Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Table of Contents

Introduction.................................................................................................................................................3

Scope.......................................................................................................................................................3

Computer Ethics..........................................................................................................................................4

Privacy Concerns.....................................................................................................................................4

Intellectual Property Rights.....................................................................................................................5

Conclusion...................................................................................................................................................7

Computer Ethics
REFERENCES............................................................................................................................................8
1 Introduction
A computer ethic is basically related to ethical concerns that arise when computers are utilized,
particularly when they are involved in activities empowered by computers. Using computer
technology raises a host of ethical issues that need to be assessed. Bowling Green State
University teacher Walter Maner coined the term 'computer ethics'. It has currently been defined
in many different ways by various people. Moor's definition is the most widely recognized
among these. He has written an article in which he presents a broadly applicable definition that
uses a broad range of terms. Considering Moor's definition of computer ethics, a focal
assignment requires us to determine how to apply for computer advances in situations where they
should be utilized, and how to ensure the follow-up of ethical practices (Payne and Landry,
2006). Defining computer ethics as an undertaking to examine nature and social implications of
computer technology, and compare detailed and supportive strategies for its ethical use, MOOR
refers to it as a philosophy. Computer ethics include that we should respect the client's privacy
and not make them feel as if they are at risk. Consider, for instance, not to sit idle while using
computers, not to meddle or abuse freely available data, not to keep an eye on others' privacy,
not to use computers so excessively that it gets in the way of your health, and not to have a
concern about your prosperity when using computers. A vocation in ethics includes maintaining
security and different secrets, distributing or uncovering them without confusing others based on
their color, religion, and belief. An ethical approach to computer use is to use it responsibly
(Bakardjieva and kimmel, 2017). By observing laws crafted by experts for the use of
frameworks, for example, not getting rid of freely accessible equipment like computers in
college labs.

1.1 Scope
In our everyday lives, computer ethics play a significant role. With the current trend toward
digitization and the rise of online administrations, it has never been more crucial than now to
safeguard one's own information and the simplest way to do that is by following computer ethics
carefully. To protect personal and business information, such as login and secret password
information, Visa data, and information databases of the government and business, computer
ethics are necessary. In these ethical rules, for example, counterfeiting, extortion of characters
from an understudy, use of copyrighted material, and so on are forbidden. Furthermore, ethics
can be used to encourage social and ethical character in the public sphere. Due to expanded
innovative changes, modern uses, and connections in everyday life, computer ethics are building
a square by the current square of social ethics.

Cybercrimes have been diminished significantly as the result of applying computer ethics
throughout our lives. It will not just dissuade cybercrimes and illicit activities in the event that
everyone follows the guidelines of safe computer utilization, however, it would be a lot safer for
individuals to perform their day-by-day tasks using technology. Furthermore, it will ensure that
digitization is invited into every new sphere of life, and we will be able to make use of the
amazing advances in computer technology to solve complex problems without having to worry
about the consequences.

2 Computer Ethics
Computing ethics refers to the use of computers governed by moral standards. Societies' attitudes
toward computers, both hardware and software, are reflected in these attitudes. A computer
ethics expert can provide insight into issues such as intellectual property rights, privacy, and
societal impacts of computers.

Intellectual
property

Privacy Computer Proper


concerns
ethics plan

Mischief
abondon

2.1 Privacy Concerns


 An unauthorized person gains access to a computer or network through hacking. A
hacker can gain access to another computer by hacking into a system or network with
insufficient security.
 Malware - is software that attacks computer systems in an effort to cause damage. Some
examples of malware are viruses, worms, Trojan horses, and spyware. When spyware is
installed on a computer, it can collect data from the hard drive (Tavani, 2003).
 Both Information Privacy and Data Protection represent protecting personal information
and ensuring a balance between individual privacy rights and allowing data to be used for
business purposes.
 In various applications, anonymity is used to mask the identity of a user.

2.2 Intellectual Property Rights


 Intellectual property, such as copyright, gives the owners exclusive rights to publish,
distribute, and use their creations. In this case, any ideas created by the author cannot be
used or disseminated without written permission from the author.
 Plagiarism occurs when a person copies and publishes another person's work without
giving proper attribution (Dorr, 2018). This is the same as stealing someone else's work
and reselling it.
 By getting past the system's security features, cracking enables one to break into a
system. During software installation, this method allows you to skip the registration and
authentication steps.
 By following the license agreement, it is possible to use digital material. Ownership of
the material remains with the original creator, only licenses are granted to users based on
the agreement.

