Ethics: Standards of Information Age Conduct

Download Report

Transcript Ethics: Standards of Information Age Conduct

Copyright © 2003 Prentice Hall, Inc
Slides created by Bob Koziel
Spotlight 5: Ethics:
Standards of Information
Age Conduct
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
Computer Ethics


Ethics is the branch of philosophy concerned
with what’s right or wrong.
Computer ethics deals with computing-related
moral dilemmas and the ethical principals for
computer professionals.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
3
Avoiding: Computer-Related
Legal Problems


Most organizations have an Acceptable Use
Policy for computer use.
Types of legal problems that arise from
computer use include:



Plagiarism
Software Piracy
Copyright Infringement
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
4
Plagiarism




Plagiarism is the use of someone else’s
intellectual property.
Intellectual property refers to an individual’s
rights in creating original works.
Copyright infringement is plagiarizing
copyrighted material.
Legal implications of plagiarism:


Dismissal from school
Law suits
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
5
Software Piracy


Public domain software can be copied, sold, and
modified.
Shareware is copyrighted software.



Trial versions can be copied.
Shareware is meant to be evaluated for a period of
time and then a registration fee is paid for
continued use.
Commercial software is copyrighted.


You must purchase the software in order, to use it.
Organizations purchase a site license to use the
software on all of their computers.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
6
Illegal Software Actions





Selling software that contains all or part of a
commercial software program.
Using shareware beyond the evaluation period.
Violating the terms of a software license.
Making copies of site-licensed programs for
personal use.
Giving or selling commercial software to others.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
7
Copyright Infringement


An increasing number of Internet users are making
illegal copies of music.
Rationalizations copyright violators use:




It’s OK to download MP3 files if I only keep them for 24
hours.
It’s free advertising for the band.
It’s legal because I don’t charge any money for sharing
them.
Fair use doctrine states that a brief selection from
copyrighted work can be used for commentary, parody,
news reporting, research, and education.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
8
Introducing Ethics



Ethics is concerned with what’s right or wrong in
moral dilemma contexts.
Ethical principals help people through moral
dilemmas.
Computer ethics deal with the ethical principals
associated with moral dilemmas caused by
computer use.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
9
Computer Ethics for Computer
Users

When using the college’s computers:



Respect yourself.
Respect others.
Respect academic integrity.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
10
Ten Commandments of
Computer Ethics
1.
2.
3.
4.
5.
6.
Thou shalt not use a computer to harm other people.
Thou shalt not interfere with other people’s computer work.
Thou shalt not snoop around in other people’s files.
Thou shalt not use a computer to steal.
Thou shalt not use a computer to bear false witness.
Thou shalt not copy or use proprietary software for which
you have not paid.
7. Thou shalt not use other people’s computer resources
without authorization or proper compensation.
8. Thou shalt not appropriate other people’s intellectual output.
9. Thou shalt think about the social consequences of the
program you write or the system you design.
10.Thou shalt use a computer in ways that show consideration
and respect for your fellow humans.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
11
Netiquette

Netiquette refers to the guidelines that involve
showing respect for others and yourself while
being online.
Copyright © 2003 Prentice Hall, Inc
I
NEXT
SLIDE
12
Mailing List Netiquette






Read the discussions for the past few days
before posting questions.
Read the Frequently Asked Questions (FAQs) list
before posting questions.
Don’t belittle people for grammatical errors.
Don’t post inflammatory messages.
When agreeing with something don’t waste
others time by saying “Me too.”
Learn how to unsubscribe from the list.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
13
E-Mail Netiquette










Promptly respond to messages.
Delete messages after you read them.
Don’t send messages you wouldn’t want others to read.
Speak of others professionally and courteously.
Run you computer’s anti-virus program on any e-mail
received or sent.
Keep the message short and to the point.
Don’t type in all capital letters.
Spell check your message before sending it.
Be careful with sarcasm and humor in your message.
Be mindful when you request a return receipt.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
14
Internet Relay Chat Netquette






Learn the commonly used abbreviations.
Listen to the discussion for a while before joining
it.
Don’t flood the channel with text.
Don’t harass others with unwanted invitations.
Be careful if you are asked to type in a
command. It may be a trick.
Use the ignore command when being bothered.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
15
Computer Ethics for Computer
Professionals



The field of computer ethics specifies ethical
codes for computing professionals.
Computer professionals create products that
affect people and may expose them to risk.
The core of a computer professional’s code of
ethics is to preserve and protect human life from
harm.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
16
The ACM Code of Conduct


The Association for Computing Machinery (ACM)
developed an innovative code of conduct.
According to the ACM code, a computing professional:








Contributes to society and human well-being
Avoids harm to others
Is honest and trustworthy
Is fair and takes action not to discriminate on the basis of
race, sex, religion, age, disability, or national origin
Honors property rights, including copyrights and patents
Gives proper credit when using the intellectual property of
others
Respects other individuals’ rights to privacy
Honors confidentiality
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
17
Programmer Liability




Programmers can produce programs with errors.
Computer experts agree that the liability for a
program failure should be shared among the
programmer, software company, and the
organization that buys the software.
A new field called software engineering is
applying the principles of mainstream
engineering to software production.
Fault-tolerant systems are being developed that
continue working when a problem occurs.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
18
Computer Ethics in Business

A business must protect its data from:






Loss or damage
Misuse or error
Unauthorized access
Backup procedures are used to protect data
from loss.
It is the organization’s responsibility to ensure
that its data is as complete as possible.
Divulging customer data without asking
permission is considered unethical behavior by
privacy advocates.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
19
Whistle-blowing


Whistle-blowing refers to employees reporting
their company’s dangerous or illegal acts to
regulatory agencies or the press.
Some laws exist to protect whistle-blowers but
many find themselves unemployed and
blacklisted.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
20
THE
END
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
21