Looks like no one added any tags here yet for you.
Morals
Personal beliefs about what is fair and what is right or wrong
Ethics
The rules that a society system provides us with
Ethnocentrism
belief your culture is better than another culture
Cultural relativism
not judging a culture to our own standards
Moral Absolutism
the view that there are moral laws that are universal and unconditional across all cultures
Example: a murder, which is always considered as morally wrong even if it was done in self-defense or for protection
Utilitarianism
an ethical theory that determines the morality of the actions of an individual based on their outcome
Example: Let us assume four people suffer from kidney damage, liver damage, brain hemorrhage, and heart disease. All of them need urgent organ transplants for their survival. Incidentally, another person named Hayden has been in a coma for the last five years. Doctors have expressed less hope for the survival of the person. The family of Hayden has appealed for mercy killing for the person in the court. However, per the utilitarian theory, the greater good lies in helping the four patients needing organ transplants after the mercy killing is approved. Hence Hayden's organs would be utilized to help the other four people to survive, which is the best outcome of the action.
Ethical egoism
acceptance of society for people to pursue their own self-interests. We "SHOULD" act in our own self-interest
Psychological egoism
philosophical theory that says all human action is motivated by self-interest. We "DO" act in our own self-interest
Consequentialism
an ethical theory that judges whether or not something is right by what its consequences are
Example: Trolley problem of 5 people vs 1 person
Deontology
an ethical theory that uses rules to distinguish right from wrong
Example: you're a software engineer and learn that a nuclear missile is about to launch that might start a war. You can hack the network and cancel the launch, but it's against your professional code of ethics to break into any software system without pe rmission. And it's a form of lying and cheating. Deontology advises not to violate this rule. However, in letting the missile launch, thousands of people will die
Computer Ethics
set of commonly agreed principles that govern the use of computers
Why is Computer Ethics important?
To protect personal & commercial information, To control plagiarism, To suppress dishonest business practices and to protect and encourage fair competition, & To promote moral and social values in society
Positive impacts of Computers
Employment, Education, Communication, E-Commerce, Health care, Entertainment, Science and technology, and Multimedia
Negative impacts of Computers
Reduction of Employment, Computer Crime, Privacy, Creativity, Physical Effects, Mental health, Safety
10 Commandments of Computer Ethics
1) Thou shalt not use a computer to harm other people.
2) Thou shalt not interfere with other people's computer work.
3) Thou shalt not snoop around in other people's computer files.
4) Thou shalt not use a computer to steal.
5) Thou shalt not use a computer to bear false witness.
6) Thou shalt not copy or use proprietary software for which you have not paid.
7) Thou shalt not use other people's computer resources without authorization or proper compensation.
8) Thou shalt not appropriate other people's intellectual output.
9) Thou shalt think about the social consequences of the program you are writing or the system you are designing.
10) Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
Privacy
to be free from interference and intrusion
to associate freely with whom, you want
to be able to control who can see or use information about you
Personally identifiable information (PII)
Data that could be used to identify, contact or locate an individual or distinguish one person from another
Personal health information (PHI)
Medical history, insurance information and other private data that is collected by healthcare providers and could be linked to a certain person
Personally identifiable financial information (PIFI)
Credit card numbers, bank account details or other data concerning a person's finances
Student records
An individual's grades, transcripts, class schedule, billing details and other educational records
THE SEVEN CATEGORIES OF PRIVACY
1. PRIVACY OF PERSON
2. PRIVACY OF BEHAVIOR AND ACTION
3. PRIVACY OF COMMUNICATION
4. PRIVACY OF DATA AND IMAGE (INFORMATION)
5. PRIVACY OF THOUGHTS AND FEELINGS
6. PRIVACY OF LOCATION AND SPACE (TERRITORIAL)
7. PRIVACY OF ASSOCIATION
Children's Online Privacy Protection Act (COPPA)
U.S. law that protects children's online data
Health Insurance Portability and Accountability Act (HIPAA)
a federal privacy protection law that safeguards individuals' medical information
Gramm-Leach-Bliley Act (GLB Act or GLBA) AKA the Financial Modernization Act of 1999
This law protects consumer privacy and applies to any financial institution that collects, uses, or discloses personal information
Fair Credit Reporting Act (FCRA)
a federal law that helps to ensure the accuracy, fairness and privacy of the information in consumer credit bureau files
Family Educational Rights and Privacy Act (FERPA) AKA Buckley Amendment
protect the privacy of personally identifiable information in a student's education record
PRIVACY ACT (1974)
It safeguards privacy through creating four procedural and substantive rights in personal data.
