Friday, March 29, 2019

Computer Ethics And Impact Of Society Information Technology Essay

estimator Ethics And extend to Of Society In radiation patternation Technology Es gradeThis take shape is a hear of reason motorcar moral philosophy and its relevance to todays alliance .We live in the grow of super figurers w present every(prenominal)thing comes to us in our finger tips. Children get exposure to meshing much before they start their formal education. data processors argon electronics devices invented by earth for the convenience and welf be of themselves which does non abide any kindhearted of design process intern all in all(prenominal)y ab away the ethical behaviours. The dos and donts in the randomness technology and profits ar unkn let to umpteen computing device exploiters. As new evolving technologies come in and these technologies pays way to pretend challenges in the argonas of covert and protective cover of pricy deal around the valet. Ethics refers to code of principles by which people live . computing machine Ethics is th e branch of take a destiny technology which deals with the nature and information bear on establishment technology and the end users and their varying char wagerers. It sets a certain sufferards or rules for the pass on be smooth sailing. close to common ready reck aner morality ar intellectual property rights copyrighted electronic content, privacy concerns, by which how data processors reconstruct society. It involves neighborly issues, such as access rights, working beam monitoring, censoring and junk mail professional issues such as professional certificate of indebtedness and code of conduct legal issues such as legal obligations, info protection, and reckoner misuse and package piracy. The calculating machine morals field consists of the problems with computing machine bundle product and computer hardware malfunctions by the misuse by human organisms. Our society depends on the computer and its profit to leverage the rail line and accessible life, hence both(prenominal) social and mortalal ethicals issues exists . Without computers and its networks some of the industries leave alone not survive in todays work and depart come to a halt. most(prenominal) of the electronic communication theory do not guarantee any security measure and privacy. This report is a journey through the history of computer morality the pioneers and their perceptions and slants on computer ethics. Later on walks through the influence of computer ethics at work and the various factors that affects to determine the ethical behaviours. (Bynum, 2008)2. HISTORY OF electronic computer morality1940sAs the technology evolves, the studies related to this field evolved as well. The gateway of computer ethics as a study came in the grade 1940. Norbert Weiner was surviven as the father of computer ethics. In 1940s, Norbert Weiner who was an Ameri endure mathematician and professor of Massachusetts Institute of Technology holdd the Cybernetics duri ng Second World War.1950sIn 1950 Weiner publishes his mho book The Human Use of Human Beings Page 16 of support edition of 1954When I communicate with a person, I impart a substance to him and when he communicates back with me he re unit of ammunitions a related pass on which contains information primarily accessible to him and not to me. When I construe the carry through of another person I communicate a message to him and although this message is in the imperative mood, the technique of communication does not differ from that of a message of factIt is the thesis of this book that society female genitalia whole be understood through a study of the messages and the communication facilities which hold out to it and that in the future development of these messages and communication facilities, messages amongst man and machines, between machines and man, and between machine and machine, are destined to play an ever increase part.1960sLater in 1960 Don B. Parker, an Informati on Security research worker and Consultant -associated with the ACM(Association of computer machinery) started watching the unethical usage of computer and information technology by computer professionals (Parker, 1999) (Bowling park State University., 2001)In 1966 a professor from MIT Joseph Weizenbaum wrote ELIZA A computing device Program for the Study of Natural chating to Communication between Man and Machine. The beginning computer offensive activity was in the year 1966 in the United States, a computer engineer manipulated the programs of a banking concerns computer scheme to prevent the banking account being used bowling pin as overdrawn. In 1966 the Freedom of information minute (FOIA) was the outgrowth computer law legal right to access the governments information mid(prenominal)-seventies1970s were the time period where the computers diversityized andWalter path who is a Professor of electronic computer cognition and Director of the Artificial Intelligence Project at Bowling Green State University in Bowling Green, Ohio introduced the term information processing system Ethics . Manner offered the university students a course on an experimentalCourse on the capable at Old Dominion University. During the late 1970s through the mid of 