0% found this document useful (0 votes)
13 views

Spic Compiled Reviewer

Reviewer for SPIC subject

Uploaded by

santosajl0623
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Spic Compiled Reviewer

Reviewer for SPIC subject

Uploaded by

santosajl0623
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

Chapter 1

Introduction to Social and Ethical Computing

 Historical Development Computing

 Development of the Internet

 Development of the World Wide Web

 The Emergence of Social and Ethical Problems in


Computing
Mechanical Calculator
 The Case for Computer Ethics Education

HISTORICAL DEVELOPMENT BEFORE 1900AD

 Man sought to improved life through the invention of


the ff.

 First utility tools recorded dealt with numbers


Slide Rule
 First recorded on bones – 20,000 to 30,000 B.C.

 First place-value number system in place – 1800


B.C.S

 Abacus – Mother of Computers – 1000 B.C.


and 500 B.C.

 Zero and Negative Numbers – 300 B.C. and


500 A.D.

 1500AD and 1900AD lot of activities in the


development of computing devices

 Driven by commerce

 1500 Leonardo da Vinci invented mechanical


calculator Wilhelm Schichard’s Mechanical Calculator

 1621 invention of the slide rule

 1625 Wilhelm Schichard’s mechanical


calculator in

 1640 Blaise Pascal’s Arithmetic Machine

 Major breakthrough in speed up

 1800 AD with the invention of the punched card


by Joseph-Marie Jacquard

 Revolutionized computing
Blaise Pascal’s Arithmetic Machine
 Quickly spread in other fields

 Speed up computation and storage of


information
 Mid 1850 through the turn of the century

 1857 – Sir Charles Wheatstone’s invention

 Paper tape to store information

 Created new excitement in the computing


community of the time.

 Huge amounts of data could be entered &


stored
Punched card by Joseph-Marie Jacquard
 1869AD – Logic Machine by William Stanley
Jovons

 ~1874 – first keyboard by Sholes


 1830 AD exciting period
 1881 – Rectangular Logic Diagrams by Allan
 1830 – Charles Babbage’s Analytical Engine Marquand

 George and Edward Schutz’s Difference


Engine

 Within a decade – major milestone

 George Boole’s invention of Boolean Algebra

 Opened fields of mathematics, engineering,


& computing

 Lead to the new frontiers in logic

Paper Tape

Charles Babbage’s Analytical Engine First Keyboard by Sholes

 Mid 1850 through the turn of the century

 1886, Charles Pierce – first linked Boolean


Algebra to circuits based on switches

 Major breakthrough in mathematics,


engineering and computing science

 1890 – John Venn invented the Venn diagrams

 Used extensively in switching algebras in


both hardware and software development
George and Edward Schutz’s Difference Engine
 1890 – Herman Hollerith invented the  Input and output data was on punched cards
Tabulating Machine
 Some doubt it ever worked
 Utilized Jacquard’s punched card to read the
presence or absence of holes.

 The data read was to be collated using an  Howard Aiken – developed Harvard Mark I
automatic electrical tabulating machine  1st large scale automatic digital computer.
 Large number of clock-like counters  also known as IBM automatic sequencer
 Summed up and accumulated the results in calculator- ASCC
a number of selected categories.  1943, Alan Turing – COLOSSUS

 Considered 1st programmable compute

 designed to break the German ENIGMA code


AFTER 1900 AD  used about 1,800 vacuum tubes

 execute a variety of routines.


 Computing in infancy

 Century began with a major milestone

 Vacuum tube by John Ambrose Fleming.

 Played a major role in computing for the next


half century.

 All digital computer in the first half century ran


on vacuum tubes.

 1906 – triode by Lee de Forest

 1926 – first semiconductor transistor German Enigma Code

 Not used for several years

 Came to dominate the computing industry in  John William Mauchly & J. Presper Eckert Jr –
late years ENIAC

 1937 – Turing Machine by Alan Turing  ELECTRONIC NUMERICAL INTEGRATOR AND


COMPUTER
 Invention of an abstract computer
 Vacuum tube-based general purpose
 Some problems do not lend themselves to
algorithmic representations, not computable  10 feet high

 1942 – COLOSSUS, one of the first working  Weighed 30 tons


programmable digital computers  Occupied 1,000 square feet

 70,000 resistors
 1942 – Turing designed COLOSSUS  10,000 capacitors
 One of the first working programmable digital  6,000 switches
computers
 18,000 vacuum tube
 1939 – Vincent Atanasoff – 1st digital computer
model  No internal memory

