0% found this document useful (0 votes)
14 views

History of Computer Engineering

The paper provides an introduction to the history of computer engineering. He explains that since the invention of the computer in 1940, computing has been gaining importance. Then it summarizes the history of the computer engineer, ethics in computer science, the professional profile, the objectives and fields of practice of computer engineers. It also describes the principles and code of ethics that govern these professionals. Finally, it mentions some commonly used programs and concludes by highlighting the relevance
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

History of Computer Engineering

The paper provides an introduction to the history of computer engineering. He explains that since the invention of the computer in 1940, computing has been gaining importance. Then it summarizes the history of the computer engineer, ethics in computer science, the professional profile, the objectives and fields of practice of computer engineers. It also describes the principles and code of ethics that govern these professionals. Finally, it mentions some commonly used programs and concludes by highlighting the relevance
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

History of Computer Engineering http://www.buenastareas.com/impresion/Historia-De-Ingenieria...

Introduction
1. History of the computer engineer
2. Ethics and computing
3. Professional profile of the computer engineer
4. Computer engineer objectives
5. Field of professional practice of the computer engineer
6. Principles of the computer engineer
7. Computer engineer's code of ethics
8. Negative aspects in computing
9. Antivirus programs
10. Is it possible to stop piracy?
11. Conclusion
12. Bibliography

INTRODUCTION

Since the invention of the computer in 1940, more and more people are related to them in their work, from
analysts, programmers to executives and directors, the dynamic and demanding context of software
engineering requires that the code be relevant and adaptable to new situations as they arise. The Code
provides support to software managers and engineers who need to act positively, documenting the ethical
stance of the profession. The Code provides an ethical foundation to which individuals in a group or the group
itself can draw. The Code also helps define issues that are ethically inappropriate to request from a software
engineer or groups of engineers. Since Computer Science is not a discipline yet established and with a proven
tradition shared by many authors, there is no unanimity in the contents of this area. In the paragraphs that follow
we indicate a compilation of themes and problems that appear in the different authors.

1. History of the Computer Engineer

Since ancient times , human beings have been concerned with creating elements that facilitate the registration,
storage, recovery, processing and distribution of information. In this process, it has made great advances, some
of which have fundamentally transformed existing social structures. These advances can be grouped into two
large categories:

• Instruments for processing information.


• Methodologies for abstracting real-life events through information.
• The modern era has not been the exception to this process, as demonstrated by the presence of Computer
Systems, in the category of instruments, and Informatics, in the category of abstraction methodologies.
• The area where the greatest and most visible advances have been made in the application of computing and
Computer Systems is in the context of organizational management.
• Nowadays, INFORMATION is an important resource in the management of any type of institution. This
situation has motivated the need for a professional to guide the information management process within the
organization, with the aim of providing its users with what they need, when they need it, maintaining quality
levels. optimal. It should be noted that when reference is made to organizations, the term is not restricted to
industrial, commercial or financial organizations; on the contrary, the term is used in a broader sense to cover
fields where the application of information technology, the methodology of computer systems and technology
have great social impact.

2. Ethics and Computer Science

Computer ethics is considered the discipline that analyzes ethical problems that are created by computer
technology or also those that are transformed or aggravated by it, that is, by people who use advances in
information technologies. Computer ethics would be related to the conceptual problems and gaps in regulations
that information technology has caused. The problem is that there is a lack of regulation on how to use these
new technologies that enable new activities for which there are no clear principles of action or are not clearly
perceived. People with responsibilities in the area of design or management of information systems increasingly
have to make more decisions about problems that are not resolved by law and regulations.

1 of 11 18/10/2010 20:50
History of Computer Engineering http://www.buenastareas.com/impresion/Historia-De-Ingenieria...

Quasi-legal (regulations, company procedure manuals, etc.) but border on the ethical itself. The task of the EI is
to provide action guidelines when there is no regulation or when the existing one is obsolete.

3. Professional profile of the Computer Engineer:

It is related to the analysis and design of information systems used in the production of goods and services,
system optimization; administration and optimal use of computer facilities. Their work requires extensive
mathematical/scientific preparation, along with knowledge of statistics, industrial engineering, business
administration, programming language, and analysis and optimization of information systems.