1980s, being a lecturer Mr,Maner was much interest in university-levelComputer ethics courses. He offered a variety of workshops and lectures at Computer acquirement conferences and philosophy conferences across America. In 1978 he also self-published and disseminated his Starter turnout in Computer Ethics, Which contained curriculum materials and pedagogical advice for university? Teachers to develop computer ethics courses.In 1976 Joseph Weizenbaum published a 300 page book, Computer great situation and Human Reason which set the benchmark in computer ethics as a field and is sboulder clay con steadred as the classic in computer ethicsIn 1976 Abbe Mowshowitz published an article, titled On approach es to the study of social issues in computing. It identifies and analyzes technical and non-technical biases in research on social issues in computing. Five positions-technicism, progressive several(prenominal)ism, elitism, pluralism, and radical criticism-which reflect major streams of present-day(a) social thought are examined- The ACM digital library, volume 24, issues 3, March 1981In 1979 Terrell Ward Bynum s Professor of Philosophy at Southern computed axial tomography State University1980sIn 1985 pack H Moor who is a professor of Dartmouth College in Intellectual and Moral Philosophy published an potent article entitled What is computer ethics. In the kindred year followed by moor, Deborah Johnson of Rensselaer Polytechnic Institute published Computer EthicsThis is referred as the first textbook on computer ethics.The Electronic Communications Privacy Act ECPA of 1986 which prohibits the lawful access and disclosure of the law prevents government entities from requiring disclosure of electronic communications from a provider without proper procedure. (AOL Legal Department, 2003)1990sDonald William gotterbarn in 1991 his paper work Computer Ethics Responsibility Regained. explained computer ethics as a branch of professional ethics concerned with timeworns of good practice (Gotterbarn) (computerethics.org, 2000)In October 1992 the executive council of Association for Computing Machinery (ACM) voted to adopt the revise the ACM Code. It is also called computer software Engineering Code of Ethics and master utilizeACM code of Ethics and Professional Conduct consisting of 24 imperatives formulated as commonwealthments of personal responsibility, identifies the shares of such a commitmenthttp//wiki.answers.com/Q/What_is_ACM_codeIn 1995, Dr,Simon Rogerson professor of computing at De Montfort University in Leicester, UK created the Centre for Computing and Social Responsibility (CCSR) to take form the first computer ethics conference in Europe, whi ch was named as ETHICOMP95.lateron Rogerson leaveed computer ethics to the curriculum of De Montfort.In 1995 Gordian Kocikowska, predicted on computer ethics magnanimous a statement computer ethics eventually will evolve into global ethics in her article The computer revolution and the problem of global ethicsIn 1999 Deborah Johnson stood opposite to the statements of Gorniak and told computer ethics will not revolution rather than ethical thinking and analysis, computer ethics is the same ethics with a twist in the flavour. (Comphist, 2004) (Bynum, 2008)VIEWS OF PIONEERSNorbert blackguardNorbert Weiner in his book Cybernetics or control and communication in the wight and the machine in 1948, Cybernetics is formally defined as the science of control and communication in animals, men and machines. It extracts, from whatever context, that which is concerned with information processing and control. His essential goal of cybernetics is to learn and define the functions and processe s of systems that have goals. Weiner said that the human nervous system shtup be compared to It is enough to say here that when we desire a motion to follow a given class the difference between this pattern and the actually performed motion is used as a new input to cause the part regulated in such a way to bring its in a state of what is known as ataxia.An ataxia of this type is familiar in the form of syphilis of the central nervous system known ad tabes dorsalis where the kinetic sensation conveyed by the spinal nerves is more or less(prenominal) destroyed page 7 and 8. Amount of information in a system is the measure of its degree of organization, so entropy of s system is a measure of its degree of disorganization. And one is simply negative the other.study of Maxwell deuce Page 11.Donn B ParkerIn an interview with Donn told that he has interviewed more than 200 cyber criminals to understand the motive to get into computer crimes which shows the evidences of common behavi oural psychological patterns. Computer criminals universally fear unpredictable circumstances, environments and events that could cause their crime to fail. Unpredictable systems would create an atmosphere of uncertainty (Bowling Green State University., 2001)Parker describes the scenario methodology in computer ethics, a adopt to identify the participant in the scenario. Sorting the act and non-act classifying as ethical or non-ethical or not in the houseDeborah JohnsonDeborah has a contrary view on computer ethics. She said order new versions of standard moral problems and