Skip to main content

2016 | Buch

Ethics in Computing

A Concise Module

insite
SUCHEN

Über dieses Buch

This textbook raises thought-provoking questions regarding our rapidly-evolving computing technologies, highlighting the need for a strong ethical framework in our computer science education. Ethics in Computing offers a concise introduction to this topic, distilled from the more expansive Ethical and Social Issues in the Information Age. Features: introduces the philosophical framework for analyzing computer ethics; describes the impact of computer technology on issues of security, privacy and anonymity; examines intellectual property rights in the context of computing; discusses such issues as the digital divide, employee monitoring in the workplace, and health risks; reviews the history of computer crimes and the threat of cyberbullying; provides coverage of the ethics of AI, virtualization technologies, virtual reality, and the Internet; considers the social, moral and ethical challenges arising from social networks and mobile communication technologies; includes discussion questions and exercises.

Inhaltsverzeichnis

Frontmatter
1. Morality and the Law
Abstract
This defines and examines personal and public morality, identifying assumptions and values and the law, looking at both conventional and natural law and the intertwining of morality and the law. We define morality as a system that, in addition to setting standards of virtuous conduct for people, also consists of mechanisms to self-regulate through enforcement of the moral code and self-judge through guilt, which is an internal discomfort resulting from disappointment in the self-mediated conscience. Based on this definition, we discuss moral theories, moral codes, moral standards, and norms and how they are used to make judgment of human actions to determine their goodness or badness. With the discussion of moral standards, we venture into concepts of guilt and conscience. We show how moral guilt is a result of self-judgment and punishment by an individual for not living up to the moral standards set for oneself or for the group. We end the chapter discussion with law noting that conventional laws of a society are anchored by the moral beliefs of that society. We look into the heated argument about this statement and observe that both morality and the legal system serve the purpose of keeping society stable and secure.
Joseph Migga Kizza
2. Ethics and Ethical Analysis
Abstract
This chapter builds upon Chap. 1 in setting up the philosophical framework and analysis tools for discussing moral theories and problems in ethical relativism. We discusses the moral and ethical premises and their corresponding values in the changing technology arena. In particular, we give two fitting definitions of ethics: the traditional definition of ethics and the functional definition of ethics as involving value mapping. We discuss ethical decision making as a process of making a decision that may result in one or more moral conflicts. We end the chapter with a list of codes of ethics in use by different professional organizations.
Joseph Migga Kizza
3. Ethics and the Professions
Abstract
This chapter examines the changing nature of the professions and how they cope with the impact of technology on their fields. An ethical framework for decision making is developed. Professional and ethical responsibilities based on community values and the law are also discussed. Social issues including harassment and discrimination are thoroughly covered. Discussed in depth are the four pillars of professionalism: commitment, integrity, responsibility, and accountability. We focus our discussion on professional dilemmas and guilt associated with decision making, showing that these dilemmas, which are quite common in the everyday activities of a professional, are caused by questioning the values attached to one’s premises as inputs to the decision being made; that one’s input values may be clouded by conflicting codes of conduct, advances in technology, and/or incomplete or misleading information. We end the chapter with an in-depth discussion of professionalism and ethical responsibilities focusing on whistle-blowing, harassment, and discrimination.
Joseph Migga Kizza
4. Anonymity, Security, Privacy, and Civil Liberties
Abstract
This chapter surveys the traditional ethical and privacy issues including security, anonymity and the analysis of how these issues are influenced by computer technology. This dialog also looks at privacy and the protection of civil rights. But in the absence of and agreed upon set of civil liberties by scholars, the discussion focuses on the following four accepted categories: (i) criminal justice that includes police powers, personal liberty, and the right to a fair trial; (ii) basic freedoms of speech, assembly, association, movement, and no discrimination; (iii) freedom of information; and (iv) communications and privacy. With the rapid advances in computer technology, and in particular the advent of the Internet mobile telecommunication technologies, the reader is challenged and brought into the discussion of finding ways, best practices and in some cases protocols and frameworks to protect these civil liberties. The chapter ends with a challenge to the reader to find a fitting ethical framework to protect us and our ethical and social values against the avalanche of these technologies. What should be included in it? Is there a need for a legal framework also? The reader is prompted!
Joseph Migga Kizza
5. Intellectual Property Rights and Computer Technology
Abstract
