Professional Documents
Culture Documents
3 ethics in ICT
3 ethics in ICT
3 ethics in ICT
Ahmad Kipacha
Module 3
ICT Ethics
• Information and Communication Technology (ICT) includes
computers, the Internet, and electronic delivery systems
such as radios, televisions, and projectors among others,
• Set of moral principles which guide users on how to use
computers in morally acceptable manner.
• Addresses issues of responsibility, obligations,
accountability, liability, ownership and Intellectual Property
Rights, Quality of system , environment and quality of life
The evolution of the Information
Ethics (EI)
Norbert Wiener (father of cybernetics), in the late 1940s and
early 1950s, was the first to predict and work on such
problems.
The term “Computer ethics” was coined by Walter Maner in
the mid 1970s, to refer to the field of research that
studies ethical problems “aggravated, transformed or
created by computer technology”.
Later, it became clear that what matters is not the specific
technology (computers, mobiles, ICTs in general) but the
raw material manipulated by it, data/information. So in
the late 1990s several researchers, especially in Oxford,
started working on “information ethics” (IE).
Should we be speaking of data ethics ?
• ICT has stream of ethical issues around
– AI ethics
– ML ethics
– Robotic ethics
– Big data ethics
– 5G ethics etc?
4IR consequences –DATA Ethics
• Data ethics can be defined as the branch of ethics that
studies and evaluates moral problems related to:
• data (including generation, recording, curation,
processing, dissemination, sharing and use),
• algorithms (including artificial intelligence, artificial
agents, machine learning and robots)
• corresponding practices (including responsible
innovation, programming, hacking and professional
codes)
• in order to formulate and support morally good
solutions (e.g. right conducts or right values)
Current Research Agenda
• Ethics vs AI –machine learning
• Ethics vs robotics
• Ethics vs big data
• Ethics vs IoT
• Ethics vs Drone
• Ethics vs Cybersecurity
• Information warfare
• Ethical hacking
• Social engineering
• 5G
What Raises Computer Ethical
Issues?
• Trend impact Computing power doubles
• Dependence on computer systems
• Massive Data open for analysis
• Networking advances
• Copying & accessing data from one location to
another
• Mobile device impact
ICT changing the way we shop
• Jobs transferred
abroad
• High street shops not
being able to
compete with
Internet stores
• Gig economy
Ethical issues due to ICT
• Employers looking at job
applicants’ social networking
profiles
• Employers monitoring employees’
emails, websites visited, etc.
• Invasion of privacy by social
networking sites
• Use of cookies to record websites
visited without you knowing
Moral issues due to ICT
• Copying of copyrighted
material
• Widening of gap
between rich and poor
countries
• bitcoin
Social issues due to ICT
• Lack of privacy
• Addictions to social
networking sites,
chat rooms, etc.
• Addictions to games,
gambling, etc.
• Addiction to
pornography
Challenges to Privacy
• Cookies:
• Tiny files deposited on a hard drive
• Used to identify the visitor and track visits to the
Web site
• May or may not be used to gather personal
private information
• In some cases, only a visitors customer number
is maintained, not any personal information. In
other cases, personal information can be
gathered
No privacy
• Privacy issues have been around for ages.
• With technological development,
possibilities for privacy invasion increased
very much
• What did you buy, where, when, how
much; phone calls; what did you eat;
where did you go for holidays,…)
• Privacy issues are at the top of the list in
regards to ethical use of information.
• Loss of control
• Misuse of information
• Risk to physical privacy
• Risk of identity theft (video)
• Unwanted intrusions into daily life
Ethical dilemma with privacy
issues
26
Spyware/malware:
https://rsf.org/sites/default/files/the_cyber_crime_act_
2015.pdf
What are the motivation?
• Vendetta/Revenge
• Joke/Hoax/Prank
• The Hacker's Ethics
• All information should be free
• Terrorism
• Political and Military Espionage
• Business ( Competition) Espionage
• Hate (national origin, gender, and race)
• Personal gain/Fame/Fun/Notoriety
• Ignorance
Challenges in Tracking Cyber
Criminals
• Nearly in all countries there is no required reporting
mechanism in government agencies, even the private
sector, to detect intrusions and report such intrusions
• In the private sector, there is very little interest in
reporting of any system related intrusions. This is a
result of the fear of marketplace forces that would
expose management’s weaknesses to the shareholder
community and competitors.
Challenges: Commerce
• Fraud
• Taxation
• Free Trade
• Gambling
• Auctions
• Spamming
– Who were Canter and Siegel?
– Spamming cell phones?
• Term papers for sale
– Atlanta Journal Constitution article
34
Challenges: Workplace
• Accessibility
• Ergonomics
• Outsourcing
• Telecommuting
• Customer relationships – Vendor relationships
• Should IT professionals be in the ethics business or should other areas of
the business handle these issues?
• Monitoring
– Should your employer have the right to monitor private email messages?
– What are the two most popular Web sites for American workers? Playboy and
ESPN
35
Challenges: intellectual Property
• Electronic Copyright
• Licensing
• Interoperability
• Licensing
– Cyberlicenses
– Shrinkwrap
– Shareware
– Freeware
• MP3
– RIAA court case against college students
– University Internet Usage policies
• Internet Downloads
– Files
– Graphics
– Text
36
Challenges: Intellectual Property
37
Students Activity 2: Independent
Studies
• MIMO(Multiple‐Input Multiple‐Output )
It is a multiple antenna technique used in wireless
communication.
Thus Massive MIMO is a large scale MIMO.