Presentation is loading. Please wait.

Presentation is loading. Please wait.

Sherri Shade Information Technology Ethics. Introduction  Background  RTM Institute Ethics, Character, & Leadership  Current project  Making an Ethical.

Similar presentations


Presentation on theme: "Sherri Shade Information Technology Ethics. Introduction  Background  RTM Institute Ethics, Character, & Leadership  Current project  Making an Ethical."— Presentation transcript:

1 Sherri Shade Information Technology Ethics

2 Introduction  Background  RTM Institute Ethics, Character, & Leadership  Current project  Making an Ethical case for CSIS

3 Ethics -according to Webster  ethic Pronunciation: (eth'ik), [key] —n. 1. the body of moral principles or values governing or distinctive of a particular culture or group: the Christian ethic; the tribal ethic of the Zuni. 2. a complex of moral precepts held or rules of conduct followed by an individual: a personal ethic. [key]

4 What is What?  Computer Ethics  Internet Ethics  CyberEthics  Humble beginning in the 1940’s (Bynum 1999)  Four distinct technology phases (Tavani 2000)  1950s – 1960s  1970s – 1980s  1990s – present  Threshold Phase 4

5 IT Ethics  What is the problem?  Availability of “Really Good Stuff”  lots of information, software, hardware, graphics, music, videos  Technological Ease of Use  Myths, Lies, and Statistics  New Laws – New Rules

6 IT Ethics  Who is responsible?  Who is affected?  What harm is done?  Should IT Professionals be in the ethics business?  Training  Refer ethical issues to HR

7 Information Technology Ethics  Deal with proper use of technology devices, data, services, and software.  Implement policies  Prior to Technology it may have been easier to know whether the activity was right or wrong  Virtual World  Judging behaviors is no longer straight forward  Some users view their computing actions as less serious than their actions in the “real world”  Examples:  Stealing software from a store – no way! ….  However, SW piracy costs businesses billions of dollars per year  Most of us would not pick a lock to someone’s house  However, guessing passwords to gain access to a website, information, or programs is a common  Sometimes the technology is not well understood…romance and fear may accompany a new technologies.  Movies, books, TV capitalize on this fear and romance and make unethical or illegal actions seem heroic, or necessary

8 The Ten Commandments of Computer Ethics  Computer Ethics Institute Computer Ethics Institute Computer Ethics Institute

9 Ethical Behaviors?  Is your 80 gigabyte hard drive full? That sure is a great music where did you get it?  Have you given a friend a copy of your Microsoft Project software?  Software Piracy  Did you read the confidential company file that was accidentally attached to your email?  Computer abuse  Did you gain access to the network and invade other workers emails and files?  Computer abuse  You formatted your hard drive prior to leaving your company because you were angry about leaving.  Destruction of property  Snooping the network for the “great stuff” and then sharing it with your work friends.  Computer abuse

10 Ethical or Unethical?  A student downloads a sexually explicit picture from the Internet on a computer in the school library. Other students are able to see the picture  A student finds the teacher’s password to the school’s information system and uses it to change his grades and vi the grades of other students.  A student uses the copy and paste commands to place large parts of an electronic article into an assigned paper. She turns the paper in as her own work  A student makes a copy of a software program borrowed from another student to use on his computer at home.  A student downloads a graphic file from the web to place on his own webpage. However, he does provide a link to the author’s site.  A student uses another student’s project website as a guideline.  A student copies a previous published story in his own handwriting and submits it as his own work.

11 IT Ethics  New ethical considerations may be required with technology capabilities  Email spamming  Does the fact that the financial burden of unsolicited ads etc. now falls on the recipient not the sender create new rules?  Digital photography  What obligations does a anyone have to present an undoctored photo, even if the message is not as good as the digitally enhanced photo?  Pornography access  What security measures need to be put in place by schools, parents, companies and libraries to keep individuals from seeing inappropriate materials?  Intellectual property  Do we need better/clearer definitions of property?  Globalization of the organization  What do we need to better understand cultures, language, and behaviors?

