Module 11 Living in The IT Era
Module 11 Living in The IT Era
Module 11 Living in The IT Era
Tuguegarao City
MODULE No. 11
TITLE: COMPUTER ETHICS
INTRODUCTION Computer ethics deals with the procedures, values and
practices that govern the process of consuming computing
technology and its related disciplines without damaging or
violating the moral values and beliefs of any individual,
organization, or entity.
Ethics are a structure of standards and practices that influence how people
lead their lives. It is not strictly implemented to follow these ethics, but
it is basically for the benefit of everyone that we do.
Ethics are unlike laws that legally mandate what is right or wrong. Ethics
illustrate society’s views about what is right and what is wrong.
Computer Ethics
Computer ethics are a set of moral standards that govern the use of computers.
It is society’s views about the use of computers, both hardware and software.
Privacy concerns, intellectual property rights and effects on the society are
some of the common issues of computer ethics.
Privacy Concerns
Effects on Society
Jobs
Some jobs have been abolished while some jobs have become simpler as computers
have taken over companies and businesses. Things can now be done in just one
click whereas before it takes multiple steps to perform a task. This change
may be considered unethical as it limits the skills of the employees.
➢ There are also ethical concerns on health and safety of employees getting
sick from constant sitting, staring at computer screens and typing on
the keyboard or clicking on the mouse.
Environmental Impact
Environment has been affected by computers and the internet since so much time
spent using computers increases energy usage which in turn increases the
emission of greenhouse gases.
➢ There are ways where we can save energy like limiting computer time and
turning off the computer or putting on sleep mode when not in use. Buying
energy efficient computers with Energy Star label can also help save the
environment.
Social Impact
Computers and the internet help people stay in touch with family and friends.
Social media has been very popular nowadays.
Computer ethics relates to the ethical values that should guide the computer
professionals in their conduct. The Ten Commandments of Computer Ethics
establish guiding principles for all of us to follow.
Every sphere of life is guided by a set of rules of what is right and what is
wrong. The difference between the 'right' and the 'wrong' has to be demarcated
in any walk of life. With the development of technology and the increase in
its use, society had to confront ethical issues relating to the harnessing of
technology. Every science of life needs to base itself on ethics and so does
computer technology! The Computer Ethics Institute came up with The Ten
Commandments of Computer Ethics, in 1992. The intent behind the creation of
these Ten Commandments was to establish a set of standards to instruct people
to use computers ethically. Following is a list of the ten commandments of
Computer ethics along with their brief explanation.
Viruses are small programs built with intent to harm or disrupt the useful
computer programs. Some viruses aim at overloading the computer memory by an
excessive use of computer resources. These viruses tend to fail a computer in
executing the desired tasks. They lead to the dysfunction of a computer. The
development or the spread of such malicious software is unethical.
6. Thou shalt not use or copy software for which you have not paid.
Like any other artists or literary work, software is also subject to copyrights.
Software is the outcome of a programmer's intellect and it is important to
respect talent and give due regard to his/her rights. Obtaining illegal copies
of copyrighted software is unethical.
7. Thou shalt not use other people's computer resources without authorization.
Multi-user systems are supported by user specific ids and passwords. Breaking
into some other user's password, thus indulging into his private space on the
network is unethical. It is not ethical to hack passwords for gaining an
unauthorized access to a password given computer system.
9. Thou shalt think about the social consequences of the program you write.
Looking at the social consequences that a program can have, describes a broader
perspective of looking at technology. A computer program goes a long way to
reach homes of the masses. In case a person is working for animation films or
he/she is designing a video game, it is the programmer’s responsibility to pay
heeds to the effects of his/her creation. In case of software, it is important
for the programmer to realize the prospective use of the software. Writing a
virus, when one knows that it is going to serve as a malware, is indeed
UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City
10. Thou shalt use a computer in ways that show consideration and respect.
Remember!
The Ten Commandments of Computer Ethics are the means to build a set of
regulations to guide the individual users to base computer related operations
on strong ethical values. The commandments are a way to make people understand
the ethics involved in the use of technology.
Netiquette
What is Netiquette? Simply stated, it's network etiquette -- that is, the
etiquette of cyberspace. And "etiquette" means "the forms required by good
breeding or prescribed by authority to be required in social or official life."
The golden rule your parents and your kindergarten teacher taught you was
pretty simple: Do unto others as you'd have others do unto you. Imagine how
you'd feel if you were in the other person's shoes. Stand up for yourself, but
try not to hurt people's feelings.
In cyberspace, we state this in an even more basic manner: Remember the human.
When you communicate electronically, all you see is a computer screen. You
don't have the opportunity to use facial expressions, gestures, and tone of
voice to communicate your meaning; words -- lonely written words -- are all
you've got. And that goes for your correspondent as well.
UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City
Rule 2: Adhere to the same standards of behavior online that you follow in real
life
The confusion may be understandable, but these people are mistaken. Standards
of behavior may be different in some areas of cyberspace, but they are not
lower than in real life.
Be ethical
Don't believe anyone who says, "The only ethics out there are what you can get
away with." This is a book about manners, not about ethics. But if you encounter
an ethical dilemma in cyberspace, consult the code you follow in real life.
