Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Ethics Dr. Aiman El-Maleh King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 – Seminar Term 062 Dr. Aiman El-Maleh.

Similar presentations


Presentation on theme: "Computer Ethics Dr. Aiman El-Maleh King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 – Seminar Term 062 Dr. Aiman El-Maleh."— Presentation transcript:

1 Computer Ethics Dr. Aiman El-Maleh King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 – Seminar Term 062 Dr. Aiman El-Maleh King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 – Seminar Term 062

2 2 OutlineOutline n What are ethics? n Professional ethics n Engineering ethics n Computer ethics n Categories of computer ethics issues n Moral and ethical problems Hacking, cracking and virus creation Hacking, cracking and virus creation Software piracy Software piracy n Computer ethics awareness and educational issues n Computer ethics - Case studies n Conclusions n What are ethics? n Professional ethics n Engineering ethics n Computer ethics n Categories of computer ethics issues n Moral and ethical problems Hacking, cracking and virus creation Hacking, cracking and virus creation Software piracy Software piracy n Computer ethics awareness and educational issues n Computer ethics - Case studies n Conclusions

3 3 What are Ethics? n Derived from the Greek word “ethos”, which means “custom”, “habit”, and “way of living” n Ethics is concerned with human conduct, i.e., behavior of individuals in society n Ethics is a system of morals of a particular person, religion or a group n Moral: means dealing with, or capable of, distinguishing between right and wrong, and between just and unjust n Ethical Theory: a system of ethics guides towards actions good for all n Applied Ethics: The practice of ethics The practice of ethics Rules for ethical behavior for everyday life Rules for ethical behavior for everyday life Impossible for all people to share same applied ethics in all details Impossible for all people to share same applied ethics in all details n Derived from the Greek word “ethos”, which means “custom”, “habit”, and “way of living” n Ethics is concerned with human conduct, i.e., behavior of individuals in society n Ethics is a system of morals of a particular person, religion or a group n Moral: means dealing with, or capable of, distinguishing between right and wrong, and between just and unjust n Ethical Theory: a system of ethics guides towards actions good for all n Applied Ethics: The practice of ethics The practice of ethics Rules for ethical behavior for everyday life Rules for ethical behavior for everyday life Impossible for all people to share same applied ethics in all details Impossible for all people to share same applied ethics in all details

4 4 What are Ethics? n Professional Ethics: concerns one's conduct of behavior and practice when carrying out professional work, e.g., consulting, researching, teaching and writing n Professional Ethics must take into accounts: Relations between professionals and clients Relations between professionals and clients Relation between profession and society Relation between profession and society Relations among professionals Relations among professionals Relations between employee and employer Relations between employee and employer Specialized technical details of the profession Specialized technical details of the profession n A computing professional must understand Cultural, social, legal, and ethical issues in computing Cultural, social, legal, and ethical issues in computing Responsibility and possible consequences of failure Responsibility and possible consequences of failure n Professional Ethics: concerns one's conduct of behavior and practice when carrying out professional work, e.g., consulting, researching, teaching and writing n Professional Ethics must take into accounts: Relations between professionals and clients Relations between professionals and clients Relation between profession and society Relation between profession and society Relations among professionals Relations among professionals Relations between employee and employer Relations between employee and employer Specialized technical details of the profession Specialized technical details of the profession n A computing professional must understand Cultural, social, legal, and ethical issues in computing Cultural, social, legal, and ethical issues in computing Responsibility and possible consequences of failure Responsibility and possible consequences of failure

5 5 Professional Ethics n Professional organizations dealing with computing have code of ethics (e.g. IEEE, ACM, and NSPE) n Professional code of ethics: Symbolize professionalism Symbolize professionalism Protect group interests Protect group interests Specify membership etiquette Specify membership etiquette Inspire good conduct Inspire good conduct Educate and discipline members Educate and discipline members Foster external relations Foster external relations Enumerate principles, express ideals Enumerate principles, express ideals Put forth rules, offer guidelines Put forth rules, offer guidelines Codify rights Codify rights n Professional organizations dealing with computing have code of ethics (e.g. IEEE, ACM, and NSPE) n Professional code of ethics: Symbolize professionalism Symbolize professionalism Protect group interests Protect group interests Specify membership etiquette Specify membership etiquette Inspire good conduct Inspire good conduct Educate and discipline members Educate and discipline members Foster external relations Foster external relations Enumerate principles, express ideals Enumerate principles, express ideals Put forth rules, offer guidelines Put forth rules, offer guidelines Codify rights Codify rights

