Social and Professional Issues: Overview of Ethics PDF

Summary

This document presents an overview of various ethical theories, such as relativism, consequentialism, and utilitarianism. It also differentiates between ethics and morals, highlighting their distinct nature.

Full Transcript

Social and Professional Issues Chapter 1 Overview of Ethics Ethics - Ethics is also called moral philosophy, the discipline concerned with what is morally good and bad and morally right and wrong. Socrate...

Social and Professional Issues Chapter 1 Overview of Ethics Ethics - Ethics is also called moral philosophy, the discipline concerned with what is morally good and bad and morally right and wrong. Socrates - Who believed that the chief aim of education and philosophy is the pursuit of and love of the good itself, rather than any particular good thing. Ethical Theories We can think of ethical theory as a decision model. The critical element in morality is the need to make decisions regarding fairly difficult issues. Common Ethical Issues I. Relativism - is the theory that there is no universal moral norm of right and wrong. According to this theory different individuals or groups of people can have completely opposite views or moral problem, and both can be right. Subjective Relativism - holds that each person decides right and wrong for himself/herself. This notion is captured in the popular expression “What’s right for you may not right for me.” Cultural Relativism - is the ethical theory that the meaning of “right” and “wrong” rests with a society’s actual moral guidelines. These guidelines vary widely from place to place and from time to time. Ethical behavior normally adapts to generally accepted norms. Particular action may be wrong in a society at one time and wrong in another society or in another time. e.g. Capital punishment. II. Divine Command Theory - is based on the idea that good actions are those aligned with the will of God and bad actions are those contrary to the will of God. III. Ethical Egoism - is the philosophy that each person should focus exclusively on his or her self- interest. In other words, according to ethical egoism, the morally right action for a person to take in a particular situation is the action that will provide that person with the maximum long-term benefit. It does not prohibit acting to help someone else, but assisting another is the right thing to do if and only if it is the helper’s own long-term best interest. IV. Consequentialism - “The end will justify the means.” In consequentialism, the consequence of an action justifies the moral acceptability of the means taken to reach that end. It is the consequence of an action which determines whether or not the action is moral. The results of the action prevail over any other consideration. It holds that evaluating results is more important than evaluating the actions. Thus, rightness or wrongness of actions is definable in terms of the goodness or badness of the result. V. Utilitarianism - Utilitarianism is the philosophy that the right action is the one that produces the most intrinsic good for everyone affected. It believes in "the greatest happiness for the greatest number". Utility equates to happiness, which depending on the context may mean an advantage, a benefit, good, pleasure or profit. The principle of utility is known as the Greatest Happiness Principle. VI. Kantianism - Kantianism or Deontology is an obligation-based theory whose chief author was Immanuel Kant, who lived in the 18th century. This theory emphasizes the type of action rather than the consequences of that action. Deontologists believe that moral decisions should be made based on one’s duties and the rights of others. According to Kant, morality is based on pure reason. As people have the innate ability to act rationally, they, therefore, must act morally, irrespective of personal desires. Another way of stating Kant’s theory is “Act morally regardless of the consequences. Ethics vs. Morals - Ethics and morals relate to “right” and “wrong” conduct. While they are sometimes used interchangeably, they are different: ethics refer to rules provided by an external source, e.g., codes of conduct in workplaces or principles in religions. Morals refer to an individual’s own principles regarding right and wrong. Ethics versus Morality Comparison Table Ethics Morals What are they? - Describes standards or - Are one’s personal codes of behavior beliefs about right and expected of an individual wrong by a group (nation, organization, profession) - Principles or habits to which an individual with respect to right or belongs. wrong conduct. While morals also prescribe dos - The rules of conduct and don'ts, morality is recognized in respect to ultimately a personal a particular class of compass of right and human actions or a wrong. particular group or culture. - It is concerned with righteousness or - The Concise Oxford immorality of character Dictionary defines ethics or disposition, or with as: “Relating to morals, the distinction between treating of moral right and wrong; dealing questions; morally with regulations of correct, honorable” conduct. Where do they come from? Social system - External Individual - Internal Why we do it? Because society says it Because we believe in is the right thing to do. something being right or wrong. Flexibility Ethics are dependent on Usually consistent, others for definition. although can change if an They tend to be individual’s beliefs consistent within a change. certain context but can vary between contexts. The "Gray" A person strictly A Moral Person, although following Ethical perhaps bound by a higher Principles may not have covenant, may choose to any Morals at all. follow a code of ethics Likewise, one could as it would apply to a violate Ethical system. "Make it fit" Principles within a given system of rules in order to maintain Moral integrity. Origin Greek word "ethos" Latin word "mos" meaning meaning "character" "custom" Acceptability Ethics are governed by Morality transcends professional and legal cultural norms. guidelines within a particular time and place. Morality - it seems to be used in two distinct broad senses: a descriptive sense and a normative sense. Descriptive Sense - descriptively to refer to certain codes of conduct put forward by a society or a group (such as a religion) or accepted by an individual for her own behavior. Normative Sense - normatively to refer to a code of conduct that, given specified conditions, would be put forward by all rational people. Law Law is a system of rules that tells us what we can and cannot do. Laws are enforced by a set of institutions (the police, courts, law-making bodies). Legal acts are acts that conform to the law. Moral acts conform to what an individual believes to be the right thing to do. Laws can proclaim an act as legal, although many people may consider the act immoral—for example, abortion. There is a temptation to see the law and ethics as the same – so long as we’re fulfilling our legal obligations, we can consider ourselves ‘ethical’. This is mistaken on two fronts. First, the law outlines a basic standard of behavior necessary for our social institutions to keep functioning. For example, it protects basic consumer rights. However, in certain situations the right thing to do to solve a dispute with a customer might require us to go beyond our legal obligations. Secondly, there may be times when obeying the law would require us to act against our ethics or morality. A doctor might be obligated to perform a procedure they believe is unethical or a public servant might believe it’s their duty to leak classified information to the press. Some philosophers have argued that a person’s conscience is more binding on them than any law, which suggests the letter of the law won’t