Ethical Dilemmas in Cyberworld Lecture Notes 2
Ethical Dilemmas in Cyberworld Lecture Notes 2
Ethical Dilemmas in Cyberworld Lecture Notes 2
- Two Categories:
Kind of Trademarks:
drawings,
symbols or three dimensional signs (shape and packaging of goods
Holograms
Color
non-visible signs (sound, smell or taste)
Copyright
Copyright laws grant authors, artists and other
creators protection for their literary and artistic
creations, generally referred to as ―works‖. A closely
associated field is ―related rights‖ or rights related to
copyright that encompass rights similar or identical to
those of copyright, although sometimes more limited
and of shorter duration.
Works covered by copyright include, but are not limited
to: novels, poems, plays, reference works, newspapers,
advertisements, computer programs, databases, films,
musical compositions, choreography, paintings,
drawings, photographs, sculpture, architecture, maps
and technical drawings.
Copyright
The creators of works protected by copyright, and their heirs
and successors (generally referred to as ―right holders‖), have
certain basic rights under copyright law. They hold the exclusive
right to use or authorize others to use the work on agreed
terms. The right holder(s) of a work can authorize or prohibit:
its reproduction in all forms, including print form and sound
recording;
its public performance and communication to the public;
its broadcasting;
its translation into other languages; and
its adaptation, such as from a novel to a screenplay for a film.
Online information access is challenged even more than public libraries by the
notion of universal access.
1. individuals attempting to access and use online information must be educated
enough to read, write, reason, and even calculate. In other words, they must have
at least a minimal level of education
2. individuals attempting to access and use online information must have physical
access to the technologies—hardware, software, databases, telecommunications—
that are necessary to retrieve information.
3. the issue of property rights may restrict access to online information; unless
individuals can pay to obtain the information, it may not be in the public domain
GREEN COMPUTING
is the emerging practice of using computing and
information technology resources more efficiently
while maintaining or improving overall performance.
is an environmentally sustainable approach to
managing information and communication technologies.
It enables organizations to improve environmental
stewardship by increasing energy efficiency, improving
information management and providing appropriate
analytical capability (Binder & Suri, 2009; Oslon,
2009).
GREEN COMPUTING
Some examples of the application of green
technology in computing include:
reducing the use of environmentally hazardous
materials like CFC, lead and others.
promoting the use of recyclable materials and
minimizing use of non-biodegradable components.
promoting practices such as energy cost accounting,
virtualization and eWaste recycling
with a change in lifestyle habits aimed at energy
conservation.
SIMPLE Ways to PRACTICE GREEN
COMPUTING
1. Buy "Energy Star" labeled monitors, desktops, laptops, and
printers
2. Put laptops in "sleep" mode when not in use.
3. Even better, turn OFF computers and other equipment when
not in use.
4. E-cycle used computer equipment.
5. Buy the new "Smart Strip" power strip.
The Smart Strip actually senses how much power your computer
peripherals use. And when the Smart Strip senses that you've turned
your computer off, it automatically shuts off your peripherals, too,
preventing them from drawing an idle current, which is the current
drawn even after equipment is shut off.
Ethical issues of green computing
Going green is not only a fashion statement, it is a real movement that begun
back in 1992 with "The Energy Star Program" (Brandrick, 2009). It has become
a way of life for many big corporations to try and reduce the amount of
energy waste that they would normally excrete and nowadays it is not only
expected to be done by such corporations but also by small businesses and
individuals alike who have a moral responsibility to their community.
Due to the widely known need to save energy and natural resources of our
ever dyeing planet many manufacturers have come out with ideas on how to
make your device energy efficient, the problem is that with good inventions
come the useless ones and those are made to assume a purpose that it is not
properly attributed. Some manufacturers will label a product as energy
efficient just so it can be sold but sadly it will not work.
Consumers can easily be deceived to buy such products that end up causing
more harm to the environment "considering the materials and energy used to
manufacture it"(Brandrick, 2009) such products are truly a waste. Like the "Eco
Button that promised its consumers that they would save energy and money"
(Brandrick, 2009) on their PC but there was a downloadable content available
on the internet that would provide the same results. It is not moral or ethical for
such manufacturers to lie on the efficiency of their product but it's not illegal to
say that the product was misinterpreted by the consumer.
