Computer Ethics

Computer are now a fact of life. Computers have created a very effective information system to help streamline the management of an organization.
For example; computers are used for:
v  Communicating with family and friends at distant places via e-mail, key pads, electronic lists, digital telephony, electronic chatting.
v  Booking airline tickets and railway tickets. The booking of bus tickets are also available.
v  Shopping books, clothes, footwears, CDs, etc.
v  Information searching on any topic.
However, this is one side of the story. Using the same computer and internet, one can cause harm to other. It can be used for software privacy, stealing intellectual property, breaking into other person’s accounts, stealing password or causing other types of harms. Hence, a computer nay also be misused. This is the area where ethical computing comes into picture. Practicing computer ethics can help to restrict cyber-crimes. This chapter tells is about different aspects of computer ethics and what rules should be followed for ethical computing.


Computer Ethics
Ethic is a set of moral principles that govern behaviour of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computer. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic contents) privacy concerns and how computer’s affect society.

When computer first President to be used in society at large, the absence of ethical standards about their use and related issues caused some problems. however, as their use became widespread in every face of our lives, discussions in computer ethics resulted in some kind of a consensus. today, many of these rules have been formulated as laws, either National or International. Computer crimes and Computer fraud are now common terms. There are laws against them. Everyone should be aware of What constitutes the computer crime and computer fraud.
For example, while it is easy to duplicate copyrighted electronic (or digital) content, computer ethics would suggest that it is wrong to do so without the author’s approval. And while it may be possible to access someone’s personal information on a computer system, computer ethics would advise that such an action is unethical. As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promote the discussion on how much influence computers should have in areas such as artificial intelligence and human communication. As the world of computers develop further, computer ethics continue to create ethical standards that address new issues raised by new technologies.
Let us read about some major ethical issues in computer’s world.
Software Piracy
Software piracy is the illegal reproduction and distribution of software applications. Pirated software is a very dangerous trend. It hurts everyone from developers to sellers and software users. Software piracy has a significant impact on the economy. It leads to jobs losses and revenue losses to the companies.

Mp3s
Downloading and / or uploading music is a violation of copyright laws. It is not true that keeping the file for less than 24 hours is legal and it is a myth that uploading is legal if we have paid for the original work.
End-User Piracy
All software’s are licensed. When someone copies software without the appropriate license for each copy, it is called end-user piracy. It includes both copying and distribution of the software.
Internet Piracy
Internet piracy is the unlawful reproduction and/or distribution of any copyrighted digital file that can change hands over the internet.
This can be done with music files, videos and movies, e-books, software and other materials. Those who engage in this type of piracy can often conduct their entire operation on the internet, including advertising and sales. It has become a worldwide crime problem, because of the relative ease with which it can be committed even over long distance.
Public Domain
Some software is free to use, copy and/or change, but we can do so only if there is written notice that the software is in the public domain. We should look for this notice in the ‘read me’ files that accompany programs
General Public License
GPL software has the same restrictions as public domain software, but cannot be sold for profit.
Counterfeiting
Counterfeiting is a federal and state crime, involving the manufacturing distribution of software packages under someone else’s name, and without their permission. Counterfeit software are generally made from lower quality components, in an attempt to sell a cheap imitation of similar goods produced by brands consumers know and trust.
Plagiarism
Plagiarism is presenting someone else’s work as our own. This includes work represented in hard copy, on disk or on the internet. Do not use ‘paper mills’ or sites that sell academic papers to students. We can get caught and the penalties are not lenient.
The necessity to acknowledge other’s work or ideas applies not to text, but also to other media, such as computer code, illustrations, graphics, etc. it applies equally to publish text, data or other resources downloaded from websites.
The best way of avoiding plagiarism is to learn and employ the principles of good academic. It is not simply a matter of making sure the paraphrase; it is about deploying the academic skills to make work as good as it can be.
Basic Netiquette
Netiquette is the short from for ‘Internet Etiquette’. It is a set of rules for online behaviour. It is ‘the rules of conduct as established in a networking society’. It provides (often unwritten) guidelines for electronic mail (e-mail) and other network activities, as well as posting to news group and email discussion lists. It is important because each user on the internet has to access many resources from many different world-wide locations.
Furthermore, network information may pass through many different systems on its way to its ultimate destination. Most of these various sites allow users to freely access their system and use their resources. If the general network community does not act responsibility, the local users of a system may be inconvenienced, forcing the site to limit its outside access to specific times of day or to restrict outside use altogether. A good thing to keep in mind is that just because we can do something, does not imply that we should do it.
E-mail
We should follow the given netiquette while using of are you email:
v  We should include a clear, direct subject line.
v  We should be careful while choosing the email address. It must contain the name.
v  Get good virus protection software and make sure it scans our incoming emails.
Do not open an attachment in an email if:
·         We do not know that sender.
·         The subject line does not make sense or is suspicious in any way.
·         The attachment name is suspicious.
·         The attachment or message text does not make sense or we are not expecting them.

