prepare by : salameh ahmad al_khawaldeh layth ahmad al_rababah

35
WWW WWW Prepare by : Salameh ahmad al_khawaldeh Layth ahmad al_rababah

Upload: nathaniel-weaver

Post on 24-Dec-2015

221 views

Category:

Documents


0 download

TRANSCRIPT

WWWWWW

Prepare by :

Salameh ahmad al_khawaldeh

Layth ahmad al_rababah

22WWWWWW

ObjectiveObjective Ethical IssuesEthical Issues

What is Ethics?What is Ethics? Major ThreatsMajor Threats Improving the ClimateImproving the Climate Code of EthicsCode of Ethics Self-AssessmentSelf-Assessment Privacy FactorPrivacy Factor

Legal IssuesLegal Issues Liability QuestionLiability Question Basis of LiabilityBasis of Liability Copyrights & TrademarksCopyrights & Trademarks Website – Product / Service?Website – Product / Service? WarrantiesWarranties Strict LiabilityStrict Liability Taxation IssuesTaxation Issues

New technology new ethical New technology new ethical problemsproblems ExampleExample

Information Technology Ethical challengesInformation Technology Ethical challenges Challenges: Web DesignChallenges: Web Design Challenges: CommerceChallenges: Commerce Challenges: WorkplaceChallenges: Workplace Challenges: SpeechChallenges: Speech Challenges: Computing Resource AbuseChallenges: Computing Resource Abuse Challenges: PrivacyChallenges: Privacy Challenges: Intellectual PropertyChallenges: Intellectual Property Challenges: OtherChallenges: Other

33WWWWWW

What is ethic?What is ethic?

Fairness, justice, equity, honesty, Fairness, justice, equity, honesty, trustworthiness & equalitytrustworthiness & equality

SubjectiveSubjective

B

D

C

A

Legal

Immoral Moral

Illegal

44WWWWWW

Major threatsMajor threats

Faster computers & networksFaster computers & networks Sophisticated telecommunications & routersSophisticated telecommunications & routers Massive distributed databasesMassive distributed databases Eases of access to information & knowledge Eases of access to information & knowledge

basebase Transparency of softwareTransparency of software

55WWWWWW

Improving the climatesImproving the climates

Top management supportTop management support Code of ethicsCode of ethics Ethics training programEthics training program Motivation to focus on honesty & integrityMotivation to focus on honesty & integrity

66WWWWWW

WHERE TO STARTWHERE TO START

Bottom-upBottom-up Inculcates ethics behavior at the employee level with Inculcates ethics behavior at the employee level with

full support of top managementfull support of top management

Top-downTop-down The actions of the company start with the CEOThe actions of the company start with the CEO Extend to a variety of stakeholdersExtend to a variety of stakeholders

77WWWWWW

Code of ethicsCode of ethics

A declaration of principles and beliefs that A declaration of principles and beliefs that govern how employees of a corporation are to govern how employees of a corporation are to behavebehave

Inspirational & disciplinaryInspirational & disciplinary All-compassing & stable over timeAll-compassing & stable over time

88WWWWWW

Self- AssessmentSelf- Assessment

A question-and-answer procedureA question-and-answer procedure Allows individuals to appraise & understand their Allows individuals to appraise & understand their

personal knowledge about a particular topicpersonal knowledge about a particular topic An educational experienceAn educational experience

99WWWWWW

Privacy factorPrivacy factor NoticeNotice

Right to be told in advanceRight to be told in advance ChoiceChoice Final say regarding the use of personal infoFinal say regarding the use of personal info

AccessAccess Access & correct any personal infoAccess & correct any personal info

Security/integritySecurity/integrity

Enforcement Enforcement Backed by the courts if any principles are violatedBacked by the courts if any principles are violated

1010WWWWWW

THE LIABILITY QUESTIONTHE LIABILITY QUESTION

Liability of DesignerLiability of Designer Nontrivial errorsNontrivial errors Out-of-bound errorsOut-of-bound errors

