Ethic in ICT
Ethic in ICT
1/1/2024
r
nverte
cCo
lDo
ota
y of T
n cop
atio
evalu
fr ee
y t he
e db
duc
Pro
ETHIC
Ethics is the study of moral principles and values that guide human behavior and decision-making. It
examines questions of right and wrong, good and bad, and what constitutes a just and virtuous life.
• Normative ethics: This examines what actions are morally right or wrong, and what moral duties
and obligations people have.
• Metaethics: This investigates the fundamental nature of moral judgments, the meaning of moral
terms, and whether moral statements can be objectively true or false.
• Applied ethics: This looks at how moral principles should guide decisions and actions in specific
real-world situations, such as in medicine, business, the environment, etc.
• Virtue ethics: This focuses on the moral character of the individual, exploring what virtues (like
honesty, courage, compassion) should be cultivated.
Ethical theories and frameworks, like utilitarianism, deontology, and virtue ethics, provide different
lenses for analyzing moral dilemmas. Ethical reasoning often involves weighing competing principles,
rights, and consequences.
The field of ethics is essential for guiding individual and societal choices, as well as informing laws,
policies, and social norms. Ongoing debates in ethics continue to shape our understanding of moral
behavior and the just society.
Computer ethic
Computer ethics" is a subset of applied ethics that deals with the moral principles and values that guide
the development, use, and impact of computer technology on society. It explores the ethical
considerations surrounding the creation, dissemination, and use of digital technologies, including
computers, software, networks, and the internet.
Information Technology specifies to the components that are used to store, fetch and manipulate the
information at the minimum level with the server having an operating system. Information Technology
have a wide area of applications in education, business, health, industries, banking sector and scientific
research at a large level. With the leading advancement in information technology, it is necessary to have
the knowledge of security issues, privacy issues and main negative impacts of IT. To deal with these issues
in IT society it is important to find out the ethical issues.
Some of the major ethical issues faced by Information Technology (IT) are:
• Personal Privacy
• Access Right
• Harmful Actions
• Patents
• Copyright
BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]
• Trade Secrets
• Liability
• Piracy
• Liability: One should be aware of the liability issue in making ethical decisions. Software developer
makes promises and assertions to the user about the nature and quality of the product that can
be restricted as an express warranty. Programmers or retailers possess the legitimate to determine
the express warranties. Thus they have to be practical when they define any claims and predictions
about the capacities, quality and nature of their software or hardware. Every word they say about
their product may be as legally valid as stated in written. All agreements should be in writing to
protect against liability. A disclaimer of express warranties can free a supplier from being held
responsible of informal, speculative statements or forecasting made during the agreement stages.
• Piracy: Piracy is an activity in which the creation of illegal copy of the software is made. It is entirely
up to the owner of the software as to whether or not users can make backup copies of their
software. As laws made for copyright protection are evolving, also legislation that would stop
unauthorized duplication of software is in consideration. The software industry is prepared to do
encounter against software piracy. The courts are dealing with an increasing number of actions
concerning the protection of software.
technology ethic is a broader field that encompasses computer ethics and explores the moral principles
and values that guide the development, use, and impact of technology on society. It examines the ethical
considerations surrounding the creation, dissemination, and use of various technologies, including
computers, software, networks, the internet, and other digital technologies.
• Accountability: decisions made for who is responsible when considering success or harm in
technological advancements
• Existential risk: technologies that represent a threat to the global quality of life pertaining to
extinction
• Freedom: technology that is used to control a society raising questions related to freedom and
independence
• Health and safety: health and safety risks that are increased and imposed by technologies
• Human judgement: when can decisions be judged by automation and when do they acquire a
reasonable human?
• Over-automation: when does automation decrease quality of life and start affecting society?
• Precaution principle: Who decides that developing this new technology is safe for the world?
• Technology transparency: clearly explaining how a technology works and what its intentions are
Ethical challenges
• Workplace discrimination
• Strained work-life balance in technologically enhanced work environments: Many people find that
simply having the technology allowing one to do work while at home increases stress levels. In a
recent study 70% of respondents said that since technology, work has crept into their personal
lives.[23]
• Norris says access to information and knowledge resources within a knowledge society tend to
favour the economically privileged who have greater access to technological tools needed to
access information and knowledge resources disseminated online and the privatization of
knowledge[24]
• Inequality in terms of how scientific and technological knowledge is developed around the globe.
Developing countries do not have the same opportunities as developed countries to invest in
costly large-scale research and expensive research facilities and instrumentation
• Information overload: Information processing theory asserts that working memory that has a
limited capacity and too much information can lead to cognitive overload resulting in loss of
information from short-term memory
• Knowledge society is intertwined with changing technology requiring new skills of its workforce.
