Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

PROFETH - Computer Ethics & MIS Professionals

Group#5 FINALS
by

Acki Townsend

on 26 September 2012

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of PROFETH - Computer Ethics & MIS Professionals

Computer Ethics
&
Management Information System (MIS) Professionals PROFETH - Values Formation Censorship - To censor something is to look at it more closely, in order to determine whether or not it is obscene, or to ban it if it is obscene. Items such as e-mails, blogs, and spam mail.
The Internet - The internet has brought information to those who never could have accessed it before. By using computers, the user sometimes loses site of what it appropriate behavior. People all over the world can communicate in a matter of minutes, and families can research their heritage from the comfort of home.
In Technological aspects using computers there are many regulations and rules govern in the school and university system. It users must abide by the rules and if they are broken than the user may lose the privileges of there web site and e-mail carrier. The Intersection of Copyright and Computer
Computer Programs
This means that the copyright privileges that literary and artistic works enjoy extend to computer programs as well. Therefore, only the owner of the copyright itself enjoys the exclusive right of authorizing the making available to the public of copies of the computer program in question.
Computer Games
Although the idea for a game is not protected by copyright, the manner of expression of the author (in artistic, literary, or musical form) is.
Works made available to the public on the Internet
the copyrighting of online works, according to the Copyright Law, does not protect ideas, procedures, systems, or methods of operation. This means that once such an online work has been made public, nothing in the copyright laws prevents others from developing another work based on similar principles, or ideas.
Arguments on
Caching - the copying and storing of web pages
MP3’s (MPEG-1 Audio Layer 3) - audio format 2) History
Computer ethics as a field of study was founded by MIT Professor Norbert Wiener during World War two (early 1940’s) while helping to develop an antiaircraft cannon capable of shooting down fast warplanes. Ethics, in the classical sense, refers to the rules and the states governing the conduct of an individual with others. As information technology accelerates, so does the human appetite acquire more knowledge.
In 1950 Wiener published the computer ethics book, “The Human Use of Human Beings”, which not only established him as the founder of computer ethics, but far more important, laid down a comprehensive computer ethics foundation which remains today. In 1960’s computers help make it possible for “big-brother” government agencies to invade others privacy. This became a public worry and led to book, articles, government studies, and proposed privacy legislation. Conclusion/Recommendation

Businesses can use ethical decision making to secure their businesses by making decisions that allow for government agencies to minimize their involvement with the corporation.

Corporate Social Responsibility (CSR)
distracts from the fundamental economic roles of businesses
it is nothing more than superficial window-dressing
it is an attempt to pre-empt the role of government as watchdog over powerful corporations


A significant element of current thinking about privacy, however, stresses “self-regulation” rather than market or government mechanisms for protecting personal information. II. Management Information System (MIS) Professional Ethical Standard for Information System (IS)
Introduction - The IS professional is expected to make the "correct" choice based on professional training.
Obligation to Society
Protect the privacy and confidentiality of all information entrusted to me.
Use my skill and knowledge to inform the public in all areas of my expertise.
To the best of my ability, insure that the products of my work are used in a socially responsible way.
Support, respect, and abide by the appropriate local, state, provincial, and federal laws.
Never misrepresent or withhold information that is germane to a problem or situation of public concern nor will I allow any such known information to remain unchallenged.
Not use knowledge of a confidential or personal nature in any unauthorized manner or to achieve personal gain.
Conclusion/Recommendation
Computers have become one the most powerful technology devices in our world today. The newly emerging field of information technology demonstrates that ethics will be a key factor.
Computers provide us with new capabilities and these in turn give us new choices for action. A central task of computer ethics is to determine what we should do in such case to formulate policies to guide our actions.
Some ethical situations confront us as individuals and some as a society. Computer ethics includes consideration of both personal and social policies for the ethical use of computer technology.
By monitoring the three(3) concepts: a. Copyright and Licensing Issues, b. Censorship and the Internet, and c. Information Privacy. Factors about computer ethics must be address and solved to ensure our constitutional right to privacy. Information Privacy Issues
Need for protection for yourself.
Need to protect your data from strangers.

3 levels of online privacy provided by systems administrators:

Complete Privacy
- The administrators agrees not to read any of your e-mail or keep track of where you go on the web.

Almost Complete Privacy
- The administrators will look at your e-mails and chats if they suspect any sort of illegal activity.

