Introduction To Computer Ethics
Introduction To Computer Ethics
1.1 Scenarios
A good place to start on this course is to look at the reasons why we should study it at all. To facilitate this, we
look at a few scenarios. For each of these scenarios, you should write think about any questionable ethical issues
about each scenario. At his point you may not be to answer them, but you might have your own opinion. Write
this down as well you should revisit them after relevant section and see if your opinion has been affected.
Hopefully these typical ethical questions illustrates to you the diverse characters of ethical issues including,
property rights, privacy, free speech and professional ethics. Is computer ethics different to those that came
before. Partially, the answer is no since all fields have similar problems and issue. Partially, the answer is also
yes, since there are issues specific to computers such as speed and programs etc.
• When is it justifiable to break the law? Bad law, inappropriate law or if the law is easy to break?
1
Introduction to Computer Ethics
information identifies groups and not individuals. She can then use the information to market her wares more
efficiently. Is this ethical since customers did not give her the information for this purpose?
Something to consider:
• Is there a need for establishment of a policy? What should this policy looks like.
Something to consider:
Back at work, Mike realised that his production team is all male. Should he refuse to work on this team? Should
he ask for the team to be reviewed? Will the game sell as well if different message was given? What is his
responsibility?
Something to consider:
• When is it justifiable to break the law? Bad law, inappropriate law or if the law is easy to break?
Activity 1
Think about ethical issues that are involved in carrying out your job or day to day activity. Focus on those
tasks which are non-computing related. Are they any ethical guidelines for doing your job or activity? How
these ethical guidelines were developed over time, and are how often changes are made to them. What are the
trigger of these changes if any?
There are also other activities that were hard to do without computer such as data mining. It was so hard to do that
it was not done. This accounts for the lack of policy concerning data mining.
What is it about computers that make the computer environment different? Factors that have been raised included:
• Speed: Computers are able to do things at exponentially faster rate than ever before. For
example, data mining was only possible (or rather made economically viable) by the advent of
computers
• Storage and accessibility of data: Vast amount of data can be stored and easily accessible for
processing.
• Concept of a program: How should one treat a computer program. Is it property or an idea. Is it
something to be copyrighted or patented. We will deal with this later in the module.
• Breadth of Distribution: Information technologies have present consumers with a new channel of
distribution that is faster and as yet not as regulated internationally as traditional channels.
Activity 2
Can you think of other factors that make the computer and IT environment different to a more traditional
non-computing medium? As new technologies are introduced new factors are arising every day. Think about
relatively new technologies such as cellular communication or satellite tracking devices? Have they cause
new ethical questions? For each technologies you can think of, try to work out what it is about the technology
that cause those ethical questions.
3. Consider the rights of the individual. Should they be given rights of access to their own data or the ability
to change incorrect data? Also consider the impact of incorrect data even if they are changed but not
propagated in a timely fashion.
'.... The analysis of the nature and the social impact of computer technology and the corresponding
formulation and justification of policies for the ethical use of such technology.'
He uses the phrase 'computer technology' so as to take the subject matter of the field broadly to include computers
and associated technology: including concerns about software as well as hardware and concerns about networks
connecting computers as well as computers themselves.
'The study of the ethical questions that arise as a consequence of the development and deployment
of computers and computing technologies. It involves two activities. One is identifying and bringing
into focus the issues and problems that fall within its scope, raising awareness of the ethical
dimension of a particular situation. The second is providing an approach to these issues, a means of
advancing our understanding of, and suggesting ways of reaching wise solutions to these problems.'
• No, in the sense that there is nothing new under the sun. There has always been issues of privacy, property
and freedom. The introduction of computers does not necessary introduce new way of doing things. Often
computers increase efficiency but fundamentally, the way of doing the task is still the same.
• Yes, in the sense that a new technology has been introduced that never existed before. An example of this
is the computer program. Computer programs are unlike anything that was preceded before it. It can be
(and has been) regarded as properties like cars or houses, while alternative it can also be seen as an
4
Introduction to Computer Ethics
individual expression, not unlike a song. Yet another alternative is to regarded as an idea.
• Yes, it facilitates new human actions that were not possible (or economically viable) before. For example,
virus writing is a noticeable problem with computers. While it is arguable that similar problems existed
prior to the existence computers, they were not of a large enough scale to be considered an ethical issue.
Another example, that have been cited many times before involve the use of data mining.
While there are many answers to the question, it is clear that when an ethical issue arise, part of it may be
analogous to existing framework, while part of it may be entirely new. It is the role of the policymakers to
consider this question thoroughly before deciding on a solution. If the issues in question has an appropriate
analogy, it could be employed as a starting point.
Moor (1985) argues that what is revolutionary about computers is logical malleability. Computers are viewed as
being logically malleable in that they can be shaped and molded to do any activity that can be characterised in
terms of inputs, outputs and connecting logical operations. The logic of computers can be shaped in infinite ways
through changes in hardware and software.
'Just, as the power of a steam engine was the raw resource of the Industrial Revolution so the logic
of a computer is a raw resource of the Information Revolution. Because the logic applies
everywhere, the potential applications of computer technology appear limitless. The computer is the
nearest thing we have to a universal tool. Indeed, the limits of computers are largely the limits of
our own creativity.'
Moor defines the driving question of the Information Revolution as 'How can we mould the logic of
computers to better serve our purposes?'
As computer technology encompass more and more of our society, Moor sees more and more of the transforming
effect of computers on our basic institutions and practices. Although nobody can know for sure how our
computerised society will look fifty years from now, Moor argues that it is reasonable to think that various
aspects of our daily work will be transformed.
'Computers have been used for years by businesses to expedite routine work, such as calculating
payrolls. However, as personal computers become widespread and allow executives to work at
home, and as robots do more and more factory work, the emerging question will not be merely
"How well do computers help us work?" but "What is the nature of this work?"'
An important fact about computers is that most of the time and under most conditions computer operations are
invisible. Moor (1985) mentions three kinds of invisibility that can have ethical significance. The first variety of
the invisibility factor is invisible abuse. James Moor defines invisible abuse as "the intentional use of the invisible
operations of a computer to engage in unethical conduct." Moor suggests that a classic example of this is the case
of a programmer who realised that he could steal excess interest from a bank.
'When interest on a bank account is calculated, there is often a fraction of a cent left over after rounding
off. This programmer instructed a computer to deposit these fractions of a cent to his own account.'
Although Moor views this as an ordinary case of stealing, he sees this pertaining to computer ethics because
computer technology has provided the opportunity for such activities to go more often than not unnoticed.
5
Introduction to Computer Ethics
Another possibility for invisible abuse is invasion of the property and privacy of others. For example, Moor
identifies how a computer can be programmed to contact another computer over phone lines and 'Surreptitiously
remove or alter confidential information'.
Another example of invisible abuse is the use of computers for surveillance. Classic examples of such use are
computerised employee monitoring and Closed Circuit Television (CCTV) technologies.
The second variety of the invisibility factor is the presence of invisible programming values, those values that are
embedded into a computer program. Moor draws an analogy between writing a computer program and building a
house.
'No matter how detailed the specifications may be, a builder must make numerous decisions about
matters not specified in order to construct the house. Different houses are compatible with a given
set of specifications. Similarly, a request for a computer program is made at a level of abstraction
usually far removed from the details of the actual programming language. In order to implement a
program, which satisfies the specification, a programmer makes some value judgements about what
is important and what is not. These values become embedded in the final product and may be
invisible to someone who runs the program.'
The third and final variety of the invisibility factor is the invisible complex calculation. Moor argues that
"Computers today are capable of enormous calculations beyond human comprehension. Even if a program is
understood, it does not follow that the respective calculations are understood. Computers today perform and,
certainly, super computers in the future will perform, calculations, which are too complex for human inspection
and understanding."
Moor argues that the issue is how much we should trust a computer's invisible calculation. This becomes a
significant issue as the consequences grow in importance. He illustrates this with an example:
'Computers are used by the military in making decisions about launching nuclear weapons. On the
one hand, computers are fallible and there may not be time to confirm their assessment of the
situation. On the other hand, making decisions about launching nuclear weapons without using
computers may be even more fallible and more dangerous. What should be our policy about trusting
invisible calculations?'
Gotterbarn concludes that 'We have mistakenly understood computer ethics as different from other professional
ethics. When we look at medical ethics, legal ethics, journalistic ethics, we have to distinguish the practitioners of
those ethics from the ethical principles they affirm. The three professionals work in different
6
Introduction to Computer Ethics
contexts: medicine, law and journalism. However, when we talk of their professional ethics we do not consider
them three different kinds. The distinguishing characteristics among professional ethics, is the context in which
they are applied. Because there are three contexts, it does not follow that there are three distinct sets of ethical
rules or three different kinds of moral reasoning. Nor does it follow that computer ethics is another unique set of
ethical principles which is yet to be discovered.'
Spinello (1995) is another computer ethicist who argues that the issues invoked by computers are not new or
unique. He states that it would be a mistake 'To consider the ethics of computer technology as unique, separate
from general business and social ethics.' His premise is that these 'Revolutionary problems can be confronted
with the same analytical tools and ethical categories used for more traditional concerns. It will be illuminating to
regard these new dilemmas from the perspective of rights or duties or maximisation of consequences.' He argues
that our 'ethical tradition' is rich enough to provide ample background for the thoughtful and comprehensive
treatment of these new problem areas. However, it may be necessary to 'Revise our definition of certain rights
such as privacy in light of the new realities created by the phenomenon of digital disclosure. Although we need to
reinterpret what the right to privacy means on the frontiers of cyberspace, it is important to underline that the
notion of a right to privacy, a right to control of information about oneself, has not lost its intelligibility.'
