Date post: | 24-Dec-2015 |
Category: |
Documents |
Upload: | nathaniel-weaver |
View: | 221 times |
Download: | 0 times |
22WWWWWW
ObjectiveObjective Ethical IssuesEthical Issues
What is Ethics?What is Ethics? Major ThreatsMajor Threats Improving the ClimateImproving the Climate Code of EthicsCode of Ethics Self-AssessmentSelf-Assessment Privacy FactorPrivacy Factor
Legal IssuesLegal Issues Liability QuestionLiability Question Basis of LiabilityBasis of Liability Copyrights & TrademarksCopyrights & Trademarks Website – Product / Service?Website – Product / Service? WarrantiesWarranties Strict LiabilityStrict Liability Taxation IssuesTaxation Issues
New technology new ethical New technology new ethical problemsproblems ExampleExample
Information Technology Ethical challengesInformation Technology Ethical challenges Challenges: Web DesignChallenges: Web Design Challenges: CommerceChallenges: Commerce Challenges: WorkplaceChallenges: Workplace Challenges: SpeechChallenges: Speech Challenges: Computing Resource AbuseChallenges: Computing Resource Abuse Challenges: PrivacyChallenges: Privacy Challenges: Intellectual PropertyChallenges: Intellectual Property Challenges: OtherChallenges: Other
33WWWWWW
What is ethic?What is ethic?
Fairness, justice, equity, honesty, Fairness, justice, equity, honesty, trustworthiness & equalitytrustworthiness & equality
SubjectiveSubjective
B
D
C
A
Legal
Immoral Moral
Illegal
44WWWWWW
Major threatsMajor threats
Faster computers & networksFaster computers & networks Sophisticated telecommunications & routersSophisticated telecommunications & routers Massive distributed databasesMassive distributed databases Eases of access to information & knowledge Eases of access to information & knowledge
basebase Transparency of softwareTransparency of software
55WWWWWW
Improving the climatesImproving the climates
Top management supportTop management support Code of ethicsCode of ethics Ethics training programEthics training program Motivation to focus on honesty & integrityMotivation to focus on honesty & integrity
66WWWWWW
WHERE TO STARTWHERE TO START
Bottom-upBottom-up Inculcates ethics behavior at the employee level with Inculcates ethics behavior at the employee level with
full support of top managementfull support of top management
Top-downTop-down The actions of the company start with the CEOThe actions of the company start with the CEO Extend to a variety of stakeholdersExtend to a variety of stakeholders
77WWWWWW
Code of ethicsCode of ethics
A declaration of principles and beliefs that A declaration of principles and beliefs that govern how employees of a corporation are to govern how employees of a corporation are to behavebehave
Inspirational & disciplinaryInspirational & disciplinary All-compassing & stable over timeAll-compassing & stable over time
88WWWWWW
Self- AssessmentSelf- Assessment
A question-and-answer procedureA question-and-answer procedure Allows individuals to appraise & understand their Allows individuals to appraise & understand their
personal knowledge about a particular topicpersonal knowledge about a particular topic An educational experienceAn educational experience
99WWWWWW
Privacy factorPrivacy factor NoticeNotice
Right to be told in advanceRight to be told in advance ChoiceChoice Final say regarding the use of personal infoFinal say regarding the use of personal info
AccessAccess Access & correct any personal infoAccess & correct any personal info
Security/integritySecurity/integrity
Enforcement Enforcement Backed by the courts if any principles are violatedBacked by the courts if any principles are violated
1010WWWWWW
THE LIABILITY QUESTIONTHE LIABILITY QUESTION
Liability of DesignerLiability of Designer Nontrivial errorsNontrivial errors Out-of-bound errorsOut-of-bound errors
Liability of UserLiability of User Passive negligencePassive negligence
Basis of LiabilityBasis of Liability Tort lawTort law Product liabilityProduct liability
1111WWWWWW
TORT LAWS ON INTERNETTORT LAWS ON INTERNET
Settling contract problems between e-merchants & Settling contract problems between e-merchants & ISPISP
Fraud – intent to deceiveFraud – intent to deceive Negligence – failing to make certain action causing Negligence – failing to make certain action causing
injury / material lossesinjury / material losses False advertising False advertising Misrepresentation – claiming a product will perform Misrepresentation – claiming a product will perform