6 6 Engineering Ethics n Engineering is an important and learned profession n Engineers are expected to exhibit the highest standards of honesty and integrity n Engineering has a direct and vital impact on the quality of life for all people n Services provided by engineers require: Honesty Honesty Impartiality Impartiality Fairness Fairness Equity Equity Must be dedicated to the protection of the public health, safety, and welfare Must be dedicated to the protection of the public health, safety, and welfare n Engineering is an important and learned profession n Engineers are expected to exhibit the highest standards of honesty and integrity n Engineering has a direct and vital impact on the quality of life for all people n Services provided by engineers require: Honesty Honesty Impartiality Impartiality Fairness Fairness Equity Equity Must be dedicated to the protection of the public health, safety, and welfare Must be dedicated to the protection of the public health, safety, and welfare

7 7 IEEE - Code of Ethics n In recognition of importance of our technology in affecting the quality of life we commit ourselves to conduct of the highest ethical and professional manner and agree to: accept responsibility in making decisions consistent with safety, health, and welfare of the public accept responsibility in making decisions consistent with safety, health, and welfare of the public avoid real or perceived conflicts of interest avoid real or perceived conflicts of interest be honest and realistic in stating claims or estimates be honest and realistic in stating claims or estimates reject bribery in all forms reject bribery in all forms improve understanding of technology, its application, and potential consequences improve understanding of technology, its application, and potential consequences maintain and improve our technical competence and undertake technological tasks for others only if qualified maintain and improve our technical competence and undertake technological tasks for others only if qualified n In recognition of importance of our technology in affecting the quality of life we commit ourselves to conduct of the highest ethical and professional manner and agree to: accept responsibility in making decisions consistent with safety, health, and welfare of the public accept responsibility in making decisions consistent with safety, health, and welfare of the public avoid real or perceived conflicts of interest avoid real or perceived conflicts of interest be honest and realistic in stating claims or estimates be honest and realistic in stating claims or estimates reject bribery in all forms reject bribery in all forms improve understanding of technology, its application, and potential consequences improve understanding of technology, its application, and potential consequences maintain and improve our technical competence and undertake technological tasks for others only if qualified maintain and improve our technical competence and undertake technological tasks for others only if qualified

8 8 IEEE - Code of Ethics seek, accept, and offer honest criticism of technical work seek, accept, and offer honest criticism of technical work acknowledge and correct errors acknowledge and correct errors credit properly the contributions of others credit properly the contributions of others treat all persons fairly regardless of race, religion, gender, disability, age, or national origin treat all persons fairly regardless of race, religion, gender, disability, age, or national origin avoid injuring others, their property, reputation, or employment by false or malicious action avoid injuring others, their property, reputation, or employment by false or malicious action assist colleagues and co-workers in their professional development and to support them in following this code of ethics assist colleagues and co-workers in their professional development and to support them in following this code of ethics seek, accept, and offer honest criticism of technical work seek, accept, and offer honest criticism of technical work acknowledge and correct errors acknowledge and correct errors credit properly the contributions of others credit properly the contributions of others treat all persons fairly regardless of race, religion, gender, disability, age, or national origin treat all persons fairly regardless of race, religion, gender, disability, age, or national origin avoid injuring others, their property, reputation, or employment by false or malicious action avoid injuring others, their property, reputation, or employment by false or malicious action assist colleagues and co-workers in their professional development and to support them in following this code of ethics assist colleagues and co-workers in their professional development and to support them in following this code of ethics

9 9 NSPE - NSPE - Code of Ethics for Engineers Engineers, in the fulfillment of their professional duties, shall: Hold paramount the safety, health, and welfare of the public Hold paramount the safety, health, and welfare of the public Perform services only in areas of their competence Perform services only in areas of their competence Issue public statements only in an objective and truthful manner Issue public statements only in an objective and truthful manner Act for each employer or client as faithful agents or trustees Act for each employer or client as faithful agents or trustees Avoid deceptive acts Avoid deceptive acts Conduct themselves honorably, responsibly, ethically, and lawfully so as to enhance the honor, reputation, and usefulness of the profession Conduct themselves honorably, responsibly, ethically, and lawfully so as to enhance the honor, reputation, and usefulness of the profession Engineers, in the fulfillment of their professional duties, shall: Hold paramount the safety, health, and welfare of the public Hold paramount the safety, health, and welfare of the public Perform services only in areas of their competence Perform services only in areas of their competence Issue public statements only in an objective and truthful manner Issue public statements only in an objective and truthful manner Act for each employer or client as faithful agents or trustees Act for each employer or client as faithful agents or trustees Avoid deceptive acts Avoid deceptive acts Conduct themselves honorably, responsibly, ethically, and lawfully so as to enhance the honor, reputation, and usefulness of the profession Conduct themselves honorably, responsibly, ethically, and lawfully so as to enhance the honor, reputation, and usefulness of the profession