Cutler says that there is the perception that older workers lack experience with new technology
and that retaining programs may be less effective and more expensive for older workers. Cascio
says that there is a growth of virtual organizations. Saetre & Sornes say that it is a blurring of the
traditional time and space boundaries has also led to many cases in the blurring of work and
personal life[6][verification needed]
• Negative impacts of many scientific and technological innovations have on humans and the
environment has led to some skepticism and resistance to increasing dependence on technology
BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]
within the Knowledge Society. Doucet calls for city empowerment to have the courage and
foresight to make decisions that are acceptable to its inhabitants rather that succumb to
global consumer capitalism and the forces of international corporations on national and local
governments
• Scientific and technological innovations that have transformed organizational life within a global
economy have also supplanted human autonomy and control in work within a technologically
oriented workplace
• The persuasive potential of technology raises the question of "how sensitive ... designers and
programmers [should] be to the ethics of the persuasive technology they design."[26] Technoethics
can be used to determine the level of ethical responsibility that should be associated with
outcomes of the use of technology, whether intended or unintended
• Rapidly changing organizational life and the history of unethical business practices have given rise
to public debates concerning organizational responsibility and trust. The advent of virtual
organizations and increase in remote work has bolstered ethical problems by providing more
opportunities for fraud and the production of misinformation. Concerted efforts are required to
uphold ethical values in advancing new knowledge and tools within societal relations which do
not exclude people or limit liberties of some people at the expense of others[6]
• Artificial Intelligence: Artificial Intelligence seems to be the one of the most talked of challenges
when it comes ethics. In order to avoid these ethical challenges some solutions have been
established; first and for most it should be developed for the common good and benefit of
humanity.[27] Secondly, it should operate on principles of intelligibility and fairness.[27] It should
also not be used to diminish the data rights or privacy of individuals, families, or communities.[27] It
is also believed that all citizens should have the right to be educated on artificial intelligence in
order to be able to understand it.[27] Finally, the autonomous power to hurt, destroy, or deceive
humans should never be vested in artificial intelligence.[2
Computer Ethics
What does the word ‘ethics’ mean? The dictionary defines ethics because of the moral principles that
govern the behavior of a gaggle or individual. But, not every people in society need to live an absolutely
moral life. Ethics are actually the unwritten code of conduct that every individual should follow. These
codes are considered correct only by the members of that particular profession. Similarly, for computer
users, computer ethics is a set of principles that regulates the use of computers. Computer ethics address
issues related to the misuse of computers and how they can be prevented. It primarily imposes the ethical
use of computing resources. It includes methods to avoid violating the unauthorized distribution of digital
content. The core issues surrounding computer ethics are based on the use of the internet, internet
privacy, copyrighted content, software, and related services, and user interaction with websites. The
Internet has changed our lifestyle. It has become a part of our life. It allows us to communicate with a
person from another part of the world. collecting information on any topic, social meets, and many other
activities. But at the same time, some peoples are always trying to cheat or harm others.
Commandment 6: Do not use the software unless you pay for this software.
Commandment 7: Do not use someone else’s computer resources unless he authorized to use them.
Commandment 8: It is wrong to claim ownership of a work that is the output of someone else’s intellect.
Commandment 9: Before developing software, think about the social impact it can of that software.
Commandment 10: While computers for communication, always respectful with fellow members.
Internet Security
The internet is an insecure channel for exchanging information because it features a high risk of fraud or
phishing. Internet security is a branch of computer security specifically associated with the utilization of
the internet, involving browser security and network security. Its objective is to determine measures
against attacks over the web. Insufficient internet security can be dangerous. It can cause many dangerous
situations, like starting from the computer system getting infected with viruses and worms to the collapse
of an e-commerce business. Different methods have been devised to protect the transfer of data over the
internet such as information privacy and staying alert against cyber attacks.
Information Privacy: Information privacy is the privacy or protection of personal information and refers
to the personal data stored on a computer. It is an important aspect of information sharing. Information
privacy is also known as data privacy or online privacy. Some Internet privacy involves the right of
personal privacy and deals with the storing and displaying of personal information on the internet. In any
exchange of personal information over the internet, there is always a risk involved with the safety of
personal information. Internet privacy may be a cause for concern especially when online purchases,
visiting social networking sites, participating in online games or attending forums.
Privacy issues can arise in response to information from a good range of sources, such as:
• Healthcare records
• Financial institution
• Transactions
• Biological traits
• Residence records
• Location-based service
The risk involved in internet privacy is sometimes dangerous. In the process of data transfer over the
internet, if a password is revealed, a victim’s identity may be deceitfully used.
2. Malware: An application used to illegally harm online and offline computer users
3. Virus: It is a small program or software which is embedded with a legitimate program and
designed to harm your system.
4. Worms: It is a self-replicating program that spread across networks due to the poor security of
the infected computers.
5. Trojan horse: Trojan horse is a program that allows the hackers to gain remote access to a target
system.
To minimize internet privacy violation risks, the following measures need to be taken:
4. Always use strong passwords consisting of letters, numerals, and special characters.
Unethical computer practices refer to actions or behaviors that violate moral principles, norms, or
standards in the development, use, or management of computer systems, software, and technology.
