1 / 16

Computer and Ethics

Computer and Ethics. Ethical Problems. Proliferation of computers and their networks have created new ethical problems The ACM has issued a Code of Ethics in decision making, to guide us. This code contains the main principles which we should revise before making a decision.

Download Presentation

Computer and Ethics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer and Ethics

  2. Ethical Problems • Proliferation of computers and their networks have created new ethical problems • The ACM has issued a Code of Ethics in decision making, to guide us. • This code contains the main principles which we should revise before making a decision

  3. P.A.P.A. model - I • Privacy: • What information about one's self or one's associations must a person reveal to others, under what conditions and with what safeguards? • What things can people keep to themselves and not be forced to reveal to others?

  4. P.A.P.A. model -II • Accuracy: • Who is responsible for the authenticity, fidelity, and accuracy of information? • Who is to be held accountable for errors in information and how is the injured party to be made whole?

  5. P.A.P.A. model -III • Property: • Who owns information? • What are the just and fair prices for its exchange? • Who owns the channels, especially the airways, through which information is transmitted? • How should access to this scarce resource be allocated?

  6. P.A.P.A. model -IV • Accessibility: • What information does a person or an organization have a right or a privilege to obtain, under what conditions and with what safeguards?

  7. P.A.P.A. model - I • Privacy: • We have a lot of private data stored in computers: S.S.#, medical information, credit card #s, that must be kept from prying eyes. • With your credit card # and S.S. # someone could steal your financial identity

  8. P.A.P.A. model -II • Accuracy: • The amount you own in one of your credit card is increased because someone else has used your card without your knowledge. • Your transcript does not coincide with your real grades in some courses.

  9. P.A.P.A. model -III • Property: • Your last paper has been copied and handed in as if it were from another person. • The computer game has been copied, without the programmer receiving proper compensation for his/her effort.

  10. P.A.P.A. model -IV • Accessibility: • Credit bureaus have information about you (about all of us, as a matter of fact). Should you be able to request a copy of your information? Should you be able to ask for corrections if it is wrong?

  11. Tools • The previous principles should guide us in our decision making. • We can’t assume that everybody is going to follow them. • We may use some tools to protect ourselves. Specially in relation with the first 3 principles

  12. Tools • Use passwords to allow different kinds of access (Read, write, no-access), protecting your privacy and property. • Have a disaster recovery plan • Use backups • Big enterprises need to have hot sites

  13. Tools • Use encryption programs that will also protect your privacy and property. • Use anti-virus software, to protect your property and the accuracy of your information • Use anti-spyware programs to detect spyware and adware in your system

  14. Need of Tools - I • Why do we need to use these tools? • Because of the existence of • Hackers (Person who access your computer) • Viruses (Program which attaches to a file and reproduces itself into another files) • Worms (Program that reproduces itself from computer to computer)

  15. Need of Tools - II • Why do we need to use these tools? • Because of the existence of • Trojan Horses (Program that seems to perform a job, when really they are doing something else) • Key-loggers (Program that records to a file everything that is typed on the keyboard. The file is sent to the creator to the program) • Phishing (Sending an email claiming to be a legitimate site, to obtain private information for identity theft)

  16. Tools • For accessibility we must rely on laws, to enforce the accessibility of data. Otherwise the other party will not supply the information. • We have the Freedom of Information Act • Federal law requires that credit bureaus sent a credit report to anyone that ask for it, free of charge.

More Related