You are on page 1of 9

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/316618956

Impact of Computer Ethics in 21st Century

Conference Paper · February 2009

CITATIONS READS
0 10,135

5 authors, including:

T. V. Prasad Shree Harsh Atrey


Godavari Institute of Engineering and Technology JEMTEC Greater Noida
110 PUBLICATIONS   473 CITATIONS    7 PUBLICATIONS   19 CITATIONS   

SEE PROFILE SEE PROFILE

Deepak Kumar Sharma Sachin Lakra

12 PUBLICATIONS   36 CITATIONS   
Manav Rachna University, Faridabad, Haryana, India
22 PUBLICATIONS   37 CITATIONS   
SEE PROFILE
SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Fuzzy Inference System View project

cognitive sciences View project

All content following this page was uploaded by Shree Harsh Atrey on 16 December 2019.

The user has requested enhancement of the downloaded file.


Impact of Computing Ethics in 21st Century
Shree Harsh Atrey1, Deepak Kumar Sharma1, Sachin Lakra1,
Anubhav Kumar Sharma2, Dr. T.V. Prasad2
1
Dept. of CSE & IT, Manav Rachna College of Engineering, Faridabad 121 002
2
Dept. of IT, Lingaya’s Institute of Management and Technology, Faridabad 121002

Abstract- Computer technology has proven itself a double- Advancements in computer technology were made
edged gift, alternately improving and threatening our lives under the assumption that efficiency was the main concern,
and environment. Advancements in computer technology not moral values. The time has come to integrate an ethical
over the past two decades have created ethical dilemmas, dimension into the concept of managing technology and the
some similar to other professions and some unique to the human relationships that accompany technological
computer field. advancements. [27]
In the past years alone society encountered computer
viruses, interruptions of power, and invasions of privacy, 2. Computing Ethics
cyber-pornography, phishing, and many thefts. This paper
discusses basic instructional issues and provides Computing Ethics is a branch of practical philosophy
elementary approaches to the professionals who demand which deals with how computing professionals should
both technical knowledge and an understanding of ethical make decisions regarding professional and social conduct.
principles and skills. The term "computing ethics" was first coined by Walter
Maner in the mid-1970s, but only since the 1990s has it
Finally, the paper comes out with a valuable started being integrated into professional development
framework for the study of ethics and social principles and programs in academic settings. [24]
skills in a summarized form. Ethics is the study of what it means to “do the right thing”.
[1]
Keywords: - Computing Ethics, Computer abuse, Ethical
principles and skills, Cyber laws The ethical actions of a person can be described in
general terms as those actions which fall within the range of
those activities that would be regarded as “good”. It relates
1. Introduction thus to the question of what is good and bad in terms of
human actions. The purpose of ethics is to help us behave
Basic ethical values are learned in the formative years honorably and attain those basic goods that make us more
of childhood in the home, temple and school. To properly fully human.
apply the notion of ethics to technology, one should first
recognize that technology is not value-free, but weighted
down with values. “Any technological decision is a value- 3. Need of Computing Ethics
based decision that not only reflects a particular vision of
Computing ethics education now begins in elementary
society but also gives concrete form to it.
school and is not longer a restricted technical specialty
Computers can alter or create relationships between learned only by those who are going to design or program
people and organizations, even where there may have been computers [26]. Because of the widespread prevalence of
no prior connections. Data communications can take place computers in society, a core of ethical precepts relating to
without any personal contact and at such high speed that the computer technology should be communicated not only to
individual may not have time to consider the decisions of a computer professionals, but to the general public through
particular transmission. [32]. all levels of education. The issue should be viewed from the
perspective of society as a whole as well as from the
perspective of computer professionals.
New ethical dilemmas with competing rights and values
have arisen due to the advent of high-speed, worldwide Main categories in which ethical and social concerns arise
transmission, low-cost, mass storage, and multiple-copy are:-[1]
dissemination capabilities. The understanding of  Computer crime and computer security,
proprietary rights, residual rights, plagiarism, piracy,  Software theft and intellectual property rights,
privacy, and freedom of expression should be examined  Computer hacking and the creation of viruses,
and perhaps redefined.  Computer and information system failure,
 Invasion of privacy,
 Social implications of artificial intelligence and expert 4.4 Honour property rights including
systems, and copyrights and patent.
 Workplace computerization. Violation of copyrights, patents, trade secrets and the
In accepting the value-laden nature of technology, one terms of license agreements are prohibited by law in most
should recognize the need to teach a methodology of circumstances. Copies of software should be made only
