By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email
No need to pay just yet!
About this sample
About this sample
Words: 2321 |
Pages: 5|
12 min read
Published: Feb 8, 2022
Words: 2321|Pages: 5|12 min read
Published: Feb 8, 2022
Computer ethics is a set of moral precepts that manage the computers usage. The word of ethics is originally derived from the Greek word which is ethos that describe as character. In general, the ethic is explain as a set of moral that govern the behavior which follows the concepts of right and wrong behavior of a group or individual. During World War II, computer ethics was founded by Norbert Wiener when he was take a part in developing an antiaircraft cannon. The incident happen between a tracking system in aircraft and a part of fired shells that required the implementation of feedback loop. Thus, it is required a specific scientific challenges that leads into the development of cybernetics founded by Wiener. During that time, cybernetics was deal with information feedback systems that relies on inspiration from animal and living things.
According to Vacura (2017), the existence of computer ethics is to cope with the present and forthcoming ethical issues of computer technology. Widely issues that addressed with computer technology is unethical computer usage. Computer ethics deals with different type of unethical uses of computer which is cybercrime, pirating, invasion of privacy, cyberbully, abuse of intellectual property rights and other similar things. During 1970s, real incident have been records where the first instances of computer crime occurred. Thus, public contentedly worry on the invasion of privacy. During 1980s, influential publications in the fields of computer ethics have published their own book that concerning the issues that related to unethical uses of computer. First textbook entitled Computer Ethics that been published was written by Deborah Johnson which covers all the issues on the computer uses in ethical and unethical manners.
Ethical theories implies for decision-making while the ethics are in play. Every ethical theories have different viewpoints where it is importance to guide individual that seek for helps in making decision. Every decision will lead to a different consequences which is good or bad. However, some of the decision making might not having an outcome for their actions because the norms right or wrong is depends on the individual perspective. Deontology, utilitarianism, Kantianism, and virtue ethics is several of ethical theories that been listed for decision-making preferences. This research paper will further discuss the ethical theories in order to understand their different emphasizes.
Deontology defines as theory that emphasize duty and adhere obligations that lead whether good or bad consequences for particular cases (Chonko, 2012). For instance, every leader are aware of his duty to be on time when attend a meetings however who makes him to choose this to be his duty even though it is a good ethical manner. Utilitarianism theory is the best describe of consequentialist theory. Utilitarianism can be divided into two types which are act utilitarianism and rule utilitarianism. Act utilitarianism can be defines from its name which is the acts that benefit to people regardless to personal feelings or the societal constraints. While on the other hand rule utilitarianism are concerned to law and give benefit to people through fairness. Kantianism theory is about a rightness or wrongness actions that doesn’t lead to any consequences. The action is only to fulfill the duty. Lastly, Virtue ethics where defines as an action that considered to honesty. Honesty not only by telling the truth but also performs other honest actions.
Nowadays, most of people are depending on technology and device in order to have a good performance. For example, people depends on computer to handle tedious works. However, harm from external threats could bring damaged to a vulnerable computer. Therefore, Computer Ethics Institute established the ten commandments of computer in order to guide people to follow the ethical manners while using computer. Less or more, this Ten Commandments is an effort to enhance an awareness to society.
First rule, thou shall not use a computer to harm other people. From this rule we should restrain ourselves to program computer for dangerous things to others. This is because the programmer is responsible for their actions. For example, create viruses to harm others is an unethical manners that should be avoid. Second rule, thou shall not interfere with other people’s computer work. This rule is further discuss where people have the rights to use computer. We should make other people work easier rather than create virus that can destroy their valuable property.
Third rule, thou shall not snoop around in other people’s computer files. Avoid to open and read someone’s files, emails, database and other similar things because it is an illegal activities. Rule number four, thou shall not use a computer to steal. Without using computer authorities, steal activities is a bad manners toward society. While, steal activities in computer for example gain profit from identity theft. Thus, use the knowledge of computer for goods such as being an ethical hackers.
Rule number five is thou shall not use a computer to bear false witness. Do not use computer to create false fact for instance edit other people pictures to make an innocent person look guilty. At the same time, we should be more caution and not easily believes everything that have been write and read on the internet. Rule number six, thou shall not copy or use proprietary software for which you have not paid. This commandment is meant a lot to programmer, this is because to code a good software is hard. Thus, we should appreciate their effort by buying the software or else find an open source if we can’t afford those software. Install a pirated software can create harm to the computer because of hidden malware. A part from that, this rule can also means to warning plagiarism activities.
Rule number seven, thou shall not use other people’s computer resources without authorization or proper compensation. Identity theft is an unethical manners that should be avoid. The intention to use someone else identity in order to do bad things is illegal. Rule number eight, thou shall not appropriate other people’s intellectual output. Do not copy others work and claiming as your own work. This is similar towards plagiarism activities which is illegal and unethical.
Rule number nine, thou shall think about the social consequences of the program you writing or the system you are designing. Make use the knowledge of Information Technology to create a software that can give a greatest benefits to society. Avoid creating software to teach someone to steal, kill and gamble. Lastly, the rule number ten is thou shall always use computer in ways that ensure consideration and respect for your fellow humans. Consideration towards others is important in order to create a good environment with the others. Use computer in favorable manners and do not be selfish. Respect and being sensitive towards the others feeling.
