Learn about Computer Ethics || Public Domain || Copyright
Computer Ethics
Computer
are now a fact of life. Computers have created a very effective information
system to help streamline the management of an organization.
For example; computers are used for:
v Communicating with family and
friends at distant places via e-mail, key pads, electronic lists, digital
telephony, electronic chatting.
v Booking airline tickets and
railway tickets. The booking of bus tickets are also available.
v Shopping books, clothes,
footwears, CDs, etc.
v Information searching on any
topic.
However,
this is one side of the story. Using the same computer and internet, one can
cause harm to other. It can be used for software privacy, stealing intellectual
property, breaking into other person’s accounts, stealing password or causing
other types of harms. Hence, a computer nay also be misused. This is the area
where ethical computing comes into picture. Practicing computer ethics can help
to restrict cyber-crimes. This chapter tells is about different aspects of
computer ethics and what rules should be followed for ethical computing.
Computer
Ethics
Ethic
is a set of moral principles that govern behaviour of a group or individual.
Therefore, computer ethics is set of moral principles that regulate the use of
computer. Some common issues of computer ethics include intellectual property
rights (such as copyrighted electronic contents) privacy concerns and how
computer’s affect society.
When
computer first President to be used in society at large, the absence of ethical
standards about their use and related issues caused some problems. however, as
their use became widespread in every face of our lives, discussions in computer
ethics resulted in some kind of a consensus. today, many of these rules have
been formulated as laws, either National or International. Computer crimes and
Computer fraud are now common terms. There are laws against them. Everyone
should be aware of What constitutes the computer crime and computer fraud.
For
example, while it is easy to duplicate copyrighted electronic (or
digital) content, computer ethics would suggest that it is wrong to do so
without the author’s approval. And while it may be possible to access someone’s
personal information on a computer system, computer ethics would advise that
such an action is unethical. As technology advances, computers continue to have
a greater impact on society. Therefore, computer ethics promote the discussion
on how much influence computers should have in areas such as artificial
intelligence and human communication. As the world of computers develop
further, computer ethics continue to create ethical standards that address new
issues raised by new technologies.
Let us read about some major ethical
issues in computer’s world.
Software Piracy
Software
piracy is the illegal reproduction and distribution of software applications.
Pirated software is a very dangerous trend. It hurts everyone from developers
to sellers and software users. Software piracy has a significant impact on the
economy. It leads to jobs losses and revenue losses to the companies.
Mp3s
Downloading
and / or uploading music is a violation of copyright laws. It is not true that
keeping the file for less than 24 hours is legal and it is a myth that
uploading is legal if we have paid for the original work.
End-User Piracy
All
software’s are licensed. When someone copies software without the appropriate
license for each copy, it is called end-user piracy. It includes both copying
and distribution of the software.
Internet
Piracy
Internet
piracy is the unlawful reproduction and/or distribution of any copyrighted
digital file that can change hands over the internet.
This
can be done with music files, videos and movies, e-books, software and other
materials. Those who engage in this type of piracy can often conduct their
entire operation on the internet, including advertising and sales. It has
become a worldwide crime problem, because of the relative ease with which it
can be committed even over long distance.
Public Domain
Some
software is free to use, copy and/or change, but we can do so only if there is
written notice that the software is in the public domain. We should look for
this notice in the ‘read me’ files that accompany programs
General Public License
GPL
software has the same restrictions as public domain software, but cannot be
sold for profit.
Counterfeiting
Counterfeiting
is a federal and state crime, involving the manufacturing distribution of
software packages under someone else’s name, and without their permission.
Counterfeit software are generally made from lower quality components, in an
attempt to sell a cheap imitation of similar goods produced by brands consumers
know and trust.
Plagiarism
Plagiarism
is presenting someone else’s work as our own. This includes work represented in
hard copy, on disk or on the internet. Do not use ‘paper mills’ or sites that
sell academic papers to students. We can get caught and the penalties are not
lenient.
The
necessity to acknowledge other’s work or ideas applies not to text, but also to
other media, such as computer code, illustrations, graphics, etc. it applies
equally to publish text, data or other resources downloaded from websites.
The
best way of avoiding plagiarism is to learn and employ the principles of good
academic. It is not simply a matter of making sure the paraphrase; it is about deploying
the academic skills to make work as good as it can be.
Basic Netiquette
Netiquette
is the short from for ‘Internet Etiquette’. It is a set of rules for online
behaviour. It is ‘the rules of conduct as established in a networking society’.
It provides (often unwritten) guidelines for electronic mail (e-mail) and other
network activities, as well as posting to news group and email discussion
lists. It is important because each user on the internet has to access many
resources from many different world-wide locations.