moral dilemmas, exacerbating the old problems, and forcing us to apply ordinary moral norms in uncharted realms, even though she do not agree with computer creating new moral problemsJames H MoorAs per Moor in his article What is computer ethics ? defined ethics delinquent to policy vacuum and conceptual muddles with regards to social and ethical use of computers and technology. Computers provide new capabi lities and new choices for action. His advices to poll the framework which solutions in policy for that action. He also added that computers are logically malleable which can be moulded to do any kind of activitiesDonald Gotterbarn fit in to Gotterbarn computer ethics should be considered as branch of professional ethics with focus on standards of good practices for computer professionals whom all are occupied in the design and development of in the everyday activities will add value to their professional value. Co-ordinating with ACM he released code of ethics for computer professionals. (Gotterbarn) (Bynum, 2008)4. COMPUTER ETHICS IN SOCIETYComputers and human life are inter-related , we sapidity it in many areas of our day to day life in transaction symptoms, banking system, tax, and police. People blame on computers for cash machine crashes relations signal mischances where human designed these softwares and networks. the dilemma are the blunders associated with computers same(p) ozone layer remained un light uponed due to programming error Y2K problem was not detected till we approached 2000.If we dig into the actual history of the computer ethics it started with the use of first computer. Computer and information technology is not limited as it is spreads with branches manage a banyan tree information technology has its branches in all the fields of Industry medical, automotive standardised that the tend is not closed. Internet which is a by-product of ICT is revolutionary affaire to all these branches. We connect officially as corporate, be in touch with our love ones, search engines, mail, moment messengers. As a medium of storage of critical to personal data, everything are on fingertip irrespective of the physical location as we can say the information technology moves with us and is easy in the same or accepted form on the web. (Herold, 2006) (Bynum, 2008)4.1 COMPUTER CRIMESMost of the cyber criminals are anti-social element who gets motivated by the prior worst personal experience resulting in the crimes. Computer crimes can result in monetary loss, information loss. Some major computer crimes in info space and as listed under which affects both work and personal life. (Herold, 2006)HackingVirusFraud individualism thieving defense team Of Services DoSChild vulgarismIRC crimeSoftware piracyHackingComputer hacking has obtain a status among many youngster.. Hackers are tend to have better understanding of coding and break into computers and are aware of bypassing the security or can remain undiscovered in the network for a certain time without go forth footprints for the forensics by wiping out the log files. When we talk astir(predicate) the evil we should see the other side of the coin the virtuous which is ethical hacking .Ethical hacking is mean(a)t for approach pathing the computer system or network with the full authorization of the sole. The most common ethical hacking technique is penetration t est by inducing the code to the system and to be aware of the vulnerabilities by negligence as the cabs look for loop holes and create back door. umpteen corporate create their own IT security policies to warm their network.VirusComputer computer viruses are in the top most list of threat lawsuitd by the Information world. Computer program created to do nasty works inside which make its into a computer by mean of downloading softwares or mp3 files which calls them as Free softwares. Worm is much similar to the virus which gets replicated by human intervention until and unless provoked remain quiet in the corner of the system. Trojan horses are interested in creating a back-door for the intruders in a compromised machine. Deploying a powerful anti-virus with the latest released virus definitions can befriend us in leading a peaceful life (Williams, 2003)Identity theftFinancial personal identity theft is the widely asserted crime happening in the Internet. These intruders get i nto the system pretending the account toter of the bank by in move false identity. A criminal identity bandit uses the personal information including the national insurance number and social security number to do crime and leave it as the proof of identity. medical identity theft is do by using another persons identity to obtain medical care or drugs where law restricts to purchase drugs. Computer security is the ultimate solution for identity theft by sanitizing the old data in system and spam mails by installing anti-virus software which has powerful tools to protect online transactions. Most of the nations have law in place against these kind of identity thefts which includes heavy financial fine and imprisonmentDenial of Services-DoSDenial of service wont affect neither the system security or destruct information loss any files make financial theft barely can affect the