Prof. Moutasem Shafaamry Computer Ethics Advanced Web & Internet Security (AWS/AIS)

Slides:



Advertisements
Similar presentations
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
Advertisements

The Ethical Use of Computers
Using the computer appropriately.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
ICT Ethics 2 ICT 139.
Internet Safety/Cyber Ethics
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
Understanding Business Ethics
For Students. What is Copyright? “The exclusive right to produce or reproduce (copy), to perform in public, or to publish an original literary or artistic.
Computers Are Your Future © 2005 Prentice-Hall, Inc.
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer ethics.
Prof. Moutasem Shafaamry Computer Ethics Advanced Web & Internet Security (AWS/AIS)
Describe ethical considerations resulting from technological advances.
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriat ely.
Information Ethics Objective: Students will understand how to use information ethically.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
Computer Ethics.
Ethics And Computers. What are Ethics? Ethics Ethics are: Principles that guide behavior OR the rules of right and wrong behavior that you should follow.
Computer Technology, Mrs. Tom. Using technology in a safe, legal, and responsible way Netiquette – Proper etiquette used in electronic communications.
Computer Ethics for Computer Users
Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
COMPUTER ETHICS Do you know the difference between right and wrong?
Digital Citizenship 6 th – 8 th Unit 1 Lesson 5 A Creator’s Rights What rights do you have as a creator?
Cyberspace Rules for Mrs. Johnson’s Kindergarten Class These are the rules we will use to learn, play, and have fun on the internet.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Digital Citizenship Created By: Kelli Stinson June 2011.
For Computer Use in Business
Humanities 375, September 8, Why are we reading this book? u 1. To raise your sensitivity to circumstances involving information technology that.
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Ethics and Computers. Ethics Ethics are principles that guide behavior Community or Society Professional or School setting Individual Standards.
PlagiarismPlagiarism Christine G. Balmes Cristian S. Mendoza Maika E. Laguartilla.
ETHICS and COMPUTERS An Overview 23/04/2017.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
Intellectual Property Basics
Intellectual Property A brief explanation. Intellectual Property is a name used for material, or something that is intangible. You may not be able to.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
COPYRIGHT ISSUES IN EDUCATION Presentation by Ben Hilt.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Using Computers: Legal and Ethical Issues Objectives and Guidelines We Must Follow.
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
Ethics...as related to computer technology. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
Computer Ethics Computer Technology 1 By Jill Einerson.
Computer Technology Timpview High School
Computer Technology RULES, LAWS, ETHICS By Megan Rees.
Ethics Self Imposed Right and Wrong Behavior Described as:
Let’s Talk about Intellectual Property Copyright Plagiarism Fair Use.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
Copyright Quiz How Well Do You Know Copyright?. Copyright Quiz: True or False Only materials with a copyright symbol,©, are protected. If it doesn’t have.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Chap (3)1 Chapter 3 Professional Codes of Ethics Almost every professional organization dealing with the field of computing has published its own code.
Computers Are Your Future
Computers Are Your Future Twelfth Edition
Using the computer appropriately
Ethical Issues When Using Computers
Using the computer appropriately.
Internet And Online Community Week 10
Ethical Issues When Using Computers
Lesson 2- Ethical Use of Digital Resources
Using the computer appropriately.
Using the computer appropriately.