4. Computer Engineer Objectives:

Be qualified to define, develop and manage the operational, administrative and managerial information systems
of an organization, emphasizing the use of computer systems as a tool to support these systems.

1. Understand and implement the processes that occur internally in computers from the moment electronic
data processing begins, to manage them and optimize their use.
2. Identify equipment needs in each functional area of the organization.
3. Participate in the automation process of a company by identifying the most appropriate equipment in each
case, as well as the basic systems to support the workload.
4. Carry out capacity studies for the future loads that the computing equipment will support.

5. Field of Professional Practice of the Computer Engineer

1. IT Director.
2. Computing manager.
3. Data production manager.
4. Project manager.
5. Data processing advisors.
6. Systems analysts-programmers.

5.1. Most used programs in the computer environment

• Windows 95, 98, 98SE, ME, 2000 and XP


• Linux
• explorer
• Mac
• words
• Excel, Among Others.

6. Principles of the Computer Engineer:

• Society: Software engineers will act in a manner consistent with the general interest.
• Client and entrepreneur: Software engineers must act in such a way that they serve the best interests of their
clients and entrepreneurs, and consequently the general interest.
• Product: Software engineers shall ensure that their products and related modifications meet the highest
professional standards as far as possible.
• Judgment: Software engineers must maintain integrity and independence in their professional assessment.

• Management: Managers and leaders in software engineering will subscribe to and promote an ethical
approach to the management of software development and maintenance.
• Profession: Software engineers must advance the integrity and reputation of the profession, consistent with
the general interest.
• Colleagues : Software engineers will be fair and supportive of their colleagues .
• Person: Software engineers must participate in continuous learning in the practice of their profession and
promote an ethical approach to it.

7. Code of Ethics for the Computer Engineer:

2 of 11 18/10/2010 20:50
History of Computer Engineering http://www.buenastareas.com/impresion/Historia-De-Ingenieria...

1 .01. Accept full responsibility for your work.

1.02. Mitigate your own interests, those of the businessman, those of the client and those of the users with
those of the public welfare.

1.03. Give approval to software only if you have a well-founded belief that it is safe, that it meets specifications,
that it has passed the relevant tests, and that it does not diminish the quality of life, confidentiality, or harm the
environment. . The ultimate effect of work should be public welfare.

1.04.Disclose to the appropriate persons or authorities any actual or potential danger to the user, society or the
environment, which danger they reasonably believe is associated with the software or related documents.

1.05. Cooperate in matters related to serious concerns caused by the software, its installation, maintenance,
support or documentation.

1.06.Be fair and truthful in all statements, especially those that are public, relating to the software or related
documents, methods and tools.

1.07. Consider issues of physical disabilities, resource allocation, economic disadvantages, and other factors
that may diminish access to the benefits of the software.

1.08. Be willing to use professional skills for good causes and contribute to the education of the general public
regarding their discipline.

2.01. Provide services only in the areas of your competence, being honest and frank about any limitations in
your experience or education.

2.02. Do not knowingly use software obtained or retained illegally or unethically.

2.03. Use the property of a client or employer only in appropriately authorized ways, and with the client's or
employer's knowledge and consent.

2.04. Ensure that any document relied upon has been approved, where required, by someone with the authority
to do so.

2.05. Keep any confidential information obtained through professional work private, provided that such
confidentiality is not inconsistent with aspects of general interest or the law.

2.06. Promptly identify, document, collect evidence and inform the client or business owner if, in your opinion, a
project is likely to fail, be too expensive, violate intellectual property laws or be problematic.

2.07. Identify, document and inform the employer or client about any matter of social interest, or of which there
is knowledge, about the software or related documents.

2.08. Do not accept external work that is detrimental to that which you develop for your main

contractor.

2.09. Not represent an interest contrary to that of the businessman or the client, unless another higher ethical
value is compromised; In the latter case, the employer or other competent authority will be informed about this
ethical concern.

