IS 201 Computer Ethics

Tuesday, January 18, 2005

MODULE 8 SAQs

2. Think of an act, other than those already discussed in this module that
would constitute a violation of privacy in computing. Explain.

ONLINE PRIVACY

The lightweight content management systems known as weblogs or blogs have enjoyed a massive popularity explosion in the past few years, more or less becoming a distinct literary form. But although the blog has proven itself technically capable of meeting the need for many kinds of information dissemination and archiving, numerous social and legal problems have emerged in the practice of real-world blogging. Many of these problems cluster around the almost totally public nature of online expression. Paradoxically, we may be reaching a point where greater expression can only be achieved through greater privacy.
Online privacy is ultimately a matter of law; but the law develops within an understanding of specific technical capabilities. Software implementors can, should, and increasingly do design towards social-engineering goals, such as the ability to resist legal challenge. Design from high-level needs is particularly relevant in the case of blogware, where a large percentage of users are not themselves developers and therefore usability is a primary concern -- perhaps the primary concern. The combination of sophisticated social goal and need for usability means that the state of the law must be baked into blogware tools themselves – a daunting challenge for any development team.

MODULE 7 SAQs


1. What is spamming? Differentiate it from flaming.

Spamming is the process where individuals post identical messages to different newsgroups sometimes with the intent of purposely disrupting ongoing discussions. It also may mean sending mass copies of unsolicited Email to multiple addresses. This action makes it more difficult for receivers to separate personal Email from ‘junk mail’ and maintain on-topic, relevant newsgroup discussions. It may also result in local technical problems such as storage overflow and slow response.
Flaming is a public personal attack against another user (calling another user names). The absence of a social mechanism to correct the behavior and the anonymity of the abusers, may lead to flaming that is initially amusing to bystanders but can quite rapidly get out of control.

2. What are computer worms and viruses? Explain how these operate. Give examples.

A computer virus attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels. Much like human viruses, computer viruses can range in severity; some viruses cause only mildly annoying effects while others can damage your hardware, software, or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.
A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the ability to travel without any help from a person. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided. The biggest danger with a worm is its ability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line. Due to the copying nature of a worm and its ability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers, and individual computers to stop responding. In more recent worm attacks such as the much talked about .Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.

3. Choose one example of computer abuse which you think is morally wrong. Explain why you consider it morally wrong using any of the ethical principles you have learned in the earlier modules.

Hacking is one of a computer abuse that is really destructive. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do.

According to The New Hacker's Dictionary(http://www.logophilia.com/jargon/jargon_toc.html) a hacker can be defined as:
1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.
2. A person capable of appreciating hack value.
3. A person who is good at programming quickly.
4. An expert at a particular program, or one who frequently does work using it or on it.
5. An expert or enthusiast of any kind.
6. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.

Nowadays, a number of issues arise in considering hacking from the educator perspective. First, we need to consider the fact that the public perception of hackers is mixed, and that "hacking" and "being considered a hacker" can be quite appealing to students who are going through developmental periods in which they are defining themselves, as well as challenging authority and rules. There is often a Robin Hood mentality to early actions, though it is unclear exactly who "the poor" are, and how they are "being compensated". Second, the anonymity of actions which hackers perform against others often enhances the severity of actions. For example, an adolescent who would never consider picking someone's pocket or physically damaging someone else's property or home, might be quite willing to steal people's credit card numbers or destroy poorly protected business or government files, since files and credit card numbers are not tangible entities, and the damage is done anonymously.
We studied About different ethical principles, one of the definition stated “Ethics as an concept suggests the notion of correct or incorrect practices relative to various concerns or fields of study” thus hacking is one of the applied ethics that holds the boundaries of the study. Although “hackers” have their own reason in doing such things, the absence of good values, correct practices, and right attitudes point to their job.
We also studied about the different existing laws such as Divine, Natural, Moral and Physical law. Divine law - Allowing evil thoughts can be considered committing a sin, how much more if you put it into action like the job of the hackers. Natural law – according to Plato, we must infatuated the law within our selves and not only the institutional law given by the human beings, it means that every human being must show innate goodness, thus hackers can also apply in their profession.
We also studied the ten commandments for computer ethics. Almost all the given precept violated by the “hackers”.

