0% found this document useful (0 votes)
148 views38 pages

Ethic in ICT

The document discusses the importance of ethics in information and communication technology (ICT), highlighting key areas such as normative ethics, metaethics, and applied ethics. It outlines various ethical issues in IT, including personal privacy, access rights, and liability, while also addressing broader technology ethics and ethical challenges in the digital age. Additionally, it presents the 'Ten Commandments of Computer Ethics' and emphasizes the significance of internet security and information privacy.

Uploaded by

ag.mowamorris234
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
148 views38 pages

Ethic in ICT

The document discusses the importance of ethics in information and communication technology (ICT), highlighting key areas such as normative ethics, metaethics, and applied ethics. It outlines various ethical issues in IT, including personal privacy, access rights, and liability, while also addressing broader technology ethics and ethical challenges in the digital age. Additionally, it presents the 'Ten Commandments of Computer Ethics' and emphasizes the significance of internet security and information privacy.

Uploaded by

ag.mowamorris234
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

1/1/2024

r
nverte
cCo
lDo
ota
y of T
n cop
atio
evalu
fr ee
y t he
e db
duc
Pro

ochira paul john


MELLIUM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES
ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

ETHIC
Ethics is the study of moral principles and values that guide human behavior and decision-making. It
examines questions of right and wrong, good and bad, and what constitutes a just and virtuous life.

Some key areas of ethical inquiry include:

• Normative ethics: This examines what actions are morally right or wrong, and what moral duties
and obligations people have.
• Metaethics: This investigates the fundamental nature of moral judgments, the meaning of moral
terms, and whether moral statements can be objectively true or false.
• Applied ethics: This looks at how moral principles should guide decisions and actions in specific
real-world situations, such as in medicine, business, the environment, etc.
• Virtue ethics: This focuses on the moral character of the individual, exploring what virtues (like
honesty, courage, compassion) should be cultivated.

Ethical theories and frameworks, like utilitarianism, deontology, and virtue ethics, provide different
lenses for analyzing moral dilemmas. Ethical reasoning often involves weighing competing principles,
rights, and consequences.

The field of ethics is essential for guiding individual and societal choices, as well as informing laws,
policies, and social norms. Ongoing debates in ethics continue to shape our understanding of moral
behavior and the just society.

Computer ethic

Computer ethics" is a subset of applied ethics that deals with the moral principles and values that guide
the development, use, and impact of computer technology on society. It explores the ethical
considerations surrounding the creation, dissemination, and use of digital technologies, including
computers, software, networks, and the internet.

Information Technology specifies to the components that are used to store, fetch and manipulate the
information at the minimum level with the server having an operating system. Information Technology
have a wide area of applications in education, business, health, industries, banking sector and scientific
research at a large level. With the leading advancement in information technology, it is necessary to have
the knowledge of security issues, privacy issues and main negative impacts of IT. To deal with these issues
in IT society it is important to find out the ethical issues.

Some of the major ethical issues faced by Information Technology (IT) are:

• Personal Privacy
• Access Right
• Harmful Actions
• Patents
• Copyright
BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 1


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

• Trade Secrets
• Liability
• Piracy

These are explained with their affects as following below:

• Personal Privacy: It is an important aspect of ethical issues in information technology. IT facilitates


