Professional Documents
Culture Documents
Submitted By:
Shivaji P. Mirashe
Working as a Manager,
Network & Network Security.
Reliance Communications.
New Mumbai (Maharashtra –India)
Email Id: - shivaji.mirashe@gmail.com
Study Centre:
Research Supervisor
Belong to
S.R.T.M.University
http://www.srtmun.ac.in/
Nanded (Maharashtra –India)
1
Grid Networking @ by Shivaji P. Mirashe
Table of Contents:-
1. Abstract 03
2. Introduction 03
3. What are ethics? 05
4. Professional ethics 06
5. Engineering ethics 07
6. IEEE - Code of Ethics 07
7. NSPE - Code of Ethics for Engineers 08
8. Computer ethics 08
9. Categories of computer ethics issues 09
10. Moral and ethical problems 09
11. Problems with Codes of Ethics 09
12. Computer Ethics Awareness and Educational Issues 10
13. Computing Ethics and Guidelines – Example 10
14. Computer Ethics - Case Studies Administrator Dilemma 10
15. Computer Ethics - Case Studies Software Licensing: Stuck in the
Middle 11
16. Computer ethics - Case studies 11
17. THE TEN COMMANDMENTS FOR COMPUTER ETHICS 11
18. Conclusion 12
19. About the Author 12
20. References 13
21. Acknowledgment 13
2
Grid Networking @ by Shivaji P. Mirashe
Paper Name: - Computing Ethics
1) Abstract:-
In this paper we address some of the fundamental aspects computer
ethics and its significance for the IT professional. What topics should
be addressed? How, where and by whom should computer ethics be
taught? The paper shows how consumers have become increasingly
concerned that their data will be sold without their knowledge,
leading to identity theft and junk mail. It is therefore important for
policy makers, leaders, teachers, computer professionals and all
social thinkers to get involved in the social and ethical impacts of this
communication technology.
Computer ethics is the analysis of nature and social impact of
computer technology and the corresponding formulation and
justification of policies for the ethical use of technology. Ethics is a
dynamic and complex field of study, which cover both social as well
as personal policies for ethical use of technology. The commonly
faced problem while dealing with computer ethics is the policy
vacuum which means how computer technology should be used.
2) Introductions;-
This paper presents a computer scientist's perspective on ethical
issues that may arise in future computing environments. We
believe that ethical issues should be given thought very early,
even before building a prototype or developing a new computing
paradigm. Following software engineering discipline, high-level
requirements such as ethical concerns raised by features of the
system should be considered in the very first phases of systems
development. If ethics are taken into account as an afterthought,
the new system or paradigm may break a number of ethical
principles and may be very difficult and costly to modify. Ethical
concerns should help shape tomorrow's computing environments
Ethics Defined:-
3
Grid Networking @ by Shivaji P. Mirashe
• Ethics (used with a sing. verb): The study of the general nature
of morals and of the specific moral choices to be made by a
person; moral philosophy.
• Ethics (used with a sing. or pl. verb): The rules or standards
governing the conduct of a person or the members of a
profession: medical ethics.
Or Ethics refers to standards of conduct, standards that indicate how
one should behave based on moral duties and virtues, which
themselves are derived from principles of right and wrong.
As a practical matter, ethics is about how we meet the challenge of
doing the right thing when that will cost more than we want to pay.
4
Grid Networking @ by Shivaji P. Mirashe
Should U.S. sell computers and software to countries that support
terrorism?
Medical ethics defines patient – provider relationships.
Legal ethics defines client – attorney relationships.
Every technical decision has an ethical dimension.
A computer whiz-kid wants to help his mother get expensive
medicines for a life-threatening condition. Wants to use his technical
prowess to defraud a pharmacy. Does the end justify the means?
Craig Neidorf, Editor of Phrack Newsletter was taken to court by the
government and Bell South for publishing a confidential document
on the functioning of E911. Government dropped the case once it
was pointed out that many of the information was available in public
domain.
Data protection could use:
“trade secret” classification (indefinite protection)
“patent” classification (17 year protection)
Should these classifications be accepted as is or challenged?
E.g., Visicalc was not able to patent its spreadsheet technology.
Result is the development of Lotus 1-2-3 and Excel with incremental
improvements
5
Grid Networking @ by Shivaji P. Mirashe
iii) Impossible for all people to share same applied ethics in all
details
Two Factors That Determine How You Decide Ethical Issues:-
1) Your basic ethical structure, which you developed as you grew
up.
2) The set of practical circumstances involved in the decision that
you’re trying to make — that is, all the shades of gray in what
are rarely black or white decisions.
