Download presentation
Presentation is loading. Please wait.
Published byOlivia McKenzie Modified over 9 years ago
1
© Paradigm Publishing, Inc. 14-1 Chapter 14 Computer Ethics Chapter 14 Computer Ethics
2
© Paradigm Publishing, Inc. 14-2 Presentation Overview The Role of Ethics Privacy Protection Issues Property Protection Issues Personal and Social Issues Defining Software Companies’ ResponsibilitiesDefining Software Companies’ Responsibilities Developing Personal Ethical Guidelines
3
© Paradigm Publishing, Inc. 14-3 The Role of Ethics What are ethics? –Ethics are the rules we use to determine the right and wrong things to do in our lives. –Normative ethics involves determining a norm of ethical rule that underlies ethical behavior. –Applied ethics refers to the application of normative ethical beliefs to real-life issues. –Computer ethics deals with ethical issues related to computers.
4
© Paradigm Publishing, Inc. 14-4 The Role of Ethics The Source of Ethics –In moral realism, ethical principles are thought to have objective foundations; that is, they are not based on subjective human reasoning. –In moral relativism (also known as situational ethics), ethical issues are thought to be subjective.
5
© Paradigm Publishing, Inc. 14-5 Privacy Protection Issues Public Information Availability –Database companies comb personal information such as birth records and marriage licenses and provide this information to anyone with a credit card and access to the Web. –Other personal information such as salaries, and controversial information such as criminal records and sex offender information, also appears on the Internet.
6
© Paradigm Publishing, Inc. 14-6 Privacy Protection Issues Threats to Privacy from Interception of Wireless Communications –Wireless communications devices are extremely vulnerable to interception by others. –Traditional methods of computer security don’t work well for wireless devices. Wireless devices often don’t require authentication to ensure the identity of the user and the device. Encryption technology doesn’t work well because of the devices’ limited battery power and memory.
7
© Paradigm Publishing, Inc. 14-7 Privacy Protection Issues Commercial Threats to Privacy Cookies A cookie is a small data file created and placed on a computer’s hard drive by a Web site. They are meant for the convenience of Internet users and can remember user IDs and passwords. They can also be used to record user interests and preferences, which can then be used by companies to target advertisements.
8
© Paradigm Publishing, Inc. 14-8 Privacy Protection Issues Commercial Threats to Privacy Global Unique Identifiers A global unique identifier (GUID) is an identification number that can be coded into both hardware and software. The use of GUIDs would eliminate any anonymity Internet users now enjoy. With GUIDs, it would always be possible to track down the originators of unpopular or controversial messages—a severe blow to Internet privacy.
9
© Paradigm Publishing, Inc. 14-9 Privacy Protection Issues Commercial Threats to Privacy Location Tracking Most cell phones are equipped with Global Positioning System (GPS) chips that can pinpoint their locations. GPS chips are useful as navigational aids and monitoring devices, and can promote safety. GPS chips and other location tracking technology can also be used to target advertisements and to figure out where any person is at any given time, which can encroach on the right to privacy.
10
© Paradigm Publishing, Inc. 14-10 Privacy Protection Issues Protection from Commercial Threats to Privacy Industry Self-Regulation A privacy statement promises that an e-tailer will protect the confidentiality of any information a customer reveals. –Third-party organizations like the BBBOnLine lend greater credibility to privacy statements. New software lets users designate that files sent to others have one-time-only viewing rights, cannot be copied, or can only be viewed for a few hours’ time.
11
© Paradigm Publishing, Inc. 14-11 Privacy Protection Issues Major Privacy Protection Laws
12
© Paradigm Publishing, Inc. 14-12 Privacy Protection Issues Major Privacy Protection Laws (continued)
13
© Paradigm Publishing, Inc. 14-13 Privacy Protection Issues Government Threats to Privacy Eavesdropping To better monitor e-mail messages, the FBI developed a series of Internet wiretap programs named Omnivore, Carnivore, and DCS1000. The USA PATRIOT Act allows law enforcement agencies to eavesdrop on private telephone messages and to intercept and read e-mail messages. Some fear that innocent messages will be misinterpreted, resulting in criminal charges.
14
© Paradigm Publishing, Inc. 14-14 Privacy Protection Issues Government Threats to Privacy Encryption Restrictions Encryption software makes it harder for the government to monitor e-mail messages. The FBI has warned that its role in protecting the nation will be negatively affected by this. The NSA restricted the use of encryption programs for many years, but control was loosened due to commercial interests in protecting consumer data. Given the rapid advances in technology, government control of encryption probably will not be effective.
15
© Paradigm Publishing, Inc. 14-15 Privacy Protection Issues Workplace Threats to Privacy Software programs allow employers to monitor employees by Tracking the number and type of keystrokes employees enter on their keyboards Reading messages sent and received Capturing what is on an employee’s computer screen at a given time
16
© Paradigm Publishing, Inc. 14-16 Privacy Protection Issues Protection from Workplace Threats to Privacy –If a company has pledged to respect any aspect of employee privacy, it must keep that pledge. –Privacy advocates and the American Civil Liberties Union (ACLU) question the need to monitor employees without warning and without limit.
