Midterm L 01
Midterm L 01
Instructional Manual in
SOCIAL PROFESSIONAL ISSUES 1
I. OVERVIEW
In this chapter, you will learn about Computer Ethics which is part of practical
philosophy concerned with how computing professionals should make decisions
regarding professional and social conduct.
COMPUTER ETHICS
PROFESSIONAL CODE OF ETHICS
Professional code of ethics is a set of guidelines that are designed to set out
the acceptable behavior of members of a particular group, association, or profession.
A professional code of ethics states the principles and core values that are
essential to the work of a particular occupational group. Practitioners in many
professions subscribe to a code of ethics that governs their behavior. For example,
doctors adhere to varying versions of the 2000-year-old Hippocratic Oath, which
medical schools offer as an affirmation to their graduating classes. Most codes of ethics
created by professional organizations have two main parts: a) outline what the
organization aspires to become, and b) typically list rules and principles by which
members of the organization are expected to abide. Many codes also include a
commitment to continuing education for those who practice the profession.
That I have an obligation to my fellow members, therefore, I shall uphold the high
ideals of AITP as outlined in the Association Bylaws. Further, I shall cooperate with my
fellow members and shall treat them with honesty and respect at all times.
That I have an obligation to society and I will participate to the best of my ability in the
dissemination of knowledge pertaining to the general development and understanding
of information processing. Further, I shall not use knowledge of a confidential nature to
further my personal interest, nor shall I violate the privacy and confidentiality of
information entrusted to me or to which I may gain access.
1. We believe: that every individual should have the right to free speech in cyber
space.
2. We believe: that every individual should be free of worry when pertaining to
oppressive governments that control cyber space.
3. We believe: that democracy should exist in cyber space to set a clear example
as to how a functioning element of society can prosper with equal rights and free
speech to all.
4. We believe: that hacking is a tool that should and is used to test the integrity of
networks that hold and safe guard our valuable information.
5. We believe: those sovereign countries in the world community that do not respect
democracy should be punished.
6. We believe: that art, music, politics, and crucial social elements of all world
societies can be achieved on the computer and in cyber space.
7. We believe: that hacking, cracking, and phreaking are instruments that can
achieve three crucial goals:
a. Direct Democracy in cyber space.
b. The belief that information should be free to all.
c. The idea that one test and know the dangers and exploits of systems that
store the individuals’ information.
8. We believe: that cyber space should be a governing body in the world
community, where people of all nations and cultures an express their ideas and
beliefs as to how our world politics should be played.
9. We believe: that there should be no governing social or political class or party in
cyber space.
10. We believe: that the current status of the internet is a clear example as to how
many races, cultures, and people can communicate freely and without friction or
conflict.
11. We believe: in free enterprise and friction free capitalism.
12. We believe: in the open-source movement fully, as no government should adopt
commercial or priced software for it shows that a government may be biased to
something that does not prompt the general welfare of the technology market
and slows or stops the innovation of other smaller company’s products.
13. We believe: that technology can be wielded for the better placement of mankind
and the environment we live in.
14. We believe: that all sovereign countries in the world community should respect
these principles and ideas released in this constitution.
The above declared constitution is like the bill of rights which should be read in
relation to the Ten Commandments.
In the industrialized nations of the world, the information revolution” already has
significantly altered many aspects of life – in baking and commerce, work and
employment, medical care, national defense, transportation and entertainment.
Consequently, information technology has begun to affect (in both good and bad
ways) community life, family life, human relationships, education, freedom,
democracy, and so on. Computer ethics in the broadest sense can be understood as
that branch of applied ethics which studies and analyzes such social and ethical
impacts of information technology.
may seem clear initially, a little reflection reveals a conceptual muddle. What is
needed in such cases is an analysis that provides a coherent conceptual framework
a policy for action.(Moor 1985 p.266)
Computers are logically malleable in that they can be shaped and molded to do
any activity that can be characterized in terms of inputs, outputs and connecting
logical operations. Because logic applies everywhere, the potential applications of
computer technology appear limitless. The computer is the nearest thing we have to
a universal tool. Indeed, the limits of computers are largely the limits of our own
creativity. (Ibid)
Moor argues that computer ethics is unique because computers have certain
properties that raise unique issues and, according to Moor there are three properties
that make computers a special case:
Logical Malleability:
Computers can be shaped and molded to perform any activity that can be
characterized in terms of inputs, outputs and connecting logical operations. This is in
contrast to the majority of manufactured products. For example, a car, a television or
refrigerator has well-defined and quite specific functions.