3.01.Promote the highest quality, acceptable cost and reasonable time, ensuring that significant commitments in
this regard are clear, accepted by the employer and the client and available for consideration by the user and
the general public.

3.02. Ensure appropriate and achievable objectives for any project they work on or will work on.

3.03. Identify, define and examine ethical, economic, cultural, legal and environmental issues related to any
project.

3 of 11 18/10/2010 20:50
History of Computer Engineering http://www.buenastareas.com/impresion/Historia-De-Ingenieria...

3.04. Ensure, through a suitable combination of education, training and experience, that they are qualified for
any project on which they work or will work.

3.05. Guarantee an appropriate methodology for any project they work on or will work on.

3.06. Work to follow industry standards, if available, that are most appropriate for the tasks, deviating from them
only when ethically or technically justified.

3.07. Strive to fully understand the specifications of the software you are developing.

3.08. Ensure that the specifications for the software on which they work have been well documented, satisfy the
requirements

3.09. Ensure realistic quantitative estimates of cost, timelines, personnel and results for any project they work
on or will work on, and provide an assessment of the uncertainty of those estimates.

3.10. Ensure proper testing, debugging, and review of the software and related documents they work on.

3.11. Ensure proper documentation, including significant issues discovered and solutions adopted, for any
project they work on.

3.12. Work to develop software and related documents that respect the confidentiality of those who will be
affected by that software.

3.13. Be careful to handle only accurate data, obtained through legal and ethical means, and use it only in
properly authorized ways.

3.14. Maintain the integrity of the data, being sensitive to data that is obsolete or incorrect.

3.15. Treat all forms of software maintenance with the same professionalism as new developments.

4.01. Moderate all technical judgments due to the need to protect and maintain human values.

4.02. Sign only documents prepared under your supervision or within your areas of competence, and with which
you agree.

4.03. Maintain professional objectivity with respect to any software or related documents for which evaluation is
requested.

4.04. Not engage in deceptive financial practices, such as bribery, double billing or other improper practices.

4.05. Communicate to all parties any conflicts of interest that cannot reasonably be avoided.

4.06. Reject participation, as members or advisors, in private, governmental or professional organizations linked
to software issues, in which they, or their employers or clients, have potential undisclosed conflicts of interest.

5.01. Ensure good management in any project they work on, including effective procedures to promote quality
and reduce risk.

5.02. Ensure that employees are informed of the standards before adhering to them.

5.03. Ensure that employees are aware of the employer's policies and procedures for the protection of access
codes, files and other information that is confidential to the employer or others.

5.04. Assign work only after taking into account education and experience, taking into account the desire to
improve such education and experience.

5.05. Ensure realistic quantitative estimates of cost, time, personnel, quality and products on any project they
work on or intend to work on, and provide an assessment of the uncertainty of those estimates.

4 of 11 18/10/2010 20:50
History of Computer Engineering http://www.buenastareas.com/impresion/Historia-De-Ingenieria...

5.06. Attract employees only through a complete and accurate description of working conditions.

5.07. Offer adequate and fair remuneration.

5.08. Do not unfairly prevent another from obtaining the position they deserve according to their qualification.

5.09. Ensure that there is proper agreement regarding ownership of any software, processes, research, writings,
or other intellectual property to which the software engineer has contributed.

5.10. Provide the corresponding means in case of allegations of non-compliance with the employer's policy or
this Code.

5.11. Do not ask a software engineer to do anything inconsistent with this Code.

5.12. Don't punish anyone for expressing ethical concerns about a project.

6.01. Help develop an organizational environment conducive to ethical behavior.

6.02. Promote general knowledge of software engineering.

6.03. Disseminate software engineering knowledge through participation in professional organizations,


meetings, and publications.

6.04. Support, as members of a profession, other engineers who strive to follow this Code.

6.05. Do not promote self-interest at the expense of the profession, the client or the employer.

6.06. Obey all laws that govern your work, unless, in exceptional circumstances, such compliance is
inconsistent with the general interest.

6.07. Be precise in the description of the characteristics of the software on which they work, avoiding not only
false statements, but also those that could reasonably be assumed to be speculative, empty, disappointing,
misleading or dubious.

