Tuesday, November 30, 2004

SAQ 1-1

1. Pick three definitions of ethics from those given and give your own example of each.

  • Ethics focuses on the care for the soul. - An employee works in an Internet Cafe. One night, after all customers had gone and closed, he asked permission from his boss/employer if they could watch an x-rated movie. Since it was very controversial and they haven't seen it yet, his employer approved. The people who watched the movie that night corrupted their souls. It was worst than watching nude pictures.
  • Ethics is derived from the Greek term "ethos", which means character or custom. - Some people here in the Philippines thought that sharing mp3 files is not unethical while in the US, sharing of mp3 files is strictly prohibited.
  • Ethics is the study of the morality of human actions. - Soldiers are licensed to kill their enemies in combat. It's their duty to defend their country and follow legal orders from their commanding officers. In the morality of human actions, it is ethical.

2. Pick one area of applied ethics(e.g., nursing ethics), study some of its concerns and summarize what you find out.

eHealth Ethics
The goal of the eHealth Code of Ethics is to ensure that people worldwide can confidently and with full understanding of known risks realise the potential of the Internet in managing their own health and the health of those in their care.

The Internet is changing how people give and receive health information and health care. All people who use the Internet for health-related purposes—patients, health care professionals and administrators, researchers, those who create or sell health products or services, and other stakeholders—must join together to create a safe environment and enhance the value of the Internet for meeting health care needs.

Because health information, products, and services have the potential both to improve health and to do harm, organisations and individuals that provide health information on the Internet have obligations to be trustworthy, provide high quality content, protect users’ privacy, and adhere to standards of best practices for online commerce and online professional services in health care.

People who use Internet health sites and services share a responsibility to help assure the value and integrity of the health Internet by exercising judgment in using sites, products, and services, and by providing meaningful feedback about online health information, products, and services.

Health information includes information for staying well, preventing and managing disease, and making other decisions related to health and health care.
  • It includes information for making decisions about health products and health services.
  • It may be in the form of data, text, audio, and/or video.
  • It may involve enhancements through programming and interactivity.
Health products include drugs, medical devices, and other goods used to diagnose and treat illnesses or injuries or to maintain health. Health products include both drugs and medical devices subject to regulatory approval by agencies such as the U.S. Food and Drug Administration or U.K. Medicines Control Agency and vitamin, herbal, or other nutritional supplements and other products not subject to such regulatory oversight.

Health services include specific, personal medical care or advice; management of medical records; communication between health care providers and/or patients and health plans or insurers, or health care facilities regarding treatment decisions, claims, billing for services, etc.; and other services provided to support health care.

Health services also include listserves, bulletin boards, chat rooms, and other online venues for the exchange of health information.

Like health information, health services may be in the form of data, text, audio, and/or video, and may involve enhancements through programming and interactivity.

3. If you will be given the opportunity to formulate at least five ethical norms to govern computing, what would they be? Briefly explain each.

  • No to Piracy

    This includes reproducing, trading, copying, downloading and cracking of licensed and copyrighted media such as softwares, audios and videos without proper consent.

    The ease of this behavior online causes many computer users to forget the seriousness of the offense. As a result of the substantial amounts of money the media (audio, video and software) industry loses each year from piracy.


  • Honesty in sharing of information

    By not knowingly making false statements or providing erroneous information or fail to inform clients, sponsors, or employers of the limitations, conditions and constraints of the system.

    By informing their employers, clients or sponsors of any circumstances that could lead to a conflict of interest.

    By not using their position beyond their authorized limits or by not using their credentials to misrepresent themselves.

    By protecting the public interest and striving to promote understanding of information processing and its application, but will not represent myself as an authority on topics in which I lack competence.


  • Do not abuse Information Technology

    The finite capacity of computers or network systems or softwares by limiting use of computers and network systems so as not to interfere unreasonably with the activity of other users.

    Allowing a file-sharing application, such as KaZaA or Morpheus, to generate a volume of traffic that cripples other users' network access.

    by using computer or network systems or softwares in an appropriate manner.



  • Do not use Information Technology against humanity

    By not using the Internet in to promote pornography, harass or threaten others and the like.

    By using computer systems to promote not against humanity such as mass destruction weapons.



  • Respect others’ right to privacy and confidentiality

    By minimizing data collected about clients, patrons, or users, and by limiting access to, providing proper security for and ensuring proper disposal of such data insofar as it does not conflict with the proper goals and constraints of their organizations.

    By not disclosing information obtained during confidential interviews, except when such disclosure is mandated by law or in accord with proper policies of their employers or the proper rights of their clients.

    By not running a network program to examine or collect data from the network such as userID and Passwords and Bank and Credit Card accounts.

0 Comments:

Post a Comment

<< Home