Presentation transcript:

Prof. Moutasem Shafaamry Computer Ethics Advanced Web & Internet Security (AWS/AIS)

Computer Ethics What is ethical behavior? How do we make ethical decisions? Material from –Ethical Decision Making and Information Technology by Kallman & Grillo –Other Computer Ethics tutorials provided by internet and Univ. courses Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Ethical Decisions Ethical decisions are made based on ethical principles. Ethical principles are ideas of behavior that are commonly acceptable to society. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Why Should We Care About Ethics? We make a number of ethical decisions daily. Some unethical decisions can put us on the wrong side of the law. Decisions can affect our career and reputation. Obliged to uphold the principles of the society in which we live. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Most experts agree that there is no special category of computer ethics. There are ethical situations in which computers are involved. Capability of computers can lend a special character to the problem. Computer allows people to perform actions faster or to perform actions too difficult Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Three Phases of Ethical Decision Making Recognize the ethical problem exists. Attack the problem logically and consider alternative actions. Make decision on action to take based on ethical principles. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics What Affects Our Behavior? Drive for food, shelter and love - Biological Level Rules from government, religion, institution and the family - Societal Level Ethical considerations - Higher Level Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics How Do We Make an Ethical Decision? Research the law Use guidelines Person’s rights Person’s duty Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Use Guidelines Informal guidelines Formal guidelines Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Informal Guidelines Are “Shushers” involved? The “Mom Test” The “TV Test” The “Smell TEST” Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Formal Guidelines Corporate policy Corporate or professional codes Golden rule Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics ACM Code of Ethics and Professional Conduct Contribute to the improvement of society and to the well-being of human lives Take care not to harm others Speak the truth and merit trust Treat others with fairness Honor the intellectual property rights of others Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics ACM Code Cont. Give proper credit when using the intellectual property of others Respect the right of privacy of individuals Honor confidentiality Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Ten Commandments of Computing - Computer Ethics Institute Thou shall not use a computer to harm other people Thou shall not interfere with other people’s computer work Thou shall not snoop around in other people’s computer files Thou shall not use a computer to steal Thou shall not use a computer to bear false witness Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Ten Commandments - Continued Thou shall not copy or use proprietary software for which you have not paid Thou shall not use other people’s computer resources without authorization and proper compensation Thou shall not appropriate other people’s intellectual output Thou shall think about the social consequences of the program you are writing or the system you are designing Thou shall always use a computer in ways that show consideration and respect for your fellow humans Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Person’s Rights The right to know The right to privacy The right to property Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Person’s Duty To foster trust To act with integrity To be truthful To do justice To act with appropriate gratitude Make appropriate reparation Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics What Special Ethical Problems Involve Computers Computers cause personal contact to be reduced Little time is available in making a decision Electronic information is easily changed Information more vunerable to unauthorized access Easy access to information Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Special Ethical Problems Cont. An error in a program could be devastating Software piracy –Public Domain Software –Shareware –Copyrighted Software Pornography –Internet has no single authority –Filtering Software such as Cyber Patrol Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics A 4-Step Process for Ethical Analysis and Decision Making Understand the situation - what are the ethical issues? Isolate the major ethical dilemma. –State it in the form: Should someone do or not do something? Analyze the ethicality of doing or not doing the action. Make a Defensible Ethical Decision. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics The Ethical Use of Computers Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics What are ethics? The rules of right and wrong behavior. Merriam-Webster defines ethics as “the principles of conduct governing an individual or group.” Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics The Three Categories of Ethics Professional- usually defined by your employer of company; these are general guidelines Social- defined by society Individual- defined by personal heritage and integral family values Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Information Ethics Rules that define right and wrong behavior in the computing professions. The basis of trust and cooperation among workers and organizations In most cases, these are defined by the “owner” of the computer. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Ethics vs. Laws Ethics often precede laws. Laws exist to protect software developers (copyright and licensing) and users (privacy) and there are punishments for breaking the law. There are no “global punishments” for ethics violations. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Copyrights The right of an author to copy, resell, lease, lend, rent and or distribute material. Copyrights did not exist when software was first being developed. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Federal Digital Millennium Copyright Act (DMCA) The copyright law that is currently in effect. Any software or data created with a computer is owned by its creator and is automatically copyrighted as soon as it is has been recorded and is in “tangible” form. Without specific permission, it is illegal to copy software. Software designed by an employee is owned by the company. Just because a work does not display the © symbol, does not mean that it is not copyrighted. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Copyright Scenario Dema just purchased a new game for her computer. Bill loves the game and wants a copy, but he cannot afford it. Bill asks Dema if he can borrow the CD and load the game on his computer. Is this all right under current copyright laws? Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Solution…. Copyright allows the owner of the copyright to "distribute or lend" the program. Dema does not own the copyright; she owns a copy of the program sold to her by the copyright owner. She cannot lend it to Bill to load on his machine. If Dema would read her “License Agreement,” she would know exactly what is right and wrong regarding copying the software. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Software Licensing License agreements are contracts between the purchaser and copyright owner. Many software companies offer site licenses or special licenses for companies, schools or government institutions. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Little Know Factoid When you buy software, you're not buying the software itself. You're buying permission to use the software. The permission you buy is called a license (like a hunting license or a driver’s license) and is defined by a license agreement that comes with the software. Usually the license agreement is printed in tiny type on the back of the box or on a piece of paper shrink-wrapped with the box. I think most people never read it (it's full of legalese and usually takes a magnifying glass to see clearly). However, I think most of us have seen the sticker on the box that says something like, "Breaking this seal means you agree to the terms of the license." Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Four Types of Software Licenses public domain freeware shareware "all rights reserved" Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Public Domain Public domain software is not protected by copyright law; it is software that was either created with public funds (and is therefore already owned by the public) or the creator has forfeited these rights to the public. Public domain software is pretty rare and is often unreliable (i.e., poor quality, virus-laden) since nobody's keeping track of it. The only public-domain software products I've ever really wanted were a few graphics and fonts. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Freeware Freeware is copyrighted software that is licensed to be copied and distributed without charge. Some freeware (Pegasus Mail, Eudora Light, Netscape, Internet Explorer, etc.) is really good stuff, but it's not in the public domain. That is, freeware is free only because its license says it is; the software is still under the owner's control. Thus, most freeware licenses prohibit the sale or modification of the software without the owner's permission, and they often limit the groups that are able to get the software without paying. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Shareware Shareware is the same as freeware, except that the owner stipulates a purchase fee for permanent use. That is, the software is licensed for copying and sharing without charge, but only for evaluation purposes. Anyone who decides to use the software long-term is to pay a specified fee to the owner. There is usually no official system for collecting these fees; users are expected to pay on their own (honor system) in exchange for documentation, a more powerful version of the software, or some other enticement. More and more shareware is programmed to turn itself off after a certain period of time (30 days is typical) unless the owner buys a special activation code from the copyright owner. Most of the “free” software in the world is actually shareware. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Software license with all rights reserved Licensed only for use by purchasers. Almost all the really good stuff (Word, Oracle, Java, PhotoShop, Windows 2000, etc.) is licensed this way. You can't legally use it or even possess it without the owner's permission, usually defined very carefully in the license agreement. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Typical License Agreement You can install and operate the software on only one PC at a time. You can make only one back-up copy of the software. If you give the software to anyone, you also give up permission to use the software. You are not to modify the software in any way. The software is not represented as fit for any particular purpose. (Yep—even if the box says "Do your taxes faster than ever," you cannot legally assume the software is fit for doing your taxes). This is to keep you from suing the company if their software wrecks your life. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Software Piracy The illegal copying of software The estimated loss due to piracy is approximately $39 billion per year globally. Conviction on the first offense can result in a fine of up to $250,000 and a jail sentence of up to five years. (Bowyer, Ethics & Computing, 1996) Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Scenario A student is working on a class assignment. The student doesn’t have the specific software used at school, so she asks her teacher to let her take a copy of the software home. Is this ethical? Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Solution Since the software is licensed to the school, this is not legal or ethical. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Ethically and legally, society should recognize that individuals creating “intellectual property” have the right to receive credit and be protected from the incorrect use of their creations. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Intellectual Property The result of intellectual activities in the arts, science and industry (Beekman, Computer Confluence, Prentice Hall, 2001) and as such is the property of the creator. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Fair Use provisions that let you paraphrase or quote small portions of someone else’s work, provided that you give proper credit to the author for the material you use If you don’t give credit, you will probably give at least some of your readers the impression that the material you borrowed originated with you. That’s bad. It’s so bad, it has a name, plagiarism, and it’s a form of fraud. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Giving Credit Add an in-text reference to the author and publication year of the work used right after the borrowed material in the paper. Add a full citation of the work (author, title, publisher, publication year, etc.) at the end of your paper. