Computer Ethics Fundamentals

Learners Coach
29 Jun 202227:26

Summary

TLDRThis video script delves into the realm of computer ethics, exploring the moral principles guiding behavior in digital environments. It discusses ethical philosophies, the importance of netiquette, and the ethical dilemmas arising from technology use. The script emphasizes the need for ethical conduct online, including respecting intellectual property and privacy, and highlights the Computer Ethics Institute's 10 commandments to foster responsible computer use.

Takeaways

  • 💻 Computer ethics involves moral principles guiding behavior while using computers and related technologies like the internet.
  • 🔍 Ethics is about principles of right and wrong, influencing how individuals act as moral agents within society.
  • 🤔 Ethical philosophies such as egoism, natural law, utilitarianism, and respect for persons are fundamental to understanding ethics.
  • 🌐 Internet ethics pertains to acceptable behavior online, emphasizing honesty and informed consent when using the internet for various tasks.
  • 💾 Computer ethics is a social contract of technology, aiming to formulate policies for fair use of technology for the greater good.
  • 🔑 Ethical dilemmas arise from the use of technology, often involving conflicts between moral imperatives and potential negative impacts on society.
  • 📧 Online communication should follow netiquette, which includes being respectful, avoiding shouting or sarcasm, and not sharing private information.
  • 🤝 The practice of behaving ethically online is crucial for maintaining a respectful and safe digital environment.
  • 🛡️ Security and ethics are intertwined; unethical practices like hacking and cyber theft compromise the ethical use of computers.
  • 🚫 Computer abuse, including hacking, piracy, and unauthorized use of resources, is against the principles of computer ethics.
  • 🔒 Privacy is a significant concern in computer ethics, requiring the protection of data and the use of security measures to prevent unauthorized access.

Q & A

  • What is the definition of computer ethics?

    -Computer ethics refers to the moral principles guiding how individuals should behave while using computers, including aspects related to network and internet use.

  • Why is it important to understand the origin of ethics when discussing computer ethics?

    -Understanding the origin of ethics provides a foundation for the ethical philosophies that influence how we should behave when using computers and technology responsibly.

  • What are the four ethical philosophies highlighted in the script?

    -The four ethical philosophies mentioned are egoism, natural law, utilitarianism, and respect for persons.

  • What is the significance of the term 'netiquette' in the context of computer ethics?

    -Netiquette refers to the correct or acceptable way of communicating or behaving on the internet, which is an important aspect of practicing ethical online behavior.

  • What is an ethical dilemma in the context of computer ethics?

    -An ethical dilemma in computer ethics is a complex situation involving a conflict between moral imperatives, where obeying one principle may mean transgressing another.

  • Why is it considered unethical to download pirated files from the internet?

    -Downloading pirated files is unethical as it violates intellectual property rights and can lead to legal consequences and harm to content creators.

  • What are some examples of computer abuse or crime that go against computer ethics?

    -Examples of computer abuse or crime include hacking, cyber theft, unauthorized access to confidential information, and the use of malware.

  • What is the importance of privacy in the context of computer ethics?

    -Privacy is crucial in computer ethics as it involves protecting personal data and preventing unauthorized access, which are fundamental to maintaining trust and security in digital environments.

  • What are the '10 commandments of computer ethics' as mentioned in the script?

    -The '10 commandments of computer ethics' are a set of principles from the Computer Ethics Institute that guide ethical behavior, such as not using computers to harm others, respecting others' work and privacy, and considering the consequences of one's actions.

  • How can individuals promote ethical behavior in the use of technology?

    -Individuals can promote ethical behavior by acting with integrity, respecting privacy and confidentiality, not exploiting system weaknesses, adhering to high standards, and following guidelines that ensure consideration and respect for fellow humans.

Outlines

00:00

🤖 Introduction to Computer Ethics

The first paragraph introduces the concept of computer ethics, which is about understanding moral principles and proper behavior when using computers. It emphasizes the broad scope of computer ethics, including aspects related to networks and the internet. The paragraph also explains the term 'ethics' as principles of right and wrong, and how it guides individual behavior. It introduces various ethical philosophies such as egoism, natural law, utilitarianism, and respect for persons, which are essential to consider when discussing computer ethics.