For example, we can extend or adapt property law of ownerships such as copyright, patent and trade secrecy to
that of computer software.
Activity 4
E-mail is another technology that has an equivalence that one can consider applying the traditionalist
approach on.
1. Identify the issues that might be of concern to e-mails include confidentiality (communication is private)
and authentication (sender is who he or she claim to be).
2. How does traditional snail-mail deal with such issues? Are there any issues that does not have a snail-mail
equivalence? Concerning these issues, what is it about e-mail that make it differ from snail-mail? (If you
cannot think of anything, you can also start by first identifying the difference between e-mail and snail-
mail, and then go on to say how each factors can raise new issues that were not applicable to snail-mails)
There are also problems with employing the traditionalist approach. This approach can result in
oversimplification of issues, as it implies a routine way of dealing with ALL problems. The computing
process is fluid with technology over changing.
Another issue is that different people will employ different analogies which can lead to different solutions.
For example, the Internet can be thought of as a network of highways as well as a shopping mall. Choosing
which analogies to used may lead to unsuitable solutions to some of those involved. How should computer
program be considered? Is it property, idea or something else?
7
Introduction to Computer Ethics
is it reasonable to assume that if port 80 is available, the owner of the site gives you permission to access the
site.
How far can you take this argument. For example, if a wireless signal is available, could you derived from
that the owner gives you permission to access it? In some culture, a public water well or tap, is considered to
be freely available to all that come passed. Should publicly accessible wireless signal then falls under the
same category?
8
Philosophical Ethics
Table of Contents
2.1 Theoretical Frameworks ............................................................................................................. 1
2.2 A Framework for Ethical Analysis .............................................................................................. 2
2.2.1 Formal Guidelines .......................................................................................................... 2
2.3 Ethical Theory .............................................................................................................................. 3
2.3.1 Deontology ...................................................................................................................... 3
2.3.2 Teleology ......................................................................................................................... 4
2.4 Normative Principles ................................................................................................................... 4
2.4.1 The Principle of Nonmaleficence .................................................................................... 4
2.4.2 The Principle of Autonomy ............................................................................................. 5
2.4.3 The Principle of Informed Consent ................................................................................. 5
2.5 Law .............................................................................................................................................. 5
2.6 Informal Guidelines ..................................................................................................................... 6
2.6.1 Moral Intuition Test ......................................................................................................... 6
2.6.2 The Mother Test .............................................................................................................. 6
2.6.3 The TV Test ..................................................................................................................... 6
2.6.4 The Smell Test ................................................................................................................. 6
2.6.5 The Other Person's Shoe Test .......................................................................................... 6
2.6.6 The Market Test ............................................................................................................... 6
2.7 A Defensible Choice .................................................................................................................... 7
2.8 Additional Principles ................................................................................................................... 7
2.9 Where do Personal Values come from? ....................................................................................... 7
2.10 MARXISM: When Economics Determines Everything, Even Morality ................................. 8
2.11 Answers and Discussions ......................................................................................................... 8
2.11.1 Discussions of Activity 1 ............................................................................................... 8
and theories that can serve as normative guidelines for addressing the ethical issues invoked by computers will be
considered later in the chapter. These guidelines constitute a framework for the ethical analysis of cases where
ethical and professional issues may have been invoked. The initial step in conducting an ethical analysis is to
establish one or more issues to be analysed. Then for each issue the law and principles presented in each of the
four processes of the framework are applied. For each issue one or more alternative options are often highlighted.
The analysis will disqualify some options to the ethical issue in favour of others. The intention of an analysis is to
present these alternative options to a user and allow them to rationally examine these and choose the correct one.
The normative guidelines described below are those that appear in the Kallman and Grillo (1996) framework.
However, the danger of making an appeal to as many ethical principles as possible is that sometimes they
conflict. In analysing an action, the course of action that is suggested by one ethical philosophy might
contradict the course of action that is suggested by another. For example, Egoism focuses on self-interest.
This ethical principle is used as justification when something is done to further an individual's own welfare.
The principle of Utilitarianism embodies the notion of operating in the public interest rather than for
personal benefit. However, an appreciation of ethics allows individuals to be aware of all possible ethical
resolutions and their respective implications. An appropriate course of action for an individual should only
be arrived at after thinking through all the implications. The intention behind an ethical analysis should not
be to prescribe a particular set of ethical values for resolving ethical issues invoked by computers. But
allow an individual to appreciate all the possible course(s) of action that can be taken according to the
differing, and often conflicting, sets of ethical values and then make a judgement as to which is applicable
for them in the real world.
2
Philosophical Ethics
They found ten common themes that emerged as the core for ethical behaviour for computer professionals:
3. Responsibility to employer/client
4. Responsibility to profession
5. Confidentiality of information
6. Conflict of interest
7. Dignity/worth of people
technology
The second principle to be referenced under Formal Guidelines is extracted from Confucianism. Confucianism is
the ethical system of the Chinese philosopher Confucius (551-479 BC). Confucius's ethical system is sometimes
summed up in the rule:
Having highlighted the course of actions that stakeholders have or are considering taking, the ten universal
common themes and the Golden Rule should be applied to determine whether the consequences of these actions
are ethical or unethical. If a specific course of action committed by a stakeholder fails to fulfil any of these
principles given in this section then the action can be defined as unethical.
2.3.1 Deontology
According to a deontological framework, actions are essentially right or wrong regardless of the consequences
they produce. An ethical action might be deduced from a duty (pluralism) or a basic human right
(contractarianism) but it never depends on its projected outcome.
3
Philosophical Ethics
2. One ought to right the wrongs that one has inflicted on others (reparation)
4. One ought to improve the lot of others with respect to virtue, intelligence, and happiness
(beneficence)
5. One ought to improve oneself with respect to virtue and intelligence (self-improvement)
2.3.2 Teleology
Teleological theories give priority to the good over the right, and they evaluate actions by the goal or
consequences that they achieve. Thus, correct actions are those that produce the most good or optimise the
consequences of choices, whereas wrong actions are those that do not contribute to the good. Three examples of
the Teleological approach to ethics are Egoism, Utilitarianism and Altruism.
Egoism
Egoism focuses on self-interest. This ethical principle is used as justification when something is done to further
an individual's own welfare. Asking the following question can best sum up the principle: 'Does the action benefit
me, as an individual, in any way?'
Utilitarianism
The principle of Utilitarianism embodies the notion of operating in the public interest rather than for personal
benefit. The principle extracted from this theory determines an action to be right if it maximises benefits over
costs for all involved, everyone counting equal.
Altruism
'Is invoked when a decision results in benefit for others, even at a cost to some'.
The principle extracted from this theory determines an action to be right if it maximises the benefits of some,
even at the cost to others involved. In addition, the normative principles of Nonmaleficence, Autonomy and
Informed Consent are also considered. On account of their simplicity and concreteness, Spinello sees these
principles as serving 'A more practical and direct way of coming to terms with a moral dilemma'.
'We know of no societies, from the literature of anthropology or comparative ethics, whose moral
codes do not contain some injunction against harming others. The specific notion of harm or social
injury may vary, as well as the mode of correction and restitution but the injunctions are present.'
2.5 Law
When a law tells us to do or not to do something, it implies that a recognised, established authority has decided
that the action the law permits or prohibits is of some benefit to society in some way. It often happens that an
ethical principle was the basis for any decision regarding this issue before the law was constructed. The fact that
the law is grounded in ethical principles makes law a good point for ethical decision making. In other words,
Kallman and Grillo (1996) suggest
'That when we are confronted with an ethical decision, we should first research the law'.
In some instances, the law will clearly apply and lead directly to the appropriate ethical conclusion. However, to
rely solely on law as a moral guideline is clearly dangerous because as highlighted by Jennifer Wagner (1991)
four possible states exist in the relationship between ethics and law. Wagner's taxonomy identifies four possible
states which depend on whether a specific act is ethical or not ethical, and legal or not legal. The table below
presents these states. This implies that in certain circumstances bad laws exist. Bad laws may bind rules on
society that fail to provide moral guidance. Such laws may in some instances excuse a society from fulfilling
certain obligations and duties, or allow a society to justify their unethical behaviour. However, beyond any doubt,
law and morality do have in common certain key principles and obligations.
5
Philosophical Ethics
You can find some discussion of this activity at the end of this chapter.
'Consider your first impressions or reactions to these issues. In other words, what does your moral
intuition say about the action or policy under consideration: is it wrong or right?'
The merit of using this principle is that, as in the other tests, it allows for quick evaluation of a situation in an
attempt to resolve an ethical dilemma.
6
Philosophical Ethics
"You can make a rational choice - that means you can give reasons for your choice. But it can still
be morally wrong or morally repugnant to somebody else, or just different to what somebody else
would have done in those circumstances. . All you can do is make a decision that is 'right for you'
and going through the guidelines helps you to find out what that is and also to assemble your
reasons (i.e. rational basis) for doing it."
The rules and principles presented in the above framework can be applied to the case facts of instances where
ethical dilemmas have been invoked in the development and deployment of computers.\
6. Thou shalt not copy or use proprietary software for which you have not paid for
7. Thou shalt not use other people's computer resources without authorisation or proper compensation
9. Thou shalt think about the social consequences of the program you are writing or the system you
are designing
10.Thou shalt always use a computer in ways that insure consideration and respect for your
fellow human being
To be ethical, an action should elicit a positive response to all applicable primary questions and a
negative response to each clarification:
• Is it honourable? Is there anyone from whom you would like to hide the action?