MODULE 6 SAQs

A. Daan is a computer buff. He loves to surf the Internet and try all available applications. Daan also does web design and programming, among others. In one of his computer explorations, Daan discovered a virus that destroys the computer motherboard. To test his discovery, Daan surreptitiously installed the virus in his friend Kael’s PC. After a week, Kael broke the sad new to Daan. His PC has bogged down and he needs to buy a new motherboard. Daan finds himself torn between whether to tell Kael or not.
1. Which of the 10 commandments on computer use did Daan violates?
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people’s computer work.
7. Thou shalt not use other people’s computer resources without authorization.

2. If you were Daan, will you tell the truth or not? Explain.
Even the damage has been done, I will tell Kael the truth. There is no secret that can keep forever. At least telling the truth will set me free. For me to settle the damaged that I’ve done I will change all the expenses, maybe I will buy a new mother board for him.

3. If you were Kael and Daan told you the truth, what will you do?
At first, it is hard for me to accept the fact that I have a friend that he can do everything for the test of his expertise even unethical way, and the only solution to make my emotions slowdown is to charge all the expenses to Daan. I will tell Daan what I’ve learned about computer ethics and inform him about the existing law regarding computer. In that way, he will be aware with the environment of his field and its limitations.

B. Pick three of the precepts on computer use discussed above and briefly explain each precept in terms of the theory of ethics and the ethical concepts that underpin it.

1. Thou shalt not use a computer to harm other people.
In this precept, ethics as the study of morality and human action holds and it also touched the moral and physical law by definition. This precept can be classified as ethical absolutism because there is no such as good actions involved in the word “harm” per se. Since computing is a human action and the said precept in one of the human actions that involved fairness, goodness and justice, the applicable finalist theory is that Aristotle’s Nicomechean ethics.


2. Thou shalt not interfere with other people’s computer work.
In the second precept, ethics basically concerns human action, “Interference” is an action or in other form of collision / obstruction that produces unethical act in field of computing and it is under the study of the morality and human actions, also, it is a violation of moral and physical law.

3. Thou shalt not snoop around in others people’s files.
This precepts deals with the basic principles of right action especially with reference to a particular person and profession because getting an information without permission is an immoral act and unlawful. It pertains with the moral and natural law. Snooping or browsing private information is an ethical absolutism regardless the reason and in the Utilitarianism theory.

