You are on page 1of 12

UNIVERSITY OF CAGAYAN VALLEY

Tuguegarao City

COLLEGE FRESHMEN PROGRAM (CFP)


First Semester, School Year 2020-2021

Course Code : GEEL 1


Course Title : LIVING IN THE IT ERA

FINAL PERIODIC COVERAGE

MODULE No. 11
TITLE: COMPUTER ETHICS
INTRODUCTION Computer ethics deals with the procedures, values and
practices that govern the process of consuming computing
technology and its related disciplines without damaging or
violating the moral values and beliefs of any individual,
organization, or entity.

Computer ethics is a concept in ethics that addresses the


ethical issues and constraints that arise from the use of
computers, and how they can be mitigated or prevented.

Computer ethics primarily enforces the ethical


implementation and use of computing resources. It includes
methods and procedures to avoid infringing copyrights,
trademarks and the unauthorized distribution of digital
content. Computer ethics also entails the behavior and
approach of a human operator, workplace ethics and compliance
with the ethical standards that surround computer use.

The core issues surrounding computer ethics are based on the


scenarios arising from the use of the Internet, such as
Internet privacy, the publication of copyrighted content and
user interaction with websites, software and related
services.
LEARNING ➢ Explain the basic concepts of ethics.
OUTCOMES ➢ Describe the common legal issues related to privacy and
intellectual properties rights.
➢ Discuss ethical issues associated with the use of social
networks and social media.
LEARNING 1. Discuss ethical issues associated with computers and the
OBJECTIVES cyberworld.
2. Discuss the emerging issues related to ethics in
cyberspace.
UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City

COLLEGE FRESHMEN PROGRAM (CFP)


First Semester, School Year 2020-2021

Discussion/Situational analysis/Content Etc.:

What are Ethics?

Ethics are a structure of standards and practices that influence how people
lead their lives. It is not strictly implemented to follow these ethics, but
it is basically for the benefit of everyone that we do.

Ethics are unlike laws that legally mandate what is right or wrong. Ethics
illustrate society’s views about what is right and what is wrong.

Computer Ethics

Computer ethics are a set of moral standards that govern the use of computers.
It is society’s views about the use of computers, both hardware and software.
Privacy concerns, intellectual property rights and effects on the society are
some of the common issues of computer ethics.

Privacy Concerns

➢ Hacking – is unlawful intrusion into a computer or a network. A hacker


can intrude through the security levels of a computer system or network
and can acquire unauthorized access to other computers.
➢ Malware – means malicious software which is created to impair a computer
system. Common malware are viruses, spyware, worms and trojan horses. A
virus can delete files from a hard drive while a spyware can collect data
from a computer.
➢ Data Protection – also known as information privacy or data privacy is
the process of safeguarding data which intends to influence a balance
between individual privacy rights while still authorizing data to be used
for business purposes.
➢ Anonymity – is a way of keeping a user’s identity masked through various
applications.

Intellectual Property Rights

➢ Copyright – is a form of intellectual property that gives proprietary


publication, distribution and usage rights for the author. This means
that whatever idea the author created cannot be employed or disseminated
by anyone else without the permission of the author.
➢ Plagiarism – is an act of copying and publishing another person’s work
without proper citation. It’s like stealing someone else’s work and
releasing it as your own work.
➢ Cracking – is a way of breaking into a system by getting past the security
features of the system. It’s a way of skipping the registration and
authentication steps when installing a software.
UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City

COLLEGE FRESHMEN PROGRAM (CFP)


First Semester, School Year 2020-2021

➢ Software License – allows the use of digital material by following the


license agreement. Ownership remains with the original copyright owner;
users are just granted licenses to use the material based on the
agreement.

Effects on Society

Jobs

Some jobs have been abolished while some jobs have become simpler as computers
have taken over companies and businesses. Things can now be done in just one
click whereas before it takes multiple steps to perform a task. This change
may be considered unethical as it limits the skills of the employees.

➢ There are also ethical concerns on health and safety of employees getting
sick from constant sitting, staring at computer screens and typing on
the keyboard or clicking on the mouse.

