Looks like no one added any tags here yet for you.
Moral Absolutism
Belief in universal moral laws, like against murder
several precautions can be taken to improve the safety and reliability of computer systems.
Define Clear Objectives
Thorough risk assessments
Learn from incidents
Monitor incidences
Frequent Release cycles
Robust testing methods
Continuous monitoring
Recovery plan
Training.
Each profession/industry has its code.
Legal - American Bar Association
Confidentiality
Competence
Professional Courtesy
Medical- American Medical Association
Trust
Do no harm
Privacy
Teachers- AAE Advisory Board and Executive Committee of AAE
Ethical conduct towards students
Ethical conduct towards practices and performance
Ethical conduct towards Colleagues
Ethical conduct towards parents and community
Finance- Fiduciary Duty
Thruthfulness
Objectivity
Integrity
Business
Honesty
Fairness
Leadership
Integrity
Compassion
Respect
Responsibility
Loyalty
Law Abiding
Accountability
Transparency
Environmental Consciousness
There are several things to include in a professional code of ethics.
The work environment
Conflicts of interest
Company-asset protection
Corruption
Attendance
Absence without notice
Harassment
Cell phone use
Dress Code
The different phases of software engineering are:
Analysis
Requirements
Design
Development
Testing
Implement
Generally, there are three computing codes of Ethics.
ACM Code of Ethics for Computing Professionals
ACM/IEEE-S Software Engineering Code of Ethics
The AMI Code of Professional Conduct.
10 Rules of Computer Ethics
Don’t use a computer to harm someone else.
Don’t interfere with someone else’s computer work.
Don’t browse someone else’s files.
Don’t steal using a computer.
Don’t spread misinformation or give false witness.
Don’t use software illegally (Copyright)
Don’t use other people’s computer resources without permission.
Don’t copy someone else’s intellectual property.
Think about the social consequences of the code you write.
Use computers in a way that demonstrates consideration and respect.
there are several different types of privacy:
Personally Identifiable Information (PII) (Contact)
Personal Health Information (PHI) (Medical Records)
Personally Identifiable Financial Information (PIFI) (Credit Cards)
Student’s Records (Grades, Transcripts)
there are also different categories of privacy:
Privacy of Person
Privacy of Behaviour and Action
Privacy of Communication
Privacy of Data and Image
Privacy of Thoughts and Feelings
Privacy of Location and Space
Privacy of Association
There are several laws in place for protection and privacy purposes:
Children’s Online Protection Privacy Act (COPPA)
Health Insurance Portability and Accountability Act (HIPPA)
Gram-Leach-Bliley Act (GLBA)
Fair Credit Report Act (FCRA)
Family Education Rights and Privacy Act (FERPA)
Privacy Act of 1974
There are also principles for ethical behavior as well.
Inform people when you collect information.
Collect the Data you only need.
Offer a way for people to opt-out.
Keep data only as long as needed.
Maintain the accuracy of data.
Protect the security of data.
Develop Policies for Responding to law enforcement requests for data.
There are advantages and disadvantages to protecting freedom of speech. Advantages include:
Expression of Truth
Self-governance
Accountability
Social Interaction
Money and Entertainment
Peaceful Change
Free to express oneself.
the disadvantages to free speech include:
Conflict
Misinformation
That does not mean saying whatever
Violence incitement
Mob mentality
Verbal Abuse
Additionally, there are some actions and exceptions that the amendment does not protect, such as:
Pornography
Commercial Speech
Defamation
Fighting words
Violence Incitement
National Security
Obscenity
Perjury
Plagiarism
Blackmail
Crime Solitication
net neutrality three main components:
No blocking - the internet provider can’t block chosen content.
No throttling - the internet provider can’t throttle legal internet traffic.
No pay-for-reference - the internet provider can’t sell ‘fast lane’ service to those that pay more.
The different types of trade secrets are:
Financial Data
Customer Lists’s
Source Code
Supplier’s List
Pricing Information
Nevertheless, the rights can be stolen, known as IP theft. There are three types.
Hacking- Cybercriminals are gaining unauthorized access to sensitive information and IP.
Privilege Abuse- The higher the level of access rights, the higher the risk of IP theft.
Human Error- Usually due to carelessness, lack of cybersecurity awareness, and fatigue.
there are 4 ways to help protect IP.
Document discoveries- This can help legitimize ownership.
Use a Digital Rights management system (DRMS)
Strong Nondisclosure Agreements- Any information part of the agreement can’t be disclosed.
Strong Access Credentials- Security Training, Team Separation, and Frequent Password updates.