• Is it honest? Does it violate any agreement, actual or implied, or otherwise betray a trust?
• Does it avoid the possibility of a conflict of interest? Are there other considerations that
might bias your judgement?
• Is it within your area of competence? Is it possible that your best effort will not be adequate?
Their family and workplace may affect a person's views, but there are other areas of influence. In fact the number
of such possible influences is potentially huge. Human interaction is recursive, every aspect of the way in which
individuals react with those around them in turn colours the way they perceive the world, and so modifies their
interaction with it. Some of these influences that shape our personal value are: Family / friends; Colleagues;
Workplace; Industry / profession; Community; Law; Religion; and Culture: includes media, arts.
He advocated three classes: the landed aristocracy; the bourgeoisie (capitalist employing class); and the
proletariat (wage earning, employed class) . Because each class held a unique position in the economic system
this implied their respective religion, culture and morality differed accordingly.
An act that is ethical but not legal: The act of euthanasia can be seen as ethical, yet in some countries such as
the UK is illegal.
An act that is not ethical but is legal: Apartheid, segregation of blacks and whites in South African society,
totally unethical yet was legal under white rule.
An act that is not ethical and not legal: Torture of political prisoners is unethical and illegal under UN
Declaration of Human Rights.
8
Professional Ethics
Table of Contents
3.1 Scenarios ...................................................................................................................................... 1
3.1.1 Scenario 1: Safety Concerns .......................................................................................... 1
3.1.2 Scenario 2: How much Security?..................................................................................... 1
3.1.3 Scenario 3: Conflict of Interest ........................................................................................ 2
3.2 Why Professional Ethics? ............................................................................................................ 2
3.3 Characteristics of a Profession ..................................................................................................... 2
3.4 System of Professions .................................................................................................................. 3
3.5 Is Computing a Profession? ......................................................................................................... 3
3.1.4 Software Engineering ...................................................................................................... 3
3.6 Professional Relationships ........................................................................................................... 4
3.1.5 Employer - Employee Relationships ............................................................................... 4
3.1.6 Client – Professional Relationships ................................................................................. 4
3.1.7 Society – Professional Relationship ................................................................................ 4
3.1.8 Professional – Professional Relationships ....................................................................... 5
3.1.9 Conflicting Responsibilities ............................................................................................. 5
3.1 Scenarios
3.1.1 Scenario 1: Safety Concerns
Carl works for general purpose software and hardware company on a project for the military. The project involves
developing a system that monitors radar signals for missiles and launches nuclear missiles when deemed
necessary. Carl was initially reluctant but eventually agrees. His thinking was that if he does not do it, someone
else will anyway. During his work he develops some reservations concerning the fine distinction between missiles
and small planes. He expresses this to his manager who promptly dismisses the claim on the basis that he does not
agree with the claim and that the project was already late.
Carl feels morally responsible. What should he do? What can he do?
• Go to the newspaper (whistle blow) – this will likely lead to him losing his job.
She believes that the client should have all the necessary information that the client can use to based their
decision on. She then presents ALL available options to the clients, with the level of security proportional to the
1
Professional Ethics
cost. The client chooses the cheapest and least secure option, which leads LJ to feel that this is insecure. She
explains the risks to the client but they sticks with the cheapest option. Should LJ refuse to build the system?
Should she have presented this option to the client in the first place?
We must recognise that professional role is special because it carries special rights and responsibilities. Some
occupational roles are said to be STRONGLY DIFFERENTIATED where by professionals are granted powers
exceptional to ordinary morality (eg. Consider medical doctors). Most occupational roles are NOT strongly
differentiated.
It is claimed by most that the computing profession is NOT strongly differentiated i.e. computer professionals do
not acquire special power/privilege by virtue of being in the profession. However this is not always the case -
when hired to do a job, professionals do acquire powers and hence obligations that come with them. For example,
Carl has obligation to his company but does not do everything his boss asks. LJ has obligation to the client for the
security that they want.
4. Code of Ethics: This sets standards of the organisation and is used to maintain its autonomy.
Members must adhere to this irrespective of their employment contexts.
2
Professional Ethics
5. Social Function: A professional must been seen to fulfil some useful and important social functions.
• Self regulation
5. Fulfilment of a social function: Computing is a crucial part of society, but does it fulfil a need.
It supports a variety of social functions but is not one in itself.
3
Professional Ethics
• Is contractual
• Neither party should take advantage of the other. Employee should be honest with their
qualification and employer should not exploit employee (decent wage, safe environment, etc.)
• Loyalty – can invite some unfairness (boss’s son) or loss of criticality (just agree with boss)
• Trade secrets/knowledge in a field. There are many means of dealing with this, by making sure
that:
• Employee can only sell specific knowledge – but this is considered wrong.
• Employees sign contract not to reveal secrets gain during employment as part of the job.
• Employees sign contract not to work in similar area for a certain period after leaving the company.
• Agency: Professional is the agent and does exactly what client tells him to do (like telling a
stockbroker to buy “Telkom”).
• Paternalistic: Professional makes all the decisions and the client abrogates all decision making.
• Fiduciary: Both parties play a role by working together. The professional offers options while
the client decides which one to take. This requires trust on both sides and that the decision process
is shared.
For a professional society to flourish there must also be advantages to Society from it:
• Members must consider what they owe to each other to maintain standards of conduct.
• Members have important obligation such as much not take bribes, not lie about qualifications
or fudge the results.
Another issue is fragmentation. Whereas medical profession sees the entire problem, computing professionals
often sees a small part of the system and as such it can be very difficult to pass judgement.
5
Code of Ethics and Professional Conduct
4.1 Introduction
A code of ethics is a statement of collective wisdom of the members of the profession that expresses experience
and consensus of many members. The code itself has several roles:
• Serve the interests of the Public.
• Mechanism for educating for those entering the profession, companies and clients.
The code also ensures collective responsibility, so that various parties do not only think of individuals in the
profession but rather a collective unit of the profession. If a profession speaks out on an issue, it is more effective
as a group. Examples of this are issues such as protection of whistle blowers and gender bias.
1
Code of Ethics and Professional Conduct
Computer Society South Africa (CSSA), is a South African Qualifications Authority (SAQA) recognised
Professional Body for South Africa’s professional community of ICT practitioners. IITPSA has a code of conduct
– a guide on how to handle issues. It maintains a complaint structure which involves the Committee of Enquiry
and the Disciplinary Committee. The code addresses several key issues – integrity, confidentiality, impartiality,
responsibility, relationship to the CSSA and non-discrimination.
4.2.1 Integrity
This principle required that member must:
• Will act with complete loyalty towards a client when entrusted with confidential information.
• Will act with impartiality when purporting to give independent advice and must disclose any relevant
interests.
• Will accept full responsibility for any work undertaken and will construct and deliver that which has been
agreed to.
• Will not seek personal advantage to the detriment of the Institute and will actively seek to enhance the
image of the Institute.
• Will not engage in discriminatory practices in professional activities on any basis whatsoever.
4.2.2 Confidentiality
A member will act with complete loyalty towards a client when entrusted with confidential information. A member
shall take adequate measures to ensure the confidentiality of a client’s information. A member should not disclose,
or permit to be disclosed, or use to personal advantage, any confidential information relating to the affairs of
present or previous employers or customers without their prior permission. The principle covers the need to protect
confidential data. Various kinds of information can be considered by a client or employer to be confidential. Even
the fact that a project exists may be sensitive. Business plans, trade secrets, personal information are all examples
of confidential data. Training is required for all staff on measures to ensure confidentiality, to guard against the
possibility of a third party intentionally or inadvertently misusing data and to be vigilant for leaks of confidentiality
arising from careless use of data or indiscretions.
4.2.3 Impartiality
A member will act with impartiality when purporting to give independent advice and will disclose any relevant
interests.” The principle is primarily directed to the case where a member or members’ relatives or friends may
make a private profit if the client or employer follows advice given. Any such interest should be disclosed in
advance. A second interpretation is where there is no immediate personal profit but the future business or scope of
influence of the department depends on a certain solution being accepted. Whereas salespersons are assumed to
have a bias towards their own company, an internal consultant should always consider the welfare of the
organization as a whole and not just the increased application of computers.
4.2.4 Responsibility
Member must take full responsibility for any work done and the work should be completed in agreed time and
budget. In cases of delay, the client must be alerted to any late delivery. Additionally, generic information (not
confidential information) about an area should be fed back to the Profession. Members are also required to
combat ignorance about technology.
2
Code of Ethics and Professional Conduct
Member must:
4.2.6 Non-discrimination
Member must not engage in illegal discriminatory practices on any bases and must hire personnel based on skills,
experience and performance. Remuneration must be done on equal opportunity basis. Additionally, employers
should initiate and/or support programs that encourage development and training on equal opportunity basis.
The society has regulations that required all complaints to be in writing. The complaint will first be investigated
by a Committee of Enquiry which has the power to summon the member involved. If misconduct is established
by the committee, the member is given 21 days to response to the complaints. If this response is unsatisfactory,
the issue is referred to the Disciplinary Committee.
The Disciplinary Committee sets a formal hearing where witnesses may be called. No legal representation is
allowed and the proceeding is carried out in camera. If the member is found to be guilty, he or she can be warned,
reprimanded, suspended or expelled.
Activity 1
• Personal Development
• Contracting
• Development of a System
• Implementation
• Live Systems
3
Code of Ethics and Professional Conduct
A summary of the Code of Practice is provided here. The full code is accessible on the IITPSA website.
