10104Ethical and Secure Computing A Concise Module Undergraduate Topics in Computer Science Joseph Migga Kizza pdf download
10104Ethical and Secure Computing A Concise Module Undergraduate Topics in Computer Science Joseph Migga Kizza pdf download
https://ebookmeta.com/product/ethical-and-secure-computing-a-
concise-module-undergraduate-topics-in-computer-science-joseph-
migga-kizza/
https://ebookmeta.com/product/ethical-and-secure-computing-a-
concise-module-joseph-migga-kizza/
https://ebookmeta.com/product/ethical-and-social-issues-in-the-
information-age-joseph-migga-kizza/
https://ebookmeta.com/product/ethical-and-social-issues-in-the-
information-age-4th-edition-joseph-migga-kizza/
https://ebookmeta.com/product/fodor-s-puerto-rico-10th-edition-
fodors-travel-guides/
Finding Finn Forever Love 2 1st Edition Charlie Novak
https://ebookmeta.com/product/finding-finn-forever-love-2-1st-
edition-charlie-novak/
https://ebookmeta.com/product/doughnut-recipes-a-doughnut-
cookbook-with-delicious-doughnut-recipes-2nd-edition-booksumo-
press/
https://ebookmeta.com/product/educational-policy-borrowing-in-
china-looking-west-or-looking-east-1st-edition-charlene-tan/
https://ebookmeta.com/product/hard-to-swallow-new-edition-with-
bonus-features-mark-wheeller/
https://ebookmeta.com/product/adobe-photoshop-classroom-in-a-
book-2022-release-1st-edition-conrad-chavez-andrew-faulkner/
Clinical Nursing Skills at a Glance 1st Edition Carol
Fordham-Clarke
https://ebookmeta.com/product/clinical-nursing-skills-at-a-
glance-1st-edition-carol-fordham-clarke/
Undergraduate Topics in Computer
Science
Series Editor
Ian Mackie
Advisory Board
Samson Abramsky, University of Oxford, Oxford, UK
Chris Hankin, Imperial College London, London, UK
Mike Hinchey, University of Limerick, Limerick, Ireland
Dexter C. Kozen, Cornell University, Ithaca, USA
Andrew Pitts, University of Cambridge, Cambridge, UK
Hanne Riis Nielson, Technical University of Denmark, Kongens
Lyngby, Denmark
Steven S. Skiena, Stony Brook University, Stony Brook, USA
Iain Stewart, University of Durham, Durham, UK
Undergraduate Topics in Computer Science (UTiCS) delivers high-
quality instructional content for undergraduates studying in all areas of
computing and information science. From core foundational and
theoretical material to final-year topics and applications, UTiCS books
take a fresh, concise, and modern approach and are ideal for self-study
or for a one- or two-semester course. The texts are all authored by
established experts in their fields, reviewed by an international
advisory board, and contain numerous examples and problems. Many
include fully worked solutions.
More information about this series at http://www.springer.com/
series/7592
Joseph Migga Kizza
The publisher, the authors and the editors are safe to assume that the
advice and information in this book are believed to be true and accurate
at the date of publication. Neither the publisher nor the authors or the
editors give a warranty, express or implied, with respect to the material
contained herein or for any errors or omissions that may have been
made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.
Audience
The book satisfies the following ACM/IEEE Curricula (i) CS-Computer
Science Curriculum 2015 and (ii) CS-Information Technology
Curriculum 2017 ( https://www.acm.org/binaries/content/assets/
education/curricula-recommendations/it2017.pdf ). In summary, all
these curricula emphasize the student’s understanding of the basic
cultural, social, legal, and ethical issues inherent in the discipline of
computing. To achieve this, the student must:
understand where the discipline has been, where it is, and where it is
heading.
understand the individual roles in this process, as well as appreciate
the philosophical questions, technical problems, and aesthetic values
that play an important part in the development of the discipline.
develop the ability to ask serious questions about the social impact of
computing and to evaluate the proposed answers to those questions.
be aware of the basic legal rights of software and hardware vendors
and users, and they also need to appreciate the ethical values that are
the basis for those rights.