This chapter discusses the foundations of intellectual property rights and how computer technology has influenced and changed the traditional issues of property rights. The reader is immersed in a discussion of controversial issues of ownership in rapidly amalgamating global cultures, languages, beliefs, and values as a result of rapid globalization technologies such as telecommunication, which is casting a net far and wide, that are likely to create one global commons in the near future. The controversial issues focused on here include the politics and psychology of ownership and the changing infringement landscape. Another issue of interest in our focus is the intellectual property crime (IPC), activities that involve infringement, counterfeiting, piracy of products and services for profit without permission from the creator, misappropriation, misrepresentation, corruption and bribery, and espionage.
Joseph Migga Kizza
6. Social Context of Computing
Abstract
This chapter, considers social issues in computing including the digital divide, workplace issues such as employee monitoring, health risks from computer use, and how these issues are changing with the changing computer technology. The chapter also covers a detailed discussion on a number of obstacles to overcoming the digital divide through digital inclusion within countries and globally. On workplace issues, the discussion focuses on the best practices to handle the changing workplace issues resulting from the growing army of home-based workers and measuring employee productivity.
Joseph Migga Kizza
7. Software Issues: Risks and Liabilities
Abstract
In this chapter we focuses on the issues that arise out of the relationship between the developer and the buyer, including claims, user expectations, and the legal ramifications that may follow an unhealthy relationship. The discussion touches on standards, reliability, security, safety, quality of software, quality of service of software products, causes of software failures, developer and buyer protection, and techniques for improving software quality. Causes of software failures or poor performance of a software product are discussed attributing the causes to a variety of reasons but most notably human error, the nature of software itself, and the environment in which software is produced and used. Finally historic examples of software caused accidents are given including the Therac–25, the Space Shuttle Challenger, the Indian Bhopal chemical accident and the Chernobyl Nuclear Power accident. Both consumer protection and techniques for improving software quality are also discussed.
Joseph Migga Kizza
8. Computer Crimes
Abstract
This chapter surveys the history and examples of computer crimes, their types, costs to society, and strategies of detection and prevention. In the discussion, it is noted that a great number of computer attacks fall into two categories, penetration and denial-of-service attacks, and these are discussed in depth. Attack motives are also discussed. Are nations, businesses, and individuals prepared for computer attacks? Are they ready to pay the price? We look for answers to these questions as we ponder the costs and consequences of computer crimes. We note also that although it is difficult to estimate the actual costs of e-attacks on physical system resources, progress is being made for better and more accurate estimates. An in-depth discussion of the social and ethical consequences that include psychological effects, moral decay, loss of privacy, and loss of trust follows. We end the chapter with recommendations for educating users of computing devices in computer ethics. The need to educate the user to be aware of possible sources of computer crimes and what to do if and when one becomes a victim of these crimes is stressed. It is noted that education can go a long way in reducing computer crimes if the users take crime preventive steps every time they use the computer and computer-related technologies.
Joseph Migga Kizza
9. Cyberbullying
Abstract
This chapter discusses the growing threat and effects of repeated and deliberate harm or harassment of other people by using electronic technology that may include devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites. In particular, a thorough discussion of the following critical topics in cyberbullying is given:
  • The differences between cyberbullying, cyberstalking and electronic harassment
  • Types of cyberbullying
  • Current legislation against cyberbullying
  • Effects of cyberbullying
  • Cyberbullying in the work place, and
  • Dealing with cyberbullying
Joseph Migga Kizza
10. New Frontiers for Computer Ethics: Artificial Intelligence, Virtualization, and Cyberspace
Abstract
Artificial Intelligence discusses the new frontiers of ethics in the new artificial intelligent (AI) technologies, virtualization and virtual reality and cyberspace. The chapter explorers how these new frontiers are affecting the traditional ethical and social values. Our discussion is on based on the premise that artificial intelligence technologies create possibilities to understand and extend human knowledge to create intelligent agents perhaps with a human–value base, intended to help solve human problems. We further look at virtualization and virtual reality technologies and how they inform our behavior based on our traditional moral and ethical values through the mediation of interaction through with electronic media. Our discussion of the social and ethical implications and consequences of virtualization is centered on two issues. One is that the anticipated benefit to society of virtualization as it extends known and