Hello I'm your instructor for this module on computer ethics and policies after viewing and understanding this lecture the learner should be able to define ethics know the history of computer ethics differentiate between computer ethics and cyber ethics understand.
What is considered to be an unethical behavior for a student or a teacher know the security issues associated to personal information on public computers understand safety measures for ethics define acceptable user policy define security policy and know the various factors which contribute to effective security policies the general.
Definition of word ethics define the elements important to humans morals if it could be referred to as specific values standards rules and agreements computer ethics are a set of moral principles that governs an individual or a group on what is acceptable behavior while using a computer one of the common ethic missed by many among computer ethics is violation of copyright issues duplicating the copyrighted contents without the author's approval accessing personal information of others are some of the example that call it's ethical principles now let us have a discussion on history of computer ethics computer ethics is a concept that is growing larger every day with new advanced technology computer ethics first came about in 1970s.
As computers were becoming integrated into homes computers today are used in homes and schools and in almost every company this field has taken ethics to a whole new level especially due to the privacy issues found throughout various businesses this form of ethics is also now offered as a course to study at many universities around the world computer ethics include the various physiological aspects of ethics as well as the cyclone and sociological interpretations.
When the field was first discovered in 1970s applied ethics was used to describe the new concept at that time there was much controversy to what computers would bring to the society some thought that computers would create more ethical issues whereas other thought it would our so-called twist on old ethics in the 1980s the computer was thought to be the closest object to a universal tool available to individuals in essence the integration of the computer into everyday society was not easy the generation of computer was new as well as exciting but nobody had used it before including businesses and individuals there would have to be some form of ethical guidelines to using these new products that nobody had much experience with nowadays computer ethics cover a wide variety of topics such as computers in the workplace Computer Crime Professional Responsibility and privacy and anonymity do you know what is considered as an unethical behavior for students and teachers let us discuss some of them in details.
I'll start with the first one that is digital plagiarism plagiarism is one of the major forms of academic dishonesty which has always existed in education including higher education for example assignments submitted by students may turn out to be copied from fellow students or could be taken over in part or in whole from existing published works the use of computers and internet added to the means that students have at their disposal to commit plagiarism however they make it much easier to do and much harder to detect the second act which is considered to be an unethical behavior is breaking copyright and software pepp throughout the society it is well known that the illegal copying of copyrighted media such as text music works movies and software programs is widespread moreover many people.
Who engage in such activity do not consider themselves to be doing something that is immoral this is certainly true for college students and this attitude of students seems to match developments in the current information age in which the internet increasingly functions as the most important information medium that people use the third unethical app is improper use of computer resources students and staff may have authorized access to computer.
Resources but then go on to use these resources improperly they may have a school or library internet account or they may use computer system computer network or computer software that is owned by the institution or they may use computerized services offered by the institution and do so in a way that does not meet the institution's standards of proper use of that particular resource for example students may use their student account to run their own internet businesses may open up a popular web site or service that generates much traffic download mp3 files staff members may use their institution server or computer system to download view or store content that is either illegal or against the school's policy or may spread computer viruses or worms so we have discussed some of the acts that are considered to be unethical use of computing resources now let us have some discussion on securing information privacy and confidentiality let us start with security issues.
Associated to personal information on public computers while using publicly accessible computers students or staff may unknowingly leave personal information on the public users such as cached web pages and cookies that are then available for inspection by others second issue is file sharing the computers that are used by student or faculty may contain software that allow files from computers accessible to other users on the campus network or outside without knowledge of the owner or they may allow files to be stored on a central server that are then accessible to others without their permission this could allow strangers to read these files that may contain personal information the third issue is school web pages and bulletin boards web pages maintained by the school by faculty or by students may contain personal information that may access the privacy of others likewise posting and reposting on bulletin boards or in other electronic forums may contain personal information of third parties for which no authorization has been given one should always remember the 10 rules of computer ethics number one is one should not use a computer to harm other people the second one is one should not interfere with others computer work number three is one should not snoop around in others computer files number four days.
