You are on page 1of 3

May 4-8, 2020

Topic: Computer Ethics


Ethics is the field of study that is concerned
with questions of value, that is, judgments about what human
behavior is "good" or "bad". Ethical judgments are no
different in the area of computing from those in any other
area. Computers raise problems of privacy, ownership, theft,
LEARNING POINTS 1.
and power, to name but a few.
1. Why is ethics important?
Computer ethics can be grounded in one of four basic world- 2. Why do you have to study
views: Idealism, Realism, Pragmatism, or Existentialism.
computer ethics?
Idealists believe that reality is basically ideas and that
3. What are your understanding
ethics therefore involves conforming to ideals. Realists
believe that reality is basically nature and that ethics of:
therefore involves acting according to what is natural. a. Idealism
Pragmatists believe that reality is not fixed but is in b. Realism
process and that ethics therefore is practical (that is, c. Pragmatism
concerned with what will produce socially-desired results). d. existentialism
Existentialists believe reality is self-defined and that
ethics therefore is individual (that is, concerned only with
one's own conscience). Idealism and Realism can be considered
ABSOLUTIST worldviews because they are based on something
fixed (that is, ideas or nature, respectively). Pragmatism
and Existentialism can be considered RELATIVIST worldviews
because they are based or something relational (that is,
society or the individual, respectively).

Thus ethical judgments will vary, depending on the judge's world-
view. Some examples:

First consider theft. Suppose a university's computer is used
for sending an e-mail message to a friend or for conducting a full-
blown private business (billing, payroll, inventory,
etc.). The absolutist would say that both activities are
unethical (while recognising a difference in the amount of
wrong being done). A relativist might say that the latter
activities were wrong because they tied up too much memory and
slowed down the machine, but the e-mail message wasn't wrong
because it had no significant effect on operations.

Next consider privacy. An instructor uses her account to
acquire the cumulative grade point average of a student who is
in a class which she instructs. She obtained the password for
this restricted information from someone in the Records Office
who erroneously thought that she was the student's advisor.
The absolutist would probably say that the instructor acted
wrongly, since the only person who is entitled to this
information is the student and his or her advisor. The
relativist would probably ask why the instructor wanted the
information. If she replied that she wanted it to be sure
that her grading of the student was consistent with the
student's overall academic performance record, the relativist
might agree that such use was acceptable.

Finally, consider power. At a particular university, if a
professor wants a computer account, all she or he need do is
request one but a student must obtain faculty sponsorship in
order to receive an account. An absolutist (because of a
proclivity for hierarchical thinking) might not have a problem
with this divergence in procedure. A relativist, on the other
hand, might question what makes the two situations essentially
different (e.g. are faculty assumed to have more need for
computers than students? Are students more likely to cause
problems than faculty? Is this a hold-over from the days of
"in loco parentis"?).

Computer ethics deals with the procedures, values and practices that govern the process of consuming
computing technology and its related disciplines without damaging or violating the moral values and
beliefs of any individual, organization or entity.

Computer ethics is a concept in ethics that addresses the ethical issues and constraints that arise from
the use of computers, and how they can be mitigated or prevented.

Computer ethics primarily enforces the ethical implementation and use of computing resources. It
includes methods and procedures to avoid infringing copyrights, trademarks and the unauthorized
distribution of digital content. Computer ethics also entails the behavior and approach of a human
operator, workplace ethics and compliance with the ethical standards that surround computer use.

The core issues surrounding computer ethics are based on the scenarios arising from the use of the
Internet, such as Internet privacy, the publication of copyrighted content and user interaction with
websites, software and related services.

 
Computer ethics is defined as the analysis of the nature and social impact of computer technology and
the corresponding formulation and justification of policies for the ethical use of such technology. The
typical problem with computer ethics is the policy vacuum that arises from the new capabilities of the
technology. Several issues contribute to this vacuum, which can be understood by studying and
improving the conceptual vacuum that subsequently develops. Examination of two stages of the computer
revolution (the technological introduction stage and the permeation stage) reveal what steps may be
needed to take in preparation to formally integrate technology into society.
 
Professional Ethics Code of Conduct
 
This is an evaluation of the purpose and value of establishing ethical codes. Codes from several sources
are rated in terms of appropriate and useful content. The difficulty lies in motivating people to adhere to
standards for which no serious sanctions exist. The author offers a code of ethics developed jointly by the
IEEE and the ACM that provides solutions to previous shortcomings of prior codes.
 
Professional Code of Ethics
 
Professionals need to follow strict code of ethics for our society to function. Often professionals do not
know what there are. Professional societies like ACM, IEEE, provide guidelines for various professional
codes. We must adhere to such code and understand the importance of following it.
 
Technologies of Cooperation
 
People collectively are known to cooperate and help each other out. Technology can be developed and
expanded only by building upon one another. Networks can be created that can create bigger
infrastructure. By using technology to aid in social networks the value is unweighable.
 
TYPES OF COMPUTER ETHICS

Computer ethics are divided into three types :


* The ethics of using computers between the person and the same.
* The ethics of using computers between the person and the
other. 
* Ethics between the user and device. LEARNING POINTS 2.

1. Cite ethical examples of each


* Ethics of using computers between the person and the same type of computer ethics.
, we must adhere:
self-esteem and not exposing them to hazards for the user. Such
as: not wasting time when using the computer, and not look at the
usefulness or the taboo, and not see the's sins of others or their
privacy even if they are
available and accessible, and also no harm to the body and give it
a rest and focus on the back, the eyes in particular. So we must
plant these ethics among our students and trainees and staff in our
schools and our schools and
workplaces because no officer of such acts only person control for
himself.

* The ethics of using computers between the person and the


other : 
this type of ethics we can apply it to develop some systems that
protect people and users can also keep some laws to protect
devices also but the main focus of the application of these
regulations and is personal scruples.

One of the most important examples of this type:


1- respect for intellectual property 
2- maintaining privacy and other secrets and not published or find. 
3- not to victimize others for their colour, their race, their religion or
their social or prejudice the reputation or reprisal and victimization.

* Ethics between the user and hardware :


1- don't use a computer abuse especially public as schools,
universities and public libraries.
2- To ensure the safety of the device, its contents either cracking
or heavy load or cause damage to the hardware. 
3- Maintain compliance with laws designed to regulate the use of
the computer as maintaining user name and password and not
give it to others from unauthorized use.

MODULE REQUIREMENTS:
1. Answer the questions in the
Learning Points box.
2. Craft your own computer ethics.
Prepare at least three.
3. Give at least 5 unethical use of
computers.

You might also like