Lecture Note Professional practices in infrmation technology - Lecture No. 5: Cyberethics

docx
Số trang Lecture Note Professional practices in infrmation technology - Lecture No. 5: Cyberethics 4 Cỡ tệp Lecture Note Professional practices in infrmation technology - Lecture No. 5: Cyberethics 152 KB Lượt tải Lecture Note Professional practices in infrmation technology - Lecture No. 5: Cyberethics 0 Lượt đọc Lecture Note Professional practices in infrmation technology - Lecture No. 5: Cyberethics 1
Đánh giá Lecture Note Professional practices in infrmation technology - Lecture No. 5: Cyberethics
4.9 ( 11 lượt)
Nhấn vào bên dưới để tải tài liệu
Để tải xuống xem đầy đủ hãy nhấn vào bên trên
Chủ đề liên quan

Nội dung

Professional Practices in Information Technology CSC 110 ProfessionalPracticesi n Information Technology HandBook COMSATS Institute of Information Technology (Virtual Campus) Islamabad, Pakistan Professional Practices in Information Technology CSC 110 Lecture 5 Cyber Ethics 5.1 What Is Cyber ethics? Cyber ethics is the study of moral, legal, and social issues involving cyber technology. It examines the impact that cyber technology has for our social, legal, and moral systems. It also evaluates the social policies and laws that have been framed in response to issues generated by the development and use of cyber technology. Hence, there is a reciprocal relationship here.  What Is Cyber technology? Cyber technology refers to a wide range of computing and communications devices – from standalone computers, to "connected" or networked computing and communications technologies, to the Internet itself. Cyber technologies include: hand-held devices (such as Palm Pilots), personal computers (desktops and laptops), mainframe computers, and so forth. Networked devices can be connected directly to the Internet.They also can be connected to other devices through one or more privately owned computer networks.Privately owned networks include both Local Area Networks (LANs) and Wide Area Networks (WANs).  Why the term cyber ethics? Cyber ethics is a more accurate label than computer ethics, which might suggest the study of ethical issues limited to computing machines, or to computing professionals. It is more accurate than Internet ethics, which is limited only to ethical issues affecting computer networks. Professional Practices in Information Technology CSC 110 Table 1-1: Summary of Four Phases of Cyber ethics 5.2 Are Cyber ethics Issues Unique? Consider the Amy Boyer case of cyber stalking in light of issues raised. Is there anything new or unique about this case from an ethical point of view? Boyer was stalked in ways that were not possible before cyber technology. But do new ethical issues arise? Two points of view: Traditionalists argue that nothing is new – crime is crime, and murder is murder. Uniqueness Proponents argue that cyber technology has introduced (at least some) new and unique ethical issues that could not have existed before computers. Both sides seem correct on some claims, and both seem to be wrong on others. Traditionalists underestimate the role that issues of scale and scope that apply because of the impact of computer technology. Professional Practices in Information Technology CSC 110 Cyber stalkers can stalk multiple victims simultaneously (scale) and globally (because of the scope or reach of the Internet). They also can operate without ever having to leave the comfort of their homes. Uniqueness proponents tend to overstate the effect that cyber technology has on ethics per se. Maner (1996) argues that computers are uniquely fast, uniquely malleable; etc. There may indeed be some unique aspects of computer technology.But uniqueness proponents tend to confuse unique features of technology with unique ethical issues.They use the following logical fallacy: – Cyber technology has some unique technological features. – Cyber technology generates ethical issues. – Therefore, the ethical issues generated by cyber technology must be unique. Traditionalists and uniqueness proponents are each partly correct.Traditionalists correctly point out that no new ethical issues have been introduced by computers.Uniqueness proponents are correct in that cyber technology has complicated our analysis of traditional ethical issues. So we must distinguish between: (a) Unique technological features (b) Any (alleged) unique ethical issues Two scenarios from the text: – (a) Computer professionals designing and coding a controversial computer system – (b) Software piracy
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.