05:02

👥 Social Impact and Ethical Dilemmas of Technology

This paragraph delves into the social contract of computer technology, highlighting how technology impacts society and the ethical dilemmas it introduces. It discusses the concept of ethical dilemmas, where the use of technology can lead to conflicts between moral imperatives. Examples include downloading files with viruses, unwanted emails due to sharing personal information, and the balance between discussion and bullying online. The paragraph underscores the importance of understanding and navigating these dilemmas in the context of computer ethics.

10:04

🎨 Balancing Creativity with Honesty Online

The third paragraph focuses on the ethical challenges of creativity online, such as the misuse of Photoshop to create misleading images. It stresses the importance of netiquette, which is the acceptable way of behaving on the internet, including being respectful, avoiding shouting and sarcasm, and not sharing private information. The paragraph also introduces the 'THINK' approach to online sharing, encouraging users to consider truthfulness, helpfulness, inspiration, necessity, and kindness before posting or sharing content.

15:06

🛡️ Security and Ethics: Protecting Privacy and Data

This paragraph discusses the intersection of computer security and ethics, particularly the impact of hackers and malicious software on ethical computer use. It covers various unethical practices such as computer abuse, crime, hacking, piracy, and unauthorized use of computer resources. The paragraph also addresses the importance of protecting intellectual property and the availability of open-source alternatives to proprietary software, emphasizing the need for ethical behavior in the digital realm.

20:08

🛑 Combating Viruses and Upholding Data Privacy

The fifth paragraph addresses the issue of computer viruses and the importance of privacy in the context of computer ethics. It suggests using anti-malware software to combat viruses and stresses the need for strong passwords and secure networks to protect personal data. The paragraph outlines ethical principles of technology, including proportionality, informed consent, justice, and minimizing risks, advocating for integrity and the protection of information privacy and confidentiality.

25:10

📜 The Ten Commandments of Computer Ethics

The final paragraph summarizes the '10 Commandments of Computer Ethics' as guidelines for ethical behavior in the use of computers and the internet. These commandments include not using computers to harm others, respecting others' work, not stealing or snooping, avoiding unauthorized use of resources, and considering the consequences of one's actions. The paragraph concludes by emphasizing respect for fellow humans as a fundamental aspect of computer ethics.

Mindmap

Keywords

💡Computer Ethics

Computer Ethics refers to the moral principles that guide how individuals should behave while using computers and related technologies. It is central to the video's theme, emphasizing the importance of ethical conduct in the digital age. The script discusses various aspects of computer ethics, including intellectual property, computer abuse, and the impact of technology on society.

💡Ethics

Ethics is defined as a set of principles that determine right and wrong, influencing how individuals should act. In the video, ethics serves as the foundation for discussing computer ethics, highlighting the need for ethical behavior in the use of technology. The script explains ethics in the context of guiding behaviors and aligning them with societal standards.

💡Intellectual Property

Intellectual Property (IP) pertains to creations of the mind, such as inventions, literary and artistic works, and symbols, names, and images used in commerce. The video script addresses the ethical implications of respecting IP in the context of computer ethics, such as avoiding piracy and respecting copyrights and patents.

💡Computer Abuse

Computer Abuse involves the misuse of computer systems to perform illegal or unethical actions. The script identifies computer abuse as a key issue in computer ethics, including activities like hacking, cyber theft, and the unauthorized use of computer resources, which are all unethical behaviors in the digital environment.

💡Ethical Philosophies

Ethical Philosophies are fundamental theories that underpin the understanding of ethics. The video script outlines several philosophies such as egoism, natural law, utilitarianism, and respect for persons, which provide a framework for discussing the ethical use of computers and the dilemmas that may arise.

💡Internet Ethics

Internet Ethics is a subset of computer ethics that specifically deals with the acceptable behavior when using the internet. The script discusses the importance of honesty, informed consent, and respecting privacy in online interactions, emphasizing the need for ethical conduct in digital communication.

💡Ethical Dilemma

An Ethical Dilemma is a complex situation where moral imperatives conflict, making it difficult to determine the right course of action. The video script uses examples such as spam emails, online bullying, and the use of photoshopped images to illustrate the ethical dilemmas that can arise from the use of technology.

💡Netiquette

Netiquette refers to the etiquette of the internet, defining the acceptable ways of communicating and behaving online. The video script provides guidelines for netiquette, such as being respectful, avoiding shouting and sarcasm, and not sharing private information, to promote ethical online interactions.

💡Privacy

Privacy is the state or condition of limited access to a person's data, personal life, or information. The script discusses privacy issues within computer ethics, stressing the importance of protecting personal data and using security measures like strong passwords and VPNs to prevent unauthorized access.

