2
Most read
4
Most read
5
Most read
Sherri Shade Information Technology Ethical Challenges
Ethics eth•ic Pronunciation:  (eth'ik),  [key]   — n.   1.  the body of moral principles or values governing or distinctive of a particular culture or group:  the Christian ethic; the tribal ethic of the Zuni.   2.  a complex of moral precepts held or rules of conduct followed by an individual:  a personal ethic. Webster’s Dictionary
IT and Ethics Who is responsible? Who is affected? Should IT Professionals be in the ethics business? Training Refer ethical issues to HR Development Implementation Application
Ethical Behaviors? Is your 80 gigabyte hard drive full? Music and videos That sure is a great music where did you get it? Downloading of music from the web  Have you given a friend a copy of your Microsoft Project software? Software Piracy Did you read the confidential company file that was accidentally attached to your email? Computer abuse Did you gain access to the network and invade other workers emails and files? Computer abuse You formatted your hard drive prior to leaving your company because you were angry about leaving. Destruction of property
Information Technology Ethics Deal with proper use of technology devices, data, services, and software. Prior to Technology it may have been easier to know whether the activity was right or wrong Virtual World  Judging behaviors is no longer straight forward Ethical or Unethical? A student downloads a sexually explicit picture from the Internet on a computer in the school library.  Other students are able to see the picture A student finds the teacher’s password to the school’s information system and uses it to change his grades and vi the grades of other students. A student uses the copy and paste commands to place large parts of an electronic article into an assigned paper.  She turns the paper in as her own work A student makes a copy of a software program borrowed from another student to use on his computer at home. A student downloads a graphic file from the web to place on his own webpage.  However, he does provide a link to the author’s site. A student uses another student’s project website as a guideline.  A student copies a previous published story in his own handwriting and submits it as his own work.
Information Technology Ethics New ethical considerations may be required with technology capabilities Email spamming Does the fact that the financial burden of unsolicited ads etc. now falls on the recipient not the sender create new rules? Digital photography What obligations does a anyone have to present an undoctored photo, even if the message is not as good as the digitally enhanced photo? Pornography access What security measures need to be put in place by schools, parents, companies and libraries to keep individuals from seeing inappropriate materials? Intellectual property Do we need better/clearer definitions of property?  Globalization of the organization What do we need to better understand cultures, language ,  and behaviors ?
Information Technology Ethics Some users view their computing actions as less serious than their actions in the “real world” Examples: Stealing software from a store – no way! …. However, SW piracy costs businesses billions of dollars per year Most of us would not pick a lock to someone’s house However, guessing passwords to gain access to a website, information, or programs is a common  Sometimes the technology is not well understood…romance and fear may accompany a new technologies. Movies, books, TV capitalize on this fear and romance and make unethical or illegal actions seem heroic, or necessary
The Ten Commandments of Computer Ethics Computer Ethics Institute
Challenges: Code of Ethics No Form of licensing for computer professionals  Results in no real way to enforce ethical standards within the computing field There is movement within the industry to create a licensing process but there are many issues to be resolved What will be included on the exam? How often will an IT professional be required to renew the license? Developed by several organizations Adoption Implementation Monitoring Example:  http://www.acm.org/constitution/code.html
Challenges: Web Design Implementation of features Pop ups Blocking/filters Aliases and redirecting Cookies Privacy policies Security policies Spyware Use of other design features Javascript Graphics -  pictures, buttons, logos, icons Content Design layout Accountability/responsibility Outdated material, inaccurate material
Challenges: Commerce Fraud Taxation Free Trade Gambling  Auctions Spamming Who were Canter and Siegel? Spamming cell phones? Term papers for sale Atlanta Journal Constitution aritcle
Challenges: Workplace Accessibility Ergonomics Outsourcing Telecommuting Customer relationships – Vendor relationships Should IT professionals be in the ethics business or should other areas of the business handle these issues? Monitoring Should your employer have the right to monitor private email messages? What are the two most popular Web sites for American workers?  Playboy and ESPN