explicit ethical analysis in all decision-making related with proper authorization. Unauthorized duplication of
technology. The challenge to computer educators is to materials must not be condoned.
develop strategies that will raise the awareness of students
4.5 Give proper credit for intellectual property.
regarding ethical and moral issues related to computer
Computing professionals are obligated to protect the
technology at the same time that they are developing their
integrity of intellectual property. Specifically, one must not
technical expertise.
take credit for other's ideas or work, even in cases where
the work has not been explicitly protected by copyright,
patent, etc.
4. Impact of Computing Ethics
4.6 Respect the privacy of others.
The role of software engineers is to develop software
Computing and communication technology enables
systems, and have significant opportunities to do well or
the collection and exchange of personal information on a
cause harm, to enable others to do well or cause harm, or
scale unprecedented in the history of civilization. Thus
to influence others to do well or cause harm. The impact of
there is increased potential for violating the privacy of
computing ethics on software developers will ensure that
individuals and groups. It is the responsibility of
their efforts will be used for good, ethical development and
professionals to maintain the privacy and integrity of data
for beneficial and respected profession. [27]
describing individuals.
Ethics consist of code of conducts, which helps to
This includes taking precautions to ensure the
differentiate between good or bad. Similarly computing
accuracy of data, as well as protecting it from unauthorized
ethics has seven principles related to the behavior and
access or accidental disclosure to inappropriate individuals.
decisions made for the professional software engineers as
Furthermore, procedures must be established to allow
well as trainees and students of the profession. The
individuals to review their records and correct inaccuracies.
principles identify the ethically responsible relationships in
which individuals, groups, and organizations participate. 4.7 Honour confidentiality.
The principle of honesty extends to issues of
4.1 Contribute to society and human well- confidentiality of information whenever one has made an
being. explicit promise to honor confidentiality or, implicitly,
This principle concerning the quality of life of all when private information not directly related to the
people affirms an obligation to protect fundamental human performance of one's duties becomes available.
rights and to respect the diversity of all cultures. An
essential aim of computing professionals is to minimize The ethical concern is to respect all obligations of
negative consequences of computing systems, including confidentiality to employers, clients, and users unless
threats to health and safety. discharged from such obligations by requirements of the
law or other principles of this Code. [9]
4.2 Avoid harm to others.
"Harm" means injury or negative consequences, such
as undesirable loss of information, loss of property, 5. Heuristics for Ethical Analysis
property damage, or unwanted environmental impacts. This Technically, an algorithm is an effective procedure,
principle prohibits use of computing technology in ways which means that it will unfailingly produce the intended
that result in harm to any of the following: users, the result in a finite number of steps if it receives sufficient
general public, employees, and employers. valid input. Algorithms can be contrasted with heuristics,
which are stepwise procedures that will tend to produce the
4.3 Be honest and trustworthy. intended result when they get the right input [22].
Honesty is an essential component of trust. Without
trust an organization cannot function effectively. The An algorithm, by contrast, would require an
honest computing professional will not make deliberately examination of all environments that the procedures
false or deceptive claims about a system or system design, proposed for guiding ethical analysis can be valuable
but will instead provide full disclosure of all pertinent heuristically.
system limitations and problems.
Within computing ethics, heuristics have been of early crimes have virtually no boundaries and may affect any
and continuous interest. Although human beings make country across the globe.
moral judgments from a very young age, heuristics may be
needed Thus, there is a need for awareness and enactment of
necessary legislation in all countries for the prevention of
 to take this process to a higher level computer related crime [12]. There is a desperate need for the
 to guard it against omissions emergence of a well-defined framework of Cyber Laws,
 to make it more teachable, or which should be able to do the following:
 to ensure that an effective process, once found, can be 1) Create and implement a minimum set of guiding rules of
repeated and refined. conduct that would facilitate efficient Communications and
Accordingly, heuristics have been invented to direct reliable Commerce through the use of Electronic medium.
case studies, to focus ethical scenarios, and to frame 2) Define, punish and prevent wrongful actions that attack
solutions for moral dilemmas. the electronic medium or harm others.
Cyber law describes the legal issues related to use of inter-
6. Computer Crime networked information technology. [30]