Here are some examples:
1. Hacking and cybercrime: Unauthorized access to computer systems, data theft, or malicious
attacks on networks and websites.
2. Data privacy violations: Collecting, storing, or sharing personal data without consent, or using it
for malicious purposes.
3. Software piracy and copyright infringement: Illegal copying, distribution, or use of copyrighted
software, music, or other digital content.
7. Unethical data mining and analytics: Collecting and analyzing personal data without consent, or
using it to manipulate or exploit individuals.
9. Lack of transparency and accountability: Failing to disclose data collection practices, algorithmic
biases, or other important information about technology use.
10. Ignoring security vulnerabilities: Failing to address known security flaws or vulnerabilities in
software or systems, putting users at risk.
1. Cyberbullying: When people bully other people by the use of electronic communication ( like the web,
telephone, etc). it’s referred to as cyberbullying. Cyberbullying has been done by friends, classmates,
relatives, any other unknown persons. Sending harmful emails to a person creates fake websites to make
fun of or to make harm a person by distributing the same fake information about a person posting and
distributing fake images of a person. These are some common ways of cyberbullying.
In most cyberbullying cases, they do not reveal their identities. Due to cyberbullying, some bullied persons
are affected emotionally or mentally. Even if those are fake information, the bullied person may become
depressed or it may affect their day-to-day life. In the case of the students or kids, it may affect their study
or they may lose self-esteem.
2. Phishing: An internet hacking activity used to steal user data. In this activity, an email is sent to the
user which misleads him/her to believe that it is from a trusted organization. After sending the email, the
attacker asks the user to visit their website, and on their website, they will ask for the personal
information of the user like password, credit card information, etc. So, this is how the attacker steals the
personal information of the user.
• Never open a link, attachment, etc. in an email that is sent by some unknown person.
• Never share your personal information in an email that is asked by an unknown person.
• Always check your bank statements regularly to ensure that no unauthorized transactions are
made. If unauthorized transactions are made in your account, then immediately report this issue
to your bank.
3. Hacking: It is an unethical activity in which a highly skilled technical person (or commonly known as a
hacker) enters another person’s computer without the permission of the user and steals important
data/project/applications from the computer or sometimes destroys the information from the system.
• Always use strong passwords consisting of letters, numerals, and special characters.
• Before installing any application in your system, always check permission and authenticity.
4. Spamming: It is an unethical activity in which bulk unwanted e-mail is set to you from a strange or
unknown source. Sometimes, due to bulk emails, your mail server gets full and mail bombing activity
happens. Spam mail is generally used to deliver viruses, worms, trojan horses, malware, spyware, etc. to
attack the user.
• In your mailbox, if you find suspicious mail, then immediately delete that mail(without opening).
5. Plagiarism: Plagiarism is stealing or copying someone else’s intellectual work (can be an idea, literary
work or academic work, etc.) and representing it as your own work without giving credit to the creator
or without citing the source of information.
• If you are taking someone else’s work, then always give the credit to the original author in an in-
text citation.
Solution:
Solution:
• Plagiarism
• Cyberbullying
• Unauthorized Hacking
• Spamming
• Phishing
• Software piracy
Solution:
Cybercrime may be a criminal activity done with the help of computers and the Internet. It includes
downloading illegal data, online fraud bank transaction, etc.
Question 6. The organization that has established the guideline for copyright Law.
Solution:
WIPO
Solution:
Data privacy refers to the practices, policies, and regulations that govern the collection, storage, use, and
sharing of personal data to protect individual privacy. It involves ensuring that individuals have control
over their personal data and that their data is handled in a secure, transparent, and responsible manner.
• Consent - Ensuring users provide informed consent for the collection and use of their personal
data.
• Purpose Limitation - Collecting and using data only for the stated, legitimate purposes.
• Data Minimization - Collecting and retaining the minimum amount of personal data necessary.
• Storage Limitation - Deleting data when it is no longer needed for the original purpose.
• Transparency - Providing clear information to users about data practices and rights.
• Individual Rights - Allowing users to access, correct, download, or delete their personal data.
• Ubiquitous Data Collection - The proliferation of connected devices and online services that collect
user data.
• Big Data Analytics - The ability to derive insights from large, diverse datasets that may contain
sensitive information.
• Cross-Border Data Flows - The complexity of ensuring data privacy protections when data moves
between different jurisdictions.
• Emerging Technologies - New innovations like AI, IoT, and biometrics that introduce novel privacy
risks.
Regulatory Compliance:
• Laws like GDPR, CCPA, HIPAA that mandate data privacy standards and user rights.
• The need for organizations to implement robust data governance and privacy programs.
User Consent
• Definition: User consent refers to the agreement by individuals for their personal data to be
collected, processed, and used by organizations.
• Informed Consent: Users must be provided with clear, understandable information about how
their data will be used, allowing them to make an informed decision.
• Trust: Establishing trust between users and organizations is crucial; transparency about data usage
fosters this trust.
