Introduction to Professional Ethics in Computing PDF

Summary

This chapter introduces professional ethics in computing, examining the philosophical study of morality, ethical conduct, and the impact of IT on society. It covers topics such as technology, society, and the evolution of computing, including historical milestones and ethical considerations.

Full Transcript

Introduction to BIC 21102 Professional CHAPTER 1 Ethics in Computing CONTENT ETHICS Ethics is the philosophical study of morality Ø A rational examination into people’s moral beliefs and behaviour. Ø A rational, systematic analysis of conduct that can cause ben...

Introduction to BIC 21102 Professional CHAPTER 1 Ethics in Computing CONTENT ETHICS Ethics is the philosophical study of morality Ø A rational examination into people’s moral beliefs and behaviour. Ø A rational, systematic analysis of conduct that can cause benefit or harm to other people. Ø Because ethics is based in reason, people are required to explain why they hold the opinions they do. Ø A set of beliefs about right and wrong behaviour within a society. Ø The study of what it means to “do the right thing.” A society is an association of people organized under a system of rules designed to advance the good of its members over time. Morality: Every society has rules of conduct describing what people ought and ought not to do in various situations. John Rawls. A Theory of Justice, Revised Edition. Belknap Press of Harvard University Press, Cambridge, MA, 1999. 1-3 ETHICS ü Society is changing rapidly as information technology advances. ü Some people selfishly exploit new technologies for personal gain. ü For new problems such as phishing or pornographic Websites, we need to decide which activities are morally “good,” which are morally “neutral,” and which are morally “bad.” ü Ethics is focused on the voluntary, moral choices people make û Ethics is not concerned about involuntary choices or choices outside the moral realm. 1-4 INFORMATION AGE Characterized by unprecedented access to information Principal catalysts: ü Low-cost computers ü High-speed communication networks Examples of advances in past two decades: q Cell phones q Email q World Wide Web q Cloud q IOT 1-5 TECHNOLOGY AND VALUES ⮚ Dynamic between people, technology q People adopt technology q Technology changes society ⮚ Different ways people are affected by technology q Physical changes (e.g., laptops) q Psychological changes (e.g., cell phones) ⮚ Technologies can solve problems, create new problems q Automobile – ease travel, but causes traffic congestion q Refrigerator – preserve food’s freshness, but leaks harmful gas q Low-cost global communication – faster access to information, but large job migration to countries with cheaper labour 1-6 CONTROL OVER NEW TECHNOLOGIES ⮚ People can control whether to adopt new technology q Nuclear power moratorium in United States q Nuclear power advances in rest of world ⮚ People can influence rate at which technologies are developed q Intellectual property laws – create income from creative work q Federal income tax structure – allow individuals to accumulate wealth 1-7 MILESTONE IN COMPUTING AIDS TO MANUAL COMPUTING Transist Progra or and Punch Precurs mming Integra Mechan Card First -Abacus ors of Langua ted ical Cash Tabulat Comme (more Comme ge and Circuit IBM Calculat Registe ion rcial than rcial Time- (1960- System or r(1879) (early Comput 2000 Comput Sharing 1965)- /360 (1640)- -James 1800)- ers years ers- (1957)- The (1964) Blaise Ritty Herman (Univac, ago) Eniac(1 Fortran, minute Pascal Hollerit 1950) 946) (1959)- man II h COBOL progra m MILESTONE IN COMPUTING (CONTINUE) PUNCH CARD TABULATOR MILESTONE IN COMPUTING (CONTINUE) ENIAC UNIVAC MILESTONE IN COMPUTING (CONTINUE) Microprocessors today 1969 exists in many devices: Cell phones Robert Noyce MP3 players & Gordon Ted Hoff, Digital cameras Moore Wristwatches Stanley Mazor, ATM machines Founded Intel & Federico Automobiles Faggin of Intel Microwave ovens release of the Thermostats 1968 Intel 4004, the Traffic lights world’s first But the highest- microprocesso profile use of r microprocessors is in personal computers. MILESTONE IN COMPUTING (CONTINUE) 1976 MITS introduced Microsoft Altair 8800 Steve Wozniak produced DOS Bill Gates & & Steve Jobs operating Paul Allen founded Apple system for IBM introduce BASIC Sold 200 Apple I IBM released interpreter computers the IBM PC in 1981 Apple Computer 