160 likes | 308 Views
Computer and Ethics. Ethical Problems. Proliferation of computers and their networks have created new ethical problems The ACM has issued a Code of Ethics in decision making, to guide us. This code contains the main principles which we should revise before making a decision.
E N D
Ethical Problems • Proliferation of computers and their networks have created new ethical problems • The ACM has issued a Code of Ethics in decision making, to guide us. • This code contains the main principles which we should revise before making a decision
P.A.P.A. model - I • Privacy: • What information about one's self or one's associations must a person reveal to others, under what conditions and with what safeguards? • What things can people keep to themselves and not be forced to reveal to others?
P.A.P.A. model -II • Accuracy: • Who is responsible for the authenticity, fidelity, and accuracy of information? • Who is to be held accountable for errors in information and how is the injured party to be made whole?
P.A.P.A. model -III • Property: • Who owns information? • What are the just and fair prices for its exchange? • Who owns the channels, especially the airways, through which information is transmitted? • How should access to this scarce resource be allocated?
P.A.P.A. model -IV • Accessibility: • What information does a person or an organization have a right or a privilege to obtain, under what conditions and with what safeguards?
P.A.P.A. model - I • Privacy: • We have a lot of private data stored in computers: S.S.#, medical information, credit card #s, that must be kept from prying eyes. • With your credit card # and S.S. # someone could steal your financial identity
P.A.P.A. model -II • Accuracy: • The amount you own in one of your credit card is increased because someone else has used your card without your knowledge. • Your transcript does not coincide with your real grades in some courses.
P.A.P.A. model -III • Property: • Your last paper has been copied and handed in as if it were from another person. • The computer game has been copied, without the programmer receiving proper compensation for his/her effort.
P.A.P.A. model -IV • Accessibility: • Credit bureaus have information about you (about all of us, as a matter of fact). Should you be able to request a copy of your information? Should you be able to ask for corrections if it is wrong?
Tools • The previous principles should guide us in our decision making. • We can’t assume that everybody is going to follow them. • We may use some tools to protect ourselves. Specially in relation with the first 3 principles
Tools • Use passwords to allow different kinds of access (Read, write, no-access), protecting your privacy and property. • Have a disaster recovery plan • Use backups • Big enterprises need to have hot sites
Tools • Use encryption programs that will also protect your privacy and property. • Use anti-virus software, to protect your property and the accuracy of your information • Use anti-spyware programs to detect spyware and adware in your system
Need of Tools - I • Why do we need to use these tools? • Because of the existence of • Hackers (Person who access your computer) • Viruses (Program which attaches to a file and reproduces itself into another files) • Worms (Program that reproduces itself from computer to computer)
Need of Tools - II • Why do we need to use these tools? • Because of the existence of • Trojan Horses (Program that seems to perform a job, when really they are doing something else) • Key-loggers (Program that records to a file everything that is typed on the keyboard. The file is sent to the creator to the program) • Phishing (Sending an email claiming to be a legitimate site, to obtain private information for identity theft)
Tools • For accessibility we must rely on laws, to enforce the accessibility of data. Otherwise the other party will not supply the information. • We have the Freedom of Information Act • Federal law requires that credit bureaus sent a credit report to anyone that ask for it, free of charge.