MODULE 3 SAQs
A. How would you classify the moral issues in computing enumerated below? Write your answer in the blank before each item and be ready to support your answers.
MG - morally good under all circumstances
MB - morally bad under all circumstance
MGB - morally good / bad under certain circumstances
1.Software piracy
MGB - since the price of the original software is too expensive, learning computer software become hard for those who cannot afford to buy the original copy.
2.Pornography on the Net
MB – This is morally bad especially for children who already knows searching on the net.
3.Creation of worms and computer viruses
MB - this is destructive to all the computer users.
4.Infringement of intellectual property rights ( of computer programmers)
MGB – Copying, distributing, downloading, and uploading information on the Internet may infringe the copyright for that information. Even an innocent, unintentional infringement violates the law. According to TEACH, the Technology, Education, and Copyright Harmonization Act (TEACH) of 2002 updated federal copyright law to facilitate digital education use of materials without requiring copyright permission, subject to several conditions. TEACH says it is not copyright infringement for teachers and students at an accredited, nonprofit educational institution to transmit performance and displays of copyrighted works as part of a course if certain conditions are met. If these conditions cannot be met, permission from the copyright holder must be obtained. http://www.etsu.edu/students/spectrum/IntellectualProperty.htm
5.Violation of privacy ( in communications via Internet)
MB – Every human being has a right to be secure in everything his owned.
6.Plagiarism
MB- to avoid plagiarism always paraphrase instead of using direct quotes when possible. It is important to learn to express ideas in your own words. But, when you paraphrase an idea or concept that is not common knowledge, you must reference your source directly in your text, or refer to the original author(s) in your paraphrased text.
7.Spamming
MB – Spamming is wasting time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques.
8.Hacking
MB- Some hackers feel that they are no more than explorers out to see how far they can get into other computer systems. Some of them use their skills to help companies and agencies to find errors in their computer security system. Others, usually known as crackers, are out to find information, change something, or cause damage in other's computer systems. The legal implication of hacking is covered under law Title 18: Crimes and Criminal Procedure: Part 1: Crimes: Chapter 47: Fraud and False Statements: Section 1030: Fraud and related activity in connection with computers. The federal punishment for hacking into computers ranges from a fine or imprisonment for no more than one year to a fine and imprisonment for no more than twenty years. This wide range of punishment depends upon the seriousness of the criminal activity and what damage the hacker has done.
9.Computer abuse
MB – Abuse in all things is not good.
10.Computer crimes in general
MB - Computer crime involves the unauthorized and unlawful use of a computer and these are morally bad.
B. Discuss how adherents of ethical egoism and latruism would analyze the following situations. Suport your answers.
CASE 1: Roger designed a computer program that would make detection of enemy code easier.
Ethical Egoism: He try if his knowledge is enough to designed a computer program and to be known as a programmer.
Ethical Altruism: Roger wants to share his ability in making a computer program.
CASE 2: Perla plans to buy licensed software in the U.S. using royalties from the sale of her book on computer ethics, and donate the software to her alma mater.
Ethical Egoism: Giving donations will help for advertising her book of computer ethics.
Ethical Altruism: She wants her alma mater be updated using the computer software she bought from the U.S.
CASE 3: Marjo wants to create a virus that would affect only laptop operations.
Ethical Egoism: Marjo wants to be famous in terms of virus creator and also have an income for making a virus scan.
Ethical Altruism: Marjo wants to try if he can do that kind of virus and to prove the effect of his work
CASE 4: Baba debugged a secret code of the NBI that allowed her to access all computer systems of the agency. She plans to sabotage the whole system as a form of revenge for what she considers to be the NBI’s violation of her human rights.
Ethical Egoism: Baba’s believe that revenge is the way to fight for her human rights.
Ethical Altruism: On the other hand, Baba wants that the NBI agents open their eyes and face the consequence of their wrong doings.
CASE 5: Tikya and John-john were contracted to design and develop a website for government agencies in the Philippines at the cost of P1 million. An added feature of the contract is that they would be contracted as computing consultants of the government.
Ethical Egoism: Tikya and John-john seek for security in their job and be a part of a long term period in the company.
Ethical Altruism: they want to focus on the website design and give their effort fully because they believe that this is not only use by the small company but it will be using by different government agencies of the Philippines.
