Presentation is loading. Please wait.

Presentation is loading. Please wait.

Prof. Moutasem Shafaamry Computer Ethics Advanced Web & Internet Security (AWS/AIS)

Similar presentations


Presentation on theme: "Prof. Moutasem Shafaamry Computer Ethics Advanced Web & Internet Security (AWS/AIS)"— Presentation transcript:

1 Prof. Moutasem Shafaamry Computer Ethics Advanced Web & Internet Security (AWS/AIS) t_mshafaamri@svuonline.org t_mshafaamri@svuonline.org

2 Computer Ethics What is ethical behavior? How do we make ethical decisions? Material from –Ethical Decision Making and Information Technology by Kallman & Grillo –Other Computer Ethics tutorials provided by internet and Univ. courses Computer Ethics _MWS/MWT M.Shafaamry

3 Computer Ethics Ethical Decisions Ethical decisions are made based on ethical principles. Ethical principles are ideas of behavior that are commonly acceptable to society. Computer Ethics _MWS/MWT M.Shafaamry

4 Computer Ethics Why Should We Care About Ethics? We make a number of ethical decisions daily. Some unethical decisions can put us on the wrong side of the law. Decisions can affect our career and reputation. Obliged to uphold the principles of the society in which we live. Computer Ethics _MWS/MWT M.Shafaamry

5 Computer Ethics Most experts agree that there is no special category of computer ethics. There are ethical situations in which computers are involved. Capability of computers can lend a special character to the problem. Computer allows people to perform actions faster or to perform actions too difficult Computer Ethics _MWS/MWT M.Shafaamry

6 Computer Ethics Three Phases of Ethical Decision Making Recognize the ethical problem exists. Attack the problem logically and consider alternative actions. Make decision on action to take based on ethical principles. Computer Ethics _MWS/MWT M.Shafaamry

7 Computer Ethics What Affects Our Behavior? Drive for food, shelter and love - Biological Level Rules from government, religion, institution and the family - Societal Level Ethical considerations - Higher Level Computer Ethics _MWS/MWT M.Shafaamry

8 Computer Ethics How Do We Make an Ethical Decision? Research the law Use guidelines Person’s rights Person’s duty Computer Ethics _MWS/MWT M.Shafaamry

9 Computer Ethics Use Guidelines Informal guidelines Formal guidelines Computer Ethics _MWS/MWT M.Shafaamry

10 Computer Ethics Informal Guidelines Are “Shushers” involved? The “Mom Test” The “TV Test” The “Smell TEST” Computer Ethics _MWS/MWT M.Shafaamry

11 Computer Ethics Formal Guidelines Corporate policy Corporate or professional codes Golden rule Computer Ethics _MWS/MWT M.Shafaamry

12 Computer Ethics ACM Code of Ethics and Professional Conduct Contribute to the improvement of society and to the well-being of human lives Take care not to harm others Speak the truth and merit trust Treat others with fairness Honor the intellectual property rights of others Computer Ethics _MWS/MWT M.Shafaamry

13 Computer Ethics ACM Code Cont. Give proper credit when using the intellectual property of others Respect the right of privacy of individuals Honor confidentiality Computer Ethics _MWS/MWT M.Shafaamry

14 Computer Ethics Ten Commandments of Computing - Computer Ethics Institute Thou shall not use a computer to harm other people Thou shall not interfere with other people’s computer work Thou shall not snoop around in other people’s computer files Thou shall not use a computer to steal Thou shall not use a computer to bear false witness Computer Ethics _MWS/MWT M.Shafaamry

15 Computer Ethics Ten Commandments - Continued Thou shall not copy or use proprietary software for which you have not paid Thou shall not use other people’s computer resources without authorization and proper compensation Thou shall not appropriate other people’s intellectual output Thou shall think about the social consequences of the program you are writing or the system you are designing Thou shall always use a computer in ways that show consideration and respect for your fellow humans Computer Ethics _MWS/MWT M.Shafaamry

16 Computer Ethics Person’s Rights The right to know The right to privacy The right to property Computer Ethics _MWS/MWT M.Shafaamry

17 Computer Ethics Person’s Duty To foster trust To act with integrity To be truthful To do justice To act with appropriate gratitude Make appropriate reparation Computer Ethics _MWS/MWT M.Shafaamry

18 Computer Ethics What Special Ethical Problems Involve Computers Computers cause personal contact to be reduced Little time is available in making a decision Electronic information is easily changed Information more vunerable to unauthorized access Easy access to information Computer Ethics _MWS/MWT M.Shafaamry

19 Computer Ethics Special Ethical Problems Cont. An error in a program could be devastating Software piracy –Public Domain Software –Shareware –Copyrighted Software Pornography –Internet has no single authority –Filtering Software such as Cyber Patrol Computer Ethics _MWS/MWT M.Shafaamry