Despite being aware of computer ethics, even ICT professionals did not know how to use them.
Despite their differing opinions regarding Internet and computer ethics, they all emphasized the
need to follow ethics while using both. Participants interpreted computer ethics as Internet ethics,
according to the data (Hollander, 2010). They also demonstrated the concept of computer ethics
by engaging in unethical computer behaviors such as using unlicensed software, copying files or
programmes without authorization, showing disrespect for other people's work, accessing secret
or personal information of individuals and publishing it on the Internet without authorization,
showing disrespect while communicating on the Internet, unauthorized reading or downloading
of others' files and e-mails, and visiting other people's computers. In spite of the fact that all
participants were graduates of computer science departments and were working in privileged
information technology positions as teachers or software specialists, none of them could
adequately describe the concept of computer ethics. They instead used examples of unethical
behavior to demonstrate the concept rather than define it. They might have been oblivious to
computer ethics because they did not take undergraduate courses related to them. It might be
helpful for them to study formal education about ethical practices and implications for computer
ethics, and to come up with better ethical solutions. Undergraduate computer science programs
might benefit from offering a computer ethics course as a mandatory requirement. To prevent
unethical computer and Internet use, it was suggested that a number of ethical principles be
developed. Aside from that, they requested improved education and training on computer ethics,
as well as a greater commitment to supporting academic endeavors focused on computer ethics.
It has been proposed quite often to take legal precautions as well as personal precautions like
frequent backups, use of assistive programs, and the use of antivirus software programs.

The authors of Matthew and Whitman (2004) proposed that organizational administrators were
responsible for maintaining the security of secret information. By asking for principles of ethics
that should be taught to computer users, requesting additional training and education concerning
computer ethics, and asking for support to academic endeavors on computer ethics, the authors
demonstrated their high regard for education. Furthermore, participants paired computer ethics
with Internet ethics, which indicated that they did not look at computer ethics separately.
However, participants did not perceive computer as a technology that enabled them to access the
Internet, suggesting that they saw computer ethics and Internet ethics as sub-dimensions of the
same concept.

There have been a variety of occasions in history when the more precise term "computer ethics"
was used. A few adaptations of classical Western theory and laws, such as utilitarianism and
virtue ethics, are sufficient to answer ethical questions relating to computers and computer
networks. Additionally, the term "computer ethics" was used to refer to the professional norms
adhered to by software engineers within their field, such as ethical codes and standards of
behavior. In addition, terms like "cyber ethics" and "web ethics" were used to refer to computer
ethics concerns involving the Internet. Austrian cybernetics led Wiener to explain human nature,
society, and the purpose of human existence from a standpoint of information ethics, which he
did while developing a cybernetic understanding. The result was the development of "grand
principles of equality" that he felt should be followed by all communities (Congress, 1999). Due
to the solid ethical principles Wiener adhered to, he was able to research a variety of information
ethics issues. In the universe, everything arises, remains, and ultimately vanishes as a result of
the constant mixing and blending of information and matter-energy described by Wiener. Living
entities, such as humans, are essentially information structures that endure due to constant
exchanges between matter and energy.

An input, an outcome, and a logic process connected to the behavior of a computer can be used
to describe the operation of a computer logically. Computing technology appears to have an
unlimited number of possible applications since logic would apply everywhere. A machine can
be considered our closest tool to a universal instrument. However, the limitations of computers
can be attributed to our creativity. Cyber business has grown rapidly in recent years around the
globe. There have been economic gains among nations with adequate technology systems
already in place, while the rest of the world has lagged behind.

Conclusion
The importance of computer ethics in our everyday lives can't be overstated. The security of
one's very own information has become more critical in the present age, as everything is
digitized and online services are prevalent. The only way to do this is by adhering to computer
ethics thoroughly. Individual and business data, such as login and password data, charge card
and account information, and government and corporate data bases, are secured with computer
ethics. Literary piracy, misrepresenting characters of understudies, and utilizing copyrighted
materials are all prohibited under these ethics. As well as fostering good and social qualities
within the public arena, ethics can also be utilized for this purpose.
REFERENCES
Congress, U. S. (1999). Gramm-Leach-Bliley act, financial privacy rule.
http://www.ftc.gov/privacy/glbact/glbsub1.html

Mattord, H. J., & Whitman, M. E. (2004). Management of information security. Thomson


Course Technology.

Hollander, R. (2010). The ethics beat. Communications of the ACM, 53(3), 28-29.

Johnson, D. G. (2007, May). Computer professional ethics in theory and in practice. In 29th
International Conference on Software Engineering (ICSE'07 Companion) (pp. 4-5).
IEEE.

Payne, D., & Landry, B. J. (2006). A uniform code of ethics: Business and IT professional ethics.
Communications of the ACM, 49(11), 81-84.

Tavani, H. T. (2003). ETHICS AND TECHNOLOGY: Ethical Issues in an Age of Information


and Communication Technology (John Wiley & Sons, 2004). ACM SIGCAS Computers
and Society, 33(3), 1.

Dörr, K. (2018). Ethical Approaches to Computational Journalism. In the Routledge Handbook


of Developments in Digital Journalism Studies (pp. 313-323). Routledge.

Bakardjieva, E., & Kimmel, A. J. (2017). Neuromarketing research practices: attitudes, ethics,
and behavioral intentions. Ethics & Behavior, 27(3), 179-200.

You might also like