ethics objective: describe ethical considerations resulting from technological advances

23
Ethics Objective: Describe ethical considerations resulting from technological advances.

Upload: janis-joseph

Post on 25-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Ethics

Objective:

Describe ethical considerations resulting from technological advances.

Ethics• What is Ethics?

– motivation based on ideas of right and wrong; the philosophical study of moral values and rules

– A set of principles of right conduct. – The rules or standards governing the conduct of a

person or the members of a profession: medical ethics.

– An old adage tells us "Character is what you do when no one is watching."

Definitions from www.dictionary.comOther resource: http://www.cybercitizenship.org/ethics/ethics.html

Ethics in Technology• How do ethics affect technology?• What are some ethical issues dealing with

technology?– Hacking– Privacy– Restricted Sites– Copyright laws– Spreading Viruses– Misuse of Technology– Citing electronic information properly

Upholding Ethics• What is the code of conduct and

unofficial rules that govern online interaction and behavior?

Netiquette

THE TEN COMMANDMENTS FOR COMPUTER ETHICS

from the Computer Ethics Institute

1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not use or copy software for which you have not paid. 7. Thou shalt not use other people's computer resources without

authorization. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you

write. 10. Thou shalt use a computer in ways that show consideration and

respect.

Resource: http://wise.fau.edu/netiquette/net/ten.html

Misuse of Technology• How can people misuse technology?

– Hacking– Viruses– spam– Using others work as their own (breaking

Copyright law)– Others

Hacking• Hacking means illegally accessing other

people's computer systems for destroying, disrupting or carrying out illegal activities on the network or computer systems.

• Examples of Hacking?

Copyright• The legal protection automatically given to

creative products, (such as music, books or paintings), that prevents them from being copied and distributed without permission of the copyright owner. Sending a music file over the Web may be considered a violation of copyright law.

Resource http://www.enquirer.com/editions/2004/03/22/loc_loc1acomp.html

Fair Use• Images or other creative works can be

used for education purposes, like a book report, without permission from the copyright owner.

Resource http://www.enquirer.com/editions/2004/03/22/loc_loc1acomp.html

What is “fair use”?Fair Use is a part of the United States Copyright law. It allows people to use and make copies of copyrighted works if they are using them for:

– criticism,– comment, – news reporting, – teaching, – scholarship, or– research

What is not protected by copyright law?

• Works that have not been written or recorded (your stories, if they are not written down, are not protected by copyright law)

• Ideas, procedures, methods, discoveries

• Works that contain no original authorship (for example: standard calendars, height and weight charts, tape measures and rulers, etc.)

• Lists of data (such as the telephone book)

• Items in the public domain (meaning works that are available for anyone to use. All works created before 1923 and most between 1923-1963 are in the public domain)

• Most U.S. government materials (some items created by contractors for the government might be copyrighted)

• Facts

Before using copyrighted work, ask yourself:

• Is the copying for educational use?• Is the original material mainly facts, not very

original, and published?• Are you using small amounts, not whole

sections? • Is the original material freely available? (Meaning,

the author is not trying to make money on it)

If any answers are “no” – be careful! The use of that work might not fall under “fair use.”

The “Fair Use Guidelines to Educational Multimedia” help us know how much to use…

Motion Media 10% or 3 minutes

Text 10% or 1000 words

Poetry 250 words; no more than 3 poems by same author

Music, Lyrics, Video 10% or 30 seconds

Photos & Illustrations 5 images from one author

Numerical Data Sets 10% of 2500 fields or cells

Use the smallest amount of:

Giving Credit to the Author/Creator

• Always credit the author:– On a “Works Cited” or References page of a

report or presentation, include (if available):• The author’s name

• The title of the work

• The publisher

• The place and date of publication

– List the copyright information underneath any copyrighted images. Example:

© 2002 Author’s Name

Under the image: © Date Company/Person’s Name

© 2002 John Doe

How to Give Acknowledgement for a

Copyrighted Image

Giving Credit to the Author/Creator

• For copyrighted works from a Web site, include:– The Author’s name

– The Title of the Work– The name of the Site– The date it was posted on the Web or revised– The date you obtained the work from the Web– The Web site’s address (URL)

Citing Sources Properly• MLA - Modern Language Association• APA - American Psychological Association • Example of MLA Format

An article in an online journal or magazine

Author(s). "Title of Article." Title of Journal Volume. Issue (Year):

Pages/Paragraphs. Date of Access <electronic address>.

Wheelis, Mark. "Investigating Disease Outbreaks Under a Protocol to the Biological and Toxin Weapons Convention." Emerging Infectious Diseases 6.6 (2000): 33 pars. 5 Dec. 2000 <http://www.cdc.gov/ncidod/eid/vol6no6/wheelis.htm>.

Piracy• The unauthorized duplication and

distribution of copyright-protected software.

• the act of illegally copying software, music, or movies that are copyright-protected

SIIA: Software Information & Industry Association

• 10 Commandments of Software Use

• Software Use Law

• Resource: http://www.siia.net/piracy/education.asp

Activity• Go to the following website:

http://www.siia.net/piracy/faq.asp

• Find a fact on the page that you did not know.

• Then, I will give you time to share your findings with a partner.

Consequences

• Civil – the copyright owner can sue for up to $150,000 for each program copied

• Criminal – in addition to civil consequences, you can be prosecuted and fined up to $250,000 and/or sentenced to jail for up to five years.