certain functions when it could not certain functions when it could not Trademark violations – under intellectual property lawTrademark violations – under intellectual property law
1212WWWWWW
COPYRIGHTCOPYRIGHT CopyrightsCopyrights
Ownership of an original work created by an authorOwnership of an original work created by an author A form of intellectual property protection covers the A form of intellectual property protection covers the
‘look & feel’ and content of printed media‘look & feel’ and content of printed media Gives author the right to exclude others from using Gives author the right to exclude others from using
the finished workthe finished work Good for life of its author + 70 yearsGood for life of its author + 70 years
1313WWWWWW
TRADEMARK / TRADE NAMETRADEMARK / TRADE NAME
A word / symbol distinguishing a good from other A word / symbol distinguishing a good from other goods in the marketgoods in the market
A maze of federal & state lawsA maze of federal & state laws Web designer – ‘work made for hire’Web designer – ‘work made for hire’
1414WWWWWW
WEBSITE – PRODUCT/SERVICE?WEBSITE – PRODUCT/SERVICE?ProductProduct
Software sold off the shelfSoftware sold off the shelf Uniform Commercial Code (UCC) allows developer to Uniform Commercial Code (UCC) allows developer to
limit liability for defective websites though a disclaimer limit liability for defective websites though a disclaimer of warrantiesof warranties
ServiceService Custom-designed softwareCustom-designed software Negligence principles should be usedeNegligence principles should be usede
1515WWWWWW
WARRANTIESWARRANTIES
Assurance made by seller about the goods soldAssurance made by seller about the goods sold Express warrantyExpress warranty
Offered orally or in writing by maker of productsOffered orally or in writing by maker of products Implied warrantyImplied warranty
Arises automatically when a sale is madeArises automatically when a sale is made Merchantability Merchantability
DisclaimerDisclaimer Seller’s intention to protect the business from unwanted Seller’s intention to protect the business from unwanted
liabilityliability http://www.microsoft.com/http://www.microsoft.com/misc/info/cpyright.htmmisc/info/cpyright.htm
1616WWWWWW
STRICT LIABILITYSTRICT LIABILITY
Joint & several liability for developers, Joint & several liability for developers, manufacturers & distributors if tort theory appliesmanufacturers & distributors if tort theory applies
Protects web visitor regardless of whether Protects web visitor regardless of whether anyone is at faultanyone is at fault
1717WWWWWW
TAXATION ISSUESTAXATION ISSUES
ControversialControversial
Different jurisdictionDifferent jurisdictionConsumers’ reactionConsumers’ reaction
1818WWWWWW
New technology = new New technology = new ethical problemsethical problems
Traditional rules of conduct are not always Traditional rules of conduct are not always applicable to a new mediumapplicable to a new medium
A question that often arises: Should a A question that often arises: Should a device, a technique or technology be device, a technique or technology be restricted because people can use it for restricted because people can use it for illegal or harmful actions as well as illegal or harmful actions as well as beneficial ones?beneficial ones?
1919WWWWWW
ExampleExample
Mobile phones with cameras. Pupils at school Mobile phones with cameras. Pupils at school take photos of other pupils in the shower, and take photos of other pupils in the shower, and publish the pictures on the Internet.publish the pictures on the Internet.
DiscussDiscuss. How to deal with this?. How to deal with this?
2121WWWWWW
Challenges: Code of EthicsChallenges: Code of Ethics
No Form of licensing for computer professionals No Form of licensing for computer professionals Results in no real way to enforce ethical standards within the Results in no real way to enforce ethical standards within the
computing fieldcomputing field There is movement within the industry to create a licensing There is movement within the industry to create a licensing
process but there are many issues to be resolvedprocess but there are many issues to be resolved What will be included on the exam?What will be included on the exam? How often will an IT professional be required to renew the How often will an IT professional be required to renew the
license?license?