 Utilized capacitors to store electronic charge to  Hard-wired


represent Boolean numbers
 Consistently programmed by switches and
 0 and 1 used by the machine in calculations diodes
 1944 – 1952 John William Mauchly & J. Presper Microprocessor
Eckert Jr – EDVAC
 1974 – truly general-purpose microprocessor
 ELECTRONIC DISCRETE VARIABLE
AUTOMATIC COMPUTER  8080 – 8-bit device – 4,500 transistors &
astonishing 200,000 operations per second
 1st truly general-purpose digital computer

 Stored program instruction concept

 completed in 1956
Computer Software and Personal Computer (PC)
 4,000 vacuum tubes and 10,000 crystal
diodes  Until mid-1970s

 1948 – UNIVAC I  Development led by hardware

 1st commercially available computer.  Computers were designed and software was
designed to fit the hardware.

 Personal computing industry began


 Many companies became involved
 1976 – Apple I and Apple II microcomputer were
 International Business Machines (IBM), unveiled
Honeywell, and Control Data Corporation
(CDC) in the USA, and International  1981 – IBM joined the PC wars
Computers Limited, (ICL) in UK  3 Major Players
 Built mainframe  IBM
 Expensive – use limited to big corporations  Gary Kildall – Developed the first PC operating
 Mid to late sixties system

 Developed less expensive but smaller computer  Bill Gates – Developed the Disk Operating
System (DOS).
 Minicomputer

 Timesharing concept

 Let to idea of networking


The Development of the Internet

 Internet based on 4 technologies


 1971 and 1976 – first microprocessor
 Telegraph
 Built with integrated circuit with many transistors
on a single board  Telephone

 Vacuum tubes and diodes no longer used  Radio

 Ted Hoff  Computers

 The 4004  Originated from the early work of J.C.R. Licklider

 4-bit data path  Conceptualized a global interconnected set of


computers
 1972 – Intel - 8008
 Concept for communication between network
 8-bit microprocessor based on the 4004 nodes
 first microprocessor to use a compiler  Packets instead of circuits
 Specific application microprocessors  Enabled computers to talk to each other.

 1961 – Kleinrock

 Published first work on packet switching theory


 Beginning concepts – Tim Berners-Lee’s 1989

 Proposal called HyperText and CERN

 Enable collaboration between physicists &


researchers in the high energy physics research

 Three new technologies were incorporated.

 HyperText Markup Language (HTML)

 hypertext concepts – to be used to write


Telegraph web documents

 HyperText Transfer Protocol (HTTP) a protocol

 Used to transmit web pages between hosts

The Development of the Internet  Web browser client software program to


receive and interpret data and display
 Two additional important projects results.
 Donald Davies and Roger Scantleberg

 Coining the term packet

 Connected computer in Boston with one in Emergence of the Social & Ethical Problems in
Los Angels Computing
 Low speed dial-up telephone line  The Emergence of Computer Crimes
 created the first working Wide Area  Perhaps started with the invention of the
Network computer virus
 1967 Roberts – publishing the first plan for  The term virus is derived from a Latin word
ARPNET virus which means poison
 1968 – team, led by Frank Heart and included  Computer virus
Bob Kahn, developed IMP
 Self-propagating computer program

 Designed to alter or destroy a computer


system resource
ARPANET  Spreads in the new environment
 Began as tool for defense contractors  Attacks major system
 Universities added  Weakens the capacity of resources to perform
 Government joined  1972 – virus used to describe piece of unwanted
 Other countries joined computer code

 ARPANET ceased to exist in 1989

 Internet was an entity to itself

Development World Wide Web Growth of Computer Vulnerabilities


 Study computer ethics as remedial moral education

 Computer ethics education not as a moral education


but as a field worthy of study in its own right

Justification for First Thought

 We should study computer ethics because doing


so will make us behave like responsible
professionals.

 We should study computer ethics because doing


so will teach us how to avoid computer abuse and
catastrophes.
The Case for Computer Ethics Education

 What is Computer Ethics

 James H. Moore
Justification for Second Thought
 First coined the phrase “computer ethics”
 We should study computer ethics because the
 Computer ethics is the analysis of the advance of computing technology will continue to
nature and social impact of computer create temporary policy vacuums.
technology and the corresponding
formulation and justification of policies for  We should study computer ethics because the
the ethical use of such technology. use of computing permanently transforms certain
ethical issues to the degree that their alterations
 Definition focuses on the human actions require independent study.
 Study, an analysis of the values of human  We should study computer ethics because the
actions influenced by computer technology. use of computing technology creates and will
 Computer influence on human actions is continue to create novel ethical issues that require
special study.
widespread throughout the decision-making
process preceding the action.  We should study computer ethics because the
 Education we study the factors that influence the set of novels and transformed issues is large enough
and coherent enough to define a new field
decision-making process.