4.3.3 Contracting
Statement Rationale
Seek expert advice in preparation of formal Contract needs to meet the needs of both parties.
contract Member should use specialists where necessary
(e.g. Tax and risk evaluation)
Adequately cover all requirements and Professional status implies that all details are
responsibilities covered
4
Code of Ethics and Professional Conduct
Statement Rationale
Ensure all staff is trained to protect life, data and Safety of people is the first priority. Backup
equipments in cases of disaster. facilities for programs, data are essential because
of consequential losses.
Need to take all reasonable steps to protect People’s private information is at the root of an
confidential information individual’s right to privacy
Competent people must be in charge of accuracy Staff assigned to a job must be competent and
and integrity of data adequately trained for the job.
An individual must have the right to review their Individual has a right to freedom.
data, correct it and appeal if necessary
4.3.5 Development
Statement Rationale
Exercise impartiality when evaluating each Impartiality is a Professional imperative
project
Effectively plan, monitor, adjust and report on all Need to control all aspects of a project
aspects of the project
Use standard procedures and ensure that Professionalism implies using standard, accepted,
documentation is available and used. appropriate procedures. People should know how,
when, or who must do the work.
Specify system objectives, completion data,Clear statement of objective, agreed by client
cost, security requirements and acceptance must be the rationale of the project.
requirements.
Client should participate in all stages of analysis, The system is for the client. The closer the client’s
development and implementation involvement the better the system will be
Tasks completed within job in a defined order Plan the system logically
Specify and conduct program and system tests Show system functions as intended, as well as
detect and eliminate errors.
Ensure design is sufficiently documented to Ensure system is usable
facilitate audit, maintenance, enhancement and
comprehension by user
I/O designed for easy use Simple I/O ensures less errors and easier
acceptance.
Data that is erroneous, redundant or out of date Data must be correct while the privacy of
must be easily changed or deleted, if necessary individual is respected.
Backup procedures for data and programs Consequential losses need to be minimized
Ensure projects are technically sound, use mostProfessional should solve the clients problem in
appropriate technology, while staying within the most appropriate manner
time/cost constraints
4.3.6 Implementation
Statement Rationale
Provide adequate provision for staff training System will not work properly unless staff knows
how to use it. Education of users empowers them
and allays fears of new system.
Changeover to new operational system – plan Ensure new operation works well it,
monitor the transition, adjust if necessary and
report
Statement Rationale
Plan and operate efficient and reliable processing Reliability and efficiency is expected of a
within the budget professional
Monitor performance and quality. Hold review Requirements of systems change with time hence
regularly to assess efficiency, effectiveness and the need for review
security
Plan for maintenance and enhancements Correct errors and upgrade system
Keep good liaison with users and set up Ensure any problems are dealt with quickly and
mechanism for dealing with queries appropriately.
A member shall:
• have due regard for public health, privacy, security and wellbeing of others and the environment.
• have due regard for the legitimate rights of Third Parties*.
• conduct their professional activities without discrimination on the grounds of sex, sexual orientation,
marital status, nationality, colour, race, ethnic origin, religion, age or disability, or of any other condition
or requirement
• promote equal access to the benefits of IT and seek to promote the inclusion of all sectors in society
wherever opportunities arise.
A member shall:
• only undertake to do work or provide a service that is within your professional competence.
• NOT claim any level of competence that you do not possess.
• develop their professional knowledge, skills and competence on a continuing basis, maintaining
awareness of technological developments, procedures, and standards that are relevant to your field.
• ensure that they have the knowledge and understanding of Legislation* and that you comply with such
Legislation, in carrying out your professional responsibilities.
• respect and value alternative viewpoints and, seek, accept and offer honest criticisms of work.
• avoid injuring others, their property, reputation, or employment by false or malicious or negligent action
or inaction.
• reject and will not make any offer of bribery or unethical inducement.
A member shall:
• carry out their professional responsibilities with due care and diligence in accordance with the Relevant
6
Code of Ethics and Professional Conduct
A member shall:
• accept their personal duty to uphold the reputation of the profession and not take any action which could
bring the profession into disrepute.
• seek to improve professional standards through participation in their development, use and enforcement.
• uphold the reputation and good standing of BCS, the Chartered Institute for IT.
• act with integrity and respect in their professional relationships with all members of BCS and
with members of other professions with whom you work in a professional capacity.
• notify BCS if convicted of a criminal offence or upon becoming bankrupt or disqualified as a
Company Director and in each case give details of the relevant jurisdiction.
• encourage and support fellow members in their professional development.
The Code of Practice is concerned with professional responsibility. All members have responsibilities: to
clients, to users, to the State and society at large. Those members who are employees also have responsibilities
to their employers and employers' customers and, often, to a Trade Union. In the event of apparent clash in
responsibilities, obligations or prescribed practice the Society's Secretary-General should be consulted at the
earliest opportunity.
The Code is to be viewed as a whole: individual parts are not intended to be used in isolation to justify errors or
omissions or commission. The Code is intended to be observed in the spirit and not merely the word. The BCS
membership covers all occupations relevant to the use of computers and it is not possible to define the Code in
terms directly relevant to each individual member. For this reason the Code is set out in two levels to enable
every member to reach appropriate interpretations.
The BCS Code of Practice can be found at the following Web site: http://www.bcs.org/
7
Privacy
Chapter 5. Privacy
Table of Contents
5.1 Scenarios ...................................................................................................................................... 2
5.1.1 Scenario 1: Fund Raising and Potential Do no r s ........................................................... 2
5.1.2 Scenario 2: Taking work home ........................................................................................ 2
5.1.3 Scenario 3: Workplace Monitoring .................................................................................. 3
5.1.4 Scenario 4: Data Mining .................................................................................................. 3
5.2 Is there anything new here?.......................................................................................................... 3
5.2.1 Max’s case ....................................................................................................................... 3
5.2.2 Access to data .................................................................................................................. 4
5.3 Understanding the ‘Computer and Privacy’ Issue ........................................................................ 4
5.3.1 Personal Privacy .............................................................................................................. 4
5.3.2 Individual – Organizational Relationships ....................................................................... 5
5.3.3 Global Perspective ........................................................................................................... 5
5.3.4 Proposal for better Protection .......................................................................................... 6
5.4 Effects of IT on recording keeping .............................................................................................. 7
5.5 Privacy Issues in the workplace ................................................................................................... 7
5.5.1 Arguments for Computer Monitoring in the Workplace .................................................. 7
5.5.2 Arguments against Computer Monitoring in the Workplace ........................................... 7
5.6 Interception Act versus Privacy Act (South Africa)..................................................................... 8
5.6.1 The Interception Act ........................................................................................................ 8
5.6.2 The Privacy Act ............................................................................................................... 9
5.7 Protect Your Online Privacy ........................................................................................................ 9
5.7.1 Do not reveal personal information inadvertently ........................................................... 9
5.7.2 Turn on cookie notices in your Web browser, and/or use cookie management software 9
5.7.3 Keep a "clean" e-mail address ....................................................................................... 10
5.7.4 Don't reveal personal details to strangers or just met "friends" ..................................... 10
5.7.5 Beware sites that offer some sort of reward or prize in exchange for your contact or
other information ....................................................................................................................... 10
5.7.6 Do not reply to spammers, for any reason ..................................................................... 11
5.7.7 Be conscious of Web security ........................................................................................ 11
5.7.8 Be conscious of home computer security ...................................................................... 11
5.7.9 Examine privacy policies and seals ............................................................................... 11
5.7.10 Remember that YOU decide what information about yourself to reveal, when, why,
and to whom ............................................................................................................................... 12
5.7.11 Use encryption ............................................................................................................. 12
5.8 More on Encryption ................................................................................................................... 12
5.8.1 PGP (Pretty Good Privacy) ............................................................................................ 12
5.8.2 How It Works ................................................................................................................ 12
5.8.3 Where Can You Use PGP .............................................................................................. 13
5.9 Review Questions ...................................................................................................................... 13
5.10 Discussion and Answers ........................................................................................................ 13
5.10.1 Discussion on Activity 9 .............................................................................................. 13
5.10.2 Discussion on Activity 10 ............................................................................................ 14
5.10.3 Solutions to Review Questions .................................................................................... 14
1
Privacy
5.1 Scenarios
5.1.1 Scenario 1: Fund Raising and Potential Donors
Jan studies computer science at university but does not major in it. She wishes to be involved in public service
and so accepts a fund-raising job for a big university. She is asked to get information on Frank – a potential
donor. Frank has been recommended by another donor who said that Frank is keen on providing some funds to
the university but has not previously donated to this university.
Jan was asked to find out about all the information on Frank, with special focus on his wealth and the likely area
where Frank will be most keen. Using the Internet and databases, Jan was able to find out the following:
• Via a public database, his board memberships
• Via databases of associated organisations, contributions he has made to others and his support for
any religious organisations
• Wonders if his ISP will tell her about his online activities
• From the university records she finds that he was treated at the university hospital.
• She finds that she can access his medical records and discovers that he was treated successfully
for a kidney complaint
She then proceeds to recommends that he be approached for a donation for kidney research.
Activity 1
Discuss whether or not you think she has done anything wrong?
• Distribution addresses
He gets this information from various databases located in different locations. To do this, he downloads
information to his computer in his office, then copies the data to a portable hard drive and takes that home to
finish his report there. However, he also leaves a copy of the information and the report on his machine at home.
Activity 2
2
Privacy
Is he wrong to move the data to his house and is he wrong to leave the data there when he is done with the
report. What policy should Max’s agency have concerning taking work home? Discuss.