v  Do not type in all capital letters. It looks like we are screaming.
v  Try not to use sarcasm or humour. It does not always come across well.
v  When we are subscribed to a listproc, make sure we reply to one person and not the whole list, unless I want the whole list to read what we have to say.

Intellectual Property Rights
Intellectual property rights are legal rights, which result from intellectual activity in industrial, scientific, literary and artistic fields. These rights safeguard creators and other producers of intellectual goods and services by granting them certain time- Limited right to control their use. Protected IP rights like other property can be a matter of trade, which can be Owned, sold or bought. These are intangible and non-exhausted conceptions.
Types/Tools of Intellectual Property Rights
v  Patents 
v  Trademarks
v  Copyrights and related rights
v  Geographical Indications
v  Industrial Designs
v  Trade Secrets
v  Layout Design for Integrated Circuits
v  Protection of New Plant Variety

Let us read about some of them.
 Trademarks
A Trademark is a distinctive sign that identifies certain goods or services at those produced or provided by a specific person or Enterprise. it may be one or a combination of words, letters and numerals. They may consist of drawings, symbols, three-dimensional Signs, search the shape and Packaging of goods, audible signs, such as music or vocal sound pregnancies or colours used as distinguishing features. It provides protection to the owner of the mark by ensuring the exclusive right to use it to identify goods or services, or to authorise the author to use it in return for payment. It helps consumers identify and purchase a product or service because its nature and quality indicated by its unique trademark meets their needs.
Patent
A patent for an invention Is granted by the government to the inventor, giving the inventor the right to stop others, for a limited period, from making a comma using or selling the invention without their permission. When patent protection is granted the invention become the property of inventor, which like any other form of property or business asset can be bought, sold, rented or hired. Patents are territorial rights. UK patent will only give the holder rights in the UK and rights to stop others from importing the patented products into the UK.
Privacy
Privacy is an important aspect of life. It is a desirable condition or a moral right that a person has in relation to another person or with respect to the possession of information by other persons about himself or herself. It is unethical to infringe in the privacy of other people without the consent of the person. It leads to embarrassment.
There are, of course, some conditions to know things about another person. For example, a psychiatrist or a doctor may ask the patients questions that are regarded as private in order to treat the patient in a better way. But it is again the duty of the doctor not to disclose this private information to other people.
This applies to computers also. We may know, for example, that our friend has stored private information on his computer. The first thing is that we must not try to access that information. If we are given permission to access someone else's computer and allow us to view his or her information, we must not disclose it to other people.
It is also unethical to interfere with someone else's work. We must always distance yourself from such work.
Copyright
Copyright is a legal term describing the right given two creators for their literary and artistic work. The kinds of work covered by copyright include: literary work such as novels, poems, plays, reference works, newspapers and computer programs, database, films, musical composition and choreography; artistic works such as painting, drawing, photographs and sculpture; and advertisements, maps and technical drawings.
Personal Code of Computer Ethics
Seven essential components of a personal code of computer ethics are given here. These should be followed strictly in our life. They are:
  1. Honesty
  2. Respect
  3. Confidentiality
  4. professionalism
  5. Responsibility
  6. Communication
  7. Obeying the laws
Ten Commandments for Computer Ethics
The computer ethics institute has given ten commandments for computer ethics. We should make these a part of our life and always follow them while using the computers.
  1. We shall not use a computer to harm other people.
  2. We shall not interface with other people's computer work.
  3. We shall not snoop around in other people's files.
  4. We shall not use a computer to steal.
  5. We shall not use a computer to bear false witness.
  6. We shall not copy or use proprietary software for which we have not paid.
  7. We shall not use other people's computer resources without authorization or proper compensation.
  8. We shall not appropriate other people's intellectual output.
  9. We shall think about the social consideration of the program we write or the system we design.
  10. We shall use a computer in ways that show consideration and respect for our fellow users.

0 Comments