Why You Should Study Computer Ethics

 Central task of computer ethics

 determine what should be done

 Especially whenever there is a policy vacuum

 Vacuums caused by the ‘confusion’ between the


known policies and what is presented.

 Professionals unprepared to deal effectively with the


ethical issues.

 Can stop the vacuums

 Can prepare the professionals

Schools of Thought
CHAPTER 2 NOTES Moral Principles – the fundamental ethical guidelines
that serve as a foundation for ethical theories and
Morality and the Law systems.

Morality is personal (standard about what is right or


wrong).
Primary and Secondary Moral Principles
Ethics refers to the standard of a community or society.
(pano nagbebehave ang induvial or society) Primary Moral Principles – it is the fundamental ethical
guidelines

Secondary Moral Principles – they are derived from


primary principles, or it is more specific guidelines for
Three definition of morality: behavior.

 Descriptive definition of morality – the


standard of rules set by the following: Principle of Honesty – whether a person tells the truth
or whether he is being transparent or not.
Individual – different perspectives (what is right or
wrong)

Social Groups – rules or standards

Religions – beliefs

Society – beliefs also Definitions of Moral Codes

 Normative definition of morality – it is an Moral Codes - these are specific set of rules or
adjective that means related or based on norms guidelines or principles that outlines expected behavior
or standards and actions within a given context.

Rational – you have to ability to reason out (whether an Definition of Encyclopedia, these are rules or normal
act is immoral or moral) norms with a group of what is proper behavior for the
members of a group or specific group.

 Synonymous with ethics - the systematic


philosophical study of the moral domain. It Morality is relative to Time – refers to the idea that
involves exploring and analyzing the moral values and principles can change or evolve over
fundamental questions about what is right or different historical periods or eras.
what is wrong, and about what is good and what
is bad and how individuals and societies ought
to behave.

WHY DO WE HAVE MORAL THEORIES?

So according to McDonnell, Moral theories “seek to


introduce a degree of rationality and rigor into our moral Moral Standard
deliberations.”
Examples:

Honesty – it is the principle of telling the truth and being


Moral Decision Making transparent in one's actions and communication.
- primarily help us perceive moral principles
Respect for Others – it is the belief and the individuals Note: Natural Law is theory siya nung una and then later
with dignity regardless of their background and on tinawag na siyang Natural Law. Kaya siya Natural
recognizing their rights and autonomy. Law kase eto yung acceptable and hindi acceptable na
law. Common sense lang to.

Law
Conventional Law
It means it is governed by the government, or
established by the government, or the policies - Also known as positive law
established by the government. - Positive Law - It is a system of laws and
regulations that are formally established and
recognized by the governing authority.
Black – an art we can create and model. It is a - are created through legislative processes,
statement wherein talks about the richness and diversity decrease statutes, regulations and legal codes,
of black culture and identity. It also reflects a broader unlike natural law which is often based on moral
movement that seeks to challenge stereotypes, promote and philosophical principles.
self-expression and reclaim agency over cultural - it is formally established and recognized by a
narratives. governing authority (mga nakasulat na batas)

Contemporary Critics – it is instrument of exercising


power.
2 Forms of Conventional Law:
Example: sharing public opinion – you have the power to
influence other people Declarative – we simply reaffirm these principles and
declare certain actions as right and wrong based on
underlying natural law.

Determinative – guidelines for adhering to natural


principles. How people should act in accordance with the
underlying natural law. Guidelines to help us follow the
Natural Law declarative (mapapasunod tayo sa natural law or the
declarative)
Natural Law – it is unwritten but universal. It is eternal
absolute moral law and can be discovered by reason,
and it is derivable from reason. It also refers to the idea
that these moral principles are not codified in a specific
legal or written document, but these are believed to be
universally applicable, and recognizable through reason
and observation. It is often considered a fundamental
aspect of human nature and the basis for ethical
behavior.

- Applies to all rational creatures, meaning for Penal Code


humans only
- more on the punishment side.
Natural Law Theory – it is all about ignorance and
emotion. It was established or was created by Thomas
Aquinas. Three function of punishment system:

Retributive – more on the idea of an eye for an eye,


wherein the severity of punishment is proportionate to
Inclination – natural behavior or natural action of one the severity of crime committed. The primary goal is to
person. restore a sense of justice and balance by making the
offenders suffer in a way that respects the harm they
cost.
Corrective – also called rehabilitative or rehabilitate. It
is the corrective or rehabilitative theory of punishment
which aims to reform and rehabilitate offenders. The
approach here is all about helping the offenders to
reintegrate the law-abiding citizens.

