lo1 This issue concerning whether whether morality exists independently independently of humans -metaphysical issues
This involves arriving at at moral standards that regulate regulate right and wrong wrong conduct. In a sense, it is a search for an ideal litmus test of proper behavior -Normative Ethics
nown as moral philosophy, see!s to address "uestions of morality# morality# right vs. wrong, good vs. bad, etc. -ethics
$rinciple of honesty means does not deceive others. -true
It is the study of the origin and meaning of ethical concepts -%etaethics
$rinciple of autonomy means ac!nowledge a person&s freedom over his'her actions or physical body. -true
Three strategies of Normative Normative Ethics are#are#-(irtue -(irtue Theories,Nonconse"uentialist ,)onse"uentialist Theories
This issue concerning the underlying underlying mental basis of our moral *udgments *udgments and conduct -psychological issues
It can be de+ned as broad preferences concerning appropriate courses of action or outcomes
-values
This is an evaluation of an attitude ob*ect, ranging from extremely negative to extremely positive -attitude
lo rientation that re"uires that employees identify with and commit to speci+ed conduct. -)ompliance orientation
These are often established by professional organiations to help guide members in performing their *ob functions according to sound and consistent ethical principles. -$rofessional Ethics
In what year did IEEE )ode of Ethics adopted by the /merican Institute of Electrical Engineers 0/IEE2 -131
In what year did 4oard of 5irectors approved 6IEEE )ode of Ethics for Engineers72 -1389
)orporate or business ethics with most comprehensive document and it consists of general statements that serve as principles and the basis for the rules of conduct. -)odes of ethics
:oftware engineers shall ensure that their ;;;;;;;;;; and related modi+cations meet the highest professional standards possible. -$roduct
:oftware engineers shall act in a manner that is in the best interests of their ;;;;;;;;; consistent with the public interest.
-)lient and Employer
:oftware engineers shall act consistently with the ;;;;;;;;;; interest. -public
:erves the general public and addresses sta!eholder interests. -:tatement of values
These are formal statements of what an organiation expects in the way of ethical behavior. -)ode of Ethics
In what year did 4oard of 5irectors approved revision to the IEEE )ode of Ethics2 -==>
:oftware engineers shall maintain integrity and independence in their professional ;;;;;;;;;;. -?udgment %ay be centralied 0perhaps temporarily so that top level managers can ensure that ethical decisions are made. -decentralied organiation
rientation that focuses more on an abstract core of ideals such as respect and responsibility. -(alues rientation
In what year did IEEE endorsed 6)anons of Ethics of Engineers7 after /IEE'I
-13>@
%ay be decentralied 0perhaps temporarily so that top level managers can ensure that ethical decisions are made. -decentralied organiation
:oftware engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance. -%anagement
It is a program that create +rm&s ethical climate and helps ensu re that all employees understand the organiation&s values and comply with the policies and codes of conduct. -Ethical $rograms
In what year did 4oard of 5irectors approved simpli+ed IEEE )ode of Ethics2 -1389
lo@ :ome common issues of computer ethics include intellectual property rights such as copyrighted electronic content, privacy concerns, and how computers aAect society. -True
It is sending unsolicited bul! and'or commercial messages over the Internet. -:pamming It is a legal concept, enacted by most governments, giving the creator of original wor! exclusive rights to it, usually for a limited time. -)opyright
It is concerned with standards of conduct as they pertain to computers. It deals with how computing professionals should ma!e decisions regarding professional and social conduct.
-)omputer ethics
4ranch of intellectual property which includes literary and artistic wor!s such as novels, poems and plays, +lms, musical wor!s, artistic wor!s such as drawings, paintings, photographs, sculptures, and architectural designs. -)opyright
Bhile it may be possible to access someone&s personal information on a computer system, computer ethics would advise that such an action is ethical. -Calse
It is usually divided into two branches, namely industrial p roperty which broadly spea!ing protects inventions and copyright, which protects literary and artistic wor!s. -Intellectual property
Ethics, in the classical sense, refers to the rules and standards governing the conduct of an individual with others. -True
/ny computer document produced either by an individual in his private home or in his oDce should remain private. -Cile $rivacy
e was concerned by the unregulated copying of boo!s and passed the Ficensing of the $ress /ct 1>> by /ct of $arliament. - )harles II of England
4ranch of intellectual property which includes inventions 0patents, trademar!s, industrial designs, commercial names, designations and geographic indications 0location speci+c brands etc. -Industrial property
It is about proper ways in which to use a networ! and to determine whether information is reliable, while emphasiing four important points given in next slides. -Neti"uette
It is morally bad when someone reproduces a copy of the software and sells it for pro+t, produces exactly the same or similar version without giving proper credit to the original author, or simply produces it and distributes it to others. -:oftware piracy
/s technology and computers became more and more a part of our everyday lives, and since the introduction of the Borld Bide Beb, the de+nition of ethics has evolved, too. / new type of ethics !nown as computer ethics has emerged. -Calse
It is morally bad when it is intended for malicious purposes li!e to steal information or destroying of data. -)reation of worms and computer viruses
lo9 It is the ability to responsible, creatively, and eAectively use appropriate technology to improve and enhance learning in all sub*ect areas and experiences. -Technology Fiteracy
It is a phrase used to describe the use of Internet based attac!s in terrorist activities, including acts of deliberate, large-scale disruption of computer networ!s, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. -)yber Terrorism
It refers to the gap between those that have 0or lac! access to computers and the Internet. -5igital 5ivide This is altering raw data *ust before a computer processes it and then changing it bac! after the processing is completed.
