No to Child Pornography, Yes to Computer Ethics

Respected Ladies and gentlemen, It gives me immense pleasure to welcome you all. With my warmest regards I would take the opportunity to say that I am very indebted and grateful to stand here in front of you all and express my vision. Today, I am not standing here for giving any kind of lecture.

What is Computer Ethics

Once computers first started to be used in society in a broad way, the absence of ethical standards about their use and related issues induced some problems. Nevertheless, as their use became widespread in every aspect of our lives, discourses in computer ethics resulted in some kind of a consensus.

No to Child Pornography

The advent of the internet has done amazing things for the world. The internet has made markets available to people who would have never had that opportunity any other way.

Saturday, July 15, 2017

Zillable Disrupts Enterprise Social Networks with the Launch of Collaboration Platform


Zillable launches a secured collaboration and innovation platform that consolidates familiar productivity and collaboration apps for teams of any size

Zillable™, an innovator in collaboration and innovation, unveils the world's first collaboration and innovation platform specifically designed for forward-thinking teams and enterprises of 10-10,000 members to collaborate and innovate on any device and from any location.

Productivity and innovation tools, such as: boards, mind mapping, chat, and newsfeeds, are ordinarily one-off apps created by various developers. Zillable offers the enterprise a suite of integrated collaboration and innovation tools on a single platform, specifically designed for organizations to realize new value from diverse employees working across departments and time zones, and to be responsive to disruptive markets.

"Zillable is like your digital coffee shop where teams collaborate and innovate - seamlessly at ease," Andrew Pham, CEO and Founder of Zillable explained. "The enterprise can create private collaboration networks that dissolve departmental silos and streamline the way employees get stuff done, innovating faster." Public communication channels may also be employed by the enterprise, engaging the Crowd and fine-tuning predictions for market shifts and internal company strategy.

"Today's global workforce can't be constrained by the limitations of conference calls, corporate emails, or video conferences," Mr. Pham said. "Zillable empowers employees to create and innovate whenever and wherever they need – not just when it fits into someone else's schedule."

The Zillable platform effectively merges social media with enterprise collaboration workspaces and business productivity apps, such as boards, mind mapping, newsfeeds, and task management. "The autograph of innovation isn't mysterious," explains Andrew. "When you get right down to it, innovation happens when you give freedom to your employees to engage, share ideas, and provide them with the productivity tools to help them streamline their workflows."


Zillable's disruptive collaboration and innovation platform is designed exclusively for teams and organizations of any size. Free and paid plans are offered, including a basic free plan for unlimited evaluation that includes chat, boards, and other productivity tools at no cost. To learn more about Zillable, visit: Zillable.com

Wednesday, October 15, 2014

No to Child Pornography


The advent of the internet has done amazing things for the world. The internet has made markets available to people who would have never had that opportunity any other way. A teenager in Manila  can read the tweets coming from the Gaza strip, African women can sell their goods online to Asian buyers, a simple college student has access to all the information they could ever imagine using and they can carry it in a bag slung over their shoulder. There is no dispute that the internet has brought many good things but the internet is not a moral being. The internet is amoral. Morality is left up to the users and while the internet is used for so much good it has also aided the development of so much evil.

Child pornography is defined as content that depicts sexually explicit activities involving a child. Child being anyone under the age 18. Unfortunately child pornography has always been a problem but the internet has provided an arena for producers and distributers of child pornography to access their consumers with ease and convenience. Given the shadow nature of the child pornography community it can be very difficult to provide solid numbers to describe the extent of the problem but the available evidence indicates that it is a major and growing problem. “At any one time there are estimated to be more than one million pornographic images of children on the internet, with 200 new images posted daily.”[1] A single offender arrested in the U.K. was in possession of 450,000 images and there are individual child pornography sites that receive a million hits per month.

