Teaching Computer Ethics in the Classroom
The computer is considered one of the most technological advances of the twentieth century. As the general public becomes increasingly ‘computer literate,' the gap between technology and peoples' intellect notably shrinks. The readily available computers, software, and assorted output devices have enlightened many but, in turn, have increased the using of computers for unethical activities, privacy invasion and illegal purposes. Legal sanctions against abusive use of computers are a reactive approach. A proactive approach is to teach students about computer ethics in classrooms. An effective teaching method are the presentation of ethical scenarios. It is anticipated that through this method, students will personalize the need for developing ethical standards of behavior. The ultimate goal is for students, if necessary, to change their set of personal beliefs to include ethics.
INTRODUCTION
The computer is considered one of the most important technological advances of the twentieth century. Security and privacy issues have been in existence long before the computer became a vital component of organizations' operations. Nevertheless, the operating features of a computer make it a double-edged sword. Computer technologies with reliable error detection and recording capabilities, permit the invasion of a supposedly secure environment to occur on a grand scale and go undetected. Furthermore, computer and communications technology permit the invasion of a persons' privacy and likewise go undetected. Two forces threaten privacy: one, the growth of information technology with its enhanced capacity for surveillance, communication, computation, storage and retrieval and two, the more insidious threat, the increased value of information in decision making. Information has become more vital in the competitive environment, thus, decision makers covet it even if it viol! ates another's privacy. Violation of ones personal privacy, via computers, may in part be due to the incomplete understanding of responsibility on the part of those involved. Is it a management or a technical concern?
Ethical standards that evolved over the history of Western civilization deal with interpersonal relationships. What is right or wrong? What one should do and not do when dealing with other people. Ethical behavior in a business environment has not been as clearly defined. When businesses were small and the property of a few individuals, traditional ethical standards were applied to meet different situations. However, as businesses became larger, the interpersonal ethical relations did not provide any clear behavioral guidelines. Likewise, the principles of ethical relationships were even less pertinent to the corporate environments.
In chapter six of the text it explained the hacker code of ethics and the issues associated with it. An ethical hacker is defined as a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for finding security vulnerabilities that malicious hackers could infiltrate. American journalist Steven Levy established six principals for hacker code of ethics. The six principal are limited computer access, free use of information, mistrusted- authority, examination of hacker, creation, and support in life for advancement. These principal has been controversial to many based on personal moral. As for creating appropriate set of guidelines for non-malicious hackers without becoming
Ethics or rather morals entail mechanisms that defend, systematize as well as recommend conceptions of right or wrong. Many organizations develop ethical codes to ensure employees and employers understand the difference in doing good or bad. In that respect, ethics are an essential aspect of successfully running of any organization or government. Ethics ensure employee’s productivity levels are up to the required standards. It also assists them to know their rights and responsibilities. Additionally, employers, as well as any persons in management, are guided by them to ensure they provide transparent leadership. Ethics also defines how customers should be handled. Ethical codes govern the relationship between customers and an
7. Herman T. Tavani, James H. Moor "Privacy Protection, Control of Information, and Privacy-Enhancing Technologies", Computers and Society, March 2001
Ethics in business is a highly important concept, as it can affect a company’s profits, salaries paid to employees and CEOs, and public opinion, among many other aspects of a business. Ethics can be enforced by company policies and guidelines, set a precedent when a company is faced with an important decision, and are also evolving thanks to new technology and situations that arise due to technology usage. Businesses have a duty to maintain their ethical responsibilities and also to help their employees enforce these responsibilities in and out of the workplace. However, ethics and the foundation for them are not always black and white. There are many different ethical theories, however Utilitarianism, Kant’s Deontological ethics, and Virtue ethics are three of the most well known theories in existence. Each theory is distinct in that it has a different quality used to determine ethicality and allows for a person to choose which system of ethics works best with both the situation and his or her personal ethical preferences.
Ethical behavior is behavior that a person considers to be appropriate. A person’s moral principals are shaped from birth, and developed overtime throughout the person’s life. There are many factors that can influence what a person believes whats is right, or what is wrong. Some factors are a person’s family, religious beliefs, culture, and experiences. In business it is of great importance for an employee to understand how to act ethically to prevent a company from being sued, and receiving criticism from the public while bringing in profits for the company. (Mallor, Barnes, Bowers, & Langvardt, 2010) Business ethics is when ethical behavior is applied in an business environment, or by a business. There are many situations that can arise in which a person is experiencing an ethical dilemma. They have to choose between standing by their own personal ethical standards or to comply with their companies ethical standards. In some instances some have to choose whether to serve their own personal interests, or the interest of the company. In this essay I will be examining the financial events surrounding Bernie Madoff, and the events surrounding Enron.