Just as the power of steam engine was the raw resource of the Industrial Revolution so the logic
of a computer is a raw of the Information Revolution. Because the logic applies everywhere, the
potential applications of computer technology appear limitless. The computer is the nearest thing
we have to a universal tool, the limits of computers are largely the limits of our own creativity.
Impact on Society:
The extensive impact of computerization on society is clear. Naturally, in 1985,
when Moor wrote his paper, relatively few could foresee the extent of that impact, nor
did anyone envisage the Internet and the World Wide Web. Moor did, however, foresee
the changing workplace, and the nature of work:
Computers have been used for years by businesses to expedite routine work, such as calculating
payrolls. However, as personal computers become widespread and allow executives to work at
home, as robots do more and more factory work, the emerging question will not be merely How
well do computers help us work? But What is the Nature of the work?
Invisibility Factor:
An important fact about computers is that most of the time, and under most
conditions, computer operations are invisible. Moor identifies three kinds of invisibility
that can have ethical significance:
1. Invisible Abuse: Moor describes this as: “the intentional use of the invisible
operations of a computer to engage in unethical conduct.” He cites an example:
The programmer realized he could steal excess interest from a bank.
When interest on a bank account is calculated, there is often a faction of a
cent left over after rounding off. This programmer instructed a computer to
deposit these fractions of a cent into his own account.
2. Invisible Programming Values: these are values which, according to Moor, are
embedded into a computer program:
He argues that the issue is how much we should trust computer’s invisible
calculation. This becomes a significant issue as the consequences grow in
importance.
Filipinos are using social media platforms 53 hours a week. That’s a whole 11
hours more than the global average of 42 hours!
In a global study called Wave 7, Filipinos are using social media to primarily
connect with their families living overseas. As of this writing, there are more than 11
million Filipinos living outside the Philippines. Social media has become a way for them
to communicate with their families and friends instead of using overseas call and text,
which are the traditional ways of communication.
Philippines is the social media capital. As proof, Makati city takes the most selfies
than anywhere in the world. As internet penetration increases in the Philippines, it
seems that Filipinos have grown fond of using apps such as WeChat, Line, Skype, and
Facebook Messenger. Line has a Free Call services.
V. EVALUATION
Answer the following questions. Explain briefly your answers.
1. What are the three levels of Computer Ethics? Explain each level.
2. Give 2 examples of Moral Responsibilities of Computer Professionals.
3. In your own opinion, what is the purpose of Computer Ethics?
4. What if your friend post your picture which, to your mind should NOT be seen by
others, will that be OK with you?
5. If we asked someone to join us in a photo shoot (or selfie), do we need to ask
permission to allow us to upload the said picture on any social networking site?
What if we take a photo or video of a private person without his consent, is it a
proper or not? What are some exemptions?
6. You are working in an investigation firm, you and your team handled a case of a
murdered businessman. In your investigation you got the recorded tape in the
CCTV camera it was shown the girl killing her boss, but the video was blurred.
You gave the video to the computer expert to be scanned using the special
program the footage to make the video clearer and identify the suspect but the
specialist told you that it would take 48 hours to clearly view the image. On that
day your sister confessed that she was the one who killed the man. Will you
report your sister to the authorities? Why?
VI. REFERENCES
Lavina, G., (2015) Social, Ethical, Legal and Professional Issues in Computing, p.27-
47., Mindshapers Co., Inc., Intramuros Manila