Deterrent – focused on preventing individuals from


committing crimes by instilling fear of punishment.
Chapter 2 Moral Decision Making

Morality  Considerations

 Facts surrounding the situations

 Taking into account the interests of all


parties involved
Morality
 Taking into account the moral principles
 A set of rules for right conduct involved
 A system used to modify and regulate behavior  Take into account how the decisions will
 Quality system in human acts by which we judge affect others.
them right or wrong  Helps us perceive moral principles
 3 Definitions  Use reason to determine the best way to achieve
 Descriptive the highest moral good

 Normative/universal  Distinguish between primary and secondary moral


principles
 Synonymous with ethics
 Primary – general
 Concerns set of shared rules, principles, and
duties  Secondary – more specific

 Independent of religion  Make rational calculations of the consequences of


our actions
 Applicable to all in a group or society

 Has no reference to the will or power of one


individual
Definitions of Moral Codes

 Internet Encyclopedia of Philosophy

Descriptive Definition of Morality  Rules or norms within a group for what is


proper behavior for the members of that
A set of rules or codes of conduct that governs human group.
behavior in matters of right or wrong.
 Rules or norms provide the measure

 Complex definitions of right and wrong


Normative Definition of Morality
 Different cultures have different codes
An ideal code of conduct that would be observed by all
rational people, under specified conditions.  Morality is relative to time

 Some are timeless and culture-free

Definition synonymous with Ethics

The systematic philosophical study of the moral domain.


Moral Standard

 Standard by which we compare human actions to


determine their goodness or badness.
Why Do We Have Moral Theories
 Morality sets standards of virtuous conduct
MacDonnell: Moral theories “seek to introduce a degree
of rationality and rigor into our moral deliberations.”  Mechanisms to self-regulate through enforcement
and self-judge through guilt
Law  Determinative

 Webster’s Dictionary  Fixes ways of acting in accordance


with natural laws
 Rule of conduct or an action recognized by
custom or decreed by a formal enactment,  Contracts, taxes, traffic
community, or group.

 Black

 An art we can create and model


Penal Code
 Contemporary critics
 Laws useless without punishment
 Instrument of exercising power
 Three functions of punishment system

 Retributive – pay back the criminal

 Corrective – improve the offender


Natural Law
 Deterrent – prevention of similar actions
 Unwritten but universal

 Theory

 Eternal
Morality and the Law
 Absolute moral law
 Serve the purpose of keeping society stable and
 Can be discovered by reason secure

 Derivable from reason  Used in making judgments about people’s actions

 Applies to all rational creatures  Judgments are justifiable by reason

 Exists independently of human preference and  Means to achieve purpose is different


inclinations
 The process of making codes and laws
 Applied cross-culture
 Enforcement
 Anchor of right of self-preservation, liberty, and
property  Nature of punishment

 Conflict resolution

 Types of judgement.

Conventional Law

 Created for and by humans

 Usually created in public deliberations

 Derived from moral code that is enforceable

 Varies society to society

 Takes 2 forms

 Declarative

 Simply restates what the natural law


declares

 Forbidding murder theft


Chapter 3 Purpose of Ethics

Ethics  Interpret human conduct

 Acknowledging and distinguishing between right


and wrong.

 Interpretation is done based on a consisting of a


Ethics mixture of inductions and deductions.
 Origins – Greeks

 Greeks studied themselves, human life and


society
Consequentialism
 Lead to study of human conducts
 Human actions are judged good or bad depending
 Definition: a study of right and wrong in human on the results of the actions
conduct
 Three general types of Consequentialism
 Another definition: Theoretical examination of
morality  Egoism: Individual interests and happiness
above everything else
 Solomon: a set of “theories of value, virtue, or of
right (valuable) action.  Utilitarianism: Group interests and
happiness above individual
 Johnson: set of theories “that provide general
rules or principles to be used in making those  Act Utilitarianism: Consider the
rules” consequences of an action for the ones
which will benefit the most

 Rule Utilitarianism: Obey the rules


that brings max happiness to max
A few motivating scenarios people

Scenario 1: Should I copy software?  Altruism: Action is right if the results of the
action are good for everyone, but the actor
Rajesh invests small amounts on the stock market. Last suffers.
year he bought and successfully employed a software
package to help him with his investments. Recently, he
met Fundiswa who was also interested in using the
software. Fundiswa borrowed the package, copied it and
then returned it. Both vaguely knew that the software Deontology
was proprietary but did not read up the details. Did
Rajesh and Fundiswa do anything wrong, if so, what?  Does not concern itself with the consequences of
More generally, try to answer the following related an action rather the will of act
questions:  If a person committing an act had a good reason
Questions: for doing so

 Should the software package have been lent?  Example:

 An armed person comes into your house


 When is it justifiable to break the law? Bad law,
 You shoot the intruder
inappropriate law or if the law is easy to break?
 You did it because you had a duty to protect
your family and your property.