Students in related disciplines like computer information and
information management systems, and library sciences will also find
this book informative.
The book is also good for computer science practitioners who must
practice the principles embedded in the curricula based on
understanding:
the responsibility that they bear and the possible consequences of
failure.
their own limitations as well as the limitations of their tools.
The book is also good for anyone interested in knowing how ethical
and social issues like privacy, civil liberties, security, anonymity, and
workplace issues like harassment and discrimination are affecting the
new computerized environment.
In addition, anybody interested in reading about computer
networking, mobile computing, social networking, information security,
and privacy will also find the book very helpful.
Acknowledgements
I appreciate all the help I received from colleagues who offered ideas,
criticism, sometimes harsh, and suggestions from anonymous
reviewers over the years. Special thanks to my dear wife, Dr.
Immaculate Kizza, who offered a considerable amount of help in
proofreading, constructive ideas, and wonderful support.
Joseph Migga Kizza
Chattanooga, TN, USA
2018
Contents
1 Morality and the Law
1.1 Introduction
1.2 Morality
1.2.1 Moral Theories
1.2.2 Moral Decision Making
1.2.3 Moral Codes
1.2.4 Moral Standards
1.2.5 Guilt and Conscience
1.2.6 Morality and Religion
1.3 Law
1.3.1 The Natural Law
1.3.2 Conventional Law
1.3.3 The Purpose of Law
1.3.4 The Penal Code
1.4 Morality and the Law
1.5 Morality, Etiquettes, and Manners
References
2 Ethics and Ethical Analysis
2.1 Traditional Definition
2.2 Ethical Theories
2.2.1 Consequentialism
2.2.2 Deontology
2.2.3 Human Nature
2.2.4 Relativism
2.2.5 Hedonism
2.2.6 Emotivism
2.3 Functional Definition of Ethics
2.4 Ethical Reasoning and Decision Making
2.4.1 A Framework for Ethical Decision Making
2.4.2 Making and Evaluating Ethical Arguments
2.5 Codes of Ethics
2.5.1 2018 ACM Code of Ethics and Professional Conduct:
Draft 1
2.5.2 Objectives of Codes of Ethics
2.6 Reflections on Computer Ethics
2.6.1 New Wine in an Old Bottle
2.7 Technology and Values
References
3 Ethics and the Professions
3.1 Introduction
3.2 Evolution of Professions
3.2.1 Origins of Professions
3.2.2 Requirements of a Professional
3.2.3 Pillars of Professionalism
3.3 The Making of an Ethical Professional:Education and
Licensing
3.3.1 Formal Education
3.3.2 Licensing Authorities
3.3.3 Professional Codes of Conduct
3.4 Professional Decision Making and Ethics
3.4.1 Professional Dilemmas in Decision Making
3.4.2 Guilt and Making Ethical Decisions
3.5 Professionalism and Ethical Responsibilities
3.5.1 Whistle-Blowing
3.5.2 Harassment and Discrimination
3.5.3 Ethical and Moral Implications
References
4 Anonymity, Security, Privacy, and Civil Liberties
4.1 Introduction
4.2 Anonymity
4.2.1 Anonymity and the Internet
4.2.2 Advantages and Disadvantages of Anonymity
4.2.3 Legal View of Anonymity
4.3 Security
4.3.1 Physical Security
4.3.2 Physical Access Controls
4.3.3 Information Security Controls
4.3.4 Operational Security
4.4 Privacy
4.4.1 Definition
4.4.2 Types of Privacy
4.4.3 Value of Privacy
4.4.4 Privacy Implications of the Database System