4) Professional Ethics:
5) Engineering Ethics:-
Engineering is an important and learned profession
Engineers are expected to exhibit the highest standards of
honesty and integrity
Engineering has a direct and vital impact on the quality of
life for all people
Services provided by engineers require:
i) Honesty
ii) Impartiality
iii) Fairness
iv) Equity
v) Must be dedicated to the protection of the public
health, safety, and welfare
7
Grid Networking @ by Shivaji P. Mirashe
In recognition of importance of our technology in affecting the
quality of life we commit ourselves to conduct of the highest
ethical and professional manner and agree to:
i) accept responsibility in making decisions consistent with
safety, health, and welfare of the public
ii) avoid real or perceived conflicts of interest
iii) be honest and realistic in stating claims or estimates
iv) reject bribery in all forms
v) improve understanding of technology, its application, and
potential consequences
vi) smaintain and improve our technical competence and
undertake technological tasks for others only if qualified
vii) seek, accept, and offer honest criticism of technical work
viii) acknowledge and correct errors
ix) credit properly the contributions of others
x) treat all persons fairly regardless of race, religion, gender,
disability, age, or national origin
xi) avoid injuring others, their property, reputation, or
employment by false or malicious action
xii) assist colleagues and co-workers in their professional
development and to support them in following this code of
ethics
7) NSPE - Code of Ethics for Engineers:-
Engineers, in the fulfillment of their professional duties, shall:
Hold paramount the safety, health, and welfare of the public
Perform services only in areas of their competence
Issue public statements only in an objective and truthful
manner
Act for each employer or client as faithful agents or trustees
Avoid deceptive acts
Conduct themselves honorably, responsibly, ethically, and
lawfully so as to enhance the honor, reputation, and usefulness
of the profession
8) Computer Ethics:=
Computer ethics defined as the application of classical ethical
principles to the use of computer technology
8
Grid Networking @ by Shivaji P. Mirashe
Ethical problems related to computers are not unique but they
tend to occur on a much larger scale and scope
i) Scope: communications networks bring the world
together
ii) Anonymity: beneficial but creates problems of integrity
iii) Reproducibility
Aspects of computer ethics:
i) Analysis of the nature of problems related to the social
impact of computers
ii) Formulation and justification of policies needed to manage
computer technology
10
Grid Networking @ by Shivaji P. Mirashe
14) Computer Ethics - Case Studies Administrator
Dilemma:-
The problem here is that every file on the system is
accessible by the administrator and they have no tracks
when they change a file
If administrator is always believed, he is given the ability to
take advantage of anybody at any time
If user is always believed, he is given the ability to get away
with anything he does
Anything on the system can be faked without evidence
11
Grid Networking @ by Shivaji P. Mirashe
Thou shalt not use a computer to steal.
Thou shalt not use a computer to bear false witness.
Thou shalt not use or copy software for which you have not
paid.
Thou shalt not use other people's computer resources
without authorization.
Thou shalt not appropriate other people's intellectual
output.
Thou shalt think about the social consequences of the
program you write.
Thou shalt use a computer in ways that show consideration
and respect.
18) Conclusion:-
Must understand cultural, social, legal and ethical issues
related to computing
Expect to face variety of ethically difficult situations
Hold to highest possible ethical standards
Use your internal sense of ethics
Making the wrong ethical choice begins with focusing on
short-term self-interest
Ethical behavior is a way of life, best learned through
experience
Living ethically requires strong and sincere motivation
12
Grid Networking @ by Shivaji P. Mirashe
Firewall Penetration Testing Paper ID M575 – The 2nd International
Conference on Computer modeling and simulation (iccms 2010)-
http://iccms.org/
Peer-to-Peer Network Protocols ID H271 - The 2010 International
Conference on Signal Acquisition and Processing (ICSAP 2010) -
http://www.icsap.org/
Why We Need the Intrusion Detection Prevention Systems (IDPS)
In IT Company – ID E447. - 2nd International Conference on
Computer Engineering and Applications (ICCEA 2010) -
http://www.iccea.org/
E-marketing, Unsolicited Commercial E-mail, and Legal Solutions –
Emerging Trends in Computer Science, Communication &
Information Technology (CSCIT2010) – Paper ID No -
CSCITPR425 = www.cscit2010.com
Saving the World Unsolicited Email Flow - Emerging Trends in
Computer Science and Information Technology-2010
(For further information visit
http://www.kkwagh.org/ETCSIT/ETCSIT10.html
As a Junior Member of the IEEE and the IEEE Computer Society &
International Association of Computer Science and Information
Technology
IACSIT( Member NO.=80337345) .
Quality of service with Bandwidth - Paper Id – 3201031
https://sites.google.com/site/journalofcomputing/volume-2-issue-3-
march-2010
Cloud Computing - Paper Id – 3201032
https://sites.google.com/site/journalofcomputing/volume-2-issue-3-
march-2010
Green Computing Beyond the Data Center - Paper Id – D0002
http://www.icimt.org/
As a Senior Member of IACSIT of the IEEE and the IEEE Computer
Society & International Association of Computer Science and
Information Technology IACSIT ( Member NO.=80339130)
http://www.iacsit.org/member.htm.
My web site : - http://shivajimirashe.webs.com/
20) References:-
[1] Gramm – Leach – Bliley Act of 1999
http://www.ftc.gov/privacy/glbact/
[2] Management of Information Security by M.E.Whitman and
H.J.Mattord, Course Technology, 2004
13
Grid Networking @ by Shivaji P. Mirashe
[3] “Ten Commandments of Computer Ethics”.
(http://courses.cs.vt.edu/~cs3604/lib/WorldCodes/10.Commandm
ents.html)
[4] Information Security Illuminated, Michael G. Solomon, Mike
Chapple, Jones and Bartlett Publishers, Inc.
[5] Mastering Network Security, Chris Brenron, Cameron Hunt,
Sybex Inc.
21) ACKNOWLEDGMENT:-
The authors wish to thank Mrs. Suvarna D. Alandkar (Mirashe)
working at Patni, Professor Shivaji Balaji Chavan (Yeshwant
Mahavidyalaya Nanded), Mr. Satish Khadap (infovisionindia
Consulting Services at New Mumbai), & Mr.Satish D. Alandkar
(BSNL- at Pune). This work was supported in part by a grant from
support to write this paper.
14
Grid Networking @ by Shivaji P. Mirashe