1975 and Tandy sold 1980 many personal computers by the end of MILESTONES IN NETWORKING Electricity and Typewriter Electromagn and Radio(1885, etism Telegraph- teletype- Hertz) Television(1 (1790,Frenc Samuel Telephone- First -> 927, first Remote h); Morse(1830- Alexander typewriter(1 (1895,Marco electronic computing 1837(New 1838, Graham Bell 867) ni) television, (1940, York->New Telegraph (1876) ->first -> Philo Sitbitz) Orleans) machine) commercial (1912,Sarno Farnsworth) -> type ff) (1799,Volta- writer(1873) World First battery) MILESTONES IN NETWORKING (CONTINUE) Telegraph machine Typewriter Earliest Telephone Radio MILESTONES IN NETWORKING (CONTINUE) Internet ARPANET (TCP/IP, (1967) 1983) Broadband E-mail NFSNET (1972) (1995) MILESTONE IN INFORMATION STORAGE AND RETRIEVAL Networked Graphical Hypertext: User world wide Codex Newspaper Interface web Gutenberg’s Hypertext Single Search Press Computer Engines Hypertext systems SUMMARIZATION OF MILESTONE IN IT (IT TIMELINE) ⮚ Technology Timeline 🡺 https://www.youtube.com/watch?v=AJxNjkp_Zkg ⮚ Obsolete technologies 🡺 https://www.youtube.com/watch?v=Nhk5TSU4AOU ⮚ Will Become Obsolete?? 🡺 https://www.youtube.com/watch?v=mjS-LaEHj6E So what is the impact of IT? PRIVACY - DEFINITION? Privacy issues – Malaysia Personal Data Protection Act (PDPA) 2010 protect? The PDPA protects personal data from being misused. Personal data is defined as any information collected or processed in connection to a commercial transaction by any equipment operating automatically (e.g., ATM, Computers) which is capable of identifying a person (a.k.a. data subject). The above definition will include such information as: ü Names ü Telephone numbers ü Addresses ü Email addresses ü Identification card/passport ü as well as banking details. numbers PRIVACY PROTECTION AND THE LAW ⮚ The use of IT in business requires balancing the needs of those who use the information against the rights and desires of the people whose information may be used ⮚ On one hand, information about people is gathered, stored, analyzed and reported because organizations can use it to make better decisions. Organizations need basic information about customers to serve them better. ⮚ On the other hand, many object to the data collection policies of government and businesses. ⮚ According to U.S. Census data, privacy is a key concern of Internet users and a top reason why non-users still avoid the Internet. PRIVACY PROTECTION AND THE LAW Historical perspective on the right to privacy: q U.S. Constitution took effect in 1789 q Although, the Constitution does not contain the word privacy, the U.S. Supreme Court has ruled that the concept of privacy is protected by a number of amendments in the Bill of Rights. q Supreme Court has stated that the American Citizens are protected by the Fourth Amendment when there is a “reasonable expectation of privacy”. Today, in addition to protection from government intrusion, people need privacy protection from private industry. Few laws provide such protection. RECENT HISTORY OF PRIVACY PROTECTION (U.S.) Communications Act of 1934 restricted the government’s ability to secretly intercept communications. However, under a 1968 federal statute, law enforcement officers can use wiretapping – the interception of telephone or telegraph communications for purpose of espionage or surveillance – if the first obtain a court order. FOIA – The Freedom of Information Act passed in 1966 and amended in 1974, provides public with the means to gain access to certain government records. Fair Credit Reporting Act of 1970 regulates the operations of credit- reporting bureaus, including how they collect, store and use credit information. Privacy Act of 1974 provides certain safeguards for people against invasion of personal privacy by federal agencies. The Central Intelligence Agency (CIA) and law enforcement agencies are excluded from this act; nor does it cover the actions of private industry. RECENT HISTORY OF PRIVACY PROTECTION COPPA Children’s Online Privacy Protection Act was implemented in 1998. https://www.ftc.gov/news- e v e n t s / n e w s / p r e s s - releases/2019/09/google-youtube- will-pay-record-170-million-alleged- violations-childrens-privacy-law According to the COPPA law, any Web site that caters to children must offer comprehensive privacy policies, notify parents or guardians about its data collection practices, and receive parental consent before collecting