relatively managed humanity’s social spheres and social networks in an unprecedented way through opening up of virtual domains of social interactions. The second benefit of virtualization to society is to avail tools and make it possible for those in society who want to create new virtual social networks out of the old and dismantle old ones. Finally we discuss a global mesh of interconnected computer networks, commonly referred to as cyberspace, which makes it possible for anyone using a point of entry device like a computer, smartphone or any other internet-enabled electronic device to reach anyone else, with the potential to access the mesh, through a one-on-one, one-to-many and many-to-one communication capabilities or through broadcasting via the world wide web. Cyberspace, because of immerse and telepresence capabilities and global reach, creates a potentially dangerous environment where one can do anything with no elegance, no accountability and no to limited.
Joseph Migga Kizza
11. Ethical, Privacy, and Security Issues in the Online Social Network Ecosystems
Abstract
This chapter—Ethical, Privacy and Security Issues in the Online Social Network EcoSystem discusses the new realities of global computer online social network ecosystems, including moral and ethical dynamisms. Because we believe that a sound and details discuss of online social networks is based on a good understanding of the underlying network infrastructure, we start the chapter with a brief discussion of the computer network infrastructure. Based on this communication infrastructure we define a social network and its subset, the online social network. We discuss the types of social networks, their historical development and the different and changing services of online social networks. After discussing the basics of online social networks, we them focus on ethical, social and privacy issues in the online social network noting that while online, we inevitably give off our information to whomever asks for it in order to get services. We note that routinely information collected from online community members, however, is not always used as intended. It is quite often used for unauthorized purposes, hence an invasion of privacy. We discuss known ways we give off vital personal information while online in social networks. We further discuss ways to protect personal privacy. On the central point of ethical implications of life in the social network, we note that unlike in the traditional network, governance is not centralized, but community based with equally shared authority and responsibility by all users. But the mechanisms are not yet defined, and where they are being defined, it is still too early to say whether they are effective. The complexity, unpredictability, and lack of central authority is further enhanced by a virtual personality, anonymity and multiple personality. These three characteristics are at the core of the social and ethical problems in online social networks in particular and cyberspace in general; the larger and more numerous these communities become, the more urgent the ethical concerns become.
Joseph Migga Kizza
12. Elastic Extension Beyond the Traditional Computer Network
Mobile Systems and Their Intractable Social, Ethical, and Security Issues
Abstract
This chapter—Ethical, Privacy and Security Issues in the Mobile Ecosystems begins by presenting rather a frightening and quickly evolving mobile telecommunication and computing technologies, their unprecedented global reach and inclusion, unparalleled social, financial and cultural prowess and the yet to be defined social, moral and ethical value systems. We discuss the crucial role of the mobile operating system and survey the current mobile devises and their anchoring mobile operating systems. The discussion then settles on the main themes of the book, that is the ethical and security issues in the mobile ecosystem. We focus on the most troubling issue of the mobile ecosystem, the location –based tracking system (LTS). This technology, in three types, is troubling because it is being used by merchants, law enforcement agencies and almost everyone else who needs to know where you and your smart electronic device are. We note that while users of smart devices may not be aware, these technologies have huge ethical and privacy implications to users of these devices. In our discussion, we focus on the security and threat to individual privacy, for even in public places individuals deserve some privacy, through the collection, aggregation and centralization of personal information, without user consent of the user, and also on the absence of applicable laws. Use of LTS technologies increases the risks to the privacy and security of individuals. On security issues in the ecosystem, we note that mobile devices are increasingly holding and storing more private data like personal and business and they are roaming in public spaces on public networks with limited security and cryptographic protocols to protect the data. Also because of the fact that these devices have the ability to roam on several networks, there is a wider sphere of attack beset by geographical, legal and moral differences. We note that the penetration trend of these smart mobile devices is not limited to far away rural places but more scaring is their rapid penetration on enterprise IT spaces where security is paramount for any device.
Joseph Migga Kizza
Backmatter
Metadaten
Titel
Ethics in Computing
verfasst von
Joseph Migga Kizza
Copyright-Jahr
2016
Electronic ISBN
978-3-319-29106-2
Print ISBN
978-3-319-29104-8
DOI
https://doi.org/10.1007/978-3-319-29106-2