Computer Ethics
Computer Ethics
· Consider the requirements for ethical standards in information technology. Consider the implications both for individuals of the creation and use of the technology and the effect on society.
Ethical standards have been produced to assist users and programmers in the information technology field in making ethical judgments and producing ethical applications. This establishes guidelines and fosters a culture of trust, accountability, integrity, and excellence in resource management. It also encourages information privacy and confidentiality, as well as unauthorised access to computer networks, thereby reducing conflict and dishonesty.Every action we take on the internet generates a trail of data that may be saved and preserved for future use, allowing us to build a digital portfolio. With the lack of ethics as data collection gets increasingly automated, the question of who collects data and what happens to it after it is stored arises. What information should be kept private and what information should be made public? This has an impact on society since anybody may obtain data, and information rules would be non-existent, leaving individuals subject to vulnerability and susceptible too conflicts, among other things including economic injustice.
The effect on the individual can be summarised as the loss of dignity and spontaneity as well as a threat to freedom and right to Privacy.
· Explain why ethical guidelines are needed to guide the creation and use of Information Technology.
Cooperation and trustworthiness among our peers are the best ways of life. When it comes to information, we all have a right to privacy, which may become more mute as more data is collected and made public through technology. IT has the ability to intrude into people's lives and inflict injustice through invasion and exposure of privacy, as well as damaging falsehoods, beyond anything mankind has ever imagined. When individuals evaluate information logically, objectively, and disciplinary, misinformation is less hazardous. However on countless occurrences mankind has not operated in this manor. Therefore to reduce these risks ethical guidelines are needed.
· Study the BCS codes of conduct and practise. Rewrite the four sections of the code of conduct in your own words.
The BCS codes of conduct and practise are (https://www.bcs.org/membership-and-registrations/become-a-member/bcs-code-of-conduct/ ) :
1.Public Interest
2.Professional Competence and Integrity
3.Duty to Relevant Authority
4.Duty to the Profession
1) Public interest
a. As a creator, you have a responsibility to consider public health, privacy, security, and well-being, as well as the environment you've created. Public health should not be damaging and contain misinformation or falsehoods. Privacy should kept and all precautions should be put in place to ensure that information stays private. Security on the internet should be a priority and ensure all users are secure and not susceptible to internet attacks or any other vulnerabilities. The wellbeing of users should not be tarnished, how users entered the page, users should leave. All sensitive media should contain a warning and users should not face discrimination of any sort.
b. take into account other parties' legal rights*
c. Ensure all activities on the internet goes without discrimination based on gender, sexual orientation, marital status, nationality, colour, ethnicity, ethnic origin, religion, age, or handicap, or any other condition or requirement.
d. Encourage equal access to the advantages of information technology and endeavour to promote the inclusion of all segments of society whenever possible.
2)Professional Competence and Integrity
You CAN:
a. Only conduct tasks or deliver services that are within your professional capabilities.
YOU CANNOT:
b. Claim to have a skill you don't have
c. Continue to improve your professional knowledge, abilities, and competence by being informed about technology advancements, processes, and standards that are important to your sector.
d. Ensure that you are familiar with and comprehend laws, and that you follow it while carrying out your professional obligations.
e. Acknowledge and cherish other points of view, and seek, accept, and provide constructive critique on work.
f. Avoid causing harm to others, their property, reputation, or employment by engaging in deceptive, malevolent, or irresponsible behaviour or inaction.
g. Any offer of bribery or unethical inducement will be rejected, and no such offer will be made.
3) Duty to Relevant Authority
YOU CAN:
a. Carry out your professional obligations with care and attention in compliance with the Relevant Authority's standards at all times, while using your professional judgement.
b. Try to stay away from any circumstance where you and your Relevant Authority could have a conflict of interest.
c. Accept professional responsibility for your work and the work of colleagues who are defined as operating under your supervision in a certain setting.
YOU CANNOT:
a. Except with the consent of your Relevant Authority or as required by law, you may not divulge or authorise the disclosure of sensitive information, or use it for personal advantage or to benefit a third party.
b. mislead or conceal information about the performance of products, systems, or services or take advantage of others' lack of relevant expertise or experience.
4)Duty to the Profession
YOU CAN:
a. Accept your own responsibility to protect the profession's reputation and refrain from doing any actions that can jeopardise it.
b.Attempt to strengthen professional standards by participating in their formulation, application, and enforcement.
c.Uphold the reputation and good standing of BCS.
d. Act with integrity and respect in your professional relationships with all members of BCS and with members of other professions with whom you work in a professional capacity.
e. Encourage and support fellow members in their professional development.
Create your own 10 (or 12) ethical commandments of computer technology (include reference to all parts of the computer life cycle, all parts of a networked system and all types of stakeholders
1) Thou shall not use the computer create psychological or physical harm
2) Thou shall not pry around peoples computer files
3) Thou shall not use the computer to steal
4) Thou shall not use the computer to spread falsities
5) Thou shall not copy or use software which you haven't paid for
6) Thou shall not use other peoples computer resources without authorisation
7)Thou must not exploit the intellectual product of others.
8)Thou shalt consider the societal implications of the programme or system thou art programming or constructing.
9)Thou must always utilise a computer with concern and respect for other people.
10) Thou shalt not interfere with other people's computer work.
References
- See Professional Ethics OF IT professional https://www.youtube.com/watch?v=iMIpjLJ_aj8
- See BCS (British Computer Society) Code of Conduct http://www.bcs.org/category/6030
- See BCS (British Computer Society) Code of Practise http://www.bcs.org/upload/pdf/cop.pdf
- See Middlesex University Ethics Framework http://www.mdx.ac.uk/about-us/policies/university-ethics-framework
- See Ethics of Emerging Information and Communication Technologies: On the implementation of responsible research and innovation https://academic.oup.com/spp/article/doi/10.1093/scipol/scw069/2525576/Ethics-of-Emerging-Information-and-Communication
- See Computer Ethics Institute Ten Commandments of Computer Ethics http://computerethicsinstitute.org/images/TheTenCommandmentsOfComputerEthics.pdf
- See https://youtu.be/qFAe1bloldI

Comments
Post a Comment