1-Introduction To Ethics
1-Introduction To Ethics
1-Introduction To Ethics
Introduction to Ethics
Syed Saqib Raza Rizvi
Definition
• Ethics: “The science of morals; the department of study
concerned with the principles of human duty. The moral
principles by which a person is guided.” – Oxford English
Dictionary
• Web and mobile applications are the new frontiers in the war against
cyber attack, according to a top cyber security risks report from
Hewlett Packard (HP) published in May.
• The report reveals that SQL injection (SQLi) attacks on web
applications increased sharply from around 15 million in 2010 to
more than 50 million in 2011.
Ashley Madison Hack 2015: 37 Million Users
The Conficker Worm 2008: Still Infecting a Million
Computers a Year
Stuxnet Worm 2010: Iran's Nuclear Program
Blocked
Home Depot Hack 2014: Over 50 Million Credit Cards
eBay Hack 2014: 145 Million Users Breached
The Melissa Virus 1999: 20% of the World's
Computers Infected
• Melissa is a fast-spreading macro virus that is distributed as an e-mail
attachment that, when opened, disables a number of safeguards in
Word 97 or Word 2000, and, if the user has the Microsoft Outlook e-
mail program, causes the virus to be resent to the first 50 people in
each of the user's address books. While it does not destroy files or
other resources, Melissa has the potential to disable corporate and
other mail servers as the ripple of e-mail distribution becomes a
much larger wave. On Friday, March 26, 1999, Melissa caused the
Microsoft Corporation to shut down incoming e-mail.
Case Continues
• Therac-25
• Therac-25 was a medical linear accelerator, a
device used to treat cancer. What made Therac-
25 unique at the time of its use was the software.
Not only did the software ease the laborious set-
up process, but it also monitored the safety of the
machine. In this case on safety critical software,
you will find that some patients received much
more radiation than prescribed despite the
software safety programming.
Case Continues
• Machado
• http://abcnews.go.com/US/harvard-ethics-student-charged-hacking-
mit-computer/story?id=14110364
Ten Commandments
• 1. Not use a computer to harm other people. This is the foundation
for computer ethics.
Ten Commandments
• 2. Not interfere with other people’s computer work. Such as sending
numerous thoughtless e-mails to larger issues like purposely sending
computer viruses.
Ten Commandments
• 3. Not snoop around in other people’s computer files. Don’t go
looking through other people’s computer files unless given
permission.
Ten Commandments
• 4. Not use a computer to steal.
Ten Commandments
• 5. Not use a computer to bear false witness. Don’t spread rumors or
change your email address so that the receiver of an email believes
that it came from someone other than yourself.
Ten Commandments
• 6. Not copy or use proprietary software for which you have not paid.
Once you buy a software system, music CD or DVD you should not
make copies of that information and distribute it to your friends.
Ten Commandments
• 7. Not use other people’s computer resources without
authorization or proper compensation. This means do not surf the
internet or print off large amounts of paper for personal use
during work hours.
Ten Commandments
• 8. Not appropriate other people’s intellectual output. Don’t upload
information and take credit for it such as music, images and text.
Ten Commandments
• 9. Think about the social consequences of the program you are
writing or the system you are designing.
Ten Commandments
• 10. Use a computer in ways that ensure consideration and respect for
your fellow humans. Just because you can’t always see someone face
to face doesn’t give you the right to offer any less respect then you
would offer in a personal encounter.
CASE STUDY
• http://www.mit.edu/activities/safe/safe/cases/umich-baker-
story/Baker/timeline.html
• http://www.mit.edu/activities/safe/safe/cases/umich-baker-
story/throwout.1
International Papers Links
• http://www.ijie.org, International Journal of Information Ethics.
• www.sans.org/topten.htm Top ten Internet security flaws that system
administrators must eliminate to avoid becoming an easy target.
• http://ethics.csc.ncsu.edu/ Computer ethics as a map.
• http://www.neiu.edu/~ncaftori/ethics-course.htm
• The ethics course I borrowed these overheads from.