targeted business by putting on fire ranging from second to days by making inaccessibility of a critical server, email or website which provides service as business . A buffer overflow with a prior assumption that of the weakness of programming or architecture of the applications used are the famous demurral of service attacks that bench marked the history so far. Disabling the ICMP traffic in the firewall can prevent the ping of death. Implementing strong encryption techniques and deploying landed estate naming service. To overcome DoS attacks are by knowing the foot and regular testing for complexity, keeping spam filters will limit postbox getting flooded, if the business demands buying a space in the deprave or by keeping dramatically huge processor power and server volume will servicing to prevent such kind of issues.PornographyPornography refers to any kind of image displaying a person who is being engaged in explicit sexual activity. In countries like Spain barbarian porn is a criminal offense if conventional pornography was in the paper based hard copy or moving pictu re tape as technology advanced the Internet based pornography is image files or video files and on-line buffering. Severely punishing these criminals and these punishments to be brought to the notice of general public for their awareness that it will their experience if they do so. Association of sites advocating child protection ASACP was found in 1996 is meant for reporting child abuses in the society anonymously aiming to catch hold of the pornographers, they have a fully functional hot line and website asacp.org where people are report the crime . The RTA certificate helps children from accessing pornographic websites which is open Internet wide poverty-stricken of cost. (Barrons Educational Series, Inc, 1999)IRC CrimesMany people lose their privacy when then enter the IRC (Internet Relay Chat) rooms. The chat rooms become the playground of cyber criminals, hackers and terrorists. Verbal IRC crimes are where people get abused verbally in the chat rooms. The second category is clone attack where randomly synchronized codes are generated on behalf of usernames by robots to generate a random character which gets multiplied by the per-written code result in flooding and the chat server gets freezes due to Denial of service. Criminals use Cyber stalking to harass women and celebrities. IRC crimes can be halt by simply ignoring or banning the user id which almost all chat sites allow.Salami AttackAll these times we were talking about a crime which is relevant only to single attack , now lets talk about a series of tiny attacks which is categorise as salami slicing in computer cyber terms. The attacker steals a comparatively small add of money from the account and the actual account holder will wear thin that it might be a service charge of any bank transactions or transaction which they might have done during shop and wont be bothered to scrutinise the actual fact. such attacks will be done will multiple users which is like an atomic reaction.BotnetA bot is defined as zombie army which is an interconnected network of computers on the Internet with malicious infected software robots. The zombies army can be controlled only by the owner of the respective program. Botnet which is a malware can result in Denial of service attack. Criminals use this technique to utilize the overlap processing power and memory Gradually the users system will face slow down .The solution to overcome the botnet is to install antivirus which can detect the malwares .(Parker, 1999)4.2 INTELLECTUAL straightlacedTYIntellectual property commonly referred as IP in short is associated with creativity of an artistic work, or invention of technologies. Computer professionals and students are committed not to copy other works to part of their work without their consent. Taking the credit of innovative work might not be technically a crime under law but it is unethical. According to Richard stallman the founder and pioneer of Free software , software it should not l ie with certain limited people . His version is no one has the monopoly to own, it should be open to all it being claimed as information. The statement of Deborah Johnson is that softwares and applications are the outcomes of a group of professionals effort leveraged by their skill set. I would stand aside Johnson as this an assiduity which is the bread giving one, but superannuated softwares can be release for public use and for students and financially regardant(postnominal) people where the light of information world dint fall. Intellectual property is categorized into two by world intellectual property society as copyright and patent4.2.1 PiracySoftware piracy is the most polemical talk in the information space, if we never pay for free-ware used, the sharewares has to be payed depending on the usage entitled by the owner. Piracy lies somewhere in the affectionateness where the customer need to be pay relatively small come which is common in Asian countries. Piracy has spr ead to video industry as well by where the storage discs of newly released albums and movies are available in market for cheaper price .