There are several reasons people Hack, such as:
Money
Corporate Espionage
Political Espionage
Revenge
Notoriety
Spamming
Hacktivism
Vulnerability Testing
Regarding civil violations, they are:
Damage or deletion of computer data
Spam
Computer Trespass
Buying or selling passwords
Criminal acts include:
Obtaining national security information
Access without permission
Victim Defraud
Extortion
The 5 most common types of Identity theft are:
Financial Identity theft- Done for Financial Benefit
Medical Identity theft- Done to gain healthcare services
Synthetic Identity theft- Done to get loans and passports
Criminal Identity theft- Done to avoid criminal penalties
Child Identity Theft- Done for financial gain
there are 14 different ways to protect oneself from these threats. They are:
Freeze Credit
Two-Factor Authentication
Strong Passwords
Banking apps
Update operating systems
Secure Wifi
Secure physical mail
Destroy confidential documentation
Think before sharing
Keep personal information personal
Antivirus software
Wipe electronics
Don’t trust default
Biometrics
some of the negative benefits are:
Communicating and messaging breakdown
Increased Employee stress
Distractions and interruptions
Disconnectedness and lowered workplace satisfaction
Pressure and health issues
Every employee is entitled to 10 specific rights. There is also a lot of legislation enforcing these rights.
Privacy Rights- Personal possessions are considered private
Harassment-free workplace- No form of discrimination for any reason
Safe Workplace- Free from hazards etc.
Whistleblowing- An employee reporting employer violations.
Retaliation Protections
Reasonable Accommodations
Fair Pay
Overtime Wages
Job-Protected Leave
File a complaint or lawsuit
employers still have no problem monitoring employees, and there are several ways employees are monitored.
Web Activity
Computer Monitoring
GPS
Phone
Video
Keylogger
There are benefits to monitoring employees such as:
Productivity
Time theft reduction
Enforcement of Company policy
Software Waste Reduction
Cybersecurity Improvement
there are also downsides to doing this such as:
Destroys Trust
Provides inaccurate information
Sensitive Data
Resource Requirements
Legal Issues
Regarding the legality of monitoring employees, it’s a bit of a gray area. Ultimately, it depends on:
The Laws of the country
Monitoring policies
Whether the employee is informed or not
the best monitoring policies are:
Create a clear monitoring policy
Comply with legal requirements
Notify Employees
Block Undesired Content
Monitoring, not Surveillance
Respect employee privacy
There are three different types of digital divide:
Technology
Internet Access
Digital Literacy
There are a lot of causes/divisions for digital divide, such as:
Infrastructure
Wealth and Income
Social
Gender
Age
Socioeconomic
Geographic
Racial, Cultural, and Language
Motivation
Due to these several causes, there are several consequences, like:
Lack of Information Access
Educational inequities
Limited Employment Opportunities
Economic Obstacles
Social Isolation
The categories of people affected by the digital divide are schoolchildren, residents, employers/the workforce, and healthcare patients. In addition, statistics show households with a lower average income have less technology adoption. However, there are solutions, such as:
Increase affordability
Empowering Users
Improve Online content relevance
Internet Infrastructure development
Address Internet access gender gap
Another big question is how to verify if information is credible or not. One way is to ask 5 questions:
WHO is the author?
WHAT is the content?
WHERE was it published?
WHEN was it published?
HOW is it presented?
Another way is with the following acronym:
C- Currency- See how up-to-date the information is.
R- Relevance- See how appropriate the information is for the subject of research.
A- Authority- Find the author’s qualifications and credibility.
A- Accuracy- See how correct the information is.
P- Purpose- Look for the reason the information exists.
However, responding to these risks can be challenging. Some obstacles are:
Lack of assigned responsibility and accountability.
Lack of experienced and available experts.
Difficulty in obtaining the necessary data.
Inability to accurately track and manage the scope costs of failure.
Below are a few different examples of system failures.
A- Ariane 5 Disaster (1995)
B- Therac-25 Case (1985-1987)
C- Denver Airport Case (1990)
Additionally, one can tell the type of information based on the URL. Some examples are:
.com - commercial
.edu - education
.gov - government
.org - non-profit, or interest organization
.net - network
technology has tremendously impacted the workplace. Some positive benefits are:
Job Loss
Old Technology
Absenteeism
Bridging the Communication Gap
Accuracy and Efficiency
Connectivity
Cost Savings
Organization
The Fair Use doctrine is an exception to this act, where there is no problem using copyrighted work without the holder’s permission. These exceptions are
Scholarly works
Criticism
News Reports
Teaching
principles for Data Ethics:
Ownership
Transparency
Privacy
Intention
Outcomes
Additionally, in the modern age, with the surge of the internet, internet privacy has become a major issue. Some examples are
Identity theft
Mobile Apps and Privacy
Location Tracking
Search Engines User Tracking
Cookies
Social Media Data Mining
Harassment, Cyberbullying, Impersonation
Electronic Surveilance
Spyware
There are several necessities for computer ethics. This is because it can help prevent:
Misuse of Information
Theft of IP
Loss of Jobs
Being unethical
Utilitarianism
Theory judging actions based on outcomes
Consequentialism
Theory judging actions by their consequences
Ethical and Psychological Egoism
Psychological egoism says actions are done out of self-interest, whereas Ethical egoism says nearly the same thing, but puts an ethical/moral judgment, to act in one’s self-interest.
