Computer Ethics
Computer Ethics
BY:
AMPUMUZA DALTON
[email protected]
+256751051810
Bishop Stuart University
ETHICS IN GENERAL
A guideline is needed to stop the current technology products from
being exploited for example replicating original CDs and selling them
as pirated software, this unethical behaviour can be controlled by the
code of conducts.
The United States Institute of Computer Ethics has come out with the
Ten Commandments of Computer Ethics. These principles consider
the effective code of conducts for the proper use of information
technology.
DEFINITION OF LAW
· Respecting Ownership
· Respecting Privacy
· Respecting Property
RESPECTING OWNERSHIP
[email protected]
We must respect ownership by not stealing other people’s work either
by duplicating or distributing it. Duplicating and distributing copies of
audio tapes, video tapes and computer programs without permission
and authorization from the individual or company that created the
program are immoral and illegal.
RESPECTING PROPERTY
Both ethics and law are complimentary to each other and are made:
· to guide user from misusing computers
· to create a healthy computer society, so that computers are used to
contribute to a better life
· to prevent any crime
[email protected]
Moral standards Ethical behaviour is judged by moral standards.
Free to follow Computer users are free to follow or ignore the code
of ethics.
No punishments No punishment for anyone who
violates ethics.
Universals Universal, can be applied anywhere, all over the
world.
LAW
Control As a rule to control computer users.
Must follow Computer users must follow the regulations and law.
Unethical:
Law breaking:
[email protected]
INTELLECTUAL PROPERTY RIGHTS
WHAT IS PRIVACY?
[email protected]
Privacy in IT refers to data and information privacy. Data refers to a
collection of raw unprocessed facts, figures and symbols. Then,
computer is used to process data into information. In general, data
include texts, numbers, sounds, images and video.
Information privacy is described as the rights of individuals and
companies to deny or restrict the collection and use of information
about them.
Cookies
· are used to identify users by web casting, e-commerce and other web
applications
· contain user information and are saved in the computer hard disk
[email protected]
· are used by some websites to store passwords and track how
regularly we visit a website, that’s how we become potential targets
for web advertisers
· enable web sites to collect information about your online activities
and store them for future use, then the collected details will be sold to
any company that requests for it.
Electronic profile
Spyware
AUTHENTICATIONS
Authentication is a process where users verify that they are who they
say they are. The user who attempts to perform functions in a system
is in fact the user who is authorized to do so.
For Example : When you use an ATM card, the machine will verify the
validation of the card then the machine will request for a pin number.
This is where the authentication process takes place.
METHODS OF AUTHENTICATION
[email protected]
There are two commonly used authentication methods, which are
biometric device and callback system.
BIOMETRIC DEVICES
Fingerprint Recognition
In order to prevent fake fingers from being used, many biometrics
fingerprint systems also measure blood flow, or check for correctly
arrayed ridges at the edges of the fingers.
Facial Recognition
Facial recognition analyses the characteristics of an individual's face
images captured through a digital video camera. Facial recognition is
widely used, touted as a fantastic system for recognizing potential
threats (whether terrorists, scam artists, or known criminals).
Iris Scanning
[email protected]
Iris scanning analyses the features that exist in the coloured tissues
surrounding the pupil which has more than 200 points that can be
used for comparison, including rings, furrows and freckles.
The scans use a regular video camera and can be done from further
away than a retinal scan. It will work perfectly fine through glasses
and in fact has the ability to create an accurate enough measurement
that it can be used for identification purposes.
Retinal Scanning
Retinal biometrics involves the scanning of retina and analyzing the
layer of blood vessels at the back of the eye.
Retina scanning requires the user to remove glasses, place their eye
close to the device, and focus on a certain point. Whether the accuracy
can outweigh the public discomfort is yet to be seen.
The accuracy in retinal scanning is very good and the cost involved is
fair.
Voice Recognition
Voice recognition system compares a person’s live speech with their
stored voice pattern.
The accuracy in voice recognition is fair and the cost involved is very
reasonable.
CALLBACK SYSTEM
The callback system is commonly used in the bank operation and
business transaction. For example, when you book for the taxi service,
the operator will ask you to hang up and she will call you back to
confirm for the service required.
[email protected]
Authentication is important in order to safeguard against the
unauthorized access and use.
VERIFICATIONS
Verification is the act of proving or disproving the correctness of a
system with respect to a certain formal specification.
METHODS OF VERIFICATION
There are two methods commonly used in verification, which are user
identification and processed object. User identification refers to the
process of validating the user. Processed object refers to something
the user has such as identification card, security token and cell phone.
USER IDENTIFICATION
The examples of validating process using the user identification are:
· Key in the user name to log-in to a system and the
system will verify whether the user is valid or invalid
user
· Show the exam slip to verify that you are the valid
candidate for the exam.
· show a passport before departure.
PROCESSED OBJECT
The examples of validating process using the processed
object are:
· the policeman will check on the driver’s license to
identify the valid driver
· employees have to swipe their security card to enter
the building
· buy blouses at the mall using a credit card
[email protected]
CONTROVERSIAL CONTENT
A controversial content is information that causes disagreement in
opinions and may cause the disruption of peace because different
people or culture will have different views about the contents.
PORNOGRAPHY
What is pornography? Why is pornography considered “negative”
content? Both pictures are very cute pictures of innocent babies.
Neither can be considered pornographic by normal standards.
DEFINITION OF PORNOGRAPHY
[email protected]
The definition of pornography is any form of media or material (like
books or photographs) that depicts erotic behaviour and is intended
to cause sexual excitement.
Pornography tends to exploit men, women and children in a
distasteful
manner.
SLANDER
Slander is another example of controversial content. Slander is a legal
term for false and malicious statement (meaning knowing that it is
false, or “reckless disregard” that it was false) about someone.
References:
1. http://hwpi.harvard.edu/files/provost/files/policy_on_access_to_electron...
2.