Internet Privacy Issues
1.Identity theft
2. Mobile apps and privacy
3. Location tracking
4. Search engines user tracking
5. Social Media Data Mining
6. Harassment, cyberbullying, and impersonation
7. Electronic Surveillance
8. Spyware
Personal information
any information relating to an individual person.
Informed consent
users being aware of what information is collected and how it is used.
Invisible information gathering
collection of personal information about a user without the user's knowledge
Secondary use
Use of personal information for a purpose other than the purpose for which it was provided
Data Mining
Searching and analyzing masses of data to find patterns and develop new information or knowledge.
Computer matching
Combining and comparing information from different databases (using social security number, for example) to match records.
5 PRINCIPLES OF DATA ETHICS FOR PROFESSIONALS
1. Ownership
2. Transparency
3. Privacy
4. Intention
5. Outcomes
Principles for Ethical Behavior
1. Inform people when you collect information.
2. Collect only the data needed.
3. Offer a way for people to opt out.
4. Keep data only as long as needed.
5. Maintain accuracy of data.
6. Protect security of data.
7. Develop policies for responding to law enforcement requests for data.
the First Amendment of the Constitution
Freedom of speech is a constitutional protection that gives individuals and communities the right to present their ideas and opinions without fear of being censored by the government
Communications Decency Act of 1996 (CDA)
United States Congress's first notable attempt to regulate pornographic material on the Internet
Net Neutrality
the principle that the company that connects you to the internet does not get to control what you do on the in ternet
No Blocking, Throttling, or Paid Prioritization
intellectual property
set of intangible assets owned and legally protected by a company or individual from outside use or implementation without consent
Patent
right to eliminate other people from using, making, selling, or importing the patented invention of the owner.
Trademark
any word, phrase, symbol, design, or a combination of these things that identifies your goods or services.
Trademark symbol
You can use "TM" for goods or "SM" for services even if you haven't filed an application to register your trademark. Once you register your trademark with us, use an ® with the trademark
Trade Secret
defined as a piece of information that is kept confidential or reasonably Which provides a business with an economic benefit over its competitors.
Copyright
the rights that creators have over their literary and artistic works
Intellectual property theft
robbing people or organizations of their ideas, inventions, creative products, and other types of IP.
Fair use
permits a party to use a copyrighted work without the copyright owner's permission for purposes such as criticism, comment, news reporting, teaching, scholarship, or research
Computer crime
a crime involving computing against a digital target or a crime in which a computing system is used to commit criminal offenses
Hacking
gain unauthorized access to personal or organizational data
Hacktivists/Hactivism
Derived from combining the words 'Hack' and 'Activism', it's the act of hacking, or breaking into a computer system, for politically or socially motivated purposes
white hat hackers
ethical security hackers who identify and fix vulnerabilities, with the permission of the organizations they hack into
black hat hackers
cybercriminals that illegally crack systems with malicious intent
gray hat hackers
may not have the criminal or malicious intent of a black hat hacker, but they also don't have the prior knowledge or consent of those whose systems they hack into
Computer Fraud and Abuse Act (CFAA)
an amendment to the first federal computer fraud law, to address hacking
identity theft/fraud
terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.
Phishing
clicking on fraudulent links in emails
Vishing
call or leave a voicemail
Smishing
a phishing scam conducted over text message
Pharming
hacker mimics a real website and redirects a user to the fake website
Distributed denial of service (DDoS) attack
when a hacker send a large amount of website traffic or pings to a network to try and slow it down or completely shut it down
10 Employee Rights of Every Employee
1. Privacy Rights
2. Harassment free workplace
3. Safe Workplace
4. Whistleblowing
5. Retaliation Protections
6. Reasonable Accommodations
7. Fair Pay
8. Overtime Wages
9. Unpaid, Job-Protected Leave
10. File a Complaint or Lawsuit
FMLA (Family Medical Leave Act)
entitles eligible employees of covered employers to take unpaid, job-protected leave for specified family and medical reasons with continuation of group health insurance coverage under the same terms and conditions as if the employee had not taken leave.