In this era of computer "viruses" and international


spying by "hackers" who are thousands of miles away, it is 8. Conclusions
clear that computer security is a topic of concern in the
field of computer ethics. The problem is not so much the Ethical Development and Ethical Technology are
physical security of the hardware (protecting it from theft, concerned with the building blocks of systems and the way
fire, flood, etc.), but rather "logical security", which are those systems should be built. Ethical application is
divide into five aspects: Privacy and confidentiality, concerned with the game plan with developing and
Integrity, Unimpaired service, Consistency, controlling implementing strategies which allow the technology to be
access to resources. applied in an ethically sensitive manner.

Malicious kinds of software, or "programmed threats", At the dawn of the 21st century, computer technology
provide a significant challenge to computer security. These as ethically revolutionary, requiring human beings to re-
include "viruses", which cannot run on their own, but rather examine the foundations of ethics and the very definition of
are inserted into other computer programs; "worms" which a human life.
can move from machine to machine across networks, and A sample guideline as given in the Annexure A will
may have parts of them running on different machines. help computer professionals, software engineers and
Computer crimes, such as embezzlement or planting hackers to understand the conclusion which is in the benefit
of logic bombs, are normally committed by trusted of public and restrict them to do unethical job.
personnel who have permission to use the computer system. Also Annexure B and C are giving the details of
Computer security, therefore, must also be concerned with countries that have cyber laws as per today’s cyber crime.
the actions of trusted computer users.