The system allows her to watch all the above information in real-time on her screen. She can also see all e-mails
sent by each clerk regardless of whether the e-mail is business-related or not.
Activity 3
Should she use this system and if so should each of the clerk be informed? Do you think any limitations should
be placed on companies employing such systems? Discuss.
Ravi also discovers that Zoroastrians who donate to charity charges a substantial amount to their credit cards. He
promptly recommends a new policy of soliciting more Zoroastrians for credit card in hope of increasing his
company’s profit.
Activity 4
Are either of these two recommendations wrong? What about the way Ravi use these information? Is the
company wrong by implement these policies? Discuss.
Many experts think that information gathering is like Panopticon. Information gather itself is not new –
governmental and private organisations have always kept databases. The difference is that much more surveillance
can be made with electronic databases because of their speed, types of information and scale of exchange of
information between them.
Activity 5
Compare and contrast paper- based and electronic records in more detail – pay particular attention on the
amount and type of data, who has access to them and the length of retention.
Recall that Max takes sensitive data home. The movement of data can be problematic in itself – it is difficult to keep
track and to ensure security of the data in different environments and locations. Taking work home is not new
– companies have allowed their employee to take company’s resources home, make use of it in completed a tasks
and then to bring it back. In these cases, companies have strict rules on how these resources should be handled.
Computer data should be treated in a similar way – by either not allowing data to be copied from the main frame
at all or by specifying data encryption to be used.
Activity 6
Do you think anyone is at fault here? Can you see the parallel between this lo-tech database and the use of
much more sophisticated databases for similar reasons, as in Ravi’s case?
• The needs of the organisation collecting and using the information versus individuals’ right of
privacy (considered a social good).
An example is that Amazon collects information on its clients in order to be able to inform them of new books in
their interest areas.
Technological development has not only changed how business is conducted, but also has had a huge impact on
personal and community identities.
Activity 7
Read the following paragraph:
In order to establish a relationship with an individual one needs to be able to control information
about oneself in order to maintain a relationship. Collecting and grouping of information into a
database causes us to lose control of the information. This loss of control reduces our ability to form
relationships.
Do you agree with what is being said there? Do not consider just personal relationships consider professional
relationships as well. When you are chatting or emailing on the Net, nobody knows who you are by anything
other than the name you have given as your identity. Your physical characteristics — skin colour, height,
physical features — are unknown. Your on-line characteristics are formed by your messages. What is known
about you is only the image that you choose to give of yourself.
4
Privacy
Identity: Anonymity can be liberating. Other users you come in contact with on the Net cannot look at your
physical self or hear your accent and make assumptions about you. You are judged on the opinions and
information you express.
Intrusion on Privacy: Personal information can be captured at certain sites through the information you have
provided when you make an on-line transaction, or by tracking the user by using cookies. Data may be
captured and analyzed without either the user's knowledge or consent. Their surfing patterns are collected
and analyzed to classify them into marketing categories. Many companies now monitor employee e-mail,
their argument being that any email leaving the company is the business of the company. Should anyone wish
to contact an employee with urgent personal information there is a risk that this could become public
knowledge.
2. Individual must be able to discover their personal information and how it is used.
3. Individual must be able to discover and stop information collected for one purpose but is used for
another.
Activity 8
Do you think that these principles are still appropriate today when it comes to electronic databases? What changes,
if any, do you think needs to be made to this code? This issue of individual – organisation relationships is discussed
further in the section on Privacy Issues on the workplace later in this chapter.
Activity 9
The objective of this exercise is to experiment with some ideas on privacy. Write down some ideas about the
following:
• How would you like to portray yourself to others?
You can find some thoughts about this activity at the end of the unit.
Legislators, theologians, scientists, academics and business people are getting more interested in the impact of
information technology on individuals, organizations and communities. The possible outcomes in the near future
could be better — not necessarily stricter — legislation safeguarding user privacy, increased education in the
proper use of the Internet, and more options for technological control that can be implemented based on user
discretion. The alternative outcomes could be strict tracking of every user, together with numerous legislative
bodies all imposing their own views on what information should be available. The challenge ahead of us is to
ensure that the benefits of the Internet far outweigh the real and serious threats brought about by the information
revolution.
The Internet expansion plays a large role in increasing the potential for misusing of information. The information
is flowing across borders more readily and frequently. Irrespective of the individual nation’s policies, there is still
a need for a global policy. European Union has a policy that is enforced amongst its members. Each member
states must make sure that personal data must be:
Activity 10
Read the articles supplied online as part of this unit (Guardian newspaper articles).
• Do you think that a service that is free to users should be more secure? After all, you only get what
you pay for.
• Will this event change the way you use e-mail?
• Do you think that independent bodies should check statements claiming privacy for these types of
services?
You can find some thoughts about this activity at the end of the unit.
Activity 11
Discuss the pro and con of a system such as that of Sweden’s Data Inspection Board is. Do you think that each
country should go this route?
6
Privacy
7
Privacy
labour was once regarded as a sensible business strategy, but now our ethical sense and labour protection laws
prohibit this practice. It remains to be seen in which direction our ethical intuitions will take us in determining the
nature of future employment, whether we can all be monitored in the interest of profit and accountability, or
whether we shall see a renewed interest in designing jobs for people.
In addition, we need to ask what kind of precedent computer based monitoring of employees will set for other
invasive practices. For example, similar arguments can be marshaled for the compulsory drug testing of key
personnel such as pilots, train drivers, and power plant operators. If these people have the potential to kill
thousands by accident, then do we not have the right to ensure that they are in a fit state to work? On the other
hand, why not also monitor the alcohol purchases of convicted drunk drivers? This highlights the most
contentious aspect of any form of computer based monitoring: it is not so much the harm it may currently be
causing, but what it represents.
Activity 12
Has your view changed after reading the arguments above? What is your view now? Discuss this issue with
other students if you can.
RICA provides that all forms of monitoring and interception of communications are unlawful unless the monitoring
and interception takes place under one of the recognized exceptions in RICA. There are several exceptions to the
general rule on the prohibition on intercepting communications, three of which apply to monitoring in the
workplace:
• Party to a communication: Section 4 of the RICA allows a party to a communication to monitor and
intercept the communication if he/she is a party to the communication (for example, where the
participants in a meeting consent to the meeting being recorded). This exception also applies where the
interceptor is acting with the consent of one of the parties to the communication.
• Written Consent: Section 5 allows for interception of any communication under any circumstances – i.e.
no special motivation or reason is required for it provided the person whose communication is being
intercepted has consented to it in writing prior to such interception.
• Business Purpose Exception: Section 6 contains a so-called “business purpose exception” which involves
the interception of “indirect communications in connection with the carrying on of business”. Section 6
authorises any person to intercept indirect communications in the course of carrying out their
8
Privacy
business by means of which a transaction is concluded in the course of that business, which “otherwise
relates to that business” or which “otherwise takes place in the course of the carrying on of that business,
in the course of its transmission over a telecommunication system”.
Activity 11
It is likely that by the time you are reading this set of notes that another draft of the proposed act has been released.
The media might also be covering it in more detail. Try and get hold of the most recent draft or some analysis of it in
the media. How has it changed?
Activity 12
Discuss if and how the interception and privacy counterbalance one another. Do you have concerns about either of
the acts?
click on, etc., and share this information with all of their client Web sites (who may number in the hundreds, even
thousands.) It is unknown whether all of these cookie rings (some examples of which are Double Click and Link
Exchange) do in fact share user data, but they certainly can do so potentially.
Browsers are starting to allow user control over cookies. Mozilla and Firefox, for example, allows you to see a
notice when a site tries to write a cookie file to your hard drive, and gives you some information about it,
allowing you to decide whether or not to accept it. (Be on the lookout for cookies the function of which is not
apparent, which go to other sites than the one you are trying to load, or which are not temporary). It also allows
you to automatically block all cookies that are being sent to third parties (or to block all cookies, entirely, but this
will make some sites inoperable). Internet Explorer has a cookie management interface in addition to Netscape
like features, allowing you to selectively enable or disable cookies on a site by site basis, even to allow cookies
for a site generally, but delete a specific cookie you are suspicious about. With Internet Explorer you can also turn
on cookies for a site temporarily then disable them when you no longer need them. For example, at an online
bookstore that requires cookies to process an order, but whom you don't want to track what books you are looking
at, what links you are following, etc., the rest of the time. Turning on cookie warnings will cause alert boxes to
pop up, but after some practice you may learn to hit "Decline" so fast that you hardly notice them anymore. The
idea is to only enable cookies on sites that require them AND whom you trust.
Realise you may be monitored at work, avoid sending highly personal e-mail to mailing lists, and keep sensitive
files on your home computer. In most countries (including South Africa), employees have little if any privacy
protection from monitoring by employers. When discussing sensitive matters in e-mail or other online media, be
certain who you are talking you. If you replied to a mailing list post, check the headers - is your reply going to the
person you think it is, or to the whole list? Also be aware that an increasing number of employers are monitoring
and recording employee Web usage, as well as email. This could compromise home banking passwords and other
sensitive information. Keep private data and private Net usage private, at home.
their word.) If you see a seal, is it real? Check with the seal-issuing site to make sure that the seal isn't a fake. And
examine terms carefully, especially if you are subscribing to a service rather than buying a product. Look out for
auto rebilling scams and hidden fees.
PGP comes in two public key versions - RSA and Diffie-Hellman. The RSA version, for which PGP must pay a
license fee to RSA, uses the IDEA algorithm to generate a short key for the entire message and RSA to encrypt
the short key. The Diffie-Hellman version uses the CAST algorithm for the short key to encrypt the message and
the Diffie-Hellman algorithm to encrypt the short key.
