INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS
ETHICS IN IT Ethics and Information Technology is a peer-reviewed journal dedicated to advancing the dialogue between moral philosophy in the field of information and communication technology (ICT). Ethics and Information Technology is a peer-reviewed journal dedicated to advancing the dialogue between moral philosophy in the field of information and communication technology (ICT).
ETHICAL PRINCIPLES PROPOTIONALITY: The good achieved by the technology must outweigh the harm or risk. INFORMED CONSENT: Those affected by the technology should understand and accept the risk. JUSTICE: The benefits and burdens of the technology should be distributed fairly. MINIMISED RISK: The technology must be implemented so as to avoid all unnecessary risk.
ETHICAL AND SOCIETAL DIMENSIONS OF IT The use of information technology in business has major impact on society, thus raises serious ethical considerations in the areas such as privacy,crime,health,working- condition, inividuality,employment. The use of information technology in business has major impact on society, thus raises serious ethical considerations in the areas such as privacy,crime,health,working- condition, inividuality,employment.
Ethical Dimensions of IT SOCIETAL SOLUTION PRIVACY EMPLOY -MENT CRIME WORKING CONDITION HEALTH ACCESSIBILITY ACCURACY
UNETHICAL PRACTISES CRIME IN THE COMPUTER MONEY THEFT SERVICE THEFT DATA THEFT MALICIOUS ACCESS COMPUTER VIRUS HEALTH ISSUES
CYBER ETHICS. SOFTWARE OWNERSHIP. CENSORSHIP.
HACKING Vs CRACKING Hacking means Hacking means A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. Bjarne Stroustroup - author of C++ and Bill gates. Bjarne Stroustroup - author of C++ and Bill gates.
CRACKING CRACKING One who breaks security on a system. One who breaks security on a system. They are aware of the in and outs of the computer technology,they exploit this knowledge for criminal activities They are aware of the in and outs of the computer technology,they exploit this knowledge for criminal activities
Threats to Privacy through (cracking) Identity Theft Identity Theft –ATM PINs –Social Security Numbers
UNETHICAL PRACTISES UNETHICAL PRACTISES CRIME CRIME It is the threat caused by the criminal or irresponsible actions of computer users who are taking advantage of the widespread use computer network in our society. It is the threat caused by the criminal or irresponsible actions of computer users who are taking advantage of the widespread use computer network in our society. Eg:- Eg:- Someone breaks into computers at IBM,Sprint,and ISP and sends an mail bomb thousands of angry e- mail messages to Wired magazines and Newsday reporters jamming their internet mailbox. Someone breaks into computers at IBM,Sprint,and ISP and sends an mail bomb thousands of angry e- mail messages to Wired magazines and Newsday reporters jamming their internet mailbox.
Junk Junk –Spam –Flaming –Non-repliable Messages
MONEY THEFT It is the Fraudulent activities done by certain It is the Fraudulent activities done by certain users to make money by using IT. users to make money by using IT. It involves alteration of computer databases It involves alteration of computer databases to cover the track of employees involved. to cover the track of employees involved. Eg:- Eg:- In 1994 a Russian Hacker Vladimir Levi in St.Petersburg used the internet to In 1994 a Russian Hacker Vladimir Levi in St.Petersburg used the internet to electronically break into Citibank’s mainframe electronically break into Citibank’s mainframe system in New York and stealed $11million. system in New York and stealed $11million.
SERVICE THEFT Unauthorized use of computers and network is termed as service theft(cracking). Unauthorized use of computers and network is termed as service theft(cracking). For solving the problems of unauthorized use a network monitering software called sniffers are used. For solving the problems of unauthorized use a network monitering software called sniffers are used. Eg:- In 1996 the Sandia National Labs,New Mexico found their employees,contractors,and student incerns were disciplined for viewing and using certain sites for personal use in company hours. Eg:- In 1996 the Sandia National Labs,New Mexico found their employees,contractors,and student incerns were disciplined for viewing and using certain sites for personal use in company hours.
SOFTWARE THEFT Unauthorized copying of softwares and software piracy is known as software theft. Unauthorized copying of softwares and software piracy is known as software theft. It includes the copying of original installation,drivers by certain profit- motivated people intended to sell it to market on largescale. It includes the copying of original installation,drivers by certain profit- motivated people intended to sell it to market on largescale. Eg:- Eg:- The Various Operating system,antivirus utilities being pirated and sold across worldwide. The Various Operating system,antivirus utilities being pirated and sold across worldwide.
CYBER ETHICS Cyberethics is a branch of ethics that studies ethical dilemma brought on by the emergence of digital technologies. The emergence of personal computers and the internet have led to conflicts over privacy, intellectual property rights, software ownership, censorship, and sexuality. Cyberethics is a branch of ethics that studies ethical dilemma brought on by the emergence of digital technologies. The emergence of personal computers and the internet have led to conflicts over privacy, intellectual property rights, software ownership, censorship, and sexuality.
SOFTWARE OWNERSHIP Software ownership is an issue related to intellectual property rights.The argument made that restrictions are required because companies would not invest weeks and months in development if there is no incentive for revenue generated from sales and licensing fees. Proponents for open source believe that all programs should be available to anyone who wants to study them. Software ownership is an issue related to intellectual property rights.The argument made that restrictions are required because companies would not invest weeks and months in development if there is no incentive for revenue generated from sales and licensing fees. Proponents for open source believe that all programs should be available to anyone who wants to study them.
What are unethical in IT? Seeks to gain unauthorized access to the resources of the Internet. Seeks to gain unauthorized access to the resources of the Internet. Disrupts the intended use of the Internet. Disrupts the intended use of the Internet. Wastes resources (people, capacity, computer) through such actions. Wastes resources (people, capacity, computer) through such actions. Destroys the integrity of computer-based information, or Destroys the integrity of computer-based information, or Compromises the privacy of users. Compromises the privacy of users.
Ten Commandments of Computer Ethics The ethical values as defined in 1992 by the Computer Ethics Institute… The ethical values as defined in 1992 by the Computer Ethics Institute… They are They are Thou shalt not use a computer to harm other people. Thou shalt not use a computer to harm other people.
Thou shalt not interfere with other people's computer work. Thou shalt not interfere with other people's computer work. Thou shalt not snoop around in other people's computer files. Thou shalt not snoop around in other people's computer files. Thou shalt not use a computer to steal. Thou shalt not use a computer to steal.
Thou shalt not use a computer to bear false witness. Thou shalt not use a computer to bear false witness. Thou shalt not copy or use proprietary software for which you have not paid. Thou shalt not copy or use proprietary software for which you have not paid. Thou shalt not use other people's computer resources without authorization or proper compensation. Thou shalt not use other people's computer resources without authorization or proper compensation. Thou shalt not appropriate other people's intellectual output. Thou shalt not appropriate other people's intellectual output.
Thou shalt think about the social consequences of the program you are writing or the system you are designing. Thou shalt think about the social consequences of the program you are writing or the system you are designing. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans (Computer Ethics Institute, 1992). Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans (Computer Ethics Institute, 1992).
SOLUTIONS SOCIETAL SOLUTIONS SOCIETAL SOLUTIONS WHISTLE BLOWING WHISTLE BLOWING YOU AND ETHICAL RESPONSIBILITY YOU AND ETHICAL RESPONSIBILITY GOVERNMENTAL CONTROL GOVERNMENTAL CONTROL
CONCLUSION Today Information Technology drives the business world,and there is the need of ethics in IT for the good and smooth running of business. Today Information Technology drives the business world,and there is the need of ethics in IT for the good and smooth running of business.