Ethical Considerations in the Digital Age PDF
Document Details
Uploaded by SmoothBongos
University of Southern Mindanao
Nor-aine M. Corpuz
Tags
Related
- Ethical Considerations in Digital Technology PDF
- Ethical Considerations in the Digital Age PDF
- Cyber Ethics Lecture Notes PDF
- SEC524 Computer and Network Forensics Lectures 03 and 04 PDF
- Discovering Computers: Chapter 8 - Digital Security, Ethics, and Privacy PDF
- Cybersecurity Capstone Project - Jeffrey Cunningham - 2024 - PDF
Summary
This document from the University of Southern Mindanao explores ethical considerations related to information technology. It covers various topics ranging from understanding ethics to specific concepts like digital citizenship in the online world. The document touches on cyberspace, computer ethics, and cyberbullying, which clearly highlight the need for ethical awareness in a world reliant on technology.
Full Transcript
UNIVERSITY OF SOUTHERN MINDANAO Ethical and Legal considerations Prepared by: Nor-aine M. Corpuz Understanding Ethics In the rapidly changing technological environment in which we live ethical issues are increasingly been raised, demanding attention and efforts t...
UNIVERSITY OF SOUTHERN MINDANAO Ethical and Legal considerations Prepared by: Nor-aine M. Corpuz Understanding Ethics In the rapidly changing technological environment in which we live ethical issues are increasingly been raised, demanding attention and efforts towards resolution The explosive growth of ICT and the use of its enabling technologies have had major impacts on society and thus raise serious ethical questions for individuals and organizations The pressing issues raised by ICT include the invasion of individual and corporate privacy, intellectual property rights, individual and societal rights, values preservation and accountability for the consequences arising from the use of ICT, etc These issues have thrown up important challenges in the area of employment; working conditions and individuality. However, not much progress has been made in addressing these issues and challenges associated with ICT. This is because of lack of clear understanding of the issues involved. Cyberspace Cyber space is a metaphysical space created by networked computers in which users may shop, chat, or learn. It is the dynamic and virtual space that such networks of machine clones create. In other words, cyberspace is the web of consumer electronics, computers, and communication network which interconnect the world. The term “Cyberspace” was initially introduced by William Gibson in his book “Neuromancer” in 1984. The global uses of computer and Internet with advance technology in the cyber space have made people easier to commit various cyber crimes More and more criminals are exploiting the speed, convenience of the modern technology to commit more diverse types of cyber crimes. Computer Ethics Computer ethics is a set of moral principles or code of conducts that regulate the use of computers systematically without making harm to other users It gives awareness to the user regarding the immoral behavior and activities in the computing field They are a set of moral standards that govern the use of computers It is society’s views about the use of computers, both hardware and software Privacy concerns, intellectual property rights and effects on the society are some of the common issues of computer ethics Commandments of Computer Ethics Do not use a computer to harm other people. Do not use a computer to publish fake information. Do not search the file or record of other people. Do not destroy or delete the records of other people. Do not use a computer to steal someone's privacy. Do not interfere with other people's computer work. Do not snoop around in other people's files. Do not use or copy software for which you have not paid. Do not use other people's computer resources without authorization. Cyber Ethics Cyber ethics is a code of behavior for using the Internet. It is acceptable behavior on the Internet which is very much the same as acceptable behavior in everyday life. Cyber ethics is the ethics applied to the online environment Cyber Ethics cont.. Digital Citizenship Digital citizenship refers to the responsible use of technology by anyone who uses computers, the Internet, and digital devices to engage with society on any level. Digital citizenship is the responsible use of technology and etiquette pertaining to an online presence. This includes behaviors and responses to others within a digital community in which one is a member. Digital citizenship typically refers to those who use the internet regularly and is part of one or more online communities. Seven Key Concepts 1. Empathy -to understand how people talk and behave online. 2. How the Internet works 3. Understanding user data 4. Practicing digital literacy 5. Acknowledging the digital divide 6. Practicing digital wellness 7. Securing digital devices Digital Footprint Digital Footprint means the recording of interaction with the digital world. WeleavebehindtheDigitalFootprinttrailu singonlinetechnology.Theseincludedigit alcameras,ipods,smartphones,andcomp uters. A digital footprint is like an invisible report card which is stored for many years. This gives a general reflection of our online activity. Digital Footprints can be used for both good and bad purpose. CYBERBULLYING Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else Some cyberbullying crosses the line into unlawful or criminal behavior Where Does Cyberbullying Happen? E mail You may think e mail is mostly used in offices On the contrary, e mail is incredibly popular amongst children and teens This information, which can include inappropriate images and revenge porn, can be easily shared Sometimes, teens will share passwords Texting Most students with the ability to send and receive texts at all times, targets cannot escape the cruelty of their bullies Teens can send and receive harmful messages even when doing school work Instant Messaging Instant messaging sites and apps are still a popular choice especially when it comes to cyberbullying Many believe these messages are anonymous or cannot be traced These platforms easily become a means to harass their victims Social Media Bullies can instantly post embarrassing or personal photos, send direct messages, create harassing group chats or post humiliating statuses directed toward their targets Therefore, it is even more important to monitor their social media accounts UNIVERSITY OF SOUTHERN MINDANAO Intellectual property issues are of tremendous importance when developing digital content for use in education. Ownership of content developed is a key issue to consider. Globalization and ICT Globalization & Digital convergence Ethical, legal, societal issues Expression freedom, Information access, privacy rights, IP rights, cultural diversities Sembok, 2003 Privacy Four Ethical Issues of Accessibility information Accuracy age (Mason, 1986) Property Intellectual Property creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce. WIPO, ret. 2019 Copyrights © Sector- specific Patents rights Chip Designs topography Assets with commercial IP Trademarks ™ value Confidential Reputation information Expertise/ Trade secrets know-how Lakhan & Khurana, 2008 give individuals the ability to as well as reap the benefits of their create and invent creative genius Purpose of IP provide freedom to express the without fear it will be distorted, original idea and impart it to the misused, or exploited by others public will diminish if an author of an to protect the incentive to create original work cannot have control and be original or gain monetarily and in other ways from his work prevent the impulse to copy receives impetus society benefits greatly from new advances in technology, science, medicine, and art Lakhan & Khurana, 2008 the law intended to protect a creator's Copyright original ideas, theories, and concepts that are fixed in tangible form deals with the protection of original methods, concepts, processes, and Patent machinery, as well as inventions that are useful, unique, and hard to pinpoint. protect drawings, symbols, logos, words, Trademark and names a business uses to distinguish itself from others. Lakhan & Khurana, 2008 Assignment Identify the code of ethics of the following: ACM Code of ethics Philippine Computer Society : Code of Ethics of the Filipino Computing and IT Professional Code of ethics of Association of Information Technology Professionals (AITP)