4.4.5 Privacy Violations and Legal Implications
4.4.6 Privacy Protection and Civil Liberties
4.5 Ethical and Legal Framework for Information
4.5.1 Ethics and Privacy
4.5.2 Ethical and Legal Basis for Privacy Protection
References
5 Intellectual Property Rights and Computer Technology
5.1 Definitions
5.2 Computer Products and Services
5.3 Foundations of Intellectual Property
5.3.1 Copyrights
5.3.2 Patents
5.3.3 Trade Secrets
5.3.4 Trademarks
5.3.5 Personal Identity
5.4 Ownership
5.4.1 The Politics of Ownership
5.4.2 The Psychology of Ownership
5.5 Intellectual Property Crimes
5.5.1 Infringement
5.5.2 The First-Sale Doctrine
5.5.3 The Fair Use Doctrine
5.6 Protection of Ownership Rights
5.6.1 Domain of Protection
5.6.2 Source and Types of Protection
5.6.3 Duration of Protection
5.6.4 Strategies of Protection
5.7 Protecting Computer Software Under the IP
5.7.1 Software Piracy
5.7.2 Protection of Software Under Copyright Laws
5.7.3 Protection of Software Under Patent Laws
5.7.4 Protection of Software Under Trademarks
5.7.5 Protection of Software Under Trade Secrets
5.8 Transnational Issues and Intellectual Property
References
6 Social Context of Computing
6.1 Introduction
6.2 The Digital Divide
6.2.1 Access
6.2.2 Technology
6.2.3 Humanware (Human Capacity)
6.2.4 Infrastructure
6.2.5 Enabling Environments
6.3 Obstacles to Overcoming the Digital Divide
6.4 ICT in the Workplace
6.4.1 The Electronic Office
6.4.2 Office on Wheels and Wings
6.4.3 The Virtual Workplace
6.4.4 The Quiet Revolution:The Growth of Telecommuting
6.4.5 Employee Social and Ethical Issues
6.5 Employee Monitoring
6.5.1 Workplace Privacy and Surveillance
6.5.2 Electronic Monitoring
6.6 Employee Health and Productivity in the Workplace
6.6.1 Ergonomics
References
7 Software Issues:Risks and Liabilities
7.1 Definitions
7.1.1 Standards
7.1.2 Reliability
7.1.3 Security
7.1.4 Safety
7.1.5 Quality
7.1.6 Quality of Service
7.2 Causes of Software Failures
7.2.1 Human Factors
7.2.2 Nature of Software:Complexity
7.3 Risk
7.3.1 Risk Assessment and Management
7.3.2 Risks and Hazards in Workplace Systems
7.3.3 Historic Examples of Software Risks
7.4 Consumer Protection
7.4.1 Buyers’ Rights
7.4.2 Classification of Computer Software
7.4.3 The Contract Option
7.4.4 The Tort Option
7.5 Improving Software Quality
7.5.1 Techniques for Improving Software Quality
7.6 Producer Protection
References
8 Computer Crimes
8.1 Introduction
8.2 History of Computer Crimes
8.3 Types of Computer Systems Attacks
8.3.1 Penetration
8.3.2 Denial of Service
8.4 Motives of Computer Crimes
8.5 Costs and Social Consequences
8.5.1 Lack of Cost Estimate Model For Cyberspace Attacks
8.5.2 Social and Ethical Consequences
8.6 Computer Crime Prevention Strategies
8.6.1 Protecting Your Computer
8.6.2 The Computer Criminal
8.6.3 The Innocent Victim
References
9 Cyberbullying
9.1 Definition
9.1.1 Legal Definition
9.1.2 Cyberstalking
9.1.3 Cyberharassment
9.2 Types of Cyberbullying
9.2.1 Harassment
9.2.2 Flaming
9.2.3 Exclusion
9.2.4 Outing
9.2.5 Masquerading
9.3 Areas of Society Most Affected by Cyberbullying
9.3.1 Schools
9.3.2 Cyberbullying in the Workplace
9.4 Legislation Against Cyberbullying
9.4.1 Federal Laws
9.4.2 State Laws
9.4.3 International Laws