Environmental Impact

Environment has been affected by computers and the internet since so much time
spent using computers increases energy usage which in turn increases the
emission of greenhouse gases.

➢ There are ways where we can save energy like limiting computer time and
turning off the computer or putting on sleep mode when not in use. Buying
energy efficient computers with Energy Star label can also help save the
environment.

Social Impact

Computers and the internet help people stay in touch with family and friends.
Social media has been very popular nowadays.

➢ Computer gaming influenced society both positively and negatively.


Positive effects are improved hand-eye coordination, stress relief and
improved strategic thinking. Negative effects are addiction of gamers,
isolation from the real world and exposure to violence.
➢ Computer technology helps the government in improving services to its
citizens. Advanced database can hold huge data being collected and
analyzed by the government.
➢ Computer technology aids businesses by automating processes, reports and
analysis.
UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City

COLLEGE FRESHMEN PROGRAM (CFP)


First Semester, School Year 2020-2021

Ten Commandments of Computer Ethics

Computer ethics relates to the ethical values that should guide the computer
professionals in their conduct. The Ten Commandments of Computer Ethics
establish guiding principles for all of us to follow.

Every sphere of life is guided by a set of rules of what is right and what is
wrong. The difference between the 'right' and the 'wrong' has to be demarcated
in any walk of life. With the development of technology and the increase in
its use, society had to confront ethical issues relating to the harnessing of
technology. Every science of life needs to base itself on ethics and so does
computer technology! The Computer Ethics Institute came up with The Ten
Commandments of Computer Ethics, in 1992. The intent behind the creation of
these Ten Commandments was to establish a set of standards to instruct people
to use computers ethically. Following is a list of the ten commandments of
Computer ethics along with their brief explanation.

1. Thou shalt not use a computer to harm other people.

This commandment makes clear that it is unethical to use a computer to harm


another user. It includes harming or corrupting some other user's data or
files. The commandment states that it is wrong to steal someone's personal
information by means of a computer. It is unethical to manipulate or destroy
the files of other people through the use of a computer. It iterates the fact
that writing a program intended to bring perform ethically wrong actions, is
in itself unethical.

2. Thou shalt not interfere with other people's computer work.

Viruses are small programs built with intent to harm or disrupt the useful
computer programs. Some viruses aim at overloading the computer memory by an
excessive use of computer resources. These viruses tend to fail a computer in
executing the desired tasks. They lead to the dysfunction of a computer. The
development or the spread of such malicious software is unethical.

3. Thou shalt not snoop around in other people's files.

We know that it is wrong to read another person's letters. On similar lines,


it is unethical to read another person's email messages. Obtaining another
person's private files is as wrong as breaking into someone's room. Snooping
around in another person's files or reading someone else's personal messages
is the invasion of his/her privacy. In order to protect the information from
being attacked, it is ethical to apply encryption schemes to it.
UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City

COLLEGE FRESHMEN PROGRAM (CFP)


First Semester, School Year 2020-2021

4. Thou shalt not use a computer to steal.

The stealing of sensitive information such as the personal information of the


employees from an employee database or breaking into bank accounts for the
retrieval of confidential information is nothing less than robbery. An illegal
electronic transfer of funds is one type of a fraud.

5. Thou shalt not use a computer to bear false witness.

Computers are the easiest sources of spreading information to the masses by


means of Internet. This also means that false news or rumors can spread speedily
and easily through the Internet. Being involved in the circulation of incorrect
information is unethical. Spreading the wrong information by means of Internet
is like taking an undue advantage of technology.

6. Thou shalt not use or copy software for which you have not paid.

Like any other artists or literary work, software is also subject to copyrights.
Software is the outcome of a programmer's intellect and it is important to
respect talent and give due regard to his/her rights. Obtaining illegal copies
of copyrighted software is unethical.

7. Thou shalt not use other people's computer resources without authorization.

Multi-user systems are supported by user specific ids and passwords. Breaking
into some other user's password, thus indulging into his private space on the
network is unethical. It is not ethical to hack passwords for gaining an
unauthorized access to a password given computer system.

8. Thou shalt not appropriate other people's intellectual output.

Programs developed by a programmer in an organization are his/her property.


