Teaching Computer Ethics in the Classroom
The computer is considered one of the most technological advances of the twentieth century. As the general public becomes increasingly ‘computer literate,' the gap between technology and peoples' intellect notably shrinks. The readily available computers, software, and assorted output devices have enlightened many but, in turn, have increased the using of computers for unethical activities, privacy invasion and illegal purposes. Legal sanctions against abusive use of computers are a reactive approach. A proactive approach is to teach students about computer ethics in classrooms. An effective teaching method are the presentation of ethical scenarios. It is anticipated that through this method, students will personalize the need for developing ethical standards of behavior. The ultimate goal is for students, if necessary, to change their set of personal beliefs to include ethics.
INTRODUCTION
The computer is considered one of the most important technological advances of the twentieth century. Security and privacy issues have been in existence long before the computer became a vital component of organizations' operations. Nevertheless, the operating features of a computer make it a double-edged sword. Computer technologies with reliable error detection and recording capabilities, permit the invasion of a supposedly secure environment to occur on a grand scale and go undetected. Furthermore, computer and communications technology permit the invasion of a persons' privacy and likewise go undetected. Two forces threaten privacy: one, the growth of information technology with its enhanced capacity for surveillance, communication, computation, storage and retrieval and two, the more insidious threat, the increased value of information in decision making. Information has become more vital in the competitive environment, thus, decision makers covet it even if it viol! ates another's privacy. Violation of ones personal privacy, via computers, may in part be due to the incomplete understanding of responsibility on the part of those involved. Is it a management or a technical concern?
Ethical standards that evolved over the history of Western civilization deal with interpersonal relationships. What is right or wrong? What one should do and not do when dealing with other people. Ethical behavior in a business environment has not been as clearly defined. When businesses were small and the property of a few individuals, traditional ethical standards were applied to meet different situations. However, as businesses became larger, the interpersonal ethical relations did not provide any clear behavioral guidelines. Likewise, the principles of ethical relationships were even less pertinent to the corporate environments.
The main points that are stated in "Employees & Ethics With Computers" by Debra Kraft are personal internet usage, email, harassment, privacy, policies, and training. Kraft's computer ethics relate to the Ten Commandments of Ethical Computing by Computer Ethics Institute. The first computer ethic personal internet usage would fall under multiple commandments such as number two, seven, and ten. If employees are using the internet access for personal internet usage it can slow down and hinder the company connectivity for the entire organization. Email is also a computer ethic that falls under a few the commandments such as one, two, seven, and nine. Improper usage of email service can cost the company in data or business losses.
In chapter six of the text it explained the hacker code of ethics and the issues associated with it. An ethical hacker is defined as a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for finding security vulnerabilities that malicious hackers could infiltrate. American journalist Steven Levy established six principals for hacker code of ethics. The six principal are limited computer access, free use of information, mistrusted- authority, examination of hacker, creation, and support in life for advancement. These principal has been controversial to many based on personal moral. As for creating appropriate set of guidelines for non-malicious hackers without becoming
7. Herman T. Tavani, James H. Moor "Privacy Protection, Control of Information, and Privacy-Enhancing Technologies", Computers and Society, March 2001
Ethical behavior is behavior that a person considers to be appropriate. A person’s moral principals are shaped from birth, and developed overtime throughout the person’s life. There are many factors that can influence what a person believes whats is right, or what is wrong. Some factors are a person’s family, religious beliefs, culture, and experiences. In business it is of great importance for an employee to understand how to act ethically to prevent a company from being sued, and receiving criticism from the public while bringing in profits for the company. (Mallor, Barnes, Bowers, & Langvardt, 2010) Business ethics is when ethical behavior is applied in an business environment, or by a business. There are many situations that can arise in which a person is experiencing an ethical dilemma. They have to choose between standing by their own personal ethical standards or to comply with their companies ethical standards. In some instances some have to choose whether to serve their own personal interests, or the interest of the company. In this essay I will be examining the financial events surrounding Bernie Madoff, and the events surrounding Enron.
Technology has developed in leaps and bounds over the past few decades. The case is that the law always has difficulty keeping pace with new issues and technology and the few laws that are enacted are usually very general and obsucre. The main topic of this paper is to address the effect of technology on privacy in the workplace. We have to have an understanding of privacy before trying to protect it. Based on the Gift of Fire, privacy has three pieces: freedom from intrusion, control of information about one's self, and freedom from surveillance.1 People's rights has always been protected by the constitution such as the Fourth Amendment, which protects people from "unreasonable searches and seizures". As said by Eric Hughes, "Privacy is the power to selectively reveal oneself to the world."2 As written by Supreme Court Justice Louis Brandeis in 1928 is the right most valued by the American people was "the right to be left alone."3
LeRoux, Yves. "Privacy concerns in the digital world." 03 Oct 2013. Computer Weekly. 24 April 2014 .