Deontology
Theory using rules to distinguish right from wrong
Computer Ethics
Principles governing computer use to prevent misuse
Privacy
Right to be safe from intrusion and control personal information
Personally Identifiable Information (PII)
Contact information that can identify an individual
Personal Health Information (PHI)
Medical records that identify an individual
Personally Identifiable Financial Information (PIFI)
Financial data like credit card information identifying an individual
10 Rules of Computer Ethics
Guidelines including not harming others or stealing using a computer
Freedom of Speech
Right to express ideas without government censorship
1st Amendment
Guarantees freedom of speech, religion, press, assembly, and petition
Advantages of Freedom of Speech
Include expression of truth, self-governance, and social interaction
Disadvantages of Freedom of Speech
Include conflict, misinformation, and violence incitement
Actions not protected by 1st Amendment
Include pornography, defamation, and violence incitement
Net Neutrality
Principle ensuring equal internet access without interference
Intellectual Property (IP)
Legally protected assets like patents, copyrights, and trademarks
Patents
Exclusive rights to inventions for a 20-year duration
Trademark
Symbol or design identifying goods and services
Servicemark
Symbol indicating service differentiation, e.g., SM(SM)
Registered Trademark
Symbol indicating official registration, e.g., ®
Trade Secrets
Confidential information like financial data or source code
Copyright
Legal rights over original works of authorship
Digital Millenium Communications Act (DMCA)
Enacted in 1998 to protect copyright owners' control
Fair Use Doctrine
Exception to DMCA allowing use without permission for scholarly works, criticism, news, or teaching
IP Theft
Stealing intellectual property, including hacking, privilege abuse, and human error
Hacking
Unauthorized access to sensitive information and IP by cybercriminals
Privilege Abuse
IP theft due to higher access rights posing risks
Human Error
IP theft from carelessness, lack of cybersecurity awareness, or fatigue
Ways to Protect IP
Document discoveries, DRMS, Nondisclosure Agreements, Access Credentials
Computer Crime
Using a computer for criminal offenses, like hacking
Hacktivism
Hacking for social or political motives
White Hat Hackers
Ethical security professionals fixing vulnerabilities
Black Hat Hackers
Cybercriminals with malicious hacking intent
Gray Hat Hackers
Hackers breaching systems without malicious intent
Computer Fraud and Abuse Act (CFAA)
Legislation forbidding unauthorized computer access
Identity Theft
Using someone's data for economic gain, e.g., financial or medical identity theft
Phishing
Obtaining personal information through deceptive emails
Vishing
Obtaining personal information through deceptive voicemails
Smishing
Obtaining personal information through deceptive text messages
Pharming
Obtaining personal information through fake websites
DDoS Attack
Overloading a system to disrupt services
Ways to Protect Against Identity Theft
Freeze Credit, Two-Factor Authentication, Strong Passwords, etc.
Digital Divide
Disparities in access to technology and the internet due to factors like infrastructure, wealth, social issues, gender, age, socioeconomic status, geography, race, culture, language, and motivation
Consequences of Digital Divide
Effects include lack of information access, educational disparities, limited job opportunities, economic barriers, and social isolation
Solutions to Digital Divide
Ways to address disparities like increasing affordability, empowering users, improving online content, developing internet infrastructure, and bridging the gender gap in internet access
Neo-Luddism
Philosophy opposing technological advancement, fearing societal threats and potential collapse
Credibility Verification
Methods like checking author, content, publication source, date, presentation, currency, relevance, authority, accuracy, and purpose to assess information trustworthiness
Types of Information Sources
Categorization based on credibility, like government websites, peer-reviewed journals, news sources (high credibility), and blogs, business websites, web forums (lower credibility)
URL Indicators
Different domain extensions indicating website types, such as .com (commercial), .edu (education), .gov (government), .org (non-profit), .net (network)
System Failure
Extended malfunction in computer systems leading to software, data, and information loss, posing significant business risks
Causes of System Failures
Factors like hardware malfunctions (extreme temperatures, power surges) and software issues (poor management, programming errors) leading to system breakdowns
Precautions for System Reliability
Measures to enhance safety and reliability, including clear objectives, risk assessments, learning from incidents, frequent releases, robust testing, monitoring, recovery plans, and training
User Interface Characteristics
Traits of a good interface: simplicity, consistency, efficiency, clarity, and responsiveness
Software Engineering
Development technique for computer systems involving phases like analysis, requirements, design, development, testing, and implementation
Professional Ethics
Guidelines ensuring professionals maintain conduct standards, encompassing integrity, respect, responsibility, competence, and fairness
Code of Ethics vs. Code of Conduct
Distinguishing between general ethics (code of ethics) and specific behavioral guidelines (code of conduct) for professionals in different industries
Types of Codes of Conduct
Differentiating compliance-based (rule-driven) and value-based (morality-driven) codes of conduct in organizations
Professional Code of Ethics Elements
Inclusions like work environment, conflicts of interest, asset protection, corruption, attendance, absence policies, harassment, cell phone use, dress code, substance abuse, tobacco, and internet use
Computing Professionals
Individuals knowledgeable in computer technology, responsible for building and maintaining computer systems, with ethical codes like ACM, ACM/IEEE-S, and AMI