12 IT Ethics  Software Responsibility and Accountability  Development  Implementation  Application  Mission critical applications  Errors  Therac-25  Aegis Radar System developed by US Navy

13 IT Ethics: Issues Facing Educators  Plagiarism  Code and Content Theft  Viruses  Pornography  Copyright Infringement

14 Plagiarism  Online “Knowledge Brokers”  Dissertation and Thesis Downloads  Article Cut & Paste  Chat Rooms & E-Mail “Straight A” Clubs  Obscure Journal Availability  Proving Plagiarism – New Tools for Teachers  Defined Policy and Consequences

15 Code and Content Theft  Audio and Image File Theft  Source Code and JavaScript Copying  Web Site Hacking…or Cracking  Denial of Service (DoS) Attacks  E-Mail Interception, Posting, and Redirect  Bogus Content

16 Viruses  400 – 1200 New Viruses Every Month  Most are Created and Distributed by Students  Damage / Aggravation Determines Success  Everyone Is a Target  Source and Sender Can Be Determined  Liability and Damages Can Be Assessed  School Systems Can Be Held Accountable

17 Pornography  Multi-Billion Dollar Industry  Unlimited Resources  They DO NOT Want Kids Accessing Their Sites  Barriers to Entry are Available – and Unused  School and Library Networks are Vulnerable  Parental Involvement is Mandatory  Defined Policy and Consequences

18 Challenges: Code of Ethics  No Form of licensing for computer professionals  Results in no real way to enforce ethical standards within the computing field  There is movement within the industry to create a licensing process but there are many issues to be resolved  What will be included on the exam?  How often will an IT professional be required to renew the license?  Developed by several organizations  Adoption  Implementation  Monitoring  Example: http://www.acm.org/constitution/code.html http://www.acm.org/constitution/code.html

19 Challenges: Cyberspace  Implementation of features  Pop ups  Blocking/filters  Aliases and redirecting  Cookies  Privacy policies  Security policies  Spyware  Use of other design features  Javascript  Graphics - pictures, buttons, logos, icons  Content  Design layout  Accountability/responsibility  Outdated material, inaccurate material  Content

20 Challenges: Commerce  Fraud  Taxation  Free Trade  Gambling  Auctions  Spamming  Who were Canter and Siegel?  Spamming cell phones?  Term papers for sale  Atlanta Journal Constitution article

21 Challenges: Workplace  Accessibility  Ergonomics  Outsourcing  Telecommuting  Customer relationships – Vendor relationships  Should IT professionals be in the ethics business or should other areas of the business handle these issues?  Monitoring  Should your employer have the right to monitor private email messages?  What are the two most popular Web sites for American workers? Playboy and ESPN

22 Challenges:Workplace  62% of employers monitor employees' eMail and Internet use.  68% cite legal liability as the primary reason to monitor.  87% of companies that monitor have a written eMail Policy,  83.1% an Internet Policy,  68% a Software Policy.  51% of employers have disciplined or terminated employees for violating ePolicy.  35% of organizations have eMail retention & deletion policies in place.  10% of companies have been ordered by courts to turn over employee eMail related to workplace lawsuits.  8.3% of organizations have battled sexual harassment and/or sexual discrimination claims stemming from employee e-mail and/or Internet use. Source: The 2001 Electronic Policies & Practices Survey from The American Management Association, US News & World Report, and The ePolicy Institute-Click Here for Survey Results.

23 Music Downloads  Risk of getting caught  Studies have shown that a majority of the people who share music on the Internet are aware that their actions are illegal, said Michael McGuire, a analyst with the Gartner Group. ``But they also know that the chances of getting caught are pretty remote''  Why is “getting caught remote”?  There are an estimated 60 million peer-to-peer network subscribers in the United States alone, with tens of millions more in other countries  The RIAA is seeking out people who make their music files available for others to download.  The networks have features that allow users to block others from downloading their files but allow them to continue to download files

24 Challenges: Speech  Net Etiquette  Email privacy  Email privacy policy  “Flaming” – insulting, argumentative or chastising replies to messages  Free Speech  Accountability and responsibility for web content  Abortion sites  Outdated information  Accurate information  Privacy and security policies  Porn  Professors pc – filled with porn, found by pc maintenance workers  Visa – won’t give permission to be used on offensive or pornographic sites  Hate  MACHADO CASE  Internet Filters  Should filters be in schools or libraries, and /or should they be mandated by law?  Filters can also be set up to filter out other subjects, would this be an ethical violation?  Chain Letters

25 Challenges: Computing Resource Abuse  Computers in the Workplace and the Classroom  Use or Abuse  Internet Access  Instant Messenger  Laptop use in the classroom  Email  Legal document  Can be modified  Flaming  Access  Computer Usage policy  Email policy