be an adequate substitute for ethical reflection. Ethical Reasoning - is how to think about issues of right or wrong. No matter how knowledgeable one is about their profession, if the knowledge is not backed by ethical reasoning, long-term success in the career is likely to be severely compromised. Ethical reasoning is hard because there are so many ways to fail. Ethical Behavior - is far harder to display than one would expect simply on the basis of what we learn from our parents, from school, and from our religious training. To intervene, individuals must go through a series of steps, and unless all of the steps are completed, they are not likely to behave in an ethical way, regardless of the amount of training they have received in ethics, and regardless of their levels of other types of skills. Social and Professional Issues Chapter 2 Ethics for IT Professionals and IT Users What is a Professional? - is a calling requiring specialized knowledge and often long intensive academic preparation. - The United States Code of Federal Regulations defines a person “employed in a professional capacity” as one who meets these four criteria: 1. One’s primary duties consist of the performance of work requiring knowledge of an advanced type in a field of science or learning customarily acquired by a prolonged course of specialized intellectual instruction and study or work. 2. One’s instruction, study, or work is original and creative in character in a recognized field of artistic endeavor and the result of which depends primarily on the invention, imagination, or talent of the employee. 3. One’s work requires the consistent exercise of discretion and judgment on its performance. 4. One’s work is predominately intellectual and varied in character and is of such character that the output produced or the result accomplished cannot be standardized in relation to a given period of time. Definition of an IT Professional - Given the definition of “professional”, there are many business workers whose duties, background and training, and work could qualify them to be classified as professionals. - These people include marketing analysts, financial consultants, and IT specialists.  A partial list of IT specialists includes programmers, systems analysts, software engineers, database administrators, LAN administrators, and chief information officers (CIOs).  It could be argued that not every IT role requires “knowledge” of an advanced type in a field of science or learning customarily acquired by a prolonged course of specialized intellectual instruction and study. - E.g. Does someone who completes a two-year, part-time training program in LAN administration meet the criteria to be classified as a professional? - From a practical standpoint, the IT industry recognizes people from a wide set of backgrounds, education, and personal experience in many different roles as IT professionals – provided they can do the job required by such a role. Professional Relationships IT professionals become involved in many different types of relationships.  Professional-employer  Professional-client  Professional-supplier  Professional-professional  Professional-IT user  Professional-society Information Technology Professionals Many workers in the IT industry are considered to be professionals. A partial list includes:  Programmers/Analysts  Software engineers  Database administrators  Network administrators  Chief information officers Stewards of IT Resources  IT professionals must set an example and enforce policies that promote ethical use of IT resources.  Software piracy is the act of illegally making copies of software.  A trade secret is a piece of information that is generally not known to the public and that is held confidential. Professional Codes of Ethics  A professional code of ethics states the principles and core values essential to the work of a particular occupational group.  Practitioners in many professions subscribe to a code of ethics that governs their behavior.  Most codes of ethics created by professional organizations have two main parts.  Outlines what the professional organization aspires to become  Typically lists rules and/or principles by which members of the organization are expected to abide  Many codes also include a commitment to continuing education as a fundamental tenet in recognition of the need for life-long learning by those who practice the profession.  Laws do not provide a complete guide to ethical behavior.  Just because an activity is not defined as illegal does not mean that it is ethical.  We cannot expect a professional code of ethics to provide the complete answer – no code can be the definitive collection of behavioral standards.  Only by understanding and adopting the principles behind the code and interpreting what is really intended can one achieve the intent.  If one fully embraces and practices according to a professional code of ethics, there are many benefits – for the individual, for the profession, and for society as a whole.  The following are the benefits of a code of ethics:  Improves ethical decision-making  Promotes high standards of practice and ethical behavior  Enhances trust and respect from the general public  Provides an evaluation benchmark Improves Ethical Decision-Making - Adherence to a professional code of ethics means that practitioners will use a common set of core values and beliefs to serve as a guideline for ethical decision-making. Promotes High Standards of Practice  Adherence to a professional code of ethics reminds professionals of the responsibilities and duties that they may be tempted to compromise to meet the press of day-to-day business.  The code also defines behaviors that are acceptable and unacceptable to guide professionals in their interactions with others.  Strong codes of ethics actually have procedures for censuring professionals for serious violations, with penalties up to and including the loss of the right to continue to practice.  Such codes are the exception, and no such codes exist in the IT arena.  Public trust is built on the expectation that a professional will behave ethically.  We often find ourselves placed in a position where we must depend on the integrity and good judgment of a professional to tell the truth, abstain from giving self-serving advice, and offer warnings of the potential negative side effects of our actions.  Thus, adherence to a code of ethics enhances our trust and respect of the professional and their profession. Provides an Evaluation Benchmark  A code of ethics provides an evaluation benchmark that can be used by the professional as a means of self-assessment.  Peers of the professional can also use the code for purposes of recognition or censure of individuals. IT Professional-Society  IT professionals develop and support systems that interact with the world around them.  The public expects that the members of the IT profession will practice the profession in a way that will not bring harm to society. Association of Computing Machinery (ACM)  A computing society founded in 1947  The ACM serves more than 80,000 professionals in over 100 countries and offers more than 24 publications for technology professionals.  The ACM has a code of ethics and professional conduct with supplemental explanations and guidelines.  The ACM code consists of 8 general moral imperatives, 8 specific professional responsibilities, 6 organizational leadership imperatives, and 2 elements of compliance. Association of Information Technology Professionals (AITP)  The AITP was formed in the 1950s to enable its members to keep ahead of the rapid pace of change in information technology.  Its mission is to provide superior leadership and education in information technology.  One of its goals is to help its members become more marketable in the broad and rapidly changing career field of information technology.  