There are general three main types of ethical issues that we face right now, personal privacy, access right, and harmful actions (Ugbogbo & O.Michael, 2016). In terms of personal privacy, the data of information of any individuals or group can be exposed to the worldwide easily. After that, access right has been moved quickly from being low priority to higher priority. There a lot of attempts make by hacker to get the information from the government been reported. Grimes, Fleischman & Jaeger (2009) stated that harmful action lead to injury or negative consequences, such as intentional destruction or modification of files and programs to serious loss of resources from the computer viruses.
However, the future challenges of computer ethics become more challenging. There are several of future challenges of computer ethics:
An internet of things (IoT) is a system of interconnected between computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the capability to transfer data over a network without involving human-to-human or human-to-computer interaction (Margaret Rouse, 2016). For example, a heart monitors implant in human body, a farm animal with a biochip transponder, an automobile that has the sensor that can detect tire pressure to alert the driver or any object that can be designate an IP address and be able to transfer data over network.
The IoT consists of web-enable smart devices that embedded processors, sensors and communication hardware to collect, send and act on data they require from their environment (Margaret Rouse, 2016). IoT device share the sensor data that collected via connecting to an IoT gateway or the edge device where data is either sent to the cloud to be analyzed or analyzed locally. The devices work without human intervention even though people interact with the devices.
IoT open new opportunities to several companies to start a new advanced business models and services. IoT has the potential to transform the way that consumer and business approach the world by leveraging the scope of the IoT beyond connectivity. Other than that, IoT help the organization to enhanced asset utilization. IoT will improve tracking of assets such as equipment, machinery and tools using sensor and connectivity. However, IoT can be scary; the companies can be hacking by other people. Many organizations do not have strong security protocol in their places. Then, IoT also make the job become lesser. With every task becoming automated, the need of human labor becomes decrease.
A cryptocurreny is a digital or virtual currencies using cryptography for the security. The cryptocurrency does not easier to fake because of the security feature. Most of the cryptocurrencies are decentralized systems based on blockchain technology, a distributed technology ledger enforced by different network computers. The first blockchain based of cryptocurrency was Bitcoin, which is still popular and most valuable. Nowadays, there are a lot of other cryptocurrencies with various functions or specifications.
Angel and McCabe (2014) compare forms of payment method which is paper, plastic and virtual currencies, there is an asymmetric power relationship between payer and payee and question the fairness of the payment. Cryptocurrencies are systems that allow securing online payment transactions that are designated in terms of a virtual token, representing ledger entries internal of the system itself.
Cryptocurrencies give an assurance of making it easier to transfer the payments directly between two parties in a transaction, without the third parties such as bank or Credit Card Company. The transactions are protected by public and private keys. Therefore, it can limit the threat from the hackers and be copied from all computers that run the same blockchain technology. However, the cryptocurrecies are virtual and do not have central repository, a digital cyrptocurrencies balance can be sweep away by a computer crash if do not have any backup copy or somebody misplace the private key.
Artificial Intelligence (AI) is the simulation of human intelligence processes by machines, especially computer system (Margaret Rouse E. B., 2018). Linking data is related to the Big Data and advanced machine learning algorithms that purport to produce structured data in standardized format that can be interconnected and used with common web technologies. As well as increasing amounts of data available online and linked together in the cloud is the renewed focus on AI.
AI systems like Amazon’s Alexa, IBM’s Watson and Google Brain are just few examples of emerging systems that combine cloud technology, huge amount of data and advanced machine-learning algorithms. The introduction of virtual personal assistant in the form of software that been install in mobile phones such as Apple Siri and Microsoft Cortana shows substantial technological innovations but also several ethical issues.
All of the challenges before give us benefits to make our life easier. IoT technologies solve many real-life problems such as smart home, smart grids, connected cars, smart retail, smart banking, smart investment, smart insurance and smart farming. An important of IoT devices is wearable. There are three categories of wearable technologies, wearable health (for example, device that continuously monitor the health of the patient), wearable textile (for instances, clothes that can change their color based on emotions) and wearable consumer electronics (for example, wristbands, headband, rings, smart glasses and smart watches).
However, IoT create serious ethical and legal challenges to protection of privacy, data security, data usability, data user experience, trust and safety. A recent study at University of Glasgow shows that consumers are largely unsatisfied with the lack of privacy the IoT allows them. An increased corporate transparency is needed to ensure that user data is not vulnerable to others.
One of the greatest threats to the IoT is the cyber-attack and the danger to all interconnected enterprises if the IoT is compromised as a result of internal weaknesses.
The governments are responsibility to manage the intangible entities of data and information that flows between huge amounts of sensors, devices, and networks, as information is actually the creator of value. For these different devices and sensor to be able to connect and communicate data, it is necessary that they have unified standards of data structures, formats and communication protocols. Therefore the government or other authorized bodies need to design these standards that enable them to regulate IoT.
In a nutshell, the history of computer ethics is been created in early 1940s. The ideas to create computer ethics is from developing an antiaircraft cannon. Computer ethics was founded by Norbert Wiener during World War II where it is also lead to a new science that deal with information feedback system or well known as cybernetics. However, the real incidents of cybercrime during 1970s where it was the first incidents that been records have already open the eyes of a lot of people cautious on the invasion of privacy. A lot of influential publication have published a book that discuss about computer technology and politics, hacking, invasion of privacy and other similar things to give an awareness of the dangerous of unethical manners in uses of computer technology. This computer ethics has been implies early 1940s. In the future, there is a prediction that said only a few people will still follow this rules together with the ethical theories and Ten Commandments while using their personal computer or public network.
Browse our vast selection of original essay samples, each expertly formatted and styled