• Legal Compliance: Many data protection laws (e.g., GDPR) require obtaining explicit consent
before processing personal data.
Data Protection
• Definition: Data protection involves safeguarding personal information from unauthorized access,
use, or disclosure.
• Key Strategies:
o Regular Audits: Conduct assessments to ensure compliance with data protection policies
and regulations.
Best Practices
• Clear Policies: Organizations should have clear, accessible privacy policies explaining data
collection and usage.
• User Rights: Inform users of their rights to access, rectify, and delete their data.
• Training: Regularly train employees on data protection principles and practices to ensure
compliance.
By prioritizing user consent and robust data protection measures, organizations can enhance user trust
and comply with legal requirements.
Cybersecurity
Cybersecurity encompasses the strategies, technologies, and processes designed to protect systems,
networks, and data from cyber threats. It is essential for safeguarding sensitive information and ensuring
the integrity of digital assets.
1. Network Security: Protects the integrity and usability of networks and data. Involves hardware
and software technologies to defend against unauthorized access, misuse, or denial of service.
2. Application Security. Focuses on keeping software and devices free of threats. Involves security
measures throughout the application development lifecycle.
3. Endpoint Security. Secures endpoints or devices such as computers, mobile devices, and servers.
Protects against threats targeting individual devices connected to the network.
4. Data Security. Safeguards data from unauthorized access and corruption. Involves encryption,
access controls, and secure storage practices.
5. Identity and Access Management (IAM). Ensures that the right individuals access the right
resources at the right times. Involves user authentication and authorization processes.
7. Security Awareness Training. Educates employees about cybersecurity policies and best practices.
Helps to recognize and respond to potential threats like phishing attacks.
• Ransomware: A type of malware that encrypts data and demands payment for its release.
• Insider Threats: Security risks that originate from within the organization, often from employees
or contractors.
1. Regular Software Updates: Keep systems and applications up to date to protect against
vulnerabilities.
2. Strong Password Policies: Implement complex passwords and change them regularly.
BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]
4. Data Encryption: Encrypt sensitive data both in transit and at rest to prevent unauthorized access.
5. Regular Security Audits: Conduct assessments to identify vulnerabilities and improve defenses.
Cybersecurity professionals play a vital role in protecting an organization’s information systems and data.
Their responsibilities encompass a wide range of activities aimed at ensuring the confidentiality, integrity,
and availability of digital assets.
1. Risk Assessment
4. Incident Response
• Develop and maintain an incident response plan for addressing security breaches.
• Raise awareness about common threats, such as phishing and social engineering.
6. Vulnerability Management
• Ensure that users have appropriate access levels based on their roles.
9. Data Protection
• Implement measures to protect sensitive data, including encryption and secure storage.
• Work with other IT teams to integrate security into all aspects of technology.
Conclusion
Intellectual Property (IP) refers to the legal rights that protect creations of the mind, such as inventions,
artistic works, designs, symbols, names, and images used in commerce. IP rights enable creators to control
the use of their creations and receive recognition or financial benefits.
1. Copyright
o Protects original works of authorship, including literature, music, film, and software.
o Grants the creator exclusive rights to reproduce, distribute, and display the work.
2. Patents
o Provides the inventor exclusive rights to use, sell, or license the invention.
3. Trademarks
4. Trade Secrets
5. Industrial Designs
• Encourages Innovation: Provides creators with the motivation to develop new ideas and products
by ensuring they can benefit from their work.
• Consumer Trust: Trademarks and copyrights help maintain quality and authenticity, allowing
consumers to make informed choices.
• Revenue Generation: IP can be a significant source of revenue through licensing, sales, and
partnerships.
• Infringement: Unauthorized use of IP can lead to legal disputes and financial losses.
• Digital Piracy: The rise of the internet has made it easier to copy and distribute IP without
permission.
1. Register IP Rights: Where applicable, register copyrights, trademarks, and patents to formalize
protection.
2. Use Contracts: Implement non-disclosure agreements (NDAs) and licensing agreements to protect
trade secrets and other IP.
3. Monitor Use: Regularly monitor the market for potential infringements and take action when
necessary.
4. Educate Employees: Train staff on the importance of IP and the organization’s policies on
protecting it.
Copyright
Copyright is a legal protection that grants the creator of original works exclusive rights to their use and
distribution, typically for a limited time. This protection applies to various forms of creative expression,
including literature, music, art, software, and films.
1. Originality: The work must be original and exhibit a minimal level of creativity. This means it
cannot be a copy of another work.
2. Fixation: The work must be fixed in a tangible medium of expression. This can include physical
formats (like books or paintings) or digital formats (like PDFs or MP3s).
3. Automatic Protection: Copyright protection is automatic upon the creation of the work; there is
no need for formal registration in many jurisdictions (though registration can offer additional legal
benefits).
• Distribution Right: The right to sell or otherwise distribute copies of the work.
• Public Performance Right: The right to perform the work publicly (e.g., music, theater).
