Chapter 2

GCST
IT Department
Computer Ethics
Summary Noted
_____________________________________
Dr. Gamal Saad
2012/2014
1
Computer Ethics – Dr. Gamal Saad
Chapter 2: Introduction to Ethics
What is Ethics?
Simply stated, ethics refers to standards of behavior that tell us how human
beings ought to act in the many situations in which they find themselves-as
friends, parents, children, citizens, businesspeople, teachers, professionals, and
so on.
It is helpful to identify what ethics is NOT:





Ethics is not the same as feelings. Feelings provide important
information for our ethical choices. Some people have highly developed
habits that make them feel bad when they do something wrong, but
many people feel good even though they are doing something wrong.
And often our feelings will tell us it is uncomfortable to do the right
thing if it is hard.
Ethics is not religion. Many people are not religious, but ethics applies
to everyone. Most religions do advocate high ethical standards but
sometimes do not address all the types of problems we face.
Ethics is not following the law. A good system of law does incorporate
many ethical standards, but law can deviate from what is ethical. Law
can become ethically corrupt, as some totalitarian regimes have made it.
Law can be a function of power alone and designed to serve the
interests of narrow groups. Law may have a difficult time designing or
enforcing standards in some important areas, and may be slow to
address new problems.
Ethics is not following culturally accepted norms. Some cultures are
quite ethical, but others become corrupt -or blind to certain ethical
concerns (as the United States was to slavery before the Civil War).
"When in Rome, do as the Romans do" is not a satisfactory ethical
standard.
Ethics is not science. Social and natural science can provide important
data to help us make better ethical choices. But science alone does not
tell us what we ought to do. Science may provide an explanation for
what humans are like. But ethics provides reasons for how humans
ought to act. And just because something is scientifically or
technologically possible, it may not be ethical to do it.
Why Identifying Ethical Standards is Hard
2
Computer Ethics – Dr. Gamal Saad
There are two fundamental problems in identifying the ethical standards we
are to follow:
1. On what do we base our ethical standards?
2. How do those standards get applied to specific situations we face?
If our ethics are not based on feelings, religion, law, accepted social practice,
or science, what are they based on? Many philosophers and ethicists have
helped us answer this critical question. They have suggested at least five
different sources of ethical standards we should use.
Can Ethics Be Taught?
Developed by Manuel Velasquez, Claire Andre, Thomas Shanks, S.J., and
Michael J. Meyer
In a recent editorial, the Wall Street Journal announced that ethics courses are
useless because ethics can't be taught. Although few people would turn to the
Wall Street Journal as a learned expert on the teaching of ethics, the issue
raised by the newspaper is a serious one: Can ethics be taught?
The issue is an old one. Almost 2500 years ago, the philosopher Socrates
debated the question with his fellow Athenians. Socrates' position was clear:
Ethics consists of knowing what we ought to do, and such knowledge can be
taught.
Most psychologists today would agree with Socrates. In an overview of
contemporary research in the field of moral development, psychologist James
Rest summarized the major findings as follows:





3
Dramatic changes occur in young adults in their 20s and 30s in terms of
the basic problem-solving strategies they use to deal with ethical issues.
These changes are linked to fundamental changes in how a person
perceives society and his or her role in society.
The extent to which change occurs is associated with the number of
years of formal education (college or professional school).
Deliberate educational attempts (formal curriculum) to influence
awareness of moral problems and to influence the reasoning or
judgment process have been demonstrated to be effective.
Studies indicate that a person's behavior is influenced by his or her
moral perception and moral judgments.
Computer Ethics – Dr. Gamal Saad
Can ethics be taught? If you look at the hard evidence psychologists have
amassed, the answer is yes. If you read the Wall Street Journal, you wouldn't
have thought so
Making Decisions
Making good ethical decisions requires a trained sensitivity to ethical issues
and a practiced method for exploring the ethical aspects of a decision and
weighing the considerations that should impact our choice of a course of
action. Having a method for ethical decision making is absolutely essential.
When practiced regularly, the method becomes so familiar that we work
through it automatically without consulting the specific steps.
The more novel and difficult the ethical choice we face, the more we need to
rely on discussion and dialogue with others about the dilemma. Only by
careful exploration of the problem, aided by the insights and different
perspectives of others, can we make good ethical choices in such situations.
We have found the following framework for ethical decision making a useful
method for exploring ethical dilemmas and identifying ethical courses of
action.