The AITP also has a code of ethics and standards of conduct. Computing Society of the Institute of Electrical and Electronics Engineers (IEEE- CS)  The Institute of Electrical and Electronics Engineers (IEEE) covers the very broad fields of electrical, electronic, and information technologies and sciences.  The IEEE-CS is one of the oldest and largest IT professional associations with over 100,000 members.  Nearly a third of its members live and work outside the United States.  Founded in 1946, it is the largest of the 36 societies of the IEEE.  The IEEE-CS’s vision is to be the leading provider of technical information and services to the world’s computing professionals.  The society promotes an active exchange of information, ideas, and technological innovation among its members through its many conferences, applications-related and research-oriented journals, local and student chapters, technical committees, and standards working group. Certification & Licensing  Certification is a process administered by a profession or organization that one undertakes voluntarily to prove competency in a set of skills.  Licensing is a process generally administered by the state that professionals must undertake to prove that they can practice their profession in a way that is ethical and safe to the public. Certification & Licensing 15 most in-demand certifications  AWS Certified Cloud Practitioner  Certified Cloud Security Professional (CCSP)  Certified Data Privacy Solutions Engineer (CDPSE)  Certified Data Professional (CDP)  Certified Ethical Hacker (CEH)  Certified Information Security Manager (CISM)  Certified Information Systems Security Professional (CISSP)  Cisco Certified Internetwork Expert (CCIE)  Cisco Certified Network Professional (CCNP)  CompTIA (A+, Cloud+, Security+)  Microsoft Certified Azure Solutions Architect Expert  Information Technology Infrastructure Library (ITIL)  Oracle MySQL Database Administration  Project Management Professional (PMP)  Salesforce Certified Development Lifecycle and Deployment Designer Issues Associated with Licensing IT Professionals  No universally accepted core body of knowledge.  It is unclear who should manage the content and administration of licensing exams.  Nobody to do accreditation of professional education programs.  Nobody to assess and assure competence of individual professionals. IT Professional-Client  In this relationship, the professional and client each agree to provide something of value to each other.  The IT professional usually provides a hardware or software product, and the client provides compensation. IT Professional-Employer  The relationship between a professional and an employer requires ongoing efforts by both parties to keep it strong.  Professionals and employers discuss many job aspects before employment begins. IT Professional-Supplier  IT professionals may have many different relationships with many software, hardware, and service providers.  The IT professional must be on guard to keep the relationships honest and business related. IT Professional-Professional  Professionals feel a degree of loyalty to other members in the profession.  Professionals help support each other publicly.  Professionals owe one another and adherence to the profession’s code of conduct. IT Users Common IT users’ ethical issues: Software piracy.  Inappropriate use of computing resources.  Inappropriate sharing of information. IT Professional-IT User  An IT user is a person for whom the hardware or software is designed.  Professionals have a duty to understand the needs and capabilities of users.  Professionals have a responsibility to deliver their product or service on time and within budget. Supporting Ethical Practices of IT Users  Define and limit the appropriate use of IT resources.  Establish guidelines for the use of company software.  Structure information systems to protect data and information.  Install and maintain a corporate firewall. Summary A professional is someone:  who requires advanced training and experience.  who exercises discretion and judgment during work.  whose work cannot be standardized.  IT professionals have many different relationships that have different ethical issues. Social and Professional Issues Chapter 3 Code of Ethics of the Filipino IT Professionals Code of Ethics of the Filipino IT Professionals - I will use my special knowledge and skills for the benefit of the public. I will serve employers and clients with integrity, subject to an overriding responsibility to the public interest. And I will strive to enhance the competence and prestige profession. By these I mean: 1. I will promote public knowledge, understanding, and appreciation of information technology. 2. I will consider the general welfare and public good in performance of my work. 3. I will advertise goods and professional services in a clear and truthful manner. 4. I will comply and strictly abide by the intellectual property laws, patent laws and other related laws in respect of information technology. 5. I will accept full responsibility for the work undertaken and will utilize my skills with competence and professionalism 6. I will make truthful statements on my areas of competence as well as the capabilities and qualities of my product or services. 7. I will not disclose or use any confidential information obtained in the course of professional duties without the consent of the parties concerned, except when required by law. 8. I will strive to attain the highest quality in both the products and services that I offer. 9. I will not knowingly participate in the development of information technology systems that will promote the commission of fraud and other unlawful acts. 10. I will uphold and improve the IT professional standards through continuing professional development in order to enhance the IT profession. Association of Computing Machinery (ACM) Code of Ethics and Professional Conduct  ACM, the Association for Computing Machinery, is the world's largest educational and scientific society, uniting computing educators, researchers and professionals to inspire dialogue, share resources and address the field's challenges.  Computing professionals' actions change the world. To act responsibly, they should reflect upon the wider impacts of their work, consistently supporting the public good. The ACM Code of Ethics and Professional Conduct ("the Code") expresses the conscience of the profession.  The Code is designed to inspire and guide the ethical conduct of all computing professionals, including:  current and aspiring practitioners  instructors  students  influencers  and anyone who uses computing technology in an impactful way.  Additionally, the Code serves as a basis for remediation when violations occur.  The Code includes principles formulated as statements of responsibility, based on the understanding that the public good is always the primary consideration. Each principle is supplemented by guidelines, which provide explanations to assist computing professionals in understanding and applying the principle. General Ethical Principles A computing professional should… 1. Contribute to society and to human well-being, acknowledging that all people are stakeholders in computing.  This principle, which concerns the quality of life of all people, affirms an obligation of computing professionals, both individually and collectively, to use their skills for the benefit of society, its members, and the environment surrounding them.  This obligation includes promoting fundamental human rights and protecting each individual's right to autonomy. 2. Avoid harm.  In this document, "harm" means negative consequences, especially when those consequences are significant and unjust.  