Sei sulla pagina 1di 28

The Ethics of Computer

By:
Anindi Galuh (135020107121002)
Bunga Mersiana
(135020107121004)
Purpose of Study
1. Explain the definition of computer ethics.
2. Explain the social rights of computer ethics.
3. Explain the practice of computer crime.
4. Describe the company responsibilities against
the use of computer.
Definition of Ethics of Computer
Analysis about characteristic and social impact of
computer technology, and also formulation and
justification of policies for ethical use of
technology (James H. Moor).
Main Activities of Computer Ethics
1. Alert and aware of how computers affect
people.
2. Must do something by formulating policies that
ensure that the technology is used
appropriately.
The Reason for the Importance of
Computer Ethics
Logical Malleability
Transformation Factor
Invisibility Factor
Logical Malleability
The ability to programmed the computer to do
whatever they wants, so the computer doing
something that instructed by programmer.
Transformation Factor
Computer can drastically change how to do
things, and also transformed how the business
world works.
For example: the use of email.
Invisibility Factor
Because computer is seen as a black box and all
the internal operations are hidden from sight
and it triggered the existence of:
1. The programming values that are invisible
2. Complicated calculation that are not visible
3. Unseen abuse
Social and Computer Rights
Rights of Computer:
1. Rights of computer access
2. Rights of computer skills
3. Rights of a computer specialist
4. Decision-making rights of computer
Rights of Computer Access
Everyone do not need to have a computer , but
with having a computer people can reach their
rights.
For example: to get access of education.
Rights of computer skills
Computers nowadays have created more work.
In preparing students to work in modern society,
educator consider knowledge of computers is a
necessity.
Rights of a computer specialist
To obtain all the knowledge and expertise on
computer, then needed a computer experts. So
the citizens has a right to have an access to the
specialists.
Decision-making rights of computer
The public has a right to participate in the
decision-making of how should the computer is
used.
Right to Information
According to Mason there is Four Basic Human
Rights in Terms of Information :
Right to privacy
Right to accuracy
Right to Property
Right to Access
Right to privacy

responsibility to protect data about individuals


Right to Accuracy
responsibility of data collectors to authenticate
information and ensure its accuracy
Right to Access
responsibility of data collectors to control access
and determine what information a person has
the right to obtain about others and how the
information can be used
Right to Property
who owns information and software and how
can they be sold and exchanged
Software vendors can preserve their intellectual
property from theft through copyrights, patents,
and licensing agreements.
Social contracts of information
services
To solve the problems of computer ethics, Mason suggests information services must
enter into a social contract that ensures that the computer will be used for social
goodness
The contract states that :
The computer will not be used intentionally to interfere with someone's privacy
Any size will be made to ensure the accuracy of computer processing
Intellectual property will be protected
Computers can be accessed by the community so that community members avoid from
the lack of information
Computer Crime refers to an act against the law using a computer as a means or tool or
computer as an object, whether to gain profit or not, to the harm the other party. Crimes which
closely linked to the use of technology based on computers and telecommunications networks
in several literatures and practices are grouped into several forms, including:

Illegal Access : A crimes conduct by entering or crept into the computer network system
illegally, without permission, Or without the knowledge from the owner of the computer
network system
Illegal Contents : It is a crime to enter data or information to the internet about something
that is untrue, unethical and can be considered against law or disturbing public order
Data Forgery : Constitutes as crime with falsifying data on important documents stored as
scriptless document through the internet .This crime usually aimed at e commerce with
documents make as if any typographical happened that will ultimately be profitable
offender
Spionase Cyber :Constitutes as crime who use the internet network spying against other
parties, by entering computer network system target.This crime usually addressed to rival
business which the documents or important data is stored in a system that computerized.
Data Theft : Activities to obtain unauthorized computer data, either for self use or for other
people. Identity theft is one of these types of evil that is often followed by fraud. This crime
is also often followed by the crime of leakage data.
Misuse of devices : Intentionally and without permission, produce,
sell,obtain,import,distribute or by other means of use, equipment, including computer
programs, computer passwords, access codes, or such data, in which all or any part of the
computer system is accessible For purposes of illegal access, unauthorized interception,
interruption of data or computer systems, or committing acts against the laws
Computer Ethics for Computer
Professionals
Competence : Professionals keep up with the
latest knowledge in their field and perform
services only in their area of competence.
Responsibility :Professionals are loyal to their
clients or employees, and they wont disclose
confidential information.
Integrity :Professionals express their opinions
based on facts, and they are impartial in their
judgments.
Factors cause computer crime
Economically motivated
As the case with many crimes committed outside
the Internet, money is a major motivator for many
cyber criminals. Especially because the dangers of
criminality are less apparent when you're hiding
behind a network, the perception of low risk and
very high financial reward prompts many cyber
criminals to engage in malware, phishing, identity
theft and fraudulent money request attacks.
Personally Motivated
Cyber criminals are still human beings and what
they do including their crimes is often the cause of
personal emotions and revenge.
many cyber crimes are essentially crimes of
passion committed over the Internet. Many of
these crimes, however, can still have very serious
impacts and cause considerable property damage.
Ideologically Motivated
financial companies like Visa, MasterCard and PayPal
refused to let account and card holders make
contributions to the controversial non-profit
WikiLeaks, the "hacktivist" group Anonymous
coordinated a series of bot attacks on the companies'
servers, rendering them unreachable to Internet users.
These kinds of attacks are conducted for perceived
ethical, ideological or moral reasons, damaging or
disabling computer equipment and networks to
express grievances against individuals, corporations,
organizations or even national governments.
Structural Causes
Beyond the causes that motivate criminals, the
environment in which cyber crime is committed also
serves to explain the prevalence of the phenomenon.
While more and more personal and sensitive
information is stored online increasing the potential
rewards for cyber criminals neither computer
security nor applications like email filters have
improved dramatically in terms of coverage.
According to the anti-virus manufacturer Norton,
for example, as many as 41 percent of computers did
not have up-to-date security protection in 2012.
The ACM Code of Conduct
According to the Association for Computing Machinery
(ACM) code, a computing professional:
Contributes to society and human well-being
Avoids harm to others
Is honest and trustworthy
Is fair and takes action not to discriminate
Honors property rights, including copyrights
and patents
Gives proper credit when using the intellectual
property of others
Respects other individuals rights to privacy
Honors confidentiality
According to Don Parker there are ten
steps action plan to achieve ethical
computer operation
Formulate a code of conduct. :
Establish rules of procedure related to the problem of using
personal computer services and property rights to computer
programs and data
Describe sanctions to be taken against violators (reprimands,
cessation and claim).
Recognize ethical behavior.
Focus on ethics through programs (training and required
reading).
Promote a computer crime law by providing information to
employees.
Keep a formal record that sets the responsibilities of each
information specialist for all of their actions, and reduce the
temptation to violate with programs such as ethical audits.
Encourage the use of rehabilitation programs
that treat ethical violators in the same way as
companies pay attention to recovery for
alcoholics or narcotics abusement.
Encourage participation in professional
associations
Give an example.

Potrebbero piacerti anche