You are on page 1of 5

SUES PROFESSIONAL ETHICS IN ENGINEERING

thinking and rituals.


ure O Non-human animals have spirits. They
are to be killed only out of necessity, and
as they atoned for and apologies made to
lad the animal's spirit.
Asian religious emphasize images of
nto unity with nature, which is distinct from both
stewardship and domination.
by Hinduism the predominant religion in India,
of promulgates an ideal of oneness with nature
and the doctrine of ahimsa - non-violence and
ive non-killing
in
5.9 COMPUTER ETHICS
of Computer Ethics is a part of practical
nd philosophy which Concerns with how
es "computing professionals should make
decisions regarding professional and social
conduct.O
"Computer ethics" also has been used to
of refer to a kind of professional ethics in which
e
computer professionals apply codes of ethics
and standards bf good practice within their
profession.
To the extent that engineers design, manufac
e

e
ture, and apply computers, computer ethics is
a branch of engineering ethics.
V In addition, names such as cyber-ethics" and
"Internet ethics" have been used to refer to
computer ethics issues associated with the
f Internet.
When computers first began to be used in
Internet
epeech
computer.
Some
home'seasilysince
Internet commercial
pornography,
speech,
hateinformation.
including sources of toethics.
One Internet
Internet computer
be, andresponsibleThereCOMmonterms.
crimesand
national
husiasts images been kindsions
on from. set Today,widespreadproblems.about
Societyatlare,
in Free
requires provides are of
onthe ofcontact has
international. speech) control a in their
ny Speech crime laws formulated
consensus.
ternet and issues magnified Or
many
computer
for However,in use
e argue control
texts with and against
computer fraud
and a knowing international. every and the
of
center of
other well computer related'issues absence
e, not that-sources can libel..obscene all ethics facet
them, as
these as
extremely spring issues
trolling
only spam.{unwanted on people what of
be resulted their ofethical
but fraud. and our
free laws,
transmitted
to of in rules GLOBAL
ISSUES
so will use
lives, caused
forms and new
computer constitutes everyone Computer are
a
dificult speech, standards
prove became
in
child either discus some
at free with ways now have some
of is

Theft 1. instrumnent
with The behaviour5.9.1 Broad PROFESSIONAL
V various
the Computer
Computers Those
information
autonomous
computer categories
instrument
installedeact,
Those Internetsuch
principles
steal VirusesInvasion
Privacy Theft
of opportunity.
use Those
Computer
Comnputers Computer
ployer, Hacking help
for of
unethical asfor
a uncontrollabilityETHICS
from of when
computer for could
computerscarrying problem which
on of
utsiders as of freedom, of IN
are is which
Computer
its can as nature one's
computer the
the accessed the be
ENGINEERING
lients activiies out
betoot a sometimes
used unethical
computerthe is to the
instrument of own defraud the
can used are: some associated is
to computers software Ethics ultimategood
and from
computer
get assist where computer
to unethical
ers aact equality
into steal somneone bank Problem
theft. of is such defender
people with object
stolen
afrom unethical or
system activities. as as is
else'swhen ofthe and
made and the the of
an the
an

and em
GLOBAL 1SSUES
In these cases PROFD881ONAL ETHIC8 IN ENGINEERING

theft easier to
computers has only made the 3. Hacking
perpetuate, but
the ethical issues does not alter Hackers by which we mean that
involved.
Stealing whether by way of the minority of computer enthusiasts sometime
or simply by sitting in front of atraditional way called "crackers" who compulsively challenge
ethical computer, the
issues and law is not altered. any comnputer security system
Some carry their art to the point of
2. Invasion of privacy implanting "time bombs" or "Trojan horses"
(unwanted Codes that Copy themselves
Privacy = basic right of an individual to
Control access to and use of information about
into large programs) that will «choke
himself.
.. . networks with dead-end tasks, spew out false
information, erase files and even destroy
V Information (individuals or corporate) gained equipment.
without consent is an invasion of privacy. unauthorized
With Gaining acce_s, to
computers, protecting database, implanting false information in a
privacy has become much more
database or altering existing information and
difficult. Records have been computerized,
disseminating viriuses over the internét.
making retrieval of files much easier, it also In most cases of hacking, . hackers
makes the unauthorized retrieval. of this
simply testing and pushing their skills and
information by others easier. knowledge limits.
.

Invasions of privacy can lead toan individual


In extreme cases, secret military information
being harassed or blackmailed
Harassed in the simplest form, repeated phone is illegally accessed which may jeopardize
national security.
calls from,telemarketers who have obtained Altering information may lead to fraud.
information about an individual's spending
habits.
4. Computer viruses
Subtle teasing or bothering from a coworker malware
computer virus is a
who has gained personal knowledge of the that, when executed, replicates
individual.
by reproducing itself or infecting
Personal information is considered as
other programs by modifying them infecting
personal property. This same principle applies Computer programs carn include as well, data
to proprietary information of a corporation.
files, or the boot sector of the hard drive.
Viruses can also replicate themselves. All
ENGINEERING
GLOBAL ISSUES PROFESSIONAL ETHICS IN
thne prices,
computer viruses are man-made. A simple selling stocks, further depressing on
sell, and so
virus that can make a copy of itself over and causing other computers to
major market crash.
over again is relatively easy to produce. until there is a
Issuance of computer viruses may lead Autonomy of computers also been used
to deaths when hospital records or regard to military weapons.
heavily on
equipment are compromised, financial ruin O Many weapons systems rely
for individuals whose records are wiped computer sensOrs and computer
out, or the loss of millions of dollars for controls.
corporations, individuals, taxpayers, as O Due to the speed with which events carn
completed.work must be redone.
happen on a modern battlefield, it would
5.9.2 AUTONOMOUS COMPUTERS seem valuable to have weapons that can
operate autonomously.
Autonomy refers to the ability of a computer
to make decisions without the intervention of O Sensors might lead a computer to think
humans. than an enemy has increased its military
An autonomous computer responsible for activity in a certain area
running a spaceship headed for Jupiter Autonomous computer can greatly increase
begins to turn against the humans it was productivity and efficiency in many areas,
designed to work for. ultimately there must be some human control
Certainly there are applications for which in order to prevent disasters.
autonomy is valuable.
O For example: Manufacturing processes 5.93 COMPUTER CODE OF ETHICS
that require monitoring and control at Computer code of ethics is set of moral
frequent intervals can greatly benefit principles that regulate the use of computers. Some
from autonomous computers common issues of computer code of ethics include
Computers in major stock exchanges intellectual property rights (such as
Some brokerage and institutional investors ellgctranic content), privacy concernS, copyrighted
and how
útilized computers that were programmed computers affect society.
to sell stocks automatically under certain In order to overcome various ethical issues
Conditions, among them when prices drop of çomputer ethics, Computer Society of India has
sharply. developed the Ten Commandments' of computer
As prices drop computer
automatically start ethics.
fellow
theyou.are .ensure
resourcesintellectual
other
péopBe's compensa
forT permissión).
GLOBAL
188URs cormputer witness. of
people. software your
are: consequences
orthe that
system
ethics
other other false
computer people's waysfor
people's proper
(without
proprietary
harm steal.
bear
computer .
in in respect
other or
to around
to to paidpeople's other social
writing computer
are
computer computer authorization
computer
of with use not appropriate and
Commandments" the
computer haveother
interferefiles. or
snoop you
program a considerati
a a a copy
about
use useuse youuse designing.
use
without
Don't
Don't Dont Don't
work. which
Don't
output.
Think Alwayshuman
tion.Don't
Don't Don't
e4Ten
/

You might also like