C. Cite two ethical issues in computing. Explain how they are ethical in nature.

1. HISTORY - LEXIS-NEXIS P-TRAK SERVICE

Lexis Nexis witnessed one such demand in August 1996 when thousands of consumers called, emailed, and faxed in requests to be removed from the P-Trak service. Services such as P-Trak, which provide "credit header" information, have been available for quite some time, however most consumers are unaware of their existence.
You can choose to opt-out of P-Trak, and other personal locator services, at CDT's Operation Opt-Out web site.
On Friday, September 20, 1996, the Federal Trade Commission recommended that Congress take action to protect the privacy of personal information by amending the Fair Credit Reporting Act (FCRA). The FTC's recommendations -- included in a letter to Senator Richard Bryan (D-NV) -- come on the heels of consumer outrage being expressed over the recently-released online database, P-Trak, offered by the information service Lexis-Nexis.
P-Trak provides personal information on millions of people across the country. For a fee, Lexis-Nexis subscribers can obtain personal information about an individual that can include name, current and prior addresses, maiden names, birth month and year, and current telephone number. In June 1996, Lexis-Nexis stopped displaying Social Security numbers in response to complaints from consumers and privacy advocates about the availability of that information. However, P-Trak users can still search the database by Social Security number.
In response to Sen. Bryan's inquiry, Federal Trade Commission (FTC) Chairman Robert Pitofsky notes in the Sept. 20, 1996, letter that "... the ready availability of this information through the tracking service may facilitate identity fraud, credit fraud, and other illegal activities." Chairman Pitofsky recommends strengthening the Fair Credit Reporting Act to provide protection to information such as social security number, mother's maiden name, prior addresses, and date of birth.
Before it adjourned the 104th Congressional Term in November 1996, Congress added an amendment to the Omnibus Appropriations Bill which directs the Federal Reserve Board to examine whether the sale of "sensitive consumer identification information" creates "an undue potential for fraud."Although this is a half-hearted response to the FTC's recommendations and the public's cry for action, it is a small tribute to the power and importance of the Internet in turning public opinion into action.
Following passage of the bill, Chairman of the Senate Committee on Commerce, Science and Transportation, Sen. Larry Pressler (R-SD), ranking minority member Senator Ernest Hollings (D-SC), and Senator Richard Bryan (D-NV), sent a letter requesting the FTC to conduct a study of online and database privacy issues.
While no legislation was enacted,(pass, ratify, endorse) the outcry (protest) over P-Trak proved useful in two other areas. First, the P-Trak furor (disturbance) may have played a roll in eliminating an industry pushed exemption to the FCRA which would have allowed credit reports to be used to generate target marketing lists -- currently against FTC rules interpreting the FCRA. Second, the recent announcement by "Privacy Assured", a group of Internet companies that include Four11 and I/PRO, to voluntarily comply with a series of privacy protective information practices is clearly tied to a desire to respond to public concerns over individual privacy.
SOURCE: http://www.cdt.org/privacy/issues/pii/
EXPLANATION:
This can be consider as an ethical issue in computing because this will be helpful to those who are with internet transaction and especialy users without deep knowledge in computer.
Consumers are often unaware of the reuse and disclosure of personal information they provide to others during daily transactions. While the Internet and other interactive media are shedding new light on the large market for personal information, consumers are still shocked to learn that information about their activities ranging from online browsing to grocery shopping is used for a variety of purposes and made available to other companies without their permission. When individuals become aware of the availability of personal information, many take steps to protect it.


2. CHAIN LETTERS
A chain letter is a "get rich quick" scheme that promises that your mail box will soon be stuffed full of cash if you decide to participate. You're told you can make thousands of dollars every month if you follow the detailed instructions in the letter.
A typical chain letter includes names and addresses of several individuals whom you may or may not know. You are instructed to send a certain amount of money--usually $5--to the person at the top of the list, and then eliminate that name and add yours to the bottom. You are then instructed to mail copies of the letter to a few more individuals who will hopefully repeat the entire process. The letter promises that if they follow the same procedure, your name will gradually move to the top of the list and you'll receive money -- lots of it.
There's at least one problem with chain letters. They're illegal if they request money or other items of value and promise a substantial return to the participants. Chain letters are a form of gambling, and sending them through the mail (or delivering them in person or by computer, but mailing money to participate) violates Title 18, United States Code, Section 1302, the Postal Lottery Statute. (Chain letters that ask for items of minor value, like picture postcards or recipes, may be mailed, since such items are not things of value within the meaning of the law.)
Recently, high-tech chain letters have begun surfacing. They may be disseminated over the Internet, or may require the copying and mailing of computer disks rather than paper. Regardless of what technology is used to advance the scheme, if the mail is used at any step along the way, it is still illegal.
The main thing to remember is that a chain letter is simply a bad investment. You certainly won't get rich. You will receive little or no money. The few dollars you may get will probably not be as much as you spend making and mailing copies of the chain letter.
Chain letters don't work because the promise that all participants in a chain letter will be winners is mathematically impossible. Also, many people participate, but do not send money to the person at the top of the list. Some others create a chain letter that lists their name numerous times--in various forms with different addressee. So, in reality, all the money in a chain is going to one person.
Do not be fooled if the chain letter is used to sell inexpensive reports on credit, mail order sales, mailing lists, or other topics. The primary purpose is to take your money, not to sell information. "Selling" a product does not ensure legality. Be doubly suspicious if there's a claim that the U.S. Postal Service or U.S. Postal Inspection Service has declared the letter legal. This is said only to mislead you. Neither the Postal Service nor Postal Inspectors give prior approval to any chain letter.
Participating in a chain letter is a losing proposition. Turn over any chain letter you receive that asks for money or other items of value to your local postmaster or nearest Postal Inspector. Write on the mailing envelope of the letter or in a separate transmittal letter, "I received this in the mail and believe it may be illegal."
SOURCE: http://www.usps.com/websites/depart/inspect/chainlet.htm
EXPLANATION:
Another ethical computing issue that inform us in our email contents. This issue will serve as a guide and awareness what we should do if we encounter such chain letter, giving idea the reason behind why they spending time of getting or making this kind of letter, the outcome if you participate in this kind of internet hoaxes.