Examples of harm include unjustified physical or mental injury, unjustified destruction or disclosure of information, and unjustified damage to property, reputation, and the environment. This list is not exhaustive. 3. Be honest and trustworthy.  Honesty is an essential component of trustworthiness. A computing professional should be transparent and provide full disclosure of all pertinent system capabilities, limitations, and potential problems to the appropriate parties.  Making deliberately false or misleading claims, fabricating or falsifying data, offering or accepting bribes, and other dishonest conduct are violations of the Code. 4. Be fair and take action not to discriminate.  The values of equality, tolerance, respect for others, and justice govern this principle. Fairness requires that even careful decision processes provide some avenue for redress of grievances.  Computing professionals should foster fair participation of all people, including those of underrepresented groups.  Prejudicial discrimination on the basis of age, color, disability, ethnicity, family status, gender identity, labor union membership, military status, nationality, race, religion or belief, sex, sexual orientation, or any other inappropriate factor is an explicit violation of the Code.  Harassment, including sexual harassment, bullying, and other abuses of power and authority, is a form of discrimination that, amongst other harms, limits fair access to the virtual and physical spaces where such harassment takes place. 5. Respect the work required to produce new ideas, inventions, creative works, and computing artifacts.  Developing new ideas, inventions, creative works, and computing artifacts creates value for society, and those who expend this effort should expect to gain value from their work.  Computing professionals should therefore credit the creators of ideas, inventions, work, and artifacts, and respect copyrights, patents, trade secrets, license agreements, and other methods of protecting authors' works. 6. Respect privacy.  The responsibility of respecting privacy applies to computing professionals in a particularly profound way. Technology enables the collection, monitoring, and exchange of personal information quickly, inexpensively, and often without the knowledge of the people affected.  Therefore, a computing professional should become conversant in the various definitions and forms of privacy and should understand the rights and responsibilities associated with the collection and use of personal information. 7. Honor confidentiality.  Computing professionals are often entrusted with confidential information such as trade secrets, client data, nonpublic business strategies, financial information, research data, pre-publication scholarly articles, and patent applications.  Computing professionals should protect confidentiality except in cases where it is evidence of violation of law, of organizational regulations, or of the Code. In these cases, the nature or contents of that information should not be disclosed except to appropriate authorities.  A computing professional should consider thoughtfully whether such disclosures are consistent with the Code. Professional Responsibilities A computing professional should... 1. Strive to achieve high quality in both the processes and products of professional work.  Computing professionals should insist on and support high quality work from themselves and from colleagues.  The dignity of employers, employees, colleagues, clients, users, and anyone else affected either directly or indirectly by the work should be respected throughout the process.  Computing professionals should respect the rights of those involved to transparent communication about the project. 2. Maintain high standards of professional competence, conduct, and ethical practice.  High quality computing depends on individuals and teams who take personal and group responsibility for acquiring and maintaining professional competence.  Professional competence starts with technical knowledge and with awareness of the social context in which their work may be deployed. 3. Know and respect existing rules pertaining to professional work.  "Rules" here include local, regional, national, and international laws and regulations, as well as any policies and procedures of the organizations to which the professional belongs.  Computing professionals must abide by these rules unless there is a compelling ethical justification to do otherwise. Rules that are judged unethical should be challenged.  A rule may be unethical when it has an inadequate moral basis or causes recognizable harm. 4. Accept and provide appropriate professional review.  High quality professional work in computing depends on professional review at all stages.  Whenever appropriate, computing professionals should seek and utilize peer and stakeholder review.  Computing professionals should also provide constructive, critical reviews of others' work. 5. Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks.  Computing professionals are in a position of trust, and therefore have a special responsibility to provide objective, credible evaluations and testimony to employers, employees, clients, users, and the public.  Computing professionals should strive to be perceptive, thorough, and objective when evaluating, recommending, and presenting system descriptions and alternatives. 6. Perform work only in areas of competence.  A computing professional is responsible for evaluating potential work assignments.  This includes evaluating the work's feasibility and advisability, and making a judgment about whether the work assignment is within the professional's areas of competence. 7. Foster public awareness and understanding of computing, related technologies, and their consequences.  As appropriate to the context and one's abilities, computing professionals should share technical knowledge with the public, foster awareness of computing, and encourage understanding of computing.  Communications with the public should be clear, respectful, and welcoming. 8. Access computing and communication resources only when authorized or when compelled by the public good.  Individuals and organizations have the right to restrict access to their systems and data so long as the restrictions are consistent with other principles in the Code.  Consequently, computing professionals should not access another's computer system, software, or data without a reasonable belief that such an action would be authorized or a compelling belief that it is consistent with the public good. 9. Design and implement systems that are robust and usably secure.  Breaches of computer security cause harm. Robust security should be a primary consideration when designing and implementing systems.  Professionals should perform due diligence to ensure the system functions as intended and take appropriate action to secure resources against accidental and intentional misuse, modification, and denial of service. Professional Leadership Principles A computing professional, especially one acting as a leader, should... 1. Ensure that public goods are the central concern during all professional computing work.  People—including users, customers, colleagues, and others affected directly or indirectly—should always be the central concern in computing.  Public goods should always be an explicit consideration when evaluating tasks associated with research, requirements analysis, design, implementation, testing, validation, deployment, maintenance, retirement, and disposal.  Computing professionals should keep this focus no matter which methodologies or techniques they use in their practice. 2. Articulate, encourage acceptance of, and evaluate fulfillment of social responsibilities by members of the organization or group.  