Chances are good you'll find the answer.
What's perfectly acceptable in one area may be dreadfully rude in another. For
example, in most TV discussion groups, passing on idle gossip is perfectly
permissible. But throwing around unsubstantiated rumors in a journalists'
mailing list will make you very unpopular there.
When you enter a domain of cyberspace that's new to you, take a look around.
Spend a while listening to the chat or reading the archives. Get a sense of
how the people who are already their act. Then go ahead and participate.
It's a formula that people today seem to have less time than ever before, even
though (or perhaps because) we sleep less and have more labor-saving devices
than our grandparents did. When you send email or post to a discussion group,
you're taking up other people's time (or hoping to). It's your responsibility
to ensure that the time they spend reading your posting isn't wasted.
UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City
The word "bandwidth" is sometimes used synonymously with time, but it's really
a different thing. Bandwidth is the information-carrying capacity of the wires
and channels that connect everyone in cyberspace. There's a limit to the amount
of data that any piece of wiring can carry at any given moment -- even a state-
of-the-art fiber-optic cable. The word "bandwidth" is also sometimes used to
refer to the storage capacity of a host system. When you accidentally post the
same note to the same newsgroup five times, you are wasting both time (of the
people who check all five copies of the posting) and bandwidth (by sending
repetitive information over the wires and requiring it to be stored somewhere).
I don't want to give the impression that the net is a cold, cruel place full
of people who just can't wait to insult each other. As in the world at large,
most people who communicate online just want to be liked. Networks --
particularly discussion groups -- let you reach out to people you'd otherwise
never meet. And none of them can see you. You won't be judged by the color of
your skin, eyes, or hair, your weight, your age, or your clothing.
You will, however, be judged by the quality of your writing. For most people
who choose to communicate online, this is an advantage; if they didn't enjoy
using the written word, they wouldn't be there. So spelling and grammar do
count.
"Flaming" is what people do when they express a strongly held opinion without
holding back any emotion. It's the kind of message that makes people respond,
"Oh come on, tell us how you really feel." Tact is not its objective.
Of course, you'd never dream of going through your colleagues' desk drawers.
So naturally you wouldn't read their email either.
The moral: Failing to respect other people's privacy is not just bad Netiquette.
It could also cost you your job.
Some people in cyberspace have more power than others. There are wizards in
MUDs (multi-user dungeons), experts in every office, and system administrators
in every system.
Knowing more than others, or having more power than they do, does not give you
the right to take advantage of them. For example, system administrators should
never read private email.
UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City
Everyone was a network newbie once. And not everyone has had the benefit of
reading this book. So, when someone makes a mistake -- whether it's a spelling
error or a spelling flame, a stupid question or an unnecessarily long answer -
- be kind about it. If it's a minor error, you may not need to say anything.
Even if you feel strongly about it, think twice before reacting. Having good
manners, yourself doesn't give you license to correct everyone else.
Cyber ethics refers to the code of responsible behavior on the Internet. Just
as we are taught to act responsibly in everyday life, with lessons such as
"Don't take what doesn't belong to you," and "Do not harm others," -- we must
act responsibly in the cyber world as well. The basic rule is do not do
something in cyber space that you would consider wrong or illegal in everyday
life.
Privacy does not exist on social media sites. Yes, there are privacy options
and controls, but too much can go wrong and your sensitive information can end
UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City
up being exposed. Things such as your account being hacked, your friend's
accounts being hacked, privacy controls changing, getting the privacy controls
wrong, or people who you thought were your friends are no longer your friends.
Long story short, if you don't want mom or your boss reading it--don't post
it. This means being careful and watching what your friends post about you,
including pictures. If nothing else, remember that employers now include sites
like Facebook and Twitter as part of any standard background check.
Social media websites are a breeding ground for scams. If one of your friend's
posts seems odd or suspicious, it may be an attack. For example, your friend
posts that they have been mugged while on vacation in London and need you to
wire them money. Or perhaps they are posting links about great ways to get
rich, or some shocking incident you must see. Many of these scams or malicious
links are the very same attacks you have been receiving in e-mail for years,
but now bad guys are replicating them in social media. If you see a friend
posting very odd things, call or text them to verify that they really posted
the information.
Do not post anything sensitive about work. Be sure you understand your
organization's policies about what you can and cannot post about your job.
➢ Inappropriate photos
➢ Offensive comments and language
➢ Personal Information
Password Selection
➢ Complex Passwords
✓ Include capital and lowercase letters
✓ Include numbers
✓ Include special characters
➢ Change passwords regularly
➢ Don't share passwords with ANYONE
➢ Use different passwords for different accounts
Reference/s:
https://teachcomputerscience.com/computer-ethics/
https://sites.google.com/site/pnusicte18/10-commandments-in-computer-ethics
https://sites.auburn.edu/admin/oit/CyberSecurityCenter/Lists/Posts/Post.aspx?
ID=11
http://www.albion.com/netiquette/corerules.html
https://www.techopedia.com/definition/5499/computer-ethics
Prepared by:
IT Instructors