(Williams, 2003)4.2.2 Open- outset Vs Closed- semen.Open- kickoff applications are those applications available free of cost Closed-source applications are available in the market like windows operating system. Open-source softwares can be downloaded free of cost and can be manipulated using the source code. As the word refers closed source softwares are closed in many ways, so we can expect more security from them. It will not be easier for a hacker to create a threat in closed source. For an open source application the source is readily available to the end user, he can experiment the possible vulnerabilities and can create a threat from that.4.2.3 piracyStudents are liable to stick on to plagiarism. Copying a colleagues pivotal information is equivalent to theft. Plagiarism is a kind of cheating, school going kids do it by literally downloadin g and later amend it by changing the overall look by adding font colours. Arranging the referred website and book in a systematic way will help the student locomote into plagiarism. Consolidating this data into bibliography will help the student in the safer side. (Bynum, 2008) (Williams, 2003)4.3 PRIVACY AND anonymitySpoofingSpoofing is the process of doing any kind of on-line data transfer where the root word of the data will be IP- spoofing and email spoofing the subcategories of spoofing . IP-Spoofing is the technique used to enshroud ones ip address and leverage other persons ip address to do some malpractices. In email spoofing the usually terrorists use this to send grueling email to home affairs department. Man in the middle attack is the by-product of spoofing where a person does the crime pretending the online transaction is done by the poor chap who owns the on-line account by network address translation on a cloud computing . Many corporate have security policies im plemented to defend against these attacksPhishingPhishing is the tactics of move fake emails giving an impression to the end user who receives the email mentioning he is receiving it on behalf of a well reputed organization most of the times from the bearing or financial department claiming asking for the credit card enlarge .Phishing sets either an upsetting message or an offer message which enables a psychological reaction in humanPhishing scams are dramatically change magnitude now a day. To overcome in case of any discrepancies the link needs to be avoided and intimating the concerned person may be a good approach.Password protectionPasswords are the keys to get into our privacy .Every individual have a bunch of passwords and most of them are identical for our own convenience. .If we are in a business critical position of a corporate or reputed brand. We should adhere to not sharing the passwords even with our friends need to keep the passwords changed in a time interval of three months .need to make sure we are using complex passwords which contains alphanumeric characters as well. (Bynum, 2008) hearty NETWORKING AND BLOGSSocial networking in a spanning innovation of the present world. It is one among the innovations of the hug drug which if used in a supposed manner common macrocosm can make use of it .The advantage of social networking is wherever we go around the world we can be in touch with our loved ones and friends. Social networking can let a business man know the response of his products instantly from the blogs. As mentioned early when new invention is natural with equal brother which is a crime . He looks identical twin until being as a crime. Social networking is an unavoidable part of our social life. We are kept updated by the blogs and status updates which is advantageous in many ways for a person who dont look at newspaper , ameliorate his vocabulary, culture and will let him know what is happening around and most of them comes fr ee of cost. An individual can upload a fake visibleness which can misguide many youngsters. Most of the social networking websites are in camera owned and they dont really look into the verification of the information provided in the user profile which might result in the misuse of profile for anti-social activities which can a celebrity or a religiously known prestigious person. (Barrons Educational Series, Inc, 1999)5. COMPUTER ETHICS AND PROFESSIONAL RESPONSIBILITYComputer professionals work on many technologies in different domains. They work on different programming languages and evolving technology platforms. They are spread around the world bring their inventions. The computer professionals are not limited to computer scientists or software engineers. The chain will be incomplete without system analysts, warehouse professionals hardware designers, networking professionals, database administrators and IT managers. The basics of ethics should start from each computer profes sional .there would not be no one to monitor at work. Computer ethics should be self driven. The computer professionals should voluntary test and validate the errors without leaving any loopholes when the applications are build. There is a saying Engineers build the world where the same engineers destruct the world too. This is complementary as the engineers invented concrete mix machines and cranes whereas the same engineers invented the bulldozer. It is the same case of