Professional Documents
Culture Documents
Computer Ethics and The Online World
Computer Ethics and The Online World
3, 6, 9, 13 and 16.
The answer must be encoded using Google Docs so I can easily give you feedback.
Submit this on or before November 19, 2021.
CLICK
COMPUTER ETHICS
AND
THE ONLINE WORLD
Salazar, Kyle Kjell C.
MOTIVATION: ETHICAL WORD
COOKIES
CSHETI C R V P IAY AA D T
NIOLEN
INTRODUCTION TO
ETHICS AND
MORALITY
ETHICS V.S. MORALITY
• ETHICS
• set of beliefs considered right and wrong within a society (Reynolds, G., 2010).
• MORALITY
• individual views on what is right and wrong (Reynolds, G., 2010).
• influenced by certain factors (education, age, gender, religion).
• LAW
• System of rules on what we can and cannot do (Reynolds, G., 2010).
ETHICS V.S. MORALITY
ANALYSIS
Briefly explain the ethicality and morality of the ff:
Source: http://www.diffen.com/difference/Ethics_vs_Morals
ETHICS ON BUSINESS
• Businesses are growing more and more sensitive to making ethical decisions due to the risks
associated with unethical ones.
• Example:
• China (2006) – Work on the Haxin chip – technology which could be used for multimedia files
and fingerprint verification – was stopped and Chen Jin, its designer, got fired from being the dean
of microelectronics due to the work being allegedly owned by a former Motorola subsidiary,
Freescale Semiconductors (Toy, M., 2006).
• Virtue Ethics Approach – tendency to commit the most convenient action or follow an admired
person’s approach (Reynolds, G., 2010).
• Utilitarian Approach – making a decision based on the common point of all interests.
• Fairness Approach – fair opportunities are given to all parties regardless of differences.
• Common Good Approach – making decisions based on its overall impact to the community.
QUESTIONS
Briefly differentiate ethics and morality.
Provide two (2) common approaches to ethical decision making and briefly explain each.
INTRODUCTION
TO COMPUTER
ETHICS AND ITS
IMPORTANCE
COMPUTER ETHICS
• Refers to the ethical use, development, and handling of information technology (Brey, P.,
2007)
• Covers setting of policies with regards to regulation of information technology in the society
as well (Brey, P., 2007).
IMPORTANCE OF COMPUTER
ETHICS
• It involves the well-being of millions of people with regards to the digital information stored
on the Internet and computers.
• Mishandling of technology and the information associated with it could result to a wide
scale threat to the public’s data privacy and could lead to mass paranoia.
• Financial losses could also be a result of misuse of technologies which can trigger economic
issues.
QUESTIONS
• Provide at least one (1) additional importance of computer ethics. (+2 pts.)
• Provide at least one (1) example of an ethical issue the world is facing nowadays with
regards to the misuse of information technology.
COMMON ETHICAL ISSUES / CYBER CRIMES
ASSOCIATED WITH I.T. AND ONLINE SITES
• SOFTWARE PIRACY
• Acquiring / Redistribution of licensed software through illegal means.
• DIGITAL PLAGIARISM
• Duplication of one’s work published on the internet without the author’s consent or proper
referencing.
• HACKING
• Act of unauthorized access to devices
CONT.
• HARASSMENT, HATE SPEECH, CYBERBULLYING
• Usage of technology to harm other people through harsh words.
• ONLINE LIBEL
• Usage of technology to degrade another person and cause potential harm.
• PHISHING
• Act of deceiving internet users into submitting their account credentials for personal gain.
• HACKTIVISM / CYBERTERRORISM
• Usage of technology to conduct acts related to achieving a political or societal goal (Reynolds, G., 2010).
• Usage of technology to instill fear into the public and force the government to comply with the demands of the
cyberterrorists.
QUESTION(S)
• Allow the users to view third party applications’ activities through the use of software
(Turculet, M., 2014).
• With the use of this solution, users can be aware of what information are being gathered about
them even with those of lesser knowledge about the internet.
CONT.
• Promotion of Anonymity (Turculet, M., 2014).
• Through anonymity, the users’ personal data are secured, however, the actions done by the users
might not be traced easily with this.
ETHICAL ISSUES ON ONLINE SOCIAL
NETWORKS AND OTHER ONLINE SITES:
ANONYMITY AND TRUST
Anonymity
• Refers to being anonymous disclosing little to no personal information to others.
• With the absence of physical connections between users, trust is not easily built as compared to
that of real world social relationships (Turculet, M., 2014).
• It might be that a user’s personal information indicated on a social network site is not real and could
affect him when it comes to building trust with other users.
CONT.
• Deception on the online community could become rampant in order to protect personal
information which would make building trust even more difficult (Turculet, M., 2014).
SOLUTIONS FOR ETHICAL ISSUES
CONCERNING PRIVACY
• The use and implementation of a “review” system for websites (Turculet, M., 2014).
• With the use of the “review” system, users can log in on a website and leave positive, negative,
or neutral feedback regarding other users (Turculet, M., 2014). Just like with that of online
shopping sites, users can comment on sellers’ accounts to either voice out their opinions on the
sellers’ merchandise or recommend it to others.
• Thoughts?
REFERENCES
• ABS-CBN News. (2017, June 21). Retrieved from http://news.abs-cbn.com/business/06/21/17/7-bdo-atms-
compromised-in-skimming-official
• Brey, P. (2007). Computer Ethics in (Higher) Education. Retrieved from
https://www.utwente.nl/en/bms/wijsb/staff/brey/Publicaties_Brey/Brey_2007_Higher-Education.pdf
• Crisostomo, S. (2016, March 19). Comelec Website Hacked. Retrieved from
http://www.philstar.com/headlines/2016/03/29/1567196/comelec-website-hacked
• Dalipe, J. (2016, October 24). Retrieved from http://www.sunstar.com.ph/cebu/local-news/2016/10/25/bpo-
senior-manager-faces-online-libel-case-505555
• Reynolds, G. (2010). Principles Of Ethics In Information Technology (Philippine Edition).
• Turculet, M. (2014). Ethical Issues Concerning Online Social Networks. Retrieved from
http://www.sciencedirect.com/science/article/pii/S1877042814050307
• Toy, M. (2006, May 16). Retrieved from http://www.theage.com.au/news/world/chinese-hightech-hero-a-
fake/2006/05/15/1147545263329.html