Developed by several organizationsDeveloped by several organizations AdoptionAdoption ImplementationImplementation MonitoringMonitoring Example: Example: http://www.acm.org/constitution/code.htmlhttp://www.acm.org/constitution/code.html
2222WWWWWW
Challenges: Web DesignChallenges: Web Design Implementation of featuresImplementation of features
Pop upsPop ups Blocking/filtersBlocking/filters Aliases and redirectingAliases and redirecting CookiesCookies Privacy policiesPrivacy policies Security policiesSecurity policies SpywareSpyware
Use of other design featuresUse of other design features JavascriptJavascript Graphics - pictures, buttons, logos, iconsGraphics - pictures, buttons, logos, icons ContentContent Design layoutDesign layout Accountability/responsibilityAccountability/responsibility Outdated material, inaccurate materialOutdated material, inaccurate material
2323WWWWWW
Challenges: CommerceChallenges: Commerce FraudFraud TaxationTaxation Free TradeFree Trade Gambling Gambling AuctionsAuctions SpammingSpamming
Who were Canter and Siegel?Who were Canter and Siegel? Spamming cell phones?Spamming cell phones?
Term papers for saleTerm papers for sale Atlanta Journal Constitution articleAtlanta Journal Constitution article
2424WWWWWW
Challenges: WorkplaceChallenges: Workplace AccessibilityAccessibility ErgonomicsErgonomics OutsourcingOutsourcing TelecommutingTelecommuting Customer relationships – Vendor relationshipsCustomer relationships – Vendor relationships Should IT professionals be in the ethics business or should other Should IT professionals be in the ethics business or should other
areas of the business handle these issues?areas of the business handle these issues?
MonitoringMonitoring Should your employer have the right to monitor private email Should your employer have the right to monitor private email
messages?messages? What are the two most popular Web sites for American workers? What are the two most popular Web sites for American workers?
Playboy and ESPNPlayboy and ESPN
2525WWWWWW
Challenges:WorkplaceChallenges:Workplace
62% of employers monitor employees' eMail and Internet use.62% of employers monitor employees' eMail and Internet use. 68% cite legal liability as the primary reason to monitor. 68% cite legal liability as the primary reason to monitor. 87% of companies that monitor have a written eMail Policy, 87% of companies that monitor have a written eMail Policy, 83.1% an Internet Policy, 83.1% an Internet Policy, 68% a Software Policy.68% a Software Policy. 51% of employers have disciplined or terminated employees for violating 51% of employers have disciplined or terminated employees for violating
ePolicy.ePolicy. 35% of organizations have eMail retention & deletion policies in place.35% of organizations have eMail retention & deletion policies in place. 10% of companies have been ordered by courts to turn over employee 10% of companies have been ordered by courts to turn over employee
eMail related to workplace lawsuits.eMail related to workplace lawsuits. 8.3% of organizations have battled sexual harassment and/or sexual 8.3% of organizations have battled sexual harassment and/or sexual
discrimination claims stemming from employee e-mail and/or Internet use.discrimination claims stemming from employee e-mail and/or Internet use. Source: The 2001 Electronic Policies & Practices Survey from The American Source: The 2001 Electronic Policies & Practices Survey from The American
Management Association, US News & World Report, and The ePolicy Institute-Click Management Association, US News & World Report, and The ePolicy Institute-Click Here for Survey Results. Here for Survey Results.