Technical organizations and groups affect broader society, and their leaders should accept the associated responsibilities.  Organizations—through procedures and attitudes oriented toward quality, transparency, and the welfare of society—reduce harm to the public and raise awareness of the influence of technology in our lives. 3. Manage personnel and resources to enhance the quality of working life.  Leaders should ensure that they enhance, not degrade, the quality of working life.  Leaders should consider the personal and professional development, accessibility requirements, physical safety, psychological well-being, and human dignity of all workers.  Appropriate human-computer ergonomic standards should be used in the workplace. 4. Articulate, apply, and support policies and processes that reflect the principles of the Code.  Leaders should pursue clearly defined organizational policies that are consistent with the Code and effectively communicate them to relevant stakeholders.  In addition, leaders should encourage and reward compliance with those policies, and take appropriate action when policies are violated. 5. Create opportunities for members of the organization or group to grow as professionals.  Educational opportunities are essential for all organizations and group members.  Leaders should ensure that opportunities are available to computing professionals to help them improve their knowledge and skills in professionalism, in the practice of ethics, and in their technical specialties. 6. Use care when modifying or retiring systems.  Interface changes, the removal of features, and even software updates have an impact on the productivity of users and the quality of their work.  Leaders should take care when changing or discontinuing support for system features on which people still depend.  Leaders should thoroughly investigate viable alternatives to removing support for a legacy system. 7. Recognize and take special care of systems that become integrated into the infrastructure of society.  Even the simplest computer systems have the potential to impact all aspects of society when integrated with everyday activities such as commerce, travel, government, healthcare, and education.  When organizations and groups develop systems that become an important part of the infrastructure of society, their leaders have an added responsibility to be good stewards of these systems. Compliance with the code A computing professional should... 1. Uphold, promote, and respect the principles of the Code.  The future of computing depends on both technical and ethical excellence.  Computing professionals should adhere to the principles of the Code and contribute to improving them.  Computing professionals who recognize breaches of the Code should take actions to resolve the ethical issues they recognize, including, when reasonable, expressing their concern to the person or persons thought to be violating the Code. 2. Treat violations of the Code as inconsistent with membership in the ACM.  Each ACM member should encourage and support adherence by all computing professionals regardless of ACM membership.  ACM members who recognize a breach of the Code should consider reporting the violation to the ACM, which may result in remedial action as specified in the ACM's Code of Ethics and Professional Conduct Enforcement Policy. Social and Professional Issues Chapter 4 Computer Ethics and the Ten Commandments History of Computer Ethics Alan Turing - The father of computer sciences,' Alan Turing developed the concept of artificial intelligence and made significant contributions to cracking the German Enigma code during World War II. Norbert Wiener - Norbert Wiener was one of the first to analyze the social and ethical impacts of information technology and computing and laid the groundwork for computer ethics in his seminal book Cybernetics: Or Control and Communication in the Animal and the Machine. Pioneers - In the 1940s and 1950s, early computer scientists and philosophers reflected on the ethical responsibilities that came with the development of computing technology. Hackers and Crackers - In the 1960s and 1970s, the emergence of hackers and crackers—individuals who break into computer systems—raised new ethical questions. Robotics and AI - The rise of robotics and artificial intelligence has led to new ethical debates about automated decision-making, privacy, and accountability. Computer Ethics What are computer ethics? - Computer ethics first came to attention in 1985 when the Computer Ethics Institute was created by, among others, The Brookings Institute, IBM and the Washington Theological Consortium. It was originally called the Coalition for Computer Ethics. Who decided this? - The idea was originally put forward in a paper called ‘In Pursuit for a Ten Commandments for Computer Ethics’ by Ramon C. Barquin. It was designed to be a guide and standard to follow in how to use computers ethically. They follow the biblical style of the Ten Commandments of behavior. How is this relevant to me? - Because you are a user of computers and the internet. It is becoming more relevant every year as the Internet of Things expands. The Ten Commandments 1. Thou shalt not use a computer to harm other people 2. Thou shalt not interfere with other people’s computer work 3. Thou shalt not access other people’s computer files 4. Thou shalt not use a computer to steal 5. Thou shalt not use a computer to bear false witness 6. Thou shalt not copy or use proprietary software for which you have not paid (without permission) 7. Thou shalt not use other people’s computer resources without authorization or proper compensation 8. Thou shalt not appropriate other people’s intellectual output 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing 10. Thou shalt always use computers in ways that ensure consideration and respect for other humans Real-Life Applications 1. Healthcare - Ensuring patient privacy and data security is crucial in healthcare, where sensitive information is stored and shared using computer systems. 2. E-commerce - Consumers have the right to privacy and clear terms of service when using e- commerce websites, which collect and process personal and financial data. 3. Education - Providing equal access to educational resources and minimizing the digital divide is a key ethical concern in education, where technology is increasingly used in teaching and learning. Challenges and Controversies Data Breaches - Companies face increasing pressure to protect customer data from cyber-attacks, data breaches, and hacking attempts Artificial Intelligence - The rise of AI and machine learning raises ethical questions about bias, fairness, transparency, and accountability. Disinformation - The spread of disinformation, fake news, and propaganda on social media poses a significant challenge to online ethics and democracy. The Future of Computer Ethics 1. Greater awareness - As technology advances and becomes more integrated into our lives, there will be greater awareness of the ethical implications. 2. New regulations - Regulators and policymakers will play an increasingly important role in shaping the ethical landscape of technology and innovation. 