Document Details

SimplifiedCthulhu

Uploaded by SimplifiedCthulhu

Mariano Marcos State University

Christian A. Sagadraca

Tags

computer ethics computer abuses technology computer crimes

Summary

This document provides an overview of computer ethics and explores various issues related to computer misuse, including denial-of-service attacks, hacking, and other computer crimes. The document also contains ethical precepts and norms for computer use.

Full Transcript

Christian A. Sagadraca, CpE, MIT 1 COMPUTER ETHICS Objectives: At the end of the topic, the student will be able to: 1. Define computer ethics 2. Know the general examples...

Christian A. Sagadraca, CpE, MIT 1 COMPUTER ETHICS Objectives: At the end of the topic, the student will be able to: 1. Define computer ethics 2. Know the general examples and categories of computer abuses 3. Understand privacy issues, social justice issues, free speech issues, intellectual property rights issues 4. Know the different forms of computer crimes WHAT IS ETHICS? Ethics is derived from the Greek term “ethos”, which means character or custom. Its equivalent term in Roman is the word “mores”, from which words like morality, morals and moral are derived. Ethics is intertwined with customs and traditions believed in or adopted by a particular community. Since customs are relative, what is “ethical” would depend on whether or not it conforms to existing customs. This is a relative view of ethics – meaning that what is ethical in one community may not be ethical in another. Applied Ethics is a perception of what is correct or not, of right or wrong, that is usually adopted and used to guide people’s action in various human concerns relative to various fields of study. The various applied ethics include environmental ethics, nursing ethics, biomedical ethics, legal ethics, and computer ethics, among others. WHAT IS COMPUTER ETHICS? Neoteric and highly advanced computer technologies are continuously being developed and used to produce more sophisticated, if not perfect, data processors. This continual technological advancement causes a lot of possibilities of human actions – possibilities which are casting doubt on long held notions of appropriate behavior. Computer Ethics refers to the guiding precepts and norms that are adopted and applied to regulate and control the use of computers and its applications. TEN COMMANDMENTS FOR COMPUTER ETHICS 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people’s computer work. 3. Thou shalt not snoop around in other people’s files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not use or copy software for which you have not paid. 7. Thou shalt not use other people’s computer resources without authorization. 8. Thou shalt not appropriate other people’s intellectual output. 9. Thou shalt think about the social consequences of the program you write. 10. Thou shalt use a computer in ways that show consideration and respect. COMPUTER ABUSES When computers first began to be used, there were no ethical standards relevant to it. However, as the use of computers became widespread, computer ethics became a concern. Today, most of the rules on the ethical use of computers have already been formulated as laws. Computer crimes and computer frauds, for example, are common terms nowadays and their laws against them. In the Philippines we have the E-Commerce Law that defines penalties for computer crimes, hacking, and computer fraud, among others. Mariano Marcos State University – College of Computing and Information Sciences-Department of Information Technology Christian A. Sagadraca, CpE, MIT 2 The following are selected issues classified as computer abuses. 1. Denial of service attack – characterized by an explicit attempt by attackers to prevent or bar legitimate users of computers from availing themselves of computer services. Examples of denial of service attacks are: attempts to “flood” a network, thereby preventing legitimate network traffic attempts to disrupt connections between two machines, thereby preventing access to a service attempts to prevent a particular individual from accessing a service attempts to disrupt a service to a specific system or person 2. Hacking – involves unauthorized access to a computer, its files, and programs. There are many reasons why hackers hack computers. Theft of service – if a system offers some type of service and a hacker has a use for it, he/she will hack the system. For example, a hacker can hack into a system to use the CPU for free or to use it for sending emails for free. Take valuable files such as credit card numbers and list of customers. The hacker may sell the information gathered to rival companies. Vengeance and hatred – for example, a hacker may get into the homepage of the university that kicked him out and deface the homepage Thrill and excitement of being somewhere they are not authorized to be For the sake of knowledge and experimentation – hackers learn a great deal every time they break into a new type of system. 3. Flaming or Roasting – sending of abusive emails or messages to other people or newsgroups. You flame people when you disrespect their opinion and attack them personally, calling them names or questioning their parentage. Flaming is considered poor online conduct and is not tolerated well in chatrooms or newsgroups. 4. Spamming - Spam is sometimes called unsolicited commercial email, the Internet version of junk mail. It is an attempt to deliver a message over the Internet to someone who would not otherwise choose to receive it. Almost all spam is commercial advertising. 5. Worms and virus A virus is a program that reproduces its own code by attaching itself to other executable files in such a way that the virus code is executed when the infected executable file is executed. A worm is a self-replicating program designed to spread across a network without requiring any outside actions to take place. 