DECISION PROCESSES
Guidelines for Facilitating Solutions to Ethical Dilemmas in Professional
Practice:
Step 1: Determine the facts in the situation - obtain all of the unbiased facts
possible
Step 2: Define the Stakeholders - those with a vested interest in the outcome
Step 3: Assess the motivations of the Stakeholders - using effective communication
techniques and personality assessment
Step 4: Formulate alternative solutions - based on most complete information
available, using basic ethical core values as guide
Step 5: Evaluate proposed alternatives - short-list ethical solutions only; may be a
potential choice between/among two or more totally ethical solutions
Step 6: Seek additional assistance, as appropriate - engineering codes of ethics,
previous cases, peers, and reliance on personal experience, prayer
Step 7: Select the best course of action - that which satisfies the highest core ethical
values
Step 8: Implement the selected solution - take action as warranted
Step 9: Monitor and assess the outcome - note how to improve the next time
4
Computer Ethics – Dr. Gamal Saad
What is a Case Study?
Case studies (also called "case histories") are descriptions of real situations
that provide a context for engineers and others
To explore problems. Case studies typically involve complex issues where
there is often no single correct answer— you may be asked to select the "best"
answer given the situation.
Why Use Case Studies? Case studies allow you to:




Explore the nature of a problem and circumstances that affect a
solution
Learn about others' viewpoints and how they may be taken into
account
Define your priorities and make your own decisions to solve the
problem
Predict outcomes and consequences
Ethical Theories
Defining Terms
• Society:
– Association of people organized under a system of rules
– Rules: advance the good of members over time
• Morality(‫ فضيلة‬, ‫)مثل‬
– A society’s rules of conduct(‫)سلوك‬
– What people ought / ought not to do in various situations
• Ethics
– Rational examination of morality
– Evaluation of people’s behavior
Morality is focused on solving particular problems. Ethics is focused on the
higher-level concept of finding a good way to solve moral problems.
Ethical Theories
5
Computer Ethics – Dr. Gamal Saad
• Subjective
Relativism(‫الحقااااااخالقيا تتفاااااااايللفااااااخمايل ااااااخيللفاااااا يمال ااااااخ ي‬
)‫)مالظ مف(الموضوعاا‬
• Cultural Relativism((‫)الحقخالقيا تتفاايللفخمايل خييللثقخفاييي‬
• Divine Command Theory( ‫)ا يسمخميياميإ هيياسمىي نيط ا ايال ش‬
• Kantianism (‫) سلويي نيالكمخ يالذييللمكني نهياملقدريعلاهي‬
• Act Utilitarianism(‫)ا عمخليلكو يصخلحايعند خيلكنينخف ا(لص ف)ي‬
• Rule Utilitarianism(‫)فخعدة‬
• Social Contract Theory
Relativism
– No universal norms of right and wrong
– One person can say “X is right,” another can say “X is wrong,”
and both can be right
1- Subjective Relativism
– Each person decides right and wrong for himself or herself
– “What’s right for you may not be right for me”
2- Cultural Relativism
• What is “right” and “wrong” depends upon a society’s actual moral
guidelines
• These guidelines vary from place to place and from time to time
• A particular action may be right in one society at one time and wrong in
other society or at another time
3- Divine Command Theory
•
•
•
•
Good actions: those aligned with God’s will
Bad actions: those contrary to God’s will
Holy books reveal God’s will.
We should holy books as moral decision-making guides.
4- Kantianisim
• Good will: the desire to do the right thing
• Immanuel Kant: Only thing in the world good without qualification is
good will.
• Reason should cultivate desire to do right thing.
Utilitirnianism
6
Computer Ethics – Dr. Gamal Saad
• An action is good if it benefits someone
• An action is bad if it harms someone
• Utility: tendency of an object to produce happiness or prevent
unhappiness for an individual or a community
• Happiness = advantage = benefit = good = pleasure
• Unhappiness = disadvantage = cost = evil = pain
An action is right (or wrong) to the extent
that it increases (or decreases) the
Total happiness of the affected parties.
5- Act Utilitirnianism
• Utilitarianism
– Morality of an action has nothing to do with intent
– Focuses on the consequences
– A consequentialist theory
• Act utilitarianism
– Add up change in happiness of all affected beings
– Sum > 0, action is good
– Sum < 0, action is bad
6- Rule Utilitirnianism
• We ought to adopt moral rules which, if followed by everyone, will lead
to the greatest increase in total happiness
• Act utilitarianism applies Principle of Utility to individual actions
• Rule utilitarianism applies Principle of Utility to moral rules
7- Social Contract Theory
– We implicitly accept a social contract
• Establishment of moral rules to govern relations among
citizens
• Government capable of enforcing these rules
– In ideal society, no one above rules
– That prevents society from enacting bad rules
_____________________________________________________
* By using an ethical theory in which all humans are treated equally and
guidelines are developed through a process of logical reasoning, it is more
likely that you can craft an ethical argument that will be convincing to a
diverse audience.