Challenges:Workplace 62% of employers monitor employees' eMail and Internet use. 68% cite legal liability as the primary reason to monitor.  87% of companies that monitor have a written eMail Policy,  83.1% an Internet Policy,  68% a Software Policy. 51% of employers have disciplined or terminated employees for violating ePolicy. 35% of organizations have eMail retention & deletion policies in place. 10% of companies have been ordered by courts to turn over employee eMail related to workplace lawsuits. 8.3% of organizations have battled sexual harassment and/or sexual discrimination claims stemming from employee e-mail and/or Internet use.  Source: The 2001 Electronic Policies & Practices Survey from The American Management Association, US News & World Report, and The ePolicy Institute-Click Here for Survey Results .
Music Downloads Risk of getting caught Studies have shown that a majority of the people who share music on the Internet are aware that their actions are illegal, said Michael McGuire, a analyst with the Gartner Group.  ``But they also know that the chances of getting caught are pretty remote''  Why is “getting caught remote”? There are an estimated 60 million peer-to-peer network subscribers in the United States alone, with tens of millions more in other countries  The RIAA is seeking out people who make their music files available for others to download. The networks have features that allow users to block others from downloading their files but allow them to continue to download files
Challenges:  Speech Net Etiquette Email privacy Email privacy policy “ Flaming” – insulting, argumentative or chastising replies to messages Free Speech Accountability and responsibility for web content Abortion sites Outdated information Accurate information Privacy and security policies Porn Professors pc – filled with porn, found by pc maintenance workers Visa – won’t give permission to be used on offensive or pornographic sites Hate MACHADO CASE  Internet Filters Should filters be in schools or libraries, and /or should they be mandated by law? Filters can also be set up to filter out other subjects, would this be an ethical violation? Chain Letters
Challenges: Computing Resource Abuse Computers in the Workplace and the Classroom Use or Abuse Internet Access Instant Messenger Laptop use in the classroom Email Legal document Can be modified Flaming Access Computer Usage policy Email policy
Challenges: Computing Resource Abuse Computer Crime Viruses Hackers Theft “ These cyber swindles and dot-cons present new challenges to law enforcement” said John Ashcroft US Charges 135 With Net Crimes
Challenges:  Privacy Privacy issues are at the top of the list in regards to ethical use of information. Loss of control Misuse of information Risk to physical privacy Risk of identity theft (video) Unwanted intrusions into daily life USA Patriot Act (post 9/11) Efforts to detect and deter terrorist activity Datamining corporate data Loss of business and risk of lawsuits due customers being outraged at their loss of data privacy Cookies Privacy policies
Challenges:  Intellectual Property Electronic Copyright Licensing Interoperability Licensing Cyberlicenses Shrinkwrap Shareware Freeware MP3 RIAA court case against college students University Internet Usage policies Internet Downloads Files Graphics Text
Challenges:  Intellectual Property Patent, trade secrets, and copyright law Who owns the program Who owns the algorithm Software Piracy Why shouldn't I use pirated software? Who am I hurting by doing so?   Piracy exists in everywhere. Loss of revenue hurts everyone. All software piracy is illegal and  Software piracy is unethical .  Various studies have found that the software industry loses approximately $12 billion every year . State Industry Study CD-RW
Challenges: Other Decision making using Expert Systems Network Security Software accuracy and reliability who is ethically responsible? Therac-25 Accidents Killer Robots The Hughes Whistleblowing Case
Conclusion: Some Ideas to Ponder Computer ethics today is now a global effort The gap among the rich and poor nations, rich and poor citizens exists.  How can it be eliminated or reduced eithically and morally to provide information and services that will move them to into the world of cyberspace? Will the poor be cut off from job opportunities, education, entertainment, medical care, shopping, voting - because they cannot afford a connection to the global information network?  Whose laws will apply in cyberspace when hundreds of countries are incorporated into the global network?  What happened? Where did our knowing right from wrong go too? Are we missing an opportunity to introduce ethics at an early age in children by not integrating these thoughts and practices in video games? Should more controls and regulations be introduced into the system?  Will they actually help to improve our moral and ethical behavior? Unethical behavior continues to permeate industry, what measures, policies, codes of conduct be changed to change this behavior?
Works Cited: http://www.brook.edu/dybdocroot/its/cei/overview/Ten_Commanments_of_Computer_Ethics.htm http://www.computingcases.org/case_materials/case_materials.html http://www.epolicyinstitute.com/ http://legacy.eos.ncsu.edu/eos/info/computer_ethics/ http://www.spa.org/piracy/ http://www.nd.edu/~rbarger/cases.html http://ksuweb.kennesaw.edu/~kschwaig/present.ppt

