Ethics are the moral principles by which we govern our lives. Ethics are an important part society because without them the general population that we call society would behave no better than the general population in prison. With this said, Ethics in computing and information systems are the behaviors that are considered acceptable by users and the functionality of the system being used. The information that passes through an information system must be handled ethically to ensure the safety of the user and sensitive information. In addition to ethically handling, the information users must use the system ethically and the systems must be designed to protect against unethical usage.
Computers and information systems are constantly growing changing the face of how we do business and interact in the word. In the early 90’s it was said “In the comparatively short space of forty years, computers have become central to the operations of industrial societies” (Forester, 1994, p. 1). This is noteworthy because in a short time not only have we witnessed the evolution of computers evolved but also the system of ethics and policies that govern their usage. With computers becoming mainstream and access to them growing, new ethical dilemmas arise. These dilemmas vary in nature from computer crime to intellectual property and copy right infringement.
The data contained in computer information systems must be handled ethically for the safety and privacy of those that use the system. For example, PayPal a system designed to make secure transactions online stores credit card and banking information. What would happen if PayPal did not consider ethics and safety of the safety of information stored in their databases? The information stored the...
... middle of paper ...
.... We can limit what the computer or system is doing, we can give it rules or a specific task to accomplish so that it is not capable of performing outside of said rules. How do we determine what data is necessary to the functionality of the system. What makes the collection of that data right or wrong. It is how that data is used.
Bibliography
Forester, T. M. (1994). Computer Ethics : Cautionary Tales and Ethical Dilemmas in Computing. Cambridge, Mass: MIT Press.
Hoke, T. (2011). Code Addresses New Ethical Challenges. Civil Engineering , 42-43.
HOKE, T. (2013). The Public's Right to Information. Civil Engineering , 38-39.
Kizza, J. M. (2003). Ethical and Social Issues in the Information Age. New York: Springer-Verlag.
Udas, K. F. (1996). An Investigation of Ethical Perceptions of Public Sector MIS Professionals. Journal of Business Ethics, 721-734.
In chapter six of the text it explained the hacker code of ethics and the issues associated with it. An ethical hacker is defined as a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for finding security vulnerabilities that malicious hackers could infiltrate. American journalist Steven Levy established six principals for hacker code of ethics. The six principal are limited computer access, free use of information, mistrusted- authority, examination of hacker, creation, and support in life for advancement. These principal has been controversial to many based on personal moral. As for creating appropriate set of guidelines for non-malicious hackers without becoming
Ethics of technology is one important aspect of ethics and is required to answer all the ethical questions which are specific to the technological age. Ethics of technology can also be defined as “Cyber-ethics”. The main reason for the existence of cyber-ethics is to examine the impact that cyber related crimes has for our social, legal and moral systems. Cyber ethics can also help us in calculating the social policies and laws that we frame with respect to issues...
In order to explore the ethical problem presented in the “Hacking into Harvard” case, the meaning of ‘ethical problem’ must first be understood. The word ‘problem’ can be easily described and is defined in the oxford dictionary (n.d) as “A matter or situation regarded as unwelcome or harmful and needing to be dealt with and overcome”. However, what makes a problem ethical is less clear. Ethics are about conduct, they are defined by cultural expectations and shaped by our philosophical values of right and wrong. Assessments of the ethical dimension of a problem are therefore impacted by cultural beliefs, the conduct expected by societies and the morals of the individual (Koehler, 2003; Navran, 2015). The hacking incident studied presents an ethical problem because the applicants’ act of gaining unwelcome access to university files did not conform with cultural expectation and because the universities response will have had effects that were deeply felt by many.
Sims, R. R. (1992). The challenge of ethical behavior in organizations. Journal of Business Ethics, 11(7), 505.
Technology, and Ethics. Ed. Carl Mitcham. Vol. 2. Detroit: Macmillan Reference USA, 2005. 870-873. Gale Virtual Reference Library. Web. 6 Nov. 2013.
“Engineering has a direct and vital impact on the quality of life for all people.” 1 It is by this premise that engineering codes of ethics have been written to outline professional standards for both managers and engineers. Exhibiting the highest standards of honesty and integrity are imperative for the protection of public health, safety, and welfare.2 When ethical principles are compromised, the risk of endangering others greatly increases, especially with mission and safety critical systems. Extreme consequences include not only complete mission failures and great financial loss, but also fatalities. Though most engineering accidents are associated with aerospace, mechanical, civil, or even electrical engineering (due to the nature of these disciplines such that the end products are actually tangible objects), an increasing number of accidents in software engineering have brought attention to the importance of ethics in information technology.
Ethics is part of philosophy that deals with how human actions is considered to be wrong or right and technology makes it possible for individuals and institutions to behave in ways they couldn't possible do without technology. Computer ethics brings these unexplored areas of ethics into focus.
In this assignment I am going to assess and discuss the major ethical theories, their contents, meanings and why they exist and why we need them. Also I will analyze and elaborate on the code of ethics and its importance to every society, industry business or company. I will integrate both ethical theories and codes of conduct together and will connect them together. This paper's main intention is to clarify and explain to people who don't about ethics and the theories what they are, and so also make it simple to understand.
One of the most recent examples of ethics and technology conflicts in the United States are privacy issues and how we cite, distribute and publish intellectual property on the internet. For instance, many corporations and people take advantage of the open access of the internet and the lack of legislation governing the right to post and upload information to the internet. Today, nearly every household in the United States has a computer with int...
Salman, A. S. (2013, June 2). Dealing with Ethical Issues among Internet Users: Do We Need Legal Enforcement? Asian Social Science, pp. 9(8), 3-8. doi:10.5539/ass.v9n8p3.
Mike Freeman, (2002) "Ethical Issues of Information Technology", New Library World, Vol. 103 Iss: 1/2, pp.72 – 75
In the early years of computers and computerized technology, computer engineers had to believe that their contribution to the development of computer technology would produce positive impacts on the people that would use it. During the infancy of computer technology, ethical issues concerning computer technology were almost nonexistent because computers back then were not as multifaceted as they are today. However, ethical issues relating to computer technology and cyber technology is undeniable in today’s society. Computer technology plays a crucial role in all aspects of our daily lives. Different forms of computer technology provide unique functionalities that allow people to perform daily activities effectively and efficiently. In modern society, we use computer and cyber technology to communicate with friends and family via social networking sites, participate in business transactions, and get current news. Different tasks require unique technological feature in computer technology to function properly. Although, unique technological features increase people’s proficiency in accomplishing various tasks, unique technological features in computer and cyber technology increase security vulnerabilities. In many cases, the security vulnerabilities in computer technology are exploited by cybercriminals to invade people’s privacy, and steal people’s identity. We know that computers have no moral compass; they cannot make moral decisions for themselves. Essentially, people make moral decisions that affect others positively or negatively depending on how they use computer technology. Some of the biggest ethical issues facing people in the computing environment include privacy concerns on the web and identity theft. Privacy concerns...
Barbour, Ian Ethics in An Age Of Technology. Harper Collins Publishers Inc: New York, 1993
Duquenoy, P., Jones, S., & Blundell, B. (2008). Ethical, legal and professional issues in computing. London: Thomson.
Stead, B. A., & Gilbert, J. (2001). Ethical issues in electronic commerce. Journal of Business Ethics, 34, 75-85.