6.08. Have the responsibility to detect, correct and report errors in the software and associated documents they
work on.

6.09. Ensure that clients, employers, and managers are aware of the software engineer's obligation to this Code
of Ethics, and the subsequent ramifications of that obligation.

6.10. Avoid associations with companies and organizations that conflict with this code.

6.11. Consider that non-compliance with this Code is inconsistent with being a professional software engineer.

6.12. Express concerns to those involved when significant breaches of this Code are detected, unless it is
impossible, counterproductive or dangerous.

6.13. Report violations of this Code to the relevant authorities when it is clear that it is impossible,
counterproductive or dangerous to consult the people involved in these violations.

7.01. Encourage colleagues to adhere to this Code.

7.02. Help colleagues in professional development.

7.03. Fully recognize the work of others and refrain from attributing merits that are not your own.

7.04. Review the work of others in an objective, sincere and properly documented manner.

7.05. Treat a colleague 's opinions, concerns or complaints fairly.

5 of 11 18/10/2010 20:50
History of Computer Engineering http://www.buenastareas.com/impresion/Historia-De-Ingenieria...

7.06. Help colleagues fully understand work standards, including policies and procedures to protect access
codes, files and other confidential information, and security measures in general.

7.07.Do not unfairly interfere in the professional career of a colleague ; However, concern for the employer, the
client or the public interest may require, with good will, to question the competence of a colleague .

7.08. In situations that fall outside your personal areas of competence, consult the opinions of other
professionals who have competence in that area.

8.01. Improve your knowledge of advances in the analysis, specification, design , development, maintenance
and testing of software and related documents, along with the management of the development process.

8.02. Improve your training to create quality, safe, reliable and useful software, at a reasonable cost and within a
reasonable time frame.

8.03. Improve your ability to produce accurate, informative and correctly written documentation.

8.04. Improve their understanding of the software and related documents they work on and the environment in
which they will be used.

8.05. Improve their knowledge of relevant standards and laws that regulate the software and related documents
they work on.

8.06. Improve your knowledge of this Code, its interpretation and its application to work.

8.07. Do not give unfair treatment to anyone due to irrelevant prejudices.

8.08. Not influence others to take any action that would lead to non-compliance with this Code.

8.09. Recognize that personal failures to comply with this Code are inconsistent with being a professional
software engineer.

8. Negative aspects in computing:

1. Software piracy.
2. Using computational resources for software falsification.
3. Create viruses for PC.
4. Unauthorized interference with company data or the data on another employee's machine.
5. Collect data from another person without their authorization.
6. Use computers to monitor employee performance .
7. Violate the primacy of software and database.
8. Misuse company information.
9. Misuse of email.
10. Cyberpornography.

This whole series of problems and many others are due to the loss of values on the part of the individuals who
make up society. Computer professionals are called to proceed with upright and moral judgment in the
administration of information systems.

1.

2. Software piracy

The term "software piracy" covers different activities: illegally copying programs, counterfeiting and distributing
software - even sharing a program with a friend.

It is important to understand the different channels of software piracy, not only to comply with the law but also to
protect yourself against even greater economic problems such as loss of income and loss of jobs.

6 of 11 18/10/2010 20:50
History of Computer Engineering http://www.buenastareas.com/impresion/Historia-De-Ingenieria...

Software Piracy, which consists of the illegal copy or use of programs. Piracy is a huge problem because it is so
easy to do. In most cases, software pirates give up the right to receive updates and technical support, but get
the use of the program without paying for it.

Software is pirated in many ways. The simplest method is to copy the software from your original floppy disks or
compact disc. Users on a network can easily copy certain types of software directly from the server, or even
exchange programs through their organization's email system. Pirated software affects everyone — from
software developers, retail store owners, and even all end users. Internet piracy refers to the use of the Internet
to illegally copy or distribute unauthorized software. Infringers may use the Internet for all or some of their
operations, including advertising, offers, purchases or distribution of pirated software. The Web has increased
software piracy.

2.2. The 25 Most Pirate Countries [pic]

3.