More Related Content

PPTX
Ethics in computing
PPTX
ETHICS01 - Introduction to Computer Ethics
PPTX
Computer Ethics Final Work
PPT
Computer Ethics Presentation
PPTX
Social and professional issuesin it
PPT
Privacy and personal information
PPTX
computer ethics slides
PPT
Professional Ethics of IT
Ethics in computing
ETHICS01 - Introduction to Computer Ethics
Computer Ethics Final Work
Computer Ethics Presentation
Social and professional issuesin it
Privacy and personal information
computer ethics slides
Professional Ethics of IT

What's hot (20)

PPTX
Chapter 1 powerpoint
PPT
Ethical Issues In ICT
PDF
Chapter 3_dp-pertemuan 4&5
PDF
Misuse of computer
PPT
Computer Ethics and Legal Issues
PPTX
Overview of ethics and information technology
PPTX
Social and Professional Issues in Computing - Ethics
PPTX
Computer ethics
PPTX
Identify ethical use of computers
PPTX
Data protection ppt
PPS
Introduction to Data Protection and Information Security
PPTX
Ethics In Information Technology
PPT
Information Assurance And Security - Chapter 1 - Lesson 2
PDF
Internet privacy ethics and online security
PPT
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
PPT
Information Assurance And Security - Chapter 1 - Lesson 4
PPTX
Ethics in cyber space
PPTX
Intellectual Property
PPTX
Cyber ethics
PPT
Chapter2 the need to security
Chapter 1 powerpoint
Ethical Issues In ICT
Chapter 3_dp-pertemuan 4&5
Misuse of computer
Computer Ethics and Legal Issues
Overview of ethics and information technology
Social and Professional Issues in Computing - Ethics
Computer ethics
Identify ethical use of computers
Data protection ppt
Introduction to Data Protection and Information Security
Ethics In Information Technology
Information Assurance And Security - Chapter 1 - Lesson 2
Internet privacy ethics and online security
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
Information Assurance And Security - Chapter 1 - Lesson 4
Ethics in cyber space
Intellectual Property
Cyber ethics
Chapter2 the need to security
Ad

Similar to Computer Ethics (20)

PPTX
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
PPTX
Computer ethics cyber security and technology of it
PPT
Computer ethics-presentation-1221139444034074-9
PPTX
chapter 5.pptxggggggggggggggggggggggggggg
PPT
Issues with computers
PPTX
G-12 UNIT -1.pptx information system and thier application
PDF
Ethical issues
PPTX
Ethical_and_Social_Issues_in_Information_Systems.pptx
PPT
Bus ethics and tech
PPT
DigitalCitizenshipPresentation
PPT
Introduction in Computer Science Ethics
PPT
One - Social & Ethical Issues
PPT
Star Kamal 9 B
PPTX
Shannon Morris PDLM presentation
PPTX
week43thicsindatasciencetohellopeir.pptx
PPTX
Ethics in IT
DOCX
chapter 3 AIS by james hall summarize in book
PDF
Nfwordle
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Computer ethics cyber security and technology of it
Computer ethics-presentation-1221139444034074-9
chapter 5.pptxggggggggggggggggggggggggggg
Issues with computers
G-12 UNIT -1.pptx information system and thier application
Ethical issues
Ethical_and_Social_Issues_in_Information_Systems.pptx
Bus ethics and tech
DigitalCitizenshipPresentation
Introduction in Computer Science Ethics
One - Social & Ethical Issues
Star Kamal 9 B
Shannon Morris PDLM presentation
week43thicsindatasciencetohellopeir.pptx
Ethics in IT
chapter 3 AIS by james hall summarize in book
Nfwordle
Ad