Equal Pay Act
made it illegal for employers to pay female workers less than men for the same job
Civil Rights Act of 1964
outlawed discrimination based on race, color, religion, sex, or national origin
the Pregnancy Discrimination Act
specifically outlaws discrimination on the basis of pregnancy
Age Discrimination in Employment Act (ADEA)
Act that prohibits discrimination in employment for persons age 40 and over.
The Americans with Disabilities Act (ADA)
Act addresses rights of individuals with disabilities in employment and public accommodations.
Types of Employee Monitoring
Web Activity Tracking/Direct Monitoring, Email Monitoring, Gadgets Monitoring/Computer Monitoring, GPS Tracking, Phone Monitoring and Audio Surveillance, Video Surveillance, Keylogger
Electronic Communications Privacy Act of 1986 (ECPA)
if a company provides a work device, it is considered business property. An employer reserves the right to monitor document, file, internet, and app usage on a company computer. Even if the employee brings the device home, any activity done on it can be audited
Information and communication technologies (ICT)
technological tools and resources used to transmit, store, create, share or exchange information
digital divide
the gap that exists between individuals who have access and those who do not, or who have limited access
Common types of digital divide
Infrastructure divide, Wealth and income divide, Social divide, Gender Divide, Age-Related Issues, Socioeconomic Factors, Geographic Causes, Racial, Cultural, and Language, Motivation and General Interest
Neo-Luddism
a philosophy opposing many forms of modern technology
The CRAAP Test
An easy way to remember how to evaluate sources for credibility (Currency, Relevance, Authority, Accuracy, Purpose)
System Failure
Occurs when a computer crashes or an individual application fails
Examples of system failures
Ariane 5 (Only about 40 seconds after initiation launcher veered off its flight path, broke up and exploded), Theriac-25 (exposed them to massive overdoses of radiation), Denver Airport Case (Originally planned to automate the handling of baggage through the entire airport, the system proved to be far more complex than some had original believed)
Characteristics of a good User Interface
Simplicity, Clarity on Error messages, Consistency, Efficiency, Responsiveness
Traffic Alert and Collision Avoidance System (TCAS) aka Airborne Collision Avoidance System (ACAS)
an airborne system designed to increase cockpit awareness of nearby aircraft and service as a last defense against mid-air collisions
Software Engineering Phases
1. Planning
2. System Analysis
3. System Design
4. Coding/Development
5. Testing
6. Implementation (Launch and Support)
7. Operations and Maintenance
Professional Ethics
to ensure that professionals adhere to certain standards of behavior, which are essential for building trust and maintaining the integrity of their profession
Importance of Professional Values and Ethics
Personal Level - positive impact on our personal growth as well as on the quality of life for our surrounding community
Business Level - positive image for an organization for clients, competitors and the public & help build friendly and respectful work environment
Public Level - build confidence in the professions' trustworthiness & greater transparency to clients and members of the society when the codes of conduct are disclosed publicly
General principles of professional ethics
1.Integrity
2.Respect
3.Responsibility
4.Competence
5.Fairness
Sarbanes-Oxley (SOX) Act of 2002
in response to highly publicized corporate financial scandals earlier that decade
Code of Ethics vs. Code of Conduct
code of ethics: details the general ethics that a person or employee should uphold
code of conduct: details the way that a person or employee should behave in order to uphold the code of ethics
American Bar Association (ABA)
establishes the legal and ethical obligations attorneys owe to their clients, the courts, and the public at large
American Medical Association
a code of ethics on physicians; everything from interpersonal relationships with other staff members to information on patient care
Teachers and Education
developed by the distinguished AAE Advisory Board and by the Executive Committee of AAE. It contains four basic principles relating to the rights of students and educators.
1. Ethical Conduct toward Students
2. Ethical Conduct toward Practices and Performance
3. Ethical Conduct toward Professional Colleagues
4. Ethical Conduct toward Parents and Community
Financial advisers
legally bound to a code of ethics known as a fiduciary duty, requires them to act in the best interest of their clients. Certified public accountants (CPAs) are expected to follow similar ethical standards of truthfulness, objectivity and integrity
Computing Professionals
who use their knowledge of computers and computing technology to create, design, maintain, or use computer-based systems
Association for Computing Machinery (ACM)/IEEE-CS Software Engineering/AMI (Australian Marketing Institute) Code of Professional Conduct
developed a code of ethics for computing professionals/software engineers, which serves as a guide for making decisions in the field