Once computers first started to be used in
society in a broad way, the absence of ethical standards about their use and
related issues induced some problems. Nevertheless, as their use became
widespread in every aspect of our lives, discourses in computer ethics resulted
in some kind of a consensus. Today, many of these rules have been forged as
laws, either national or international. Computer crimes and computer fraud are
now common terms. There are laws against them, and everyone is obligated for
knowing what comprises computer crime and computer fraud. Computer Ethics is a
part of functional philosophy which addresses how computing professionals
should arrive at decisions regarding professional and social conduct. Ethics
deals with placing a “value” on acts according to whether they are “good” or
“bad”. Every society has its rules about whether certain acts are ethical or
not. These rules have been established as a result of consensus in society and
are often written into laws. The Ten Commandments of Computer Ethics were
created in 1992 by the Computer Ethics Institute.
The Ten Commandments of computer ethics have
been defined by the Computer Ethics Institute and are as follows:
The Ten Commandments
·
Thou
shall not use a computer in ways that may harm the people.
·
Thou shall
not interfere with other people's computer work.
·
Thou
shall not snoop around in other people's computer files.
·
Thou
shall not use a computer to steal.
·
Thou
shall not use a computer to bear false witness
·
Thou
shall not copy or use proprietary software for which you have not paid.
·
Thou
shall not use other people's computer resources without authorization or proper
compensation.
·
Thou
shall not appropriate other people's intellectual output.
·
Thou
shall think about the social consequences of the program you are writing or the
system you are designing.
·
Thou
shall always use a computer in ways that ensure consideration and respect for
your fellow humans.
To further elaborate on these commandments:
Commandment 1
Do not use a computer in ways
that may harm other people.
Explanation: This commandment says that it is
unethical to use a computer to harm another user. It is not limited to physical
injury. It includes harming or corrupting other users' data or files. The
commandment states that it is wrong to use a computer to steal someone's
personal information. Manipulating or destroying files of other users is
ethically wrong. It is unethical to write programs, which on execution lead to
stealing, copying or gaining unauthorized access to other users' data. Being
involved in practices like hacking, spamming, phishing or cyber bullying does
not conform to computer ethics.
Commandment 2
Do not use computer technology to
cause interference in other users' work.
Explanation: Computer software can be used in
ways that disturb other users or disrupt their work. Viruses, for example, are
programs meant to harm useful computer programs or interfere with the normal
functioning of a computer. Malicious software can disrupt the functioning of
computers in more ways than one. It may overload computer memory through
excessive consumption of computer resources, thus slowing its functioning. It
may cause a computer to function wrongly or even stop working. Using malicious
software to attack a computer is unethical.
Commandment 3
Do not spy on another person's
computer data.
Explanation: We know it is wrong to read
someone's personal letters. On the same lines, it is wrong to read
someone else's email messages or files. Obtaining data from another person's
private files is nothing less than breaking into someone's room. Snooping
around in another person's files or reading someone else's personal messages is
the invasion of his privacy. There are exceptions to this. For example, spying
is necessary and cannot be called unethical when it is done against
illegitimate use of computers. For example, intelligence agencies working on
cybercrime cases need to spy on the internet activity of suspects.
Commandment 4
Do not use computer technology to
steal information.
Explanation: Stealing sensitive information
or leaking confidential information is as good as robbery. It is wrong to
acquire personal information of employees from an employee database or patient
history from a hospital database or other such information that is meant to be
confidential. Similarly, breaking into a bank account to collect information
about the account or account holder is wrong. Illegal electronic transfer of
funds is a type of fraud. With the use of technology, stealing of information
is much easier. Computers can be used to store stolen information.
Commandment 5
Do not contribute to the spread
of misinformation using computer technology.
Explanation: Spread of information has become
viral today, because of the Internet. This also means that false news or rumors
can spread speedily through social networking sites or emails. Being involved
in the circulation of incorrect information is unethical. Mails and pop-ups are
commonly used to spread the wrong information or give false alerts with the
only intent of selling products. Mails from untrusted sources advertising
certain products or spreading some hard-to-believe information are not
uncommon. Direct or indirect involvement in the circulation of false information
is ethically wrong.
Commandment 6
Refrain from copying software or
buying pirated copies. Pay for software unless it is free.
Explanation: Like any other artistic or
literary work, software is copyrighted. A piece of code is the original work
of the individual who created it. It is copyrighted in his name. In case of a
developer writing software for the organization he works for, the organization
holds the copyright for it. Copyright holds true unless its creators announce
it is not. Obtaining illegal copies of copyrighted software is unethical.
Commandment 7
Do not use someone else's
computer resources unless authorized to.
Explanation: Multi-user systems have user
specific passwords. Breaking into some other user's password, thus intruding
his private space is unethical. It is not ethical to hack passwords for gaining
unauthorized access to a password-protected computer system. Accessing data
that you are not authorized to access or gaining access to another user's
computer without his permission is not ethical.
Commandment 8
It is wrong to claim ownership on
a work which is the output of someone else's intellect.
Explanation: Programs developed by a software
developer are his/her property. If he is working with an organization, they are
the organization's property. Copying them and propagating them in one's own
name is unethical. This applies to any creative work, program or design.
Establishing ownership on a work which is not yours is ethically wrong.
Commandment 9
Before developing software, think
about the social impact it can have.
Explanation: Looking at the social
consequences that a program can have, describes a broader perspective of
looking at technology. A computer software on release, reaches millions.
