Professional Documents
Culture Documents
net/publication/316618956
CITATIONS READS
0 10,135
5 authors, including:
12 PUBLICATIONS 36 CITATIONS
Manav Rachna University, Faridabad, Haryana, India
22 PUBLICATIONS 37 CITATIONS
SEE PROFILE
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Shree Harsh Atrey on 16 December 2019.
Abstract- Computer technology has proven itself a double- Advancements in computer technology were made
edged gift, alternately improving and threatening our lives under the assumption that efficiency was the main concern,
and environment. Advancements in computer technology not moral values. The time has come to integrate an ethical
over the past two decades have created ethical dilemmas, dimension into the concept of managing technology and the
some similar to other professions and some unique to the human relationships that accompany technological
computer field. advancements. [27]
In the past years alone society encountered computer
viruses, interruptions of power, and invasions of privacy, 2. Computing Ethics
cyber-pornography, phishing, and many thefts. This paper
discusses basic instructional issues and provides Computing Ethics is a branch of practical philosophy
elementary approaches to the professionals who demand which deals with how computing professionals should
both technical knowledge and an understanding of ethical make decisions regarding professional and social conduct.
principles and skills. The term "computing ethics" was first coined by Walter
Maner in the mid-1970s, but only since the 1990s has it
Finally, the paper comes out with a valuable started being integrated into professional development
framework for the study of ethics and social principles and programs in academic settings. [24]
skills in a summarized form. Ethics is the study of what it means to “do the right thing”.
[1]
Keywords: - Computing Ethics, Computer abuse, Ethical
principles and skills, Cyber laws The ethical actions of a person can be described in
general terms as those actions which fall within the range of
those activities that would be regarded as “good”. It relates
1. Introduction thus to the question of what is good and bad in terms of
human actions. The purpose of ethics is to help us behave
Basic ethical values are learned in the formative years honorably and attain those basic goods that make us more
of childhood in the home, temple and school. To properly fully human.
apply the notion of ethics to technology, one should first
recognize that technology is not value-free, but weighted
down with values. “Any technological decision is a value- 3. Need of Computing Ethics
based decision that not only reflects a particular vision of
Computing ethics education now begins in elementary
society but also gives concrete form to it.
school and is not longer a restricted technical specialty
Computers can alter or create relationships between learned only by those who are going to design or program
people and organizations, even where there may have been computers [26]. Because of the widespread prevalence of
no prior connections. Data communications can take place computers in society, a core of ethical precepts relating to
without any personal contact and at such high speed that the computer technology should be communicated not only to
individual may not have time to consider the decisions of a computer professionals, but to the general public through
particular transmission. [32]. all levels of education. The issue should be viewed from the
perspective of society as a whole as well as from the
perspective of computer professionals.
New ethical dilemmas with competing rights and values
have arisen due to the advent of high-speed, worldwide Main categories in which ethical and social concerns arise
transmission, low-cost, mass storage, and multiple-copy are:-[1]
dissemination capabilities. The understanding of Computer crime and computer security,
proprietary rights, residual rights, plagiarism, piracy, Software theft and intellectual property rights,
privacy, and freedom of expression should be examined Computer hacking and the creation of viruses,
and perhaps redefined. Computer and information system failure,
Invasion of privacy,
Social implications of artificial intelligence and expert 4.4 Honour property rights including
systems, and copyrights and patent.
Workplace computerization. Violation of copyrights, patents, trade secrets and the
In accepting the value-laden nature of technology, one terms of license agreements are prohibited by law in most
should recognize the need to teach a methodology of circumstances. Copies of software should be made only
explicit ethical analysis in all decision-making related with proper authorization. Unauthorized duplication of
technology. The challenge to computer educators is to materials must not be condoned.
develop strategies that will raise the awareness of students
4.5 Give proper credit for intellectual property.
regarding ethical and moral issues related to computer
Computing professionals are obligated to protect the
technology at the same time that they are developing their
integrity of intellectual property. Specifically, one must not
technical expertise.
take credit for other's ideas or work, even in cases where
the work has not been explicitly protected by copyright,
patent, etc.
4. Impact of Computing Ethics
4.6 Respect the privacy of others.
The role of software engineers is to develop software
Computing and communication technology enables
systems, and have significant opportunities to do well or
the collection and exchange of personal information on a
cause harm, to enable others to do well or cause harm, or
scale unprecedented in the history of civilization. Thus
to influence others to do well or cause harm. The impact of
there is increased potential for violating the privacy of
computing ethics on software developers will ensure that
individuals and groups. It is the responsibility of
their efforts will be used for good, ethical development and
professionals to maintain the privacy and integrity of data
for beneficial and respected profession. [27]
describing individuals.
Ethics consist of code of conducts, which helps to
This includes taking precautions to ensure the
differentiate between good or bad. Similarly computing
accuracy of data, as well as protecting it from unauthorized
ethics has seven principles related to the behavior and
access or accidental disclosure to inappropriate individuals.
decisions made for the professional software engineers as
Furthermore, procedures must be established to allow
well as trainees and students of the profession. The
individuals to review their records and correct inaccuracies.
principles identify the ethically responsible relationships in
which individuals, groups, and organizations participate. 4.7 Honour confidentiality.