3. Ethical innovation - Technology companies will need to prioritize ethical innovation and social responsibility, as well as profitability and growth. Case Studies: The Importance of Computer Ethics Cyberbullying Example - One common computer ethics issue is cyberbullying, which can be harmful and lead to severe psychological effects for victims. Online Privacy Example - Another common computer ethics issue is the protection of online privacy and information, where cybercriminals can hack personal accounts, micromanage privacy and data theft, and disclose sensitive data. Call to Action Stay informed - Read up on the latest news and research on computer ethics and technology. Speak up - Be an advocate for ethical practices in your workplace, community, and online interactions. Take responsibility - Understand the impact of your own actions online and strive to use technology in ethical and responsible ways. Always Be Mindful - Computer ethics are continually evolving, so it is essential always to exercise critical thinking, awareness, and moral judgment in the use of technology. We Can Do Better - Let us all make a conscientious effort to observe computer ethics every day and create a safer, more responsible digital world. Social and Professional Issues Chapter 5 Preserving Privacy in the Digital Age What is Privacy? - Privacy is the ability to control one's personal information and protect it from unwanted access or disclosure. It involves the right to be left alone and the freedom to choose who can access your information. The Right to Privacy - The right to privacy is a fundamental human right recognized in many countries. It protects individuals from arbitrary and unauthorized intrusions into their private lives, such as surveillance, searches, and seizures. Threats to Privacy - Technological advancements have made it easier for personal information to be collected, analyzed, and shared without consent. Cybersecurity threats like hacking, phishing, and malware can also compromise data privacy. Examples of Technological Developments Impacting Privacy Social Media - Companies collect and analyze user data for targeted advertising. Internet of Things (IoT) - Connected devices can collect and share data without user consent. Artificial Intelligence (AI) - Machine learning algorithms can process vast amounts of data to draw conclusions about individuals. Big Data - Data brokers collect and sell personal information to advertisers without consent. Key Privacy and Anonymity Issues Tracking - Companies use cookies and other technologies to track users across the web, collecting their personal information. Surveillance - Government agencies may use surveillance technologies to monitor individuals without their knowledge or consent. Anonymity - It can be difficult to remain anonymous online and protect one's identity from potential threats. Data Privacy Act of the Philippines (RA 10173) - The Data Privacy Act of the Philippines is a law that aims to protect the privacy of personal information collected and processed by both government and private organizations. It provides guidelines for the collection, use, storage, and sharing of personal data and outlines penalties for violations. KNOW YOUR RIGHTS FOR PRIVACY Conclusion - Protecting your personal information is crucial in today's digital age. By understanding the key issues and implementing best practices, you can help ensure your privacy is safeguarded. Stay informed, stay vigilant, and stay safe. Social and Professional Issues Chapter 6 Intellectual Property Introduction  Intellectual property refers to creations of the mind, such as inventions, artistic works, designs, and symbols, that are protected by laws.  Protecting intellectual property is crucial as it incentivizes innovation and creativity, fosters economic value, and provides a competitive advantage.  In the Philippines, intellectual property is governed by the Intellectual Property Code or RA 8293. What is Intellectual Property Code of the Philippines RA 8293?  The law: Republic Act No. 8293 [An Act Prescribing the Intellectual Property Code and Establishing the Intellectual Property Office, Providing for Its Powers, and Functions, and for Other Purposes] otherwise known as the Intellectual Property Code of the Philippines.  It shall protect and secure the exclusive rights of scientists, inventors, artists and other gifted citizens to their intellectual property and creations, particularly when beneficial to the people, for such periods as provided in this Act. Types of Intellectual Property Copyright - Secures exclusive rights to original literary, artistic, and musical works. Trademark - Protects distinctive signs, logos, or symbols that identify and distinguish goods or services. Patent - Grants exclusive rights to novel inventions, processes, or products for a limited period. Trade Secret - Confidential business information, such as formulas, customer lists, or manufacturing processes. Benefits of Intellectual Property Protection 1. Encouragement of innovation and creativity - By providing legal protection, individuals and businesses are motivated to invest their time, resources, and talents in developing new ideas and solutions. 2. Economic value and competitive advantage - Intellectual property can drive economic growth by creating jobs, attracting investments, and enabling businesses to differentiate themselves in the market. Challenges in Intellectual Property Protection Global enforcement challenges  Inconsistent copyright laws and enforcement across different countries  Difficulty in monitoring and stopping international infringement Technological advancements and piracy  Rapid technological developments have facilitated unauthorized copying, counterfeiting, and unauthorized distribution of intellectual property. Balancing protection and access to knowledge  Striking a balance between ensuring intellectual property protection and allowing access to knowledge for educational, research, and public interest purposes is a complex challenge. Intellectual Property Management 1. Strategies for protecting intellectual property - Developing robust internal policies, implementing effective security measures, and conducting regular audits to identify and address vulnerabilities. 2. IP licensing and agreements - Entering into licensing agreements to grant permission for others to use intellectual property rights while ensuring proper compensation and control. 3. International IP protection initiatives - Collaborating with international organizations and participating in treaties and agreements to strengthen intellectual property protection globally. Conclusion  In summary, understanding and respecting intellectual property rights is essential for individuals and businesses alike.  By protecting intellectual property, we foster innovation, drive economic growth, and ensure a fair and competitive marketplace. Social and Professional Issues Chapter 7 Cybercrime Cybercrime  Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device.  Most cybercrime is committed by cybercriminals or hackers who want to make money.  However, occasionally cybercrime aims to damage computers or networks for reasons other than profit. Overview of Philippine Cybercrime Law Republic Act No. 10175 or the “Cybercrime Prevention Act of 2012” Purpose and Objectives - To address illegal activities conducted through the internet and other information and communications technologies. - To provide a legal framework for the detection, investigation, and prosecution of cybercrimes. Key Provisions and Penalties - Examples of cybercrimes covered: hacking, online fraud, identity theft, etc. - Penalties range from fines to imprisonment depending on the severity of the offense. Anti-Photo and Video Voyeurism Act of 2009 Anti-Photo and Video Voyeurism Act of 2009 (Republic Act No. 9995) - this act addresses privacy concerns in the digital realm, including the unauthorized recording or distribution of intimate images or videos. Definition of Voyeurism - Capturing, recording, or distributing intimate images without consent. Legal Implications and Consequences - Offenders may face imprisonment and fines. - Victims have the right to seek damages. Protecting Privacy in the Digital Age - Raising awareness about privacy settings and secure online behavior. Offenses against the Confidentiality and Availability of Computer Data and Systems Types of Offenses  Illegal Access  Illegal Interception  Data Interference  Misuse of Devices  Cyber-squatting Impact on Individuals and Organizations  Data breaches can lead to financial loss and damage to reputation.  