 Action was good


Important

“Ethics helps us not only in distinguishing between right


and wrong but also in knowing why and on what grounds
our judgment of human actions is justified.”
Human Nature Kantianism

 All human beings are endowed with all faculties  Developed by German philosopher Immanuel
and capabilities to live in happiness. Kant (1724-1804)

 Humans are supposed to discover the develop  People’s actions ought to be guided by universal
those capabilities. moral laws

 The capabilities become the benchmark for  Moral laws are derived from reason
actions
 Should be able to cite why an action is right or
 Actions judged on how much they measure up to wrong
capabilities

Relativism

 There is no existence of universal moral norm

 Right and wrong are relative to society, culture, or


the individual.

 Moral norms are not fixed in time.

Hedonism

 One of the oldest ethical theories

 Pleasure is the only good thing in human life

 End of life is the highest good

 Maximize pleasure or minimize pain

 2 types

 Psychological – what people seek each


day is pleasure

 Ethical – people ought to seek pleasure &


pleasure is the moral good

 Modern hedonism pleasure = happiness

Emotivism

 Ethical statements are neither true nor false

 Ethical statements cannot be proven

 Ethical statements are really only statements


about how someone feels
CHAPTER 4 NOTES Community code: set of standards or norms develop
over time within a community. This is based on cultural
Ethics and the Professions or religious values.

Codes Governing Human Actions


What is a Profession?

Calling – it means, or this suggests that the particular


occupation or profession is not just a job or a career, but
it is something that someone feels strongly compelled or
obliged to pursue. So, it basically implies a sense of
vocation or deep interest in the field.

Profession – you're not just working but you are also


doing it according to your passion, and it also requires
specialized knowledge. It is not just a job or career, but it
is something that someone feels strongly obliged to
pursue the requirements of a professional.

Requirements of a Professional
As you can see in the illustration, the community code is
the larger among all the codes. But community codes
are not inherently larger than the other types of codes
Autonomy – Teaching, for example, teachers have rather their size is determined by the factors such as
different techniques or strategy on how we can deliver diversity of community, the complexity of interactions
our lessons for how we can enable the students to learn within it, or the specific issues or the challenges the code
or to make the learning fun and interactive. Teachers aims to address.
have the authority or a choice on how they can deliver
the service. To summarize, community code is large in terms of
complexity (broader because of the community’s beliefs)

Type of Code of Conduct:


Pillars of Professionalism

Professional code: ethical standards which were


established by the organization or the society. Commitment – a promise or a pledge to do something,
to fulfill an obligation or to undertake a responsibility. It
Personal code: from the word personal means each should be done willingly.
professional has its own personal codes. It consists of
individual moral and ethical principles that guide a
behavior or person's behavior and decision. This is more
of the personal values, personal beliefs, or personal Integrity – state of being full and undivided. It is a
experiences of an individual. concept that encompasses honesty, truthfulness, moral
uprightness and consistency, and actions, values,
Institutional code: it was established by the institution methods, pressures and principles.
or the firm or the business. It is set of rules and standard
imposed by the organization wherein the professionals
should follow the rules or standards of the organization
3 maxims of Integrity: Performance Standards – provide clarity and
transparency regarding the expectations standard.
Maxim – it is the compact expression for the general
truth or rule of conduct. For example, “actions speak Incentives and Penalties – Incentives (bonus,
louder than words”. recognition or award). Penalties (punishment)

1. Vision – you foresee the potential challenges and


opportunities, or you can envision what will happen
in the future. Professional Dilemma in Decision Making

– it basically occurs when an individual faces a


2. Love – a deep fashion and enthusiasm for one's challenging situation where they must make a decision
word for pursuits. When there is love, there is that may involve conflicting values, ethical standards or
motivation, especially profession. code of conduct.