12
Privacy
For sending digital signatures, PGP uses an efficient algorithm that generates a hash code from the user's name
and other signature information. This hash code is then encrypted with the sender's private key. The receiver uses
the sender's public key to decrypt the hash code. If it matches the hash code sent as the digital signature for the
message, then the receiver is sure that the message has arrived securely from the stated sender. PGP's RSA
version uses the MD5 algorithm to generate the hash code. PGP's Diffie-Hellman version uses the SHA-1
algorithm to generate the hash code.
To use PGP, you download or purchase it and install it on your computer system. Typically, it contains a user
interface that works with your customary e-mail program. You also need to register the public key that your PGP
program gives you with a PGP public key server so that people you exchange messages with will be able to find
your public key. Network Associates maintains an LDAP / HTTP public key server that has 300,000 registered
public keys. This server is mirrored at other sites around the world.
The freely available PGP cannot legally be used for commercial purposes - for that, one must obtain the
commercial version from Network Associates (formerly PGP, Inc.). There are several versions of PGP in use.
Add-ons can be purchased that allow backward compatibility for newer RSA versions with older versions.
However, the Diffie-Hellman and RSA versions of PGP do not work with each other since they use different
algorithms. This term was originally written by Sabrina Dei Giudici from Web Marketing, Perth, Western
Australia.
4. Discuss briefly something we could do, if we found an unsuitable website with misleading ratings.
You can find answers to these review questions at the end of the unit.
13
Privacy
The time to think about your response. In contrast, this is something that is not always possible when we are talking
to a friend. It also can be difficult in a chat room to take time.
3. In many countries there are standards set for advertising. This could be extremely useful for consumers as well
as advertisers, who would possibly gain credibility if they had registered their advertisement. In the case study,
the claim regarding 'privacy' could be removed.
3. The website can be rated by an independent ratings organisation or the author of the site.
4. We could inform our Internet Service provider and inform some of the search engines...Etc.
14
Censorship
Chapter 6. Censorship
Table of Contents
6.1 Introduction to Censorship ........................................................................................................... 1
6.1.1 An Overview .................................................................................................................... 1
6.1.2 Why Censor? ................................................................................................................... 2
6.2 Censorship Strategies ................................................................................................................... 2
6.2.1 Overview ......................................................................................................................... 2
6.2.2 Blocking Software ........................................................................................................... 2
6.2.3 Ratings ............................................................................................................................. 3
6.2.4 Service Providers ............................................................................................................. 3
6.2.5 Browsers and search engines ........................................................................................... 3
6.2.6 Social Methods ................................................................................................................ 3
6.3 Censorship and Controversy ........................................................................................................ 3
6.3.1 Ratings ............................................................................................................................. 4
6.3.2 Freedom ........................................................................................................................... 4
6.3.3 Pressure to Control .......................................................................................................... 4
6.4 Investigating Data Trails .............................................................................................................. 5
6.4.1 Overview ......................................................................................................................... 5
6.4.2 Data Trails on Your Machine .......................................................................................... 5
6.4.3 Cookies ............................................................................................................................ 6
6.5 Discussion Topic .......................................................................................................................... 6
6.6 Answers and Discussions ............................................................................................................. 6
6.6.1 Discussions on Activity 4 ................................................................................................ 6
6.6.2 Discussions on Activity 5 ................................................................................................ 7
6.6.3 Discussions on Activity 6 ................................................................................................ 7
However, providing access to the Internet at work might mean that employees misuse the Internet during office
hours. For instance, an employee might make purchases from various Web sites. Providing Internet access at
home might mean that children are exposed to information that parents might consider harmful. However, not
providing access to the Internet might exclude people from the benefits of the vast information on the Internet. It
might be better, then, to filter the websites to ensure the 'right' information is accessible to people such as children
and employees. It is also possible for communities to filter out information that they consider 'inappropriate'.
Freedom of Speech is a fundamental human right in many countries. In the United States it is the first and most
important amendment to the Constitution. Other countries have legislated Freedom of Speech and Information in
other ways. The other side of the censorship coin is the freedom of information, and it is important that we do not
suppress this right in our zeal to, for instance, prevent children from viewing pornography.
The object of this activity is to consider what material different authorities would censor. Make a table with four
columns as shown. We have started the table for you to show the kinds of responses required.
1
Censorship
Fill in as many types of Web content that you can think of that the authority concerned could be interested in
censoring. You may duplicate material types in different columns.
• Parents: While parents would like their children to benefit from educational Web sites,
children can also be easily influenced by the content they find on the Web. In particular,
parents want to prevent their children from accessing adult material.
• Employers: Employees given Web access may surf the Net during office hours. The cost of the
connection is paid for by the employer, and unwanted surfing could lower productivity. Corporate
liability may be threatened if employees view inappropriate and/or offensive material.
• Pressure groups: An increasing number of independent groups want to deter the publication
of offensive material on the Web. They search the Web for sites which they find offensive,
such as pornography sites, sites for weapon sales, and hate campaigns. They then campaign for
the removal of such sites.
• Legal: Many countries have laws that limit the material that may be communicated by
electronic means. It is important to consider the laws not only of your own country, but also
those that apply in country of the target audience.
A new alternative is being developed: instead of restricting access to "bad" sites, the software keeps a list of
"good" sites to which access is allowed. However, this might be very restrictive as keeping an exhaustive list of
"good" sites is difficult, and so many appropriate sites may be blocked.
2
Censorship
6.2.3 Ratings
Website content can be classified according to certain labels, similar to those used by the Film and Video
Classifications. The Platform for Internet Content Selection (PICS) is a well-known classification rating system
that has been developed by the World Wide Web Consortium [http:// www.w3.org/PICS/].
The objective of this exercise is to consider who might be responsible for rating a website. Jot down on a
piece of paper two or more groups that could possibly rate a website (e.g. a university website). The
Recreational Software Advisory Council (RSAC) is an Internet rating service (http://
www.rsac.org/index.asp). Web developers can register with the service and, by answering some simple
questions about their site, receive a PICS based rating of their site. Users can then set their browsers to block
access to sites using the RSAC rating categories. This makes site selection more flexible.
1. Syntax for defining labels: This is the different aspects of the site to be measured. For example,
a website could have labels describing the levels of Language, Nudity, Sex, and Violence.
2. Syntax for labeling content: This is a rating classification itself for each of the labels. The each
label's criteria have to be determined before giving its value.
3. Method of retrieving labels. The labels, for example, could be embedded within the HTML file
or kept as a separate file included into the HTML files when they are accessed.
6.3.1 Ratings
Ratings usage can be grouped into the following categories
• Closed group: The ratings given depend on the criteria set up by the raters. A religious
organization would tend to be stricter than a secular educational institute. Therefore the accepted
ratings would depend on which rating organization was utilized to perform the rating.
• Community: Net Shepherd (a ratings organization) claim that their rating community is a virtual,
online community of people who represent the Internet's general population. However, these
people may not be representative of the world's population. Studies have shown that Internet users
are more affluent and educated than non-users. Thus, the community is self-selecting.
There are many groups of user to which ratings may be applicable:
• Individual users: There is no single, familiar labeling system, as with movie film ratings. This
can make it complicated to learn the various labels attached to different websites. Again, this
brings up the issue of which group to trust.
• Imposed: The individual might not be given the option to choose. Restrictions can be placed by a
company or by a government that regulates the Web servers in its country. National 'firewalls' are
implemented in China and Singapore, blocking certain types of material. Firewalls also exist to
'protect' the computer networks of many institutions around the world — such as universities and
local government organizations.
Ratings may not be representative of the majority of the world's population.
Activity 4: A short proposal
The object of this exercise is to consider the issue of personal responsibility involved in making censorship
decisions. Write down two lists:
1. Reasons why you think you might be qualified to decide what the inhabitants of your
home town could view on the Internet.
2. Reasons why you might not be able to make fair decisions (with regards to 1).
You can find some thoughts about this activity at the end of the unit.
6.3.2 Freedom
A 1960s folk song (Colours. D. Leitch. 1967. Pye) has the lyrics "freedom is a word I rarely use without thinking". This
is possibly a very useful philosophy and certainly worth remembering. Freedom may have a completely different
meaning to different people. Freedom for a child to cross a busy road on his/her own may place that child in danger. A
parent will educate the child as to the nature of such dangers until the child can take responsibility.
As the founder of the World Wide Web, Tim Berners Lee has said that the main idea of the World Wide Web was
to allow any and every kind of information to be published and accessed. There are many people advocating the
freedom of the Internet. The Electronic Frontier Foundation (http:// www.eff.org/ ) was set up to 'work in the
public interest to protect fundamental civil liberties, including privacy and freedom of expression, in the arena of
computers and the Internet'.
There are three types of trail that will be investigated, although these are not necessarily related to each other.
This section will not investigate the ethics of data trails, although it will consider each type's purpose.
If you are using Microsoft Windows XP, you can view the list of documents that have recently been
accessed. This list is available from the Start menu and then My Recent Documents. The Start menu might
also show the list of recent applications that you have used.
5
Censorship
Your Internet browser will also store history, bookmarks/favourites, cookies (see next section) and other files
that you accessed to speed up loading times. Try to learn about these issues with your browsers. Most store
this information by default.
What are your conclusions about the availability of information on your machine concerning your Web
activity? You can find some thoughts about this activity at the end of the unit.
It is possible for an employer to analyze the data trails on your machine and also those logged by a Firewall.