7
Computer Ethics – Dr. Gamal Saad
* When we say an ethical theory is rational, we mean that it relies upon logical
reasoning from facts or commonly held values.
* Sometimes I leave home a little late, but I’d still like to get to work on time.
I want to be able to drive through red lights on those days when I am running
late. The proposed moral rule is: I may ignore traffic signals on days I am
running late. If we universalized this rule, then traffic signals would cease to
have any meaning. The streets would be chaotic. There would be gridlock or
accidents at every busy intersection. I would no longer be able to drive
through red lights. Hence my proposed moral rule is self-defeating. It is wrong
for me to drive through red lights on those days when I am running late.
* A consequentialist theory determines whether an action is right or wrong by
evaluating its consequences. Utilitarianism is a consequentialist theory. A
nonconsequentialist theory determines whether an action is right or wrong by
considering the underlying rule or principle motivating the action.
Kantianism and social contract theory are non-consequentialist theories.
* Three situations in which my action would be primarily motivated by a
sense of duty or obligation:
(a) I promised someone if he could get two tickets to a rock concert, I would
purchase a ticket and go with him. He got the tickets and expects me to pay for
mine. I keep my promise, even though I just lost my job and I really can’t
afford to go.
(b) I pay my income taxes, even though I think the government has some
wasteful programs.
(c) Everybody in my fraternity is going to give blood. I donate blood, too,
even though just thinking about it makes me queasy.
*Three situations in which my action is primarily motivated by its expected
consequences:
(a) I give money to a particular charity because it has the lowest administrative
overhead of any international relief organization. I figure more of my money
will actually reach those who need it.
(b) I work extra hard in a particular class, even though I am not interested in
the material, because I hope the professor will write me a good letter of
recommendation.
8
Computer Ethics – Dr. Gamal Saad
(c) I slightly exaggerate my experience in order to get a good job as a server in
a nice restaurant.
* Businesses and governments often use utilitarian thinking to determine the
proper course of action because it allows all the consequences of a decision to
be boiled down to dollars and cents (or some other quantifiable unit of
measure).
* Social contract theory is a non-consequentialist theory. Social contract
theory as articulated in Rawls’s two principles of justice is a nonconsequentialist theory.
* Both divine command theory and Kantianism are objective, holding that
right and wrong can be expressed in rules that are true for all people at all
times in history. Divine command theory identifies the good with the will of
God, and holds that the will of God is communicated through holy books.
Kantianism, on the other hand, holds that we can use our reason to determine
what is good.
* Both subjective relativism and act utilitarianism would allow an
individual to evaluate a situation to determine whether a particular action is
right or wrong. However, subjective relativism allows a person to use any
means to decide the right thing to do. According to act utilitarianism, the
consequences of the possible actions must be evaluated. The correct action is
the one that leads to the greatest increase in total happiness among the parties
affected.
* Both act utilitarianism and rule utilitarianism are consequentialist
theories. However, act utilitarianism considers the consequences that would
result from an action taken in one particular situation. Rule utilitarianism
considers the consequences that would result if everyone always took a certain
course of action in all similar situations.
* In most ethical theories Alexis did wrong when she lied to the librarian. By
deceiving the librarian, Alexis treated the librarian as a means to her end of
getting access to the private college’s computers. Alexis violated the property
rights of the private college when she used its computers without permission.
Her action was wrong.
* A rule utilitarian is likely to subscribe to the rule “Lying is wrong,” since
widespread lying can lead to many harms. For this reason, Alexis did wrong
9
Computer Ethics – Dr. Gamal Saad
when she deceived the librarian. The challenge with this scenario is to
determine whether any moral rules have been broken. In general,
utilitarianism is comfortable with the notion that maximizing the overall good
may mean that the majority gains a benefit while the minority suffers a harm.
Comparing Workable Ethical Theories
Theory
Kantianism
Motivation Criteria
Dutifulness
Act
Consequence
Utilitarianism
Rule
Consequence /
Utilitarianism
Duty
Social Contract
Rights
10 Computer Ethics – Dr. Gamal Saad
Focus
Rules
Individual
Actions
Group
Rules
Group
Rules
Individual
Chapter 3: Networking
* The Internet is a network of networks that uses two protocols, known as
TCP/IP, to control the exchange of data.