Copying them and propagating them in one's own name is unethical. A creative
work, a program or a design that a particular employee comes up with, is his/her
ownership. It is the output of someone's intellect and efforts. Copying it with
selfish intentions is indeed not ethical.

9. Thou shalt think about the social consequences of the program you write.

Looking at the social consequences that a program can have, describes a broader
perspective of looking at technology. A computer program goes a long way to
reach homes of the masses. In case a person is working for animation films or
he/she is designing a video game, it is the programmer’s responsibility to pay
heeds to the effects of his/her creation. In case of software, it is important
for the programmer to realize the prospective use of the software. Writing a
virus, when one knows that it is going to serve as a malware, is indeed
UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City

COLLEGE FRESHMEN PROGRAM (CFP)


First Semester, School Year 2020-2021

unethical. If a particular content is intended for children or when children


are prone to gain access to the content, it is necessary for the creator of
such content to be careful about the social consequences it is bound to have.

10. Thou shalt use a computer in ways that show consideration and respect.

In the real world, we face situation wherein we need to be courteous to our


fellow mates. Many times, we need to cooperate with them and give each of the
fellow individuals the consideration due. On similar lines, while interacting
through a computer, a person needs to be nice to the ones he/she interacts
with.

Remember!

The Ten Commandments of Computer Ethics are the means to build a set of
regulations to guide the individual users to base computer related operations
on strong ethical values. The commandments are a way to make people understand
the ethics involved in the use of technology.

Netiquette

Netiquette" is network etiquette, the do's and don'ts of online communication.


Netiquette covers both common courtesies online and the informal "rules of the
road" of cyberspace. This page provides links to both summary and detail
information about Netiquette for your browsing pleasure.

Core Rules of Netiquette

What is Netiquette? Simply stated, it's network etiquette -- that is, the
etiquette of cyberspace. And "etiquette" means "the forms required by good
breeding or prescribed by authority to be required in social or official life."

Rule 1: Remember the human

The golden rule your parents and your kindergarten teacher taught you was
pretty simple: Do unto others as you'd have others do unto you. Imagine how
you'd feel if you were in the other person's shoes. Stand up for yourself, but
try not to hurt people's feelings.

In cyberspace, we state this in an even more basic manner: Remember the human.

When you communicate electronically, all you see is a computer screen. You
don't have the opportunity to use facial expressions, gestures, and tone of
voice to communicate your meaning; words -- lonely written words -- are all
you've got. And that goes for your correspondent as well.
UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City

COLLEGE FRESHMEN PROGRAM (CFP)


First Semester, School Year 2020-2021

Rule 2: Adhere to the same standards of behavior online that you follow in real
life

In real life, most people are fairly law-abiding, either by disposition or


because we're afraid of getting caught. In cyberspace, the chances of getting
caught sometimes seem slim. And, perhaps because people sometimes forget that
there's a human being on the other side of the computer, some people think that
a lower standard of ethics or personal behavior is acceptable in cyberspace.

The confusion may be understandable, but these people are mistaken. Standards
of behavior may be different in some areas of cyberspace, but they are not
lower than in real life.

Be ethical

Don't believe anyone who says, "The only ethics out there are what you can get
away with." This is a book about manners, not about ethics. But if you encounter
an ethical dilemma in cyberspace, consult the code you follow in real life.
Chances are good you'll find the answer.

Rule 3: Know where you are in cyberspace

Netiquette varies from domain to domain

What's perfectly acceptable in one area may be dreadfully rude in another. For
example, in most TV discussion groups, passing on idle gossip is perfectly
permissible. But throwing around unsubstantiated rumors in a journalists'
mailing list will make you very unpopular there.

And because Netiquette is different in different places, it's important to know


where you are. Thus, the next corollary:

Lurk before you leap

When you enter a domain of cyberspace that's new to you, take a look around.
Spend a while listening to the chat or reading the archives. Get a sense of
how the people who are already their act. Then go ahead and participate.

