Friday, February 11, 2005

SAQ 6-1

B. Pick three of the precepts on computer use discussed above and briefly explain each precept in terms of the theory of ethics and the ethical concepts (discussed in Modules 1-4) that underpin it.

“Thou shalt not use a computer to harm other people.”
“Thou shalt not use a computer to steal.”
“Thou shalt not snoop around in other’s files.”


C. Cite two ethical issues in computing. Explain how they are ethical in nature.

Online Privacy
Information Technology enables data exchange of information on the Internet from anybody, on any locations or parts of the world, at any times. In this situation, there is increased potential for information exposure and violating the privacy of any individuals and groups of people due to its widespread disseminations worldwide. It is our challenge and responsibility to maintain the privacy and integrity of data regarding individuals. This also includes taking precautions to ensure the accuracy of data, as well as protecting it from unauthorized access or accidental disclosure to inappropriate individuals.


System Security and Access Right
Due to the current popularity of E-commerce on the Internet, the topic of computer security and access right has moved rapidly from being a low priority for business institutions and government agencies to a high priority. This interest has been intensified by computer break-ins at places like Microsoft Laboratories, Ebay and NASA in the US. Many attempts of such illegal access to United States government and military computers by computer hackers have been widely reported. Without implementation of proper computer security policies and strategies, network connections on the Internet can’t be made secure from illegal accesses.

D. As a computer user, do you approve of an ordering principle, in the form of legislation, being formulated and enforced to govern computer use? Why? Defend your answer.

Yes!

The growing threat to individuals is beginning to ask for attention in national and international community. In many countries around the world, existing laws are likely to be unenforceable against such crimes. This lack of legal protection means that businesses and governments must rely solely on technical measures to protect themselves from those who would pose false information, from who steal, deny access to, or even destroy valuable information.

Self-protection is not adequate to make Internet a safe place to conduct business. The rule of law must also be enforced. Countries where legal protections are insufficient will become increasingly less able to compete in the new economy. As cyber crime increasingly breaches national borders, nations perceived as havens run the risk of having their electronic messages blocked by the network. National governments should examine their current statutes to determine whether they are sufficient to combat such kinds of crimes (Chan and Camp, 2002). Until now, only few nations have amended their laws to cover computer crimes that need to be addressed. Other countries begin to implement some initiatives, and it is clear that a great deal of additional work and efforts are needed before organizations and individuals can be confident that cyber criminals will think twice before attacking valued systems and information.

New participating countries started generating principles to protect individuals from the potential invasion of privacy that data collection and retrieval poses. These countries have adopted guidelines as statutory law, in whole or in part. The OECD (Organization for Economic Cooperation and Development) in the US has specific
guidelines pertaining to data privacy that directly affect those dealing with Internet data access in general, and those who use so-called "personal data" in particular.

Tuesday, February 08, 2005

SAQ 4 -1

1. Which of the finalist theories appeals to you the most?

Aristotle’s Nicomachean Ethics impresses me most. Unlike Mill’s Ethics and Kant’s Ethics, which only focuses on happiness and good will respectively, Aristotle’s Ethics “considers” wider concept of ethics.

Aristotle’s Ethics adopted the concept of Utilitarianism but of a different way. Actions are utilized as instruments not just for other ends but that are regarded to be of greater value. Aristotle also put into account that man, as a rational being is capable of living a life of reason. Since we endowed with rationality, he pointed out that the life of reason is the happiest.

Central to this ethics is virtue that is categorized in to two types: moral virtue, which is the virtue of character and intellectual virtue, which is the virtue of thought. Both virtues were identified, as activities of the soul that comprises rational and irrational parts.



2. Which do you think seems to predominate in the world of computing, as you know it?

I think Aristotle’s Nicomachean Ethics has predominated the world of computing. In the world of computing, IT professionals and users are stakeholders that interact with each other. These stakeholders are rational beings, which are separated by their reasons want to achieve good lives. Also, computing is a human action and it follows that the norms and standards of morality apply to it. As a result, moral ideals such as righteousness, fairness, goodness and justice apply in the evaluation of computing as human action.