COURSE OBJECTIVES:
An Overview of Ethics
Ethics for I.T Professional and I.T Users
Computer and Internet Crime
Privacy
Freedom of expression
Intellectual property
Software Development
The impact of I.T on quality of life
Social Networking
Ethics of I.T Organization
COURSE CONTENTS
Introduction
Computer Development & Ethics
Ethics
Law: Free speech and censorship
Intellectual property
Privacy
Secrecy and Security
Crime and Misbehavior
Information Technology Accountability
Computing and Information Technology as Professions and
Professional codes
Social Changes
Political Changes
Artificial Intelligence: Computer and human being
CHAPTER 1: INTRODUCTION
Rapid Pace of Change
1940s: The first computer was built
1956: First hard-disk drive weighed a ton and
stored five mega bytes
1991: Space shuttle had a one mega hertz
computer
2006: Pocket devices hold a terabyte of data
NEW DEVELOPMENTS
Blogs (A construction of the words web log)
A blog is a discussion or informational site
published on the world wide web
Express ideas or creativity
Video Sharing
Rise of amateur videos on the web
Boom of websites like youtube and myspace
Cell Phone:
Use for travel, planning, taking pictures and
downloading music
Camera in cell phones and privacy issues
ETHICS: AN OVERVIEW
What is Ethics:
Ethics is defined as a set of moral values or
principles that govern the conduct of an
individual or a group
Ethics comes from Greek word ethos, which
means character. Ethics studies the moral
behavior in human and how one should act.
COMPUTER ETHICS
10
OBJECTIVES OF ETHICS
To understand many kind of ethical issues in
Information technology
To understand the basic concepts of ethics in
Information technology development
11
ETHICAL ISSUES
Privacy/Data Security: Privacy is the right of
people not to reveal information about
themselves. Example: E-Banking, E-Commerce
Prevention:
Change Password regularly
PIN (Personal Identification Number)
Property: Who owns the information
Accuracy: Who is responsible for the authenticity
and accuracy of information
12
13
14
15
MEDIA MANIPULATION:
16
MEDIA MANIPULATION:
17
CHAPTER 2: PRIVACY
18
TERMINOLOGY:
Invisible information gathering Collection of
personal information about someone without
persons knowledge
Secondary Use Use of personal information for
a purpose other than the one it was provided for
Computer Profiling Analyzing in computer files
to determine characteristics of people most likely
to engage certain behavior
Data Mining Searching and analyzing masses
of data to fine patterns and develop new
information knowledge
20
TERMINOLOGY (CONT..)
21
DIVERSE/MISCELLANEOUS PRIVACY
TOPICS
Marketing, Personalization and consumer record
Credit record
Location Tracking: Global Position system (GPS)
Cell Phone and other devices are used for location
tracking
23
PROTECTION PRIVACY
Privacy enhancing technologies for consumers
Business tools and policies for protecting data
24
COMMUNICATION
Designing communication system for interception
Wiretapping and E-Mail protection
Secret intelligence gathering
Secret Access to communications records
Encryption policy
25
26
FREE-SPEECH PRINCIPLES:
Written for offensive/controversial speech and
ideas
Restriction on the power of government, not
individuals or private businesses
Supreme Court principles and guidelines
Advocating illegal act is legal
Allow some restrictions on advertising
Protect anonymous speech
27
Filters:
Blocks sites with specific words, phrases or
images
Parental control for sex and violence
Updated frequently
28
29
ANONYMITY
Common Sense and the Internet:
Services available to send anonymous email
Anonym zing services used by individuals,
business, law enforcement agencies and
government intelligence services
Against Anonymity:
Fears:
It hides crime or protect criminals
30
CHAPTER 4: INTELLECTUAL
PROPERTY
Intellectual Property:
The intangible creative work, not its particular
physical form
Protected by copyright and patent law
Copyright holders have exclusive rights:
To make copies
To produce derivative works, such as translation
into other languages or movies based on books
To distribute copies
To perform the work in public
To display the work in public(e.g, Artwork, movies,
computer games, video on website)
31
CHALLENGES OF NEW
TECHNOLOGY
Digital technology and the internet has made
copyright infringement easier and cheaper
New compression technologies have made copying
large files(e.g. graphics, video and audio files)
New tools allow us to modify graphics, video and
audio files
Scanner allow us to change the media of a copy
righted work, converting printed text, photos and
artwork to electronic form
32
33
34
SIGNIFICANT CASES:
Sharing music
File sharing
35
36
FREE SOFTWARE
37
CHAPTER-5: CRIME
HACKING:
Defined as to gain illegal or unauthorized access
to a file, computer, or network
The term has changed over time
Phases of Hacking:
Phase 1: Early 1960s to 1970s
o It was a positive term
o A hacker was a creative programmer who wrote
elegant or clever code
o A hack was an especially clever piece of code
38
HACKING
Phase 2: 1970s to Mid 1990s
Hacking took on negative connotations
Breaking into computers for which the hacker does
not have authorized access
Includes the spreading of computer worms and
viruses and phone breaking
Phase 3: Beginning with the Mid 1990s
o The growth of the web changed hacking, viruses
and worms could be spread rapidly
o Political hacking
o Large scale theft of personal and financial
information
39
HACKING
The Law: Catching and Punishing Hackers:
1986: Congress passed the Computer Fraud and Abuse
Act (CFAA)
Political Hacking
A variety of methods for catching hackers
Penalties for young hackers
Responsibility for Security
Developers have a responsibility to use security tools
and monitor their systems to prevent attacks
Security: Internet started with open access as a means
of sharing information for research
Firewalls are used to monitor and filter out
communication
40
41
STEALING IDENTITIES
Techniques used to protect personal and financial
information
Activation for new credit cards
Retailers do not print the full card number and
expiration date on receipts
Services, like PayPal, act as third party allowing
a customer to make a purchase without revealing
their credit card information to stranger
Online Resume and job hunting sites may reveals
Social Security Numbers (SSNs), Work history,
birth date and other information
42
Digital Forgery:
o New technologies (Scanners and high quality
printers) are used to create fake cheque,
passports, visas, birth certificates, etc
43
44
47
48