Legal consequences for perpetrators. 1. Illegal Access - Illegal Access: Prohibits unauthorized access to computer systems, networks, or data. This includes hacking and other forms of unauthorized entry. Ethical Hackers - Role in Identifying Vulnerabilities  Ethical hackers simulate cyberattacks to identify weaknesses. - Legal Framework for Ethical Hacking  Collaboration with organizations to strengthen cybersecurity. - Importance in Cybersecurity  Examples of ethical hackers preventing major data breaches. 2.Illegal Interception - Illegal Interception: Addresses the interception of data without proper authorization, safeguarding the privacy of electronic communications. Intercepting communication for unauthorized access. - Example  Example: Intercepting emails for corporate espionage. - Risks and Consequences  Legal penalties for illegal interception. 3. Data Interference - Data Interference: Deals with the intentional alteration, damaging, deletion, or deterioration of electronic data. - Manipulation of Data  Altering, damaging, or deleting data without authorization. - Effects on Data Integrity and Reliability  Example: Manipulating financial records for fraud. 4.Misuse of Devices - Misuse of Devices: Covers the unauthorized use, possession, or creation of devices for cybercrime purposes. - Unauthorized Use of Computing Resources  Example: Using company computers for personal gain. - Implications for Individuals and Organizations  Violation of trust and potential legal repercussions. 5.Cyber-squatting - Cyber-Squatting: Focuses on registering, trafficking, or using domain names in bad faith with the intent to profit or deceive. - Definition and Purpose  Registering or using a domain name with the intent to profit. - Domain Name Disputes  Examples of legal actions against cyber-squatters. Computer Related Offences - Computer-related offenses encompass a range of illegal activities that involve the use of computers or information systems. These offenses can take various forms, including: 1. Unauthorized Access: - This involves gaining entry into a computer system, network, or database without proper authorization. It often constitutes a breach of privacy and security.  Example: Hacking into a company's server to access sensitive customer information. 2. Distribution of Malware: - This offense involves the creation or dissemination of malicious software, such as viruses, worms, or Trojans, with the intent to harm or compromise computer systems.  Example: Spreading a computer virus via email attachments. 3.Denial-of-Service (DoS) Attacks: - In a DoS attack, a perpetrator floods a system or network with excessive traffic or data, rendering it inaccessible to legitimate users.  Example: Overloading a website's servers to make it unavailable to visitors. Forgery - Forgery is the act of creating or altering documents, signatures, or credentials with the intent to deceive or commit fraud. In the digital realm, forgery can involve creating fake electronic documents or manipulating existing ones.  Example: Creating a counterfeit electronic signature to authorize a transaction. Fraud - Fraud involves deceptive practices intended to gain an unfair advantage or financial benefit. In the context of computers, online fraud is prevalent and can manifest in various ways: 1. Phishing: - Perpetrators create fake emails or websites that mimic legitimate entities to trick recipients into revealing sensitive information like passwords or credit card details.  Example: Sending an email claiming to be from a bank and requesting login credentials. 2. E-commerce Fraud: - This involves fraudulent activities in online marketplaces, including fake product listings, non-delivery of goods, or identity theft.  Example: Creating a fake online store to collect payments for non-existent products. Identity Theft - Identity theft is the unauthorized acquisition and use of someone's personal information, such as Social Security numbers, credit card details, or other sensitive data, usually for financial gain or fraudulent purposes.  Example: Stealing a person's identity to open credit card accounts or apply for loans in their name. Statistics  According to a report by the FBI, in 2019, the Internet Crime Complaint Center (IC3) received over 467,000 complaints related to cybercrime, resulting in over $3.5 billion in losses.  The Identity Theft Resource Center reported over 1,200 data breaches in 2020, exposing nearly 165 million records. Cybersex - Cybersex refers to a form of sexual activity or interaction conducted over the internet using digital devices like computers, smartphones, or webcams. It involves individuals engaging in explicit sexual content or conversations through various online platforms. Here are some key aspects to consider: Involves coercing individuals, often minors, into explicit online activities. Consent and Age Considerations: Legal Age: Engaging in cybersex with minors is illegal in most jurisdictions as it constitutes child exploitation or child pornography. It's crucial to ensure that all participants are of legal age and can provide informed consent. Informed Consent: It's important that all parties involved willingly and knowingly participate in cybersex activities. Consent should be clear and voluntary. Forms of Cybersex Text-based Chat: - This involves engaging in sexually explicit conversations through text messages, instant messaging platforms, or chat rooms. Participants type out messages to describe sexual fantasies or activities. Video Chat: - Participants use webcams to engage in real-time video streaming of themselves engaging in sexual activities or sharing explicit content with one another. Virtual Reality (VR): - With advances in technology, virtual reality can be used to create immersive and interactive sexual experiences, allowing participants to engage in virtual environments. Unsolicited Commercial Communications - Unsolicited Commercial Communications (UCC) involves the distribution of promotional or advertising content to individuals or businesses who have not explicitly consented to receiving such messages. Types of Unsolicited Communications: Email Spam: - Mass emails sent to a large number of recipients without their consent. These messages often contain advertisements, offers, or links to dubious websites.  Example: An email claiming you've won a lottery you never entered. Text Message Spam: - Unwanted promotional texts sent to mobile phone users without their permission. These messages may advertise products or services or contain phishing links.  Example: Receiving a text message promoting a discount on a product you've never expressed interest in. Automated Calls (Robocalls): - Pre-recorded messages that are automatically dialed to a large number of phone numbers, often for marketing or scam purposes.  Example: Receiving a recorded message about a vacation package you didn't request information on. Anti-Spam Laws and Regulations 1. CAN-SPAM Act (US): - The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN- SPAM) Act sets rules for commercial email and provides recipients the right to opt out. 2. GDPR (EU): - The General Data Protection Regulation (GDPR) includes provisions regarding unsolicited communications and requires clear opt-in consent for marketing communications. Preventive Measures 1. Implementing Spam Filters: - Utilize email and SMS filters to automatically detect and redirect suspicious messages to spam folders. 2. Opt-in and Opt-out Mechanisms: - Provide clear and easy-to-use mechanisms for individuals to subscribe or unsubscribe from communications. 3. Education and Awareness: - Educate users about recognizing and avoiding suspicious or fraudulent communications. 