Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

21

TOPIC 3 COMPUTER ETHICS

Objectives:
At the end of the topic, the student will be able to:
1. Define computer ethics
2. Know the general examples and categories of computer abuses
3. Understand privacy issues, social justice issues, free speech issues, intellectual property rights issues
4. Know the different forms of computer crimes

WHAT IS ETHICS?

Ethics is derived from the Greek term “ethos”, which means character or custom. Its equivalent term in
Roman is the word “mores”, from which words like morality, morals and moral are derived.

Ethics is intertwined with customs and traditions believed in or adopted by a particular community. Since
customs are relative, what is “ethical” would depend on whether or not it conforms to existing customs. This is a
relative view of ethics – meaning that what is ethical in one community may not be ethical in another.

Applied Ethics is a perception of what is correct or not, of right or wrong, that is usually adopted and used to
guide people’s action in various human concerns relative to various fields of study. The various applied ethics
include environmental ethics, nursing ethics, biomedical ethics, legal ethics, and computer ethics, among others.

WHAT IS COMPUTER ETHICS?

Neoteric and highly advanced computer technologies are continuously being developed and used to produce
more sophisticated, if not perfect, data processors. This continual technological advancement causes a lot of
possibilities of human actions – possibilities which are casting doubt on long held notions of appropriate behavior.

Computer Ethics refers to the guiding precepts and norms that are adopted and applied to regulate and
control the use of computers and its applications.

TEN COMANDMENTS FOR COMPUTER ETHICS

1. Thou shalt not use a computer to harm other people.


2. Thou shalt not interfere with other people’s computer work.
3. Thou shalt not snoop around in other people’s files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other people’s computer resources without authorization.
8. Thou shalt not appropriate other people’s intellectual output.
9. Thou shalt think about the social consequences of the program you write.
10. Thou shalt use a computer in ways that show consideration and respect.

COMPUTER ABUSES

When computers first began to be used, there were no ethical standards relevant to it. However, as the use of
computers became widespread, computer ethics became a concern. Today, most of the rules on the ethical use of
computers have already been formulated as laws. Computer crimes and computer frauds, for example, are
common terms nowadays and there laws against them. In the Philippines we have the E-Commerce Law that
defines penalties for computer crimes, hacking, and computer fraud, among others.

Mariano Marcos State University – College of Arts and Sciences – Department of Computer Science
22

The following are selected issues classified as computer abuses.

1. Denial of service attack – characterized by an explicit attempt by attackers to prevent or bar legitimate
users of computers from availing themselves of computer services. Examples of denial of service attacks
are:
 attempts to “flood” a network, thereby preventing legitimate network traffic
 attempts to disrupt connections between two machines, thereby preventing access to a service
 attempts to prevent a particular individual from accessing a service
 attempts to disrupt a service to a specific system or person

2. Hacking – involves unauthorized access to a computer, its files, and programs. There are many reasons
why hackers hack computers.
 Theft of service – if a system offers some type of service and a hacker has a use for it, he/she will hack
the system. For example, a hacker can hack into a system to use the CPU for free or to use it for
sending emails for free.
 Take valuable files such as credit card numbers and list of customers. The hacker may sell the
information gathered to rival companies.
 Vengeance and hatred – for example, a hacker may get into the homepage of the university that
kicked him out and deface the homepage
 Thrill and excitement of being somewhere they are not authorized to be
 For the sake of knowledge and experimentation – hackers learn a great deal every time they break
into a new type of system.

3. Flaming – sending of abusive emails or messages to other people or newsgroups. You flame people when
you disrespect their opinion and attack them personally, calling them names or questioning their
parentage. Flaming is considered poor online conduct and is not tolerated well in chatrooms or
newsgroups.

4. Spamming - Spam is sometimes called unsolicited commercial email, the Internet version of junk mail. It
is an attempt to deliver a message over the Internet to someone who would not otherwise choose to
receive it. Almost all spam is commercial advertising.

5. Worms and virus


A virus is a program that reproduces its own code by attaching itself to other executable files in such a
way that the virus code is executed when the infected executable file is executed.
A worm is a self-replicating program designed to spread across a network without requiring any outside
actions to take place.

6. Internet hoaxes – messages about free money, children in trouble and other items designed to grab your
attention and get you to forward the message to everyone you know (chain letters). While these do not
automatically infect systems like a virus or Trojan, they are time consuming and costly to remove from all
the systems where they exist.