4. Software Counterfeiting

Counterfeiting is the large-scale illegal duplication and distribution of software. Many counterfeiting groups are
linked to organized crime — and counterfeit and package software using sophisticated techniques. Thus, the
packaged software is sold as legitimate imitation software. When produced in large volumes, counterfeiting is a
sophisticated criminal activity. Software piracy has become a link for money laundering schemes that in turn
finance and promote arms smuggling, gambling, extortion and prostitution.

Illegally sharing software with friends or within a company is a problem. Counterfeiting with intent to sell is
another problem entirely. Counterfeiting is big business in some parts of the world, most notably in Europe and
Asia. In many countries, software products and other types of intellectual property do not enjoy the same
copyright or trademark protections as other types of products.

• Counterfeiting software threatens the industry's ability to maintain its important contribution to the U.S.
economy. According to a study on software piracy by International Planning & Research Corp., during the year
2000, software piracy resulted in the loss of 118,026 jobs in the United States, approximately $1.6 billion in tax
revenue, and $5.6 billion in salaries.
• In the fiscal year ending June 2001, approximately 2.7 million units of counterfeit Microsoft software and
hardware were seized worldwide, with a retail price value of more than US$781 million — as a result of dozens
of legal actions around the world. • The largest seizure of Microsoft software to date occurred on November 9,
2001 when more than $60 million in software was seized. In the 18-month undercover investigation conducted
by Customs Service, Microsoft investigators worked with the Southern California High Tech Task Force to
disrupt a large counterfeit software distribution flow that moved containers of counterfeit software and other
components illegal by ship from Taiwan to the port of Los Angeles.
3.

4. computer viruses

A virus is a program with instructions created expressly to cause damage or alterations to computer systems,
such as files or vital areas of a system: boot sector, Master Boot Record, Partition Table, as well as archive
files. various extensions. They are called viruses, since, like biological species, they are small , they self-
reproduce and infect a receiving entity from a transmitting entity. They are known as computer viruses,
computer, cyber or electronic viruses and for the purposes of this information page we will simply call them.
They spread through various methods. It is a parasitic program hidden inside another legitimate program or
stored in a special area of a disk called the boot sector. Running the legitimate program or accessing the disk
activates the virus without the user's knowledge. The effects of a virus, known as payloads, are many and
depend on the intention of the actions, breakdowns or destructive effects of its creators.

Thus, upon their appearance in 1984, PC viruses were classified by Dr. Fred Cohen, recognized as the first
virus researcher, into three categories:

• Trojan Horse
• Worms

7 of 11 18/10/2010 20:50
History of Computer Engineering http://www.buenastareas.com/impresion/Historia-De-Ingenieria...

• Viruses (worms)

8.4.1. Viruses can be programmed to carry out the following tasks, and many others:

• Copy themselves to other programs.


• Display information on the screen.
• Destroy data files.
• Erase an entire hard drive.
• Download a file from another user, from an online service, or from the Internet.
8.4.2. Evolution of computer viruses
• 1983

Virus researcher Fred Cohen coined the term "computer virus" in a research paper.
• 1987
BRAIN, the first computer virus, appears and infects the boot sector of 360KB floppy disks.
• 1988
An Indonesian programmer presents the first antivirus software. This program detects the BRAIN virus, extracts
it from the computer and immunizes the system against other possible attacks by the same virus.
• 1989
The DARK AVENGER appears. It infects programs quickly but subsequent damage occurs slowly, allowing the
virus to go undetected for a long time.
• 1990
Some more advanced types of viruses such as polymorphic viruses (which modify themselves as they spread)
and multipartite viruses (which infect several parts of a PC) make their appearance.
• 1992
MICHELANGELO appears (the first virus that caused a frenzy in the press), which is configured to rewrite parts
of the infected hard drive, precisely on March 6, when the anniversary of the birth of the famous Renaissance
artist is celebrated. Sales of antivirus software are increasing considerably, although only few cases of infection
are reported.
• 1995
CONCEPT, the first macro virus, appears. Written in Microsoft's Word Basic language.
• 1999
The CHERNOBYL virus, which makes the entire hard drive and user information completely inaccessible.
Although CHERNOBYL infects only a few PCs in the US, it inflicts extensive damage on the remaining
continents. China suffers more than $291 million in damage , Turkey and South Korea are also affected. • The
MELISSA virus attacks hundreds of thousands of computers around the world. MELISSA uses Microsoft
Outlook to send itself to 50 people in the affected user's directory first.
• 2000
The LOVE LETTER virus, launched from the Philippines, sweeps much of Europe and the US in just 6 hours. It
infects 2.5 to 3 million machines, with an estimated $8.7 billion in damage .