MG - morally good under all circumstances
MB - morally bad under all circumstance
MGB - morally good / bad under certain circumstances
1.Software piracy
MGB - since the price of the original software is too expensive, learning computer software become hard for those who cannot afford to buy the original copy.
2.Pornography on the Net
MB – This is morally bad especially for children who already knows searching on the net.
3.Creation of worms and computer viruses
MB - this is destructive to all the computer users.
4.Infringement of intellectual property rights ( of computer programmers)
MGB – Copying, distributing, downloading, and uploading information on the Internet may infringe the copyright for that information. Even an innocent, unintentional infringement violates the law. According to TEACH, the Technology, Education, and Copyright Harmonization Act (TEACH) of 2002 updated federal copyright law to facilitate digital education use of materials without requiring copyright permission, subject to several conditions. TEACH says it is not copyright infringement for teachers and students at an accredited, nonprofit educational institution to transmit performance and displays of copyrighted works as part of a course if certain conditions are met. If these conditions cannot be met, permission from the copyright holder must be obtained. http://www.etsu.edu/students/spectrum/IntellectualProperty.htm
5.Violation of privacy ( in communications via Internet)
MB – Every human being has a right to be secure in everything his owned.
6.Plagiarism
MB- to avoid plagiarism always paraphrase instead of using direct quotes when possible. It is important to learn to express ideas in your own words. But, when you paraphrase an idea or concept that is not common knowledge, you must reference your source directly in your text, or refer to the original author(s) in your paraphrased text.
7.Spamming
MB – Spamming is wasting time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques.
8.Hacking
MB- Some hackers feel that they are no more than explorers out to see how far they can get into other computer systems. Some of them use their skills to help companies and agencies to find errors in their computer security system. Others, usually known as crackers, are out to find information, change something, or cause damage in other's computer systems. The legal implication of hacking is covered under law Title 18: Crimes and Criminal Procedure: Part 1: Crimes: Chapter 47: Fraud and False Statements: Section 1030: Fraud and related activity in connection with computers. The federal punishment for hacking into computers ranges from a fine or imprisonment for no more than one year to a fine and imprisonment for no more than twenty years. This wide range of punishment depends upon the seriousness of the criminal activity and what damage the hacker has done.
9.Computer abuse
MB – Abuse in all things is not good.
10.Computer crimes in general
MB - Computer crime involves the unauthorized and unlawful use of a computer and these are morally bad.
B. Discuss how adherents of ethical egoism and latruism would analyze the following situations. Suport your answers.
CASE 1: Roger designed a computer program that would make detection of enemy code easier.
Ethical Egoism: He try if his knowledge is enough to designed a computer program and to be known as a programmer.
Ethical Altruism: Roger wants to share his ability in making a computer program.
CASE 2: Perla plans to buy licensed software in the U.S. using royalties from the sale of her book on computer ethics, and donate the software to her alma mater.
Ethical Egoism: Giving donations will help for advertising her book of computer ethics.
Ethical Altruism: She wants her alma mater be updated using the computer software she bought from the U.S.
CASE 3: Marjo wants to create a virus that would affect only laptop operations.
Ethical Egoism: Marjo wants to be famous in terms of virus creator and also have an income for making a virus scan.
Ethical Altruism: Marjo wants to try if he can do that kind of virus and to prove the effect of his work
CASE 4: Baba debugged a secret code of the NBI that allowed her to access all computer systems of the agency. She plans to sabotage the whole system as a form of revenge for what she considers to be the NBI’s violation of her human rights.
Ethical Egoism: Baba’s believe that revenge is the way to fight for her human rights.
Ethical Altruism: On the other hand, Baba wants that the NBI agents open their eyes and face the consequence of their wrong doings.
CASE 5: Tikya and John-john were contracted to design and develop a website for government agencies in the Philippines at the cost of P1 million. An added feature of the contract is that they would be contracted as computing consultants of the government.
Ethical Egoism: Tikya and John-john seek for security in their job and be a part of a long term period in the company.
Ethical Altruism: they want to focus on the website design and give their effort fully because they believe that this is not only use by the small company but it will be using by different government agencies of the Philippines.
0 Comments:
Post a Comment
<< Home