2626WWWWWW
Music DownloadsMusic Downloads
Risk of getting caughtRisk of getting caught Studies have shown that a majority of the people who share music on the Studies have shown that a majority of the people who share music on the
Internet are aware that their actions are illegal, said Michael McGuire, a analyst Internet are aware that their actions are illegal, said Michael McGuire, a analyst with the Gartner Group. ``But they also know that the chances of getting caught with the Gartner Group. ``But they also know that the chances of getting caught are pretty remote'' are pretty remote''
Why is “getting caught remote”?Why is “getting caught remote”? There are an estimated 60 million peer-to-peer network subscribers There are an estimated 60 million peer-to-peer network subscribers
in the United States alone, with tens of millions more in other in the United States alone, with tens of millions more in other countries countries
The RIAA is seeking out people who make their music files The RIAA is seeking out people who make their music files available for others to download.available for others to download.
The networks have features that allow users to block others from The networks have features that allow users to block others from downloading their files but allow them to continue to download filesdownloading their files but allow them to continue to download files
2727WWWWWW
Challenges: SpeechChallenges: Speech
Net EtiquetteNet Etiquette Email privacyEmail privacy
Email privacy policyEmail privacy policy ““Flaming” – insulting, argumentative or chastising replies to messagesFlaming” – insulting, argumentative or chastising replies to messages
Free SpeechFree Speech Accountability and responsibility for web contentAccountability and responsibility for web content
Abortion sitesAbortion sites Outdated informationOutdated information Accurate informationAccurate information Privacy and security policiesPrivacy and security policies
PornPorn Professors pc – filled with porn, found by pc maintenance workersProfessors pc – filled with porn, found by pc maintenance workers Visa – won’t give permission to be used on offensive or pornographic sitesVisa – won’t give permission to be used on offensive or pornographic sites
HateHate MACHADO CASE MACHADO CASE
Internet FiltersInternet Filters Should filters be in schools or libraries, and /or should they be mandated by law?Should filters be in schools or libraries, and /or should they be mandated by law? Filters can also be set up to filter out other subjects, would this be an ethical violation?Filters can also be set up to filter out other subjects, would this be an ethical violation?
Chain LettersChain Letters
2828WWWWWW
Challenges: Computing Resource AbuseChallenges: Computing Resource Abuse
Computers in the Workplace and the ClassroomComputers in the Workplace and the Classroom Use or AbuseUse or Abuse Internet AccessInternet Access Instant MessengerInstant Messenger Laptop use in the classroomLaptop use in the classroom EmailEmail
Legal documentLegal document Can be modifiedCan be modified FlamingFlaming
AccessAccess Computer Usage policyComputer Usage policy Email policyEmail policy
2929WWWWWW
Challenges: Computing Resource AbuseChallenges: Computing Resource Abuse
Computer CrimeComputer CrimeVirusesVirusesHackersHackersTheftTheft ““These cyber swindles and dot-cons present These cyber swindles and dot-cons present
new challenges to law enforcement” said John new challenges to law enforcement” said John AshcroftAshcroft
US Charges 135 With Net CrimesUS Charges 135 With Net Crimes
3030WWWWWW
Challenges: PrivacyChallenges: Privacy
Privacy issues are at the top of the list in regards to Privacy issues are at the top of the list in regards to ethical use of information.ethical use of information.