Rule 4: Respect other people's time and bandwidth

It's a formula that people today seem to have less time than ever before, even
though (or perhaps because) we sleep less and have more labor-saving devices
than our grandparents did. When you send email or post to a discussion group,
you're taking up other people's time (or hoping to). It's your responsibility
to ensure that the time they spend reading your posting isn't wasted.
UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City

COLLEGE FRESHMEN PROGRAM (CFP)


First Semester, School Year 2020-2021

The word "bandwidth" is sometimes used synonymously with time, but it's really
a different thing. Bandwidth is the information-carrying capacity of the wires
and channels that connect everyone in cyberspace. There's a limit to the amount
of data that any piece of wiring can carry at any given moment -- even a state-
of-the-art fiber-optic cable. The word "bandwidth" is also sometimes used to
refer to the storage capacity of a host system. When you accidentally post the
same note to the same newsgroup five times, you are wasting both time (of the
people who check all five copies of the posting) and bandwidth (by sending
repetitive information over the wires and requiring it to be stored somewhere).

You are not the center of cyberspace

Presumably, this reminder will be superfluous to most readers. But I include


it anyway, because when you're working hard on a project and deeply involved
in it, it's easy to forget that other people have concerns other than yours.
So, don't expect instant responses to all your questions, and don't assume that
all readers will agree with -- or care about -- your passionate arguments.

Rule 5: Make yourself look good online

Take advantage of your secrecy

I don't want to give the impression that the net is a cold, cruel place full
of people who just can't wait to insult each other. As in the world at large,
most people who communicate online just want to be liked. Networks --
particularly discussion groups -- let you reach out to people you'd otherwise
never meet. And none of them can see you. You won't be judged by the color of
your skin, eyes, or hair, your weight, your age, or your clothing.

You will, however, be judged by the quality of your writing. For most people
who choose to communicate online, this is an advantage; if they didn't enjoy
using the written word, they wouldn't be there. So spelling and grammar do
count.

Rule 6: Share expert knowledge

Finally, after all that negativity, some positive advice.

The strength of cyberspace is in its numbers. The reason asking questions


online works is that a lot of knowledgeable people are reading the questions.
And if even a few of them offer intelligent answers, the sum total of world
knowledge increases. The Internet itself was founded and grew because
scientists wanted to share information. Gradually, the rest of us got in on
the act.
UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City

COLLEGE FRESHMEN PROGRAM (CFP)


First Semester, School Year 2020-2021

Rule 7: Help keep flame wars under control

"Flaming" is what people do when they express a strongly held opinion without
holding back any emotion. It's the kind of message that makes people respond,
"Oh come on, tell us how you really feel." Tact is not its objective.

Does Netiquette forbid flaming? Not at all. Flaming is a long-standing network


tradition (and Netiquette never messes with tradition). Flames can be lots of
fun, both to write and to read. And the recipients of flames sometimes deserve
the heat.

Rule 8: Respect other people's privacy

Of course, you'd never dream of going through your colleagues' desk drawers.
So naturally you wouldn't read their email either.

Unfortunately, a lot of people would. This topic actually rates a separate


section. For now, here's a cautionary tale. I call it

The case of the snoopy foreign correspondent

In 1993, a highly regarded foreign correspondent in the Moscow bureau of the


Los Angeles Times was caught reading his coworkers' email. His colleagues
became suspicious when system records showed that someone had logged in to
check their email at times when they knew they hadn't been near the computer.
So, they set up a sting operation. They planted false information in messages
from another one of the paper's foreign bureaus. The reporter read the notes
and later asked colleagues about the false information. Bingo! As a disciplinary
measure, he was immediately reassigned to another position at the paper's Los
Angeles bureau.

The moral: Failing to respect other people's privacy is not just bad Netiquette.
It could also cost you your job.

Rule 9: Don't abuse your power

Some people in cyberspace have more power than others. There are wizards in
MUDs (multi-user dungeons), experts in every office, and system administrators
in every system.

Knowing more than others, or having more power than they do, does not give you
the right to take advantage of them. For example, system administrators should
never read private email.
UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City

COLLEGE FRESHMEN PROGRAM (CFP)


First Semester, School Year 2020-2021

Rule 10: Be forgiving of other people's mistakes

Everyone was a network newbie once. And not everyone has had the benefit of
reading this book. So, when someone makes a mistake -- whether it's a spelling
error or a spelling flame, a stupid question or an unnecessarily long answer -
- be kind about it. If it's a minor error, you may not need to say anything.
Even if you feel strongly about it, think twice before reacting. Having good
manners, yourself doesn't give you license to correct everyone else.