More from Kodok Ngorex (20)

PPTX
Business IT Alignment Heuristic
PPTX
Business IT Alignment Heuristic
PDF
Optimize your licenses
PDF
I go8 usermanual_eng
PDF
Finder m520 user_manual_id
PPT
Gis Tutorial Purnawan
PPT
Simplicity in web design
PPT
PPT
PPT
PPT
PPT
PPT
PPT
PPT
PPT
PPT
PPT
PPT
PPT
Business IT Alignment Heuristic
Business IT Alignment Heuristic
Optimize your licenses
I go8 usermanual_eng
Finder m520 user_manual_id
Gis Tutorial Purnawan
Simplicity in web design

Recently uploaded (20)

PPTX
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
PDF
Keppel_Proposed Divestment of M1 Limited
DOCX
Center Enamel Powering Innovation and Resilience in the Italian Chemical Indu...
PDF
PMB 401-Identification-of-Potential-Biotechnological-Products.pdf
PDF
Chapter 2 - AI chatbots and prompt engineering.pdf
PDF
NEW - FEES STRUCTURES (01-july-2024).pdf
PDF
Ron Thomas - Top Influential Business Leaders Shaping the Modern Industry – 2025
PDF
Solaris Resources Presentation - Corporate August 2025.pdf
PDF
Charisse Litchman: A Maverick Making Neurological Care More Accessible
PPTX
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
PDF
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
PPTX
BUSINESS CYCLE_INFLATION AND UNEMPLOYMENT.pptx
PDF
Introduction to Generative Engine Optimization (GEO)
PPTX
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
PPTX
CTG - Business Update 2Q2025 & 6M2025.pptx
PDF
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
PPT
Lecture 3344;;,,(,(((((((((((((((((((((((
PPTX
2 - Self & Personality 587689213yiuedhwejbmansbeakjrk
PDF
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
PDF
#1 Safe and Secure Verified Cash App Accounts for Purchase.pdf
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
Keppel_Proposed Divestment of M1 Limited
Center Enamel Powering Innovation and Resilience in the Italian Chemical Indu...
PMB 401-Identification-of-Potential-Biotechnological-Products.pdf
Chapter 2 - AI chatbots and prompt engineering.pdf
NEW - FEES STRUCTURES (01-july-2024).pdf
Ron Thomas - Top Influential Business Leaders Shaping the Modern Industry – 2025
Solaris Resources Presentation - Corporate August 2025.pdf
Charisse Litchman: A Maverick Making Neurological Care More Accessible
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
BUSINESS CYCLE_INFLATION AND UNEMPLOYMENT.pptx
Introduction to Generative Engine Optimization (GEO)
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
CTG - Business Update 2Q2025 & 6M2025.pptx
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
Lecture 3344;;,,(,(((((((((((((((((((((((
2 - Self & Personality 587689213yiuedhwejbmansbeakjrk
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
#1 Safe and Secure Verified Cash App Accounts for Purchase.pdf