Technology has developed in leaps and bounds over the past few decades. The case is that the law always has difficulty keeping pace with new issues and technology and the few laws that are enacted are usually very general and obsucre. The main topic of this paper is to address the effect of technology on privacy in the workplace. We have to have an understanding of privacy before trying to protect it. Based on the Gift of Fire, privacy has three pieces: freedom from intrusion, control of information about one's self, and freedom from surveillance.1 People's rights has always been protected by the constitution such as the Fourth Amendment, which protects people from "unreasonable searches and seizures". As said by Eric Hughes, "Privacy is the power to selectively reveal oneself to the world."2 As written by Supreme Court Justice Louis Brandeis in 1928 is the right most valued by the American people was "the right to be left alone."3
LeRoux, Yves. "Privacy concerns in the digital world." 03 Oct 2013. Computer Weekly. 24 April 2014 .
In recent times we might consider that the right for privacy in one of our major achievements in our society. Unfortunately the same does not apply for the Internet. The Internet once considered a place for free information exchange and sharing, has the potential has becoming the biggest threat to its users. The commercialization of the Internet is one of the major reasons why the chances of a compromise of our privacy have increased. Customer profiling, address trading or simple lack of care with sensitive customer information are just some of the threats that this commercialization has bought to our ‘free’ Internet. Another reason being that with the increase of threats there is a regular change in technology to counter these threats. These changes make it harder for the already overstrained users to cope with the ever changing technology.
Computing professionals are called to act in strict accordance with high ethical standards. Three predominant sources of ethical standards exist for computing professionals. The IEEE, ACM, and Software Engineering Code of Ethics each provide standards for ethical behavior to guide computing professionals both inside and outside of the workplace. These collections of moral imperatives will be used to ethically assess the following scenario.
This essay will start off by explaining the terms information, governance, and information governance. It will then take a look at the history of information privacy, role that technology has played in the changes of our conceptions of both the private and public sectors use of information. An in-depth look into privacy would take place,and the rights of privacy given to citizens will be discussed. The essay goes further to examine why people value their privacy and how privacy can be protected with different illustrations being used.
When the internet was considered a global information system in 1995 millions of Americans participated in virtual communication. People began to communicate with each other and personal information began to be placed online by the stroke of the fingertips to their own computer. So the question is the privacy of individuals trusted online? Can people snoop around and see personal information? Of course people can if guidelines are not set in place to protect them. Public and private information can be complex when some individual(s) do not expect their communication to be read outside of their online community. What will be discussed are some ethical responsibilities that need to take place in the United States. Respecting the individual privacy and honor confidentiality is a must in this country.
Computer ethics is a set of moral rules that set social rules of what is to be known as appropriate for when you are using the computer. The first thing software developer should consider is what to save and what not to save. Log files are one thing that needs to be back up and protected, you also need to know who else may be able to see these files. Another ethic is to not us users as products. This basically means that it is unethical to make shady deals with another ad network and thus transforming customers or users into products.one ethical dilemma that exists is how to charge for a product or service online. For example business that depend on providing content without paying the creator and then sell ads or charge a fee for the product. To avoid this you have to find out things like is the creator happy to work for exposure alone and not profit and to not overly price the consumer for the product at hand. Protection is also an ethic that is unclear to people there are the developers that want to put protection on everything then there are people who don’t want to protect anything. Then
...puter technology are rooted in the general ethical issues that people in society deal with. For example, the ethical issues such as invasion of privacy, theft, and fraud have been around since human beings began interacting with each other. The fact is that elements of these ethical issues are not unique to the computer field or computer technology. These current technologies raise the same ethical dilemmas with conditions that are unique to computer and cyber technology. This explains why we general ethical issue are such as privacy, theft and fraud are reexamined as informational privacy, identity theft and computer fraud in computer technology.
Computer ethics is about principles related to behavior and decisions made by computer professionals and users, including software engineers, operators, managers, policy makers, as well as educators and students. This means all these people involved should be supported with some "policies for ethical conduct" i.e. policies that guide their actions and increase adequacy of the decisions they make. (Szejko par. 1) With the rapid infusion of computers, software and related technologies into homes, schools and businesses, we initially focused our energies on learning about the technologies and how to use them. We now need to focus our attention on the ethical issues surrounding technology to insure that we and our children understand and practice values important to all of us; respect for others, their property, ownership, and the right to privacy. (Alden par. 4)
Novakovic, J. (2012). Responsibility in Application of ICT as Legal, Moral and Ethical Issues. Retrieved from http://ieeexplore.ieee.org.libaccess.hud.ac.uk/stamp/stamp.jsp?tp=&arnumber=6419151