BIS- 601 INFORMATION SYSTEMS
COMPUTER ETHICS
Submitted by
Lakshmi Gajjarapu
Student id: 665584
Global Id: gajja1l
Email:gajja1l@cmich.edu
INTRODUCTION:
As the use of Computers have increased now-a-days with improvements in the technology which brings both advantages and disadvantages. Advantages comes with technological developments and disadvantages are like frauds happening using technology. These frauds using technology are called “Cyber-attacks” where intruders or hackers break into others computers without permission and access their personal data. Computer Ethics deals with values and principles in using the technology in right way without any illegal activities. People who are not aware of ethics cause
…show more content…
Computer Ethics mainly deals how computer professionals should act while working with computers. Decisions need to be taken keeping in mind the values, disciplines of a person or an organization. This needs to be defined in order to educate people against cyber-attacks. These ethics should educate people to determine right or wrong while taking decisions. Ethics is an important topic in each and every field like Computers, Education and also in bringing social awareness among people. Like how we follow ethics in our regular life in making decisions between right or wrong, we should follow the same when using technology. It is important to have ethics defined because if we don’t have ethics there will be many cyber frauds caused easily without thinking what is right and what is wrong. Ethics mainly concentrates on decision making, values, responsibility of one’s own data and also others data (Wong, 1995) [3]. Computers store lot of information in their memory like personal information, banking information, health information, here privacy is an important issue of computer ethics.
Specific guidelines, policies, rules should be developed by organizations which should be acceptable by majority of computer users in following computer ethics. People who follow morals and values in everything they do automatically implement the same morals
Every Single day it is indeed a full-time job for the network administrator to keep up with the changing technologies. These new technologies come with new challenges, threats, and vulnerabilities which a smart network administrator must solve to keep the system secure. The network administrator must keep up with new hacking techniques, latest countermeasures, and in-depth knowledge of company’s data to address the suspicious activities and minimize their effects. But then comes the question of Ethics. Should the network administrator access employees’ private emails or websites logs to ensure company’s rules aren’t violated? Is it ok to browse employees’ documents or graphics files stored on the computers or on file servers? So, the network administrator has both charms and pitfalls as he has a huge responsibility to secure the company by carrying out his duties in an ethical way. This paper explains some ethical and social challenges a future network administrator may encounter in a company. The paper also introduces some basic ways the new network administrator can use to maintain a healthy, trustful, and ethical relationship between his work and the society.
Ethical computer use policy contains general principles to guide computer user behavior: True or False
Legal and ethical issues in computing are not as straight forward as one expects, these two comprehensive concepts can be divided into many sub-sections such as computer Ethics which is a moral standard used as a guideline for computer users, Code of ethics is a guideline in ICT, intellectual property is the own work that is created by individuals, privacy refers to the rights that individual and companies have and how their data is collected and restricted to outside sources, computer crime is an illegal act that involves computers and finally cyber law which is laws that are related to helping protect the internet and other online communication.
Ethical issues and the use of Personally Identifiable Information in computer systems, applications, and the internet.
The consideration of computer ethics fundamentally emerged with the birth of computers. There was concern right away that computers would be used inappropriately to the detriment of society, or that they would replace humans in many jobs, resulting in widespread job loss. To grasp fully the issues involved with computer ethics, it is important to consider the history. Cyber fraud which I
As the utilization of PCs and the web turns out to be more predominant, moral issues identified with PC use will keep on making a bigger effect on individuals' lives and the way that society capacities. PC morals include the ethical standards and behavioral rules related to the path in which people, associations, and society all in all utilization PCs and data innovation. A few cases of moral issues identified with PC utilize incorporate individual data protection, PC security, wholesale fraud, licensed innovation, level with access to data and so on.
The creation go of the Internet has helped spawn new forms of criminals and crimes, and has always helped make older criminal schemes easier to execute, identity theft, child pornography, copyright violations, hacking and you could go on and on. In a 2003 survey conducted by the CSI with the participation of the San Francisco Federal Bureau of Investigation’s Computer Intrusion Squad, of the 530 respondents made up of U.S. corporations, government agencies, financial institutions, medical institutions and universities, 56% reported unauthorized use of their computer systems (2003 CSI/FBI Computer Crime and Security Survey).
The advances made in information technologies are causing an increasing number of ethical problems. The power used to processing computers doubles about every two years. Organizations are more dependent than ever before on their information systems. The Ethical problems arising from the appropriate use of customer information, personal privacy, and the protection of intellectual property have lead to increased laws to regulate the way data is collected. There are also privacy issues involved collecting, storing, and disseminating information about individuals.