4. Reporting Mechanisms: - Encourage individuals to report spam to relevant authorities or service providers. Social and Professional Issues Chapter 8 Strategies for Quality Software Development Agile Development - Agile is an iterative and incremental approach to software development that emphasizes flexibility and customer collaboration. - Discuss Agile principles such as delivering working software frequently, embracing changes in requirements, and maintaining close collaboration with customers. - Faster time to market, improved adaptability to changes, increased customer satisfaction.  Example: Scrum and Kanban. DevOps Practices  DevOps is a set of practices that combines software development (Dev) and IT operations (Ops) with the goal of shortening the systems development life cycle.  The primary goal of DevOps is to shorten the development life cycle, increase deployment frequency, and deliver high-quality software. This integration is achieved through key practices such as continuous integration (CI), continuous delivery (CD), and continuous deployment (CD).  Faster release cycles, improved collaboration between development and operations teams.  Tools: Most popular DevOps tools like Jenkins, Travis CI, and GitLab CI. Test-Driven Development (TDD)  TDD is a software development approach where tests are written before the code. Tests guide the development process.  Ensures code functionality, improves code quality, facilitates easier maintenance and refactoring.  The process involves three main steps: 1. Writing a failing test 2. Writing the minimum code necessary to make the test pass, and then 3. Refactoring the code while keeping all tests passing. Continuous Integration (CI) and Continuous Deployment (CD)  CI involves the automated testing and integration of code changes, while CD involves automating the deployment of tested code to production.  Continuous Integration (CI) and Continuous Deployment (CD) are practices in software development that, when combined, help catch bugs early, ensure consistent code quality, and enable faster and more reliable releases.  Tools: Mention specific CI/CD tools like Jenkins, Travis CI, and GitLab CI Code Reviews - Emphasize the importance of code reviews in ensuring code quality, catching bugs, and facilitating knowledge sharing within the team. - Code Review Tools:  GitHub, Bitbucket, GitLab: Leverage code review tools integrated with version control systems like GitHub, Bitbucket, or GitLab.  Utilize features that allow reviewers to leave inline comments on specific lines of code, facilitating precise feedback.  Take advantage of side-by-side diff views to easily compare code changes with the existing codebase. Automated Testing  Automated testing plays a crucial role in the software development life cycle (SDLC) by providing a range of benefits that contribute to the overall success of a software project.  Types of Tests 1. Unit tests - focus on testing individual components or units of code in isolation. 2. Integration tests - examine the interactions between different components or systems. 3. End-to-end tests - also known as system tests, assess the entire software application from start to finish.  Tools: automated testing tools like Selenium, JUnit, and PyTest. Key Issues in Software Development Security Concerns - The increasing importance of software security in today's digital landscape is driven by a variety of factors that collectively underscore the critical need for robust security measures. - Secure coding practices are essential for building robust and resilient software that can withstand various security threats. Security - The following points emphasize the significance of software security in the contemporary digital environment: 1. Proliferation of Cyber Threats - The digital landscape is fraught with an ever-growing range of cyber threats, including malware, ransomware, phishing, and other sophisticated attacks. 2. Data Privacy Concerns - With the increasing volume of personal and sensitive data stored and processed by software applications, there is a heightened focus on data privacy. 3. Rise of Cloud Computing - Cloud computing has become a cornerstone of modern IT infrastructure, offering scalability and flexibility. However, it introduces new security challenges related to data storage, transmission, and access control. 4. Internet of Things (IoT) Security: - The proliferation of IoT devices has created an interconnected ecosystem where security vulnerabilities in one device can have cascading effects on the entire network. 5. Dependency on Open-Source Software - Many software projects rely on open-source components, which may introduce security vulnerabilities if not managed and updated properly. 6. Sophistication of Cyber Attacks - Cyber attackers continually evolve their tactics, techniques, and procedures (TTPs) to circumvent traditional security measures. 7. Financial Implications of Breaches - High-profile data breaches and cyberattacks have demonstrated severe financial repercussions for affected organizations, including reputational damage, legal liabilities, and financial losses. 8. Global Interconnectedness - The interconnected nature of the global digital ecosystem means that security incidents can have far-reaching consequences. User Experience (UX) - The User Experience (UX) of a software application plays a crucial role in determining its success and overall impact. UX encompasses the entire interaction users have with a product, from their initial exposure to it through the completion of tasks and beyond. Key reasons why UX is instrumental in the success of software applications 1. User Satisfaction-A positive user experience directly contributes to user satisfaction. 2. Customer Retention-A well-designed and user-friendly interface fosters customer loyalty. 3. Efficiency and Productivity-An intuitive and efficient UX design enables users to accomplish tasks with minimal effort and time. 4. Competitive Advantage-In competitive markets, superior UX design can serve as a differentiator. 5. User Engagement-Engaging and enjoyable user experiences encourage users to interact with the software more frequently. 6. User Trust and Confidence-A well-designed and reliable UX builds trust and confidence in the software. Collaboration and Communication  Team collaboration and communication are crucial for the success of any project, but they can become particularly challenging in distributed or cross-functional teams.  Several factors contribute to these challenges and addressing them is essential for maintaining productivity and fostering a positive working environment. Common challenges in team collaboration and communication 1. Communication Barriers - Team members located in different geographical locations may face challenges in real-time communication due to time zone differences and limited opportunities for face-to-face interaction. 2. Time Zone Differences - Coordinating meetings and collaboration sessions can be challenging when team members are spread across different time zones. 3. Lack of Face-to-Face Interaction - Virtual communication tools may lack the richness of face-to-face interaction, making it challenging to pick up on non-verbal cues and nuances. 4. Misalignment of Goals and Objectives - Team members may interpret goals differently if there is a lack of clear communication about project objectives, priorities, and expectations. 5. Collaboration Tool Overload - The abundance of collaboration tools may lead to tool fatigue, where team members become overwhelmed with notifications and information spread across multiple platforms. 6. Team Dynamics and Trust - Establishing trust is challenging when team members do not have the opportunity for casual interactions and team-building activities.

Use Quizgecko on...
Browser
Browser