D. As a computer user, do you approve of an ordering principle, in the form of legislation, being formulated and enforced to govern computer use? Why? Why not? Defend your answer.

Yes, I am agree of the ordering principle from the legislator, since our country is running for the widespread information technology, there should be a complete policies or laws that govern in computer use. All the courses that are Information Technology related should have a subject included in their curriculum. In that way, before they will focus on their field they are already aware in the limitations and the scope of their job. This ordering principle should be imposed to all the computer users even though they are not IT course related as long as they use computer.

MODULE 5 SAQs

A. You became the chief of police in your place after successfully going after big time computer hackers and a syndicate engaged in the production and sale of pirated software. One day, you find out that your eldest son is an active computer hacker. When you confront your son, he tells you that he is sorry and he promises that he will never again engage in activities involving computer crimes. You are now faced with the problem of having to choose between two options: first, as a chief of police, you have a duty to arrest your own son; and seconds, as a parent, you have the duty to protect your son.
ANSWER:
1.
2.
3.
4. The situation illustrates the problem of moral principle.

B. In your own opinion which of the moral problems discussed is the most pervasive? Explain your answer.
ANSWER:
The most spread moral problems through every part is that the moral principle. Principle make human beings having a good decision and right choice in chase of the good life, but the moral principle itself doesn’t have a standard principle for us to opt and to maintain in that level of choice. Most of the time moral principle depends on the situation, person involved, area where action taken, race, gender and thus, also happening in the computing world, some cases depends on the principle of individual. The individual principle will be the guiding method of some of us, especially when the person commit an action is in the higher level in society there is a breach of moral principle.

MODULE 4 SAQs

1. Which of the finalist thoerist appeals to you most?

I am impressed with Aristotle’s Nicomachean Ethics because he explained well every stage or level of attitudes. He point out from the specific to general characteristics of attitudes of human beings. In that sense, you will easily find out the reason behind why other people unethical. In the world of computing, we should have a moral virtue and intellectual virtue for us to attain good life.

2. Which do you think seems to predominant in the worls of computing as you know it?

For me wisdom is the superior power that will guide in human being to produce a good life. Wisdom described as intellectual virtue of thought, where there is wisdom every decision you have an excellent reason and every action you have a deep understanding.

