63
Prof. Moutasem Shafaamry Prof. Moutasem Shafaamry Computer Ethics Computer Ethics Advanced Web & Internet Security (AWS/AIS) Advanced Web & Internet Security (AWS/AIS) [email protected] [email protected]

Prof. Moutasem Shafaamry Computer Ethics Advanced Web & Internet Security (AWS/AIS) [email protected] [email protected]

Embed Size (px)

Citation preview

Prof. Moutasem ShafaamryProf. Moutasem Shafaamry

Computer EthicsComputer Ethics

Advanced Web & Internet Security (AWS/AIS)Advanced Web & Internet Security (AWS/AIS)

[email protected][email protected]

Computer EthicsComputer Ethics

Computer Ethics• What is ethical behavior?• How do we make ethical decisions?• Material from

– Ethical Decision Making and Information Technology by Kallman & Grillo

– Other Computer Ethics tutorials provided by internet and Univ. courses

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Ethical Decisions• Ethical decisions are made based on ethical

principles.• Ethical principles are ideas of behavior that are

commonly acceptable to society.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Why Should We Care About Ethics?• We make a number of ethical decisions daily.

• Some unethical decisions can put us on the wrong side of the law.

• Decisions can affect our career and reputation.

• Obliged to uphold the principles of the society in which we live.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Computer Ethics• Most experts agree that there is no special category of computer

ethics.

• There are ethical situations in which computers are involved.

• Capability of computers can lend a special character to the problem.

• Computer allows people to perform actions faster or to perform actions too difficult

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Three Phases of Ethical Decision Making

• Recognize the ethical problem exists.

• Attack the problem logically and consider alternative actions.

• Make decision on action to take based on ethical principles.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

What Affects Our Behavior?

• Drive for food, shelter and love - Biological Level

• Rules from government, religion, institution and the family - Societal Level

• Ethical considerations - Higher Level

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

How Do We Make an Ethical Decision?• Research the law

• Use guidelines

• Person’s rights

• Person’s duty

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Use Guidelines• Informal guidelines

• Formal guidelines

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Informal Guidelines• Are “Shushers” involved?

• The “Mom Test”

• The “TV Test”

• The “Smell TEST”

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Formal Guidelines• Corporate policy

• Corporate or professional codes

• Golden rule

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

ACM Code of Ethics and Professional Conduct• Contribute to the improvement of society and to the well-being of

human lives

• Take care not to harm others

• Speak the truth and merit trust

• Treat others with fairness

• Honor the intellectual property rights of others

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

ACM Code Cont.• Give proper credit when using the intellectual property of others

• Respect the right of privacy of individuals

• Honor confidentiality

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer EthicsTen Commandments of Computing - Computer Ethics Institute• Thou shall not use a computer to harm other people

• Thou shall not interfere with other people’s computer work

• Thou shall not snoop around in other people’s computer files

• Thou shall not use a computer to steal

• Thou shall not use a computer to bear false witness

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Ten Commandments - Continued• Thou shall not copy or use proprietary software for which you have

not paid

• Thou shall not use other people’s computer resources without authorization and proper compensation

• Thou shall not appropriate other people’s intellectual output

• Thou shall think about the social consequences of the program you are writing or the system you are designing

• Thou shall always use a computer in ways that show consideration and respect for your fellow humans

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Person’s Rights• The right to know

• The right to privacy

• The right to property

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Person’s Duty• To foster trust

• To act with integrity

• To be truthful

• To do justice

• To act with appropriate gratitude

• Make appropriate reparation

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer EthicsWhat Special Ethical Problems Involve Computers • Computers cause personal contact to be reduced

• Little time is available in making a decision

• Electronic information is easily changed

• Information more vunerable to unauthorized access

• Easy access to information

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Special Ethical Problems Cont.• An error in a program could be devastating

• Software piracy

– Public Domain Software

– Shareware

– Copyrighted Software

• Pornography

– Internet has no single authority

– Filtering Software such as Cyber Patrol

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

A 4-Step Process for Ethical Analysis and Decision Making

• Understand the situation - what are the ethical issues?• Isolate the major ethical dilemma.

– State it in the form: Should someone do or not do something?• Analyze the ethicality of doing or not doing the action.• Make a Defensible Ethical Decision.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

The Ethical Use of Computers

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

What are ethics?

• The rules of right and wrong behavior.

• Merriam-Webster defines ethics as “the principles of conduct governing an individual or group.”

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

The Three Categories of Ethics• Professional- usually defined by your employer of company; these

are general guidelines

• Social- defined by society

• Individual- defined by personal heritage and integral family values

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Information Ethics• Rules that define right and wrong behavior in the computing

professions.

• The basis of trust and cooperation among workers and organizations

• In most cases, these are defined by the “owner” of the computer.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Ethics vs. Laws• Ethics often precede laws.

• Laws exist to protect software developers (copyright and licensing) and users (privacy) and there are punishments for breaking the law.