* The first part of an email address (before the@ sign) identifies a particular
computer user. The second part of an email address (after the @ sign) contains
a domain name.
* Unless the email message is short, the mail server divides the message into
packets. The message is sent from mail server through zero or more
intermediate routers to the mail server of the person to whom you are sending
the email. The destination email server reassembles the message from the
packets (if necessary) and transmits the message to the intended recipient.
* Spam is unsolicited, bulk email.
• Amount of email that is spam has increased
– 8% in 2001
– 40% in 2003
– More than 50% in 2004
• Spam is effective
– More than 100 times cheaper than “junk mail”
– Profitable even if only 1 in 100,000 buys product
• How firms get email addresses
– Opt-in lists
– Dictionary attacks
• Spammers seek anonymity
– Change email and IP addresses to disguise sending machine
– Hijack another system as a spam launch pad
• Spam blockers
– Attempt to screen out spam
– Have led to more picture-based spam
* A spam blocker attempts to keep spam from reaching someone’s mailbox by
identifying and discarding (or routing to a special folder) emails that appear to
be spam.
11 Computer Ethics – Dr. Gamal Saad
* Mail Abuse Protection System (MAPS) maintains a list of networks that
either forward spam or allow spam to be created. The list is called the
Realtime Blackhole List. Some Internet service providers refuse to accept
email sent from hosts on the Realtime Blackhole List.
• MAPS is a not-for-profit organization
• Contacts marketers who violate MAPS standards for bulk email
• Puts marketers who violate standards on a Realtime Blackhole List
(RBL)
• Some mail relays refer to RBL list
– Looks up email host name on RBL list
– If name on list, the email gets bounced back
• All email from blacklisted hosts gets bounced, even email from nonspammers
Proposed Solutions to Spam Epidemic
• Require an explicit opt-in of subscribers
• Require labeling of email advertising
• Add a cost to every email that is sent
• Ban unsolicited email
Ethical Evaluation of Spamming (Refer to book and class discussion)
• Kantian evaluation
• Act utilitarian evaluation
• Rule utilitarian evaluation
• Social contract theory evaluation
• From all these perspectives, it is wrong to send spam
Attributes of the Web:
• It is decentralized
• Every Web object has a unique address
• It is based on the Internet
Five other uses of the Web:
(a) We sell stuff in on-line auctions (such as eBay).
(b) We seek medical information from on-line special interest groups of
people suffering from particular diseases.
(c) We learn about the weather.
(d) We find out about current traffic conditions before deciding whether
to leave work.
(e) We get directions before driving to a place we’ve never been before.
* A URL is a Uniform Resource Locator. Every Web page has a unique URL,
enabling hyperlinks to be set up between arbitrary pages.
12 Computer Ethics – Dr. Gamal Saad
Controlling The Web:
• Not everyone in world has Internet access
• Saudi Arabia: centralized control center
• People’s Republic of China: ISPs sign
“self-discipline” agreement
• Germany: Forbids access to neo-Nazi sites
• United States: Repeated efforts to limit access of minors to pornography
Ethical Perspectives on Pornography (The book, Page 109)
• Pornography is immoral
• Adult pornography is moral
• Commentary
Censorship : Is the attempt to suppress or regulate public access to material
considered offensive or harmful.
• Direct censorship
• Government monopolization
• Prepublication review
• Licensing and registration
• Self-censorship
• Most common form of censorship
• Group decides for itself not to publish materials
* There are three forms of direct censorship: government monopolization,
prepublication review and licensing and registration. Government
monopolization means the government owns all the media outlets. Prepublication review means the government must approve information before it
is disseminated. Licensing and registration means a news organization must
get a license from the government before operating. It is used for media with
limited bandwidth, such as radio and television. Self censorship is a group
deciding for itself not to publish materials.

Broadcasters have the most limited First Amendment rights because
they have a pervasive presence. Broadcasters beam signals into the
privacy of the home. Since people can turn radios and televisions on
and off, they may turn a device on in the middle of a show. That means
that warnings at the start of a show are less effective than a warning at
13 Computer Ethics – Dr. Gamal Saad
the front of a newspaper or magazine article. Also, broadcasting is
accessible to children, even those too young to read. Restricting the
access of children to radio or television is more difficult than restricting
access to adult magazines or books.

Censorship is difficult on the Internet because:
(a) The Internet supports many-to-many communication. The Internet
has far more information outlets than television or radio.
(b) The Internet is dynamic. Millions of computers are being added to
the Internet every year.
(c) The Web is huge, containing billions of pages. Nobody can keep
track of everything published on the Web.