MODULE 3 SAQs

A. How would you classify the moral issues in computing enumerated below? Write your answer in the blank before each item and be ready to support your answers.
MG - morally good under all circumstances
MB - morally bad under all circumstance
MGB - morally good / bad under certain circumstances

1.Software piracy
MGB - since the price of the original software is too expensive, learning computer software become hard for those who cannot afford to buy the original copy.
2.Pornography on the Net
MB – This is morally bad especially for children who already knows searching on the net.
3.Creation of worms and computer viruses
MB - this is destructive to all the computer users.
4.Infringement of intellectual property rights ( of computer programmers)
MGB – Copying, distributing, downloading, and uploading information on the Internet may infringe the copyright for that information. Even an innocent, unintentional infringement violates the law. According to TEACH, the Technology, Education, and Copyright Harmonization Act (TEACH) of 2002 updated federal copyright law to facilitate digital education use of materials without requiring copyright permission, subject to several conditions. TEACH says it is not copyright infringement for teachers and students at an accredited, nonprofit educational institution to transmit performance and displays of copyrighted works as part of a course if certain conditions are met. If these conditions cannot be met, permission from the copyright holder must be obtained. http://www.etsu.edu/students/spectrum/IntellectualProperty.htm
5.Violation of privacy ( in communications via Internet)
MB – Every human being has a right to be secure in everything his owned.
6.Plagiarism
MB- to avoid plagiarism always paraphrase instead of using direct quotes when possible. It is important to learn to express ideas in your own words. But, when you paraphrase an idea or concept that is not common knowledge, you must reference your source directly in your text, or refer to the original author(s) in your paraphrased text.
7.Spamming
MB – Spamming is wasting time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques.
8.Hacking
MB- Some hackers feel that they are no more than explorers out to see how far they can get into other computer systems. Some of them use their skills to help companies and agencies to find errors in their computer security system. Others, usually known as crackers, are out to find information, change something, or cause damage in other's computer systems. The legal implication of hacking is covered under law Title 18: Crimes and Criminal Procedure: Part 1: Crimes: Chapter 47: Fraud and False Statements: Section 1030: Fraud and related activity in connection with computers. The federal punishment for hacking into computers ranges from a fine or imprisonment for no more than one year to a fine and imprisonment for no more than twenty years. This wide range of punishment depends upon the seriousness of the criminal activity and what damage the hacker has done.
9.Computer abuse
MB – Abuse in all things is not good.
10.Computer crimes in general
MB - Computer crime involves the unauthorized and unlawful use of a computer and these are morally bad.

B. Discuss how adherents of ethical egoism and latruism would analyze the following situations. Suport your answers.

CASE 1: Roger designed a computer program that would make detection of enemy code easier.
Ethical Egoism: He try if his knowledge is enough to designed a computer program and to be known as a programmer.
Ethical Altruism: Roger wants to share his ability in making a computer program.

CASE 2: Perla plans to buy licensed software in the U.S. using royalties from the sale of her book on computer ethics, and donate the software to her alma mater.
Ethical Egoism: Giving donations will help for advertising her book of computer ethics.
Ethical Altruism: She wants her alma mater be updated using the computer software she bought from the U.S.

CASE 3: Marjo wants to create a virus that would affect only laptop operations.
Ethical Egoism: Marjo wants to be famous in terms of virus creator and also have an income for making a virus scan.
Ethical Altruism: Marjo wants to try if he can do that kind of virus and to prove the effect of his work

CASE 4: Baba debugged a secret code of the NBI that allowed her to access all computer systems of the agency. She plans to sabotage the whole system as a form of revenge for what she considers to be the NBI’s violation of her human rights.
Ethical Egoism: Baba’s believe that revenge is the way to fight for her human rights.
Ethical Altruism: On the other hand, Baba wants that the NBI agents open their eyes and face the consequence of their wrong doings.

CASE 5: Tikya and John-john were contracted to design and develop a website for government agencies in the Philippines at the cost of P1 million. An added feature of the contract is that they would be contracted as computing consultants of the government.
Ethical Egoism: Tikya and John-john seek for security in their job and be a part of a long term period in the company.
Ethical Altruism: they want to focus on the website design and give their effort fully because they believe that this is not only use by the small company but it will be using by different government agencies of the Philippines.