• Public Display Right: The right to display the work publicly (e.g., art).
• Derivative Works Right: The right to create adaptations or derivative works based on the original.
Duration of Copyright
In many countries, copyright lasts for the life of the creator plus an additional number of years (e.g., 70
years in the U.S. and EU). For works created by corporations, copyright typically lasts for a fixed number
of years from publication or creation, depending on jurisdiction.
Limitations and Exceptions: Allows limited use of copyrighted material without permission for purposes
such as criticism, comment, news reporting, teaching, scholarship, or research. Works that are no longer
protected by copyright are considered public domain and can be freely used by anyone. A licensing system
that allows creators to grant certain usage rights while retaining others.
Infringement and Enforcement: Infringement mean Unauthorized use of copyrighted material constitutes
infringement, which can lead to legal action. Enforcement mean Copyright holders can sue for damages,
seek injunctions, and recover profits made from the infringement.
Best Practices for Copyright Protection: Although not required, registering can provide legal advantages
in case of infringement. Include a copyright notice (© [Year] [Author/Owner]) to inform others of your
rights. Inform employees and collaborators about copyright laws and the importance of respecting IP
rights. Keep track of where and how your works are used to identify potential infringements.
BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]
Conclusion
Copyright is a critical element of intellectual property law that protects the rights of creators. By
understanding copyright principles and actively managing their rights, creators can safeguard their works
and promote fair use in a balanced manner.
Copyright Principles
Understanding the fundamental principles of copyright is essential for creators, users, and legal
professionals. Here are the key principles that govern copyright protection:
1. Originality The work must be an original creation of the author, showing a minimal degree of creativity.
Implication: Works that are copied from others, or that do not involve any creative input, do not qualify
for copyright protection.
2. Fixation: The work must be fixed in a tangible medium of expression, meaning it must be captured in a
form that can be perceived, reproduced, or otherwise communicated. Examples: This includes written
texts, recorded music, digital files, and visual art.
3. Automatic Protection Principle: Copyright protection is automatic upon the creation of the work; no
formal registration is required in many jurisdictions. While registration is not mandatory, it can provide
legal advantages and facilitate enforcement.
4. Exclusive Rights: Copyright holders possess exclusive rights to: Reproduce the work, distribute copies,
publicly perform or display the work, create derivative works based on the original. These rights allow
creators to control how their works are used and to profit from them.
5. Duration of Copyright: Copyright lasts for the life of the author plus a specific number of years (e.g., 70
years in many countries). Corporate Works: For works created by corporations, copyright duration may
differ, often lasting a set number of years from publication.
6. Limitations and Exceptions: Allows limited use of copyrighted material without permission for purposes
such as criticism, comment, news reporting, teaching, scholarship, or research. Public Domain: Works that
are no longer under copyright protection can be freely used by anyone. Creative Commons: Licensing
options that allow creators to grant certain permissions while retaining other rights.
7. Moral Rights: In some jurisdictions, moral rights protect the personal and reputational interests of the
creator, such as the right to attribution and the right to object to derogatory treatment of the work. Moral
rights exist independently of the economic rights granted to copyright holders.
8. Transfer of Rights: Copyright holders can transfer their rights to others through contracts. Copyright
can be licensed, allowing others to use the work under specified conditions while retaining ownership.
Conclusion
These principles form the foundation of copyright law, balancing the interests of creators with the public's
access to creative works. Understanding these principles helps individuals and organizations navigate
copyright issues effectively, promoting creativity while respecting the rights of creators.
Open source and proprietary software represent two distinct approaches to software development and
distribution. Each has its own advantages, disadvantages, and philosophies.
Open-Source Software
Definition: Open source software is software whose source code is made available to the public. Users can
view, modify, and distribute the code freely.
Key Characteristics:
• Accessibility: The source code is openly available for anyone to use, study, and modify.
• Licensing: Distributed under licenses that comply with the Open Source Definition, such as the
GNU General Public License (GPL) or MIT License.
• Cost: Typically free to use, although some projects may offer paid support or services.
Advantages:
• Flexibility: Users can modify the software to fit their specific needs.
• Transparency: Open code allows for peer review, which can lead to improved security and quality.
• Community Support: Many open source projects have active communities providing support and
updates.
• No Vendor Lock-In: Users are not tied to a single vendor for support, updates, or features.
Disadvantages:
• Usability: Some open source software may lack user-friendly interfaces compared to proprietary
alternatives.
• Support: Professional support may be limited or require payment; reliance on community forums
can be a drawback for businesses.
• Compatibility: Open source software might not always integrate seamlessly with proprietary
systems.
Proprietary Software
Definition: Proprietary software is software that is owned by an individual or company. The source code
is kept secret, and users must purchase licenses to use the software.
Key Characteristics:
• Ownership: The software is owned by a specific entity, which controls its distribution and
modification.
• Licensing: Users must agree to specific terms of use, often limiting how the software can be used
or modified.