17
© Paradigm Publishing, Inc. 14-17 Privacy Protection Issues Fair Electronic Monitoring Policy for Employers (proposed by the ACLU)
18
© Paradigm Publishing, Inc. 14-18 Property Protection Issues Intellectual Property –Intellectual property includes anything that can be created by the human mind. –A patent awards ownership of an idea or invention to its creator for a fixed number of years. This allows the inventor the right to charge others for the use of the invention. –A copyright protects artistic and literary endeavors.
19
© Paradigm Publishing, Inc. 14-19 Property Protection Issues Intellectual Property The World Intellectual Property Organization (WIPO) is a specialized agency of the United Nations dealing with intellectual property rights. The WIPO administers international treaties dealing with intellectual property. The WIPO divides intellectual property into two categories: industrial property and copyright.
20
© Paradigm Publishing, Inc. 14-20 Property Protection Issues WIPO Intellectual Property Classifications
21
© Paradigm Publishing, Inc. 14-21 Property Protection Issues Fair Use Under Fair Use law, it is permissible to use another person’s material without permission as long as this use Is acknowledged Is for noncommercial purposes Involves only limited excerpts of protected material
22
© Paradigm Publishing, Inc. 14-22 Property Protection Issues Fair Use and the Digital Millennium Copyright Act The Digital Millennium Copyright Act (DMCA) brings U.S. copyright law in line with WIPO treaties to which the U.S. is a signatory. It prohibits the circumventing of copyright protection systems. It clarifies the concept of Fair Use for digital works. It deals with the issue of an ISP’s liability for hosting copyrighted materials.
23
© Paradigm Publishing, Inc. 14-23 Property Protection Issues Damage Due to Hacking, Phishing, and Viruses –Identity theft is theft of personal data which is then used to assume that person’s identity and make purchases in his or her name. –Phishing uses sophisticated tricks to “fish” for users’ financial information and passwords. –Viruses cause damage to a user’s computer or the software running on it.
24
© Paradigm Publishing, Inc. 14-24 Property Protection Issues Protection from Hacking, Phishing, and Viruses Consumers can protect themselves by Dealing only with merchants who encrypt credit card numbers and other private data Never opening e-mails from unknown sources Installing antivirus programs to destroy viruses Installing firewall software to protect against Internet-connected computer hackers
25
© Paradigm Publishing, Inc. 14-25 Personal and Social Issues Gambling Online –Online gambling is attracting a growing number of gamblers, including teenagers. –The Internet gambling industry is based almost entirely outside the United States. –The U.S. House of Representatives passed legislation allowing authorities to work with Internet providers to block access to online gambling and prevent users from using credit cards to gamble.
26
© Paradigm Publishing, Inc. 14-26 Personal and Social Issues Protecting Freedom of Speech –Hate speech sites incite hatred against people of certain races, religions, or beliefs. They may also post dangerous material such as information for making drugs or bombs. –Cyberbullying is sending harassing texts, e- mail messages, or photos with the purpose of harming another person’s reputation. –Pornography sites contain sexually explicit material or script deemed harmful by society.
27
© Paradigm Publishing, Inc. 14-27 Personal and Social Issues Protecting Against Unwanted Material –The Child Protection Pornography Prevention Act of 1996 enacts harsh penalties for those distributing or possessing child pornography. –The Children’s Internet Protection Act (CIPA) requires public schools and libraries to install Internet filtering software on their computers.
28
© Paradigm Publishing, Inc. 14-28 Personal and Social Issues Protecting Against Unwanted Material –A filtering program can prevent access to sites, keep track of sites visited, limit connection time, etc. Certain organizations provide schools with guidelines for evaluating Internet filtering programs. –The Consortium for School Networking recommends that every school adopt an acceptable use policy to guide Internet use.
29
© Paradigm Publishing, Inc. 14-29 Personal and Social Issues Bridging the Digital Divide –The gap between those who have access to computers and the Internet and those who do not has been called the digital divide. –Only 5 percent of the population in developing countries has Internet access.
30
© Paradigm Publishing, Inc. 14-30 Personal and Social Issues Demographics of U.S. Internet Users According a 2008 report by the Pew Internet & American Life Project, English-speaking Hispanic Americans lead the U.S. in Internet usage, with 80 percent online. Caucasian Americans – 75% African Americans – 59% Spanish-dominant Hispanics – 32%
31
© Paradigm Publishing, Inc. 14-31 Defining Software Companies’ Responsibilities Protecting Against Poorly Designed Software –Bad software costs U.S. businesses an estimated $100 billion in lost productivity annually. –Customers may sue if bad software causes damages, but a better solution is for companies to produce better software in the first place.
32
© Paradigm Publishing, Inc. 14-32 Defining Software Companies’ Responsibilities Improving Accessibility –In late 2000, the government issued new rules requiring almost all government websites to be fully accessible to the disabled. –Hardware must also be adapted to accommodate the disabled. Apple Computer has pioneered these efforts with the invention of the “sticky keys” feature.
33
© Paradigm Publishing, Inc. 14-33 Defining Software Companies’ Responsibilities Software Engineering Code of Ethics and Professional Practice
34
© Paradigm Publishing, Inc. 14-34 Developing Personal Ethical Guidelines All Internet users should read, think about, and consider adapting for their own use a computer code of ethics. The following are the top ten themes found in effective codes of ethics:
35
© Paradigm Publishing, Inc. 14-35 On the Horizon Based on the information presented in this chapter and your own experience, what do you think is on the horizon?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.