Outsourcing
Outsourcing (also sometimes referred to as "contracting out") is a
business practice used by companies to reduce costs or improve
efficiency by shifting tasks, operations, jobs or processes to an
external contracted third party for a significant period of time. The
functions that are contracted out can be performed by the third
party either onsite or offsite of the business.
Examples:
manufacturers have outsourced jobs overseas to countries like China and
Bangladesh. This practice is also known as ―offshoring," which involves
outsourcing to a third party in a country other than the one in which the
outsourcing company is based in order to save on labor costs.
not limited to manufacturing jobs. Customer service jobs, such as those in
a call center, and computer programming jobs are also outsourced by
companies seeking ways to reduce costs
BENEFITS OF OUTSOURCING
One of the biggest disadvantages of outsourcing is the risk of losing sensitive data
and the loss of confidentiality. It is important, therefore, to have checks in place to
avoid data loss.
Since the outsourcing provider may work with other customers, they might not give
100% time and attention to a single company. This may result in delays and
inaccuracies in the work output.
Hidden costs and legal problems may arise if the outsourcing terms and conditions
are not clearly defined.
Losing management control of business functions mean that you may no longer be
able to control operations and deliverables of activities that you outsource.
Not understanding the culture of the outsourcing provider and the location where
you outsource to may lead to poor communication and lower productivity.
Problems with quality can arise if the outsourcing provider doesn't have proper
processes and/ or is inexperienced in working in an outsourcing relationship.
If important functions are being outsourced, an organization is mightily dependent
on the outsourcing provider. Risks such as bankruptcy and financial loss cannot be
controlled.
Ethical issues of outsourcing
The unfair pay and treatment of employees can have a
negative effect on the products that they are
assembling.
The worker’s rights as human beings and workers are
being exploited not only by corporations but their own
government.
There will always be countries that will not be as
developed as others, but that does not mean that
corporation can exploit that vulnerability.
Netiquette
Rule 1: Remember the Human
The golden rule your parents and your kindergarten teacher taught you was pretty simple: Do
unto others as you'd have others do unto you. Imagine how you'd feel if you were in the other
person's shoes. Stand up for yourself, but try not to hurt people's feelings.
In cyberspace, we state this in an even more basic manner: Remember the human.
http://www.albion.com/netiquette/corerules.html
Netiquette
Rule 3: Know where you are in cyberspace
Netiquette varies from domain to domain What's perfectly acceptable in one area may
be dreadfully rude in another. For example, in most TV discussion groups, passing on
idle gossip is perfectly permissible. But throwing around unsubstantiated rumors in a
journalists' mailing list will make you very unpopular there.
And because Netiquette is different in different places, it's important to know where
you are.
Rule 4: Respect other people's time and bandwidth
It's a cliché that people today seem to have less time than ever before, even
though (or perhaps because) we sleep less and have more labor-saving devices
than our grandparents did. When you send email or post to a discussion group, you're
taking up other people's time (or hoping to). It's your responsibility to ensure that
the time they spend reading your posting isn't wasted.
http://www.albion.com/netiquette/corerules.html
Netiquette
Rule 5: Make yourself look good online
don't want to give the impression that the net is a cold, cruel place full of people who
just can't wait to insult each other. As in the world at large, most people who
communicate online just want to be liked. Networks --particularly discussion groups --
let you reach out to people you'd otherwise never meet. And none of them can see you.
You won't be judged by the color of your skin, eyes, or hair, your weight, your age, or
your clothing.
You will, however, be judged by the quality of your writing. For most people who
choose to communicate online, this is an advantage; if they didn't enjoy using the written
word, they wouldn't be there. So spelling and grammar do count.
Rule 6: Share expert knowledge
The strength of cyberspace is in its numbers. The reason asking questions online works is
that a lot of knowledgeable people are reading the questions. And if even a few of
them offer intelligent answers, the sum total of world knowledge increases. The Internet
itself was founded and grew because scientists wanted to share information.
Gradually, the rest of us got in on the act.
Netiquette
Rule 7: Help keep flame wars under control
"Flaming" is what people do when they express a strongly held
opinion without holding back any emotion. It's the kind of
message that makes people respond, "Oh come on, tell us how
you really feel." Tact is not its objective.