Software like video games and animations or educational software can have a
social impact on their users. When working on animation films or designing
video games, for example, it is the programmer's responsibility to understand
his target audience/users and the effect it may have on them. For example, a
computer game for kids should not have content that can influence them
negatively. Similarly, writing malicious software is ethically wrong. A
software developer/development firm should consider the influence their code
can have on the society at large.
Commandment 10
In using computers for
communication, be respectful and courteous with the fellow members.
Explanation: The communication etiquette we
follow in the real world applies to communication over computers as well. While
communicating over the Internet, one should treat others with respect. One
should not intrude others' private space, use abusive language, make false
statements or pass irresponsible remarks about others. One should be courteous
while communicating over the web and should respect others' time and resources.
Also, one should be considerate with a novice computer user.
C Margaret Anne Pierce, a professor in the
Department of Mathematics and Computers at Georgia Southern University has
classified the ethical decisions linked to computer technology and usage into 3
primary influences:
1. The individual's own personal code.
2. Any informal code of ethical conduct that
exists in the work place.
3. Exposure to formal codes of ethics.
To
understand the foundation of computer ethics, it is important to look into the
different schools of ethical theory. Each school of ethics influences a
situation in a certain direction and pushes the final outcome of ethical theory.
The theories are as follows:
Relativism is the belief that there are no
universal moral norms of right and wrong. In the school of relativistic ethical
belief, ethicists divide it into three connected but different structures,
subject (Moral) and culture (Anthropological). Moral relativism is the idea
that each person decides what is right and wrong for them. Anthropological
relativism is the concept of right and wrong is decided by a society’s actual
moral belief structure.
Deontology is the belief that people’s
actions are to be guided by moral laws, and that these moral laws are
universal. The origins of Deontological Ethics are generally attributed to the
German philosopher Immanuel Kant and his ideas concerning the Categorical
Imperative. Kant believed that in order for any ethical school of thought to
apply to all rational beings, they must have a foundation in reason. Kant split
this school into two categorical imperatives. The first categorical imperative
states to act only from moral rules that you can at the same time will to be
universal moral laws. The second categorical imperative states to act so that
you always treat both yourself and other people as ends in themselves, and
never only as a means to an end.
Utilitarianism is the belief that if an
action is good it benefits someone and an action is bad if it harms someone.
This ethical belief can be broken down into two different schools, Act
Utilitarianism and Rule Utilitarianism. Act Utilitarianism is the belief that
an action is good if its overall effect is to produce more happiness than
unhappiness. Rule Utilitarianism is the belief that we should adopt a moral
rule and if followed by everybody, would lead to a greater level of overall
happiness.
Social contract is the concept that for a society
to arise and maintain order, a morality based set of rules must be agreed upon.
Social contract theory has influenced modern government and is heavily involved
with societal law. Philosophers like John Rawls, Thomas Hobbes, John Locke, and
Jean-Jacques Rousseau (jow jack rusu) helped created the foundation of social
contract.
Virtue Ethics is the belief that ethics
should be more concerned with the character of the moral agent (virtue), rather
than focusing on a set of rules dictating right and wrong actions, as in the
cases of deontology and utilitarianism, or a focus on social context, such as
is seen with Social Contract ethics. Although concern for virtue appears in
several philosophical traditions, in the West the roots of the tradition lie in
the work of Plato and Aristotle, and even today the tradition’s key concepts
derive from ancient Greek philosophy.
The conceptual foundations of computer ethics
are investigated by information ethics, a branch of philosophical ethics
established by Luciano Floridi. The term computer ethics was first coined by
Dr. Walter Maner, a professor at Bowling Green State University. Since the
1990s the field has started being integrated into professional development
programs in academic settings.
Computer ethics has a rich history and is influenced
by different ethical theories. It was derived out of a need to protect computer
users and to promote respect for all users of Cyberspace. If the codes of
ethics or commandments of computer ethics are observed then there can be a more
harmonious relationship among users of the internet.
Bibliography
WikiPedia
Bynum, Terrell Ward. "The Foundation of
Computer Ethics," Computers and Society, June 2000.
Stephen Haag, Maeve Cummings and Donald J.
McCubbrey. Management Information Systems: For the Information Age, 4th
ed. New York, NY: McGraw-Hill, 2003.
Deborah G. Johnson, Computer Ethics, 3rd ed.
Upper Saddle River, NJ: Prentice Hall, 2001.
Per Arne Godejord, "Getting Involved:
Perspectives on the Use of True Projects as Tools for Developing Ethical
Thinking in Computer Science Students," International Journal of
Technology and Human Interaction 4.2 (2008):22-34.
Luciano Floridi. "Information Ethics: On
the Theoretical Foundations of Computer Ethics", Ethics and Information
Technology 1.1 (1999):37-56.
Martin, C. Dianne and Weltz, Elaine Yale,
"From Awareness to Action: Integrating Ethics and Social Responsibility
into the Computer Science Curriculum," Computers and Society, June
1999.
Herman T. Tavani. Ethics & Technology:
Ethical Issues in an Age of Information and Communication Technology. Hoboken,
NJ: John Wiley and Sons, Inc., 2004.
Giannis Stamatellos, Computer Ethics: A
Global Perspective, Jones and Bartlett Publishers, 2007.
Michael J. Quinn. Ethics for the Information
Age, 4th ed. Boston, MA: Addison-Wesley, 2011.
Barbara MacKinnon. Ethics: Theory and
Contemporary Issues, 7th ed. Belmont, CA: Wadsworth Publishing Co, 2011.
Short History of Computer Ethics - A
condensed history of computer ethic