10 10 Computer Ethics n Computer ethics defined as the application of classical ethical principles to the use of computer technology n Ethical problems related to computers are not unique but they tend to occur on a much larger scale and scope Scope: communications networks bring the world together Scope: communications networks bring the world together Anonymity: beneficial but creates problems of integrity Anonymity: beneficial but creates problems of integrity Reproducibility Reproducibility n Aspects of computer ethics: Analysis of the nature of problems related to the social impact of computers Analysis of the nature of problems related to the social impact of computers Formulation and justification of policies needed to manage computer technology Formulation and justification of policies needed to manage computer technology n Computer ethics defined as the application of classical ethical principles to the use of computer technology n Ethical problems related to computers are not unique but they tend to occur on a much larger scale and scope Scope: communications networks bring the world together Scope: communications networks bring the world together Anonymity: beneficial but creates problems of integrity Anonymity: beneficial but creates problems of integrity Reproducibility Reproducibility n Aspects of computer ethics: Analysis of the nature of problems related to the social impact of computers Analysis of the nature of problems related to the social impact of computers Formulation and justification of policies needed to manage computer technology Formulation and justification of policies needed to manage computer technology

11 11 Categories of Computer Ethics Issues n Privacy Computers create a false sense of security Computers create a false sense of security People do not realize how vulnerable information stored on computers are People do not realize how vulnerable information stored on computers are n Property Physical property Physical property Intellectual property (in both copyright and patent) Intellectual property (in both copyright and patent) Data as property Data as property n Access Access to computing technology Access to computing technology Access to data Access to data n Accuracy Accuracy of information stored Accuracy of information stored n Privacy Computers create a false sense of security Computers create a false sense of security People do not realize how vulnerable information stored on computers are People do not realize how vulnerable information stored on computers are n Property Physical property Physical property Intellectual property (in both copyright and patent) Intellectual property (in both copyright and patent) Data as property Data as property n Access Access to computing technology Access to computing technology Access to data Access to data n Accuracy Accuracy of information stored Accuracy of information stored

12 12 Moral and Ethical Problems n Hacking, cracking and virus creation Serious crimes that cannot be justified Serious crimes that cannot be justified Attempts at justifying such actions Attempts at justifying such actions Electrons are free- they do not belong to anybodyElectrons are free- they do not belong to anybody Companies have weak protectionCompanies have weak protection Point out flaws and vulnerabilities in information systemsPoint out flaws and vulnerabilities in information systems Hacking or virus creation is right in a particular country or cultureHacking or virus creation is right in a particular country or culture n Software piracy Unauthorized copying of software is stealing Unauthorized copying of software is stealing It is morally wrong as it constitutes a violation of someone else’s rights It is morally wrong as it constitutes a violation of someone else’s rights n Hacking, cracking and virus creation Serious crimes that cannot be justified Serious crimes that cannot be justified Attempts at justifying such actions Attempts at justifying such actions Electrons are free- they do not belong to anybodyElectrons are free- they do not belong to anybody Companies have weak protectionCompanies have weak protection Point out flaws and vulnerabilities in information systemsPoint out flaws and vulnerabilities in information systems Hacking or virus creation is right in a particular country or cultureHacking or virus creation is right in a particular country or culture n Software piracy Unauthorized copying of software is stealing Unauthorized copying of software is stealing It is morally wrong as it constitutes a violation of someone else’s rights It is morally wrong as it constitutes a violation of someone else’s rights

13 13 Problems with Codes of Ethics n A legal system is not a complete and correct guide to moral behavior n Codes of ethics are mostly voluntary n May encounter situations for which the code makes no explicit recommendations n Goodness cannot be defined through a list of Dos and Don'ts n You must use your internal sense of ethics n A legal system is not a complete and correct guide to moral behavior n Codes of ethics are mostly voluntary n May encounter situations for which the code makes no explicit recommendations n Goodness cannot be defined through a list of Dos and Don'ts n You must use your internal sense of ethics