Computer Ethics

  • 1. Sherri Shade Information Technology Ethical Challenges
  • 2. Ethics eth•ic Pronunciation: (eth'ik), [key] — n. 1. the body of moral principles or values governing or distinctive of a particular culture or group: the Christian ethic; the tribal ethic of the Zuni. 2. a complex of moral precepts held or rules of conduct followed by an individual: a personal ethic. Webster’s Dictionary
  • 3. IT and Ethics Who is responsible? Who is affected? Should IT Professionals be in the ethics business? Training Refer ethical issues to HR Development Implementation Application
  • 4. Ethical Behaviors? Is your 80 gigabyte hard drive full? Music and videos That sure is a great music where did you get it? Downloading of music from the web Have you given a friend a copy of your Microsoft Project software? Software Piracy Did you read the confidential company file that was accidentally attached to your email? Computer abuse Did you gain access to the network and invade other workers emails and files? Computer abuse You formatted your hard drive prior to leaving your company because you were angry about leaving. Destruction of property
  • 5. Information Technology Ethics Deal with proper use of technology devices, data, services, and software. Prior to Technology it may have been easier to know whether the activity was right or wrong Virtual World Judging behaviors is no longer straight forward Ethical or Unethical? A student downloads a sexually explicit picture from the Internet on a computer in the school library. Other students are able to see the picture A student finds the teacher’s password to the school’s information system and uses it to change his grades and vi the grades of other students. A student uses the copy and paste commands to place large parts of an electronic article into an assigned paper. She turns the paper in as her own work A student makes a copy of a software program borrowed from another student to use on his computer at home. A student downloads a graphic file from the web to place on his own webpage. However, he does provide a link to the author’s site. A student uses another student’s project website as a guideline. A student copies a previous published story in his own handwriting and submits it as his own work.
  • 6. Information Technology Ethics New ethical considerations may be required with technology capabilities Email spamming Does the fact that the financial burden of unsolicited ads etc. now falls on the recipient not the sender create new rules? Digital photography What obligations does a anyone have to present an undoctored photo, even if the message is not as good as the digitally enhanced photo? Pornography access What security measures need to be put in place by schools, parents, companies and libraries to keep individuals from seeing inappropriate materials? Intellectual property Do we need better/clearer definitions of property? Globalization of the organization What do we need to better understand cultures, language , and behaviors ?
  • 7. Information Technology Ethics Some users view their computing actions as less serious than their actions in the “real world” Examples: Stealing software from a store – no way! …. However, SW piracy costs businesses billions of dollars per year Most of us would not pick a lock to someone’s house However, guessing passwords to gain access to a website, information, or programs is a common Sometimes the technology is not well understood…romance and fear may accompany a new technologies. Movies, books, TV capitalize on this fear and romance and make unethical or illegal actions seem heroic, or necessary
  • 8. The Ten Commandments of Computer Ethics Computer Ethics Institute
  • 9. Challenges: Code of Ethics No Form of licensing for computer professionals Results in no real way to enforce ethical standards within the computing field There is movement within the industry to create a licensing process but there are many issues to be resolved What will be included on the exam? How often will an IT professional be required to renew the license? Developed by several organizations Adoption Implementation Monitoring Example: http://www.acm.org/constitution/code.html
  • 10. Challenges: Web Design Implementation of features Pop ups Blocking/filters Aliases and redirecting Cookies Privacy policies Security policies Spyware Use of other design features Javascript Graphics - pictures, buttons, logos, icons Content Design layout Accountability/responsibility Outdated material, inaccurate material
  • 11. Challenges: Commerce Fraud Taxation Free Trade Gambling Auctions Spamming Who were Canter and Siegel? Spamming cell phones? Term papers for sale Atlanta Journal Constitution aritcle
  • 12. Challenges: Workplace Accessibility Ergonomics Outsourcing Telecommuting Customer relationships – Vendor relationships Should IT professionals be in the ethics business or should other areas of the business handle these issues? Monitoring Should your employer have the right to monitor private email messages? What are the two most popular Web sites for American workers? Playboy and ESPN