It is difficult to even think about this issue but the battle against child pornography requires a full education of the problem. A study from 2005 showed that 83 percent of people arrested for child pornography possessed images involving children between the ages of 6 and 12; “39 percent had images of children between ages 3 and 5; and 19% had images of infants and toddlers under age 3.”[2]

One of the hypothesis’ as to why child pornography has become more prevalent is that viewing images online in the security of your own home makes it easier to forget that the children in these videos are real people and real victims. To be sexually abused as a child is a terrible life changing event but to have that event recorded and distributed to hundreds, thousands or even millions of people creates a legacy of abuse in which the victim continues to be abused by every person who downloads their image. Studies[3] have shown that victims of child pornography actually experience an intensification of the initial feelings of shame and anxiety developing into deep despair, worthlessness and hopelessness.

We find ourselves in a dire situation. The internet is a great tool being manipulated to fulfill unsavory ends but there is no one person or institution who is responsible for stamping out the production and distribution of internet child pornography. It has to be a multi-level attack starting with each of you being an advocate in your local area. Local advocates can work with local governments who can work with state governments and Federal agencies who can work with international agencies to seek justice for the abused and do everything possible to save more children from becoming victims.


There is still Hope…
There's Freedom!

Let’s Report the crime!
Save our Children!
Let’s Stop Child Pornography!


Bibliography

  1. http://www.popcenter.org/problems/child_pornography/1
  2. http://www.cops.usdoj.gov/publications/e04062000.pdf
  3. http://www.huffingtonpost.com/mary-l-pulido-phd/internet-child-pornography_b_4562194.html
  4. http://www.wearethorn.org/child-sex-trafficking-child-pornography-aided-internet-anonymity/

For more information visit: http://is-201-computer-ethics.blogspot.com/


No to Child Pornography, Yes to Computer Ethics

Respected Ladies and gentlemen,

It gives me immense pleasure to welcome you all. With my warmest regards I would take the opportunity to say that I am very indebted & grateful to stand here in front of you all and express my vision. Today, I am not standing here for giving any kind of lecture. I am also not here for asking anything for my individual interest. I am here to humbly & courteously ask you all for helping me to save our future. Yes our future in danger and I really mean it. Confused?

By future, I mean our children & young generation. There is no doubt that they are our real future and thus our country’s future. They are the purest form of human race. Their minds are divine and holy. But the problems with pure and clear things are that they can be easily adulterated. Children are like liquids, they take the shape of any vessel in which they are kept. Hence, the background of the children matters a lot for their mindset. And as they will grow, those things will become concrete in their minds & hearts. Not only children but the grownups may also get injudicious in such cases.
If we talk about today’s world, the 1st thing which comes to our mind when we think about children’s surroundings is TECHNOLOGY. It doesn’t matter how small or big the kids are, they all are directly or indirectly using any type of technology in their life. The most common gadgets which they use are: Mobile & Computers. These things are great when they are alone but as soon as a thing called “Internet” is connected to it, we have no idea where it will take them. Ethical problems are aggravated, transformed & created by computer technology. As they are unaware of the circumstances which will be caused after their act they end up in wrong paths of life. If they are not corrected in some time, these paths will become permanent till they grow old.
Now why should we take it so seriously? It needs attention because it's going to damage them emotionally. Their self esteem and their self confidence will be under threat, also their sense of physical safety. And you should know that your kids may not want to tell you they're being bullied as they might be embarrassed or might not want to own up to the fact they're on sites they aren't supposed to be on.

People have a mindset to try something new every time. They love adventure & new feelings they experience. But due to lack of knowledge about good and bad, they are unable to figure out that what they love right now may end up in big blunders. Once they try a thing and if they like it, they will continue doing it. The best example for such case is CHILD PORNOGRAPHY. I think that it is time to introduce everyone with COMPUTER ETHICS.
Now, what is Computer Ethics? And why is it necessary? How does it lead to child pornography?