the users having their own hardware, operating system and software tools to access the servers
that are connected to each other and to the users by a network. Due to the distribution of the
network on a large scale, data or information transfer in a big amount takes place which leads to
the hidden chances of disclosing information and violating the privacy of any individuals or a
group. It is a major challenge for IT society and organizations to maintain the privacy and integrity
of data. Accidental disclosure to inappropriate individuals and provisions to protect the accuracy
of data also comes in the privacy issue.
• Access Right: The second aspect of ethical issues in information technology is access right. Access
right becomes a high priority issue for the IT and cyberspace with the great advancement in
technology. E-commerce and Electronic payment systems evolution on the internet heightened
this issue for various corporate organizations and government agencies. Network on the internet
cannot be made secure from unauthorized access. Generally, the intrusion detection system are
used to determine whether the user is an intruder or an appropriate user.
• Harmful Actions: Harmful actions in the computer ethics refers to the damage or negative
consequences to the IT such as loss of important information, loss of property, loss of ownership,
destruction of property and undesirable substantial impacts. This principle of ethical conduct
restricts any outsiders from the use of information technology in manner which leads to any loss
to any of the users, employees, employers and the general public. Typically, these actions comprise
of the intentional destruction or alteration of files and program which drives a serious loss of
resources. To recover from the harmful actions extra time and efforts are required to remove the
viruses from the computer systems.
• Patents: It is more difficult to deal with these types of ethical issues. A patent can preserve the
unique and secret aspect of an idea. Obtaining a patent is very difficult as compared with obtaining
a copyright. A thorough disclosure is required with the software. The patent holder has to reveal
the full details of a program to a proficient programmer for building a program.
• Copyright : The information security specialists are to be familiar with necessary concept of the
copyright law. Copyright law works as a very powerful legal tool in protecting computer software,
both before a security breach and surely after a security breach. This type of breach could be the
mishandling and misuse of data, computer programs, documentation and similar material. In
many countries, copyright legislation is amended or revised to provide explicit laws to protect
computer programs.
• Trade Secrets: Trade secrets is also a significant ethical issue in information technology. A trade
secret secures something of value and usefulness. This law protects the private aspects of ideas
which is known only to the discover or his confidants. Once disclosed, trade secret is lost as such
and is only protected by the law for trade secrets. The application of trade secret law is very broad
in the computer range, where even a slight head start in the advancement of software or hardware
can provide a significant competitive influence.
BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 2


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

• Liability: One should be aware of the liability issue in making ethical decisions. Software developer
makes promises and assertions to the user about the nature and quality of the product that can
be restricted as an express warranty. Programmers or retailers possess the legitimate to determine
the express warranties. Thus they have to be practical when they define any claims and predictions
about the capacities, quality and nature of their software or hardware. Every word they say about
their product may be as legally valid as stated in written. All agreements should be in writing to
protect against liability. A disclaimer of express warranties can free a supplier from being held
responsible of informal, speculative statements or forecasting made during the agreement stages.
• Piracy: Piracy is an activity in which the creation of illegal copy of the software is made. It is entirely
up to the owner of the software as to whether or not users can make backup copies of their
software. As laws made for copyright protection are evolving, also legislation that would stop
unauthorized duplication of software is in consideration. The software industry is prepared to do
encounter against software piracy. The courts are dealing with an increasing number of actions
concerning the protection of software.

technology ethic is a broader field that encompasses computer ethics and explores the moral principles
and values that guide the development, use, and impact of technology on society. It examines the ethical
considerations surrounding the creation, dissemination, and use of various technologies, including
computers, software, networks, the internet, and other digital technologies.

there are many types of technology ethics:

• Access rights: access to empowering technology as a right

• Accountability: decisions made for who is responsible when considering success or harm in
technological advancements

• Digital rights: protecting intellectual property rights and privacy rights

• Environment: how to produce technology that could harm the environment

• Existential risk: technologies that represent a threat to the global quality of life pertaining to
extinction

• Freedom: technology that is used to control a society raising questions related to freedom and
independence

• Health and safety: health and safety risks that are increased and imposed by technologies

• Human Enhancement: human genetic engineering and human-machine integration

• Human judgement: when can decisions be judged by automation and when do they acquire a
reasonable human?

• Over-automation: when does automation decrease quality of life and start affecting society?

• Precaution principle: Who decides that developing this new technology is safe for the world?

• Privacy: protection of privacy rights

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 3


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

• Security: Is due diligence required to ensure information security?

• Self replicating technology: should self replicating be the norm?

• Technology transparency: clearly explaining how a technology works and what its intentions are

• Terms of service: ethics related to legal agreements

Ethical challenges

Ethical challenges arise in many different situations:

• Human knowledge processes

• Workplace discrimination

• Strained work-life balance in technologically enhanced work environments: Many people find that
simply having the technology allowing one to do work while at home increases stress levels. In a
recent study 70% of respondents said that since technology, work has crept into their personal
lives.[23]

• Digital divide: Inequalities in information access for parts of the population

• Unequal opportunities for scientific and technological development

• Norris says access to information and knowledge resources within a knowledge society tend to
favour the economically privileged who have greater access to technological tools needed to
access information and knowledge resources disseminated online and the privatization of
knowledge[24]

• Inequality in terms of how scientific and technological knowledge is developed around the globe.
Developing countries do not have the same opportunities as developed countries to invest in
costly large-scale research and expensive research facilities and instrumentation