6. Internet hoaxes – messages about free money, children in trouble and other items designed to grab your attention and get you to forward the message to everyone you know (chain letters). While these do not automatically infect systems like a virus or Trojan, they are time consuming and costly to remove from all the systems where they exist. ISSUES IN COMPUTER ETHICS PRIVACY ISSUES In computing, emails and letters, your database, and your personal information are considered private. Mariano Marcos State University – College of Computing and Information Sciences-Department of Information Technology Christian A. Sagadraca, CpE, MIT 3 SOCIAL JUSTICE ISSUES Social justice is concerned with the promotion of the welfare of the people. In computing, social justice would pertain to equity of access. Some issues emanating from equity of access involve gender, physical disabilities, language. Other social justice issues concern the use of the computers in the workplace (occupational hazards), in particular electronic monitoring, repetitive strain injuries, electromagnetic radiation. FREE SPEECH ISSUES The right to freedom of expression is one of the constitutional rights guaranteed by the supreme law of the land. Hence, it is constantly advocated by those who do not want to be subjected to restrictions in their expressions or articulation of their thoughts. In computing, the issue is whether or not it is reasonable, or ethical, to assert one’s right to freedom of speech and expression in order to post or display pornographic materials on the web, or to use obscene and foul language, among others? One standpoint is that the exercise of individual rights is not boundless. One should be responsible enough to realize that one’s acts are subject to certain ethical norms that forbid abuse and misuse. The US Communications Decency Act (1996) makes it a criminal offense to send “indecent files via the Internet into others computers”. In 1997, the US Supreme Court voted unanimously that the Act was a violation of the first amendment. This is the reason why you can find a lot of indecent US-based materials on the Internet. In 2000, the US passed the Children’s Internet Protection Act that requires all schools and libraries receiving e-rate discounts or other federal assistance for Internet access to install filters on all computers used by adults as well as minors. In Great Britain, it is already illegal to publish and post materials that are likely to incite racial hatred. INTELLECTUAL PROPERTY RIGHTS Most countries, including the Philippines, enforce laws that penalize copying or imitation of inventions, identifying symbols, and creative expressions. These laws encompass four separate and distinct types of intangible property namely patents, trademarks, copyrights, and trade secrets, which collectively are referred to as “intellectual property”. Intellectual property is an asset, and as such it can be bought, licensed, exchanged, or gratuitously given away like any form of property. The intellectual property owner has the right to prevent the unauthorized use or sale of the property. In computing, an algorithm can be patented; a program or an online textbook is copyrightable; and domain names could be considered trademarks. Software Piracy – the act of using software without paying the appropriate license. This is the same as stealing from the software developer. Software pirates not only steal from the companies that make the software; their acts also redound to less money for research and development on new software. Thus, all users are hurt by software piracy. Plagiarism – occurs anytime that a person copies any written work and claims it as its own. With the advent of the Internet, cut-and-paste plagiarism becomes common. Mariano Marcos State University – College of Computing and Information Sciences-Department of Information Technology Christian A. Sagadraca, CpE, MIT 4 COMPUTER CRIMES When a country institutes laws against computer abuses, a computer abuse becomes a computer crime. Not all abuses, however, constitute a crime. For example, consider a hacker who breaks into someone’s computer system without permission. If the hacker steals confidential data from the system, this is considered a crime in some countries. A hacker who simply gets into the system to explore it – that is, to see how it works and what files it contains, may have breached privacy but has not necessarily committed a crime. Both acts, however, are unethical. RELATED PHILIPPINE LAWS The Intellectual Property Code of the Philippines (Republic Act No. 8293) declares that computer programs as non-patentable inventions but copyrightable. Computer programs are included in the section on literary and artistic works. The reproduction of computer programs in one back-up copy or adaptation of computer programs is permitted, without the authorization of the author/s of the copyright by the lawful owner of that computer program, provided the copy or adaptation is necessary for: a. The use of the program in conjunction with a computer for the purpose, and to the extent, for which the computer program has been obtained; b. Archival purposes, and for the replacement of the lawfully owned copy of the computer program in the event it is lost, destroyed or rendered unusable. Selling, letting for hire, trading or exposing for sale or hire, or for any purpose to an extent that will prejudice the rights of the copyright owner, even trade exhibits in public of the work, shall be guilty of an offense and shall be liable on conviction to imprisonment and fine. The E-Commerce Law of the Philippines (Republic