This document discusses ethics and privacy issues related to computers and technology. It addresses several topics: intellectual property and software piracy, automated invaders like viruses and worms, human invaders called hackers, and protecting data from theft while balancing freedom of information. The future of ethics and privacy poses challenges as technology improves and more personal data is collected and stored.
2. Ethics and Privacy Is anything private anymore? Automated invaders. Virus protection, detection, and disinfection. Human invaders. Intellectual property. The future of ethics and privacy.
3. Ethics and Privacy Intellectual property is ideas put into action, such as writing, music, art, computer code, and inventions that can be protected under copyright or patent laws. Many people are victimized by the ability of organizations, corporations, the government, and private citizens to access, store, and retrieve vast amounts of information on individuals in databases. This power over computerized information brings up ethical questions and responsibilities for all computer users.
4. Ethics and Privacy Ethical questions deal with moral principles and values. Is it ethical for individuals, companies, or the government to store personal data about individuals without the individual knowing about it? We know when we have been physically robbed, but we may not know that someone has gained access to our private information.
9. Ethics and Privacy Antivirus and virus disinfectant programs are used to protect your data from automated invaders. An antivirus program checks each floppy disk automatically as it is inserted into the disk drive and scans all data from telecommunications devices. A virus disinfectant program uncovers viruses lurking on your hard drive.
10. Ethics and Privacy Human invaders are called hackers. “Hacker” originally meant a person who was absorbed with computers. Today a hacker is one who secretly gains access to others’ computer files without permission.
11. Ethics and Privacy Hackers are usually between the ages of 12-25, and they take pride in finding phone numbers and then cracking the security codes that allow access into the network. Often no real damage is done, and most computer crime, such as theft of electronic funds and the stealing of confidential data, are committed by insiders, at the cost of billions of dollars per year.
12. Ethics and Privacy When can property be stolen from someone without his or her knowledge? With the theft of intellectual property, the original owner can still be in possession of the original property and have no knowledge that a theft has occurred. Software code is intellectual property. When software code is stolen, a copy is made the rightful owner still has the original. To protect software against unwanted or illegal duplication by writing computer code within the programs that prevents simple copying is called copy protect.
13. Ethics and Privacy Why is intellectual property so easy to steal? First it can be done in the privacy of one’s home, etiher by copying a friend’s program disk or by going into an illicit bulletin board and downloading a copy of a pirated program. Secondly, the theft itself may only take a few seconds-and the hacker is neither seen nor heard. Often people unwittingly steal intellectual property because they are unfamiliar with copyright laws. The unauthorized copying and use of a computer program is called software piracy.
14. Ethics and Privacy “Site licenses” grant the user the right to make a specified number of copies of a software program for use on multiple computers. At Young we have site licenses for our software. The Copyright Act of 1976 allows the user to make a backup copy of copyrighted software for his or her personal use, but makes it illegal for the user to make and distribute copies.
15. Ethics and Privacy There are four types of software: Commercial software (Copyrighted software available for purchase) Freeware (Copyrighted software that is given away free of charge but is still the property of the owner and the user doesn’t have the right to distribute copies.) Shareware (Copyrighted software that is distributed free of charge on a trial basis.) A nominal fee is charged if the user decides to keep it. Public Domain Software (Software donated for public use that can be freely copied and distributed.)
16. Ethics and Privacy Providing protection against the theft of intellectual property puts the government in a precarious position. There are trade-offs between regulating access to data and building a democracy based on freedom of information. As technology improves, we are provided with not only greater convenience but also with ethical choices involved in implementing that technology.
17. Ethics and Privacy Presented by Click here to learn more about ethics in computing