Advantages:
• User-Friendly: Often designed with a focus on user experience, resulting in intuitive interfaces and
features.
• Professional Support: Generally comes with dedicated customer support and regular updates
from the vendor.
• Integration: Proprietary software may offer better integration with other proprietary systems and
tools.
Disadvantages:
• Lack of Flexibility: Users cannot modify the software; they must rely on the vendor for updates
and new features.
• Vendor Lock-In: Businesses may become dependent on a specific vendor for future support and
upgrades.
Source Code Available for public access Not available; kept secret by the owner
Modification Users can modify the software Users cannot modify the software
Flexibility Highly flexible and customizable Limited to the features provided by the
vendor
Transparency High transparency; code is openly Low transparency; users trust the vendor's
reviewed claims
Digital Divide
BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]
The digital divide refers to the gap between individuals, households, businesses, and geographic areas that
have access to modern information and communication technology (ICT) and those that do not. This divide
is characterized by disparities in access to the internet, digital devices, and digital literacy.
1. Access to Technology
2. Economic Factors
o Affordability: The cost of internet services and devices can be prohibitive for low-income
households, limiting access.
o Income Disparities: Higher income levels often correlate with better access to technology
and the internet.
3. Educational Disparities
o Digital Literacy: Skills and knowledge required to effectively use digital technologies vary
widely, affecting individuals' ability to benefit from available resources.
o Education Systems: Schools in affluent areas may provide more resources and training in
technology, while those in low-income areas may lack sufficient support.
4. Geographic Disparities
o Urban vs. Rural: Urban areas often have better infrastructure and connectivity compared
to rural regions, leading to a significant access gap.
o Global Divide: Differences in technology access are also evident between developed and
developing countries.
o Age: Older adults may have more difficulty adapting to new technologies compared to
younger generations.
o Cultural Attitudes: Attitudes towards technology can influence adoption and usage
patterns.
• Economic Inequality: Limited access to digital resources can hinder job opportunities, economic
growth, and overall social mobility.
• Educational Disadvantages: Students without access to technology may fall behind in their studies
and miss out on critical learning opportunities.
• Social Isolation: Individuals without internet access may feel disconnected from social networks,
information, and services.
• Limited Civic Engagement: Access to information about civic rights and responsibilities is often
mediated by technology, affecting participation in democratic processes.
1. Infrastructure Development
2. Affordability Initiatives
o Programs to enhance digital literacy, particularly for older adults and disadvantaged
groups.
o Integration of technology education into school curricula to prepare students for a digital
world.
4. Community Engagement
o Support for policies that promote equitable access to technology and the internet.
Conclusion
Addressing the digital divide is essential for fostering equality and ensuring that all individuals can
participate fully in the digital age. By focusing on access, affordability, education, and community
engagement, stakeholders can work towards bridging this critical gap and promoting inclusivity.
Social responsibilities in the field of information technology (IT) encompass the ethical obligations that
individuals and organizations have towards society. These responsibilities reflect how technology impacts
various aspects of life, including privacy, security, accessibility, and the environment.
o User Consent: Ensure that users are informed and give explicit consent before their data
is collected or processed.
o Data Security: Implement robust measures to protect personal data from breaches and
unauthorized access.
2. Cybersecurity
o Incident Response: Have plans in place to respond to data breaches and security incidents
effectively.
o Education: Provide training for employees and users on best practices for cybersecurity to
reduce risks.
3. Digital Accessibility
o Inclusivity: Design technology and digital content that is accessible to all users, including
those with disabilities.
o AI and Automation: Ensure that AI systems are designed to be fair and unbiased, avoiding
discrimination in decision-making processes.
o Responsible Innovation: Consider the ethical implications of new technologies and how
they affect society.
5. Environmental Responsibility
6. Community Engagement
BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]
o Copyright Compliance: Respect copyright laws and avoid the unauthorized use of
software and digital content.
o Open Source Contributions: Support and contribute to open-source projects that benefit
the community.
8. Economic Impact
o Job Creation: Contribute to local economies by creating jobs and providing training
opportunities in technology fields.
o Fair Labor Practices: Ensure fair treatment of employees and promote diversity and
inclusion within the workforce.
Personal conduct refers to the ethical behavior and professional standards that individuals in the
information technology (IT) field are expected to uphold. Maintaining high personal conduct is crucial for
fostering trust, integrity, and professionalism in the industry.
1. Integrity
o Accountability: Take responsibility for your actions and their consequences, both positive
and negative.
2. Respect
o Colleagues and Clients: Treat everyone with respect, regardless of their background, role,
or perspective.
o Diversity and Inclusion: Promote an inclusive environment that values diverse viewpoints
and experiences.
3. Professionalism
o Work Ethic: Demonstrate dedication and commitment to your work, meeting deadlines
and delivering quality results.
o Continuous Learning: Stay current with industry trends, tools, and best practices through
ongoing education and training.
4. Confidentiality
o Data Protection: Respect the confidentiality of sensitive information, including client data,
proprietary software, and internal communications.
5. Compliance
o Legal and Ethical Standards: Follow all relevant laws, regulations, and professional codes
of conduct applicable to your work.
7. Communication
o Clarity and Transparency: Communicate clearly and transparently with colleagues and
clients, ensuring that information is accessible and understandable.
8. Community Engagement
Conclusion
Upholding high standards of personal conduct in the IT field is essential for fostering a positive work
environment and maintaining the integrity of the profession. By embodying principles of integrity, respect,
professionalism, and ethical behavior, IT professionals can contribute to a culture of trust and
accountability, benefiting both their organizations and society as a whole.
Philosophical Ethics
• 2. One ought to right the wrongs that one has inflicted on others (reparation)
• One ought to distribute goods justly (justice)
• One ought to improve the lot of others with respect to virtue, intelligence, and happiness
• (beneficence)
• One ought to improve oneself with respect to virtue and intelligence (self-improvement)
• One ought to exhibit gratitude when appropriate (gratitude)
• One ought to avoid injury to others (non- injury)
Focuses on moral principle instead of consequences. A right can be defined as entitlement to something.
In the
Additional Principles
In addition to the normative principles given above, an individual can make a rational appeal to The Ten
o Thou shalt think about the social consequences of the program you are writing or the
system you are designing
o Thou shalt always use a computer in ways that insure consideration and respect for your
fellow human being To be ethical, an action should elicit a positive response to all
applicable primary questions and a negative response to each clarification:
• Is it honourable? Is there anyone from whom you would like to hide the action?
• Is it honest? Does it violate any agreement, actual or implied, or otherwise betray a trust?
• Does it avoid the possibility of a conflict of interest? Are there other considerations that might
• Is it within your area of competence? Is it possible that your best effort will not be adequate?
and consensus of many members. The code itself has several roles:
• Mechanism for educating for those entering the profession, companies and clients.
The code also ensures collective responsibility, so that various parties do not only think of individuals in
the
profession but rather a collective unit of the profession. If a profession speaks out on an issue, it is more
effective
as a group. Examples of this are issues such as protection of whistle blowers and gender bias.
Professional ethics in information technology (IT) refer to the moral principles and standards that guide
the behavior of individuals and organizations in the field. These ethics are crucial for maintaining trust,
integrity, and accountability in a rapidly evolving technological landscape.
1. Integrity
o Quality of Work: Deliver work that meets established standards and fulfills client needs.
o Copyright and Licensing: Acknowledge and respect copyright laws, licensing agreements,
and intellectual property rights.
o Attribution: Properly attribute the works of others when using or referencing their ideas
or creations.
5. Professionalism
o Ethical Conduct: Exhibit behavior that reflects well on the profession, avoiding actions
that could damage its reputation.
o Accountability: Take responsibility for one’s actions and decisions, both personally and on
behalf of the organization.
o Inclusivity: Promote diversity and inclusion in the workplace and the technology
developed.
7. Social Responsibility
BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]
o Community Engagement: Use technology to benefit society, addressing social issues and
improving quality of life.
o Legal Adherence: Follow all relevant laws, regulations, and organizational policies
governing technology use and data management.
o Ethical Decision-Making: Make decisions that align with ethical standards, even when
there is no legal obligation.
• Trust Building: Adhering to ethical standards fosters trust between IT professionals, clients, and
the public.
• Reputation Maintenance: Upholding ethical conduct enhances the reputation of the individual
and the organization.
• Risk Mitigation: Ethical practices reduce the risk of legal issues, data breaches, and other negative
consequences.
• Guidance in Dilemmas: A strong ethical framework provides guidance in complex situations where
the right course of action may not be clear.
Conclusion
Professional ethics play a vital role in shaping the behavior and decisions of individuals in the IT field. By
adhering to ethical principles, IT professionals can contribute to a positive and responsible technological
environment, benefiting both their organizations and society as a whole. Emphasizing integrity,
confidentiality, competence, and social responsibility is essential for maintaining the trust and respect
necessary for the profession's success.
Many groups wish to be considered professional. To achieve this status the group needs to bee organised
into a formal unit. They must also demonstrate a domain of activity and that if the group has control over
this domain that it will be safer and more effectively run. The group must convince the public that lay
people can not adequately judge the group and that only the group themselves are capable of judging
themselves. Usually, professional monopolies are granted on conditions that they must regulate
themselves and that they must further the interests of the public.
• Convince the public to trust the group (usually by means of code of Ethics) For success the group
needs:
• Formal organisation to gives the group monopoly
• Collective autonomy in order to justify individual autonomy for members
• Self regulation
This often involved the conditions of employments. This can be explicit in the contracts (concerns
responsibilities and salary) but many important issues are left out (overtime). Some are specified by laws
such as sick and annual leaves, while some are negotiated by unions such as retrenchment rules.
• Is contractual
• Neither party should take advantage of the other. Employee should be honest with their qualification
and employer should not exploit employee (decent wage, safe environment, etc.) Another important issue
is what does the employee owe?
• Loyalty – can invite some unfairness (boss’s son) or loss of criticality (just agree with boss)
• Trade secrets/knowledge in a field. There are many means of dealing with this, by making sure that:
Employee can only sell specific knowledge – but this is considered wrong, Employees sign contract not to
reveal secrets gain during employment as part of the job, Employees sign contract not to work in similar
area for a certain period after leaving the company.
Recall Carl and his safety concern. His company should have told the military that the project was late. In
this respect, his company was not acting well. Additionally, Carl tried to work through his company but
failed. The client (the military) depends on professional for the knowledge and expertise in the special
area.
• Agency: Professional is the agent and does exactly what client tells him to do (like telling
• Paternalistic: Professional makes all the decisions and the client abrogates all decision making.
• Fiduciary: Both parties play a role by working together. The professional offers options while
the client decides which one to take. This requires trust on both sides and that the decision
process is shared.
BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]
This relationship is usually shaped by law, but the law (or people who makes them) can not foresee
everything - consider Carl’s case. If Society licenses a professional society then the professional society:
Many believe that this relationship is self-serving. They see members as only having an obligation to other
members. This might create a reluctance to criticize another professional. Often such scenarios are
complex, especially when it is difficult to tell if it’s a genuine errors or incompetence.
For a professional society to flourish there must also be advantages to Society from it:
• Members must consider what they owe to each other to maintain standards of conduct.
• There is a need for disciplinary hearing procedure.
• Members have important obligation such as much not take bribes, not lie about qualifications or
fudge the results.
Conflicting Responsibilities
For a professional, there exist many conflicts between the four types of relationships that they take part
in. This is most common between the responsibilities with employer and society. Consider the Carl’s case
again – the company needs contracts to survive but Carl’s concern is his responsibilities to society. So when
does a professional ‘rock the boat’ when it comes to society versus other relationships? There is no easy
answer but generally:
Another issue is fragmentation. Where as medical profession sees the entire problem, computing
professionals often sees a small part of the system and as such it can be very difficult to pass judgement.
and consensus of many members.
The code also ensures collective responsibility, so that various parties do not only think of individuals in
the profession but rather a collective unit of the profession. If a profession speaks out on an issue, it is
more effective as a group. Examples of this are issues such as protection of whistle blowers and gender
bias.
REFERENCE
• [Link]
technology#:~:text=Ethics%20and%20security%20in%20information%20technology%201%20Th
e,ethics%20in%20the%20age%20of%20advanced%20technologies%20
• [Link]
technologies/?utm_campaign=Search%20%7C%20DSA%20%7C%20All&msclkid=c4b664eeb10c1
1204d3703e5cf68aaf3&utm_source=bing&utm_medium=cpc&utm_term=bokus&utm_content=
DSA%20-%20All
1. Luppicini, Rocci (2010). Technoethics and the Evolving Knowledge Society: Ethical Issues in
Technological Design, Research, Development, and Innovation. Advances in Information Security,
Privacy, and Ethics. IGI Global. doi:10.4018/978-1-60566-952-6. ISBN 978-1-60566-952-6.
2. ^ Bunge, Mario; The Hegeler Institute (1977). Sugden, Sherwood J. B. (ed.). "Towards a
Technoethics". Monist (in German). 60 (1): 96–107. doi:10.5840/monist197760134. ISSN 0026-
9662.
3. ^ Luppicini, Rocci; Adell, Rebecca, eds. (2009). Handbook of Research on Technoethics. IGI
Global. doi:10.4018/978-1-60566-022-6.ch001. ISBN 978-1-60566-022-6.
4. ^ Winner, Langdon (1980). "Do Artifacts Have Politics?". Daedalus. 109 (1): 121–136. ISSN 0011-
5266. JSTOR 20024652.
5. ^ Luppicini, Rocci; Adell, Rebecca, eds. (2009). Handbook of Research on Technoethics. IGI
Global. doi:10.4018/978-1-60566-022-6.ch014. ISBN 978-1-60566-022-6.
7. ^ Moor, James H. (2005). "Why We Need Better Ethics for Emerging Technologies". Ethics and
Information Technology. 7 (3): 111–119. doi:10.1007/s10676-006-0008-0. ISSN 1388-
1957. S2CID 27160198.
27. Which of the following is a ques�on you should ask yourself before you make a move to do
something ques�onable?
a) How would you feel if your behavior made front-page news?
b) How would you feel if your parents found out?
c) How would you feel about this next week?
d) How would you feel if your behavior was different?
28. Which of the following is NOT one of the Ten Commandments of Computer Ethics?
a) Thou shalt not use or copy so�ware for which you have not paid.
b) Thou shalt think about the social consequences of the program you write.
c) Thou shalt not interfere with other people's computer work.
d) Thou shalt not use a computer to do something fun.
………………………………Good luck………………………….