any personal information from children under 13 years of age. RECENT HISTORY OF PRIVACY PROTECTION In 2004, the Federal Trade Commission (FTC) accused Bonzi Software Inc. and UMG Recordings Inc. of collecting personal information from children online without their parent’s consent, and settled wi th th em f or pe nal ties of $75,000 and $400,000 http://www.ftc.gov/opa/2004/0 2/bonziumg.htm IMPACTS OF IT TOWARDS SOCIETY AND SOCIAL ⮚ Information Technology: r e f e r s t o d e vi c e s u se d i n t h e cr e a t i o n , s t o r a g e , manipulation, exchange, and dissemination of data, including text, sound and images. ⮚ Cost of IT devices decrease, while capabilities continue to increase ⮚ Use of IT increase  issues because growth of IT IMPACTS OF IT TOWARDS SOCIETY AND SOCIAL New technology can have a significant impact on a society, but we need to remember that, as societies and as individuals, we have a great deal of control over how we choose to use a technology in order to maintain the values we hold to be fundamentally important. IMPACTS OF IT TOWARDS SOCIETY AND SOCIAL Public places ü Wireless Internet access points (i.e. hotspots) are now common. ü Public ‘Wi-Fi’ increases accessibility to the Internet, but can compromise a user’s security. Education ü Most references are now publicly available in digital copies. ü Reliance to printed materials is diminishing. ü Online learning overtook traditional classroom. ü Emergence of digital learning aid (E.g. computer, electronic white board, digital projector, teleconference). IMPACTS OF IT TOWARDS SOCIETY AND SOCIAL Home ü Improves home quality in entertainment, security, comfort and house chores. ü The emergence of smart home technology. Business ü Automation increases productivity ü Globalization - Process of creating a worldwide network of businesses and markets ü Flattened organizational structures ü Telework - Employees work away from traditional place of work ü Workplace monitoring to identify inappropriate use of company resources IMPACTS OF IT TOWARDS SOCIETY AND SOCIAL Government ü Censorship (E.g. blocked sites, Web filtering, DNS redirection ). ü Case study: The Great Firewall of China ü Information collection and surveillance ü Regulation of public and private databases (e.g. Malaysia’s child sex offender registry ) ü Personal Data Protection Act 2010 ü Data Terbuka Kerajaan, NurAlert ü PDRM: Scam check online application ü Case study: Macau scam BH Online “DNS sekat kandungan media sosial langgar syarat”. https://www.bharian.com.my/berita/nasional/2020/02/652911/dns-sekat-kandungan-media-sosial-langgar-syarat MalayMail “Child sex offenders registry launched, 3,000 paedophiles listed”. ”https://www.malaymail.com/news/malaysia/2019/03/26/child-sex-offenders-registry-launched-3000-paedophiles- listed/1736695. IMPACTS OF IT TOWARDS SOCIETY AND SOCIAL Identity theft Hackers Pirated vs Software crackers NEGATIVE Copyrights Infringeme IMPACT Phishing nt Spamming Spyware IMPACTS OF IT TOWARDS SOCIETY AND SOCIAL Identity Theft Ø oc curs whe n so meone il le gally u s es yo ur pe rs on al information such as name, address or financial information for their own interests. Hackers & Crackers Hackers: a person who Crackers: a person test the limitations of that illegally information systems accessed to out of intellectual someone else’s curiosity—to see system, with the intention to whether they can gain distribute malicious access and how far software they can go. CRACKING OF LARGE DATABASES TO GAIN PERSONAL IDENTITY INFORMATION Partial list of incidents from 2005: ❑February 2005, Check Point, keeper of more than 19 million public records, revealed that hackers stole data on more than 147,000 consumers ❑March 2005, Reed Elsevier, the parent company of LexisNexis, announced that hackers had compromised its massive database, stealing information on more than 300, 000 people http://www.commercialalert.org/issues/culture/privacy/another- data-broker-reports-a-breach ❑March 2005, Retail Ventures Inc. reported the theft of credit card data and other personal information of 1.4 million customers from its DSW Store Warehouse stores. CRACKING OF LARGE DATABASES TO GAIN PERSONAL IDENTITY INFORMATION ❑Are there any incidents that involved Malaysians in recent years? Ø Who reported the incident? Ø How did it happen? Ø When did it happen? Ø Who was the perpetrator? Ø Who was involved? IMPACTS OF IT TOWARDS SOCIETY AND SOCIAL Phishing Ø Spoofed e-mails