Another major risk to computer security is the so- References


called "hacker" who breaks into someone's computer
system without permission. Some hackers intentionally [1] Andries B ar n ard , Corne de Ridder, Laurette
steal data or commit damages, while others merely Pretorius, Department of Computer science and
"explore" the system to see how it works and what files it Information Systems, Unisa (South Africa), 2001
contains. [19] [2] Ermann, M David, Williams, Mary B, & Shauf,
Michele S (eds), Computers, Ethics, and Society,
However every act of hacking is harmful and Oxford University Press, 1997
unethical, because any known successful penetration of a [3] Eric Weiss, ed., Self assessment procedure IX: a self-
computer system requires the owner too thoroughly check assessment procedure dealing with ethics in
for damaged or lost data and programs. [19] computing, Communications of the ACM, Vol. 25,
No. 3, pp. 183 – 195, 1982
[4] Epstein, R., the Case of the Killer Robot, John Wiley
7. Cyber Law & Sons, 1997, available at http://www.onlineethics.
The rapid development of Internet and Computer org/cases/robot.html
technology globally has led to the growth of new forms of [5] Gotterbarn Donald, Computer Ethics: Responsibility
transnational crime especially Internet related. These regained, National Forum, 26-32, 1991
[6] Gotterbarn Donald, Ethics and the Computing [21] Tavani, Herman T. "Privacy On-Line," Computers
Professional, Collegiate Microcomputer. X, 3, 1992 and Society, Vol. 29, No. 4, 11-19, 1999
[7] Gotterbarn Donald Approaches to Computer Ethics, [22] Walter Maner, Heuristic Methods for Computer
East Tennessee State University, Johnson City, 1998 Ethics, available at
[8] Jackson Michael, Cyber Crime Law, Master of Laws http://csweb.cs.bgsu.edu/maner/heuristics
in Information Technology and Intellectual Property [23] ACM Code of Ethics and Professional Conduct,
Law, University of Hongkong, 2008 available at http://www.acm.
[9] Johnson, D. G. and Snapper, J. W. Eds. Ethical Issues org/constitution/code.html
in the Use of Computers, Wadsworth, Belmont CA, [24] Computer Ethics, Wikipedia, available at
1985 http://en.wikipedia.org/wiki/Comput er_ethics
[10] Johnson, D. G. Ethical Issues in Engineering, [25] Computer Ethics in the Social Context, available at
Prentice-Hall, 1991 http://www.southernct.
[11] Johnson, D. G., Computer Ethics, 34rd Edition : edu/organizations/rccs/resources/research/comp_an
Prentice Hall, New Jersey, 2001 d_priv/martin/soc_context.html
[12] Lunker Manish. Cyber Laws: A Global Perspective. [26] Computer Ethics education available at
Cyber space law and policy center. The University http://www.southernct.edu/ organiz
of New South Wales, 2008 ations/rccs/resources/research/comp_and_priv/marti
[13] Martin, M. W. and Schinzinger, R. Ethics in n/comp_eth_edu.html
Engineering, McGraw-Hill, 1989 [27] Computer Society and ACM approve software
[14] Naavi, Essential of cyber laws for IT professionals, engineering code of ethics, available at
Sairam Engineering College Feb. 2003, available at http://www.open.hr/etika/ en_ code.pdf
http://www. naavi.org/cl_editorial_03/ cl_eng.htm [28] Countries with updated laws, available at http://
[15] Nissenbaum, Helen"Protecting Privacy in an www.mcconnell internatio nal.com
Information Age: The Problem of Privacy in Public," [29] Cyberspace: The Ethical Frontier. Originally
Law and Philosophy,Vol. 17, 559-596, 1998 published in The Times Higher Education
[16] Preston David, East London Business School Supplement, June 9, 1995
University of East London, Long bridge Road, [30] Cyber law - Wikipedia, available at
Dagenham, Essex RM8 2AS England http://en.wikipedia.org/wiki/Cyber_law
[17] Richard A. and Herman T. Tavani, Spinello, Readings [31] Cyber law statutes available at
in Cyber Ethics, Jones and Bartlett, 2001 http://www.cyberlawtimes.com/
[18] Rogerson Simon "The Ethics of Computing: The First [32] Facing the computer ethics dilemma, available at
and Second Generations," The UK Business Ethics http://www.southernct.
Network News, Spring, 1996. edu/organizations/rccs/resources/research/comp_an
[19] Schell, B.H. & Lodge, J. L., The Hacking of America: d_priv/martin/soc_context.html
who's doing it, why and more? Westport, CT: [33] The guide to computing literature available at
Quorom, 2002 http://portal.acm.org/ citation. cfm?id=26808
[20] Terrell Ward Bynum, The Foundation of Computer
Ethics, a keynote address at the AICEC99
Conference, Melbourne, Australia, July 1999
Annexure A
Sample Guidelines For Computer Professionals, Software Engineers And Hackers

1. Public: Professionals shall act consistently in the favour of public interest.


 Approve software only if they have a well-founded belief that it is safe, meets specifications, passes appropriate
tests, and does not diminish quality of life, diminish privacy or harm the environment. The ultimate effect of the
work should be to the public good.[7]

2. Client and Employer: Act in a manner that is in the best interest of their client and employer, consistent with public
interest.[7]
 Provide service in their areas of competence, being honest and forthright about any limitations of their experience
and education.
 Promote no interest adverse to their employer or client, unless a higher ethical concern is being compromised; in
that case, inform the employer or another appropriate authority of the ethical concern.

3. Product: Product should meet the highest professional standards possible.


 Identify, define and address ethical, economic, cultural, legal and environmental issues related to work projects.
 Ensure that an appropriate method is used for any project on which they work or propose to work.
 Ensure realistic quantitative estimates of cost, scheduling, personnel, quality and outcomes on any project on
which they work or propose to work and provide an uncertainty assessment of these estimates. [7]

4. Judgment: Maintain integrity and independence in their professional judgment.


 Judgments should support and maintain human values.
 Not engage in deceptive financial practices such as bribery, double billing, or other improper financial practices.