26 Challenges: Computing Resource Abuse  Computer Crime  Viruses  Hackers  Theft  “These cyber swindles and dot-cons present new challenges to law enforcement” said John Ashcroft  US Charges 135 With Net Crimes US Charges 135 With Net Crimes US Charges 135 With Net Crimes

27 Federal Computer Crime Cases Involving Teens  Mission Viejo, California Teen Guilty in Internet Auction Fraud; Defendant Also Admits $400,000 Bank Fraud (March 1, 2004) Mission Viejo, California Teen Guilty in Internet Auction Fraud; Defendant Also Admits $400,000 Bank Fraud (March 1, 2004) Mission Viejo, California Teen Guilty in Internet Auction Fraud; Defendant Also Admits $400,000 Bank Fraud (March 1, 2004)  Juvenile Arrested for Releasing Variant of Blaster Computer Worm That Attacked Microsoft (September 26, 2003) Juvenile Arrested for Releasing Variant of Blaster Computer Worm That Attacked Microsoft (September 26, 2003) Juvenile Arrested for Releasing Variant of Blaster Computer Worm That Attacked Microsoft (September 26, 2003)  Minneapolis, Minnesota 18 year old Arrested for Developing and Releasing B Variant of Blaster Computer Worm (August 29, 2003) Minneapolis, Minnesota 18 year old Arrested for Developing and Releasing B Variant of Blaster Computer Worm (August 29, 2003) Minneapolis, Minnesota 18 year old Arrested for Developing and Releasing B Variant of Blaster Computer Worm (August 29, 2003)  Juvenile Computer Hacker Sentenced to Six Months in Detention Facility (September 21, 2000) Juvenile Computer Hacker Sentenced to Six Months in Detention Facility (September 21, 2000) Juvenile Computer Hacker Sentenced to Six Months in Detention Facility (September 21, 2000)  Juvenile Computer Hacker Cuts off FAA Tower at Regional Airport -- First Federal Charges Brought Against a Juvenile for Computer Crime (March 18, 1998) Juvenile Computer Hacker Cuts off FAA Tower at Regional Airport -- First Federal Charges Brought Against a Juvenile for Computer Crime (March 18, 1998) Juvenile Computer Hacker Cuts off FAA Tower at Regional Airport -- First Federal Charges Brought Against a Juvenile for Computer Crime (March 18, 1998)

28 Challenges: Privacy  Privacy issues are at the top of the list in regards to ethical use of information.  Loss of control  Misuse of information  Risk to physical privacy  Risk of identity theft (video)  Unwanted intrusions into daily life  USA Patriot Act (post 9/11)  Efforts to detect and deter terrorist activity  Datamining corporate data  Loss of business and risk of lawsuits due customers being outraged at their loss of data privacy  Cookies  Privacy policies

29 Intellectual Property  Copyright Law  Patent Law  Trademark Law  Trade Secret Law

30 Copyright Infringement  Enormous Potential for Abuse and Legal Action  “Who Will Ever Know…”  “Copyright Police” & Digital Tracking  Watermarks  Digital Download Trace  Web Bots & Search Spiders

31 Internet Copyright Myths  No © Symbol Means No Copyright Exists  Material On the Net Is Automatically OK to Copy  It’s Free Advertising and Distribution for the Author  Attribution Makes Using the Material Legal  Copyrighted Material on a Free Website Is OK to Use  Material On the Web is Public Domain  I’m a Teacher…Fair Use Protects Me

32 Challenges: Intellectual Property  Electronic Copyright  Licensing  Interoperability  Licensing  Cyberlicenses  Shrinkwrap  Shareware  Freeware  MP3  RIAA court case against college students  University Internet Usage policies  Internet Downloads  Files  Graphics  Text

33 Challenges: Intellectual Property  Patent, trade secrets, and copyright law  Who owns the program  Who owns the algorithm  Software Piracy  Why shouldn't I use pirated software? Who am I hurting by doing so?  Piracy exists in everywhere.  Loss of revenue hurts everyone.  All software piracy is illegal and Software piracy is unethical.  Various studies have found that the software industry loses approximately $12 billion every year.  State Industry Study State Industry Study State Industry Study  CD-RW CD-RW

34 Challenges: Other  Decision making using Expert Systems  Security  Information technology and  Nanotechnology  Biotechnology  Medical field  Computer Crime

35 New Laws – New Rules  The Digital Millennium Copyright Act (1998)  The Napster © Case  Hollywood vs. The DVD Hackers (DeCSS)  Strict Liability Applies  Statutory Damages of $20,000 Per Case  $100,000 Per Case for “Willful Infringement”

36 Future of IT Ethics  Krystyna Gorniak-Kocikowska and Deborah Johnson, argue that computer ethics will disappear as a separate branch of ethics.  In 1996 Gorniak-Kocikowska - Hypothesis, "local" ethical theories like Europe's Benthamite and Kantian systems and the ethical systems of other cultures in Asia, Africa, the Pacific Islands, etc., will eventually be superceded by a global ethics evolving from today's computer ethics. "Computer" ethics, then, will become the "ordinary" ethics of the information age.