If you do decide to inform someone of a mistake, point it out politely and


preferably by private email rather than in public. Give people the benefit of
the doubt; assume they just don't know any better. And never be arrogant or
self-righteous about it. Just as it's a law of nature that spelling flames
always contain spelling errors, notes pointing out Netiquette violations are
often examples of poor Netiquette.

Rules of Cyber Ethics

Cyber ethics refers to the code of responsible behavior on the Internet. Just
as we are taught to act responsibly in everyday life, with lessons such as
"Don't take what doesn't belong to you," and "Do not harm others," -- we must
act responsibly in the cyber world as well. The basic rule is do not do
something in cyber space that you would consider wrong or illegal in everyday
life.

When determining responsible behaviors, consider the following:

➢ Do not use rude or offensive language.


➢ Don't be a bully on the Internet.
➢ Do not call people names, lie about them, send embarrassing pictures of
them, or do anything else to try to hurt them.
➢ Do not copy information from the Internet and claim it as yours. That is
called plagiarism.
➢ Adhere to copyright restrictions when downloading material including
software, games, movies, or music from the Internet.
➢ Do not break into someone else's computer.
➢ Do not use someone else's password.
➢ Do not attempt to infect or in any way try to make someone else's computer
unusable.

Awareness in using Social Media

Privacy & Social Media

Privacy does not exist on social media sites. Yes, there are privacy options
and controls, but too much can go wrong and your sensitive information can end
UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City

COLLEGE FRESHMEN PROGRAM (CFP)


First Semester, School Year 2020-2021

up being exposed. Things such as your account being hacked, your friend's
accounts being hacked, privacy controls changing, getting the privacy controls
wrong, or people who you thought were your friends are no longer your friends.
Long story short, if you don't want mom or your boss reading it--don't post
it. This means being careful and watching what your friends post about you,
including pictures. If nothing else, remember that employers now include sites
like Facebook and Twitter as part of any standard background check.

Scams & Social Media

Social media websites are a breeding ground for scams. If one of your friend's
posts seems odd or suspicious, it may be an attack. For example, your friend
posts that they have been mugged while on vacation in London and need you to
wire them money. Or perhaps they are posting links about great ways to get
rich, or some shocking incident you must see. Many of these scams or malicious
links are the very same attacks you have been receiving in e-mail for years,
but now bad guys are replicating them in social media. If you see a friend
posting very odd things, call or text them to verify that they really posted
the information.

Work & Social Media

Do not post anything sensitive about work. Be sure you understand your
organization's policies about what you can and cannot post about your job.

What Not to Share

Anything you wouldn’t be comfortable having your family see:

➢ Inappropriate photos
➢ Offensive comments and language
➢ Personal Information

10 Things NOT to do on Social Networking Sites

1. Post your full name


2. Post your date of birth
3. Post contact information
4. Post pictures you don't want everyone to see
5. Assume communication here is private
6. Post information about your school or work
7. Talk about places and times of where you're going to be
8. Post information about your new purchases
9. Add friends you don't really know
10. Do enable privacy on your accounts
UNIVERSITY OF CAGAYAN VALLEY
Tuguegarao City

COLLEGE FRESHMEN PROGRAM (CFP)


First Semester, School Year 2020-2021

Password Selection

➢ Complex Passwords
✓ Include capital and lowercase letters
✓ Include numbers
✓ Include special characters
➢ Change passwords regularly
➢ Don't share passwords with ANYONE
➢ Use different passwords for different accounts

Reference/s:
https://teachcomputerscience.com/computer-ethics/
https://sites.google.com/site/pnusicte18/10-commandments-in-computer-ethics
https://sites.auburn.edu/admin/oit/CyberSecurityCenter/Lists/Posts/Post.aspx?
ID=11
http://www.albion.com/netiquette/corerules.html
https://www.techopedia.com/definition/5499/computer-ethics

Prepared by:

IT Instructors

You might also like