• There are no “global punishments” for ethics violations.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Copyrights• The right of an author to copy, resell, lease, lend, rent and or

distribute material. Copyrights did not exist when software was first being developed.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer EthicsFederal Digital Millennium Copyright Act (DMCA)• The copyright law that is currently in effect.

• Any software or data created with a computer is owned by its creator and is automatically copyrighted as soon as it is has been recorded and is in “tangible” form.

• Without specific permission, it is illegal to copy software.

• Software designed by an employee is owned by the company.

• Just because a work does not display the © symbol, does not mean that it is not copyrighted.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Copyright Scenario• Dema just purchased a new game for her computer. Bill loves the

game and wants a copy, but he cannot afford it. Bill asks Dema if he can borrow the CD and load the game on his computer. Is this all right under current copyright laws?

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Solution….• Copyright allows the owner of the copyright to "distribute or

lend" the program. Dema does not own the copyright; she owns a copy of the program sold to her by the copyright owner. She cannot lend it to Bill to load on his machine. If Dema would read her “License Agreement,” she would know exactly what is right and wrong regarding copying the software.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Software Licensing• License agreements are contracts between the purchaser and

copyright owner.

• Many software companies offer site licenses or special licenses for companies, schools or government institutions.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Little Know Factoid• When you buy software, you're not buying the software itself. You're

buying permission to use the software. The permission you buy is called a license (like a hunting license or a driver’s license) and is defined by a license agreement that comes with the software. Usually the license agreement is printed in tiny type on the back of the box or on a piece of paper shrink-wrapped with the box. I think most people never read it (it's full of legalese and usually takes a magnifying glass to see clearly). However, I think most of us have seen the sticker on the box that says something like, "Breaking this seal means you agree to the terms of the license."

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Four Types of Software Licenses• public domain

• freeware

• shareware

• "all rights reserved"

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Public Domain• Public domain software is not protected by copyright law; it is

software that was either created with public funds (and is therefore already owned by the public) or the creator has forfeited these rights to the public. Public domain software is pretty rare and is often unreliable (i.e., poor quality, virus-laden) since nobody's keeping track of it. The only public-domain software products I've ever really wanted were a few graphics and fonts.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Freeware• Freeware is copyrighted software that is licensed to be

copied and distributed without charge. Some freeware (Pegasus Mail, Eudora Light, Netscape, Internet Explorer, etc.) is really good stuff, but it's not in the public domain. That is, freeware is free only because its license says it is; the software is still under the owner's control. Thus, most freeware licenses prohibit the sale or modification of the software without the owner's permission, and they often limit the groups that are able to get the software without paying.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Shareware• Shareware is the same as freeware, except that the owner stipulates a

purchase fee for permanent use. That is, the software is licensed for copying and sharing without charge, but only for evaluation purposes. Anyone who decides to use the software long-term is to pay a specified fee to the owner. There is usually no official system for collecting these fees; users are expected to pay on their own (honor system) in exchange for documentation, a more powerful version of the software, or some other enticement. More and more shareware is programmed to turn itself off after a certain period of time (30 days is typical) unless the owner buys a special activation code from the copyright owner. Most of the “free” software in the world is actually shareware.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer EthicsSoftware license with all rights reserved• Licensed only for use by purchasers. Almost all the really good stuff

(Word, Oracle, Java, PhotoShop, Windows 2000, etc.) is licensed this way. You can't legally use it or even possess it without the owner's permission, usually defined very carefully in the license agreement.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Typical License Agreement• You can install and operate the software on only one PC at a time.

• You can make only one back-up copy of the software.

• If you give the software to anyone, you also give up permission to use the software.

• You are not to modify the software in any way.

• The software is not represented as fit for any particular purpose. (Yep—even if the box says "Do your taxes faster than ever," you cannot legally assume the software is fit for doing your taxes). This is to keep you from suing the company if their software wrecks your life.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Software Piracy• The illegal copying of software

• The estimated loss due to piracy is approximately $39 billion per year globally.

• Conviction on the first offense can result in a fine of up to $250,000 and a jail sentence of up to five years. (Bowyer, Ethics & Computing, 1996)

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Scenario• A student is working on a class assignment. The

student doesn’t have the specific software used at school, so she asks her teacher to let her take a copy of the software home. Is this ethical?

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Solution• Since the software is licensed to the

school, this is not legal or ethical.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

• Ethically and legally, society should recognize that individuals creating “intellectual property” have the right to receive credit and be protected from the incorrect use of their creations.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Intellectual Property• The result of intellectual activities in the arts,

science and industry (Beekman, Computer Confluence, Prentice Hall, 2001) and as such is the property of the creator.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Fair Use• provisions that let you paraphrase or quote small portions of

someone else’s work, provided that you give proper credit to the author for the material you use

• If you don’t give credit, you will probably give at least some of your readers the impression that the material you borrowed originated with you. That’s bad. It’s so bad, it has a name, plagiarism, and it’s a form of fraud.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Giving Credit• Add an in-text reference to the author and publication year of the

work used right after the borrowed material in the paper.