lead consumers to the fake Web sites Ø The act of fraudulently using email to try to get the recipient to reveal personal data. Spyware Øa program that c ommunicates over an Inte rnet connection without the user’s knowledge or consent. Ø It can monitor Web surfing, log keystrokes, take snapshots of the computer screen, and send reports back to a host computer. Ø It is often part of a rootkit. PHISHING EXAMPLES IMPACTS OF IT TOWARDS SOCIETY AND SOCIAL Spamming Ø The abuse of email systems to send unsolicited email to large numbers of people. Ø An extremely inexpensive method of marketing used by many legitimate organizations. Ø Spam is also used to deliver harmful worms and other malware. Ø The benefits of spam to companies is largely offset by the public’s generally negative reaction to receiving unsolicited ads. Ø Takes users time to scan and delete spam email. Ø The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act went into effect in January 2004. Ø Act says that it is legal to spam, provided the message meets a few basic requirements Ø Despite CAN-SPAM and other measures, the percentage of spam in email messages averaged 68 percent in October 2012, according to Securelist. Securelist, “Spam in October 2012,” November 23, 2012, https://www.securelist.com/en/analysis /204792253/Spam _in_ October_2012 IMPACTS OF IT TOWARDS SOCIETY AND SOCIAL Copyright Infringement Plagiarism & Pirated Software Ø The use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works. Pirated Software Ø Duplicated software which is distributed without authorization Ø Happens when someone makes illegal copies of an original program and sells it ISSUES ABOUT COMPUTER IMPACT & CONTROL Rise of Robot Ø Some experts suggest most jobs will be taken over by machines Ø Artificial intelligence (AI): Field of computer science focusing on intelligent behavior by machines ØRapid inc re as es in microprocessor speeds have led to various successes in AI. ISSUES ABOUT COMPUTER IMPACT & CONTROL Digital Divide Ø Some people have access to modern IT while others do not. https://ourworldindata.org/grapher/share-of-individuals-using-the-internet INFORMATION ACCESS ISSUES Freedom of Information Ø The Web is a convenient way for organizations to provide access to news updates and dynamically changing information. Ø Some highly successful individuals with privileged access to information fail to act in morally appropriate ways Ø Case study: Facebook–Cambridge Analytica data scandal Ø IT workers unethically sold private and confidential information about employees, customers, suppliers, new product plans, promotions, budgets, and so on. Ø Case study: 46.2 Million Malaysian Mobile Phone Numbers Leaked From 2014 Data Breach INFORMATION ACCESS ISSUES Freedom of Information Act Ø Freedom of information Act (FOIA) Ø The U.S. government introduced FOIA in 1966 to ensure that the public has access to US government records. Ø Th er e are ni ne ex empt ion s in FOI A i n wh ich t he U.S. government may legitimately withhold information. Ø E.g: A document may be withheld if it has been classified as secret for national defense or foreign policy reasons. Ø Malaysia’s effort in Freedom of Information Act to replace the Official Secrets Act 1972 is still a work in progress. New Straits Times, “Time for Freedom of Information Act in Malaysia,” August 14, 2022, https://https://www.nst.com.my/news/nation/2022/08/822206/time-freedom-information-act-malaysia INFORMATION ACCESS ISSUES Controlling access to information on the Internet ü Internet filters: A software that can be used to block access to certain Web sites that contain material deemed inappropriate or offensive. ü Internet censorship: The control or suppression of the publishing or accessing of information on the Internet. q U.S. government also introduces other laws: q Communications Decency Act (CDA) q Child Online Protection Act (COPA) q Children’s Internet Protection Act (CIPA) INFORMATION ACCESS ISSUES Anonymity on the Internet ü Anonymous expression: The expression of opinions by people who do not reveal their identity. ü Anonymity is sometimes abused for/by: û Hate speech û Cyber bullying û Pornography û Online sexual predators Image by vectorjuice on Freepik û Doxing: The examination of Internet records in an attempt to reveal the identity of an anonymous poster. What is your responsibility and ethics toward IT specifically on e-access?

Use Quizgecko on...
Browser
Browser