(d) The Internet is global. Laws passed in one nation may have no effect
outside that nation’s borders.
(e) It is hard to distinguish between children and adults on the Internet.
Challenges Posed by the Internet
• Internet supports many-to-many communication
• Internet is dynamic
• Internet is huge
• Internet is global
• Difficulty distinguishing between children and adults online
Freedom of Expression (Is it right or NOT?)
• Right to freedom of expression must be balanced against the public
good
• Various restrictions on freedom of expression exist
Children and the Web
Many parents believe they ought to protect their children from exposure to
pornographic and violent materials on the web.
• Child Internet Protection Act (CIPA)
• Libraries receiving federal networking funds must filter pages
containing obscenity or child pornography.
• Web filters
• Web filter: software that prevents display of certain Web pages
• May be installed on an individual PC
• ISP may provide service for customers
• Methodologies
14 Computer Ethics – Dr. Gamal Saad
• Maintain “black list” of objectionable sites
• Examine content for objectionable words/phrases
• Ethical evaluations of CIPA
• Kantian evaluation: CIPA is wrong
• Act utilitarian evaluation: depends on how benefits and harms are
weighed
• Social contract theory: freedom of conscience should be given
precedence
• Identity theft
• when a person uses another person’s electronic identity
• Two-thirds of cases begin with an email solicitation
• Many victims are experienced computer users comfortable
with typing credit card number online
• Chat room predators
• Chat room: supports real-time discussions among many
people connected to network
• Instant messaging and chat rooms replacing telephone for
many people
• Some pedophiles meeting children through chat rooms
• Police countering with “sting” operations
• Ethical evaluations of police “sting” operations (The book)
• Utilitarian evaluation
• Kantian evaluation
• Social contract theory evaluation
• False information
• Quality of Web-based information varies widely
• Other media also have information of varying quality
• The New York Times v. The National Enquirer
• 60 Minutes v. Conspiracy Theory
• Google attempts to reward quality
• Ranking uses “voting” algorithm
• If many links point to a page, Google search engine
ranks that page higher
15 Computer Ethics – Dr. Gamal Saad
Chapter 4: Intellectual Property
1. Intellectual property is a unique creation of the human mind that has
commercial value. Examples of intellectual property include poems,
photographs, songs, plays, books, paintings, sculptures, movies, logos,
slogans, designs, perfumes, recipes, and computer programs.
2. John Locke holds that when people remove something from Nature through
their own labor, they have mixed their labor with it, and therefore they have a
property right in that object.
3. If more than two people create the identical intellectual property, there is
only one of that property, not two, meaning both people cannot claim full
rights to that property. Copying an intellectual property is different from
stealing a physical property. Perfect copies can be made of objects embodying
an intellectual property. When this happens, the original owner has lost
exclusive control over use of the property, even though he or she still has the
original article.
4. An individual or firm in the United States may protect intellectual property
through trade secrets, trademarks, service marks, patents, and copyrights.
5. A trademark is a word, symbol, picture, sound, color, or smell used to
identify a product. It is good when a company’s trademark becomes well
known to the public. A trade secret is a piece of intellectual property that is
kept confidential. Examples of trade secrets are formulas, processes,
proprietary designs, strategic plans, and customer lists.
6. The advantage of a trade secret is that it does not expire. The disadvantage
of a trade secret is that a company cannot prevent another company from
reverse engineering the formula or process. The advantage of a patent is that
the government gives the patent owner the exclusive right to the intellectual
property. The disadvantage of a patent is that this right expires after 20 years.
7. Fair use refers to those circumstances under which it is legal to reproduce a
copyrighted work without permission.
16 Computer Ethics – Dr. Gamal Saad
8. As information technology has advanced, companies have begun using
digital media (such as CDs and DVDs) to store copyrighted songs, movies,
and computer programs. The widespread availability of personal computers
and CD/DVD burners has made it much easier for consumers to make copies
of CDs and DVDs.
9. The Digital Millennium Copyright Act curtails fair use of copyrighted
material by consumers by making it illegal to make copies of any digitally
recorded work for any purpose.
10. Digital rights management refers to any of a variety of actions owners of
intellectual property stored in digital form may take to protect their rights.
Examples of digital rights management include encryption, digital
watermarking, and making CDs copyproof.
11. CD-ROM drives in PCs use a different standard than CD audio players.
When a CD audio player encounters a bad block of bits, it skips over it. When
a CDROM drive in a PC encounters a bad block of bits, it keeps re-reading the
block until the bits in the block make sense. By deliberately planting bad
blocks of data onto a CD, you can make a CD that sounds good on a CD
player but is unreadable by a CD-ROM drive.