💡Open Source

Open Source refers to software whose source code is made available to the public, allowing anyone to view, use, modify, and distribute it without infringing on proprietary rights. The video script mentions open source as an alternative to proprietary software for ethical use, respecting intellectual property rights.

Highlights

Definition of computer ethics as moral principles guiding behavior while using computers.

Broad scope of computer ethics including network and internet-related aspects.

Ethics defined as principles of right and wrong, guiding individual behavior.

Origin of ethics explored with various ethical philosophies highlighted.

Egoism, natural law, utilitarianism, and respect for persons as key ethical philosophies.

Importance of respecting intellectual property within computer ethics.

Ethical dilemmas introduced by technology use, such as viruses and hackers.

Netiquette defined as the practice of ethical behavior online.

Guidelines for online communication including respect, avoiding shouting, and not sharing private information.

THINK acronym for responsible social media sharing: True, Helpful, Inspiring, Necessary, and Kind.

Computer crime and abuse as unethical behaviors, including hacking and cyber theft.

The role of security in ensuring ethical computer use, such as protecting against malware.

Privacy issues in computer ethics, emphasizing the need for strong passwords and VPNs.

Ethical principles of technology including proportionality, informed consent, and justice.

Actionable steps to promote ethical behavior, such as acting with integrity and protecting privacy.

Computer Ethics Institute's 10 commandments as a guide for ethical computer use.

Emphasis on considering the human aspect and fellow humans in all computer-related decisions.