3. Commitment – a strong dedication to complete the


tasks until they’re finished.
Dilemma means problem

Responsibility – it is the state or quality of being


accountable or work or any task and you are
responsible. ASSIGNMENT: (WORD DOCUMENT)

Kindly provide an example of whistleblowing. Try to


define what whistleblowing is and then you will cite an
Various Types of Responsibility:
example or a scenario which can answer the following
Provider Responsibility – it involves to those question:
obligations for providing of goods and services.
 Should whistle-blowing be allowed?
Service Responsibility – ensure that they need ethical  What circumstances should be considered?
standards and respect the clients properly. They should  How should it be done?
have honesty, integrity and unbiased advice. It's their  Would you do it? Why/why not? Under what
responsibility to keep the information of client or circumstances
customer safe.

Product Responsibility – ensuring that your product is


true or truthful with their advertisement.

Consequential Responsibility – this approach NEXT MEETING RECITATION:


evaluates the outcome of an action or balancing the
Harassment and Discrimination
consequences of an action.
You should provide your own experience or real-life
scenario and then answer the ff questions:

 Have you ever experienced either?


Accountability – you are being accountable, or you  What did you do about it?
take ownership of your tasks and actions.

3 Key Elements of Accountability:

Outcome Measures – it means quantifiable measures.


(financial metrics, customer satisfaction scores, and
production outputs)
Chapter 4 Pillars of Professionalism

Ethics and the Professions  Commitment


 Integrity
 Responsibility
 Accountability

What is a Profession?

Webster: “a calling requiring specialized knowledge and


often long and intensive academic preparation” Commitment

 Person making the commitment must do so willingly

 Person responsible must try to meet the


Requirements of a Professional commitment

1. A set of highly developed skills and deep  Must be agreement on what is be done, by whom,
knowledge of the domain and when

2. Autonomy. Room to vary the say the service is  Commitment must be openly and publicly stated
provided  Commitment must not be made easily
3. Observance of a code of conduct:  Prior to the commitment, if it is clear, it cannot be
 Professional code: set of guidelines met, advance notice must be given and a new
provided to the professional by the profession commitment negotiated

 Personal code: a set of individual moral


guidelines on which professionals operate

 Institutional code: imposed by the institution Integrity


for which the professional works
 State of undivided loyalty to self-belief
 Community code: community standard
developed over a period of time based on  Honesty, uncompromising self-value, and
either the religion or culture of the community incorruptible

 3 maxims

 Vision
Codes Governing Human Actions  Capacity to anticipate and make a plan
that will circumvent obstacles and
maximize benefits

 Love

 Love of what you do

 Commitment

 Bond with work until it is finished

Responsibility
 Deals with roles, tasks, actions and their ensuing  Conflicting Codes of Conduct
consequences
 Advances in Technology
 Depends on person’s value system
 Incomplete or Misleading Information
 Various types
 Guilt
 Provider

 Service

 Product
Whistle-Blowing
 Consequential
 Should whistle blowing be allowed?

 What circumstances should be considered?

 How should it be done?


Accountability
 Would you do it? Why/why not? Under what
 Obligation to answer for the execution of one’s circumstances
assigned responsibilities

 3 key elements

 A set of outcome measures that reliably


and objectively evaluate performance – Harassment and Discrimination
minimum set of measures  Have you ever experienced either?
 A set of performance standards defined in  What did you do about it?
terms of these outcome measures

 Set of incentives for meeting the standards


and/or penalties for failing

Making of an Ethical Professional: Education and


Licensing

 Formal Education

 Targeted and incremental

 Licensing

 Grants individuals formal or legal permission


to practice

 Testing

 Set of Rules

 Can be used as control and educating


instruments

 Enables professions to enforce their rules by


law

Professional Dilemma in Decision Making


Chapter 5 The Protection of Personal Information Act (PoPI)
sets conditions for how you can process information. It
Privacy and Civil Liberties has been signed by the President and is law and is run
by the “Information Regulator”

In South Africa, General Information Protection


Principles (GIPP), applies to those who process
Definitions personal information (generally, anyone with customers,
partners or staff who store their personal information in
The word privacy is derived the Latin word privatus and
some way)
refers to the state of being free from unauthorized
observation or intrusion. The EU Global Data Protection Regulation (GDPR)1
was approved in April 2016, and officially enforced from
25 May 2018. This has been a major policy change
intended to harmonize the data privacy laws throughout
Europe.
Three Views on Privacy by Trivani

Accessibility privacy: One’s physically being let alone


or being free from intrusion into one’s physical space.

Decisional privacy: Freedom from interference in one’s Privacy and Technology


choices and decisions
Data sharing – refers to the practice of making data
Informational privacy: Control over the flow of one’s available to others, whether individuals, organizations, or
personal information, including the transfer and systems, for various purposes, such as analysis,
exchange of that information. collaboration, research, or decision-making. It involves
providing access to specific datasets or information,
either directly or through a controlled mechanism, to
authorized users or entities.

