Sunday, October 12, 2014

What is Computer Ethics

Once computers first started to be used in society in a broad way, the absence of ethical standards about their use and related issues induced some problems. Nevertheless, as their use became widespread in every aspect of our lives, discourses in computer ethics resulted in some kind of a consensus. Today, many of these rules have been forged as laws, either national or international. Computer crimes and computer fraud are now common terms. There are laws against them, and everyone is obligated for knowing what comprises computer crime and computer fraud. Computer Ethics is a part of functional philosophy which addresses how computing professionals should arrive at decisions regarding professional and social conduct. Ethics deals with placing a “value” on acts according to whether they are “good” or “bad”. Every society has its rules about whether certain acts are ethical or not. These rules have been established as a result of consensus in society and are often written into laws. The Ten Commandments of Computer Ethics were created in 1992 by the Computer Ethics Institute.
The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute and are as follows:
The Ten Commandments
·        Thou shall not use a computer in ways that may harm the people.
·        Thou shall not interfere with other people's computer work.
·        Thou shall not snoop around in other people's computer files.
·        Thou shall not use a computer to steal.
·        Thou shall not use a computer to bear false witness
·        Thou shall not copy or use proprietary software for which you have not paid.
·        Thou shall not use other people's computer resources without authorization or proper compensation.
·        Thou shall not appropriate other people's intellectual output.
·        Thou shall think about the social consequences of the program you are writing or the system you are designing.
·        Thou shall always use a computer in ways that ensure consideration and respect for your fellow humans.

To further elaborate on these commandments:
Commandment 1
Do not use a computer in ways that may harm other people.
Explanation: This commandment says that it is unethical to use a computer to harm another user. It is not limited to physical injury. It includes harming or corrupting other users' data or files. The commandment states that it is wrong to use a computer to steal someone's personal information. Manipulating or destroying files of other users is ethically wrong. It is unethical to write programs, which on execution lead to stealing, copying or gaining unauthorized access to other users' data. Being involved in practices like hacking, spamming, phishing or cyber bullying does not conform to computer ethics.
Commandment 2
Do not use computer technology to cause interference in other users' work.
Explanation: Computer software can be used in ways that disturb other users or disrupt their work. Viruses, for example, are programs meant to harm useful computer programs or interfere with the normal functioning of a computer. Malicious software can disrupt the functioning of computers in more ways than one. It may overload computer memory through excessive consumption of computer resources, thus slowing its functioning. It may cause a computer to function wrongly or even stop working. Using malicious software to attack a computer is unethical.
Commandment 3
Do not spy on another person's computer data.
Explanation: We know it is wrong to read someone's personal letters. On the same lines, it is wrong to read someone else's email messages or files. Obtaining data from another person's private files is nothing less than breaking into someone's room. Snooping around in another person's files or reading someone else's personal messages is the invasion of his privacy. There are exceptions to this. For example, spying is necessary and cannot be called unethical when it is done against illegitimate use of computers. For example, intelligence agencies working on cybercrime cases need to spy on the internet activity of suspects.
Commandment 4
Do not use computer technology to steal information.
Explanation: Stealing sensitive information or leaking confidential information is as good as robbery. It is wrong to acquire personal information of employees from an employee database or patient history from a hospital database or other such information that is meant to be confidential. Similarly, breaking into a bank account to collect information about the account or account holder is wrong. Illegal electronic transfer of funds is a type of fraud. With the use of technology, stealing of information is much easier. Computers can be used to store stolen information.
Commandment 5
Do not contribute to the spread of misinformation using computer technology.
Explanation: Spread of information has become viral today, because of the Internet. This also means that false news or rumors can spread speedily through social networking sites or emails. Being involved in the circulation of incorrect information is unethical. Mails and pop-ups are commonly used to spread the wrong information or give false alerts with the only intent of selling products. Mails from untrusted sources advertising certain products or spreading some hard-to-believe information are not uncommon. Direct or indirect involvement in the circulation of false information is ethically wrong.
Commandment 6
Refrain from copying software or buying pirated copies. Pay for software unless it is free.
Explanation: Like any other artistic or literary work, software is copyrighted. A piece of code is the original work of the individual who created it. It is copyrighted in his name. In case of a developer writing software for the organization he works for, the organization holds the copyright for it. Copyright holds true unless its creators announce it is not. Obtaining illegal copies of copyrighted software is unethical.
Commandment 7
Do not use someone else's computer resources unless authorized to.
Explanation: Multi-user systems have user specific passwords. Breaking into some other user's password, thus intruding his private space is unethical. It is not ethical to hack passwords for gaining unauthorized access to a password-protected computer system. Accessing data that you are not authorized to access or gaining access to another user's computer without his permission is not ethical.
Commandment 8
It is wrong to claim ownership on a work which is the output of someone else's intellect.
Explanation: Programs developed by a software developer are his/her property. If he is working with an organization, they are the organization's property. Copying them and propagating them in one's own name is unethical. This applies to any creative work, program or design. Establishing ownership on a work which is not yours is ethically wrong.
Commandment 9
Before developing software, think about the social impact it can have.
Explanation: Looking at the social consequences that a program can have, describes a broader perspective of looking at technology. A computer software on release, reaches millions. Software like video games and animations or educational software can have a social impact on their users. When working on animation films or designing video games, for example, it is the programmer's responsibility to understand his target audience/users and the effect it may have on them. For example, a computer game for kids should not have content that can influence them negatively. Similarly, writing malicious software is ethically wrong. A software developer/development firm should consider the influence their code can have on the society at large.
Commandment 10
In using computers for communication, be respectful and courteous with the fellow members.
Explanation: The communication etiquette we follow in the real world applies to communication over computers as well. While communicating over the Internet, one should treat others with respect. One should not intrude others' private space, use abusive language, make false statements or pass irresponsible remarks about others. One should be courteous while communicating over the web and should respect others' time and resources. Also, one should be considerate with a novice computer user.
C Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has classified the ethical decisions linked to computer technology and usage into 3 primary influences:
1. The individual's own personal code.
2. Any informal code of ethical conduct that exists in the work place.
3. Exposure to formal codes of ethics.
 To understand the foundation of computer ethics, it is important to look into the different schools of ethical theory. Each school of ethics influences a situation in a certain direction and pushes the final outcome of ethical theory. The theories are as follows:
Relativism is the belief that there are no universal moral norms of right and wrong. In the school of relativistic ethical belief, ethicists divide it into three connected but different structures, subject (Moral) and culture (Anthropological). Moral relativism is the idea that each person decides what is right and wrong for them. Anthropological relativism is the concept of right and wrong is decided by a society’s actual moral belief structure.