Computing professionals are called to act in strict accordance with high ethical standards. Three predominant sources of ethical standards exist for computing professionals. The IEEE, ACM, and Software Engineering Code of Ethics each provide standards for ethical behavior to guide computing professionals both inside and outside of the workplace. These collections of moral imperatives will be used to ethically assess the following scenario.
When the internet was considered a global information system in 1995 millions of Americans participated in virtual communication. People began to communicate with each other and personal information began to be placed online by the stroke of the fingertips to their own computer. So the question is the privacy of individuals trusted online? Can people snoop around and see personal information? Of course people can if guidelines are not set in place to protect them. Public and private information can be complex when some individual(s) do not expect their communication to be read outside of their online community. What will be discussed are some ethical responsibilities that need to take place in the United States. Respecting the individual privacy and honor confidentiality is a must in this country.
Computer ethics is a set of moral rules that set social rules of what is to be known as appropriate for when you are using the computer. The first thing software developer should consider is what to save and what not to save. Log files are one thing that needs to be back up and protected, you also need to know who else may be able to see these files. Another ethic is to not us users as products. This basically means that it is unethical to make shady deals with another ad network and thus transforming customers or users into products.one ethical dilemma that exists is how to charge for a product or service online. For example business that depend on providing content without paying the creator and then sell ads or charge a fee for the product. To avoid this you have to find out things like is the creator happy to work for exposure alone and not profit and to not overly price the consumer for the product at hand. Protection is also an ethic that is unclear to people there are the developers that want to put protection on everything then there are people who don’t want to protect anything. Then
In the early years of computers and computerized technology, computer engineers had to believe that their contribution to the development of computer technology would produce positive impacts on the people that would use it. During the infancy of computer technology, ethical issues concerning computer technology were almost nonexistent because computers back then were not as multifaceted as they are today. However, ethical issues relating to computer technology and cyber technology is undeniable in today’s society. Computer technology plays a crucial role in all aspects of our daily lives. Different forms of computer technology provide unique functionalities that allow people to perform daily activities effectively and efficiently. In modern society, we use computer and cyber technology to communicate with friends and family via social networking sites, participate in business transactions, and get current news. Different tasks require unique technological feature in computer technology to function properly. Although, unique technological features increase people’s proficiency in accomplishing various tasks, unique technological features in computer and cyber technology increase security vulnerabilities. In many cases, the security vulnerabilities in computer technology are exploited by cybercriminals to invade people’s privacy, and steal people’s identity. We know that computers have no moral compass; they cannot make moral decisions for themselves. Essentially, people make moral decisions that affect others positively or negatively depending on how they use computer technology. Some of the biggest ethical issues facing people in the computing environment include privacy concerns on the web and identity theft. Privacy concerns...
Computer ethics is about principles related to behavior and decisions made by computer professionals and users, including software engineers, operators, managers, policy makers, as well as educators and students. This means all these people involved should be supported with some "policies for ethical conduct" i.e. policies that guide their actions and increase adequacy of the decisions they make. (Szejko par. 1) With the rapid infusion of computers, software and related technologies into homes, schools and businesses, we initially focused our energies on learning about the technologies and how to use them. We now need to focus our attention on the ethical issues surrounding technology to insure that we and our children understand and practice values important to all of us; respect for others, their property, ownership, and the right to privacy. (Alden par. 4)
In recent times we might consider that the right for privacy in one of our major achievements in our society. Unfortunately the same does not apply for the Internet. The Internet once considered a place for free information exchange and sharing, has the potential has becoming the biggest threat to its users. The commercialization of the Internet is one of the major reasons why the chances of a compromise of our privacy have increased. Customer profiling, address trading or simple lack of care with sensitive customer information are just some of the threats that this commercialization has bought to our ‘free’ Internet. Another reason being that with the increase of threats there is a regular change in technology to counter these threats. These changes make it harder for the already overstrained users to cope with the ever changing technology.
This essay will start off by explaining the terms information, governance, and information governance. It will then take a look at the history of information privacy, role that technology has played in the changes of our conceptions of both the private and public sectors use of information. An in-depth look into privacy would take place,and the rights of privacy given to citizens will be discussed. The essay goes further to examine why people value their privacy and how privacy can be protected with different illustrations being used.
Duquenoy, P., Jones, S., & Blundell, B. (2008). Ethical, legal and professional issues in computing. London: Thomson.
Privacy exist wherever personal information or other sensitive information is collected, stored, used, and finally destroyed or deleted – in digital form or otherwise. The challenge of data privacy is to use data while safe-guarding individual's privacy preferences and their personally identifiable information. The fields of computer security, data security, and information security design and utilize software, hardware, and human resources to address this issue.