No Privacy
- here administrators are allowed to look at any email you send.
Deontology is the belief that people’s actions are to be guided by moral laws, and that these moral laws are universal.
Utilitarianism is the belief that if an action is good it benefits someone and an action is bad if it harms someone.
Act Utilitarianism is the belief that an action is good if its overall effect is to produce more happiness than unhappiness.
Rule Utilitarianism is the belief that we should adopt a moral rule and if followed by everybody, would lead to a greater level of overall happiness.
Social contract is the concept that for a society to arise and maintain order, a morality based set of rules must be agreed upon. Social contract theory has influenced modern government and is heavily involved with societal law.
Virtue Ethics is the belief that ethics should be more concerned with the character of the moral agent (virtue) 3) Foundation
To understand the foundation of computer ethics, it is important to look into the 5 different schools of ethical theory. Each school of ethics influences a situation in a certain direction and pushes the final outcome of ethical theory.
Relativism is the belief that there are no universal moral norms of right and wrong.
Moral relativism is the idea that each person decides what is right and wrong for them.
Anthropological relativism is the concept of right and wrong is decided by a society’s actual moral belief structure. Without a knowledge of computer ethics, you will not be fully equipped to enter the new world of online society - and you will need to enter that world, whether you choose a career in art, programming, business, or anything else. Three of the more pressing concerns in computer ethics today are questions of copyright, privacy, and censorship.
Computers present us not only with vast new potential in technology, but also in ethics.
Morality must play catch-up to technology that has leap-frogged ahead. Why do we need computer ethics?
the growth of the WWW has created several novel legal issues
the existence of new questions that older laws cannot answer
traditional laws are outdated/anachronistic in this world
a more coherent body of law is needed to govern Internet and computers Obligation to Colleagues and Professionals
Be honest in all my professional relationships.Take appropriate action in regard to any illegal or unethical practices that come to my attention. However, I will bring charges against any person only when I have reasonable basis for believing in the truth of the allegations and without any regard to personal interest.Endeavor to share my special knowledge.Cooperate with others in achieving understanding and in identifying problems.Not use or take credit for the work of others without specific acknowledgement and authorization.Not take advantage of the lack of knowledge or inexperience on the part of others for personal gain.


Organization - Social responsibility is a duty every individual or organization has to perform so as to maintain a balance between the economy and the ecosystem. A trade-off always exists between economic development, in the material sense, and the welfare of the society and environment. Social responsibility means sustaining the equilibrium between the two. It pertains not only to business organizations but also to everyone whose any actions impacts the environment. Obligation to Employers
Make every effort to ensure that I have the most current knowledge and that the proper expertise is available when needed.Avoid conflict of interest and insure that my employer is aware of any potential conflicts.Present a fair, honest, and objective viewpoint.Protect the proper interests of my employer at all times.Protect the privacy and confidentiality of all information entrusted to me.Not misrepresent or withhold information that is germane to the situation.Not attempt to use the resources of my employer for personal gain or for any purpose without proper approval.Not exploit the weakness of a computer system for personal gain or personal satisfaction.



Obligation to Clients
Keep my personal knowledge up-to-date and insure that proper expertise is available when needed.Share my knowledge with others and present factual and objective information to management to the best of my ability.Accept full responsibility for work that I perform.Not misuse the authority entrusted to me.Not misrepresent or withhold information concerning the capabilities of equipment, software or systems.Not take advantage of the lack of knowledge or inexperience on the part of others. 3) Censorship and the Internet
Obscenity - Meriam Webster's for a definition
disgusting to the senses : REPULSIVE   2. a : abhorrent to morality or virtue; specifically : designed to incite to or depravity
containing or being language regarded as taboo in polite usage <obscene lyrics>
repulsive by reason of crass disregard of moral or ethical principles <an obscene misuse of power>
so excessive as to be offensive <obscene wealth> <obscene waste>

“Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.” Copyright Materials and Licensing Issues
1) Copyright
World Intellectual Property Organization (WIPO)
Intellectual Properties
1. literary, artistic, and scientific works 2. performances of performing artists, phonograms, and broadcasts 3. inventions in all fields of human endeavor 4. scientific discoveries.
Copyright is a form of protection provided by laws to the authors of original works, otherwise known as the owners of intellectual property
Works protected under copyright include
1. literary and artistic works, which includes every production in the literary, scientific, and artistic domain, whatever the mode of expression 2. dramatic and dramatico-musical works 3. choreographic works 4. photographic works 5. works of applied art.
It is also generally agreed that the owner of the copyright (and only the owner!) is authorized to do the following with the work:
1. reproduce it 2. prepare derivative works based upon it 3. distribute copies of it to the public 4. perform the work publicly (if applicable) 5. display the work publicly. Introduction to Computer Ethics
Meaning - Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. The term computer ethics was first coined by Dr. Walter Maner, a professor at Boston University. I. Computer Ethics Group #5:
Ilagan-Townsend, Alma Celeste K.
Lajara, Harold
Lajara, Junjun
Mendoza, Dave Edward
Full transcript