9. Antivirus programs:

Virus scanning requires antivirus software, which scans disks and programs for known viruses and eradicates
them. Most antivirus programs are easy to use. After it is installed and activated on your system, a good
antivirus program automatically checks for infected files every time you insert any type of disk or use your
modem to retrieve a file. A few antivirus programs can even scan files while you are downloading them from the
Internet and can instantly alert you when you download an infected file.

9.1. Most common antiviruses:

• McAfee VirusScan
• IBM AntiVirus
• Dr. Solomon`s Anti-Virus
• Symantec Antivirus for the Macintosh
• Norton Antivirus
• Virex

10. Is it possible to stop piracy?

8 of 11 18/10/2010 20:50
History of Computer Engineering http://www.buenastareas.com/impresion/Historia-De-Ingenieria...

Although the results have not been as expected, little by little progress has been made. This year the ADS is
preparing a new offensive: to change the mentality of children and young people by teaching them that piracy is
theft and must be punished.
It seems like a fight destined to fail. The temptation to get software at a cheaper or free price is still much
stronger than continuing on the path of honesty and integrity by buying one legally. The figures in our country
are eloquent. Piracy is currently around 53%.
And those responsible are at all levels, from private users, small and medium-sized businesses to large
companies. According to ADS estimates, in large companies the use of unlicensed programs is 35%, while in
small and medium-sized companies (SMEs) this figure rises to 80%.
The consequences of this are that the State loses about 51 million dollars annually in taxes; There is unfair
competition between companies that apply for the same project due to the costs involved in working with legal
software compared to the cost of pirated software; and the national software industry faces a lack of resources
and unemployment.
However, efforts to reverse this situation have borne some fruit: in Chile, piracy has dropped from 68% in 1994
to 56% in 1997. Last year they set out to reduce illegal software copying from 56% to 50%, but there was only a
3% decrease. In view of this, the goal for this year is to reduce these figures to 49%.

More than 4,000 companies are being investigated in Chile for alleged illegal use of software within the attack of
the association of distributors of the sector and that will concentrate its artillery on medium and small companies.
A little over 10 years ago, software manufacturers decided to embark on a relentless hunt against the illegal use
of computer programs. By then, computer piracy had reached worrying levels, with an estimated 81% of all
software on the market being unauthorized copies. There have been many important companies that, during
these years , succumbed to the evidence: transportation, private universities, pharmaceutical industries, dairy
products or banks. In almost all imaginable areas, there was more than one that had to reach an agreement
with the plaintiffs to avoid suffering the attacks of a criminal complaint and exposing themselves to the public as
violators of the intellectual property law.
It was so much so that the Association of Software Distributors (ADS, an entity that brings together the most
important companies in the field, such as Microsoft, Adobe Systems, Symantee, Corel, Autodesk and Network
Associates) chose to open a grace period. Between January and March, companies had to regularize their
situation, acquiring licenses for the programs in use. Estimates from the organization indicate that, currently, in
large companies the use of unlicensed programs is 35%, a figure that rises to 80% in medium and small
companies (SMEs).
However, the call did not have the expected impact. The ADS estimates that 90% of the companies that were
suspicious continue to be so, especially SMEs. And for this reason, the strongest attack will be on this sector:
three companies (including an advertising agency and a communications agency) have already been surprised
by the arrival of inspectors at their offices during the last two months. Of course, these were small discoveries;
The most important ones will come shortly, when the surprise visits gradually take place in each of the 50
companies that the ADS has identified, within the union body's objective of intensifying the number of legal
actions. Other 4. 000 are under investigation
The size of the problem is explained, in part, by considering how easy it is to use the programs illegally, the cost
savings that this means for the user, and the lack of awareness that a crime is being committed. The informal
market is wide and varied and includes the importation and sale of counterfeit products. For example, CD-Roms
have been detected that have several programs incorporated, whose overall value would amount to US$50. 000
if they were bought in the formal market, and they sell for only $10. 000 in places as accessible as the Persian
Market. It is also common among those who sell assembled computers (without a brand), to acquire a program
with its respective license and then make copies to offer as part of the final product. To detect them, the ADS
has not had to make too much effort, since some -even- appear with economic advertisements in the
newspapers
But where one of the strongest points of illegal use lies is in what companies do. To reduce costs, many
purchase a program and then play it on the rest of their computers. This is because when a company wants to
operate with a certain software, it is obliged to purchase - in addition - a license for each workstation on which
the program will be installed (see box). Something similar to what happens with videos or books, which are also
protected by the Intellectual Property Law.