9.5 Effects of Cyberbullying
9.6 Dealing with Cyberbullying
9.6.1 Awareness
9.6.2 Legislation
9.6.3 Community Support
9.7 Resources
References
10 Evolving Realities:Ethical and Secure Computing in the New
Technological Spaces
10.1 Introduction
10.2 Artificial Intelligence
10.2.1 Advances in Artificial Intelligence
10.2.2 Artificial Intelligence and Ethics
10.3 Virtualization
10.3.1 Simulated Computing Environments
10.3.2 Virtual Reality
10.3.3 Different Types of Virtual Reality
10.3.4 Virtualization and Ethics
10.4 Cyberspace and the Concept of Telepresence
10.4.1 Securing Cyberspace
10.4.2 Social Issues in Cyberspace
10.4.3 Privacy in Cyberspace
References
11 Ethical, Privacy, and Security Issues in the Online Social
Network Ecosystems
11.1 Introduction
11.2 Introduction to Computer Networks
11.2.1 Computer Network Models
11.2.2 Computer Network Types
11.3 Social Networks (SNs)
11.4 Online Social Networks (OSNs)
11.4.1 Types of Online Social Networks
11.4.2 Online Social Networking Services
11.4.3 The Growth of Online Social Networks
11.5 Ethical and Privacy Issues in Online Social Networks
11.5.1 Privacy Issues in OSNs
11.5.2 Strengthening Privacy in OSNs
11.5.3 Ethical Issues in Online Social Networks
11.6 Security and Crimes in Online Social Networks
11.6.1 Beware of Ways to Perpetrate Crimes in Online Social
Networks
11.6.2 Defense Against Crimes in Online Social Networks
11.7 Proven Security Protocols and Best Practices in Online
Social Networks
11.7.1 Authentication
11.7.2 Access Control
11.7.3 Legislation
11.7.4 Self-regulation
11.7.5 Detection
11.7.6 Recovery
References
12 Evolving Cyberspace:The Marriage of 5G and the Internet of
Things (IoT) Technologies
12.1 Introduction
12.2 Fifth-Generation (5G) Technology (G5)
12.2.1 Overview of 5G Wireless Communications
12.2.2 5G Network Architecture and Protocol Stack
Perspectives
12.2.3 Technical Challenges of 5G Technology
12.3 The Internet of Things (IoT)
12.3.1 Overview and Growth of Internet of Things
12.3.2 Architecture and Networking of IoT
12.3.3 Challenges of Using TCP/IP Architecture Over the IoT
12.3.4 IoT Governance, Privacy, and Security Challenges
12.3.5 Governance and Privacy Concerns
12.3.6 Security Challenges
12.3.7 Autonomy
12.3.8 Computational Constraints
12.3.9 Discovery
12.3.10 Trust Relationships
12.4 Ethical, Social, and Legal Impacts of 5G and IoT
12.4.1 Environment
12.4.2 E-Waste
12.4.3 Conflict Minerals
12.4.4 Healthy Issues Emanating from 5G and IoT
Technologies
12.4.5 Ethics
12.5 Exercises
12.6 Advanced Exercises
References
Index
© Springer Nature Switzerland AG 2019
Joseph Migga Kizza, Ethical and Secure Computing, Undergraduate Topics in
Computer Science
https://doi.org/10.1007/978-3-030-03937-0_1
Learning Objectives
After reading this chapter, the reader should be able to
1. Learn to make sound moral reasoning.
1.1 Introduction
Whether you believe in a supreme being or you are an atheist , you
acknowledge the existence of human life because you are alive. You are
alive because someone nurtured you and protected you from all
adversities. Whoever did so followed a set of rules of conduct that kept
both of you alive. Such shared rules, written or not, play a vital role in
all human existence.
