Transcript Chapter7b

Chapter 7B
Computing Ethics
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.
2
Learning Objectives
7.5
Explain the terms copyright and fair use, and
list common ways that copyrights are violated
for software, music, and images
7.6 List at least three preferred behaviors
prescribed by netiquette, and contrast the
ethical versus unethical use of online student
resources
7.7 Describe ethical and unethical ways that
computers are used at work
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.
3
Piracy vs. Forgery
• Piracy: In the context of computing, acquiring copies
of protected digital creations without the permission
of the creator
– Among the most widespread forms of unethical
computer use
• Forgery: making copies that appear to be real and
selling those copies to unsuspecting buyers as
legitimate products
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.
4
Intellectual Property
• Intellectual property: Ideas, writing, music, art and
other kinds of mind-based products intended to be
used in a commercial way
– Piracy is stealing
intellectual property
– Evidence of theft may
not be obvious
– Intellectual-property laws
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.
5
Copyright and Fair Use
• Copyright: A legal concept that grants rights and
control to the owner of any published work
• Fair use: A limited set of circumstances in which
copyrighted material can be used without first
obtaining permission
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.
6
Copyright Lifetimes
• Copyright lasts for the life of the creator and 70
years after the person’s death
• Anything published before 1923 in the United States
is considered not to be copyrighted
• When a copyright expires, the work enters the public
domain
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.
7
Software Licensing
• Personal software license: Legal permission granted
to one person to use the program
• Multi-user license: Legal permission to install and
use a program on a certain number of computers
– Site license: Allows the software to be installed and used
on any computer in a building or corporate campus
– Enterprise license: Permits installation and use on any
computer within a company
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.
8
Software Piracy
• End-user piracy: A legitimate purchaser makes
unauthorized copies
• Internet piracy: Use of the Web and Internet
resources to host and distribute software copies
• Manufacturer piracy: Installation of unauthorized
copies of a program onto the manufacturer’s
computers
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.
9
Protections Against Piracy
• Focus on mitigating damage from piracy
• Dongle: Hardware device that is included with
software and plugs into a computer port
• Software-based copy protection
• Internet-based copy protection
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.
10
Downloading and Sharing Music
• Most media sharing systems are based on peer-topeer networks
– The bitTorrent protocol links users to cooperatively
contribute small pieces of the complete file to the copier
• Some people see file sharing as a clear violation of
others’ ownership rights
• Other people see no harm in file sharing
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.
11
Other Legal and Social Risks
• Nothing posted on the Internet is truly private
• Spiders or Web crawlers: Automated software
programs run by search engine and other companies
to constantly sift through, catalog, and sometimes
store information they find on websites
• Minimize personally identifying information
• Incendiary opinions and hateful speech can come
back to haunt the writer years later
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.
12
Personal Computing Ethics
• Computer misuse and abuse
– Hacking
• Netiquette: The set of online behaviors considered
polite and proper
– Discourages abusive speech, rudeness
• Acceptable use policy (AUP): Document that
attempts to encode and formalize the practice of
ethical computer use for an institution or company
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.
13
Personal Computing Ethics
• Online student notes and essay databanks
– Many school-related websites
are legitimate and beneficial
– Other sites support cheating and
the illusion of accomplishment
– Efforts to stop cheatingSome schools require
students to submit work
to services like Turnitin
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.
14
Professional Computing Ethics
• While employees are being paid, they should be
focused on work
• Personal use of company computers also can create
risks for companies
• Employer protections:
– Creating AUPs that identify forbidden and permitted
behaviors
– Tracking employees’ keystrokes and Web activity
– Monitoring e-mail and other communications
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.
15
Workplace Electronic Communication
• General principles apply:
– Thinking before speaking
– Treat others with respect
• Workplace communication generally has to meet a
higher standard of politeness
• Inappropriate types of workplace communication
– Carelessly sharing nonprofessional material
– E-mail with complaints that should be kept private
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.
16
Whistleblowing
• Whistleblowing: Pointing out a major internal
problem
– Although it tends to reflect high ethical concerns, it can
make life difficult for the whistleblower.
– State and federal laws protect whistleblowers in some
situations
– Any complaints should be fully documented and pursued
through proper channels
© 2013 by the McGraw-Hill Companies, Inc. All rights reserved.