On Privacy

“Arguing that you don’t care about privacy because you


have nothing to hide is no different than saying you don’t
care about free speech because you have nothing to
say.”

- Edward Snowden

Privacy and the Law

The current state of the world is that governments have


tools that enable them collect information about civilians.

Governments are not the only actors with the ability to


commit such violations; civilians also have the capability
of buying equipment from all over the world to enable the
tracking of individuals.

Generally, the reference point for the protection of


privacy has been the 1948 Universal Declaration of
Human Rights. However, not all countries had voted in
favor of the declaration for various reasons.

"No one shall be subjected to arbitrary interference with


his privacy."
Screenshot of the default settings in a new installation of Paying with your privacy
the Opera browser. By default, it allows privacy
invasions, such as saved payment methods and which User have become used to the idea that information and
features of the browser you are using (i.e., it monitors apps from the web are, or ought to be, ‘for free’ and they
your behavior). These are common default settings also have become used to getting ‘good deals’ and
for other browsers and software. reductions on products in, say, the supermarket.

For instance, one does not have to pay for using a


search engine, read the news online, download games,
Browser Software and Cookies install chat software on the smartphone, etc. But in most
cases, someone has paid for the development of the
Screenshots of three cookie messages, with different tools and infrastructure provided by those companies,
descriptions on what they do with the data and how to and somehow do make profit anyhow.
entice you to say “yes” to the cookies.
The typical business model is to exploit the data you
give them about yourself, so that they can improve
advertisement (those advertisers pay those companies)
or can sell your data onward to other companies on the
data market.

We have seen some examples of desktop apps, and the


customer loyalty cards, but it also easily extends into the
smartphone sphere. More than 70% of mobile apps
report personal data to tracking companies , such as
Google Analytics and FB Graph API, effectively having
created a “smartphone panopticon”

Other

The speed of the Internet is often reflected in rapid


online acquaintances and friendships. But it is important
to realize that you don’t really know who these people
are or what they are like in real life.

There’s a high probability that “the system” is gathering


this information for direct marketing purposes.

Spam, or unsolicited bulk e-mail, is something you are


probably already familiar with (and tired of). If you get a
spammed advertisement, certainly don’t take the sender
up on whatever offer they are making, but also don’t
bother replying with “REMOVE” in the subject line, or
whatever (probably bogus) unsubscribe instructions
you’ve been given).

When mailing to unknown parties; posting to


Privacy in the cloud
newsgroups, mailing lists, chat rooms and other public
The ‘cloud’ is basically a whole bunch of servers and spaces on the Net; or publishing a Web page that
storage disks that present themselves to the user as if mentions your e-mail address, it is best to do this from a
it’s only one entity. "side" account some pseudonymous or simply alternate
address, and to use your main or preferred address only
Those devices are physically located at one or more on small members-only lists and with known, trusted
sites in so-called data centers. Most organizations individuals.
providing such cloud-based services have only a few
data centers across the globe, thus, we walk into Never submit a credit card number or other highly
transnational privacy law issues. sensitive personal information without first making sure
your connection is secure (encrypted).
There are other privacy threats besides abusive
marketers, nosy bosses, spammers and scammers.
Some of the threats include industrial espionage,
government surveillance, identity theft, disgruntled
former associates, and system crackers. Relatively easy
to use e-mail and file encryption software is available for
free, such as Pretty Good Privacy (PGP), which runs
on almost all computers and even integrates seamlessly
with most major e-mail software.

Freedom of Expression

Freedom of expression is a class of rights that exists so


that individuals are able to make their opinions heard
and hear the opinion of others.

This freedom is characteristic of democracies. It


generally extends to numerous forms of expression.
Films, books, expressions by actions such as vigils,
burning a flag, etc. are all generally protected.

Discussion

What privacy issue/s were experienced by you in your


various e-activities?