Transcripts

play00:01

hi lana hello and welcome once again to

play00:03

learners coach so we're going to

play00:05

basically look at a computer ethics yeah

play00:08

so what is computer ethics right so

play00:11

we're going to look at the moral

play00:14

principles or actually how we need to

play00:17

behave

play00:18

while using computers so when defining

play00:22

the term computer ethics we need also to

play00:24

understand

play00:25

all those related aspects of computer

play00:28

talk about network

play00:30

internet

play00:31

right because all these things are

play00:32

related to the computer so computer

play00:34

ethics is very broad so we're going to

play00:36

really look at

play00:37

issues

play00:38

that affects how we

play00:40

use the computer like for example you

play00:42

have intellectual property

play00:44

computer abuse what are these in

play00:46

relation to computer ethics but first we

play00:49

need to define the term ethics so

play00:53

ethics is actually

play00:56

a principle of right and wrong yeah from

play00:59

where you're seated or where you're

play01:01

standing someone is going to tell you

play01:03

whether you are behaving ethically or

play01:06

your behaviors are

play01:07

unethical right does your behavior

play01:11

actually

play01:12

resonate well with the required

play01:15

standards yeah so ethics are used by

play01:17

individuals right as a free moral agent

play01:21

yeah

play01:22

basically just to give us some standard

play01:24

to guide our behaviors so in this

play01:26

particular topic we are going to look at

play01:29

how

play01:29

we need to ethically use computers right

play01:33

so if we are not using it in the proper

play01:35

way then chances are we are not

play01:37

uh behaving ethically towards the use of

play01:40

computers right

play01:42

now we can't really proceed with this

play01:43

particular topic

play01:45

without understanding

play01:46

the origin of ethics so we have to look

play01:49

at the ethical philosophies so since

play01:52

you're not going to look at the

play01:54

various theories in details we're just

play01:57

going to highlight so that you

play01:58

understand

play02:00

what ethics are so we have the first

play02:02

theory of philosophy which is egoism

play02:06

which tries to understand what is good

play02:08

and is what is right

play02:10

for you

play02:11

right and of course you have the natural

play02:13

law that needs to apply right

play02:15

in any occasion we should endeavor as

play02:18

human beings to promote our own

play02:21

good practices health and

play02:24

generally in life

play02:26

also of course we have another the third

play02:28

one which is very common this is you

play02:30

literally terrorism

play02:33

which is actually

play02:34

practicing the greatest good

play02:36

for a greater number of people within

play02:39

the society so where you are ensure that

play02:42

at least you influence people positively

play02:44

and of course respects for persons is

play02:48

another philosophy which is added to

play02:49

these three common ones

play02:51

people are not just the end

play02:54

and people are an end but not

play02:57

just a means right so

play02:59

any behavior any actions that you're

play03:02

promoting

play03:03

for example if you're developing a

play03:05

software for instance you need to

play03:07

understand the effects that they have

play03:10

uh on this particular people right

play03:13

whether it's going to

play03:15

affect them negatively or positively so

play03:18

respect for persons

play03:19

is another philosophy that you need to

play03:21

understand so having highlighted these

play03:24

key ethical philosophies now then we

play03:26

need to really understand the various

play03:29

dimensions

play03:30

of ethics so here as i mentioned we are

play03:33

going to look at computer and internet

play03:36

ethics because they are closely related

play03:40

uh when talk about internet ethics it

play03:43

means the acceptable or the recommended

play03:46

behavior when you're using

play03:49

the networks or the internet right

play03:52

like

play03:53

how

play03:54

do you

play03:55

use internet for example for your school

play03:58

related purposes or

play04:00

tasks do you watch movies for example is

play04:03

it ethical right so internet users

play04:05

should observe honesty actually at all

play04:07

time when performing different tasks

play04:10

either if you are communicating

play04:13

whether you're downloading some files

play04:15

you need to ensure that

play04:16

whatever

play04:18

files you're downloading are actually

play04:20

not maybe pirated for instance yeah so

play04:22

you need to have some informed consent

play04:25

of information or data that you collect

play04:28

within the internet so it's very very

play04:30

important for us to understand how

play04:33

to

play04:34

behave ethically

play04:36

online the other dimension

play04:38

of understanding ethics is the computer

play04:40

itself right

play04:42

because

play04:43

before we if we can't really understand

play04:45

uh the building blocks of

play04:48

how we can ethically use the computer

play04:51

then what follows that you can't really

play04:53

respect

play04:54

are the use of maybe other angles of

play04:56

computer such as networks

play04:59

information

play05:01

internet and so on so computer ethics

play05:04

basically is a social contact of

play05:05

computer technology

play05:07

that is

play05:08

equivalent uh to the formulation

play05:11

explanation basically this is a policy

play05:13

for the fair use of what

play05:15

uh technologies around us right

play05:18

so it's ethic is broad

play05:21

it it is like understanding how we