6.4.3 Cookies
Sometimes referred to as magic cookies, these are small text or data files (4Kb) left on your machine by a
website. They are retrievable at a later date by the website that set them. They can be used for a number of
purposes, such as storing browser settings and preferences, thus allowing more efficient downloading of files.
They may also store information about websites that you have visited; this allows advertising banners to be
effectively targeted. For example, if you were to spend a large amount of time searching the Web for car related
topics, the cookie files on your system will inform the organization that set them of your interest in cars, should
you return to their server. You would then notice that advertising banners would become car related.
There are lots of software tools that may be used to destroy data trails, however there is always a tradeoff between
data trails that are useful and those that can be used to "spy" on your browsing habits.
Activity 6: Data Trails on Other Machines
This Activity's objective is to consider how it may be more difficult than is often assumed to discover what an
individual has been browsing from home.
It is reasonably simple for an employer to keep track of data requested by employees. It is more difficult for an
Internet service provider (ISP) to track clients.
For this activity consider the ways in which we might be identified as a source for Web page requests. How might
this differ when we compare the use of a company network and a home computer connected to an ISP?
Hint: think about what changes each time we log in from home. Write down your ideas.
You can find some thoughts about this activity at the end of the unit.
Surveys inform us that there are many companies tracking their employees' HTML requests and e- mail messages.
This is often part of company policy.
Before you go to the Discussion Forum you should read over your notes on activity 1 and think about how
you would rate your own website, if you have one.
You should then join the Discussion Forum to:
• Discuss your thoughts on whether it is safe to allow people to rate their own websites.
• Discuss whether you think rating should be a compulsory activity either now or in the future
when this type of technology becomes less error prone.
An ISP must use a DHCP server to supply dynamic IP addresses in order to have more clients than available IP
addresses. This means that each time somebody logs into their ISP, their IP address is different, making it very
difficult to track Web activity.
It is possible to use software that can disconnect and reconnect to the ISP so that our IP address changes even
within what could be considered a single Internet session.
If somebody had access to the ISP server, then it might be possible for them to track changes in the IP address as
they occur. This has been used by police to catch criminals.
In Windows you can run software to identify the IP address. Whilst you are connected to the Internet, select
the Start button, then run and type winipcfg. This will give you your current IP address.
1. To prevent employees wasting company time accessing material irrelevant to their tasks and to
prevent the downloading of material that could compromise the company.
2. Blocking software contains lists of "objectionable" sites, and prevents them from being accessed.
7
Property Rights and Software
7.1 Scenarios
7.1.1 Scenario 1: Pirated Software from Abroad
Bernie works for a large consulting company. When he was on holiday in South East Asia he found an Office suit
that looks identical to Microsoft Office. The package he found costs R50 compared to the price tag of R3000 back
home. Bernie knew that the seller does not honour US copyright law. Despite the documentation looking like it
has been photocopied, he decided to buy it and returned home with it.
Activity 1
Do you think Bernie has done anything wrong? Do you think the customs will confiscate it should they find
out? Discuss.
Activity 2
Do you think that this is unfair? Has PPOS wronged Bingo? Have the customers wronged Bingo? Discuss.
1
Property Rights and Software
Activity 3
Discuss whether or not you think Earl or Jake has done anything wrong?
Activity 4
There are some issues that you should think about before proceeding further. Write down any thoughts you
might have on each of the following:
• Micro issues – are (unauthorised) copies illegal? (Ultimately it will be argued that
copying is wrong because it is illegal not because there is some pre-legal immorality
involved in the act.)
• Legal and moral issues – descriptive (what the law says) versus normative (what the law
should say)
• Source Code – step by step solution to a problem, usually in high level programming language. It
is usually created by a programmer employing one or more algorithms.
• Object Code – actuates the setting of switches to enable the computer to perform the underlying
algorithm
There are currently three mechanisms to deal with scenarios like Bingo: copyright, trade secrecy and patent.
7.3.2 Copyright
Copyright is a form of ownership which excludes others, for a limited amount of time, from copying without
permission. Only expression of an idea, and not the idea, can be copyrighted. There is often a fine distinction
between the two. In computing, both source and object codes are thought of as ‘literary works’ and are
copyrightable because they are expressions of ideas.
However, there are problematic issues which arise in computing field and not (as much) in others. It is relatively
simple to make minor change to a piece of software – making it into a new application. Does this mean that
copyright only apply to the old version or just part of the new version that contains the old code? Are copyright
2
Property Rights and Software
owner required to reapply every time a new piece of code is added? This has lead to many course cases. It has
been suggested that the literary analogy is not suitable for dealing with software copyright.
Activity 5
Discuss the main difference between software and literature? Apart from the constantly evolving nature of
software, what else can you say about software that would make the literature analogy inappropriate?
You can find a discussion of this Activity at the end of this chapter.
In order for a piece of information to be considered trade secret, it be possible to show that:
• It is novel.
Trace secrecy laws can be applied to software. This is usually done using non-disclosure clauses. Employees sign
an agreement that they will not reveal secrets learnt at work even after they have left. There is often ambiguity
here because the agreement does not apply to generic information in the area. Another application of this law is
via licensing agreements. Software is licensed out and not sold – only the object code, and not the source code, is
given to the user. The software company can do all the modification to suit the client and still retain control. The
source code is in effect a trade secret.
In Bingo’s case, trade secrecy would have helped. Non-disclosure agreements would prevent employee from
giving away important secrets even after they left. However, this might only be useful during development; once
BOS is released, it is more difficult to control. General principles are there for everyone to see (and copied) –
BOS is trying to sell or licence the software, something just can not be hidden. However, specific behind-the-
scene methods of doing something can still be made a secret. Generally, trade secrecy works for specialised
bespoke software but is poor for general purpose software.
• Gives inventor monopoly on use of the invention – even if someone else makes the same product
in a different way; they are excluded from using it.
• Grants patent owner the right to licence others to make, sell or use the invention.
• Legitimise a monopoly
• Is granted for a limited number of years (17 in the USA)
The main aim of the patents is not only to ensure inventor, but to advance useful arts and science as well. This
will foster inventions and encourage others to learn from and build on inventions. It also promotes disclosure of
inventions and assures that ideas already in the public domain remain there.
However, it must be noted that patent does not guarantee financial success. This is only achieved if the product is
accepted by the market. Additionally one can not patent an abstract idea, an algorithm or a scientific principle.
To qualify for patent protection, the object in question must satisfy the following criteria:
3
Property Rights and Software
Both fears have since been overcome. After the US court case of Diamond versus Diehr was settled in 1981,
many patents have been granted on software. However, there is still concern that patents must not be granted for
building blocks of science and technology.
• Consequentialist: Property rights are good because they lead to good consequences
• Kantian: Everyone has the right to be autonomous. From this one can derive a right to property
(Labour theory of Property)
The idea of natural rights is also applicable. This idea is derived from Locke’s Labour theory and states that a
person has a natural right to what he/she produces. This can be applied to software as well. Recall the Bingo case.
PPOS copied BOS and as such they stole Bingo’s labour. Bingo has lost the capacity to sell (and make money
from) its creation.
Activity 6
Find out more about freeware and shareware if you do not know these terms. You can find a discussion of this
The idea of software ownerships allowed for application of copyright, trade secrecy and patent laws. Together, these
encourage invention, innovation, new products and creative invention.
• Criticisms or comments
4
Property Rights and Software
• News reporting
• Teaching
• Scholarship or research
Fair use of proprietary software is not considered wrong or illegal in most countries. Additionally making a copy
to prevent serious harm might also not attract legal consequence in many jurisdictions.
A very philosophical argument puts across the idea that the act of copying software in itself is not wrong because
there is nothing intrinsically wrong with the act. It’s the act of using the copied software that is the problem.
While the person who has been licensed for the software may not have been harmed (copying does not deprive
the person of the procession) but the authors are deprived of payment for their labour.
American Association of Law Libraries, American Library Association, Association of Academic Health
Sciences Library Directors, Association of Research Libraries, Medical Library Association and the Special
Libraries Association.
'The primary objective of copyright is not to reward the labour of authors, but "to promote the
Progress of Science and useful Arts." To this end, copyright assures authors the right to their
original expression, but encourages others to build freely upon the ideas and information conveyed
by a work. This result is neither unfair nor unfortunate. It is the means by which copyright advances
the progress of science and art.' - US Supreme Court Justice Sandra Day O'Connor
It follows that the benefits of the new technologies should flow to the public as well as to copyright proprietors.
As more information becomes available only in electronic formats, the public's legitimate right to use copyrighted
material must be protected. In order for copyright to truly serve its purpose of "promoting progress," the public's
right of fair use must continue in the electronic era, and these lawful uses of copyrighted works must be allowed
without individual transaction fees.
• to read, listen to, or view publicly marketed copyrighted material privately, on site or remotely
• to experiment with variations of copyrighted material for fair use purposes, while preserving the
integrity of the original
• to make or have made for them a first generation copy for personal use of an article or other small
part of a publicly marketed copyrighted work or a work in a library's collection for such purpose
as study, scholarship, or research
• to make transitory copies if ephemeral or incidental to a lawful use and if retained only
temporarily Without infringing copyright, non-profit libraries on behalf of their clientele, should be able:
• to avoid liability, after posting appropriate copyright notices, for the unsupervised actions of their
5
Property Rights and Software
users
• that the terms of licenses will not restrict fair use or other lawful library or educational uses
• that U.S. government works and other public domain materials will be readily available without
restrictions and at a government price not exceeding the marginal cost of dissemination
• that rights of use for non-profit education apply in face-to-face teaching and in transmittal or
broadcast to remote locations where educational institutions of the future must increasingly reach
their students
Carefully constructed copyright guidelines and practices have emerged for the print environment to ensure that
there is a balance between the rights of users and those of authors, publishers, and copyright owners. New
understandings, developed by all stakeholders, will help to ensure that this balance is retained in a rapidly
changing electronic environment.
