Download presentation
Presentation is loading. Please wait.
Published byNathaniel Weaver Modified over 9 years ago
1
Prepare by : Salameh ahmad al_khawaldeh Layth ahmad al_rababah
2
2 Objective Ethical Issues Ethical Issues What is Ethics? What is Ethics? Major Threats Major Threats Improving the Climate Improving the Climate Code of Ethics Code of Ethics Self-Assessment Self-Assessment Privacy Factor Privacy Factor Legal Issues Legal Issues Liability Question Basis of Liability Copyrights & Trademarks Website – Product / Service? Warranties Strict Liability Taxation Issues New technology new ethical problems New technology new ethical problems Example Example Information Technology Ethical challenges Information Technology Ethical challenges Challenges: Web Design Challenges: Web Design Challenges: Commerce Challenges: Commerce Challenges: Workplace Challenges: Workplace Challenges: Speech Challenges: Speech Challenges: Computing Resource Abuse Challenges: Computing Resource Abuse Challenges: Privacy Challenges: Privacy Challenges: Intellectual Property Challenges: Intellectual Property Challenges: Other Challenges: Other
3
3 What is ethic? Fairness, justice, equity, honesty, trustworthiness & equality Fairness, justice, equity, honesty, trustworthiness & equality Subjective Subjective B D C A Legal ImmoralMoral Illegal
4
4 Major threats Faster computers & networks Faster computers & networks Sophisticated telecommunications & routers Sophisticated telecommunications & routers Massive distributed databases Massive distributed databases Eases of access to information & knowledge base Eases of access to information & knowledge base Transparency of software Transparency of software
5
5 Improving the climates Top management support Top management support Code of ethics Code of ethics Ethics training program Ethics training program Motivation to focus on honesty & integrity Motivation to focus on honesty & integrity
6
6 WHERE TO START Bottom-up Bottom-up Inculcates ethics behavior at the employee level with full support of top management Inculcates ethics behavior at the employee level with full support of top management Top-down Top-down The actions of the company start with the CEO The actions of the company start with the CEO Extend to a variety of stakeholders Extend to a variety of stakeholders
7
7 Code of ethics A declaration of principles and beliefs that govern how employees of a corporation are to behave A declaration of principles and beliefs that govern how employees of a corporation are to behave Inspirational & disciplinary Inspirational & disciplinary All-compassing & stable over time All-compassing & stable over time
8
8 Self- Assessment A question-and-answer procedure A question-and-answer procedure Allows individuals to appraise & understand their personal knowledge about a particular topic Allows individuals to appraise & understand their personal knowledge about a particular topic An educational experience An educational experience
9
9 Privacy factor Notice Notice Right to be told in advance Right to be told in advance Choice Choice Final say regarding the use of personal info Final say regarding the use of personal info Access Access Access & correct any personal info Access & correct any personal info Security/integrity Security/integrity Enforcement Enforcement Backed by the courts if any principles are violated Backed by the courts if any principles are violated
10
10 THE LIABILITY QUESTION Liability of Designer Liability of Designer Nontrivial errors Nontrivial errors Out-of-bound errors Out-of-bound errors Liability of User Liability of User Passive negligence Passive negligence Basis of Liability Basis of Liability Tort law Tort law Product liability Product liability
11
11 TORT LAWS ON INTERNET Settling contract problems between e-merchants & ISP Settling contract problems between e-merchants & ISP Fraud – intent to deceive Fraud – intent to deceive Negligence – failing to make certain action causing injury / material losses Negligence – failing to make certain action causing injury / material losses False advertising False advertising Misrepresentation – claiming a product will perform certain functions when it could not Misrepresentation – claiming a product will perform certain functions when it could not Trademark violations – under intellectual property law Trademark violations – under intellectual property law
12
12 COPYRIGHT Copyrights Copyrights Ownership of an original work created by an author Ownership of an original work created by an author A form of intellectual property protection covers the ‘look & feel’ and content of printed media A form of intellectual property protection covers the ‘look & feel’ and content of printed media Gives author the right to exclude others from using the finished work Gives author the right to exclude others from using the finished work Good for life of its author + 70 years Good for life of its author + 70 years
13
13 TRADEMARK / TRADE NAME A word / symbol distinguishing a good from other goods in the market A word / symbol distinguishing a good from other goods in the market A maze of federal & state laws A maze of federal & state laws Web designer – ‘work made for hire’ Web designer – ‘work made for hire’
14
14 WEBSITE – PRODUCT/SERVICE? Product Product Software sold off the shelf Software sold off the shelf Uniform Commercial Code (UCC) allows developer to limit liability for defective websites though a disclaimer of warranties Uniform Commercial Code (UCC) allows developer to limit liability for defective websites though a disclaimer of warranties Service Service Custom-designed software Custom-designed software Negligence principles should be usede Negligence principles should be usede
15