12. A peer-to-peer network is a transient (temporary) network allowing
computers running the same networking program to connect with each other
and access files stored on each other’s hard drives. Peer-to-peer networks
facilitate file sharing.
13. Napster relied on a single central server to mediate requests. KaZaA
distributes the index of available files among many supernodes. Shutting down
Napster simply requires shutting down the single central server. Shutting
down KaZaA would require shutting down all of the supernodes. Hence
KaZaA would be more difficult for the judicial system to shut down than
Napster.
15. Some companies are now providing services that allow consumers to
download music legally from the internet (for a fee). Research the
performance of these companies. How many people are using the services?
Are they making Money?
The answer: In March 2004 Apple announced consumers were downloading
2.5 million songs per week from the
iTunes site, up from a rate of 1.5 million songs per week in December 2003.
17 Computer Ethics – Dr. Gamal Saad
16. MP3 spoofing refers to posting a bogus MP3 file on a peer-to-peer
network. In other words, the content of the file does not match the title. The
recording industry supports MP3 spoofing because it makes downloading
songs more difficult.
18. Suppose a company A wants to develop a program that duplicates the
functionality of a made by company B. Describe how company A may do this
without violating the copyrights held by company B.
The answer: Company A resorts to “clean room” software development. Two
independent teams work on the project. The first team is responsible for
determining how Company B’s program works and produces a technical
specification. The second team relies solely on the technical specification to
develop the software. Because the code developers are isolated from Company
B’s product, Company A can ensure no code get copied, even unconsciously.
19. Open source refers to software in which the source code is distributed
along with the executable program.
20. Copyleft is the principle that anyone who acquires and modifies an opensource program must redistribute it as an open-source program. In other
words, you cannot transform an open-source program into a proprietary
program. Unlike a traditional copyright, copyleft allows anyone to copy and
enhance a program without getting the author’s permission.
21. Linux has affected the market for proprietary software by putting price
pressure on companies selling proprietary versions of Unix. It is providing an
alternative to servers running the Windows operating system. Linux is also
putting pressure on Microsoft and Apple, which sell proprietary operating
systems for desktop computers.
22. The band can select a Creative Commons license that allows people to
download music for noncommercial purposes, but still protects the band’s
copyright to the song.
Limits to Intellectual Property Protection
• Giving creators rights to their inventions stimulates creativity
• Society benefits most when inventions in public domain
• Congress has struck compromise by giving authors and inventors rights
for a limited time
Copyright Provides owner of an original work five rights
– Reproduction
– Distribution
18 Computer Ethics – Dr. Gamal Saad
– Public display
– Public performance
– Production of derivative works
Fair Use
Sometimes legal to reproduce a copyrighted work without permission
• Sony v. Universal City Studios (The book and discussion)
• RIAA v. Diamond Multimedia Systems Inc. (The book and discussion)
Legal Music Services on the Internet
• Subscription services for legal downloading
• Some based on monthly fee; some free
• Consumers pay for each download
• Apple’s iTunes Music Store leading service
Software Copyrights
• Copyright protection began 1964
• What gets copyrighted?
– Expression of idea, not idea itself
– Object program, not source program
• Companies treat source code as a trade secret
Violations of Software Copyrights
• Copying a program to give or sell to someone else
• Preloading a program onto the hard disk of a computer being sold
• Distributing a program over the Internet
Open-Source Software
• No restrictions preventing others from selling or giving away software
• Source code included in distribution
• No restrictions preventing others from modifying source code
• No restrictions regarding how people can use software
• Same rights apply to everyone receiving redistributions of the software
(copyleft)
Beneficial Consequences of Open-Source Software
• Gives everyone opportunity to improve program
• New versions of programs appear more frequently
• Eliminates tension between obeying law and helping others
• Programs belong to entire community
• Shifts focus from manufacturing to service
Crititique of the Open-Source Software Movement
19 Computer Ethics – Dr. Gamal Saad
•
•
•
•
Without critical mass of developers, quality can be poor
Without an “owner,” incompatible versions may arise
Relatively weak graphical user interface
Poor mechanism for stimulating innovation (no companies will spend
billions on new programs)
Morality of Intellectual Property Protection for Software
Rights-based Analysis
– Programming is hard work that only a few can do
– Programmers should be rewarded for their labor
– They ought to be able to own their programs
Utilitarian Analysis
• Argument against copying
– Copying software reduces software purchases…
– Leading to less income for software makers…
– Leading to lower production of new software…
– Leading to fewer benefits to society
Coclusion
• Each of these claims can be debated
• Natural rights argument weak
• Utilitarian argument not strong, either
Morality of Copying Proprietary Software
• Social contract theory perspective
• Kantian perspective
• Rule utilitarian perspective
• Act utilitarian perspective
• Conclusion: Society has chosen to enact a law that grants intellectual
property rights to people who do creative work and distribute it on CDs.