The principle of honesty extends to issues of
4.1 Contribute to society and human well- confidentiality of information whenever one has made an
being. explicit promise to honor confidentiality or, implicitly,
This principle concerning the quality of life of all when private information not directly related to the
people affirms an obligation to protect fundamental human performance of one's duties becomes available.
rights and to respect the diversity of all cultures. An
essential aim of computing professionals is to minimize The ethical concern is to respect all obligations of
negative consequences of computing systems, including confidentiality to employers, clients, and users unless
threats to health and safety. discharged from such obligations by requirements of the
law or other principles of this Code. [9]
4.2 Avoid harm to others.
"Harm" means injury or negative consequences, such
as undesirable loss of information, loss of property, 5. Heuristics for Ethical Analysis
property damage, or unwanted environmental impacts. This Technically, an algorithm is an effective procedure,
principle prohibits use of computing technology in ways which means that it will unfailingly produce the intended
that result in harm to any of the following: users, the result in a finite number of steps if it receives sufficient
general public, employees, and employers. valid input. Algorithms can be contrasted with heuristics,
which are stepwise procedures that will tend to produce the
4.3 Be honest and trustworthy. intended result when they get the right input [22].
Honesty is an essential component of trust. Without
trust an organization cannot function effectively. The An algorithm, by contrast, would require an
honest computing professional will not make deliberately examination of all environments that the procedures
false or deceptive claims about a system or system design, proposed for guiding ethical analysis can be valuable
but will instead provide full disclosure of all pertinent heuristically.
system limitations and problems.
Within computing ethics, heuristics have been of early crimes have virtually no boundaries and may affect any
and continuous interest. Although human beings make country across the globe.
moral judgments from a very young age, heuristics may be
needed Thus, there is a need for awareness and enactment of
necessary legislation in all countries for the prevention of
to take this process to a higher level computer related crime [12]. There is a desperate need for the
to guard it against omissions emergence of a well-defined framework of Cyber Laws,
to make it more teachable, or which should be able to do the following:
to ensure that an effective process, once found, can be 1) Create and implement a minimum set of guiding rules of
repeated and refined. conduct that would facilitate efficient Communications and
Accordingly, heuristics have been invented to direct reliable Commerce through the use of Electronic medium.
case studies, to focus ethical scenarios, and to frame 2) Define, punish and prevent wrongful actions that attack
solutions for moral dilemmas. the electronic medium or harm others.
Cyber law describes the legal issues related to use of inter-
6. Computer Crime networked information technology. [30]
Malicious kinds of software, or "programmed threats", At the dawn of the 21st century, computer technology
provide a significant challenge to computer security. These as ethically revolutionary, requiring human beings to re-
include "viruses", which cannot run on their own, but rather examine the foundations of ethics and the very definition of
are inserted into other computer programs; "worms" which a human life.
can move from machine to machine across networks, and A sample guideline as given in the Annexure A will
may have parts of them running on different machines. help computer professionals, software engineers and
Computer crimes, such as embezzlement or planting hackers to understand the conclusion which is in the benefit
of logic bombs, are normally committed by trusted of public and restrict them to do unethical job.
personnel who have permission to use the computer system. Also Annexure B and C are giving the details of
Computer security, therefore, must also be concerned with countries that have cyber laws as per today’s cyber crime.
the actions of trusted computer users.
2. Client and Employer: Act in a manner that is in the best interest of their client and employer, consistent with public
interest.[7]
Provide service in their areas of competence, being honest and forthright about any limitations of their experience
and education.
Promote no interest adverse to their employer or client, unless a higher ethical concern is being compromised; in
that case, inform the employer or another appropriate authority of the ethical concern.
5. Profession: Advance the integrity and reputation of the profession consistent with the public interest
Help develop an organizational environment favorable to acting ethically.
An act of knowledge transfer has to be done by appropriate participation in professional organizations, meetings
and publications.
Australia ✔ ✔ ✔ ✔ ✔ ✔ ✔
Brazil ✔ ✔ ✔ ✔
Canada ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔
Chile ✔ ✔ ✔ ✔ ✔
China ✔ ✔ ✔
Czech
Republic
✔ ✔ ✔ ✔ ✔
Denmark ✔ ✔ ✔
Estonia ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔
India ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔
Japan ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔
Malaysia ✔ ✔ ✔ ✔
Mauritius ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔
Peru ✔ ✔ ✔ ✔ ✔ ✔ ✔
Philippines ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔
Poland ✔ ✔ ✔ ✔
Spain ✔ ✔ ✔ ✔ ✔
Turkey ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔
United
Kingdom ✔ ✔ ✔ ✔ ✔
United
States ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔
Key for Annexure C
Data Theft: Taking or copying data, regardless of whether it is protected by other laws, e.g., copyright, privacy,
etc.
Network Interference: Impeding or preventing access for others. The most common example of this action is a
distributed denial of service (DDOS) attack, flooding Web sites or Internet Service Providers. DDOS attacks
are often launched from numerous computers that have been hacked to obey commands of the perpetrator.
Computer-Related Fraud: Alteration of data with intent to derive economic benefit from its misrepresentation.