Social and Professional Issues 2 Flashcards
- It is a set of moral principles that regulate the use of computers.
- Is a part of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct
The Hacking Community’s Constitution
THE HACKING COMMUNITY’S CONSTITUTION
- That every individual should have the right to be free speech in cyber space.
- That every individual should be free of worry when pertaining to oppressive governments that control the cyber space.
- That democracy should exist in cyber space to set a clear example as to how a functioning element of society can prosper with equal rights and free speech to all.
- That hacking is a tool that should and is used to test the integrity of networks that hold and safe guard out valuable information.
- Those sovereign countries in the world community that do not respect respect democracy should be punished.
- That art, music, politics and crucial social elements of all world societies can be achieved on the computer and in cyber space.
- That cyber space should be a governing body in the world community, where people of all nations and cultures can express their ideas and beliefs has to how our world politics should be played.
- That there should be no governing social or political class or party in cyber space.
- That the current status of the internet is as clear example as to how many races, cultures, and people can communicate freely and without friction or conflicts. In free enterprise and friction free capitalism
- In the open source movement fully, as no government should adopt commercial or priced software for it shows that a government may be biased to something that does not prompt the general welfare of the technology market and slows or stops the innovation of other smaller company’s products.
- That technology can be wielded for the better placement of mankind and the environment we live in. That all sovereign countries in the world community should respect these principles and ideas released in this constitution
That hacking, cracking and phreaking are instruments that can achieve three crucial goals:
- Direct Democracy in cyber space.
- The belief that information should be free to all.
- The idea that one can test and know the dangers and exploits of systems that store the individuals
deals with the procedures, values and practices that govern the process of consuming computing technology and its related disciplines without damaging or violating the moral values and beliefs of any individual, organization or entity
Computer Ethics
Three Levels of Computer Ethics
- Pop
- Para
- Theoretical
- Newspapers, magazines and TV news programs have engaged increasingly in computer ethics of this sort.
- Every week, there are news stories about computer viruses, or software ownership law suits, or computer-aided bank robbery, or harmful computer malfunctions, or computerized weapons
POP
Someone who takes a special interest in computer ethics cases, collects examples, clarifies them, looks for similarities and differences, reads related works, attends relevant events, and so on, is learning “para” computer ethics
PARA
- it applies scholarly theories to computer ethics cases and concepts,
- Someone proficient in computer ethics would be able not only to identify, clarify, compare and contrast computer ethics cases; she or he could also apply theories and tools from philosophy, social science or law in order to deepen our understanding of the issues
THEORETICAL
- are websites and apps that allow users and organizations to connect, communicate, share information and form relationships
- People can connect with others in the same area, families, friends, and those with the same interests
SOCIAL NETWORKING
- enable individuals to maintain social connections, stay informed and access, as well as share a wealth of information
- These sites also enable marketers to reach their target audiences
SOCIAL NETWORKING SITES
first social networking site
SixDegrees.com, was launched in 1997
Due to the lack of awareness and upon the danger of social networking, these active users are prone to be publicly targeted because of their profile pages which may contain personal information such as address and phone numbers
ETHICAL ISSUES OF SOCIAL NETWORKING
FOUR ETHICAL ISSUES OF SOCIAL NETWORKING
- Privacy
- Free Speech
- Data Leakage
- Identity Theft
- can be violated, including social networks through intrusion, misuse of information;
- Although terms and conditions where always made to be seen and agreed during the users registration process, most users ignore the policy and assume that everything is in good place without even realizing we might solely permit a gateway access to our personal information
PRIVACY
possibly caused by the users minimal awareness and understanding of ethical privacy and protection value of the policies used by social networking sites
DATA LEAKAGE