From the view point of of Kantianism, rule utilitarianism, and social
contract theory, breaking the law is wrong, unless there is a strong
moral obligation. Hence we have concluded that copying a CD
containing copyrighted software is immoral because it is illegal.
From an Act utilitarian viewpoint, it is hard to say copying a CD
containing copyrighted software is immoral if there is a good
justification for it.
Creative Commons
• Under current copyright law, eligible works are copyrighted the
moment they are created
• No copyright notice does not mean it’s okay to copy
• Must contact people before using work
• That slows down creative re-use of others’ work
20 Computer Ethics – Dr. Gamal Saad
• Free Creative Commons license indicates
– Which kinds of copying are okay
– Which rights are being retained
Chapter 5: Privacy
1. Google combines information in two databases. The first database ties
phone numbers to addresses. The second database ties addresses to locations
on a map. By combining information in these databases, Google can associate
a location on a map with a phone number.
6. A public record contains information reported to a government agency for
the purpose of informing the public. Public information is information that is
provided to an organization that has the right to share it with other
organizations.
7. Disclosure of information that becomes part of a public record is typically
required by law. For example, you must disclose certain information in order
to get a marriage license. For this reason, it is easier for a person to control
public information.
8. Here are a few examples of public records: legal name, address, list of
property owned, property tax records, political party, date of birth, date of
marriage, date of divorce, date of death
9. An example of a situation where people must disclose personal information
in order to get something, here is one possible answer. If you want to check
out a book from a public library, you must provide certain information (such
as your name, address, and phone number).
10. An example of a situation where people must reveal personal information
whether they like it or not, here is one possible answer. People called to testify
at a trial may be forced to reveal personal information, whether or not they
consent.
11. An example of a situation where information about people is gathered
without their knowledge, here is one possible answer. Many organizations
keep track of the Web sites accessed by their computers. By monitoring the
packets flowing fromWeb sites to particular machines, a company can
determine the Web sites each of its employees is visiting.
21 Computer Ethics – Dr. Gamal Saad
12. What is the difference between a digital video recorder and a traditional
VCR? A digital video recorder records television shows on a hard disk instead
of a tape. It may have features making it much easier to program. It may
connect with a central database and report viewing patterns.
13. Why does enhanced 911 service raise new concerns about privacy?
Enhanced 911 service raises new concerns about privacy because in order to
implement this service, cell phone companies must install technology that
enables them to track the positions of all active cell phones.
14. Spyware is a program that communicates over your Internet connection
without your knowledge or consent. Free software downloaded from the
Internet often contains spyware.
16. The purpose of the Children’s Online Privacy Protection Act is to reduce
the amount of public information gathered from children using the Internet.
22. In Charles Katz v. United States, the U.S. Supreme Court affirmed that
citizens should be protected from all electronic surveillance conducted without
warrants, including bugs.
24. Secondary use data refers to when information collected for one purpose is
put to another purpose.
27. The most common form of identity theft in the United States is credit card
fraud.
28. A private company can legally ask for your Social Security number.
29. Social Security numbers are not unique. They are rarely checked, so
criminals can get away with supplying fake SSNs. They have no errordetecting capability, so SSNs are prone to data-entry errors.
31. What is the difference between a traditional, symmetric encryption scheme
and a public-key encryption scheme? In a traditional, symmetric encryption
scheme the same key is used both to encode and decode the message. Since
the sender must send the key to the receiver somehow, that introduces a
security risk. In a public-key encryption scheme different keys are used to
encode a decode the message. This eliminates the security risk of having to
pass keys.
34. Criminals can steal information at ATMs by looking over someone’s
shoulder to learn their PIN number, by installing a skimmer to capture the
information stored on the access card, or by collecting receipts that customers
have left behind.
22 Computer Ethics – Dr. Gamal Saad
35. Digital cash is anonymous electronic money. It differs from an ordinary
credit card in that when you use it to purchase an item, a computer cannot link
you with the purchase. It differs from ordinary cash in that it is stored
electronically, rather than in physical form.
Cookies:
A cookie is a file placed on your computer's hard disk by a web server. The
file contains information about your visits to a web site. Cookies can contain
login name and passwords, product preferences, and the content of virtual
shopping carts.