One should not use a computer to steal the fifth one is one should not use a computer to bear false witness the sixth one is one should not copy or use proprietary software for which one have not paid the seventh one is one should not use others computer resources without authorization or proper compensation the eighth one is one should not appropriate others intellectual output the ninth one is one should think about the social consequences of the program returns and the tenth one is one should always use a computer in ways that ensure consideration and respect for one's fellow humans some of the rules that the individuals should follow while using a computer are the first one is do not use computer to harm other users do not use computers to steal others information do not access files without the permission of the owner [Music] [Music] do not copy copyrighted software without the author's permission always respect copyright laws and policy respect the privacy of others just as you expect the same from others do not use other users computer resources without their permission use internet ethically complain about illegal communication and activities the found two internet service providers and local law enforcement authorities users are responsible for safeguarding their user ID in passwords they should not write them on paper or anywhere else for remembrance users should not intentionally use the computers to retrieve or modify the information of others which may include password informations files etcetera now let us discuss some of the internet ethics internet ethics means an acceptable behavior for using internet this should be honest respect the rights and property of others on the Internet acceptance World Wide Web is not a waste while web it's place where values are considered in a broadest sense we must take care while shaping contents and services and we should recognize that Internet is not apart from universal society but it is a primary component of it sensitivity to national and local cultures it belongs to all and there is no barrier of national and local cultures it cannot be subject to one set of values like local TV channel.
A local newspaper and we have to accommodate multiplicity of uses precautions while using email and chatting Internet must be used for communication with family and friends we should not use the internet chatting for communicating with strangers and should not forward the emails from strangers and we must be children on risk involved by chatting or forwarding emails to strangers pretending to be someone else we must not use the Internet to pretend as someone else and fool others we must be children that fooling others and hiding your own identity is a crime avoid bad language we must not use rude or bad language while using email chatting blogging and social networking we need to respect their views and should not entice eyes anyone on the Internet and the same should be taught to the children's high personal information we should teach children not to give personal details like home address phone numbers interests passwords to anyone no photographs should be sent to strangers and this should be taught to hide personal details from strangers because it might be misused and shared with others without their knowledge while downloading Internet is used to learn about music video and games by listening to it and learning how to play games we must not use it for downloading them or share the copyrighted material same should be taught to children's and they must be aware about the importance of copyrights and issues of copyright supervision you should know.
What children's are doing on the Internet and the sites they are visiting on the Internet and should check with whom they are communicating look over their shoulders and restrict them browsing inappropriate sites parental involvement while a child is using the internet helps the children to follow computer ethics encourage children's to use Internet we must encourage children students and others to gain the knowledge from the Internet and use it wisely Internet is a great tool where one can gather information which can be used for learning access to Internet the Internet is a time efficient tool for everyone that enlarges the possibilities for curriculum growth learning depends on the ability to find relevant and reliable information quickly and is and to select understand and assess that information searching for information on the Internet can help to develop these skills since many sites adopt particular views about issues the Internet is a useful tool for developing the skills of distinguishing facts from opinion and exploring.
Subjectivity and objectivity now let us discuss what is cyber ethics cyber ethics is a code of behavior for moral legal and social issues on the Internet or cyber technology cyber ethics also includes obeying laws that applies to online behavior by practicing cyber ethics one can have a safer and enjoyable internet experience cyber bullying is the use of information technology to repeatedly harm or harass other people in a deliberate manner with the increasing use of these technologies cyber bullying has become increasingly common especially among teenagers cyber technology referred to a wide range of computing and communications devices from individual computers to connected devices and communication technologies cyber ethics suggest the study of ethical issues limited to computing machines or to computing professionals it is more accurate than Internet ethics which is limited only to ethical issues affecting computer networks cyber safety cyber safety addresses the ability to act in a safe and responsible manner on the internet and other connected environments.
These behaviors protect personal information and reputation and improved safe practices to minimize danger from behavioral-based rather than hardware or software based problems cyber security cyber security covers physical protection of personal information and Technology resources from unauthorized access gained via technology safety measures for ethics there are four effective approaches who want to ensure they are doing the right thing online the first one is have a basic understanding of the technology second one is participate with your child online third one is determined what standards have been established for any school computer use create a set of rules along with your child relating to both ethics and safety as per the importance of information technology and given the possibilities of unethical use of this technology by students and faculty student schools universities and colleges should ensure that they have policies regarding the use and management of information technology by students and staff several ethical codes dealing the technology used exist and many schools have adopted acceptable uses policy that includes rules for the proper use of information technology teachers students and parents need to know and understand these ethical codes for children's the major issues surrounding technology ethics can be categorized into three areas privacy property and appropriate use schools related cases can be found in each of these areas.