play05:24

behave within a society right

play05:27

so

play05:28

ethics cover both social

play05:29

as well as individual policies right for

play05:32

the greater good of use of

play05:34

uh technology now when you talk about

play05:37

technology or computer we need to

play05:39

understand that

play05:41

a technology always creates some kind of

play05:43

ripple effects

play05:45

in our society right

play05:47

and once it creates these particular

play05:49

ripple effects we are always often

play05:52

disorganized or we don't know how to use

play05:55

these technologies so that's why we are

play05:57

always in a state of dilemma and i think

play06:00

we are going to mention what ethical

play06:02

dilemma is

play06:04

right so what is ethical dilemma

play06:07

right so the use of technology has

play06:10

introduced

play06:11

different

play06:12

dimensions of ethical dilemmas

play06:16

that are

play06:17

very unique

play06:18

uh some of us we don't understand that

play06:20

when you use a particular technology it

play06:23

could have some kind of positive or

play06:25

negative impact either to the society

play06:29

or to our friends that we associate with

play06:32

right now doing one thing in a setup for

play06:36

example someone is going to ask you to

play06:39

maybe

play06:40

uh download a particular file right

play06:43

to achieve something right now

play06:46

downloading the file could be maybe

play06:48

something that you're doing generally

play06:50

without an issue right

play06:52

but again after downloading the file you

play06:54

realize that the file has what it has

play06:57

viruses all right

play06:58

so

play06:59

do we stop downloading files no we can't

play07:02

we need to actually have the information

play07:04

right or don't do we stop accessing the

play07:07

internet because of maybe

play07:09

these

play07:10

hackers

play07:11

so

play07:12

we are often

play07:14

placed at a crossroads

play07:16

like using technology always create some

play07:20

harmful impact or a negative impact to

play07:23

ourselves

play07:24

so we always left to have some kind of

play07:27

dynamic i think it's a complex situation

play07:30

that often involves an apparent mental

play07:32

conflict

play07:33

between moral

play07:35

imperatives in which obey one

play07:38

would mean actually transgressing

play07:40

another

play07:41

examples of ethical dilemma are very

play07:44

many right i've just captured a few

play07:47

right like for example when you visit uh

play07:49

some websites

play07:51

uh you

play07:52

will often be required to

play07:54

give your

play07:56

emails right this could in turn

play08:00

lead to some

play08:01

unwanted mails to your inbox right now

play08:04

it's a good thing to share your emails

play08:06

with the respect uh with their

play08:08

respective

play08:10

organizations so that they send you the

play08:12

product updates and the services right

play08:14

but if this now becomes

play08:17

uh too much on your inbox the emails

play08:19

becomes too much in your inbox then it

play08:22

now leaves us to wonder is it really a

play08:25

must

play08:26

for us to have our emails being

play08:30

used for marketing purposes right so we

play08:32

need to ask ourselves

play08:34

at what point is it on honest

play08:37

marketing and that

play08:38

what determines threshold of spamming so

play08:42

spamming normally are referred to as

play08:45

the unwanted emails right so every time

play08:48

you visit website and you give out your

play08:50

email just as a they'll

play08:53

send you some

play08:54

uh maybe particular product updates

play08:57

so

play08:58

you know that spam or the spam mails

play09:01

normally occupy

play09:03

the space of our inbox so ideally we'll

play09:07

be running out of space

play09:08

for not having the right emails so it's

play09:11

on problems at the level

play09:13

we are also having another dilemma such

play09:15

as discussion versus bullying

play09:18

ideally we need to join forums we need

play09:21

to join discussion groups right

play09:24

to look for

play09:25

some information to collaborate which is

play09:27

a good thing but there is high tendency

play09:30

of people taking

play09:32

this particular

play09:35

discussions for their own inten uh ill

play09:39

intentions uh like for example they

play09:41

start bullying people yeah uh having the

play09:45

discussion taking another direction so

play09:47

ideally what you are going there to

play09:49

achieve is not really what

play09:51

uh you are going to get

play09:53

so

play09:54

the discussion might spiral out of

play09:56

control and

play09:57

maybe lead to some kind of bully

play10:00

so

play10:01

this is another ethical dilemma and of

play10:03

course we have the creativity versus

play10:06

outright lies

play10:08

you are a good designer you love using

play10:11

photoshop right which is a good thing

play10:14

using technology yeah but

play10:16

ideally being creative doesn't really

play10:19

give you that authority to have or

play10:22

present some situation

play10:24

uh that are not

play10:26

real

play10:27

right so most people normally

play10:29

use this particular creativity to maybe

play10:32

promote some kind of lies which is not

play10:35

good

play10:36

so we should

play10:37

uh maybe try to balance

play10:41

because at what point do we stop maybe

play10:43

or understand that presenting this

play10:45

information is just beyond creativity it

play10:49

could lead to other people's problems

play10:51

yeah take a situation whereby someone is

play10:53

going to photoshop you with maybe

play10:55

uh some unwanted person in the society

play10:57

yeah so before people realize that this

play10:59