Does Netiquette forbid flaming? Not at all. Flaming is a long-
standing network tradition (and Netiquette never messes with
tradition). Flames can be lots of fun, both to write and to read.
And the recipients of flames sometimes deserve the heat.
Rule 8: Respect other people's privacy
Of course, you'd never dream of going through your
colleagues' desk drawers. So naturally you wouldn't read their
email either.
Netiquette
Rule 9: Don't abuse your power
Some people in cyberspace have more power than others. There are wizards
in MUDs (multi-user dungeons), experts in every office, and system
administrators in every system.
Knowing more than others, or having more power than they do, does not give
you the right to take advantage of them. For example, sysadmins should never
read private email.
Rule 10: Be forgiving of other people's mistakes
Everyone was a network newbie once. And not everyone has had the benefit
of reading this book. So when someone makes a mistake -- whether it's a
spelling error or a spelling flame, a stupid question or an unnecessarily long
answer -- be kind about it. If it's a minor error, you may not need to say
anything. Even if you feel strongly about it, think twice before reacting. Having
good manners yourself doesn't give you license to correct everyone else.
http://www.albion.com/netiquette/corerules.html
TEN COMMANDMENTS OF
COMPUTER ETHICS
1. Thou shalt not use a computer to harm other people: If it is unethical to harm people by
making a bomb, for example, it is equally bad to write a program that handles the timing
of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people’s books
and notebooks, it is equally bad to access and destroy their files.
2. Thou shalt not interfere with other people's computer work: Computer viruses are small
programs that disrupt other people’s computer work by destroying their files, taking huge
amounts of computer time or memory, or by simply displaying annoying messages.
Generating and consciously spreading computer viruses is unethical.
3. Thou shalt not snoop around in other people's files: Reading other people’s e-mail
messages is as bad as opening and reading their letters: This is invading their privacy.
Obtaining other people’s non-public files should be judged the same way as breaking into
their rooms and stealing their documents. Text documents on the Internet may be protected
by encryption.
4. Thou shalt not use a computer to steal: Using a computer to break into the accounts of a
company or a bank and transferring money should be judged the same way as robbery. It is
illegal and there are strict laws against it.
5. Thou shalt not use a computer to bear false witness: The Internet can spread untruth as
fast as it can spread truth. Putting out false "information" to the world is bad. For instance,
spreading false rumors about a person or false propaganda about historical events is
wrong.
TEN COMMANDMENTS OF
COMPUTER ETHICS
6. Thou shalt not use or copy software for which you have not paid: Software is an intellectual product. In
that way, it is like a book: Obtaining illegal copies of copyrighted software is as bad as photocopying a
copyrighted book. There are laws against both. Information about the copyright owner can be embedded by a
process called watermarking into pictures in the digital format.
7. Thou shalt not use other people's computer resources without authorization: Multiuser systems use user id’s
and passwords to enforce their memory and time allocations, and to safeguard information. You should not try
to bypass this authorization system. Hacking a system to break and bypass the authorization is unethical.
8. Thou shalt not appropriate other people's intellectual output: For example, the programs you write for the
projects assigned in this course are your own intellectual output. Copying somebody else’s program without
proper authorization is software piracy and is unethical. Intellectual property is a form of ownership, and may
be protected by copyright laws.
9. Thou shalt think about the social consequences of the program you write: You have to think about
computer issues in a more general social framework: Can the program you write be used in a way that is
harmful to society? For example, if you are working for an animation house, and are producing animated films
for children, you are responsible for their contents. Do the animations include scenes that can be harmful to
children? In the United States, the Communications Decency Act was an attempt by lawmakers to ban certain
types of content from Internet websites to protect young children from harmful material. That law was struck
down because it violated the free speech principles in that country's constitution. The discussion, of course, is
going on.
10. Thou shalt use a computer in ways that show consideration and respect: Just like public buses or banks,
people using computer communications systems may find themselves in situations where there is some form of
queuing and you have to wait for your turn and generally be nice to other people in the environment. The fact
that you cannot see the people you are interacting with does not mean that you can be rude to them.
http://www.ccsr.cms.dmu.ac.uk/resources/professionalism/codes/cei_command_com.html