Computer Ethics is a part of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. Internet Privacy is one of the lock issues that have emerged since the evolution of the World Wide Web. Millions of internet users often expose personal information on the internet in order to sign up or register for thousands of different possible things. This act has exposed themselves on the internet in ways some may not realize. This exposure is used in a bad way against that particular person. We regularly come across the news such as “LEAKED PHOTOS” & “LEAKED VIDEOS”. This is due to bad knowledge of computer ethics. Teens don’t know where to draw a line & that is a root cause of this. Lack of computer ethics will definitely lead to Child pornography. Let me take a few moments to explain you all about it.

Child pornography is pornography that exploits children for sexual gratification. Abuse of the child occurs during the sexual acts which are recorded in the production of child pornography. Digital cameras and Internet distribution facilitated by the use of credit cards and the ease of transferring images across national borders has made it easier than ever before for users of child pornography to obtain the photographs and videos.
I hope we all have understood now that what computer ethics is and how can its lack of knowledge prove to be harmful for our children and our future. I will now conclude my speech by appealing to you all that please join me in my advocacy to fight against child pornography. This isn’t my individual fight but it is our fight to save our country’s future.
Let us all end these threats & take an oath of teaching our younger minds about Computer Ethics.

Thanks a lot for allowing me to share my views,
Have a great future!

BIBLIOGRAPHY:
https://www.blackwellpublishing.com/content/BPL_Images/Content_store/Sample_chapter/9781855548442/CEAC01.pdf
http://www.kean.edu/~schandle/Students/LNerilo/what%20is%20cyberbullying.htm
http://www.pbs.org/parents/childrenandmedia/article-protecting-kids-from-cyberbullying.html

Sunday, October 12, 2014

What is Computer Ethics

Once computers first started to be used in society in a broad way, the absence of ethical standards about their use and related issues induced some problems. Nevertheless, as their use became widespread in every aspect of our lives, discourses in computer ethics resulted in some kind of a consensus. Today, many of these rules have been forged as laws, either national or international. Computer crimes and computer fraud are now common terms. There are laws against them, and everyone is obligated for knowing what comprises computer crime and computer fraud. Computer Ethics is a part of functional philosophy which addresses how computing professionals should arrive at decisions regarding professional and social conduct. Ethics deals with placing a “value” on acts according to whether they are “good” or “bad”. Every society has its rules about whether certain acts are ethical or not. These rules have been established as a result of consensus in society and are often written into laws. The Ten Commandments of Computer Ethics were created in 1992 by the Computer Ethics Institute.
The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute and are as follows:
The Ten Commandments
·        Thou shall not use a computer in ways that may harm the people.
·        Thou shall not interfere with other people's computer work.
·        Thou shall not snoop around in other people's computer files.
·        Thou shall not use a computer to steal.
·        Thou shall not use a computer to bear false witness
·        Thou shall not copy or use proprietary software for which you have not paid.
·        Thou shall not use other people's computer resources without authorization or proper compensation.
·        Thou shall not appropriate other people's intellectual output.
·        Thou shall think about the social consequences of the program you are writing or the system you are designing.
·        Thou shall always use a computer in ways that ensure consideration and respect for your fellow humans.