14 14 Computer Ethics Awareness and Educational Issues n How to raise the moral consciousness and ethical level n Possibilities of developing global computer ethics codes n Computer ethics education should include: Explanation of disruptive potential of even a single user Explanation of disruptive potential of even a single user Understanding of importance of ethics and lack of laws in computer/information technology Understanding of importance of ethics and lack of laws in computer/information technology Explanation of information security & related problems Explanation of information security & related problems Making people aware of ethical impact of their actions Making people aware of ethical impact of their actions Training and education by professionals Training and education by professionals n How to raise the moral consciousness and ethical level n Possibilities of developing global computer ethics codes n Computer ethics education should include: Explanation of disruptive potential of even a single user Explanation of disruptive potential of even a single user Understanding of importance of ethics and lack of laws in computer/information technology Understanding of importance of ethics and lack of laws in computer/information technology Explanation of information security & related problems Explanation of information security & related problems Making people aware of ethical impact of their actions Making people aware of ethical impact of their actions Training and education by professionals Training and education by professionals

15 15 Computing Ethics and Guidelines - Example n Respect privacy of other users and do not share your account with others n Respect appropriate laws and copyrights n Obey established guidelines for any network or system used n Do not use computer resources for unauthorized purposes n Do not use computer resources for commercial endeavors n Do not use computer resources in ways detrimental to normal operation n Respect privacy of other users and do not share your account with others n Respect appropriate laws and copyrights n Obey established guidelines for any network or system used n Do not use computer resources for unauthorized purposes n Do not use computer resources for commercial endeavors n Do not use computer resources in ways detrimental to normal operation

16 16 Computer Ethics - Case Studies Administrator Dilemma n The problem here is that every file on the system is accessible by the administrator and they have no tracks when they change a file n If administrator is always believed, he is given the ability to take advantage of anybody at any time n If user is always believed, he is given the ability to get away with anything he does n Anything on the system can be faked without evidence n The problem here is that every file on the system is accessible by the administrator and they have no tracks when they change a file n If administrator is always believed, he is given the ability to take advantage of anybody at any time n If user is always believed, he is given the ability to get away with anything he does n Anything on the system can be faked without evidence

17 17 Computer Ethics - Case Studies Software Licensing: Stuck in the Middle n You are contracted to install Netscape Navigator software on all the PCs of company X n After doing half the work, you found that company X is not paying Netscape for the copies you are installing n You notified company X’s contact that they are out of compliance with Netscape licensing requirement, but got no response n What do you do? n You are contracted to install Netscape Navigator software on all the PCs of company X n After doing half the work, you found that company X is not paying Netscape for the copies you are installing n You notified company X’s contact that they are out of compliance with Netscape licensing requirement, but got no response n What do you do?

18 18 Computer Ethics - Case Studies n You are asked to write a program to print tags for a sale. Your boss asks you to put tags that have a price 10% higher, with a 10% discount marking it back to original price. Do you do this? n You wrote a software that matches the requirement your company was given. But, requirements are so bad that you know the software will not match the actual needs Should you say anything? Should you say anything? Should your company say anything? Even if it would mean loss of future contracts? Should your company say anything? Even if it would mean loss of future contracts? n You are asked to write a program to print tags for a sale. Your boss asks you to put tags that have a price 10% higher, with a 10% discount marking it back to original price. Do you do this? n You wrote a software that matches the requirement your company was given. But, requirements are so bad that you know the software will not match the actual needs Should you say anything? Should you say anything? Should your company say anything? Even if it would mean loss of future contracts? Should your company say anything? Even if it would mean loss of future contracts?

19 19 ConclusionsConclusions n Must understand cultural, social, legal and ethical issues related to computing n Expect to face variety of ethically difficult situations n Hold to highest possible ethical standards n Use your internal sense of ethics n Making the wrong ethical choice begins with focusing on short-term self-interest n Ethical behavior is a way of life, best learned through experience n Living ethically requires strong and sincere motivation n Must understand cultural, social, legal and ethical issues related to computing n Expect to face variety of ethically difficult situations n Hold to highest possible ethical standards n Use your internal sense of ethics n Making the wrong ethical choice begins with focusing on short-term self-interest n Ethical behavior is a way of life, best learned through experience n Living ethically requires strong and sincere motivation


Download ppt "Computer Ethics Dr. Aiman El-Maleh King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 – Seminar Term 062 Dr. Aiman El-Maleh."

Similar presentations


Ads by Google