The above working statement addresses lawful uses of copyrighted works in both the print and electronic
environments.
Another issue is that copyright does not give a monopoly of control of a literary work – someone else,
independently can do the same thing. As long as the work was created independently and is literally different
there is no copyright infringement. In computing, however, striking resemblance is enough for a court to declare a
copyright infringement. Here are some infringement cases:
• Franklin versus Apple (1984): Franklin copied Apple’s operating system, in many cases this was
done line by line. He was found guilty of copyright infringement.
• Whelan versus Jaslow (1987): Whelan developed a program for Jaslow in Fortran, but both
agreed that Whelan would Own it. Jaslow then redid the program line by line in Pascal. Whelan
sued and even though Jaslow’s program is literally different and arguably a different expression
of the same idea, the court found in favour of Whelan (Comprehensive non-literal similarity).
6
Accountability in IT
Chapter 7. Accountability in IT
Table of Contents
7.1 Scenarios ...................................................................................................................................... 1
7.1.1 Scenario 1: Virtual Rape................................................................................................. 1
7.1.2 Scenario 2: Designing-making Systems .......................................................................... 2
7.1.3 Scenario 3: Service Provider for Online Forums ............................................................. 2
7.1.4 Scenario 4: Y2K Problem ................................................................................................ 2
7.2 Ensuring Accountability .............................................................................................................. 2
7.2.1 Accountability.................................................................................................................. 3
7.2.2 Responsibility .................................................................................................................. 3
7.2.3 Liability ........................................................................................................................... 3
7.3 Buying and Selling Software ....................................................................................................... 3
7.3.1 Software – Product or Service?........................................................................................ 3
7.3.2 Mass Market Products ..................................................................................................... 4
7.3.3 Customised Software ....................................................................................................... 4
7.3.4 Mixed Case ...................................................................................................................... 4
7.4 Negligence ................................................................................................................................... 4
7.5 Example: Y2K Problem ............................................................................................................... 4
7.5.1 Who was responsible? ..................................................................................................... 5
7.6 Diffusion of Responsibility .......................................................................................................... 5
7.6.1 Example: THERAC-25 .................................................................................................... 5
7.6.2 Example: ISP Responsibility ........................................................................................... 5
7.6.3 Example: Virtual Action .................................................................................................. 6
7.1 Scenarios
7.1.1 Scenario 1: Virtual Rape
LamdaMoo is a MUD (multi-user dungeon, dimension, or sometimes domain) game, that allows player to create
spaces and character and to use them to interact with other players’ characters and spaces. Bungle wrote a piece
of software that took control of other players’ characters and make them do sadistic actions including rape. The
actual owner of the character has no control over these actions. As a result, LambdaMooers are outraged and
wanted bungle removed. Various opinions have been voiced ranging from expulsion to support because ‘he has
done nothing wrong’. In the end, the community decided to banish Bungle and to prevent similar incidents in the
future, the rules were changed such that any player’s characters and spaces can be modified or removed, if the
majority of players agrees.
Activity 1
• Consider that he was responsible for the event and that he violated an implied, but not
formalised rule. What did he do wrong?
• Do you agree with what the community did? How should he be treated?
• What about the community’s new rules concerning what amount to censoring? Do you
1
Accountability in IT
think more safeguard is needed? If so, what?
Kim is very nervous about the market this week. Her personal indicators point to the market going down, while
the expert system points to it going up. The system recommends that she puts substantial investments into the
market but she does not understand the system’s analysis. She also can not judge if the system is defective.
Activity 2
What do you think Kim should do? Should she go with her own analysis and feeling or go with the market. If
she makes the wrong choice, she will lose a lot of money for her company. Also consider the following
questions:
• Can Kim be held responsible if she uses the information of the program and that turns
out to be the wrong decision? Perhaps company should have a policy dealing with
situation such as this?
• Can the system’s designer or owner be sued or held responsible if the system is working
properly? What about if the system is found to be faulty?
He has been away and on his return, eh is outraged to find postings on a forum attacking him. In these postings, it
was claimed that he is a drug dealer and that his stories are filled with lies. In response, he posts a denial and also
contacts the forum administrator for names and address of the defamer (All posters are required to register with
their real names and address for billing purposes). However, the forum administrator refuses to give him this
information. Milo is now suing them because he can not sue the perpetrator.
Activity 3
Do you think the forum administrator should be responsible for what is said in the forum? If no, then who
should be? What about giving the information away? Recall the relevant privacy issues concerning
information collected.
However, the year 2000 arrived with no major catastrophe. There were only a few isolated problems. Various
opinions have been expressed on this issue – some saying that the problems were fixed on time; while others
saying that the problem was over stated. Whatever is the case, who was responsible, and why did this problem
actually ever occur?
7.2.1 Accountability
This is used in its broadest meaning. It refers to the appropriate agent to response and depends on various factors.
For example, in a department in a company, the head of department might be held accountable. Accountability
rests with someone with the ultimate responsibility.
7.2.2 Responsibility
There are many types of responsibility:
Role Responsibility: This is analogous to duty. It is what people are expected to do within their
role. For example, in Scenario 1 with LamdaMoo, players are expected to play by the rules, even if
they are not stated. Most players assume that it means not taking over another players’ character.
Casual Responsibility: This is a responsibility as a result of causality. For example, X did something and
caused an event to happen. Kim invests a large amount of money in the Market and cause the company to
lose money, even though Kim might have done all that was required of her duty.
Blameworthy Responsibility: Kim may or may not be responsible, but she is not blameworthy.
Perhaps the software was faulty – in that case, the software designer might be blameworthy if s/he
failed to fulfil a role responsibility.
7.2.3 Liability
A friend slips on the polished floor of your house and break a leg. You might be held liable but you may not be
blameworthy.
Is a seller being dishonest if they do not disclose a problem area not asked about? This is probably the case but it
is very difficult to say especially if the user’s needs are varied and complex – how does the salesman know what
the needs are. To a naïve user, the answer might be yes, but it is difficult to compel this. Usually, the product itself
(either packaging or licence agreement) will contain all the necessary information. Contract can be voided if all
relevant information is not given.
The buyer also has the responsible to find out all the necessary information and ask the right questions if there
is lack of it.
7.3.1 Software – Product or Service?
This depends on the circumstances of how the software is produced and/or sold. A comparison can be made
between software and buying a suit. (Prince 1980). There are three types:
3
Accountability in IT
• Off the peg / Ready to wear (no alteration)
• Producer is in the best position to anticipate and control the risks associated with the product, thus
the onus is on the producer to get the product right.
• Producer can spread the cost of injury and insurance over all clients.
The reason for this utilitarian is that placing the onus on the producer has positive effects.
7.4 Negligence
Negligence is a failure to do something that is expected of a reasonable and prudent person. For example if a
security guard is knocked unconscious, he cannot be blame, but if he is drunk, he might be considered negligent.
There is always presumption of a reasonable standard of behaviour. Often this is used to describe blameworthy
behaviour of professionals.
The definition of standard applicable to the offence is often quite difficult to arrive at. Often this is best judged
by other professionals (conflict of interest issues?).
• Professional Society?
4
Accountability in IT
1990: Same answer? Were the systems expected to last for 10 years? What is the cost of storage at this time?
What is the cost of upgrading old system?
1995: Same answer? Were the systems expected to last for 5 years? Storage and upgrade cost? Should
professionals warn companies of the Y2K problems? Should CSSA have a recommended code of Practice
concerning this issue?
1998: Same question, different answer? Client companies all had policies. These were communicated to
the shareholders and everyone accepted their responsibilities.
So it has been a lesson. The best strategy is:
• State clearly the role responsibilities of all concerned. Professional needed to explain and
document the problem and then to offer options.
• Make sure that all involved understood the effect of their work on humans. Clients needed to
understand available options – they needed to realise that the option of staying with 2 digits was
short-term and unsafe.
• Hold those responsible who fail to live up to their responsibility.
• The number of people involved in development, distribution, training and using it.
• What the system will be involved in – many will be involved in important decision making.
• Kant: Humans are responsible for their actions because they have the capacity to control their action.
The error was traced to also exist in previous version of the software, but had caused no problems because there
was only one mode in that version. Was it the designer or the tester (who looks for errors and unconformities to
the requirements) who was at fault? The Therac case also illustrates the difficulty of testing real-time systems.
Should there have been a feature on the system limiting the radiation dose to some MAXIMUM irrespective of
everything else. If so, should this not have been specified by the clients? Are they also partially to blame?
It is tempting to think that because it is a game, his behaviour is not real. This thinking maybe appropriate when
considering flight simulators but when the actions involved real people, one should consider
• Can claim that virtual environments are not morally neutral – one’s behaviour in the virtual
environment is real.
In effect, Bungle:
The issues of blameworthiness and liability are complex. He has broken rules without seeking consent. While
virtual environments can allow people to do real and useful things such as in education and medicine, it can also
create complex issues when dealing with responsibility – as has been seen in the virtual rape scenario. Consider a
case of a medical doctor performing surgery via remote access.
Midway through a complex procedure, the link is lost and the patient dies. Who should be held responsible? How
would you start investigation into this issue? The key is to start by identifying role players and their
responsibilities, then look into the issue of blameworthiness and liabilities.