What can be done to prevent future occurrences of the


incident?
Chapter 6  Computer software categories:

Intellectual Property Rights and Computer  CANNED- off-the-shelf software


Technology
 Designer software – ordered by the
customer

 Mixed – designer/canned

 If it is canned – it is a product

Intellectual Property Rights and Computer  If it is designer ordered – it is a service


Technology
 Otherwise, a mixed case.
 Computer Products and Services

 Instruments of Protection

 Ownership
Foundations of Intellectual Property Rights
 Infringement
 Software is protected by Copyrights
 Protection of Ownership Rights
 Rights enforceable by law
 The Legal Protection of Computer Software
 Accorded to an artist, inventor/creator

 Should be an expression or creative works

 Literary, dramatic, musical, pictorial,


Computer Products and Services graphics, artistic, audiovisual,
architectural, or sound recording.
 Computer products
 The protected works must have:
 Have a tangible form
 Tangible form
 Have intrinsic value
 Originality
 Computer services
 Fixation in a medium
 Have intrinsic value

 Have no tangible form


 Copyrights are now universally accepted

 International enforcement conventions include:


 Computer software
 WIPO- world intellectual property
 A set of logical instructions in four forms: organization
 Logical map  UNESCO
 Source code  UCC- universal copyright convention
 Object code  WTO – World Trade Organization
 Executable code  Once a copyright expires the work goes in public
 Has two forms domain

 Product

 Service  Public works include:

 May not have a tangible form  Non-copyrightable items

 Ideas, facts, schedules, names, etc..

 Copyrightable items
 Copyrights have expired  Duration is infinite if no disclosure

 Copyrightable works put in public  The following characterize trade secrets


domain by author
 Extent the information is known outside the
business

 Extent of measures taken to protect the


trade secrets
 Duration of copyrights:
 Value of information to the owner
 Depends on country
 Amount of money spent by owner to develop
 U.S. the information
 Prior 1978  Ease/difficulty of acquiring such information
 75 years from date of issue

 After 1978

 lifetime of author plus 50 years  Trademarks – product identifying labels

 Include:
 Patents  Service marks
 Protection of inventions and discoveries  Certification marks
 Requirements  Collective marks
 New and useful  Characteristic of trademarks include
 Improvement of any of the  Arbitrary marks (say nothing but used
following: for service)
 Process  Suggestive marks (symbols and
 Manufacturing (products writings)
that are not machines)  Descriptive marks (intended
 Machines (covering purposes)
mechanism, mechanical  General marks (unrelated and not
products & composition) suggestive)
 Utility  Duration of trademarks in U.S. is 10 years
 Novelty  Trademarks are registered in U.S. if they:
 Nonobvious  Are in good taste for the public
 No disclosure.  Have no suggestive connotations to their
 Protection duration in U.S. is 17 years origin

 Are not symbols of any recognizable country

 Trade Secrets  Do not use people’s likeness without


permission
 Information gives company competitive advantage

 No one specific definition of trade secrets


 Personal Identity
 Collection of information
 Identity theft is a crime committed
 Static format
 A person misrepresents oneself
 Strategic importance
 Intent
 Get the victim’s Infringement
information
 Using intellectual property rights without
 The perpetrator can get permission
goods & services in the
victim's name.  There are three types of infringements:

 One of the fastest growing crimes  Direct (full knowledge)

 Inducement

 Contributory

 Techniques steal personal identity include  Copyrights infringement: difficult to prove

 Telemarketing  Infringers have knowledge or visual contact


with the work.
 Fake Identifications
 An individual claiming to be the owner has a
 Dumpster diving valid copyright.

 Going through trash  Work under dispute is a major revision

 Post office to redirect mail  Substantially new contents versus a


variation
 Eavesdropping
 Patent and trademarks infringements: difficult to
 Social engineering prove
 Prevention

 Personal awareness  Trademark infringement:


 Education  Prove beyond doubt

 Infringer’s action was likely to confuse the


public.

Ownership  Trade Secrets. Even more difficult.

 Novel idea

 Original, authentic, and new

 Inventive and creative Protection of Ownership Rights

 Come from individual  As owner/author of a creation, you’re protected by:

 Sources of substantial benefits to individuals  Copyrights


and the public  Patents
 Useful  Trademark
 Put into utilizable form - process or  Trade secrets
application.
 Burden of safeguarding intellectual property rights
 Ideas are in public domain – owner
 Making them utilizable creates ownership  Methods vary

 Spying

 Using hired operatives

 Inspection

 Use of enforcement agencies


 Use of government (big companies)

 Property Rights Laws based on types

 Copyrights

 Country dependent

 Right to use, transform, sale, copy, and modify

 Patents: country dependent

 Trademarks: state and country dependent

 Trade secrets

 Country

 States

 Local authority

First Sale Doctrine

 Copyright owner distribution rights

 Sale

 Transfer of ownership

 Rental

 Release

 Fair Use Doctrine

 Balance

 Protection of inventor/creator &


benefits to the community

 Four ways to judge is fair use

 The purpose of use, commercial or


educational

 Nature of use

 Percentage of use

 Effect on commercial value

You might also like