• Add a full citation of the work (author, title, publisher, publication year, etc.) at the end of your paper.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Electronic Information• More and more information is available via CD-

ROMs, the Worldwide Web, online databases, and other electronic communication channels

• Quoting and citing information is just as important with computer sources as with traditional written works. Even though computers and the Internet allow easy access for cutting and pasting items, it is considered plagiarism when the creator has not given permission and/or been given credit for his/her work.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Misuse of Information• When using intellectual property, it should be used in the context

originally intended and presented correctly so the meaning is not changed from the original intent.

• Blatant misuse of information in which the user knows he/she is plagiarizing but chooses to use the information anyway is an example of fraud. The Merriam-Webster's Collegiate Dictionary defines fraud as "the act of deceiving or misrepresenting" (Merriam-Webster, Inc. http://www.m-w.com/cgi-bin/dictionary, "fraud", 2001). Accidental plagiarism is a form of negligence. Negligence occurs when an individual is unaware or ignorant that he/she has misused intellectual property. Both fraud and negligence are ethically wrong and illegal.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Scenario• Ralph Williams wrote a paper for his Geography class about the

Grand Teton Mountains. He found some information on the web that worked well into his paper. He did not intend to claim the information as his own but he did not mention in his paper where he got the information. Is this okay?

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Solution• He should have quoted the material and then reference the

site from which the material was taken. This is true even when the material used is found on the World Wide Web.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Privacy• Information can be categorized as that which is public and

that which is private.

• Public information is assumed to be able to be used without permission.

• Private information cannot be legally used without permission from its owner.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

A Difficult BalancePublic Info. About You

• full name

• home address

• phone number

• debts you owe

• court judgments against you

• and police actions relating to you

• courses you’ve taken

Private Info. About You

• grades in specific courses

• medical records

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Inappropriate Use of E-mail• Spamming

• Flaming

• Trolling

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Spamming• Bulk, mass, or repeated posting or mailing of substantially identical

messages. The emphasis is on the multiple sending, either many copies to one destination, or one copy to many destinations. (Kevin Kadow, Internet Dictionary, http://www.msg.net/kadow/answers/, "spam", 1994 )

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Flaming• A public post or email message that expresses a strong

opinion or criticism. Flames can be fun when they allow people to vent their feelings, then return to the topic at hand. Others are simply insulting and can lead to flame wars. (Albion.com, Netdictionary, http://www.netdictionary.com/html/index.html, "flame", 2000 )

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Trolling (also known as flame bait)• An inflammatory post that is designed to provoke a flame

war or flame responses. (Albion.com, Netdictionary, http://www.netdictionary.com/html/index.html, "flame bait", 2000 ) Trolling is basically sending messages that contain statements intending to bait an argument or confrontation.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

• Messages that continue after the recipient asks that they stop are defined as a nuisance and are illegal. Nuisance messages that are threatening or intimidating are termed harassment and are even more illegal. It's interesting to note that nuisances and harassment are defined by the messages' receiver, not by the sender. That is, if you ask me to stop sending you messages, I have to even if I don't think there's anything wrong with my messages.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Acceptable Use Policy (AUP)• outlines what types of uses are acceptable and which are

prohibited• although a particular institution’s AUP will be unique, most

have the following three categories (see next slides for more info) defining rights and responsibilities in using equipment in a legal and ethical manner

• legal documents that should be understood and followed

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Personal Computer Files (documents)• Storage location

• Storage space allocation

• Types of files allowed

• Printable items and quantity

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Personal and Private Information• Sharable information

• E-mail and personal file privacy

• Monitoring on-line activities

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Scenario• Ben Flying Eagle is finished with his assignment for the day so he

wants to get on Yahoo to chat with his friend in another class. The school’s AUP states that chat is not allowed on school computers because too many unsafe situations occur in chat rooms. Ben isn’t planning to use a public chat room, he just wants to have a private conversation with his friend. Is he breaking the school’s AUP if he chats with his friend? Is he breaking the school’s AUP if he uses Instant Messaging instead of Yahoo Chat?

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Solution• If the AUP does not differentiate between public

and private chat, chatting is not allowed.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

Code of Ethics• Many professional organizations have developed codes of ethics,

which have been widely adopted as the “basic” code for many companies and universities. While the professional codes of ethics have slight differences in emphasis, they are in agreement on general principles.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer EthicsCode of Ethics at Colleges and Universities• Many higher institutions of learning also maintain a code of ethics.

Usually, one of the sections deals specifically to plagiarism of Intellectual Property at the college or university.

Computer Ethics _MWS/MWT M.Shafaamry

Computer EthicsComputer Ethics

• “We cannot count on the legal system to be a complete and correct guide to moral behavior, either for us as individuals in society or as members of a profession. Nor can we expect the professional codes of ethics to be complete, consistent and correct for all situations. There is no formal monitoring for compliance and little penalty that can be assessed against violators. Goodness cannot be defined through a legalistic enumeration of dos and don’ts. People must be able to use their internal sense of ethics to fill the holes and resolve the conflicts that inevitably occur when following any code of ethics”

(Bowyer, Ethics & Computing, Computer Society Press, 1996).

Computer Ethics _MWS/MWT M.Shafaamry