To further elaborate on these commandments:
Commandment 1
Do not use a computer in ways that may harm other people.
Explanation: This commandment says that it is unethical to use a computer to harm another user. It is not limited to physical injury. It includes harming or corrupting other users' data or files. The commandment states that it is wrong to use a computer to steal someone's personal information. Manipulating or destroying files of other users is ethically wrong. It is unethical to write programs, which on execution lead to stealing, copying or gaining unauthorized access to other users' data. Being involved in practices like hacking, spamming, phishing or cyber bullying does not conform to computer ethics.
Commandment 2
Do not use computer technology to cause interference in other users' work.
Explanation: Computer software can be used in ways that disturb other users or disrupt their work. Viruses, for example, are programs meant to harm useful computer programs or interfere with the normal functioning of a computer. Malicious software can disrupt the functioning of computers in more ways than one. It may overload computer memory through excessive consumption of computer resources, thus slowing its functioning. It may cause a computer to function wrongly or even stop working. Using malicious software to attack a computer is unethical.
Commandment 3
Do not spy on another person's computer data.
Explanation: We know it is wrong to read someone's personal letters. On the same lines, it is wrong to read someone else's email messages or files. Obtaining data from another person's private files is nothing less than breaking into someone's room. Snooping around in another person's files or reading someone else's personal messages is the invasion of his privacy. There are exceptions to this. For example, spying is necessary and cannot be called unethical when it is done against illegitimate use of computers. For example, intelligence agencies working on cybercrime cases need to spy on the internet activity of suspects.
Commandment 4
Do not use computer technology to steal information.
Explanation: Stealing sensitive information or leaking confidential information is as good as robbery. It is wrong to acquire personal information of employees from an employee database or patient history from a hospital database or other such information that is meant to be confidential. Similarly, breaking into a bank account to collect information about the account or account holder is wrong. Illegal electronic transfer of funds is a type of fraud. With the use of technology, stealing of information is much easier. Computers can be used to store stolen information.
Commandment 5
Do not contribute to the spread of misinformation using computer technology.
Explanation: Spread of information has become viral today, because of the Internet. This also means that false news or rumors can spread speedily through social networking sites or emails. Being involved in the circulation of incorrect information is unethical. Mails and pop-ups are commonly used to spread the wrong information or give false alerts with the only intent of selling products. Mails from untrusted sources advertising certain products or spreading some hard-to-believe information are not uncommon. Direct or indirect involvement in the circulation of false information is ethically wrong.
Commandment 6
Refrain from copying software or buying pirated copies. Pay for software unless it is free.
Explanation: Like any other artistic or literary work, software is copyrighted. A piece of code is the original work of the individual who created it. It is copyrighted in his name. In case of a developer writing software for the organization he works for, the organization holds the copyright for it. Copyright holds true unless its creators announce it is not. Obtaining illegal copies of copyrighted software is unethical.
Commandment 7
Do not use someone else's computer resources unless authorized to.
Explanation: Multi-user systems have user specific passwords. Breaking into some other user's password, thus intruding his private space is unethical. It is not ethical to hack passwords for gaining unauthorized access to a password-protected computer system. Accessing data that you are not authorized to access or gaining access to another user's computer without his permission is not ethical.
Commandment 8
It is wrong to claim ownership on a work which is the output of someone else's intellect.
Explanation: Programs developed by a software developer are his/her property. If he is working with an organization, they are the organization's property. Copying them and propagating them in one's own name is unethical. This applies to any creative work, program or design. Establishing ownership on a work which is not yours is ethically wrong.
Commandment 9
Before developing software, think about the social impact it can have.
Explanation: Looking at the social consequences that a program can have, describes a broader perspective of looking at technology. A computer software on release, reaches millions. Software like video games and animations or educational software can have a social impact on their users. When working on animation films or designing video games, for example, it is the programmer's responsibility to understand his target audience/users and the effect it may have on them. For example, a computer game for kids should not have content that can influence them negatively. Similarly, writing malicious software is ethically wrong. A software developer/development firm should consider the influence their code can have on the society at large.
Commandment 10
In using computers for communication, be respectful and courteous with the fellow members.
Explanation: The communication etiquette we follow in the real world applies to communication over computers as well. While communicating over the Internet, one should treat others with respect. One should not intrude others' private space, use abusive language, make false statements or pass irresponsible remarks about others. One should be courteous while communicating over the web and should respect others' time and resources. Also, one should be considerate with a novice computer user.
C Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has classified the ethical decisions linked to computer technology and usage into 3 primary influences:
1. The individual's own personal code.
2. Any informal code of ethical conduct that exists in the work place.
3. Exposure to formal codes of ethics.
 To understand the foundation of computer ethics, it is important to look into the different schools of ethical theory. Each school of ethics influences a situation in a certain direction and pushes the final outcome of ethical theory. The theories are as follows:
Relativism is the belief that there are no universal moral norms of right and wrong. In the school of relativistic ethical belief, ethicists divide it into three connected but different structures, subject (Moral) and culture (Anthropological). Moral relativism is the idea that each person decides what is right and wrong for them. Anthropological relativism is the concept of right and wrong is decided by a society’s actual moral belief structure.