Act No. 8792) recognizes electronic signatures found in electronic documents as equivalent to signatures on a written document. “Electronic Signature” refers to any distinctive mark, characteristic and/or sound in electronic form, representing the identity of a person and attached to or logically associated with the electronic data message or electronic document or any methodology or procedures employed or adopted by a person and executed or adopted by such person with the intention of authenticating or approving an electronic data message or electronic document. Crimes under this law include hacking or cracking, piracy, violation in the Consumer act and other related laws, violation of confidentiality, lawful access, among others. The Cybercrime Prevention Act of 2012 (Republic Act No. 10175) defines internet and computer offenses and it aims to put users of the internet and computers in check by defining violations related to their use. The Cybercrime Prevention Act divides offenses into three categories: a. offenses against the confidentiality, integrity and availability of computer data and systems, b. computer-related offenses, and c. content-related offenses. The first category includes offenses such as hacking and cybersquatting. 1. Illegal access – The access to the whole or any part of a computer system without right. 2. Illegal interception – The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data. 3. Data Interference – The intentional or reckless alteration, damaging, deletion, or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses. 4. System Interference – The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering Mariano Marcos State University – College of Computing and Information Sciences-Department of Information Technology Christian A. Sagadraca, CpE, MIT 5 or suppressing computer data or program, electronic document, or electronic data messages, without right or authority, including the introduction or transmission of viruses. 5. Misuse of devices i. The use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of: a. a device, including a computer program, designed or adapted primarily for the purpose of committing any of the offenses under this Act; or b. A computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed with intent that it be used for the purpose of committing any of the offenses under this Act. ii. The possession of an item referred to in paragraphs 5(i)(a) or (b) above with the intent to use said devices for the purpose of committing any of the offenses under this section. 6. Cybersquatting. The acquisition of domain name over the Internet in bad faith to profit, mislead, destroy reputation, and deprive others from the registering the same, if such a domain name is: i. Similar, identical, or confusingly similar to an existing trademark registered with the appropriate government agency at the time of the domain name registration; ii. Identical or in any way similar with the name of a person other than the registrant, in case of a personal name, and iii. Acquired without right or with intellectual property interests in it. The second category includes offenses such as forgery, fraud and identity theft. 1. Computer-related Forgery: i. The input, alteration, or deletion of computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible; or ii. The act of knowingly using computer data, which is the product of computer-related forgery as defined here, for the purpose of perpetuating a fraudulent or dishonest design. 2. Computer-related Fraud. The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent; provided that if no damage has yet been caused, the penalty imposed shall be one (1) degree lower. 3. Computer-related Identity Theft. The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right. Provided that if no damage has yet been caused, the penalty imposed. The third category includes offenses such unsolicited commercial communications and libel. 1. Cybersex – The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration. 2. Child Pornography – The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system. 3. Unsolicited Commercial Communications – The transmission of commercial communication with the use of computer system which seek to advertise sell, or offer for sale products and services are prohibited unless: 4. Libel – The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended committed through a computer system or any other similar means which may be devised in the future. The law now penalizes those who send unsolicited commercial communications which seek to advertise, sell, or offer for sale products and services. This should put a stop to those spam emails and other unwanted commercial communications. The law however provides for exceptions to this offense. The Cybercrime Prevention Act of 2012 also now criminalizes libel done by using a computer system. Mariano Marcos State University – College of Computing and Information Sciences-Department of Information Technology Christian A. Sagadraca, CpE, MIT 6 REFERENCES Albacea, Eliezer. Computer Ethics, IS201 Manual. UP Open University. Cybercrime Penalties under Electronic Commerce Act. Web. Retrieved November 2012. doi: digitalfilipino.com/core/uploads/2009/09/infographics-The-Philippines-E-Commerce-Law-2000-20121.png> “Republic Act No. 10175.” www.gov.ph. Official Gazette. 12 September 2012. Web. doi: www.gov.ph/2012/09/12/republic-act-no-10175/> “Ten Commandments of Computer Ethics.” computerethicsinstitute.org. Computer Ethics Institute. n.d. Web. doi: computerehticsinstitute.org/images/TheTenCommandmentsOfComputerEthics.pdf> Mariano Marcos State University – College of Computing and Information Sciences-Department of Information Technology

Use Quizgecko on...
Browser
Browser