15 WARRANTIES Assurance made by seller about the goods sold Assurance made by seller about the goods sold Express warranty Express warranty Offered orally or in writing by maker of products Offered orally or in writing by maker of products Implied warranty Implied warranty Arises automatically when a sale is made Arises automatically when a sale is made Merchantability Merchantability Disclaimer Disclaimer Seller’s intention to protect the business from unwanted liability Seller’s intention to protect the business from unwanted liability http://www.microsoft.com/misc/info/cpyright.htm http://www.microsoft.com/misc/info/cpyright.htm http://www.microsoft.com/misc/info/cpyright.htm
16
16 STRICT LIABILITY Joint & several liability for developers, manufacturers & distributors if tort theory applies Joint & several liability for developers, manufacturers & distributors if tort theory applies Protects web visitor regardless of whether anyone is at fault Protects web visitor regardless of whether anyone is at fault
17
17 TAXATION ISSUES Controversial Controversial Different jurisdiction Different jurisdiction Consumers’ reaction Consumers’ reaction
18
18 New technology = new ethical problems Traditional rules of conduct are not always applicable to a new medium Traditional rules of conduct are not always applicable to a new medium A question that often arises: Should a device, a technique or technology be restricted because people can use it for illegal or harmful actions as well as beneficial ones? A question that often arises: Should a device, a technique or technology be restricted because people can use it for illegal or harmful actions as well as beneficial ones?
19
19 Example Mobile phones with cameras. Pupils at school take photos of other pupils in the shower, and publish the pictures on the Internet. Discuss. How to deal with this? Discuss. How to deal with this?
20
Information Technology Ethical Challenges
21
21 Challenges: Code of Ethics No Form of licensing for computer professionals No Form of licensing for computer professionals Results in no real way to enforce ethical standards within the computing field Results in no real way to enforce ethical standards within the computing field There is movement within the industry to create a licensing process but there are many issues to be resolved There is movement within the industry to create a licensing process but there are many issues to be resolved What will be included on the exam? What will be included on the exam? How often will an IT professional be required to renew the license? How often will an IT professional be required to renew the license? Developed by several organizations Developed by several organizations Adoption Adoption Implementation Implementation Monitoring Monitoring Example: http://www.acm.org/constitution/code.html Example: http://www.acm.org/constitution/code.htmlhttp://www.acm.org/constitution/code.html
22
22 Challenges: Web Design Implementation of features Implementation of features Pop ups Pop ups Blocking/filters Blocking/filters Aliases and redirecting Aliases and redirecting Cookies Cookies Privacy policies Privacy policies Security policies Security policies Spyware Spyware Use of other design features Use of other design features Javascript Javascript Graphics - pictures, buttons, logos, icons Graphics - pictures, buttons, logos, icons Content Content Design layout Design layout Accountability/responsibility Accountability/responsibility Outdated material, inaccurate material Outdated material, inaccurate material
23
23 Challenges: Commerce Fraud Fraud Taxation Taxation Free Trade Free Trade Gambling Gambling Auctions Auctions Spamming Spamming Who were Canter and Siegel? Who were Canter and Siegel? Spamming cell phones? Spamming cell phones? Term papers for sale Term papers for sale Atlanta Journal Constitution article Atlanta Journal Constitution article
24
24 Challenges: Workplace Accessibility Accessibility Ergonomics Ergonomics Outsourcing Outsourcing Telecommuting Telecommuting Customer relationships – Vendor relationships Customer relationships – Vendor relationships Should IT professionals be in the ethics business or should other areas of the business handle these issues? Should IT professionals be in the ethics business or should other areas of the business handle these issues? Monitoring Monitoring Should your employer have the right to monitor private email messages? Should your employer have the right to monitor private email messages? What are the two most popular Web sites for American workers? Playboy and ESPN What are the two most popular Web sites for American workers? Playboy and ESPN
25
25 Challenges:Workplace 62% of employers monitor employees' eMail and Internet use. 62% of employers monitor employees' eMail and Internet use. 68% cite legal liability as the primary reason to monitor. 68% cite legal liability as the primary reason to monitor. 87% of companies that monitor have a written eMail Policy, 87% of companies that monitor have a written eMail Policy, 83.1% an Internet Policy, 83.1% an Internet Policy, 68% a Software Policy. 68% a Software Policy. 51% of employers have disciplined or terminated employees for violating ePolicy. 51% of employers have disciplined or terminated employees for violating ePolicy. 35% of organizations have eMail retention & deletion policies in place. 35% of organizations have eMail retention & deletion policies in place. 10% of companies have been ordered by courts to turn over employee eMail related to workplace lawsuits. 10% of companies have been ordered by courts to turn over employee eMail related to workplace lawsuits. 8.3% of organizations have battled sexual harassment and/or sexual discrimination claims stemming from employee e-mail and/or Internet use. 8.3% of organizations have battled sexual harassment and/or sexual discrimination claims stemming from employee e-mail and/or Internet use. Source: The 2001 Electronic Policies & Practices Survey from The American Management Association, US News & World Report, and The ePolicy Institute-Click Here for Survey Results.
