounds.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
Unit 3- Introduction to Computer Ethics
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Professional Ethics in Software Engineering Curricula Gordana DODIG-CRNKOVIC Ivica CRNKOVIC Department of Computer Science and Electronics, Mälardalen.
history, hardware, software, safety, and computer ethics
1 These slides are designed to accompany Software Engineering: A Practitioner’s Approach, 7/e (McGraw-Hill 2009). Slides copyright 2009 by Roger Pressman.
Randy Beavers CS 585 – Computer Security February 19, 2009.
What is computer ethics?  Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding.
Ownership of Software Software represents the results of intellectual rather than purely physical efforts and is therefore inherently non- tangible. So.
Chapter 7 Impact of Information Technology. Agenda Shneiderman’s Plagues of the Information era Ethics Issues Corporate Code of IT Ethics Other Impacts.
Topic 5: Basic Security.
University of Sunderland Professionalism and Personal Skills Unit 8 Professionalism and Personal Skills Lecture 8: Professionalism and Ethics.
Information Warfare Playgrounds to Battlegrounds.
Do software developers have an ethical duty? KELLEN STUART.
Security and Ethics Safeguards and Codes of Conduct.
University of Sunderland MSc HIM Computer Legislation.
Computer Ethics 4 4 Chapter.  Ethics Pertaining to right or wrong in conduct  Ethical In accordance with the rules or standards for right conduct or.
Chapter 2 - Ethics for IT Professionals and IT Users1 Ethics for IT Professionals and IT Users 2 Chapter.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS.
Professional Ethics and Responsibilities Part-II
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Computer Ethics IT Fundamentals Battlefield High School.
Acceptable Use Policy (Draft)
Chapter 16 – Careers in Information Technology
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Unit 3- Introduction to Computer Ethics
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
CSCE 606: Licensing and Software Engineering Code of Ethics
CSCE 606: Licensing and Software Engineering Code of Ethics
Chapter 13 Security and Ethical Challenges.
CS-480b Network Security Dick Steflik
Presentation transcript:

Information Ethics Prof. Madya Dr. Rozinah Jamaludin 11 March 2010

In the mid 1940s, innovative developments in science and philosophy led to the creation of a new branch of ethics that would later be called “computer ethics” or “information ethics”. “Computer ethics” used to refer to a kind of professional ethics in which computer professionals apply codes of ethics and standards of good practice within their profession. Other more specific names, like “cyberethics” and “Internet ethics”, have been used to refer to aspects of computer ethics associated with the Internet.

computer ethics: namely, concern for protecting and advancing central human values, such a life, health, security, happiness, freedom, knowledge, resources, power and opportunity. The goal was to examine and push forward some of the major sub-areas of information and computer ethics; namely, computer security, computers and privacy, ownership of intellectual property, computing for persons with disabilities, and the teaching of computer ethics.

Example Topics in Computer Ethics Computers in the Workplace Computer Crime Privacy and Anonymity Intellectual Property Professional Responsibility Globalization The Metaethics of Computer Ethics

Computers in the Workplace economic incentives to replace humans with computerized devices are very high industrialized world many workers already have been replaced by computerized devices — bank tellers, auto workers, telephone operators, typists, graphic artists, security guards, assembly-line workers. workplace issue concerns health and safety.

Computer Crime computer “viruses” and international spying by “hackers”. Spafford, Heaphy and Ferbrache [Spafford, et al, 1989] divide into five aspects: 1.Privacy and confidentiality 2.Integrity — assuring that data and programs are not modified without proper authority 3.Unimpaired service 4.Consistency — ensuring that the data and behavior we see today will be the same tomorrow 5.Controlling access to resources

Malicious kinds of software, or “programmed threats”, provide a significant challenge to computer security. These include “viruses”, which cannot run on their own, but rather are inserted into other computer programs; “worms” which can move from machine to machine across networks, and may have parts of themselves running on different machines;

Another major risk to computer security is the so-called “hacker” who breaks into someone's computer system without permission. Some hackers intentionally steal data or commit vandalism, while others merely “explore” the system to see how it works and what files it contains.

Privacy and Anonymity Privacy - For example, in the mid-1960s the American government already had created large databases of information about private citizens (census data, tax records, military service records, welfare records, and so on). Both anonymity and privacy on the internet can be helpful in preserving human values such as security, mental health, self-fulfillment and peace of mind. Unfortunately, privacy and anonymity also can be exploited to facilitate unwanted and undesirable computer-aided activities in cyberspace, such as money laundering, drug trading, terrorism, or preying upon the vulnerable.

Intellectual Property software ownership three different types of ownership: copyrights, trade secrets, and patents. One can own the following aspects of a program: 1.The “source code” which is written by the programmer(s) in a high-level computer language like Java or C++. 2.The “object code”, which is a machine-language translation of the source code. 3.The “algorithm”, which is the sequence of machine commands that the source code and object code represent. 4.The “look and feel” of a program, which is the way the program appears on the screen and interfaces with users.

Professional Responsibility Computer professionals have specialized knowledge and often have positions with authority and respect in the community. Professional organizations in the USA, like the Association for Computing Machinery (ACM) and the Institute of Electrical and Electronic Engineers (IEEE), have established codes of ethics, curriculum guidelines and accreditation requirements to help computer professionals understand and manage ethical responsibilities.

Globalization Computer ethics today is rapidly evolving into a broader and even more important field, which might reasonably be called “global information ethics”. Global networks like the Internet and especially the world-wide-web are connecting people all over the earth. Global education- the have’s and the have’s not.

Thank Q.