is just some kind of photoshop

play11:01

maybe harm has been caused so

play11:03

it also brings some kind of

play11:05

ethical

play11:07

dilemma all right so within the span of

play11:10

online communication we need to be

play11:12

guided because we need to behave

play11:15

ethically online and i think this is a

play11:17

very

play11:18

important aspect of computer ethics or

play11:21

internet ethics

play11:23

the practice of behaving ethically

play11:27

online is what we normally refer to as

play11:29

netiquette

play11:30

netiquette yeah

play11:32

of course you're going to look at it uh

play11:34

from

play11:35

the common understanding online

play11:37

etiquette so online etiquette is the

play11:39

correct or acceptable way of

play11:41

communicating or behaving on the

play11:43

internet

play11:45

behaviors are simple as maybe posting a

play11:48

comment on your social profile right

play11:50

commenting on someone's blog those are

play11:54

ways or even sending emails at your

play11:57

friends right so we need to observe the

play11:59

following you need to be respectful

play12:01

that's number one right

play12:03

uh most people don't want to tell her

play12:05

can't tell you something face to face

play12:08

they often

play12:09

decide to go behind your back and post

play12:12

them online yeah so that's not being

play12:15

respectful we normally say if you can't

play12:17

tell someone

play12:19

uh face to face

play12:21

uh kindly don't go ahead and post it

play12:24

online right

play12:25

do not shout that's the second way of

play12:28

observing etiquette

play12:31

shouting simply means i may be using

play12:33

uppercase

play12:35

letters when you're communicating for

play12:37

example

play12:38

uh within your email yeah or

play12:41

simply using strong language

play12:43

yeah and a lot of exclamation points

play12:46

right

play12:47

so it presents some kind of shout yeah

play12:50

yeah it's tell someone that maybe you're

play12:52

annoyed and you're angry i mean those

play12:54

are things that you need to avoid

play12:57

uh don't be funny

play12:59

when you're communicating online

play13:01

or sarcastic for that matter sometimes

play13:04

people who receive

play13:06

our

play13:07

information might not understand

play13:10

the fun part of it right so try to avoid

play13:13

these and maybe

play13:16

be careful with your humor

play13:18

and circles or when you're using them

play13:20

online

play13:22

also avoid too much text speak when

play13:25

you're communicating right uh just

play13:27

follow the normal formal

play13:30

grammar and punctuation rules

play13:32

right when you're communicating for

play13:34

example and using email

play13:36

it's very very difficult uh to maybe

play13:39

allow your recipient to break down text

play13:42

speak yeah so if maybe a boss or you may

play13:46

be a supervisor or some kind of

play13:48

colleague

play13:49

i expect an email from you

play13:51

just be formal avoid use of text to

play13:54

speak and of course do not post

play13:58

very private information online or even

play14:01

share truly truly i say unto you there's

play14:04

nothing that is private online right in

play14:07

as much as we normally say that our data

play14:10

is safe only but chances are it could

play14:13

leak to someone on someone's someone can

play14:15

always use it

play14:17

for their own purposes so i think those

play14:19

are the key observations that you can

play14:21

always make within

play14:23

uh online so in an action

play14:27

when we are using the social media

play14:29

before we post anything on this social

play14:31

media before we communicate

play14:33

we need to use the think

play14:35

keyword right

play14:37

think here means t stanford is it true

play14:40

we need to think if it is true before

play14:43

you post it or share it

play14:45

uh is it helpful h right

play14:48

is it really going to be helpful before

play14:50

we post it or share it

play14:52

is it going to be inspiring is it going

play14:54

to change someone's life in a way before

play14:57

you really

play14:58

share it

play14:59

and here is it necessary in the first

play15:02

place or you can just stay with it right

play15:06

and of course lastly is it kind right

play15:09

now most of us we normally have that

play15:11

urge right the feeling of sharing

play15:14

information within our social media

play15:17

right i think it's high time we take a

play15:19

break

play15:20

see whether

play15:22

these particular things that we're

play15:23

sharing

play15:24

are going to have some a negative impact

play15:28

right on the people are going to receive

play15:30

or read them and so on so we should be

play15:32

guided by think right as you proceed

play15:36

now

play15:37

as i said that there's a meeting point

play15:40

between the security aspect and the

play15:43

ethics right like for example

play15:47

when you have

play15:48

the hackers or we have some kind of

play15:52

militias

play15:53

softwares

play15:54

are being used

play15:56

within our computers

play15:57

then high chances are going to

play15:59

compromise

play16:01

the ethics or how we use computers

play16:03

ethically right it could comprise

play16:05

confidentiality what we refer to as

play16:08

privacy it could promote crime

play16:11

right it could affect

play16:13

maybe some kind of our normal practices

play16:18

and so on so as we look forward on

play16:21

understanding what computer ethics is

play16:23

all about

play16:24

we can't really leave the security angle

play16:27

behind right

play16:29

so the key issues could as we have seen

play16:32

could

play16:33

result into crime

play16:35

privacy effects

play16:37

right

play16:38