Spyware:
A spyware is a program that communicates over your internet connection
without your knowledge or consent. Spyware programs can monitor Web
surfing, log keystokes, take a snapshots of your computer screen and send
reports back to host computer.
Data Mining:
Data mining is the process of searching through one or more databases
looking for patterns or relationships. Data mining is a way to generate new
information by combining facts found in multiple transactions. It can also be a
way to predict future events.
Identity theft:
Identity theft is the misuse of another person's identity such as name, ID
number, credit card information, and bank account number. The objective is to
take actions permitted to the owner of the identity such as withdraw funds,
transfer money, and get access to information. The leading form of identity
theft is credit card fraud.
Encryption:
Encryption is the process of transforming a message in order to conceal its
meaning in an age in which information is easily captured and rebroadcast,
encryption is a valuable tool for maintaining privacy. Even if someone should
get a copy of an encrypted message, it is worthless unless the person can
decode it.
23 Computer Ethics – Dr. Gamal Saad
Chapter 6: Computer and Network Security
1. A computer virus is a piece of self-replicating code embedded within
another program called the host.
2. A worm is a self-contained program that spreads through a computer network
by exploiting security holes in the computers connected to the network.
3. The difference between a virus and a worm is that a worm has the ability to
spread on its own. A virus spreads when a computer user executes the host.
5. What are the two reasons why a fast-moving worm is usually more
dangerous than a worm that replicates more slowly? A fast-moving worm is
more dangerous because it can infect more computers before a way to plug the
security hole is discovered. In addition, a fast-moving worm consumes more
of the Internet’s bandwidth.
7. Filipino computer science student launched The Love Bug virus in 2000.
The Internet worm was launched by Robert Tappan Morris, Jr., a computer
science graduate student at Cornell University, in 1988.
8. A Trojan horse is a program with a benign capability that conceals another,
sinister purpose.
Remote access Trojan horses (RATs) are often concealed inside files
containing sexually explicit videos or photos. Once downloaded, a RAT
enables the attacker to access the victim's computer. System administrators
play an important role in securing systems against these external threats.
9. It is dangerous for an email program to open attachments automatically,
because the attachment may be an executable program containing a virus.
10. The word “hacker” is derived from the word “hack.” A “hack” is a newly
constructed piece of equipment that serves a useful purpose and demonstrates
its creator’s technical virtuosity. A “phreak” is someone who manipulates the
telephone system in order to communicate with others without paying for the
call. The “f” sound is spelled with a “ph” because the “f” sound in “telephone”
is spelled with a “ph.”
11. The first major network to get hacked was the telephone network.
24 Computer Ethics – Dr. Gamal Saad
12. Hackers and phreaks do not think taking information from computers is a
serious crime, certainly not as serious as the authorities would make it seem.
In general, those who download MP3 files seem to have the same attitude.
13. A denial-of-service attack is an intentional action designed to prevent
legitimate users from making use of a computer service. The service is
provided by a computer called a server. The denial-of-service attack tries to
disable the server, preventing it from responding to legitimate users. Disabling
the server can be done many ways, including: crashing the server, consuming
its disk storage, filling its primary memory, or saturating its connections.
15. How computer worms are used in certain DOS attacks? One way to use a
worm in a DoS attack is to penetrate the target’s computer with a worm that
intentionally generates a long string of errors. Since the target computer logs
errors in a data file, eventually the disk fills up, preventing the target from
handling legitimate requests for service.
Another way to use a worm in a DoS attack is to penetrate the target’s
computer with a worm that replicates very rapidly. The presence of many
active worm processes either crashes the target computer or significantly
degrades its performance.
16. The administrator of a Web server can stop a DoS attack temporarily by
con-figuring the server so that it refuses to accept any packets from the
attacker’s computer, but all the attacker has to do is launch a new attack from
another computer.
17. Filtering of outgoing Internet traffic is an important tool in the fight
against DoS and DDoS attacks, because even if an outsider should gain access
to one or more computers, the filtering can keep these computers from being
used as launching pads for DoS or DDoS attacks.
18. A vote thief could cast multiple votes in an on-line election by purchasing
pass codes from people willing to sell their right to vote. A thief could fool
other voters into revealing their pass codes and then using this information to
cast multiple votes. Online voting has been suggested as one way of
eliminating problems associated with traditional voting systems, and
experiments in online voting have already begun.
19. The author concludes it is a bad idea for a government to allow on-line
voting from home computers, because then the security of the voting system
would depend on the security of home computers, which is poor.
20. The quickest and safest way to make a computer secure is to disconnect it
from any networks.
25 Computer Ethics – Dr. Gamal Saad