20 Computer Ethics A 4-Step Process for Ethical Analysis and Decision Making Understand the situation - what are the ethical issues? Isolate the major ethical dilemma. –State it in the form: Should someone do or not do something? Analyze the ethicality of doing or not doing the action. Make a Defensible Ethical Decision. Computer Ethics _MWS/MWT M.Shafaamry

21 Computer Ethics The Ethical Use of Computers Computer Ethics _MWS/MWT M.Shafaamry

22 Computer Ethics What are ethics? The rules of right and wrong behavior. Merriam-Webster defines ethics as “the principles of conduct governing an individual or group.” Computer Ethics _MWS/MWT M.Shafaamry

23 Computer Ethics The Three Categories of Ethics Professional- usually defined by your employer of company; these are general guidelines Social- defined by society Individual- defined by personal heritage and integral family values Computer Ethics _MWS/MWT M.Shafaamry

24 Computer Ethics Information Ethics Rules that define right and wrong behavior in the computing professions. The basis of trust and cooperation among workers and organizations In most cases, these are defined by the “owner” of the computer. Computer Ethics _MWS/MWT M.Shafaamry

25 Computer Ethics Ethics vs. Laws Ethics often precede laws. Laws exist to protect software developers (copyright and licensing) and users (privacy) and there are punishments for breaking the law. There are no “global punishments” for ethics violations. Computer Ethics _MWS/MWT M.Shafaamry

26 Computer Ethics Copyrights The right of an author to copy, resell, lease, lend, rent and or distribute material. Copyrights did not exist when software was first being developed. Computer Ethics _MWS/MWT M.Shafaamry

27 Computer Ethics Federal Digital Millennium Copyright Act (DMCA) The copyright law that is currently in effect. Any software or data created with a computer is owned by its creator and is automatically copyrighted as soon as it is has been recorded and is in “tangible” form. Without specific permission, it is illegal to copy software. Software designed by an employee is owned by the company. Just because a work does not display the © symbol, does not mean that it is not copyrighted. Computer Ethics _MWS/MWT M.Shafaamry

28 Computer Ethics Copyright Scenario Dema just purchased a new game for her computer. Bill loves the game and wants a copy, but he cannot afford it. Bill asks Dema if he can borrow the CD and load the game on his computer. Is this all right under current copyright laws? Computer Ethics _MWS/MWT M.Shafaamry

29 Computer Ethics Solution…. Copyright allows the owner of the copyright to "distribute or lend" the program. Dema does not own the copyright; she owns a copy of the program sold to her by the copyright owner. She cannot lend it to Bill to load on his machine. If Dema would read her “License Agreement,” she would know exactly what is right and wrong regarding copying the software. Computer Ethics _MWS/MWT M.Shafaamry

30 Computer Ethics Software Licensing License agreements are contracts between the purchaser and copyright owner. Many software companies offer site licenses or special licenses for companies, schools or government institutions. Computer Ethics _MWS/MWT M.Shafaamry

31 Computer Ethics Little Know Factoid When you buy software, you're not buying the software itself. You're buying permission to use the software. The permission you buy is called a license (like a hunting license or a driver’s license) and is defined by a license agreement that comes with the software. Usually the license agreement is printed in tiny type on the back of the box or on a piece of paper shrink-wrapped with the box. I think most people never read it (it's full of legalese and usually takes a magnifying glass to see clearly). However, I think most of us have seen the sticker on the box that says something like, "Breaking this seal means you agree to the terms of the license." Computer Ethics _MWS/MWT M.Shafaamry

32 Computer Ethics Four Types of Software Licenses public domain freeware shareware "all rights reserved" Computer Ethics _MWS/MWT M.Shafaamry

33 Computer Ethics Public Domain Public domain software is not protected by copyright law; it is software that was either created with public funds (and is therefore already owned by the public) or the creator has forfeited these rights to the public. Public domain software is pretty rare and is often unreliable (i.e., poor quality, virus-laden) since nobody's keeping track of it. The only public-domain software products I've ever really wanted were a few graphics and fonts. Computer Ethics _MWS/MWT M.Shafaamry

34 Computer Ethics Freeware Freeware is copyrighted software that is licensed to be copied and distributed without charge. Some freeware (Pegasus Mail, Eudora Light, Netscape, Internet Explorer, etc.) is really good stuff, but it's not in the public domain. That is, freeware is free only because its license says it is; the software is still under the owner's control. Thus, most freeware licenses prohibit the sale or modification of the software without the owner's permission, and they often limit the groups that are able to get the software without paying. Computer Ethics _MWS/MWT M.Shafaamry