and so on so let's look at them one by

play16:40

one

play16:41

like computer abuse

play16:43

or crime is not something that

play16:46

is

play16:46

ethical

play16:48

these are an ethical behaviors

play16:50

that are always promoted right

play16:53

so people use this uh computer to steal

play16:56

that is not acceptable yeah when people

play16:59

go

play17:00

and access confidential information yeah

play17:04

and they're not

play17:05

authorized that is not acceptable and of

play17:08

course a booty in the system that is a

play17:10

crime right so

play17:12

computer crime comprises of different uh

play17:15

concepts like hacking is one major one

play17:19

a piracy is another one

play17:21

all these are not ethical right they

play17:24

affect how we ethically use

play17:27

the computer

play17:28

and authorized users at work cyber theft

play17:31

yeah

play17:32

so like hacking

play17:33

this is not a good thing to practice

play17:36

right

play17:38

uh we don't really require an authorized

play17:41

users to access

play17:42

our networks our data our

play17:45

so the hackers normally use different

play17:47

strategies

play17:49

that we need to avoid

play17:51

like they always use some kind of

play17:52

malwares

play17:54

yeah to practice fishing that is email

play17:56

fishing spoofing use of trojan horses

play17:59

these are things that

play18:01

we can always

play18:03

avoid through

play18:04

right practices

play18:06

cyber theft is another way of

play18:09

compromising the ethical use of our

play18:11

computers

play18:12

right like someone who doesn't have the

play18:15

right uh credentials accessing our

play18:18

computers

play18:19

an authorized user who has stolen your

play18:23

identity right and they're using it for

play18:26

their own

play18:28

purpose

play18:29

then we have this concept which is not

play18:32

also a good practice

play18:34

of using computers

play18:36

like for example an authorized use of

play18:38

computers at work or

play18:40

resources for that matter yeah

play18:43

for instance

play18:44

when you're doing private consulting

play18:46

yeah it's not ethical playing games is

play18:49

not a good thing

play18:51

yeah wing pornography circulating i mean

play18:53

hunting for jobs all these are an

play18:56

authorized use of computers at work or

play18:59

any given computer resource so you

play19:01

shouldn't actually

play19:03

uh prevent or stop them right

play19:06

a piracy of intellectual property is

play19:08

against the moral values of how we use

play19:12

the computers right why do you pilot

play19:15

someone's

play19:17

software for example right

play19:19

so all these particular inventions

play19:23

uh

play19:25

i mean creativities from individuals

play19:27

need to be protected

play19:29

by the copyrights

play19:31

or the patents so if someone has their

play19:34

own

play19:35

creativity or creations or actually

play19:38

the inventions we need to respect them

play19:42

so pirating

play19:43

of intellectual property is not ethical

play19:47

this spirited concept properties could

play19:50

be music videos and so on so these are

play19:52

things that

play19:53

we really need to

play19:55

avoid now the good thing

play19:57

is that

play19:58

you're not really

play20:00

forced to use

play20:02

the proprietary softwares if you can't

play20:04

purchase the licenses we always have

play20:08

the other options open source

play20:10

that you can always

play20:12

download for free without infringing on

play20:15

these intellectual property rights our

play20:17

viruses are also

play20:19

a very bad way of actually ensuring that

play20:22

compromise

play20:24

uh

play20:24

ethical use of

play20:26

computers right so it's introducing

play20:29

rogue programs that should create

play20:31

themselves within our computers

play20:33

destroying data

play20:35

and causing some kind of disruption

play20:38

is not good so computer viruses

play20:41

are we need to actually

play20:43

stop them or eliminate them we can

play20:45

always use

play20:46

anti-malware's or antiviruses to

play20:49

eradicate them

play20:51

another concern when it comes to

play20:52

computer ethics is privacy issues right

play20:56

we need to protect our data ensure that

play20:59

you have strong passwords

play21:01

maybe work behind a firewall if you are

play21:04

communicating remotely use a virtual

play21:06

private network right so that will stop

play21:09

people from

play21:10

intercepting or if it's dropping you're

play21:14

on

play21:14

private uh information right like

play21:17

contents of the emails

play21:19

uh getting to know

play21:21

about the customer information these are

play21:24

not allowed

play21:25

and it's not a good practice

play21:28

so some guidelines or what you refer to

play21:30

as the ethical principles of technology

play21:33

yeah number one we look at

play21:34

proportionality

play21:36

the good of the technology must outweigh

play21:39

the harm or risk that it really brings

play21:42

on board so we should endeavor to

play21:45

actually positively use

play21:47

or maximize

play21:49

the use of computers in

play21:52

a proper manner rather than just looking

play21:54

around the locals

play21:56

the design flaws

play21:58

just to ensure that you can always cause

play21:59

harm no that is not the right second

play22:02

informed concept

play22:04

we have just looked at the intellectual

play22:05

property yeah obeying or respecting it

play22:08

so every time you want to access

play22:10

someone's innovations or other creations

play22:13

i'll try to ask for permission the first

play22:16

place

play22:17

you can also refer to that particular

play22:19

have some references to avoid plagiarism