5. Profession: Advance the integrity and reputation of the profession consistent with the public interest
 Help develop an organizational environment favorable to acting ethically.
 An act of knowledge transfer has to be done by appropriate participation in professional organizations, meetings
and publications.

6. Colleagues: Be fair to and supportive of their colleagues.


 Assist colleagues in professional development.
 Teach and encourage them to not follow the unethical way.
Annexure B
AVAILABILITY OF CYBER LAWS AND ACTS FOR CYBER CRIME

Areas India USA UK Canada Australia Japan China


requiring
legislation
and/or
standards
Computer ✔ ✔ ✔ ✔ ✔ ✔ ✔
crime
Copyright Copyright Copyright Copyright, Copyright Act Copyright Act Copyright Law Copyright
protection Act,1957 Protection Designs (Consolidation), (Consolidation), (Consolidation), Law, 2001
Act of and Patents 1985 (1994) 1968 (1992), 1970 (2000)
1995 Act 1988
Consumer Consumer Consumer Consumer Consumer Trade Practices Consumer Protection of
protection Protection Product Protection Protection Act, Act 1974 and Basic Consumer
Act 1986 Safety Act 1987 2002 the Prices Protection Law Rights and
Act, 1972 Surveillance of 1968 Interests,1993
Act 1983 The Product
Liability Law
of 1994.
E- Information Electronic Electronic Act No.
commerce Technology Commerce Transaction Act 227(2002)
Act, 2000 (EC
Directive)
Regulations
2002
M- Information
commerce Technology
Act 2000
Electronic ✔ ✔ ✔ ✔ ✔ ✔ ✔
Data
Interchange
Child IT Act Internet Protection Children's Child
protection 2002 Safety of Children Online Privacy Pornography
and safety and Child Act 1978 Protection Act and Abuse
Protection 1998 Amendment
Act of Bill 2004
2005
Cyber Café ✔ ✔ ✔ ✔ ✔ ✔ ✔
monitoring
Annexure C [28]
COUNTRIES WITH UPDATED LAWS FOR THE FOLLOWING CYBER CRIMES

Data Crimes Network Crimes Access Crimes Related Crimes

Country Aiding and


Data Network Virus Computer Computer
Data Data Network Unauthorized Abetting
Interceptio Interferenc Disseminatio Related Related
Modification Theft Sabotage Access Cyber
n e n Forgery Fraud
Crimes

Australia ✔ ✔ ✔ ✔ ✔ ✔ ✔

Brazil ✔ ✔ ✔ ✔

Canada ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔

Chile ✔ ✔ ✔ ✔ ✔
China ✔ ✔ ✔
Czech
Republic
✔ ✔ ✔ ✔ ✔

Denmark ✔ ✔ ✔
Estonia ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔

India ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔

Japan ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔

Malaysia ✔ ✔ ✔ ✔

Mauritius ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔

Peru ✔ ✔ ✔ ✔ ✔ ✔ ✔

Philippines ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔

Poland ✔ ✔ ✔ ✔

Spain ✔ ✔ ✔ ✔ ✔

Turkey ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔

United
Kingdom ✔ ✔ ✔ ✔ ✔

United
States ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔
Key for Annexure C

Data Interception: Interception of data in transmission.

Data Modification: Alteration, destruction, or erasing of data.

Data Theft: Taking or copying data, regardless of whether it is protected by other laws, e.g., copyright, privacy,
etc.

Network Interference: Impeding or preventing access for others. The most common example of this action is a
distributed denial of service (DDOS) attack, flooding Web sites or Internet Service Providers. DDOS attacks
are often launched from numerous computers that have been hacked to obey commands of the perpetrator.

Network Sabotage: Modification or destruction of a network or system.

Unauthorized Access: Hacking or cracking to gain access to a system or data.

Virus Dissemination: Introduction of software damaging to systems or data.

Aiding and Abetting: Enabling the commission of a cyber crime.

Computer-Related Forgery: Alteration of data with intent to represent as authentic.

Computer-Related Fraud: Alteration of data with intent to derive economic benefit from its misrepresentation.

View publication stats

You might also like