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Electronic Information More and more information is available via CD- ROMs, the Worldwide Web, online databases, and other electronic communication channels Quoting and citing information is just as important with computer sources as with traditional written works. Even though computers and the Internet allow easy access for cutting and pasting items, it is considered plagiarism when the creator has not given permission and/or been given credit for his/her work. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Misuse of Information When using intellectual property, it should be used in the context originally intended and presented correctly so the meaning is not changed from the original intent. Blatant misuse of information in which the user knows he/she is plagiarizing but chooses to use the information anyway is an example of fraud. The Merriam-Webster's Collegiate Dictionary defines fraud as "the act of deceiving or misrepresenting" (Merriam-Webster, Inc. "fraud", 2001). Accidental plagiarism is a form of negligence. Negligence occurs when an individual is unaware or ignorant that he/she has misused intellectual property. Both fraud and negligence are ethically wrong and illegal. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Scenario Ralph Williams wrote a paper for his Geography class about the Grand Teton Mountains. He found some information on the web that worked well into his paper. He did not intend to claim the information as his own but he did not mention in his paper where he got the information. Is this okay? Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Solution He should have quoted the material and then reference the site from which the material was taken. This is true even when the material used is found on the World Wide Web. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Privacy Information can be categorized as that which is public and that which is private. Public information is assumed to be able to be used without permission. Private information cannot be legally used without permission from its owner. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics A Difficult Balance Public Info. About You full name home address phone number debts you owe court judgments against you and police actions relating to you courses you’ve taken Private Info. About You grades in specific courses medical records Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Inappropriate Use of Spamming Flaming Trolling Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Spamming Bulk, mass, or repeated posting or mailing of substantially identical messages. The emphasis is on the multiple sending, either many copies to one destination, or one copy to many destinations. (Kevin Kadow, Internet Dictionary, "spam", 1994 ) Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Flaming A public post or message that expresses a strong opinion or criticism. Flames can be fun when they allow people to vent their feelings, then return to the topic at hand. Others are simply insulting and can lead to flame wars. (Albion.com, Netdictionary, "flame", 2000 ) Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Trolling (also known as flame bait) An inflammatory post that is designed to provoke a flame war or flame responses. (Albion.com, Netdictionary, "flame bait", 2000 ) Trolling is basically sending messages that contain statements intending to bait an argument or confrontation. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Messages that continue after the recipient asks that they stop are defined as a nuisance and are illegal. Nuisance messages that are threatening or intimidating are termed harassment and are even more illegal. It's interesting to note that nuisances and harassment are defined by the messages' receiver, not by the sender. That is, if you ask me to stop sending you messages, I have to even if I don't think there's anything wrong with my messages. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Acceptable Use Policy (AUP) outlines what types of uses are acceptable and which are prohibited although a particular institution’s AUP will be unique, most have the following three categories (see next slides for more info) defining rights and responsibilities in using equipment in a legal and ethical manner legal documents that should be understood and followed Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Personal Computer Files (documents) Storage location Storage space allocation Types of files allowed Printable items and quantity Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Personal and Private Information Sharable information and personal file privacy Monitoring on-line activities Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Scenario Ben Flying Eagle is finished with his assignment for the day so he wants to get on Yahoo to chat with his friend in another class. The school’s AUP states that chat is not allowed on school computers because too many unsafe situations occur in chat rooms. Ben isn’t planning to use a public chat room, he just wants to have a private conversation with his friend. Is he breaking the school’s AUP if he chats with his friend? Is he breaking the school’s AUP if he uses Instant Messaging instead of Yahoo Chat? Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Solution If the AUP does not differentiate between public and private chat, chatting is not allowed. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Code of Ethics Many professional organizations have developed codes of ethics, which have been widely adopted as the “basic” code for many companies and universities. While the professional codes of ethics have slight differences in emphasis, they are in agreement on general principles. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics Code of Ethics at Colleges and Universities Many higher institutions of learning also maintain a code of ethics. Usually, one of the sections deals specifically to plagiarism of Intellectual Property at the college or university. Computer Ethics _MWS/MWT M.Shafaamry

Computer Ethics “We cannot count on the legal system to be a complete and correct guide to moral behavior, either for us as individuals in society or as members of a profession. Nor can we expect the professional codes of ethics to be complete, consistent and correct for all situations. There is no formal monitoring for compliance and little penalty that can be assessed against violators. Goodness cannot be defined through a legalistic enumeration of dos and don’ts. People must be able to use their internal sense of ethics to fill the holes and resolve the conflicts that inevitably occur when following any code of ethics” (Bowyer, Ethics & Computing, Computer Society Press, 1996). Computer Ethics _MWS/MWT M.Shafaamry