26
26 Music Downloads Risk of getting caught Risk of getting caught Studies have shown that a majority of the people who share music on the Internet are aware that their actions are illegal, said Michael McGuire, a analyst with the Gartner Group. ``But they also know that the chances of getting caught are pretty remote'' Studies have shown that a majority of the people who share music on the Internet are aware that their actions are illegal, said Michael McGuire, a analyst with the Gartner Group. ``But they also know that the chances of getting caught are pretty remote'' Why is “getting caught remote”? Why is “getting caught remote”? There are an estimated 60 million peer-to-peer network subscribers in the United States alone, with tens of millions more in other countries There are an estimated 60 million peer-to-peer network subscribers in the United States alone, with tens of millions more in other countries The RIAA is seeking out people who make their music files available for others to download. The RIAA is seeking out people who make their music files available for others to download. The networks have features that allow users to block others from downloading their files but allow them to continue to download files The networks have features that allow users to block others from downloading their files but allow them to continue to download files
27
27 Challenges: Speech Net Etiquette Net Etiquette Email privacy Email privacy Email privacy policy Email privacy policy “Flaming” – insulting, argumentative or chastising replies to messages “Flaming” – insulting, argumentative or chastising replies to messages Free Speech Free Speech Accountability and responsibility for web content Accountability and responsibility for web content Abortion sites Abortion sites Outdated information Outdated information Accurate information Accurate information Privacy and security policies Privacy and security policies Porn Porn Professors pc – filled with porn, found by pc maintenance workers Professors pc – filled with porn, found by pc maintenance workers Visa – won’t give permission to be used on offensive or pornographic sites Visa – won’t give permission to be used on offensive or pornographic sites Hate Hate MACHADO CASE MACHADO CASE Internet Filters Internet Filters Should filters be in schools or libraries, and /or should they be mandated by law? Should filters be in schools or libraries, and /or should they be mandated by law? Filters can also be set up to filter out other subjects, would this be an ethical violation? Filters can also be set up to filter out other subjects, would this be an ethical violation? Chain Letters Chain Letters
28
28 Challenges: Computing Resource Abuse Computers in the Workplace and the Classroom Computers in the Workplace and the Classroom Use or Abuse Use or Abuse Internet Access Internet Access Instant Messenger Instant Messenger Laptop use in the classroom Laptop use in the classroom Email Email Legal document Legal document Can be modified Can be modified Flaming Flaming Access Access Computer Usage policy Computer Usage policy Email policy Email policy
29
29 Challenges: Computing Resource Abuse Computer Crime Computer Crime Viruses Viruses Hackers Hackers Hackers Theft Theft “These cyber swindles and dot-cons present new challenges to law enforcement” said John Ashcroft “These cyber swindles and dot-cons present new challenges to law enforcement” said John Ashcroft US Charges 135 With Net Crimes US Charges 135 With Net Crimes US Charges 135 With Net Crimes US Charges 135 With Net Crimes
30
30 Challenges: Privacy Privacy issues are at the top of the list in regards to ethical use of information. Privacy issues are at the top of the list in regards to ethical use of information. Loss of control Loss of control Misuse of information Misuse of information Risk to physical privacy Risk to physical privacy Risk of identity theft (video) Risk of identity theft (video) Unwanted intrusions into daily life Unwanted intrusions into daily life USA Patriot Act (post 9/11) USA Patriot Act (post 9/11) Efforts to detect and deter terrorist activity Efforts to detect and deter terrorist activity Datamining corporate data Datamining corporate data Loss of business and risk of lawsuits due customers being outraged at their loss of data privacy Loss of business and risk of lawsuits due customers being outraged at their loss of data privacy Cookies Cookies Privacy policies Privacy policies
31
31 Challenges: intellectual Property Electronic Copyright Electronic Copyright Licensing Licensing Interoperability Interoperability Licensing Licensing Cyberlicenses Cyberlicenses Shrinkwrap Shrinkwrap Shareware Shareware Freeware Freeware MP3 MP3 RIAA court case against college students RIAA court case against college students University Internet Usage policies University Internet Usage policies Internet Downloads Internet Downloads Files Files Graphics Graphics Text Text
