Computer and Ethics CMPT 109 Montclair State University

  • Slides: 16
Download presentation
Computer and Ethics CMPT 109 Montclair State University

Computer and Ethics CMPT 109 Montclair State University

Ethical Problems • Proliferation of computers and their networks have created new ethical problems

Ethical Problems • Proliferation of computers and their networks have created new ethical problems • The ACM has issued a Code of Ethics in decision making, to guide us. • This code contains the main principles which we should revise before making a decision

P. A. model - I • Privacy: – What information about one's self or

P. A. model - I • Privacy: – What information about one's self or one's associations must a person reveal to others, under what conditions and with what safeguards? – What things can people keep to themselves and not be forced to reveal to others?

P. A. model -II • Accuracy: – Who is responsible for the authenticity, fidelity,

P. A. model -II • Accuracy: – Who is responsible for the authenticity, fidelity, and accuracy of information? – Who is to be held accountable for errors in information and how is the injured party to be made whole?

P. A. model -III • Property: – Who owns information? – What are the

P. A. model -III • Property: – Who owns information? – What are the just and fair prices for its exchange? – Who owns the channels, especially the airways, through which information is transmitted? – How should access to this scarce resource be allocated?

P. A. model -IV • Accessibility: – What information does a person or an

P. A. model -IV • Accessibility: – What information does a person or an organization have a right or a privilege to obtain, under what conditions and with what safeguards?

P. A. model - I • Privacy: – We have a lot of private

P. A. model - I • Privacy: – We have a lot of private data stored in computers: S. S. #, medical information, credit card #s, that must be kept from prying eyes. – With your credit card # and S. S. # someone could steal your financial identity

P. A. model -II • Accuracy: – The amount you own in one of

P. A. model -II • Accuracy: – The amount you own in one of your credit card is increased because someone else has used your card without your knowledge. – Your transcript does not coincide with your real grades in some courses.

P. A. model -III • Property: – Your last paper has been copied and

P. A. model -III • Property: – Your last paper has been copied and handed in as if it were from another person. – The computer game has been copied, without the programmer receiving proper compensation for his/her effort.

P. A. model -IV • Accessibility: – Credit bureaus have information about you (about

P. A. model -IV • Accessibility: – Credit bureaus have information about you (about all of us, as a matter of fact). Should you be able to request a copy of your information? Should you be able to ask for corrections if it is wrong?

Tools • The previous principles should guide us in our decision making. • We

Tools • The previous principles should guide us in our decision making. • We can’t assume that everybody is going to follow them. • We may use some tools to protect ourselves. Specially in relation with the first 3 principles

Tools • Use passwords to allow different kinds of access (Read, write, no-access), protecting

Tools • Use passwords to allow different kinds of access (Read, write, no-access), protecting your privacy and property. • Have a disaster recovery plan – Use backups – Big enterprises need to have hot sites

Tools • Use encryption programs that will also protect your privacy and property. •

Tools • Use encryption programs that will also protect your privacy and property. • Use anti-virus software, to protect your property and the accuracy of your information • Use anti-spyware programs to detect spyware and adware in your system

Need of Tools - I • Why do we need to use these tools?

Need of Tools - I • Why do we need to use these tools? • Because of the existence of – Hackers (Person who access your computer) – Viruses (Program which attaches to a file and reproduces itself into another files) – Worms (Program that reproduces itself from computer to computer)

Need of Tools - II • Why do we need to use these tools?

Need of Tools - II • Why do we need to use these tools? • Because of the existence of – Trojan Horses (Program that seems to perform a job, when really they are doing something else) – Key-loggers (Program that records to a file everything that is typed on the keyboard. The file is sent to the creator to the program) – Phishing (Sending an email claiming to be a legitimate site, to obtain private information for identity theft)

Tools • For accessibility we must rely on laws, to enforce the accessibility of

Tools • For accessibility we must rely on laws, to enforce the accessibility of data. Otherwise the other party will not supply the information. – We have the Freedom of Information Act – Federal law requires that credit bureaus sent a credit report to anyone that ask for it, free of charge.