Computer Ethics Awareness
Computer Ethics Awareness
Abstract
Introduction
Computer ethics deals with the procedures, values and practices that govern the process of
consuming computing technology and its related disciplines without damaging or violating the moral values
and beliefs of any individual, organization or entity (technopedia, n. d.). Anent to this, “Computer and
information ethics”, in the broadest sense of this phrase, can be understood as that branch of applied ethics
which studies and analyzes such social and ethical impacts of ICT (Computer and Information Ethics, n.d.).
Computer ethics is a profound and prolific understanding and misunderstanding of today’s generation. Most
of the time it is disregarded and abuse of some others in the cyberspace. A recent study associates
computer ethics to moral luck wherein moral luck bears down most heavily on notions of professional
responsibility, the identification and attribution of responsibility. It is immunity from luck that conventionally
marks out moral value from other kinds of values such as instrumental, technical, and use value (Horner, D.
S., 2010). Cyber ethics in the twenty first century greatly contribute to ethical dilemma that the world faced
today. Many organizations have established proper norms in ethical understanding and proper use of
Information and Communication Technology (ICT). Cyberspace is a wide range of collection of information
stored electronically shared around the world. Ethical issues arise in effect to this advancement of
information sharing. Social networking sites nowadays are the primary source of personal information and
interpersonal information which may affect of one’s individual privacy and moral aspect. Some of those are
envision to privacy due to cyber stalking, cyber sex, piracy, pornography, and alike. Schmid (2012)
emphasized in his blog entitled “Should it be mandatory for Schools to Teach Cyber Ethics?”, that
education has seen an explosive growth of internet use and computer technology. The internet holds
massive amounts of information, accessible by search engines such as Google. Teachers can find a
plethora of information to add to their curriculum, and students have the amazing ability to research
anything within a matter of seconds. There are no limits to what the internet can bring. Moreover, statistics
shows in a recent study, Microsoft teamed up with the National Cyber Security Alliance (2005), surveying K
-12 private and public schools all over the United States. The survey shows there are almost 60 million
students and teachers today. The need for educating this enormous group of individuals is vital. In a recent
Journal, Barbara Endicott (2009) stated, “the workable solution for students is to give them the tools to
make decisions that support their safety as well as understand the agenda of their learning community.” As
a result, Social media has become a tool used by students and teachers on a daily basis (Schmid, D.,
2012).
The Philippines had been in the revolutionary stage of information technology since e-commerce
law also known as Republic Act 8792 – E-Commerce Law of the Philippines has been established in the
year 2000. Currently, a blog from rappler reported that a Senator Nancy Binay wants students to learn
cyberethics. According to the interview, Binay explained that the proposal she made in Senate Resolution
474 aims to promote responsible use of the Internet through education instead of laws that may restrict free
speech (Macaraig, A., 2014). Moreover, the Philippine government itself is aware of the potentials of
internet crimes in the Philippines. According to an article found in TechinAsia (2014), the Supreme Court of
the Philippines has ruled on Cybercrime Prevention Act of 2012 also known as R.A. 10175 “An Act defining
Cybercrime. providing for the prevention, investigation, suppression and the imposition of penalties therefor and for
other purposes.” that the Philippine Cybercrime Law now in effect, punishing online Libel is declared
constitutional (Magdirila, P., 2014). This proceed is an example of a serious governance in terms of
computer netethics or computer network ethics. The Philippines is experiencing computing ethical dilemma
in terms of moral values, privacy, and other norms that affects an individuals whole being. Among those
were reported in different news organizations such as cyber sex, pornography, cyber stalking, identity thief,
and financial thief and alike.
Leyte Normal University is a training institution in education, arts and sciences, and management
and entrepreneurships. As an institution it is expected to create a graduate that has the norms and values
of the university as responsible citizens of the Republic of the Philippines. The university is composed of a
diverse students, faculty, and staff coming from different part of the country, region, and towns with different
values, beliefs, intellectual understanding or educational background, experience, attitudes and others.
Because of these, this makes the university vulnerable to computer ethics predicament. It is on this premise
that this study deemed necessary to assess the level of awareness in computer ethics for responsible
computing.