Liability of UserLiability of User Passive negligencePassive negligence

Basis of LiabilityBasis of Liability Tort lawTort law Product liabilityProduct liability

1111WWWWWW

TORT LAWS ON INTERNETTORT LAWS ON INTERNET

Settling contract problems between e-merchants & Settling contract problems between e-merchants & ISPISP

Fraud – intent to deceiveFraud – intent to deceive Negligence – failing to make certain action causing Negligence – failing to make certain action causing

injury / material lossesinjury / material losses False advertising False advertising Misrepresentation – claiming a product will perform Misrepresentation – claiming a product will perform

certain functions when it could not certain functions when it could not Trademark violations – under intellectual property lawTrademark violations – under intellectual property law

1212WWWWWW

COPYRIGHTCOPYRIGHT CopyrightsCopyrights

Ownership of an original work created by an authorOwnership of an original work created by an author A form of intellectual property protection covers the A form of intellectual property protection covers the

‘look & feel’ and content of printed media‘look & feel’ and content of printed media Gives author the right to exclude others from using Gives author the right to exclude others from using

the finished workthe finished work Good for life of its author + 70 yearsGood for life of its author + 70 years

1313WWWWWW

TRADEMARK / TRADE NAMETRADEMARK / TRADE NAME

A word / symbol distinguishing a good from other A word / symbol distinguishing a good from other goods in the marketgoods in the market

A maze of federal & state lawsA maze of federal & state laws Web designer – ‘work made for hire’Web designer – ‘work made for hire’

1414WWWWWW

WEBSITE – PRODUCT/SERVICE?WEBSITE – PRODUCT/SERVICE?ProductProduct

Software sold off the shelfSoftware sold off the shelf Uniform Commercial Code (UCC) allows developer to Uniform Commercial Code (UCC) allows developer to

limit liability for defective websites though a disclaimer limit liability for defective websites though a disclaimer of warrantiesof warranties

ServiceService Custom-designed softwareCustom-designed software Negligence principles should be usedeNegligence principles should be usede

1515WWWWWW

WARRANTIESWARRANTIES

Assurance made by seller about the goods soldAssurance made by seller about the goods sold Express warrantyExpress warranty

Offered orally or in writing by maker of productsOffered orally or in writing by maker of products Implied warrantyImplied warranty

Arises automatically when a sale is madeArises automatically when a sale is made Merchantability Merchantability

DisclaimerDisclaimer Seller’s intention to protect the business from unwanted Seller’s intention to protect the business from unwanted

liabilityliability http://www.microsoft.com/http://www.microsoft.com/misc/info/cpyright.htmmisc/info/cpyright.htm

1616WWWWWW

STRICT LIABILITYSTRICT LIABILITY

Joint & several liability for developers, Joint & several liability for developers, manufacturers & distributors if tort theory appliesmanufacturers & distributors if tort theory applies

Protects web visitor regardless of whether Protects web visitor regardless of whether anyone is at faultanyone is at fault

1717WWWWWW

TAXATION ISSUESTAXATION ISSUES

ControversialControversial

Different jurisdictionDifferent jurisdictionConsumers’ reactionConsumers’ reaction

1818WWWWWW

New technology = new New technology = new ethical problemsethical problems

Traditional rules of conduct are not always Traditional rules of conduct are not always applicable to a new mediumapplicable to a new medium

A question that often arises: Should a A question that often arises: Should a device, a technique or technology be device, a technique or technology be restricted because people can use it for restricted because people can use it for illegal or harmful actions as well as illegal or harmful actions as well as beneficial ones?beneficial ones?

1919WWWWWW

ExampleExample

Mobile phones with cameras. Pupils at school Mobile phones with cameras. Pupils at school take photos of other pupils in the shower, and take photos of other pupils in the shower, and publish the pictures on the Internet.publish the pictures on the Internet.

DiscussDiscuss. How to deal with this?. How to deal with this?