37 Future of IT Ethics  In 1999 Johnson expressed a hypothesis that addresses the question of whether or not the name "computer ethics" (or perhaps "information ethics") will continue to be used to refer to ethical questions and problems generated by information technology.  Johnson's view,is that as information technology becomes very commonplace -- as it gets integrated and absorbed into our everyday surroundings and is perceived simply as an aspect of ordinary life -- we may no longer notice its presence.  We would no longer need a term like "computer ethics" to single out a subset of ethical issues arising from the use of information technology.  Computer technology would be absorbed into the fabric of life, and computer ethics would thus be effectively absorbed into ordinary ethics.  Taken together, the Gorniak and Johnson hypotheses look to a future in which what we call "computer ethics" today is globally important and a vital aspect of everyday life, but the name "computer ethics" may no longer be used.

38 Conclusion: Some Ideas to Ponder  Computer ethics today is now a global effort  The gap among the rich and poor nations, rich and poor citizens exists. How can it be eliminated or reduced ethically and morally to provide information and services that will move them to into the world of cyberspace?  Will the poor be cut off from job opportunities, education, entertainment, medical care, shopping, voting - because they cannot afford a connection to the global information network?  Whose laws will apply in cyberspace when hundreds of countries are incorporated into the global network?  What happened? Where did our knowing right from wrong go too?  Are we missing an opportunity to introduce ethics at an early age in children by not integrating these thoughts and practices in video games?  Should more controls and regulations be introduced into the system? Will they actually help to improve our moral and ethical behavior?  Unethical behavior continues to permeate industry, what measures, policies, codes of conduct be changed to change this behavior?

39 So, What would you do?  My friend Joey and I wanted to buy this really cool computer game, but it cost a lot of money. Then Joey found a web site where you could get this game FOR FREE just by trading a copy of any other game that you had. But I've heard that copying games for free without the permission of the company who makes them is illegal."  "I have a paper due in biology tomorrow, and I just started to research it. I found a web site that has a lot of term papers ALREADY WRITTEN. They are grouped by subject matter and age group (middle school, high school, college, or graduate school). There's a paper there on my topic. All I have to do to get a copy is trade a copy of any other paper that I did for school. That would be a lot easier than researching and writing this entire paper in one night."  "At school, I saw this girl enter her password for Internet access, and now I can log in and read all her e-mail. I can send e-mail from her account, too, so that people will think the message is from her."

40 Works Cited:  http://www.brook.edu/dybdocroot/its/cei/overview/Ten_Commanmen ts_of_Computer_Ethics.htm http://www.brook.edu/dybdocroot/its/cei/overview/Ten_Commanmen ts_of_Computer_Ethics.htm http://www.brook.edu/dybdocroot/its/cei/overview/Ten_Commanmen ts_of_Computer_Ethics.htm  http://www.computingcases.org/case_materials/case_materials.html http://www.computingcases.org/case_materials/case_materials.html  http://www.epolicyinstitute.com/ http://www.epolicyinstitute.com/  http://legacy.eos.ncsu.edu/eos/info/computer_ethics/ http://legacy.eos.ncsu.edu/eos/info/computer_ethics/  http://www.spa.org/piracy/ http://www.spa.org/piracy/  http://www.nd.edu/~rbarger/cases.html http://www.nd.edu/~rbarger/cases.html  http://ksuweb.kennesaw.edu/~kschwaig/present.ppt http://ksuweb.kennesaw.edu/~kschwaig/present.ppt  http://www.cybercrime.gov/cases.htm http://www.cybercrime.gov/cases.htm  http://www.cybercrime.gov/rules/cybercitizen.htm http://www.cybercrime.gov/rules/cybercitizen.htm


Download ppt "Sherri Shade Information Technology Ethics. Introduction  Background  RTM Institute Ethics, Character, & Leadership  Current project  Making an Ethical."

Similar presentations


Ads by Google