IS 201 Computer Ethics

Wednesday, November 24, 2004

MODULE 1 SAQs

1. Pick three definitions of ethics from those given and give your own example of each.

Example of definition # 3: Ethics focuses on the care for the soul.

As an instructor, I have many experiences on the students attitude. One time, I’m the proctor of my class for final examination. One student caught on the act of cheating at the middle of two hours. After the examination I decided to talk to the student one-to-one talk, I ask "why did you that?" And the answer simply “Ma’am I am not ready to take the examination due to my work”. I said “It’s good to study while working but it is not good the way you accomplish it”. The action of the student shows unethical.

Example of definition # 4 Ethics is an area of philosophy that deals man’s pursuit of the “good life”.

Many inventors that are successfully made their goals, but unfortunately their inventions are not successfully used. Like for example the Television, it was made to have a communication from the media but, instead it is the cause of some immoral things that happen in our environment. Other inventors use their talent, knowledge and everything they can give for the future use, but other people innovate it in destructive way.

Example of definition # 5 Ethics is the study and philosophy of human conduct with emphasis on the determination of right and wrong.

Like in our government, there is a lot of existing policies and laws that must be follow. If you look at the government officials, you will confuse because the one who create and propose the law is also the one who violate it. Let us look at the custom services, we have a policy that if the baggage has no permit it will not be allowed to pass on, but some officials they tolerate the wrong doings of their fellowmen. In this situation, it is hard to determine the right and wrong actions since both (right and wrong doings) actions are acceptable.

2. Pick one area of applied ethics, (e.g nursing ethics) study some of its concerns, and summarize what you find out.

Hacker Ethics
Every profession or trade tends to have an ethical code which suggests that it is capable of self-regulation of its members. The code demonstrates the shared core values necessary for people to practice within the professional community. And it enables the public and the government to have some degree of trust for the profession. Some of these codes may be very ancient and formalized, such as the Hippocratic Oath sworn by physicians. Others may be very modern and legalistic, like the code of ethics for applied or academic anthropologists. Some ethical systems may be "underground," (such as the Pirates' Code of 18th century buccaneers or Mafia oaths of loyalty) enabling members of subcultures or groups to survive, cooperate, and escape outsiders. Yet others like the original Hacker Ethic are very informal and simple - rules of thumb to live by.
Groups employ different means of enforcing their ethical systems. Some provisions are often recognized as simply being archaic and are ignored. This is why most doctors do not heed the prohibitions in the Hippocratic Oath against abortion or euthanasia, yet most (but not all!) believe in the ethical principle of not refusing critical treatment to a patient who is unable to pay. Other groups (such as anthropologists) often devise ethical codes simply because they are forced to by the bad behavior of some of their members in the past, and their provisions are specifically tailored to problems that have arisen. Violating some ethical codes can get you banned from the profession or worse, when professional associations exist to enforce the regulations; with hackers, breaking the Hacker Ethic seems to result mostly in anathema or social ostracization, a time-honored method of social control.
Thus, the ethical principles of the Hacker Ethic suggest it is the ethical duty of the hacker to remove barriers, liberate information, decentralize power, honor people based on their ability, and create things that are good and life-enhancing through computers. It remains an open question as to whether it advocates the free distribution of software, the injunction against using computers for malicious purposes, or the need for secure networks based on trust. Each of these document samples show that new hackers are aware of, and advocate (whether intentionally or accidentally) elements of the original Hacker Ethic.

3. Rona belongs to community A where no law prohibits the reproductive (without the permission of the owner) and trading intellectual property like computer software, and the like. Jojo, on the other hand, belong to community B where the law on infringement of intellectual property rights is being enforced. One day, Rona visits Jojo in his home. Unaware of community B’s law of intellectual property, Rona copies computer software designed by Jojo without the latter’s consent and even reproduces the same in voluminous quantity I with the intention to sell the material in community A). As expected, Jojo gets angry with Rona and files a case against her for transgressing as judge. What would be your judgment? Support your position using any of the definition of ethics discussed in this module.

In very person they have their own principle in life, outlook and behaviour that they get it were they grown up. It also applied in different country, they have also their policy, rules and regulation in every aspect of their lives while they are living. In this situation Rona did an unethical act ( Definition#5: Ethics is the study and philisophy of human conduct with empasis on the determination of right and wrong.) with Jojo because she did beyond the personal principle of Jojo and also beyond the law of Jojo’s country.
Rona can be consider as a "hacker" who breaks into someone's computer system without permission. Some hackers intentionally steal data or commit vandalism, while others merely "explore" the system to see how it works and what files it contains. These "explorers" often claim to be benevolent defenders of freedom and fighters against rip-offs by major corporations or spying by government agents. These self-appointed vigilantes of cyberspace say they do no harm, and claim to be helpful to society by exposing security risks. However every act of hacking is harmful, because any known successful penetration of a computer system requires the owner to thoroughly check for damaged or lost data and programs. Even if the hacker did indeed make no changes, the computer's owner must run through a costly and time-consuming investigation of the compromised system.
4. In your opinion, when does an act become ethical or unethical? Explain your answer. Support it using your own example(s).

The problems of deciding what behavior is ethical or unethical are further complicated when values seem to change across time.

In man’s law, each one of us has their own limitations or capacity to do, as long as the action is not beyond the limitation of every person it considered as an ethical act. Same as the place where you did the action, as long as the action is not against the law of the certain place/country it considered as an ethical act. Meaning, I can say that action is unethical if it is against the individual or group laws, policies or regulations. On the other hand, in religious aspect (Christ believers), we have a divine law that if your deed against with the law of God without considering the place, the race, the understanding of a person it is an unethical.



5. If you will be given the opportunity to formulate at least ethical norms to govern computing, what would they be? Briefly explain each.

If given me a chance..., these are the ethical norms that I would like implement:
1. Privacy and confidentiality – every user must have a legal access and security that will not be accessed by the other people, even the user haven’t enough knowledge in handling computer system ( hardware and software).
2. Integrity - assuring that data and programs are not modified without proper authority.
3. Consistency -- ensuring that the data and behavior we see today will be the same tomorrow and become a reference for future.
4. Controlling access to resources – Every user should have limitations in all informations. They should have a level of access according to individual identitifiaction ( e.g. age, educational attainement, profession).