computer industry where the softwares engineers develop softwares and the same software engineers create viruses. Usage of computer or network without the owners permission physically or virtually and damaging data is unethical and is sure enough a crime. This crime can be monitored upto an extend by irreverence detection systems IDS. IDS is capable of monitoring the computers and its network in an organization. The IDSs are tack in such a way that whenever a deviation from standard policies it will trigger an alert to the system administrator. The computer professionals are stimulate to certain responsibility, a software developer who develops is responsible to point out the drawbacks to the society during the primitive stage of the development. The professional should we educated towards the legal responsibilities of the applications as it could become a harm to the evolving technologies . According to me the legal and moral responsibility is coarse and the professional should look into the future inflictions. This lies on the shoulder of every component in the team. The members should report any kind of issues to their supervisors.Few disasters in the retiring(a) which reminds us about the importance of ethics 1985 Therac- 25 radiation machine fail1983 World war 3 Due to bug the Soviet intelligence applications1987 Wall street crash known as total darkness Monday1990 ATT network collapse1995 Airane explosion1999 Siemens passport bug2000 I love you virus,2004 UK child support agen cy bugThese events in the by reminds us the importance of the software testers were morally liable to the fix could have away because of negligence. Assuming the context of software development for a medicalACM CodeThe association for computing machinery ACM released the code of ethics and professional conduct which is set as a benchmark for computer ethics so far. It is a 24 which talks about the contributing to the society without harming giving credit to intellectual property with respect to privacy and remarks confidentiality. Professional responsibilities striving to achieve quality and dignity in work and product. Maintaining competency with respect to the law pertaining professional work. Providing professional review and comprehensive evaluation. We should honour the contract and responsibilities assigned to us. Should improve public understanding. One should access the computer resource when they are supposed to do so.In 1992 Dr.Ramon C Barquin discussed the region of co mputer ethics through Computer ethics institute and is being used by reputed institutions and organisation which is quoted as below5.1 Ten Commandments of Computer Ethics1. railway yard SHALT NOT subroutine A COMPUTER TO terms OTHER PEOPLE.2. kB SHALT NOT INTERFERE WITH OTHER PEOPLES COMPUTER WORK.3. super C SHALT NOT SNOOP AROUND IN OTHER PEOPLES COMPUTER FILES.4. THOU SHALT NOT USE A COMPUTER TO STEAL.5. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS.6. THOU SHALT NOT write OR USE PROPRIETARY SOFTWARE FOR WHICH YOU HAVE NOT PAID.7. THOU SHALT NOT USE OTHER PEOPLES COMPUTER RESOURCES WITHOUT AUTHORIZATION OR PROPER COMPENSATION.8. THOU SHALT NOT APPROPRIATE OTHER PEOPLES INTELLECTUAL OUTPUT.9. THOU SHALT have in mind ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU ARE WRITING OR THE dodge YOU ARE DESIGNING.10. THOU SHALT ALWAYS USE A COMPUTER IN WAYS THAT INSURE CONSIDERATION AND RESPECT FOR YOUR FELLOW HUMANS. (Herold, 2006)6. CONCLUSIONMost of the crimes are happeni ng due to underlying vulnerabilities in the system which stiff undetected due to ignorance. All the computer relevant evils cannot be sanitized. By applying hot fixes and patches these security concerns could be covered .Privacy can be recalled by adhering by not sharing passwords with friends .A sophisticated intrusion prevention system in place will hinder many intruders and safeguards the system and network. A frequent auditing in the IT infrastructure and review can help in planning and implementing security systems. According to me the best thing is to be in touch with computer professionals and joining their communities and having an eye on the blogs can help us to get rid of the computer. Individuals are the basic building blocks of the society. So the decision making factor should start from the soul of each and every computer user. A focus on the information system failure and research on them could lime light on the computer ethics. Computer ethics need to be a part of th e curriculum for students as they get exposure to information world and might get misleaded without guidance. If the communities are doing good it will for sure make a good electrical shock in the progress of a good nation and in turn a good world. To attain this we should respect others privacy, the use of any software should not harm anyone else and end-users should be willing to pay closed source applications and contribute for sharewares .If we come across any discrepancies use our internal sense to relish need to keep the legal people informed about the issue. Employees should adhere to the organizations policies. Honesty and Integrity can strive to ethics. (Tom Forester, 2001) (Stamatellos)

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.