Human beings do not live randomly. We follow a script —a life
script. In that script are hundreds of subscripts we follow both for
survival (e.g., eating and sleeping) and for specific tasks. For example,
when you meet a stranger, you follow a subscript different from the one
you follow when you meet a long-lost friend. If you are hungry, the
subscript you follow is different from the one you use to overcome
anger. Within each subscript are variations we introduce to suit the
situation. For example, when meeting an old friend, some people cry
and others jump up and down, but both responses remain within the
same subscript of meeting an old friend. The most important purpose
of all these subscripts is human life, our own as well as others.
Believing in human life implies that we also believe life has a
purpose. And because no one wants to live a life of pain, every human
being believes in happiness as a purpose for life. To be happy, we need
those conditions that create happiness, namely life, liberty, and
property. Each condition is embodied in each of the three basic human
survival subscripts : morality , ethics, and law. In this chapter, we
discuss morality and law, and in Chap. 2, we discuss ethics.
1.2 Morality
Morality is a set of rules for right conduct, a system used to modify and
regulate our behavior. It is a quality system in human acts by which we
judge them right or wrong, good or bad. This system creates moral
persons who possess virtues such as love for others, compassion, and a
desire for justice; thus, it builds character traits in people. In particular,
morality is a survival script we follow in our day-to-day living.
According to Wikipedia [1], morality has three different definitions:
A descriptive definition according to which morality means a set of
rules (code) of conduct that governs human behavior in matters of
right and wrong. An example of the descriptive usage could be
“common conceptions of morality have changed significantly over
time.”
A normative and universal definition is more prescriptive and refers
to an ideal code of conduct that would be observed by all rational
people under specified conditions. An example is a moral value
judgment such as “murder is immoral.”
A definition of morality that is synonymous with ethics. Ethics is the
systematic philosophical study of the moral domain. We define and
discuss ethics in the following chapter.
In each one of these definitions, morality concerns itself with a set
of shared rules, principles, and duties, independent from religion,
applicable to all in a group or society, and having no reference to the
will or power of any one individual whatever his or her status in that
group or society. Although moral values are generally shared values in a
society, the degree of sharing these values varies greatly. We may agree
more on values such as truth, justice, and loyalty than on others. To
paraphrase Shakespeare, life is but a stage on which there is continuous
acting from the subscript of morality . Every time we interact in a
society or group, we act the moral subscript that was developed by that
society or group for its members over time.
Because morality is territorial and culturally based, so long as we
live in a society we are bound to live within that society’s guidelines.
The actions of individuals in a society only have moral values if taken
within the context of this very society and the culture of the individual.
A number of factors influence the context of morality, including time
and place.
2. The moral principles involved and how they will affect all others
involved.
4. The Iron Rule: “Do unto others as you like, before they do it unto
you.” This rule, if followed by a leader, can create dictatorships. It
seems to say, “He who is on the floor cannot make rules” or “Do it if
you can get away with it.”
5. The Tin Rule: “Pay homage to those above you and intimidate those
below you.” This is what many call the bully rule.
2. Do not envy.
2. You shall not take the name of the Lord, your God, in vain.
10. You shall not covet anything that belongs to your neighbor.
1.2.3.3 Unix Users Group Ten Commandments (the
Manual, Ex. 20, Verses 1–21) [6]
And lo did Unix2 speak these words upon the reboot:
1. Thou shalt use no other operating system than Unix .
2. Thou shalt not make unto thee a false operating system. Thou
shalt not program them for I am the Unix and a jealous O/S.
3. Thou shalt not take the mark of trade of Unix in vain, or thou shalt
be sued.
5. Honour thy parent shell, for if it should die, thou shalt not live long
(unless thou hast dissociated thyself).
6. Thou shalt not kill (l)-9 any process, for surely they shalt
becometh zombies or defunct.