  • 13. Challenges:Workplace 62% of employers monitor employees' eMail and Internet use. 68% cite legal liability as the primary reason to monitor. 87% of companies that monitor have a written eMail Policy, 83.1% an Internet Policy, 68% a Software Policy. 51% of employers have disciplined or terminated employees for violating ePolicy. 35% of organizations have eMail retention & deletion policies in place. 10% of companies have been ordered by courts to turn over employee eMail related to workplace lawsuits. 8.3% of organizations have battled sexual harassment and/or sexual discrimination claims stemming from employee e-mail and/or Internet use. Source: The 2001 Electronic Policies & Practices Survey from The American Management Association, US News & World Report, and The ePolicy Institute-Click Here for Survey Results .
  • 14. Music Downloads Risk of getting caught Studies have shown that a majority of the people who share music on the Internet are aware that their actions are illegal, said Michael McGuire, a analyst with the Gartner Group. ``But they also know that the chances of getting caught are pretty remote'' Why is “getting caught remote”? There are an estimated 60 million peer-to-peer network subscribers in the United States alone, with tens of millions more in other countries The RIAA is seeking out people who make their music files available for others to download. The networks have features that allow users to block others from downloading their files but allow them to continue to download files
  • 15. Challenges: Speech Net Etiquette Email privacy Email privacy policy “ Flaming” – insulting, argumentative or chastising replies to messages Free Speech Accountability and responsibility for web content Abortion sites Outdated information Accurate information Privacy and security policies Porn Professors pc – filled with porn, found by pc maintenance workers Visa – won’t give permission to be used on offensive or pornographic sites Hate MACHADO CASE Internet Filters Should filters be in schools or libraries, and /or should they be mandated by law? Filters can also be set up to filter out other subjects, would this be an ethical violation? Chain Letters
  • 16. Challenges: Computing Resource Abuse Computers in the Workplace and the Classroom Use or Abuse Internet Access Instant Messenger Laptop use in the classroom Email Legal document Can be modified Flaming Access Computer Usage policy Email policy
  • 17. Challenges: Computing Resource Abuse Computer Crime Viruses Hackers Theft “ These cyber swindles and dot-cons present new challenges to law enforcement” said John Ashcroft US Charges 135 With Net Crimes
  • 18. Challenges: Privacy Privacy issues are at the top of the list in regards to ethical use of information. Loss of control Misuse of information Risk to physical privacy Risk of identity theft (video) Unwanted intrusions into daily life USA Patriot Act (post 9/11) Efforts to detect and deter terrorist activity Datamining corporate data Loss of business and risk of lawsuits due customers being outraged at their loss of data privacy Cookies Privacy policies
  • 19. Challenges: Intellectual Property Electronic Copyright Licensing Interoperability Licensing Cyberlicenses Shrinkwrap Shareware Freeware MP3 RIAA court case against college students University Internet Usage policies Internet Downloads Files Graphics Text
  • 20. Challenges: Intellectual Property Patent, trade secrets, and copyright law Who owns the program Who owns the algorithm Software Piracy Why shouldn't I use pirated software? Who am I hurting by doing so? Piracy exists in everywhere. Loss of revenue hurts everyone. All software piracy is illegal and Software piracy is unethical . Various studies have found that the software industry loses approximately $12 billion every year . State Industry Study CD-RW
  • 21. Challenges: Other Decision making using Expert Systems Network Security Software accuracy and reliability who is ethically responsible? Therac-25 Accidents Killer Robots The Hughes Whistleblowing Case
  • 22. Conclusion: Some Ideas to Ponder Computer ethics today is now a global effort The gap among the rich and poor nations, rich and poor citizens exists. How can it be eliminated or reduced eithically and morally to provide information and services that will move them to into the world of cyberspace? Will the poor be cut off from job opportunities, education, entertainment, medical care, shopping, voting - because they cannot afford a connection to the global information network? Whose laws will apply in cyberspace when hundreds of countries are incorporated into the global network? What happened? Where did our knowing right from wrong go too? Are we missing an opportunity to introduce ethics at an early age in children by not integrating these thoughts and practices in video games? Should more controls and regulations be introduced into the system? Will they actually help to improve our moral and ethical behavior? Unethical behavior continues to permeate industry, what measures, policies, codes of conduct be changed to change this behavior?
  • 23. Works Cited: http://www.brook.edu/dybdocroot/its/cei/overview/Ten_Commanments_of_Computer_Ethics.htm http://www.computingcases.org/case_materials/case_materials.html http://www.epolicyinstitute.com/ http://legacy.eos.ncsu.edu/eos/info/computer_ethics/ http://www.spa.org/piracy/ http://www.nd.edu/~rbarger/cases.html http://ksuweb.kennesaw.edu/~kschwaig/present.ppt