PRIVACY ISSUES

In computing, emails and letters, your database, and your personal information are considered private.

Mariano Marcos State University – College of Arts and Sciences – Department of Computer Science
23

SOCIAL JUSTICE ISSUES

Social justice is concerned with the promotion of the welfare of the people. In computing, social justice would
pertain to equity of access. Some issues emanating from equity of access involves gender, physical disabilities,
language.

Other social justice issues concern the use of the computers in the workplace (occupational hazards), in
particular electronic monitoring, repetitive strain injuries, electromagnetic radiation.

FREE SPEECH ISSUES

The right to freedom of expression is one of the constitutional rights guaranteed by the supreme law of the
land. Hence, it is constantly advocated by those who do no want to be subjected to restrictions in their
expressions or articulation of their thoughts.

In computing, the issue is whether or not it is reasonable, or ethical, to assert one’s right to freedom of speech
and expression in order to post or display pornographic materials in the web, or to use obscene and foul language,
among others? One standpoint is that the exercise of individual rights is not boundless. One should be
responsible enough to realize that one’s acts are subject to certain ethical norms that forbid abuse and misuse.

The US Communications Decency Act (1996) makes it a criminal offense to send “indecent files via the Internet
into others computers”. In 1997, US Supreme Court voted unanimously that the Act was a violation of the first
amendment. This is the reason why you can find a lot of indecent US-based materials in the Internet. In 2000, the
US passed the Children’s Internet Protection Act that requires all schools and libraries receiving e-rate discounts or
other federal assistance for Internet access to install filters on all computers used by adults as well as minors.

In Great Britain, it is already illegal to publish and post materials that are likely to incite racial hatred.

INTELLECTUAL PROPERTY RIGHTS

Most countries, including the Philippines, enforce laws that penalize copying or imitation of inventions,
identifying symbols, and creative expressions. These laws encompass four separate and distinct types of
intangible property namely patents, trademarks, copyrights, and trade secrets, which collectively are referred to as
“intellectual property”.

Intellectual property is an asset, and as such it can be bought, licensed, exchanged, or gratuitously given away
like any form of property. The intellectual property owner has the right to prevent the unauthorized use or sale of
the property.

In computing, an algorithm can be patented; a program or an online textbook is copyrightable; and domain
names could be considered trademarks.

 Software Piracy – the act of using software without paying the appropriate license. This is the same as
stealing from the software developer. Software pirates not only steal from the companies that make the
software; their acts also redound to less money for research and development on new software. Thus, all
users are hurt by software piracy.

 Plagiarism – occurs anytime that a person copies any written work and claims it as its own. With the
advent of the Internet, cut-and-paste plagiarism becomes common.

Mariano Marcos State University – College of Arts and Sciences – Department of Computer Science
24

COMPUTER CRIMES

When a country institutes laws against computer abuses, a computer abuse becomes a computer crime. Not
all abuses, however, constitute a crime. For example, consider a hacker who breaks into someone’s computer
system without permission. If the hacker steals confidential data from the system, this is considered a crime in
some countries. A hacker who simply gets into the system to explore it – that is, to see how it works and what files
it contains, may have breached privacy but has not necessarily committed a crime. Both acts, however, are
unethical.

RELATED PHILIPPINE LAWS

The Intellectual Property Code of the Philippines (Republic Act No. 8293) declares that computer programs
as non-patentable inventions but copyrightable. Computer programs are included in the section on literary and
artistic works. The reproduction of computer programs in one back-up copy or adaptation of computer programs is
permitted, without the authorization of the author/s of the copyright by the lawful owner of that computer
program, provided the copy or adaptation is necessary for:
a. The use of the program in conjunction with a computer for the purpose, and to the extent, for which the
computer program has been obtained;
b. Archival purposes, and for the replacement of the lawfully owned copy of the computer program in the
event it is lost, destroyed or rendered unusable.

Selling, letting for hire, trading or exposing for sale or hire, or for any purpose to an extent that will prejudice
the rights of the copyright owner, even trade exhibits in public of the work, shall be guilty of an offense and shall
be liable on conviction to imprisonment and fine.

The E-Commerce Law of the Philippines (Republic Act No. 8792) recognizes electronic signatures found in
electronic documents as equivalent to signature on a written document.