WWWWWW

Information Technology Ethical Information Technology Ethical ChallengesChallenges

2121WWWWWW

Challenges: Code of EthicsChallenges: Code of Ethics

No Form of licensing for computer professionals No Form of licensing for computer professionals Results in no real way to enforce ethical standards within the Results in no real way to enforce ethical standards within the

computing fieldcomputing field There is movement within the industry to create a licensing There is movement within the industry to create a licensing

process but there are many issues to be resolvedprocess but there are many issues to be resolved What will be included on the exam?What will be included on the exam? How often will an IT professional be required to renew the How often will an IT professional be required to renew the

license?license?

Developed by several organizationsDeveloped by several organizations AdoptionAdoption ImplementationImplementation MonitoringMonitoring Example: Example: http://www.acm.org/constitution/code.htmlhttp://www.acm.org/constitution/code.html

2222WWWWWW

Challenges: Web DesignChallenges: Web Design Implementation of featuresImplementation of features

Pop upsPop ups Blocking/filtersBlocking/filters Aliases and redirectingAliases and redirecting CookiesCookies Privacy policiesPrivacy policies Security policiesSecurity policies SpywareSpyware

Use of other design featuresUse of other design features JavascriptJavascript Graphics - pictures, buttons, logos, iconsGraphics - pictures, buttons, logos, icons ContentContent Design layoutDesign layout Accountability/responsibilityAccountability/responsibility Outdated material, inaccurate materialOutdated material, inaccurate material

2323WWWWWW

Challenges: CommerceChallenges: Commerce FraudFraud TaxationTaxation Free TradeFree Trade Gambling Gambling AuctionsAuctions SpammingSpamming

Who were Canter and Siegel?Who were Canter and Siegel? Spamming cell phones?Spamming cell phones?

Term papers for saleTerm papers for sale Atlanta Journal Constitution articleAtlanta Journal Constitution article

2424WWWWWW

Challenges: WorkplaceChallenges: Workplace AccessibilityAccessibility ErgonomicsErgonomics OutsourcingOutsourcing TelecommutingTelecommuting Customer relationships – Vendor relationshipsCustomer relationships – Vendor relationships Should IT professionals be in the ethics business or should other Should IT professionals be in the ethics business or should other

areas of the business handle these issues?areas of the business handle these issues?

MonitoringMonitoring Should your employer have the right to monitor private email Should your employer have the right to monitor private email

messages?messages? What are the two most popular Web sites for American workers? What are the two most popular Web sites for American workers?

Playboy and ESPNPlayboy and ESPN

2525WWWWWW

Challenges:WorkplaceChallenges:Workplace

62% of employers monitor employees' eMail and Internet use.62% of employers monitor employees' eMail and Internet use. 68% cite legal liability as the primary reason to monitor. 68% cite legal liability as the primary reason to monitor. 87% of companies that monitor have a written eMail Policy, 87% of companies that monitor have a written eMail Policy, 83.1% an Internet Policy, 83.1% an Internet Policy, 68% a Software Policy.68% a Software Policy. 51% of employers have disciplined or terminated employees for violating 51% of employers have disciplined or terminated employees for violating

ePolicy.ePolicy. 35% of organizations have eMail retention & deletion policies in place.35% of organizations have eMail retention & deletion policies in place. 10% of companies have been ordered by courts to turn over employee 10% of companies have been ordered by courts to turn over employee

eMail related to workplace lawsuits.eMail related to workplace lawsuits. 8.3% of organizations have battled sexual harassment and/or sexual 8.3% of organizations have battled sexual harassment and/or sexual

discrimination claims stemming from employee e-mail and/or Internet use.discrimination claims stemming from employee e-mail and/or Internet use. Source: The 2001 Electronic Policies & Practices Survey from The American Source: The 2001 Electronic Policies & Practices Survey from The American

Management Association, US News & World Report, and The ePolicy Institute-Click Management Association, US News & World Report, and The ePolicy Institute-Click Here for Survey Results. Here for Survey Results.