Deontology is the belief that people’s actions are to be guided by moral laws, and that these moral laws are universal. The origins of Deontological Ethics are generally attributed to the German philosopher Immanuel Kant and his ideas concerning the Categorical Imperative. Kant believed that in order for any ethical school of thought to apply to all rational beings, they must have a foundation in reason. Kant split this school into two categorical imperatives. The first categorical imperative states to act only from moral rules that you can at the same time will to be universal moral laws. The second categorical imperative states to act so that you always treat both yourself and other people as ends in themselves, and never only as a means to an end.

Utilitarianism is the belief that if an action is good it benefits someone and an action is bad if it harms someone. This ethical belief can be broken down into two different schools, Act Utilitarianism and Rule Utilitarianism. Act Utilitarianism is the belief that an action is good if its overall effect is to produce more happiness than unhappiness. Rule Utilitarianism is the belief that we should adopt a moral rule and if followed by everybody, would lead to a greater level of overall happiness.

Social contract is the concept that for a society to arise and maintain order, a morality based set of rules must be agreed upon. Social contract theory has influenced modern government and is heavily involved with societal law. Philosophers like John Rawls, Thomas Hobbes, John Locke, and Jean-Jacques Rousseau (jow jack rusu) helped created the foundation of social contract.

Virtue Ethics is the belief that ethics should be more concerned with the character of the moral agent (virtue), rather than focusing on a set of rules dictating right and wrong actions, as in the cases of deontology and utilitarianism, or a focus on social context, such as is seen with Social Contract ethics. Although concern for virtue appears in several philosophical traditions, in the West the roots of the tradition lie in the work of Plato and Aristotle, and even today the tradition’s key concepts derive from ancient Greek philosophy.

The conceptual foundations of computer ethics are investigated by information ethics, a branch of philosophical ethics established by Luciano Floridi. The term computer ethics was first coined by Dr. Walter Maner, a professor at Bowling Green State University. Since the 1990s the field has started being integrated into professional development programs in academic settings.
Computer ethics has a rich history and is influenced by different ethical theories. It was derived out of a need to protect computer users and to promote respect for all users of Cyberspace. If the codes of ethics or commandments of computer ethics are observed then there can be a more harmonious relationship among users of the internet.

Bibliography

WikiPedia
Bynum, Terrell Ward. "The Foundation of Computer Ethics," Computers and Society, June 2000.
Stephen Haag, Maeve Cummings and Donald J. McCubbrey. Management Information Systems: For the Information Age, 4th ed. New York, NY: McGraw-Hill, 2003.
Deborah G. Johnson, Computer Ethics, 3rd ed. Upper Saddle River, NJ: Prentice Hall, 2001.
Per Arne Godejord, "Getting Involved: Perspectives on the Use of True Projects as Tools for Developing Ethical Thinking in Computer Science Students," International Journal of Technology and Human Interaction 4.2 (2008):22-34.
Luciano Floridi. "Information Ethics: On the Theoretical Foundations of Computer Ethics", Ethics and Information Technology 1.1 (1999):37-56.
Martin, C. Dianne and Weltz, Elaine Yale, "From Awareness to Action: Integrating Ethics and Social Responsibility into the Computer Science Curriculum," Computers and Society, June 1999.
Herman T. Tavani. Ethics & Technology: Ethical Issues in an Age of Information and Communication Technology. Hoboken, NJ: John Wiley and Sons, Inc., 2004.
Giannis Stamatellos, Computer Ethics: A Global Perspective, Jones and Bartlett Publishers, 2007.
Michael J. Quinn. Ethics for the Information Age, 4th ed. Boston, MA: Addison-Wesley, 2011.
Barbara MacKinnon. Ethics: Theory and Contemporary Issues, 7th ed. Belmont, CA: Wadsworth Publishing Co, 2011.
Short History of Computer Ethics - A condensed history of computer ethic