“Electronic Signature” refers to any distinctive mark, characteristic and/or sound in electronic form,
representing the identity of a person and attached to or logically associated with the electronic data message or
electronic document or any methodology or procedures employed or adopted by a person and executed or
adopted by such person with the intention of authenticating or approving an electronic data message or electronic
document.

Crimes under this law include hacking or cracking, piracy, violation in the Consumer act and other related laws,
violation of confidentiality, lawful access, among others.

The Cybercrime Prevention Act of 2012 (Republic Act No. 10175) defines internet and computer offenses and
it aims to put users of the internet and computers in check by defining violations related to their use. The
Cybercrime Prevention Act divides offenses into three categories:
a. offenses against the confidentiality, integrity and availability of computer data and systems,
b. computer-related offenses, and
c. content-related offenses.

The first category includes offenses such as hacking and cybersquatting.


1. Illegal access – The access to the whole or any part of a computer system without right.
2. Illegal interception – The interception made by technical means without right of any non-public
transmission of computer data to, from, or within a computer system including electromagnetic emissions
from a computer system carrying such computer data.
3. Data Interference – The intentional or reckless alteration, damaging, deletion, or deterioration of
computer data, electronic document, or electronic data message, without right, including the introduction
or transmission of viruses.

Mariano Marcos State University – College of Arts and Sciences – Department of Computer Science
25

4. System Interference – The intentional alteration or reckless hindering or interference with the functioning
of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering
or suppressing computer data or program, electronic document, or electronic data messages, without
right or authority, including the introduction or transmission of viruses.
5. Misuse of devices
i. The use, production, sale, procurement, importation, distribution, or otherwise making available,
without right, of:
a. a device, including a computer program, designed or adapted primarily for the purpose of
committing any of the offenses under this Act; or
b. A computer password, access code, or similar data by which the whole or any part of a computer
system is capable of being accessed with intent that it be used for the purpose of committing any
of the offenses under this Act.
ii. The possession of an item referred to in paragraphs 5(i)(a) or (b) above with the intent to use said
devices for the purpose of committing any of the offenses under this section.
6. Cyber-squatting. The acquisition of domain name over the Internet in bad faith to profit, mislead, destroy
reputation, and deprive others from the registering the same, if such a domain name is:
i. Similar, identical, or confusingly similar to an existing trademark registered with the appropriate
government agency at the time of the domain name registration;
ii. Identical or in any way similar with the name of a person other than the registrant, in case of a
personal name, and
iii. Acquired without right or with intellectual property interests in it.

The second category includes offenses such as forgery, fraud and identity theft.
1. Computer-related Forgery:
i. The input, alteration, or deletion of computer data without right resulting in inauthentic data
with the intent that it be considered or acted upon for legal purposes as if it were authentic,
regardless whether or not the data is directly readable and intelligible; or
ii. The act of knowingly using computer data, which is the product of computer-related forgery as,
defined here, for the purpose of perpetuating a fraudulent or dishonest design.
2. Computer-related Fraud. The unauthorized input, alteration, or deletion of computer data or
program or interference in the functioning of a computer system, causing damage thereby with
fraudulent intent; provided that if no damage has yet been caused, the penalty imposed shall be one
(1) degree lower.
3. Computer-related Identity Theft. The intentional acquisition, use, misuse, transfer, possession,
alteration or deletion of identifying information belonging to another, whether natural or juridical,
without right. Provided, that if no damage has yet been caused, the penalty impose.

The third category includes offenses such unsolicited commercial communications and libel.
1. Cybersex – The willful engagement, maintenance, control, or operation, directly or indirectly, of any
lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor
or consideration.
2. Child Pornography – The unlawful or prohibited acts defined and punishable by Republic Act No. 9775
or the Anti-Child Pornography Act of 2009, committed through a computer system.
3. Unsolicited Commercial Communications – The transmission of commercial communication with the
use of computer system which seek to advertise sell, or offer for sale products and services are
prohibited unless:
4. Libel – The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as
amended committed through a computer system or any other similar means which may be devised in
the future.

The law now penalizes those who send unsolicited commercial communications which seek to advertise, sell,
or offer for sale products and services. This should put a stop to those spam emails and other unwanted

Mariano Marcos State University – College of Arts and Sciences – Department of Computer Science
26

commercial communications. The law however provides for exceptions to this offense. The Cybercrime Prevention
Act of 2012 also now criminalizes libel done by using a computer system.