7. Thou shalt not commit hacking, else thou shalt eat quiche.
8. Thou shalt not use other users’ data, for thou shalt be referred to
the Data Protection Act, 1984, and sued (again).
9. Thou shalt not create Trojan horses, worms, viruses , or other foul
beasts of false programming.
10. Thou shalt not rm -rf thy neighbor’s home, nor covet his disk
space allocation, nor his workstation account.
We have seen in this section that morality does not belong to any
individual, nor does it belong to any society or group of people. Thus, it
cannot be localized. However, those parts of the moral code that can be
localized become law.
1.3 Law
According to Merriam-Webster’s Dictionary, a law is a binding custom or
practice of a community; a rule of conduct or action prescribed or
formally recognized as binding or enforced by a controlling authority;
the whole body of such customs, practices, or rules [7]. Black states that
law is an art we can create and model, and contemporary critics define
law as an instrument of exercising power [8].
Bryan Bourn combines both these definitions of law and describes it
as both an art and an instrument for exercising power [8]. He bases his
definition on the fact that law on many occasions strives forcefully to
create something desirable without following a precise and exact
process or formula that can be reproduced (thus the art component).
Fr. Fagothey defines laws as a rule and measure of actions directing
them to proper ends. It obliges us to make our conduct conform to the
norm of morality . He goes on to divide law into two types:
1. Physical law, which directs nonfree irrational beings to uniform
action toward their ends by inner necessity of their nature, that is,
imposing physical necessity
2. Moral law or natural law , which directs free rational beings toward
their ends by imposing obligations on the free will—thus imposing
moral necessity.
The English common law gave birth to the modern English and
American law.
Exercises
1. How do morality and law relate to each other?
10. We tend to live a moral script every day. Reflect on what is in your
script .
12. Study the Native American Ten Commandments and the Christian
Ten Commandments . Without comparing them, discuss the
common thread between them.
18. What role does each one of the following have in our lives?
(i) Conventional law
References
1. MacDonnel C. Moral decision making: an analysis. http://www.ethics.ubc.c a/-
chrismac/moral.decision.html
2.
Moral Relativism. Internet encyclopedia of philosophy. http://www.utm.edu/
research/iep/ni/m-ration.html
3.
Sagan C (1993) A new way to think about rules to live by. Parade Magazine, p 12
4.
The Native American Ten Commandments. http://www.indians.org/welker/
tencomm.htm
5.
The Christian Ten Commandments. http://biblescripture.net/C ommandments.
html
6.
The Unix Ten Commandments. http://www.pipex.net/people/j asonh/c ommand.
html
7.
Merriam-Webster’s Dictionary. http://www.merriam-webster.c om/dictionary/
law
8.
Bourn B. Law as art (with apologies to Charles Black). http://www.usinternet.
com/bdbourn/black.html
9.
Donald J. Natural law and natural rights. https://j im.c om/rights.html
10.
Kalota G (1997) Scientists report first cloning ever for adult mammal. New York
Times sec. 1, p 1
11.
Fagothey FA (1959) Right and reason, 2nd edn. Tan Books and Publishers,
Rockford, IL
Further Reading
12. Conclusion: words, not laws, should be the weapons. The Ethical Spectacle,
November 1995. http://www.spectacle.org/1995/c oncl.html
13.
Johnson DG (1994) Computer ethics, 2nd edn. Prentice Hall, Englewood Cliffs
14.
Kizza JM (ed) (1996) Social and ethical effects of the computer revolution.
McFarland, Jefferson
15.
Macer DRJ (1994) Bioethics for the people by the people. Eubios Ethics Institute,
Christchurch, pp 74–91. http://bio.tsukuba.ac.j p/-macer/BFPSE.html
16.
Objective morality. http://www.percep.demon.c o.uk/morality.html18
Footnotes
1 https://ellemay.wordpress.c om/2009/02/09/the-golden-rule-versions-from-
many-religions-philosophies/f