CONCLUSION

We have analyzed in the preceding pages the situation of this new discipline called Computer Ethics. To this
end, we have begun this study with a title, "What is computer ethics?", which is not original, but is the same as

9 of 11 18/10/2010 20:50
History of Computer Engineering http://www.buenastareas.com/impresion/Historia-De-Ingenieria...

the one that heads an article by James Moor written in 1985, What is Computer Ethics?, which has become an
EI classic and has been published in almost half a dozen sites.

After the presentation of this new discipline, Computer Ethics, we can conclude that we are facing a serious
attempt to propose a systematized reflection on the ethical aspects of one of the most relevant characteristics of
our world: the informational dimension of society. EI is part of the "return to ethics" that is taking place in
philosophical thought and in other fields of social activity, which translates in technical fields into avoiding the
absolutization of instrumental rationality and technical pragmatism. The fact that science advances and
technology offers increasingly better solutions to practical problems does not mean that ethical problems or
questions of meaning are resolved satisfactorily or no longer have a place. The ethical, social or meaning
problems of a society are not resolved simply with technological progress, in this case progress in information
technologies.

From the above we can also conclude that we are facing new challenges both in the professional world and in
the educational world, EI represents a challenge for educational life, in the sense that educating in ethical
awareness must also be part of the curricula. of computer science education and research centers. As indicated
before, the Spanish educational system is quite behind in this compared to the North American one. On the other
hand, this reflection should have its own nuances that do not imply a literal following of Anglo-Saxon patterns
that, for example, suffer from individualism and utilitarianism.

We end with a note on the same expression "computer ethics." If Moor spoke of IE as the study of the impact of
computers, years later Bynum spoke of the impact of information technology (IT), although today it would be
more appropriate to speak of the impact of information technologies. information and communications (ICT).
Well, the very expression "computer ethics" may become obsolete and we will have to find an expression that
includes not only computing but the entire set of information and communications technologies; It is clear that
information technology plays a main role in this new era, but we also accept that complex moral and ethical
dilemmas arise, which represent a challenge that we must face in a determined and responsible manner.

Society must increasingly prepare to face this emerging transition, and each individual must manage knowledge
and information with upright and moral judgment.

Bibliography

• WWW.SEERI.ETSU.EDU
• WWW.ATI.ES/DOCS
• WWW.ACM.ORG/SERVING/SE/CODE.HTM
• WWW.SIMIL.COM/SYNAPSIS/073/G/SYN073_G.HTM
• WWW.MANTRUC.COM/TESIS/YVES.HTM
• WWW.ZYBERCHEMA.NET/MULATAS/VIRUS.HTML
• CR.WIRED.COM/WIRED/TECHNOLOGY/0,1157,25735,00.HTML
• WWW.BSA.ORG/RESOURCES/2001-05-22.56.PDF
• GLOBAL.BSA.ORG/ESPANA/POLICYRES/GSPS2002.PDF

10 of 11 18/10/2010 20:50

You might also like