Framework
Problem
The main thrust of this research is to gauge the degree of awareness for responsible computing
relative to computer ethics.
Related Literature
Methodology
Research Design
The research method used by the researchers in this study was the descriptive method, which
involved a questionnaire to assess the computer ethics awareness of the faculty, administrative personnel
and students of the Leyte Normal University, Tacloban City for SY 2014-2015.
Research Procedure
The researcher sought permission through the University President of the Leyte Normal University,
Tacloban City. This was done for the determination of samples directly involved in the study and for the
distribution of the questionnaires.
This study was confined to all the faculty, administrative personnel and students of Leyte Normal
University, Tacloban City for school year 2014-2015. To determine the sample size of the study, LR Gay
(1987) suggests that the larger the sample, the better it represents the population. However, if the sample
size is too large, 10% of large populations and 20% of small populations as minimum will be sufficient to
reduce time and cost of the study. Using Gay’s suggestion, in this study the selection of respondents was
done through simple random sampling and (20%) twenty percent was selected of the total population
equivalent to (______). The data is presented on the table below.
Research Population
The researcher used surveyed questionnaires as main data gathering tool for this study. The
instrument consists of two parts; the first part is composed of the demographic profile of the respondents
the second part focused on the computer ethics awareness. Such instrument was adopted from
______________________________________. Data collections was done through personal distribution
and were given enough time to think about the questions as stated on the questionnaire, thus producing
more accurate information period.
Statistical Treatment of Data
Responses from the questionnaires were directly encoded in an excel format. The data were
analyzed using the Statistical Package for Social Sciences (SPSS) software – descriptive statistics
(frequency counts, percentages, and mean).
The weighted mean of each item in the instruments was determined based on the following
formula:
x = fw/ n
where;
x = weighted average
Σ = summation
f = number of responses under each scale
w = the weight assigned to each scale
n= number of responses
To determine whether there were significant relationships the Point Biserial, ETA Correlation One
Way ANOVA, and Pearsons r were used. Specifically the following hypotheses were tested at 0.05 level of
significance:
1. There is no significant relationship between the profile of respondents and the level of
awareness in computer ethics?
Figures and tables presentation format followed the American Psychological Association Style
(APA Table Guidelines, 2007).
Conclusion
Recommendation
References
Computer and Information Ethics. (n.d.). Computer and Information Ethics. Stanford
Encyclopedia of Philosophy. Center for the Study of Language and Information. Retrieve from
http://plato.stanford.edu/entries/ethics-computer/
Cyber Security. (2005). Microsoft Teams with National Cyber Security Alliance for Awareness
Month. Microsoft News Center. Retrieve from http://www.microsoft.com/en-
us/news/features/2005/oct05/10-03cybersecurity.aspx
Endicott-Popovsky, B. (2009). Seeking a Balance: Online Safety for Our Children. Teacher
Librarian, 37(2), 29-34.
Horner, D. S. (2010). Moral luck and computer ethics: Gauguin in cyberspace. Ethics and
information technology, 12(4), 299-312.
L. R. Gay (1987) Educational research: competencies for analysis and application(3rd ed.).
Columbus, Ohio: Merrill Publishing Company, 101.
Macaraig, A. (2014). Why Nancy Binay wants students to learn cyberethics. Rappler. Retrieve
on 07/28/2014 from http://www.rappler.com/nation/49758-nancy-binay-cyberethics-basic-education
Magdirila, P., (2014). Philippines’ Cybercrime Law now in effect, punishing online libel is
Constitutional. TECHINASIA. Retrieve on 07/28/2014 from http://www.techinasia.com/philippines-
cybercrime-law-effect-punishing-online-libel-constitutional/
Online Writing Lab. (n.d.). General APA Guidelines. Purdue University. Retrieve from
https://owl.english.purdue.edu/owl/resource/560/01/
Republic Act 10175. (2012). R.A. 10175: Cybercrime Law. Retrieve on 07/28/2014 from
http://www.gov.ph/2012/09/12/republic-act-no-10175/