“Computer ethics is a branch of applied ethics that considers ethical issues raised or significantly amplified by computer technology.” Moor (2006). Its been stated in several works that computers give people power, which means people have the choice to use this wisely and ethically. While society has benefited from this “power”, there are still ethical concerns that need attention such as privacy of data, security, reliability of data, intellectual property, and accessibility. Mark D. Bowles, Deborah G. Johnson, and H. Lodewyckx all have given their points of view on this wide spread topic, that all seem to have a common ground when it comes to the basic concerns of ethics in computing.
Following the terrorist attacks on September of 2001, President George W. Bush signed into law The USA PATRIOT Act. Intended to enhance law enforcement investigatory tools, The Patriot Act made changes to surveillance laws that enabled the U.S government to collect computer information about both American and foreign citizens in unprecedented ways. During the following years, through a series of legislative changes and court decisions, The United States National Security Agency was gradually granted the authority to collect information on a massive scale by implementing programs such as PRISM, which collects internet communications from at least nine major US internet companies such as Google, Facebook Yahoo and Apple ; XKEYSCORE, which gave the NSA the ability to secretly access databases containing emails, online chats and the browsing histories of millions of individuals; MYSTIC, which allows them to collect the metadata as well as the content of phone calls from several entire countries, as well as many other programs with similar mass surveillance capabilities . To put it in simple terms, together this programs essentially enables almost unlimited warrantless surveillance of anyone and everyone anywhere in the world, regardless of that person nationality, affiliation or lack thereof to any criminal or terrorist group.
Chapter eight of Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing by Herman T. Tavani is about intellectual property disputes. Tavani defines intellectual property as an intangible form of property that is protected by a system of laws through which authors and inventors are given ownership rights over their creative works and inventions. There are four legal frameworks for protecting intellectual property. The first of these is copyright laws. Copyright laws protect authors. An author can also be an individual or an entity such as an organization or corporation. The first United States copyright law was created in 1790 and protected books, maps, and charts. As newer forms of media were developed, copy right protection has extended to them also. In 1980 copyright laws were amended to include computers, programs and databases that exhibit authorship. In order for something to be protected with copyright laws it must be original, nonfunctional, and also fixed in a tangible medium. The second legal framework is patents which protects individuals who create an invention or process. Patent laws require that inventions be useful, novel, and nonobvious. The third legal framework is trademarks. A trademark is a word, name, phrase or symbol that identifies a product or service. To qualify for a trademark the mark should be distinctive. The last legal framework for protection is a trade secret. A trade secret is highly valuable
Computer ethics are set of a good ethical principle that control the usage of computers. One of the basic ethic missed by numerous among computer ethics is violation of copyright issues. Plagiarism is one of the significant types of academic dishonesty which has always existed in education. For example, assignments submitted by students may turn out to be copied from associate students or could be taken over, in part or in whole, from existing published works. Also, break copyright and software theft. For example, throughout the society, it is well known that the illegal copying of copyrighted media (texts, music works, movies and software programs) is widespread. Furthermore, many people who engage in such activity do not consider themselves to be doing something that is immoral. Therefore, students and staff may have authorized access to computer resources, but then go on to use these resources improperly. They may have a school/library Internet account, or they may use computer system or computer network or computer software that is owned by the school, or they may use computerized services given by the school, and do too in a way that does not meet the school’s standards for proper use of that particular
In this paper the primary motive is to provide the ethical issues related to data security. This paper provides the ethical issues facing by the individuals even the security of the applications is so high.
In the early years of computers and computerized technology, computer engineers had to believe that their contribution to the development of computer technology would produce positive impacts on the people that would use it. During the infancy of computer technology, ethical issues concerning computer technology were almost nonexistent because computers back then were not as multifaceted as they are today. However, ethical issues relating to computer technology and cyber technology is undeniable in today’s society. Computer technology plays a crucial role in all aspects of our daily lives. Different forms of computer technology provide unique functionalities that allow people to perform daily activities effectively and efficiently. In
IT Professional is a publication (Keith W. Miller 2009), it is such like book publication, it also has copyright problem, plagiarism problem, and many problems like book publication, so, to be the Professionals, they must act like the book authors to solve these problems. In aspects of IT, the side of ethical problems are including advice on how professionals can recognize, analyze, and make judgments on challenging questions about right, wrong, and computing. Computers have become essential tools of modern humans, regardless life, entertainment, education, work, and business are related with computer. Computer impact on human society very much. So knowing the Information Technology Ethics is very important to everyone, because it is useful to everyone who lives in this