32
32 Challenges: Intellectual Property Patent, trade secrets, and copyright law Patent, trade secrets, and copyright law Who owns the program Who owns the program Who owns the algorithm Who owns the algorithm Software Piracy Software Piracy Why shouldn't I use pirated software? Who am I hurting by doing so? Why shouldn't I use pirated software? Who am I hurting by doing so? Piracy exists in everywhere. Piracy exists in everywhere. Loss of revenue hurts everyone. Loss of revenue hurts everyone. All software piracy is illegal and Software piracy is unethical. All software piracy is illegal and Software piracy is unethical. Various studies have found that the software industry loses approximately $12 billion every year. Various studies have found that the software industry loses approximately $12 billion every year. State Industry Study State Industry Study State Industry Study State Industry Study CD-RW CD-RW CD-RW
33
33 Challenges: Other Decision making using Expert Systems Decision making using Expert Systems Network Security Network Security Software accuracy and reliability who is ethically responsible? Software accuracy and reliability who is ethically responsible? Therac-25 Accidents Therac-25 Accidents Killer Robots Killer Robots The Hughes Whistleblowing Case The Hughes Whistleblowing Case
34
34 Conclusion: Some Ideas to Ponder Computer ethics today is now a global effort Computer ethics today is now a global effort The gap among the rich and poor nations, rich and poor citizens exists. How can it be eliminated or reduced eithically and morally to provide information and services that will move them to into the world of cyberspace? The gap among the rich and poor nations, rich and poor citizens exists. How can it be eliminated or reduced eithically and morally to provide information and services that will move them to into the world of cyberspace? Will the poor be cut off from job opportunities, education, entertainment, medical care, shopping, voting - because they cannot afford a connection to the global information network? Will the poor be cut off from job opportunities, education, entertainment, medical care, shopping, voting - because they cannot afford a connection to the global information network? Whose laws will apply in cyberspace when hundreds of countries are incorporated into the global network? Whose laws will apply in cyberspace when hundreds of countries are incorporated into the global network? What happened? Where did our knowing right from wrong go too? What happened? Where did our knowing right from wrong go too? Are we missing an opportunity to introduce ethics at an early age in children by not integrating these thoughts and practices in video games? Are we missing an opportunity to introduce ethics at an early age in children by not integrating these thoughts and practices in video games? Should more controls and regulations be introduced into the system? Will they actually help to improve our moral and ethical behavior? Should more controls and regulations be introduced into the system? Will they actually help to improve our moral and ethical behavior? Unethical behavior continues to permeate industry, what measures, policies, codes of conduct be changed to change this behavior? Unethical behavior continues to permeate industry, what measures, policies, codes of conduct be changed to change this behavior?
35
35 Works Cited: http://www.brook.edu/dybdocroot/its/cei/overview/Ten_Com manments_of_Computer_Ethics.htm http://www.brook.edu/dybdocroot/its/cei/overview/Ten_Com manments_of_Computer_Ethics.htm http://www.brook.edu/dybdocroot/its/cei/overview/Ten_Com manments_of_Computer_Ethics.htm http://www.brook.edu/dybdocroot/its/cei/overview/Ten_Com manments_of_Computer_Ethics.htm http://www.computingcases.org/case_materials/case_mater ials.html http://www.computingcases.org/case_materials/case_mater ials.html http://www.computingcases.org/case_materials/case_mater ials.html http://www.computingcases.org/case_materials/case_mater ials.html http://www.epolicyinstitute.com/ http://www.epolicyinstitute.com/ http://www.epolicyinstitute.com/ http://legacy.eos.ncsu.edu/eos/info/computer_ethics/ http://legacy.eos.ncsu.edu/eos/info/computer_ethics/ http://legacy.eos.ncsu.edu/eos/info/computer_ethics/ http://www.spa.org/piracy/ http://www.spa.org/piracy/ http://www.spa.org/piracy/ http://www.nd.edu/~rbarger/cases.html http://www.nd.edu/~rbarger/cases.html http://www.nd.edu/~rbarger/cases.html http://ksuweb.kennesaw.edu/~kschwaig/present.ppt http://ksuweb.kennesaw.edu/~kschwaig/present.ppt http://ksuweb.kennesaw.edu/~kschwaig/present.ppt
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.