18CS014-LM6
18CS014-LM6
ETHICS
Ethics refers to the principles of right and wrong that individuals, acting as free moral agents, use
to make choices to guide their behaviors.
Information systems raise new ethical questions for both individuals and societies because they
create opportunities for intense social change, and thus threaten existing distributions of power,
money, rights, and obligations.
Like other technologies, such as steam engines, electricity, the telephone, and the radio,
information technology can be used to achieve social progress, but it can also be used to commit
crimes and threaten cherished social values.
The development of information technology will produce benefits for many and costs for others
Ethical Issues in Information
Technology
Some of the major ethical issues faced by Information Technology (IT) are:
1. Personal Privacy
2. Access Right
3. Harmful Actions
4. Patents
5. Copyright
6. Trade Secrets
7. Liability
8. Piracy
Personal Privacy
It is more difficult to deal with these types of ethical issues. A patent can
preserve the unique and secret aspect of an idea.
Obtaining a patent is very difficult as compared with obtaining a copyright. A
thorough disclosure is required with the software.
The patent holder has to reveal the full details of a program to a proficient
programmer for building a program.
Copyright
The information security specialists are to be familiar with necessary concept
of the copyright law. Copyright law works as a very powerful legal tool in
protecting computer software, both before a security breach and surely after
a security breach.
This type of breach could be the mishandling and misuse of data, computer
programs, documentation and similar material. In many countries, copyright
legislation is amended or revised to provide explicit laws to protect computer
programs.
Trade Secrets
Piracy is an activity in which the creation of illegal copy of the software is
made.
It is entirely up to the owner of the software as to whether or not users can
make backup copies of their software.
As laws made for copyright protection are evolving, also legislation that
would stop unauthorized duplication of software is in consideration.
The software industry is prepared to do encounter against software piracy.
The courts are dealing with an increasing number of actions concerning the
protection of software.
LIABILITY
Find out who did what to whom, and where, when, and how. In many
instances, you will be surprised at the errors in the initially reported facts,
and often you will find that simply getting the facts straight helps define the
solution. It also helps to get the opposing parties involved in an ethical
dilemma to agree on the facts.
Define the conflict or dilemma and identify
the higher-order values involved.
Ethical, social, and political issues always reference higher values. The
parties to a dispute all claim to be pursuing higher values (e.g., freedom,
privacy, protection of property, and the free enterprise system). Typically, an
ethical issue involves a dilemma: two diametrically opposed courses of action
that support worthwhile values.
EXAMPLE
Identify the stakeholders.
Every ethical, social, and political issue has stakeholders: players in the game
who have an interest in the outcome, who have invested in the situation, and
usually who have vocal opinions. Find out the identity of these groups and
what they want. This will be useful later when designing a solution.
Identify the potential consequences of
your options
Some options may be ethically correct but disastrous from other points of
view. Other options may work in one instance but not in other similar
instances. Always ask yourself, “What if I choose this option consistently over
time?
Internet Challenges to Privacy
Web sites can learn the identities of their visitors if the visitors voluntarily
register at the site to purchase a product or service or to obtain a free
service, such as information.
Web sites can also capture information about visitors without their
knowledge using cookie technology. Cookies are small text files deposited on
a computer hard drive when a user visits Web sites.
Cookies identify the visitor’s Web browser software and track visits to the
Web site.
When the visitor returns to a site that has stored a cookie, the Web site
software will search the visitor’s computer, find the cookie, and know what
that person has done in the past. It may also update the cookie, depending on
the activity during the visit.
Web beacons.
There are now even more subtle and surreptitious tools for surveillance of
Internet users.
Marketers use Web beacons as another tool to monitor online behavior. Web
beacons, also called Web bugs, are tiny objects invisibly embedded in e-mail
messages and Web pages that are designed to monitor the behavior of the
user visiting a Web site or sending e-mail.
The Web beacon captures and transmits information such as the IP address of
the user’s computer, the time a Web page was viewed and for how long, the
type of Web browser that retrieved the beacon, and previously set cookie
values.
Web beacons are placed on popular Web sites by “third party” firms who pay
the Web sites a fee for access to their audience. Typical popular Web sites
contain 25–35 Web beacons.
There are now tools to help users determine the kind of personal data that
can be extracted by Web sites.
The Platform for Privacy Preferences, known as P3P, enables automatic
communication of privacy policies between an e-commerce site and its
visitors.
P3P provides a standard for communicating a Web site’s privacy policy to
Internet users and for comparing that policy to the user’s preferences or to
other standards, such as the FTC’s FIP guidelines or the European Directive on
Data Protection. Users can use P3P to select the level of privacy they wish to
maintain when interacting with the Web site.
IT Infrastructure and Emerging Technologies
GRID COMPUTING
VIRTUALIZATION
CLOUD COMPUTING
GREEN COMPUTING
AUTONOMIC COMPUTING
THANKYOU