- https://en.wikipedia.org/wiki/Computer_ethics
- The branch of philosophy
- Addresses issues of human action from the perspective of their moral goodness or wrongness
- Since no one owns, some interest groups's policies conflict.
- The Internet forces information overload. We do not know what to believe.
- Businesses monitor our shopping behavior on their website and use that data for advertising products to us, which are often annoying to users.
- On top of that, some businesses may misuse our personal information for different purposes, which I think is unethical.
- Surveillance system.
- Personal data leaking.
- One person leaking top-secret information, can damage the nation's diplomacy and national security.
- If someone steals my UDC student ID, the thief will be able to misuse my identity for purchasing UDC services.
- A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004 (2001)
- People do not honor intellectual property laws seriously, copying and sharing from the Internet and disregard the existence of copyright.
- Hacking to harm or threaten others.
- Spreading malware.
- Offshoring. Remotely hiring workers from overseas for cheaper wages.
- Workers surfing the Internet during their work time.
- Lack of netiquette may cause misunderstanding.
- Some people make hate speech taking advantage of anonymity.
- privacy vs. access to information
- privacy vs. law enforcement
- freedom of speech vs. control of content on the Net
- pros and cons of offshoring jobs
- market-based vs. regulatory solutions
- Increasing security vs. reducing convenience
- Perfection is a direction, not an option.
- There is a difference between personal choices, business policies, and law.
- Study of what it means to “do the right thing”.
- Assumes people are rational and make free choices.
- Rules to follow in our interactions and our actions that affect others.
Human behavior and real human situations are complex. There are often trade-offs to consider. Ethical theories help to identify important principles or guidelines.
Deontological theories
- the normative ethical position that judges the morality of an action based on the action's adherence to a rule or rules.
Utilitarianism
- the doctrine that actions are right if they are useful or for the benefit of a majority.
natural rights
- natural rights definition. Rights that people supposedly have under natural law. The Declaration of Independence of the United States lists life, liberty, and the pursuit of happiness as natural rights.
Negative rights (liberties)
- The right to act without interference
Positive rights (claim-rights)
- An obligation of some people to provide certain things for others
Golden rules
- Treat others as you would want them to treat you.
Contributing to society
- Doing one’s work honestly, responsibly, ethically, creatively, and well is virtuous.
Social contracts and a theory of political justice
- People willingly submit to a common law in order to live in a civil society.
- Not all thoughtful people, or even all trained philosophers, will always come to the same conclusion as a result of an ethical analysis.
- Technological change in hardware and software proceeds at a very rapid pace, but theprinciples for deciding about the morality of what humans do have not changed over time
- Law - reactive rather than proactive
-
Rights and duties
- Observing right of others and following duties imposed by rights
-
Utilitarianism
- Whether an act produces the greatest happiness for the greatest number
-
Fairness and justice
- Whether a society distributes benefits and burdens in a just manner
- Useful for individuals or groups concerned about doing the right thing
- Usually, but not always, agree with the results of legal analysis
- Producer has a right to get reimbursed.
- Telemedicine
- Artificial intelligence
- Digital divide
- The gap between demographics and regions that have access to modern information and communications technology, and those that don't or have restricted access.
- Include the telephone, television, personal computers and the Internet.
- Defending your rights in the digital world
- The Association for Computing Machinery (ACM) is an international learned society for computing. It was founded in 1947 and is the world's largest[2] scientific and educational computing society.
There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.
- Chemical Sector
- Commercial Facilities Sector
- Communications Sector
- Critical Manufacturing Sector
- Dams Sector
- Defense Industrial Base Sector
- Emergency Services Sector
- Energy Sector
- Financial Services Sector
- Food and Agriculture Sector
- Government Facilities Sector
- Healthcare and Public Health Sector
- Information Technology Sector
- Nuclear Reactors, Materials, and Waste Sector
- Transportation Systems Sector
- Water and Wastewater Systems Sector
https://en.wikipedia.org/wiki/Critical_infrastructure
-
Politically motivated hacking operations intended to cause grave harm—that is, resulting in either loss of life or severe economic loss, or both is called ________________
-
Actions intended to protect, exploit, corrupt, deny, or destroy information or information resources in order to achieve a significant advantage, objective, or victory over an adversary is called __________
-
A method used by phishers to deceive users into believing that they are communicating with a legitimate Web site is called _________ Ans. Pharming
-
An attack in which one user takes up so much of a shared resource that none of the resource is left for other users is called _____________ Ans. Denial of service attack
-
Sending unsolicited commercial e-mail advertising for products, services, and Web sites is called __________ Ans. Spam
-
A high-tech scam that frequently uses spam or pop-up messages to deceive people into disclosing their credit card numbers, bank account information, Social Security numbers, passwords, or other sensitive information is called ______________ Ans. Phishing
-
Creating a fraudulent Web site to mimic an actual, well-known Web site run by another party is called ____________ Ans. Spoofing