35 Computer Ethics Shareware Shareware is the same as freeware, except that the owner stipulates a purchase fee for permanent use. That is, the software is licensed for copying and sharing without charge, but only for evaluation purposes. Anyone who decides to use the software long-term is to pay a specified fee to the owner. There is usually no official system for collecting these fees; users are expected to pay on their own (honor system) in exchange for documentation, a more powerful version of the software, or some other enticement. More and more shareware is programmed to turn itself off after a certain period of time (30 days is typical) unless the owner buys a special activation code from the copyright owner. Most of the “free” software in the world is actually shareware. Computer Ethics _MWS/MWT M.Shafaamry

36 Computer Ethics Software license with all rights reserved Licensed only for use by purchasers. Almost all the really good stuff (Word, Oracle, Java, PhotoShop, Windows 2000, etc.) is licensed this way. You can't legally use it or even possess it without the owner's permission, usually defined very carefully in the license agreement. Computer Ethics _MWS/MWT M.Shafaamry

37 Computer Ethics Typical License Agreement You can install and operate the software on only one PC at a time. You can make only one back-up copy of the software. If you give the software to anyone, you also give up permission to use the software. You are not to modify the software in any way. The software is not represented as fit for any particular purpose. (Yep—even if the box says "Do your taxes faster than ever," you cannot legally assume the software is fit for doing your taxes). This is to keep you from suing the company if their software wrecks your life. Computer Ethics _MWS/MWT M.Shafaamry

38 Computer Ethics Software Piracy The illegal copying of software The estimated loss due to piracy is approximately $39 billion per year globally. Conviction on the first offense can result in a fine of up to $250,000 and a jail sentence of up to five years. (Bowyer, Ethics & Computing, 1996) Computer Ethics _MWS/MWT M.Shafaamry

39 Computer Ethics Scenario A student is working on a class assignment. The student doesn’t have the specific software used at school, so she asks her teacher to let her take a copy of the software home. Is this ethical? Computer Ethics _MWS/MWT M.Shafaamry

40 Computer Ethics Solution Since the software is licensed to the school, this is not legal or ethical. Computer Ethics _MWS/MWT M.Shafaamry

41 Computer Ethics Ethically and legally, society should recognize that individuals creating “intellectual property” have the right to receive credit and be protected from the incorrect use of their creations. Computer Ethics _MWS/MWT M.Shafaamry

42 Computer Ethics Intellectual Property The result of intellectual activities in the arts, science and industry (Beekman, Computer Confluence, Prentice Hall, 2001) and as such is the property of the creator. Computer Ethics _MWS/MWT M.Shafaamry

43 Computer Ethics Fair Use provisions that let you paraphrase or quote small portions of someone else’s work, provided that you give proper credit to the author for the material you use If you don’t give credit, you will probably give at least some of your readers the impression that the material you borrowed originated with you. That’s bad. It’s so bad, it has a name, plagiarism, and it’s a form of fraud. Computer Ethics _MWS/MWT M.Shafaamry

44 Computer Ethics Giving Credit Add an in-text reference to the author and publication year of the work used right after the borrowed material in the paper. Add a full citation of the work (author, title, publisher, publication year, etc.) at the end of your paper. Computer Ethics _MWS/MWT M.Shafaamry

45 Computer Ethics Electronic Information More and more information is available via CD- ROMs, the Worldwide Web, online databases, and other electronic communication channels Quoting and citing information is just as important with computer sources as with traditional written works. Even though computers and the Internet allow easy access for cutting and pasting items, it is considered plagiarism when the creator has not given permission and/or been given credit for his/her work. Computer Ethics _MWS/MWT M.Shafaamry

46 Computer Ethics Misuse of Information When using intellectual property, it should be used in the context originally intended and presented correctly so the meaning is not changed from the original intent. Blatant misuse of information in which the user knows he/she is plagiarizing but chooses to use the information anyway is an example of fraud. The Merriam-Webster's Collegiate Dictionary defines fraud as "the act of deceiving or misrepresenting" (Merriam-Webster, Inc. http://www.m-w.com/cgi-bin/dictionary, "fraud", 2001). Accidental plagiarism is a form of negligence. Negligence occurs when an individual is unaware or ignorant that he/she has misused intellectual property. Both fraud and negligence are ethically wrong and illegal. Computer Ethics _MWS/MWT M.Shafaamry

47 Computer Ethics Scenario Ralph Williams wrote a paper for his Geography class about the Grand Teton Mountains. He found some information on the web that worked well into his paper. He did not intend to claim the information as his own but he did not mention in his paper where he got the information. Is this okay? Computer Ethics _MWS/MWT M.Shafaamry

48 Computer Ethics Solution He should have quoted the material and then reference the site from which the material was taken. This is true even when the material used is found on the World Wide Web. Computer Ethics _MWS/MWT M.Shafaamry

49 Computer Ethics Privacy Information can be categorized as that which is public and that which is private. Public information is assumed to be able to be used without permission. Private information cannot be legally used without permission from its owner. Computer Ethics _MWS/MWT M.Shafaamry

50 Computer Ethics A Difficult Balance Public Info. About You full name home address phone number debts you owe court judgments against you and police actions relating to you courses you’ve taken Private Info. About You grades in specific courses medical records Computer Ethics _MWS/MWT M.Shafaamry

51 Computer Ethics Inappropriate Use of E-mail Spamming Flaming Trolling Computer Ethics _MWS/MWT M.Shafaamry

52 Computer Ethics Spamming Bulk, mass, or repeated posting or mailing of substantially identical messages. The emphasis is on the multiple sending, either many copies to one destination, or one copy to many destinations. (Kevin Kadow, Internet Dictionary, http://www.msg.net/kadow/answers/, "spam", 1994 ) Computer Ethics _MWS/MWT M.Shafaamry

53 Computer Ethics Flaming A public post or email message that expresses a strong opinion or criticism. Flames can be fun when they allow people to vent their feelings, then return to the topic at hand. Others are simply insulting and can lead to flame wars. (Albion.com, Netdictionary, http://www.netdictionary.com/html/index.html, "flame", 2000 ) Computer Ethics _MWS/MWT M.Shafaamry

54 Computer Ethics Trolling (also known as flame bait) An inflammatory post that is designed to provoke a flame war or flame responses. (Albion.com, Netdictionary, http://www.netdictionary.com/html/index.html, "flame bait", 2000 ) Trolling is basically sending messages that contain statements intending to bait an argument or confrontation. Computer Ethics _MWS/MWT M.Shafaamry

55 Computer Ethics Messages that continue after the recipient asks that they stop are defined as a nuisance and are illegal. Nuisance messages that are threatening or intimidating are termed harassment and are even more illegal. It's interesting to note that nuisances and harassment are defined by the messages' receiver, not by the sender. That is, if you ask me to stop sending you messages, I have to even if I don't think there's anything wrong with my messages. Computer Ethics _MWS/MWT M.Shafaamry

56 Computer Ethics Acceptable Use Policy (AUP) outlines what types of uses are acceptable and which are prohibited although a particular institution’s AUP will be unique, most have the following three categories (see next slides for more info) defining rights and responsibilities in using equipment in a legal and ethical manner legal documents that should be understood and followed Computer Ethics _MWS/MWT M.Shafaamry

57 Computer Ethics Personal Computer Files (documents) Storage location Storage space allocation Types of files allowed Printable items and quantity Computer Ethics _MWS/MWT M.Shafaamry

58 Computer Ethics Personal and Private Information Sharable information E-mail and personal file privacy Monitoring on-line activities Computer Ethics _MWS/MWT M.Shafaamry

59 Computer Ethics Scenario Ben Flying Eagle is finished with his assignment for the day so he wants to get on Yahoo to chat with his friend in another class. The school’s AUP states that chat is not allowed on school computers because too many unsafe situations occur in chat rooms. Ben isn’t planning to use a public chat room, he just wants to have a private conversation with his friend. Is he breaking the school’s AUP if he chats with his friend? Is he breaking the school’s AUP if he uses Instant Messaging instead of Yahoo Chat? Computer Ethics _MWS/MWT M.Shafaamry

60 Computer Ethics Solution If the AUP does not differentiate between public and private chat, chatting is not allowed. Computer Ethics _MWS/MWT M.Shafaamry

61 Computer Ethics Code of Ethics Many professional organizations have developed codes of ethics, which have been widely adopted as the “basic” code for many companies and universities. While the professional codes of ethics have slight differences in emphasis, they are in agreement on general principles. Computer Ethics _MWS/MWT M.Shafaamry

62 Computer Ethics Code of Ethics at Colleges and Universities Many higher institutions of learning also maintain a code of ethics. Usually, one of the sections deals specifically to plagiarism of Intellectual Property at the college or university. Computer Ethics _MWS/MWT M.Shafaamry

63 Computer Ethics “We cannot count on the legal system to be a complete and correct guide to moral behavior, either for us as individuals in society or as members of a profession. Nor can we expect the professional codes of ethics to be complete, consistent and correct for all situations. There is no formal monitoring for compliance and little penalty that can be assessed against violators. Goodness cannot be defined through a legalistic enumeration of dos and don’ts. People must be able to use their internal sense of ethics to fill the holes and resolve the conflicts that inevitably occur when following any code of ethics” (Bowyer, Ethics & Computing, Computer Society Press, 1996). Computer Ethics _MWS/MWT M.Shafaamry


Download ppt "Prof. Moutasem Shafaamry Computer Ethics Advanced Web & Internet Security (AWS/AIS)"

Similar presentations


Ads by Google