Ethical Issues in Computing and Information Technology
This document discusses several major ethical issues in information technology and computing:
1. Personal privacy - Maintaining privacy and integrity of user data while allowing data sharing over networks.
2. Access rights - Unauthorized access to networks and data is a concern, especially with increased internet usage.
3. Harmful actions - Damage to IT systems through viruses or other attacks can result in lost data and resources.
4. Intellectual property - Laws around copyright, patents, trademarks are important to protect creations and inventions in the digital world. Piracy is also discussed.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
179 views20 pages
Ethical Issues in Computing and Information Technology
This document discusses several major ethical issues in information technology and computing:
1. Personal privacy - Maintaining privacy and integrity of user data while allowing data sharing over networks.
2. Access rights - Unauthorized access to networks and data is a concern, especially with increased internet usage.
3. Harmful actions - Damage to IT systems through viruses or other attacks can result in lost data and resources.
4. Intellectual property - Laws around copyright, patents, trademarks are important to protect creations and inventions in the digital world. Piracy is also discussed.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20
Ethical Issues in Computing
and Information Technology
Some of the major ethical issues faced by Information Technology (IT) are: 1.Personal Privacy: • It is an important aspect of ethical issues in information technology. IT facilitates the users having their own hardware, operating system and software tools to access the servers that are connected to each other and to the users by a network. Due to the distribution of the network on a large scale, data or information transfer in a big amount takes place which leads to the hidden chances of disclosing information and violating the privacy of any individuals or a group. It is a major challenge for IT society and organizations to maintain the privacy and integrity of data. Accidental disclosure to inappropriate individuals and provisions to protect the accuracy of data also comes in the privacy issue. Privacy Issues • Employers search social networking sites for background information on applicants • Monitoring systems are adopted by employers to check employee performance • Information technology has aided in the easy availability of personal information • Information in databases can be used for direct marketing and for credit checks on potential borrowers or renters Concepts of the Web and Network Privacy Acceptable use policy
• Set of rules specifying the legal and ethical use of a system
and the consequences of noncompliance
Accountability
• Issues involving both the user’s and the organization’s
responsibilities and liabilities
Nonrepudiation
• Method for binding all the parties to a contract
Guidelines to Minimize the Invasion of Privacy
• Conduct business only with websites having privacy policies
• Limit access to personal information to those with authorization • Ensure data’s reliability and take precautions to prevent misuse of the data • Data collection must have a stated purpose • Identify ways to prevent personal information gathered being disclosed without consent Guidelines to Minimize the Invasion of Privacy
• Organizations should use verification procedures to ensure data
accuracy • Organizations must correct or delete incorrect data • Prevent unauthorized access to data and misuse of data • Users should review their records and correct any inaccuracies • Transparency in record-keeping systems storing personal data Privacy Issues Presented by E-mail
• Spam: Unsolicited e-mail sent for advertising purposes
• Sent in bulk using automated mailing software • Ease of access • Individuals should assume that others have access to their messages • Any e-mails sent on company-owned computers are the property of the organization 2. Access Right:
The second aspect of ethical issues in information
technology is access right. Access right becomes a high priority issue for the IT and cyberspace with the great advancement in technology. E-commerce and Electronic payment systems evolution on the internet heightened this issue for various corporate organizations and government agencies. Network on the internet cannot be made secure from unauthorized access. Generally, the intrusion detection system are used to determine whether the user is an intruder or an appropriate user. Data Collection on the Internet • Number of people shopping online is increasing • Some customers are reluctant to make online purchases • Concerns about hackers getting access to their credit card numbers • Many credit card companies reimburse fraudulent charges • Other electronic payment systems are being developed Data Collection on the Internet (cont’d.) • Concerned about computers’ contents being searched while they’re connected to the Internet • Information users provide on the Web • Combined with other information and technologies to produce new information • Log files • Generated by Web server software • Record a user’s actions on a Web site • Data collected on the Internet must be used and interpreted with caution 3. Harmful Actions: Harmful actions in the computer ethics refers to the damage or negative consequences to the IT such as loss of important information, loss of property, loss of ownership, destruction of property and undesirable substantial impacts. This principle of ethical conduct restricts any outsiders from the use of information technology in manner which leads to any loss to any of the users, employees, employers and the general public. Typically, these actions comprises of the intentional destruction or alteration of files and program which drives a serious loss of resources. To recover from the harmful actions extra time and efforts are required to remove the viruses from the computer systems. • 4. Intellectual Property • Intellectual property • Protections that involve copyrights, trademarks, trade secrets, and patents for “creations of the mind” developed by people or businesses • Industrial property • Inventions, trademarks, logos, industrial designs • Copyrighted material • Literary and artistic works • May apply to online materials • Exceptions under Fair Use Doctrine Intellectual Property (cont’d.) • Trademark • Protects product names and identifying marks • Patent • Protects new processes • Advantages of patents • Software piracy • Laws • Telecommunications Act of 1996 • Communications Decency Act (CDA) • Laws against spamming Intellectual Property (cont’d.) • Internet use policy • Guard against legal issues and avoid the risks • Cybersquatting • Registering, selling, or using a domain name to profit from someone else’s trademark Patents:
It is more difficult to deal with these types of
ethical issues. A patent can preserve the unique and secret aspect of an idea. Obtaining a patent is very difficult as compared with obtaining a copyright. A thorough disclosure is required with the software. The patent holder has to reveal the full details of a program to a proficient programmer for building a program. • Copyright:
The information security specialists are to be familiar
with necessary concept of the copyright law. Copyright law works as a very powerful legal tool in protecting computer software, both before a security breach and surely after a security breach. This type of breach could be the mishandling and misuse of data, computer programs, documentation and similar material. In many countries, copyright legislation is amended or revised to provide explicit laws to protect computer programs. • Trade Secrets: Trade secrets is also a significant ethical issue in information technology. A trade secret secures something of value and usefulness. This law protects the private aspects of ideas which is known only to the discover or his confidants. Once disclosed, trade secret is lost as such and is only protected by the law for trade secrets. The application of trade secret law is very broad in the computer range, where even a slight head start in the advancement of software or hardware can provide a significant competitive influence. • Liability:
One should be aware of the liability issue in making ethical decisions.
Software developer makes promises and assertions to the user about the nature and quality of the product that can be restricted as an express warranty. Programmers or retailers possess the legitimate to determine the express warranties. Thus they have to be practical when they define any claims and predictions about the capacities, quality and nature of their software or hardware. Every word they say about their product may be as legally valid as stated in written. All agreements should be in writing to protect against liability. A disclaimer of express warranties can free a supplier from being held responsible of informal, speculative statements or forecasting made during the agreement stages. • Piracy:
Piracy is an activity in which the creation of illegal copy
of the software is made. It is entirely up to the owner of the software as to whether or not users can make backup copies of their software. As laws made for copyright protection are evolving, also legislation that would stop unauthorized duplication of software is in consideration. The software industry is prepared to do encounter against software piracy. The courts are dealing with an increasing number of actions concerning the protection of software. References • https://www.utc.edu/engineering-and-computer- science/caecd/course-listing/cpsc-3610 • https://www.geeksforgeeks.org/ethical-issues-in-information- technology-it/ Ethical Issues of Information Technologies • https://www.csub.edu › ~ychoi2 › 300Lecture •