Deontology is the belief that people’s actions are to be guided by moral laws, and that these moral laws are universal. The origins of Deontological Ethics are generally attributed to the German philosopher Immanuel Kant and his ideas concerning the Categorical Imperative. Kant believed that in order for any ethical school of thought to apply to all rational beings, they must have a foundation in reason. Kant split this school into two categorical imperatives. The first categorical imperative states to act only from moral rules that you can at the same time will to be universal moral laws. The second categorical imperative states to act so that you always treat both yourself and other people as ends in themselves, and never only as a means to an end.

Utilitarianism is the belief that if an action is good it benefits someone and an action is bad if it harms someone. This ethical belief can be broken down into two different schools, Act Utilitarianism and Rule Utilitarianism. Act Utilitarianism is the belief that an action is good if its overall effect is to produce more happiness than unhappiness. Rule Utilitarianism is the belief that we should adopt a moral rule and if followed by everybody, would lead to a greater level of overall happiness.

Social contract is the concept that for a society to arise and maintain order, a morality based set of rules must be agreed upon. Social contract theory has influenced modern government and is heavily involved with societal law. Philosophers like John Rawls, Thomas Hobbes, John Locke, and Jean-Jacques Rousseau (jow jack rusu) helped created the foundation of social contract.

Virtue Ethics is the belief that ethics should be more concerned with the character of the moral agent (virtue), rather than focusing on a set of rules dictating right and wrong actions, as in the cases of deontology and utilitarianism, or a focus on social context, such as is seen with Social Contract ethics. Although concern for virtue appears in several philosophical traditions, in the West the roots of the tradition lie in the work of Plato and Aristotle, and even today the tradition’s key concepts derive from ancient Greek philosophy.

The conceptual foundations of computer ethics are investigated by information ethics, a branch of philosophical ethics established by Luciano Floridi. The term computer ethics was first coined by Dr. Walter Maner, a professor at Bowling Green State University. Since the 1990s the field has started being integrated into professional development programs in academic settings.
Computer ethics has a rich history and is influenced by different ethical theories. It was derived out of a need to protect computer users and to promote respect for all users of Cyberspace. If the codes of ethics or commandments of computer ethics are observed then there can be a more harmonious relationship among users of the internet.

Bibliography

WikiPedia
Bynum, Terrell Ward. "The Foundation of Computer Ethics," Computers and Society, June 2000.
Stephen Haag, Maeve Cummings and Donald J. McCubbrey. Management Information Systems: For the Information Age, 4th ed. New York, NY: McGraw-Hill, 2003.
Deborah G. Johnson, Computer Ethics, 3rd ed. Upper Saddle River, NJ: Prentice Hall, 2001.
Per Arne Godejord, "Getting Involved: Perspectives on the Use of True Projects as Tools for Developing Ethical Thinking in Computer Science Students," International Journal of Technology and Human Interaction 4.2 (2008):22-34.
Luciano Floridi. "Information Ethics: On the Theoretical Foundations of Computer Ethics", Ethics and Information Technology 1.1 (1999):37-56.
Martin, C. Dianne and Weltz, Elaine Yale, "From Awareness to Action: Integrating Ethics and Social Responsibility into the Computer Science Curriculum," Computers and Society, June 1999.
Herman T. Tavani. Ethics & Technology: Ethical Issues in an Age of Information and Communication Technology. Hoboken, NJ: John Wiley and Sons, Inc., 2004.
Giannis Stamatellos, Computer Ethics: A Global Perspective, Jones and Bartlett Publishers, 2007.
Michael J. Quinn. Ethics for the Information Age, 4th ed. Boston, MA: Addison-Wesley, 2011.
Barbara MacKinnon. Ethics: Theory and Contemporary Issues, 7th ed. Belmont, CA: Wadsworth Publishing Co, 2011.
Short History of Computer Ethics - A condensed history of computer ethic


0 comments:

Post a Comment