Furthermore,
network information may pass through many different systems on its way to its
ultimate destination. Most of these various sites allow users to freely access
their system and use their resources. If the general network community does not
act responsibility, the local users of a system may be inconvenienced, forcing
the site to limit its outside access to specific times of day or to restrict
outside use altogether. A good thing to keep in mind is that just because we
can do something, does not imply that we should do it.
E-mail
We
should follow the given netiquette while using of are you email:
v
We
should include a clear, direct subject line.
v
We
should be careful while choosing the email address. It must contain the name.
v
Get
good virus protection software and make sure it scans our incoming emails.
Do
not open an attachment in an email if:
·
We
do not know that sender.
·
The
subject line does not make sense or is suspicious in any way.
·
The
attachment name is suspicious.
·
The
attachment or message text does not make sense or we are not expecting them.
v Do not type in all capital
letters. It looks like we are screaming.
v Try not to use sarcasm or
humour. It does not always come across well.
v When we are subscribed to a
listproc, make sure we reply to one person and not the whole list, unless I
want the whole list to read what we have to say.
Intellectual
Property Rights
Intellectual property rights are legal rights,
which result from intellectual activity in industrial, scientific, literary and
artistic fields. These rights safeguard creators and other producers of
intellectual goods and services by granting them certain time- Limited right to
control their use. Protected IP rights like other property can be a matter of
trade, which can be Owned, sold or bought. These are intangible and non-exhausted
conceptions.
Types/Tools of
Intellectual Property Rights
v Patents
v Trademarks
v Copyrights and related
rights
v Geographical Indications
v Industrial Designs
v Trade Secrets
v Layout Design for
Integrated Circuits
v Protection of New Plant Variety
Let us read about some of them.
Trademarks
A Trademark is a distinctive sign that
identifies certain goods or services at those produced or provided by a
specific person or Enterprise. it may be one or a combination of words, letters
and numerals. They may consist of drawings, symbols, three-dimensional Signs,
search the shape and Packaging of goods, audible signs, such as music or vocal
sound pregnancies or colours used as distinguishing features. It provides
protection to the owner of the mark by ensuring the exclusive right to use it
to identify goods or services, or to authorise the author to use it in return
for payment. It helps consumers identify and purchase a product or service
because its nature and quality indicated by its unique trademark meets their
needs.
Patent
A patent for an invention Is granted by the
government to the inventor, giving the inventor the right to stop others, for a
limited period, from making a comma using or selling the invention without
their permission. When patent protection is granted the invention become the
property of inventor, which like any other form of property or business asset
can be bought, sold, rented or hired. Patents are territorial rights. UK patent
will only give the holder rights in the UK and rights to stop others from
importing the patented products into the UK.
Privacy
Privacy is an important aspect of life. It is a
desirable condition or a moral right that a person has in relation to another
person or with respect to the possession of information by other persons about
himself or herself. It is unethical to infringe in the privacy of other people
without the consent of the person. It leads to embarrassment.
There are, of course, some conditions to know
things about another person. For example, a psychiatrist or a doctor may ask
the patients questions that are regarded as private in order to treat the
patient in a better way. But it is again the duty of the doctor not to disclose
this private information to other people.
This applies to computers also. We may know, for
example, that our friend has stored private information on his computer. The
first thing is that we must not try to access that information. If we are given
permission to access someone else's computer and allow us to view his or her
information, we must not disclose it to other people.
It is also unethical to interfere with someone
else's work. We must always distance yourself from such work.
Copyright
Copyright is a legal term describing the right
given two creators for their literary and artistic work. The kinds of work
covered by copyright include: literary work such as novels, poems, plays,
reference works, newspapers and computer programs, database, films, musical
composition and choreography; artistic works such as painting, drawing,
photographs and sculpture; and advertisements, maps and technical drawings.
Personal Code of Computer Ethics
Seven essential components of a personal code of
computer ethics are given here. These should be followed strictly in our life.
They are:
- Honesty
- Respect
- Confidentiality
- professionalism
- Responsibility
- Communication
- Obeying the
laws
Ten
Commandments for Computer Ethics
The computer ethics institute has given ten commandments
for computer ethics. We should make these a part of our life and always follow
them while using the computers.
- We shall not use a computer to harm other people.
- We shall not interface with other people's
computer work.
- We shall not snoop around in other people's
files.
- We shall not use a computer to steal.
- We shall not use a computer to bear false
witness.
- We shall not copy or use proprietary software for
which we have not paid.
- We shall not use other people's computer
resources without authorization or proper compensation.
- We shall not appropriate other people's
intellectual output.
- We shall think about the social consideration of
the program we write or the system we design.
- We shall use a computer in ways that show consideration and respect for our fellow users.
0 Comments