Loss of controlLoss of control Misuse of informationMisuse of information Risk to physical privacyRisk to physical privacy Risk of identity theft (video)Risk of identity theft (video) Unwanted intrusions into daily lifeUnwanted intrusions into daily life
USA Patriot Act (post 9/11)USA Patriot Act (post 9/11) Efforts to detect and deter terrorist activityEfforts to detect and deter terrorist activity Datamining corporate dataDatamining corporate data Loss of business and risk of lawsuits due customers being outraged Loss of business and risk of lawsuits due customers being outraged
at their loss of data privacyat their loss of data privacy
CookiesCookies Privacy policiesPrivacy policies
3131WWWWWW
Challenges: intellectual PropertyChallenges: intellectual Property
Electronic CopyrightElectronic Copyright LicensingLicensing InteroperabilityInteroperability LicensingLicensing
CyberlicensesCyberlicenses ShrinkwrapShrinkwrap SharewareShareware FreewareFreeware
MP3MP3 RIAA court case against college studentsRIAA court case against college students University Internet Usage policiesUniversity Internet Usage policies
Internet DownloadsInternet Downloads FilesFiles GraphicsGraphics TextText
3232WWWWWW
Challenges: Intellectual PropertyChallenges: Intellectual Property
Patent, trade secrets, and copyright lawPatent, trade secrets, and copyright law Who owns the programWho owns the program Who owns the algorithmWho owns the algorithm
Software PiracySoftware Piracy Why shouldn't I use pirated software? Who am I hurting by Why shouldn't I use pirated software? Who am I hurting by
doing so?doing so? Piracy exists in everywhere.Piracy exists in everywhere. Loss of revenue hurts everyone.Loss of revenue hurts everyone. All software piracy is illegal and All software piracy is illegal and Software piracy is unethicalSoftware piracy is unethical. . Various studies have found that the software industry loses Various studies have found that the software industry loses
approximately $12 billion every year .approximately $12 billion every year . State Industry StudyState Industry Study
CD-RWCD-RW
3333WWWWWW
Challenges: OtherChallenges: Other
Decision making using Expert SystemsDecision making using Expert Systems Network SecurityNetwork Security Software accuracy and reliability who is ethically Software accuracy and reliability who is ethically
responsible?responsible? Therac-25 AccidentsTherac-25 Accidents Killer RobotsKiller Robots
The Hughes Whistleblowing CaseThe Hughes Whistleblowing Case
3434WWWWWW
Conclusion: Some Ideas to PonderConclusion: Some Ideas to Ponder
Computer ethics today is now a global effortComputer ethics today is now a global effort The gap among the rich and poor nations, rich and poor citizens exists. How can The gap among the rich and poor nations, rich and poor citizens exists. How can
it be eliminated or reduced eithically and morally to provide information and it be eliminated or reduced eithically and morally to provide information and services that will move them to into the world of cyberspace?services that will move them to into the world of cyberspace?
Will the poor be cut off from job opportunities, education, entertainment, medical Will the poor be cut off from job opportunities, education, entertainment, medical care, shopping, voting - because they cannot afford a connection to the global care, shopping, voting - because they cannot afford a connection to the global information network? information network?
Whose laws will apply in cyberspace when hundreds of countries are Whose laws will apply in cyberspace when hundreds of countries are incorporated into the global network? incorporated into the global network?
What happened? Where did our knowing right from wrong go too?What happened? Where did our knowing right from wrong go too? Are we missing an opportunity to introduce ethics at an early age in children by Are we missing an opportunity to introduce ethics at an early age in children by
not integrating these thoughts and practices in video games?not integrating these thoughts and practices in video games? Should more controls and regulations be introduced into the system? Will they Should more controls and regulations be introduced into the system? Will they
actually help to improve our moral and ethical behavior?actually help to improve our moral and ethical behavior?
Unethical behavior continues to permeate industryUnethical behavior continues to permeate industry, what measures, , what measures, policies, codes of conduct be changed to change this behavior?policies, codes of conduct be changed to change this behavior?
3535WWWWWW
Works Cited:Works Cited: http://www.brook.edu/dybdocroot/its/cei/overview/http://www.brook.edu/dybdocroot/its/cei/overview/
Ten_Commanments_of_Computer_Ethics.htmTen_Commanments_of_Computer_Ethics.htm http://www.computingcases.org/case_materials/http://www.computingcases.org/case_materials/
case_materials.htmlcase_materials.html http://www.epolicyinstitute.com/http://www.epolicyinstitute.com/ http://legacy.eos.ncsu.edu/eos/info/computer_ethics/http://legacy.eos.ncsu.edu/eos/info/computer_ethics/ http://www.spa.org/piracy/http://www.spa.org/piracy/ http://www.nd.edu/~rbarger/cases.htmlhttp://www.nd.edu/~rbarger/cases.html http://ksuweb.kennesaw.edu/~kschwaig/present.ppthttp://ksuweb.kennesaw.edu/~kschwaig/present.ppt