play22:22

and so on and of course you have justice

play22:24

every participant they beat the person

play22:28

who is affected and the person who has

play22:30

actually caused the harm they need to

play22:33

have some benefits and burdens

play22:35

distributed fairly

play22:37

amongst them so if someone has crossed

play22:41

the intellectual property or has caused

play22:43

some kind of uh

play22:45

harm

play22:46

they need to be punished

play22:48

fairly

play22:49

right

play22:50

and of course we need to minimize risks

play22:53

yeah try to avoid using

play22:56

websites that are not secure

play22:58

using computers that don't doesn't have

play23:01

antiviruses

play23:03

sharing your password i mean all those

play23:06

things needs to be taken care of don't

play23:08

really

play23:10

expose a lot of confidential information

play23:14

so some guidance of action to improve or

play23:17

to promote ethical behavior act with

play23:19

integrity yeah ensure that you protect

play23:22

privacy and confidentiality of

play23:24

information

play23:25

so we have a number of ways that you can

play23:27

achieve this i've mentioned you can

play23:29

always use some kind of privacy settings

play23:32

within your social media networks uh try

play23:34

that try to reinforce the firewalls and

play23:37

so on

play23:38

do not misinterpret or with all

play23:40

information right we have just looked at

play23:42

the outright lies

play23:44

are not misused resources like for

play23:45

example if you're a student or you are

play23:47

working you have seen

play23:49

examples of an authorized use of

play23:51

resources at work do not exploit

play23:53

weaknesses of systems like design flows

play23:56

in the hardware

play23:57

now that you are a good programmer and

play23:59

you have realized that there are some

play24:00

kind of locals within the database do

play24:03

not exploit the good things or the good

play24:05

practice is to notify the database

play24:08

administrator and tell them

play24:10

that hey i think the tables or rather

play24:13

the tuples within this particular

play24:16

database they need to be

play24:18

secure needs to be reinforced and so on

play24:20

let's have the right standards set high

play24:22

standards uh through implementing of the

play24:25

right policies it could be security

play24:27

policies within the organization

play24:29

yeah it could be some right uh the

play24:32

handouts given trainings

play24:35

right and so on and of course you should

play24:36

promote

play24:38

uh the health and welfare of general

play24:39

public right through creating of

play24:41

awareness of how we need to behave

play24:44

uh ethically now as we wrap up

play24:48

this understanding of computer ethics or

play24:50

internet ethics for that matter we are

play24:52

often guided by the principles uh given

play24:55

by the computer ethics

play24:57

institute

play24:59

they are normally 10

play25:01

in number often referred to as the 10

play25:03

commandments of computer

play25:05

ethics so a good

play25:08

person who wants to practice the right

play25:10

computer ethics should conform

play25:13

and really adhere to these ten

play25:15

commandments

play25:16

number one they shall not use a computer

play25:18

to harm other people

play25:19

we have looked at that thou shalt not

play25:21

interfere with other people's computer

play25:23

work we know

play25:24

how you can interfere with do not

play25:27

do not snoop although shall not snoop

play25:29

right

play25:30

on other people's computer files i shall

play25:32

not use computers to steal right

play25:35

they shall not use computers to bear

play25:37

false sweetness

play25:39

they shall not copy i've already looked

play25:41

at this use of proprietary software

play25:43

without their permission people's

play25:44

permission you need to pay for the

play25:46

licenses

play25:47

they shall not use other people's

play25:49

computer resources without authorization

play25:51

especially at work

play25:53

they shall not appropriate other

play25:55

people's intellectual output

play25:57

right

play25:58

thou shall not

play26:00

though shall think about this

play26:02

consequences

play26:03

like if you're a programmer yeah

play26:06

the

play26:07

ripple effect that that particular

play26:08

program is going to cause to the society

play26:10

maybe it could be a virus or a malware

play26:14

lastly then thou shall always use

play26:16

computer in ways that ensure

play26:18

consideration and respect for your

play26:20

fellow humans very very important

play26:23

very very important i think the last

play26:25

point summarizes everything

play26:28

remember the philosophy

play26:30

the human

play26:32

aspect right

play26:35

so we need to put our fellow humans

play26:37

first before

play26:39

really

play26:40

considering other options so thank

play26:43

ladies and gentlemen uh these ones are

play26:45

just some kind of brief understanding of

play26:48

what computer ethics are

play26:50

so if you want to understand more about

play26:53

computer ethics uh kindly comment

play26:56

below so that i respond and of course if

play26:59

you always find this particular

play27:00

information

play27:02

appropriate

play27:03

informative

play27:04

and you feel like sharing

play27:06

please

play27:08

kindly go ahead and subscribe and hit on

play27:11

that

play27:12

sub uh hit on that particular like

play27:14

button so that you keep on

play27:17

producing informative content all right

play27:21

thanks

Rate This

5.0 / 5 (0 votes)

関連タグ
Computer EthicsInternet UseMoral PrinciplesEthical DilemmasCybersecurityData PrivacyIntellectual PropertyNetiquetteEthical BehaviorDigital Responsibility
英語で要約が必要ですか?