SELF-ASSESSMENT QUESTIONS

A. Daan is a computer buff. He loves to surf the Internet and try all available applications. Daan also does web
design and programming, among others. In one of his computer explorations, Daan discovered a virus that
destroys the computer motherboard. To test his discovery, Daan surreptitiously installed the virus in his friend
Kael’s PC. After a week, Kael broke the sad news to Daan. His PC has bogged down and he needs to buy a
new motherboard. Daan finds himself torn between whether to tell Kael or not.
1. Which of the 10 commandments on computer ethics did Daan violate?
2. If you were Daan, will you tell Kael the truth or not? Explain.
3. If you were Kael and Daan told you the truth, what will you do?

B. Identify which among the Ten Commandments for computer ethics is violated in each of the following
situations.

1. Deliberately viewing the messages in other peoples’ phone Inbox.


2. Cut-and-paste the text from a webpage into your research paper without recognizing the source .
3. Sending too many unnecessary email messages to your contacts in the Internet.
4. Assuming other people’s computer identity like username and password .
5. Cracking codes to get client listing from a company.

C. True or False: Write T if the statement is true, otherwise write F.

1. Ethics is derived from the Greek term “mores”, which means character or custom.
2. What is ethical in the Laoag may not be ethical in Batac.
3. Computer ethics is example of Applied Ethics.
4. Computer Ethics refers to the guiding precepts and norms that are adopted and applied to regulate and
control the use of computers and its applications.
5. The activities you perform in the Internet does not matter so much because you cannot see the people
you are interacting with anyway.
6. Patent is an example of intangible property.
7. Repetitive strain injuries acquired through constant use of computers is an issue on social justice.
8. The right to freedom of expression allows an individual to post information on whatever nature in the
Internet.
9. Copyrights can be bought.
10. Many argue the national ID system because of possible abuse from the government.
11. Resources taken from the Internet are readily accessible and therefore it is free to use and duplicate for
mass production.
12. Physically handicapped people are incapacitated to use the computer.

D. Multiple Choice: Identify which among the most common computer abuses is described in the following items:

______1. Some message reach our e-mail accounts usually from nowhere and sometimes it annoys us primarily
because it crowds our inbox. These e-mails are categorized as:
a. flame b. spam c. hoax d. all of the above

Mariano Marcos State University – College of Arts and Sciences – Department of Computer Science
27

______2. This is a program that reproduces its own code by attaching itself to other executable files in such a way
that it is activated when the infected executable file is executed.
a. virus b. worm c. both a and b d. none of the above
______3. “You have won 1 million. Click here to claim your price.” Would you proceed? This is categorized as
what type of computer abuse?
a. flame b. spam c. hoax d. worm
______4. Messages that disrespect others opinion over the Internet.
a. flame b. spam c. hoax d. all of the above
______5. The web administrator blocks important websites for use.
a. spamming b. hacking c. denial of service d. none of the above

E. The following are reasons why hackers hack. Explain each.

1. Theft of service
_____________________________________________________________________________________
_____________________________________________________________________________________

2. Take valuable files


_____________________________________________________________________________________
_____________________________________________________________________________________

3. Vengeance and hatred


_____________________________________________________________________________________
_____________________________________________________________________________________

4. Thrill and excitement


_____________________________________________________________________________________
_____________________________________________________________________________________

5. For the sake of knowledge and experimentation


_____________________________________________________________________________________
_____________________________________________________________________________________

F. Are you in favor of the enactment and enforcement of laws that will regulate and control the use of computer
technology? Why and why not? Defend your answer.

G. If you were granted indefinite and unrestricted access to the Internet, would be interested to join a chat group
that holds no barrier as far as free expression and communication are concerned? Why? Why not?

REFERENCES

Albacea, Eliezer. Computer Ethics, IS201 Manual. UP Open University.

Cybercrime Penalties under Electronic Commerce Act. Web. Retrieved November 2012.
<http://digitalfilipino.com/core/uploads/2009/09/infographics-The-Philippines-E-Commerce-Law-2000-
20121.png>
“Republic Act No. 10175.” www.gov.ph. Official Gazette. 12 September 2012. Web.
<http://www.gov.ph/2012/09/12/republic-act-no-10175/>

“Ten Commandments of Computer Ethics.” computerethicsinstitute.org. Computer Ethics Institute. n.d. Web.
<http://computerehticsinstitute.org/images/TheTenCommandmentsOfComputerEthics.pdf>

Mariano Marcos State University – College of Arts and Sciences – Department of Computer Science

You might also like