2626WWWWWW

Music DownloadsMusic Downloads

Risk of getting caughtRisk of getting caught Studies have shown that a majority of the people who share music on the Studies have shown that a majority of the people who share music on the

Internet are aware that their actions are illegal, said Michael McGuire, a analyst Internet are aware that their actions are illegal, said Michael McGuire, a analyst with the Gartner Group. ``But they also know that the chances of getting caught with the Gartner Group. ``But they also know that the chances of getting caught are pretty remote'' are pretty remote''

Why is “getting caught remote”?Why is “getting caught remote”? There are an estimated 60 million peer-to-peer network subscribers There are an estimated 60 million peer-to-peer network subscribers

in the United States alone, with tens of millions more in other in the United States alone, with tens of millions more in other countries countries

The RIAA is seeking out people who make their music files The RIAA is seeking out people who make their music files available for others to download.available for others to download.

The networks have features that allow users to block others from The networks have features that allow users to block others from downloading their files but allow them to continue to download filesdownloading their files but allow them to continue to download files

2727WWWWWW

Challenges: SpeechChallenges: Speech

Net EtiquetteNet Etiquette Email privacyEmail privacy

Email privacy policyEmail privacy policy ““Flaming” – insulting, argumentative or chastising replies to messagesFlaming” – insulting, argumentative or chastising replies to messages

Free SpeechFree Speech Accountability and responsibility for web contentAccountability and responsibility for web content

Abortion sitesAbortion sites Outdated informationOutdated information Accurate informationAccurate information Privacy and security policiesPrivacy and security policies

PornPorn Professors pc – filled with porn, found by pc maintenance workersProfessors pc – filled with porn, found by pc maintenance workers Visa – won’t give permission to be used on offensive or pornographic sitesVisa – won’t give permission to be used on offensive or pornographic sites

HateHate MACHADO CASE MACHADO CASE

Internet FiltersInternet Filters Should filters be in schools or libraries, and /or should they be mandated by law?Should filters be in schools or libraries, and /or should they be mandated by law? Filters can also be set up to filter out other subjects, would this be an ethical violation?Filters can also be set up to filter out other subjects, would this be an ethical violation?

Chain LettersChain Letters

2828WWWWWW

Challenges: Computing Resource AbuseChallenges: Computing Resource Abuse

Computers in the Workplace and the ClassroomComputers in the Workplace and the Classroom Use or AbuseUse or Abuse Internet AccessInternet Access Instant MessengerInstant Messenger Laptop use in the classroomLaptop use in the classroom EmailEmail

Legal documentLegal document Can be modifiedCan be modified FlamingFlaming

AccessAccess Computer Usage policyComputer Usage policy Email policyEmail policy

2929WWWWWW

Challenges: Computing Resource AbuseChallenges: Computing Resource Abuse

Computer CrimeComputer CrimeVirusesVirusesHackersHackersTheftTheft ““These cyber swindles and dot-cons present These cyber swindles and dot-cons present

new challenges to law enforcement” said John new challenges to law enforcement” said John AshcroftAshcroft

US Charges 135 With Net CrimesUS Charges 135 With Net Crimes

3030WWWWWW

Challenges: PrivacyChallenges: Privacy

Privacy issues are at the top of the list in regards to Privacy issues are at the top of the list in regards to ethical use of information.ethical use of information.

Loss of controlLoss of control Misuse of informationMisuse of information Risk to physical privacyRisk to physical privacy Risk of identity theft (video)Risk of identity theft (video) Unwanted intrusions into daily lifeUnwanted intrusions into daily life

USA Patriot Act (post 9/11)USA Patriot Act (post 9/11) Efforts to detect and deter terrorist activityEfforts to detect and deter terrorist activity Datamining corporate dataDatamining corporate data Loss of business and risk of lawsuits due customers being outraged Loss of business and risk of lawsuits due customers being outraged

at their loss of data privacyat their loss of data privacy

CookiesCookies Privacy policiesPrivacy policies

3131WWWWWW

Challenges: intellectual PropertyChallenges: intellectual Property

Electronic CopyrightElectronic Copyright LicensingLicensing InteroperabilityInteroperability LicensingLicensing

CyberlicensesCyberlicenses ShrinkwrapShrinkwrap SharewareShareware FreewareFreeware