Teachers need to develop learning objectives and activities that specifically address technology ethics proper use need to be taught at the same time that other computer skills are taught students understanding of ethical concepts need to be assessed technology use privileges especially those involving online news should not be given to student until the assessment shows that a student knows and can apply ethical standards and institutional policies in institutions one should have an acceptable user policy an acceptable user policy that describes the use of internet and other information technologies and network in an institution the rules in these policies often apply to both staff and students everyone in the institutions as well as parents need to know and understand these policies an acceptable user policy may contain not using the service as part of violent in any law not attempting to break the security of any computer network or user not posting commercial messages to institutional groups without prior permission not attempting to send junk email or spam to anyone who don't want to receive it not attempting to mail bomb aside with mass amounts of email in order to flood their server do not use computer technology to cause interference with other users work do not use computer technology to steal information organizations are becoming increasingly sophisticated in the way in which they organize and use information technology they are spending too much on IT just to take benefits from the latest technologies and to boost their businesses and grow leaps and bounds we can see it around us in real time now for booking a cab we rarely have to tell that cab driver our pickup address manually app detects it automatically most of the providers use location-based system or GPS to track the user and set the address as a pickup location it is just matter of minutes that booked cab arrived at your place people have never thought of these ten years ago even organizations are using technology this much still most of the organization are not having dedicated budget for security as they don't see any direct return on investment.
Once organization goes through major attack then they start thinking about security and start spending budget on security things as a part of company people should be aware of their security responsibilities for proper security in organization people process and technology should be focused area of improvement in these days employees are most targeted because they are easily exploitable now one question may in your mind where to start insecurity if organization want to secure their asset so what should be the starting point of that particular organization yes you are right there should be some policy document which should be followed and in this document it should also be mentioned that what will happen if this particular document is not followed now let us start with defining policy first policies are high-level document to represent corporate philosophy of that particular organization policies are kept more clear and concise to keep them effective basic elements of a policy are purpose scope responsibility and compliance policies are set up with the objectives of reduced risk compliance with law in regulation and assurance of operational continuity information integrity and confidentiality policies are also known to be the first layer of difference policies are important difference document for internal audits and for resolution of legal disputes about management's due diligence security policy is the statement of responsible decision makers about the protection mechanism of a company.
Crucial physical and information assets overall it is a document that describes a company's security controls and activities for an organization it addresses the constraints on behavior of its members as well as constraints imposed on adversities by mechanism such as doors locks keys and walls for system the security policy address constraints on functions and flow among them constraint on access by external systems and adversities including programs and access to the data by people the success of an information resources.
Protection program depends on the policies and on the attitude of the management towards securing information on system in order to produce a complete information security policy management must be three types of information security policy number one is enterprise information security program policy number two is issue specific information security policy and the third is systems specific information security policies in enterprise information security program policy management establishes how a security program will be set up lays out the program's goal assigned responsibilities shows the strategic and tactical value of security and outlines how enforcement should be carried out and also provides scope and direction for all future security activities within the organization.
This policy must address relative laws regulations and liability issues and how they are to be satisfied it also describes the amount of risk senior management is willing to accept issue specific information security policies addresses specific security issues that management fields need more detail explanation and attention to make sure a comprehensive structure is built and all employees understand how they are to comply with these security issues for example an email policy might state that management can read any employees email messages that reside on the mail server but not when they reside on user's work station system specific information security policy presents the management's decision that are specific to the actual computers networks applications and data this type of policy may provide an approved software list.
Which contains a list of applications that may be installed on individual workstations for example this policy may describe how databases are to be used and protected how computers are to be locked down and how firewalls ideas and scanners are to be employed for making policy there are many factors which contributes the first important factor is gold gold addresses the important concerns light as the issue being adequately defined and properly framed how will the policy achieve the high level policy goals of the department and the government as a whole the next important factor is ideas idea addresses the important concern light as the policy process being informed by evidence that is high-quality and up-to-date as the account being taken of evaluation of previous policies has there been an opportunity or license for innovative thinking have policy makers sought out and analyzed ideas and experience from the front line.
Overseas and devoted administrations the next important factor is design design addresses the important concerns like have policy makers rigorously tested or assess whether the policy design is realistic involving implementer and the end users have the policy makers addressed common implementation problems is the design resilient to adaptation by implementer another important factor is external engagement and it addresses the important concerns like have those affected by the policy being engaged in the process have policy makers identified and responded reasonably to their views next is appraisal it is concerned about the important issues like have the options being robustly assessed are the cost effective over the appropriate time horn are the resonant to changes in the external environment have the risk being identified and rated fairly against potential benefits next is rules and account abilities it is concerned about important issues like have policymakers just the appropriate level of government enrollment is it clear who is responsible for what who will hold them to account and how next is feedback and evaluation it is concerned about important issues like is there a realistic plan for obtaining timely feedback and how the policy is being realized in practice does the policy allow for effective evaluation even if government is not doing it last but not the least is the policy is read by the targeted staff or the audience policies are only useful.
If the people for whom it's targeted read those policies it's effective when people read the policies and understood those policies people should be agreed to the formulated policies then only they will be effective as in this dynamic environment upon the need policies should be updated from time to time if required to make them effective so in this lecture we have discussed about computer and cyber ethics and security policies I hope these concepts are clear in your mind now thank you you.
Monday, December 16, 2019
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment