Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Copyright © 2003 Prentice Hall, Inc Slides created by Bob Koziel Spotlight 5: Ethics: Standards of Information Age Conduct Copyright © 2003 Prentice Hall, Inc NEXT SLIDE Computer Ethics Ethics is the branch of philosophy concerned with what’s right or wrong. Computer ethics deals with computing-related moral dilemmas and the ethical principals for computer professionals. Copyright © 2003 Prentice Hall, Inc NEXT SLIDE 3 Avoiding: Computer-Related Legal Problems Most organizations have an Acceptable Use Policy for computer use. Types of legal problems that arise from computer use include: Plagiarism Software Piracy Copyright Infringement Copyright © 2003 Prentice Hall, Inc NEXT SLIDE 4 Plagiarism Plagiarism is the use of someone else’s intellectual property. Intellectual property refers to an individual’s rights in creating original works. Copyright infringement is plagiarizing copyrighted material. Legal implications of plagiarism: Dismissal from school Law suits Copyright © 2003 Prentice Hall, Inc NEXT SLIDE 5 Software Piracy Public domain software can be copied, sold, and modified. Shareware is copyrighted software. Trial versions can be copied. Shareware is meant to be evaluated for a period of time and then a registration fee is paid for continued use. Commercial software is copyrighted. You must purchase the software in order, to use it. Organizations purchase a site license to use the software on all of their computers. Copyright © 2003 Prentice Hall, Inc NEXT SLIDE 6 Illegal Software Actions Selling software that contains all or part of a commercial software program. Using shareware beyond the evaluation period. Violating the terms of a software license. Making copies of site-licensed programs for personal use. Giving or selling commercial software to others. Copyright © 2003 Prentice Hall, Inc NEXT SLIDE 7 Copyright Infringement An increasing number of Internet users are making illegal copies of music. Rationalizations copyright violators use: It’s OK to download MP3 files if I only keep them for 24 hours. It’s free advertising for the band. It’s legal because I don’t charge any money for sharing them. Fair use doctrine states that a brief selection from copyrighted work can be used for commentary, parody, news reporting, research, and education. Copyright © 2003 Prentice Hall, Inc NEXT SLIDE 8 Introducing Ethics Ethics is concerned with what’s right or wrong in moral dilemma contexts. Ethical principals help people through moral dilemmas. Computer ethics deal with the ethical principals associated with moral dilemmas caused by computer use. Copyright © 2003 Prentice Hall, Inc NEXT SLIDE 9 Computer Ethics for Computer Users When using the college’s computers: Respect yourself. Respect others. Respect academic integrity. Copyright © 2003 Prentice Hall, Inc NEXT SLIDE 10 Ten Commandments of Computer Ethics 1. 2. 3. 4. 5. 6. Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people’s computer work. Thou shalt not snoop around in other people’s files. Thou shalt not use a computer to steal. Thou shalt not use a computer to bear false witness. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people’s computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people’s intellectual output. 9. Thou shalt think about the social consequences of the program you write or the system you design. 10.Thou shalt use a computer in ways that show consideration and respect for your fellow humans. Copyright © 2003 Prentice Hall, Inc NEXT SLIDE 11 Netiquette Netiquette refers to the guidelines that involve showing respect for others and yourself while being online. Copyright © 2003 Prentice Hall, Inc I NEXT SLIDE 12 Mailing List Netiquette Read the discussions for the past few days before posting questions. Read the Frequently Asked Questions (FAQs) list before posting questions. Don’t belittle people for grammatical errors. Don’t post inflammatory messages. When agreeing with something don’t waste others time by saying “Me too.” Learn how to unsubscribe from the list. Copyright © 2003 Prentice Hall, Inc NEXT SLIDE 13 E-Mail Netiquette Promptly respond to messages. Delete messages after you read them. Don’t send messages you wouldn’t want others to read. Speak of others professionally and courteously. Run you computer’s anti-virus program on any e-mail received or sent. Keep the message short and to the point. Don’t type in all capital letters. Spell check your message before sending it. Be careful with sarcasm and humor in your message. Be mindful when you request a return receipt. Copyright © 2003 Prentice Hall, Inc NEXT SLIDE 14 Internet Relay Chat Netquette Learn the commonly used abbreviations. Listen to the discussion for a while before joining it. Don’t flood the channel with text. Don’t harass others with unwanted invitations. Be careful if you are asked to type in a command. It may be a trick. Use the ignore command when being bothered. Copyright © 2003 Prentice Hall, Inc NEXT SLIDE 15 Computer Ethics for Computer Professionals The field of computer ethics specifies ethical codes for computing professionals. Computer professionals create products that affect people and may expose them to risk. The core of a computer professional’s code of ethics is to preserve and protect human life from harm. Copyright © 2003 Prentice Hall, Inc NEXT SLIDE 16 The ACM Code of Conduct The Association for Computing Machinery (ACM) developed an innovative code of conduct. According to the ACM code, a computing professional: Contributes to society and human well-being Avoids harm to others Is honest and trustworthy Is fair and takes action not to discriminate on the basis of race, sex, religion, age, disability, or national origin Honors property rights, including copyrights and patents Gives proper credit when using the intellectual property of others Respects other individuals’ rights to privacy Honors confidentiality Copyright © 2003 Prentice Hall, Inc NEXT SLIDE 17 Programmer Liability Programmers can produce programs with errors. Computer experts agree that the liability for a program failure should be shared among the programmer, software company, and the organization that buys the software. A new field called software engineering is applying the principles of mainstream engineering to software production. Fault-tolerant systems are being developed that continue working when a problem occurs. Copyright © 2003 Prentice Hall, Inc NEXT SLIDE 18 Computer Ethics in Business A business must protect its data from: Loss or damage Misuse or error Unauthorized access Backup procedures are used to protect data from loss. It is the organization’s responsibility to ensure that its data is as complete as possible. Divulging customer data without asking permission is considered unethical behavior by privacy advocates. Copyright © 2003 Prentice Hall, Inc NEXT SLIDE 19 Whistle-blowing Whistle-blowing refers to employees reporting their company’s dangerous or illegal acts to regulatory agencies or the press. Some laws exist to protect whistle-blowers but many find themselves unemployed and blacklisted. Copyright © 2003 Prentice Hall, Inc NEXT SLIDE 20 THE END Copyright © 2003 Prentice Hall, Inc NEXT SLIDE 21