MP3MP3 RIAA court case against college studentsRIAA court case against college students University Internet Usage policiesUniversity Internet Usage policies

Internet DownloadsInternet Downloads FilesFiles GraphicsGraphics TextText

3232WWWWWW

Challenges: Intellectual PropertyChallenges: Intellectual Property

Patent, trade secrets, and copyright lawPatent, trade secrets, and copyright law Who owns the programWho owns the program Who owns the algorithmWho owns the algorithm

Software PiracySoftware Piracy Why shouldn't I use pirated software? Who am I hurting by Why shouldn't I use pirated software? Who am I hurting by

doing so?doing so? Piracy exists in everywhere.Piracy exists in everywhere. Loss of revenue hurts everyone.Loss of revenue hurts everyone. All software piracy is illegal and All software piracy is illegal and Software piracy is unethicalSoftware piracy is unethical. . Various studies have found that the software industry loses Various studies have found that the software industry loses

approximately $12 billion every year .approximately $12 billion every year . State Industry StudyState Industry Study

CD-RWCD-RW

3333WWWWWW

Challenges: OtherChallenges: Other

Decision making using Expert SystemsDecision making using Expert Systems Network SecurityNetwork Security Software accuracy and reliability who is ethically Software accuracy and reliability who is ethically

responsible?responsible? Therac-25 AccidentsTherac-25 Accidents Killer RobotsKiller Robots

The Hughes Whistleblowing CaseThe Hughes Whistleblowing Case

3434WWWWWW

Conclusion: Some Ideas to PonderConclusion: Some Ideas to Ponder

Computer ethics today is now a global effortComputer ethics today is now a global effort The gap among the rich and poor nations, rich and poor citizens exists. How can The gap among the rich and poor nations, rich and poor citizens exists. How can

it be eliminated or reduced eithically and morally to provide information and it be eliminated or reduced eithically and morally to provide information and services that will move them to into the world of cyberspace?services that will move them to into the world of cyberspace?

Will the poor be cut off from job opportunities, education, entertainment, medical Will the poor be cut off from job opportunities, education, entertainment, medical care, shopping, voting - because they cannot afford a connection to the global care, shopping, voting - because they cannot afford a connection to the global information network? information network?

Whose laws will apply in cyberspace when hundreds of countries are Whose laws will apply in cyberspace when hundreds of countries are incorporated into the global network? incorporated into the global network?

What happened? Where did our knowing right from wrong go too?What happened? Where did our knowing right from wrong go too? Are we missing an opportunity to introduce ethics at an early age in children by Are we missing an opportunity to introduce ethics at an early age in children by

not integrating these thoughts and practices in video games?not integrating these thoughts and practices in video games? Should more controls and regulations be introduced into the system? Will they Should more controls and regulations be introduced into the system? Will they

actually help to improve our moral and ethical behavior?actually help to improve our moral and ethical behavior?

Unethical behavior continues to permeate industryUnethical behavior continues to permeate industry, what measures, , what measures, policies, codes of conduct be changed to change this behavior?policies, codes of conduct be changed to change this behavior?

3535WWWWWW

Works Cited:Works Cited: http://www.brook.edu/dybdocroot/its/cei/overview/http://www.brook.edu/dybdocroot/its/cei/overview/

Ten_Commanments_of_Computer_Ethics.htmTen_Commanments_of_Computer_Ethics.htm http://www.computingcases.org/case_materials/http://www.computingcases.org/case_materials/

case_materials.htmlcase_materials.html http://www.epolicyinstitute.com/http://www.epolicyinstitute.com/ http://legacy.eos.ncsu.edu/eos/info/computer_ethics/http://legacy.eos.ncsu.edu/eos/info/computer_ethics/ http://www.spa.org/piracy/http://www.spa.org/piracy/ http://www.nd.edu/~rbarger/cases.htmlhttp://www.nd.edu/~rbarger/cases.html http://ksuweb.kennesaw.edu/~kschwaig/present.ppthttp://ksuweb.kennesaw.edu/~kschwaig/present.ppt