-5ata 5iddling
It focuses on how information and communication technology 0I)T aAects individuals, communities and countries. - 5igital inclusion
The computer is Gooded with more re"uests than it can handle which cause it to crash. ;;;;;;;;;; attac! is an example. -5enial of :ervice
It is an unlawful act wherein the computer is either a tool or a target or both. - )ybercrime
It refers to the receipt of unsolicited emails by customers of Cinancial Institutions, re"uesting them to enter their Hsername, $assword or other personal information to access their /ccount for some reasons. - $hishing
These are programs that attach themselves to a computer or a +le and then circulate themselves to other +les and to other computers on a networ!. -(iruses
Hnauthoried access to any computer systems or networ!s is !nown as ;;;;;;;;;;. That is accessing the information of others without proper authoriation. -ac!ing
It is the use of electronic messaging systems to send unsolicited bul! messages, especially advertising, indiscriminately. -:pamming
In these !inds of oAences the hac!er gains access and control over the website of another. e may even manipulate or change the information of the website. This may be done for ful+lling political ob*ectives or for money.
-Beb ?ac!ing
It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing. - Email 4ombing They do not need the host to attach themselves to. They merely ma!e functional copies of themselves and do this repeatedly till they eat up all the available space on the computers memory. -Borms
In software +eld this means an unauthoried program, which passively gains control over anothers computer by representing itself as an authoried program. -Tro*an /ttac!s Jeremy Bentham’s advice on pursuing pleasure is called _________.
-calculus He believed no one would knowingly operate against their best interests, and those that did were clearly ignorant of what their best interests were. -plato t includes things such as decorative clothing, e!otic foods, etc. -vain desire "heory asserts that the empirical conse#uences of any given act have nothing to do with the moral worth of the act. -conse#uentialism t is a theory of moral philosophy that is based on the principle that an action is morally right if it produces a greater #uantity of good or happiness than any other possible action. -utilitarianism He sought to rewrite utilitarianism in such a way that he would be able to demonstrate that $hakespeare outranked push-pins. -%ohn stuart mil t says that no act is good or bad in and of itself& rather it is good or bad only in terms of its conse#uences. -conse#uentialism t breaks down even further into two subcategories' necessary (food, sleep, etc.) and unnecessary (se!ual desires, etc.)
-natural desire t argues that every act is motivated by self-interest. Humanity doesn’t have a choice * we simply operate this way. * +sycho He is concerned that a utilitarian might actually conclude that a game of push-pin really was better than poetry. -%ohn stuart mil He claimed that no act should be undertaken e!cept for the pleasure which results, and no act should be re%ected but for the pain it produces. -epicurus t argues that every act ought to be motivated by self-interest. t concludes that acting in self-interest is the best motivator. -psychological He is the father of utilitarianism. -%eremy He is a psychological egoist * believing that egoism is merely a biological fact. -thomas o "his is altering raw data %ust before a computer processes it and then changing it back after the processing is completed. -data diddling t is the use of electronic messaging systems to send unsolicited bulk messages, especially advertising, indiscriminately. -spamming t is an unlawful act wherein the computer is either a tool or a target or both. -cybercrime t refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing. -email bombing
These are programs that attach themselves to a computer or a +le and then circulate themselves to other +les and to other computers on a networ!. -(iruses t is the ability to responsible, creatively, and effectively use appropriate technology to improve and enhance learning in all sub%ect areas and e!periences.
-technology letiracy t focuses on how information and communication technology (") affects individuals, communities and countries. * social t refers to the gap between those that have (or lack) access to computers and the nternet. -digital divide