• Organizational responsibility and accountability issues

• Intellectual property ownership issues

• Information overload: Information processing theory asserts that working memory that has a
limited capacity and too much information can lead to cognitive overload resulting in loss of
information from short-term memory

• Knowledge society is intertwined with changing technology requiring new skills of its workforce.
Cutler says that there is the perception that older workers lack experience with new technology
and that retaining programs may be less effective and more expensive for older workers. Cascio
says that there is a growth of virtual organizations. Saetre & Sornes say that it is a blurring of the
traditional time and space boundaries has also led to many cases in the blurring of work and
personal life[6][verification needed]

• Negative impacts of many scientific and technological innovations have on humans and the
environment has led to some skepticism and resistance to increasing dependence on technology
BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 4


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

within the Knowledge Society. Doucet calls for city empowerment to have the courage and
foresight to make decisions that are acceptable to its inhabitants rather that succumb to
global consumer capitalism and the forces of international corporations on national and local
governments

• Scientific and technological innovations that have transformed organizational life within a global
economy have also supplanted human autonomy and control in work within a technologically
oriented workplace

• The persuasive potential of technology raises the question of "how sensitive ... designers and
programmers [should] be to the ethics of the persuasive technology they design."[26] Technoethics
can be used to determine the level of ethical responsibility that should be associated with
outcomes of the use of technology, whether intended or unintended

• Rapidly changing organizational life and the history of unethical business practices have given rise
to public debates concerning organizational responsibility and trust. The advent of virtual
organizations and increase in remote work has bolstered ethical problems by providing more
opportunities for fraud and the production of misinformation. Concerted efforts are required to
uphold ethical values in advancing new knowledge and tools within societal relations which do
not exclude people or limit liberties of some people at the expense of others[6]

• Artificial Intelligence: Artificial Intelligence seems to be the one of the most talked of challenges
when it comes ethics. In order to avoid these ethical challenges some solutions have been
established; first and for most it should be developed for the common good and benefit of
humanity.[27] Secondly, it should operate on principles of intelligibility and fairness.[27] It should
also not be used to diminish the data rights or privacy of individuals, families, or communities.[27] It
is also believed that all citizens should have the right to be educated on artificial intelligence in
order to be able to understand it.[27] Finally, the autonomous power to hurt, destroy, or deceive
humans should never be vested in artificial intelligence.[2

Computer Ethics

What does the word ‘ethics’ mean? The dictionary defines ethics because of the moral principles that
govern the behavior of a gaggle or individual. But, not every people in society need to live an absolutely
moral life. Ethics are actually the unwritten code of conduct that every individual should follow. These
codes are considered correct only by the members of that particular profession. Similarly, for computer
users, computer ethics is a set of principles that regulates the use of computers. Computer ethics address
issues related to the misuse of computers and how they can be prevented. It primarily imposes the ethical
use of computing resources. It includes methods to avoid violating the unauthorized distribution of digital
content. The core issues surrounding computer ethics are based on the use of the internet, internet
privacy, copyrighted content, software, and related services, and user interaction with websites. The
Internet has changed our lifestyle. It has become a part of our life. It allows us to communicate with a
person from another part of the world. collecting information on any topic, social meets, and many other
activities. But at the same time, some peoples are always trying to cheat or harm others.

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 5


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

Ten commandments of computer ethics:

The commandments of computer ethics are as follows:

Commandment 1: Do not use the computer to harm other people’s data.

Commandment 2: Do not use a computer to cause interference in other people’s work.

Commandment 3: Do not spy on another person’s personal data.

Commandment 4: Do not use technology to steal personal information.

Commandment 5: Do not spread misinformation using computer technology.

Commandment 6: Do not use the software unless you pay for this software.

Commandment 7: Do not use someone else’s computer resources unless he authorized to use them.

Commandment 8: It is wrong to claim ownership of a work that is the output of someone else’s intellect.

Commandment 9: Before developing software, think about the social impact it can of that software.

Commandment 10: While computers for communication, always respectful with fellow members.

Internet Security

The internet is an insecure channel for exchanging information because it features a high risk of fraud or
phishing. Internet security is a branch of computer security specifically associated with the utilization of
the internet, involving browser security and network security. Its objective is to determine measures
against attacks over the web. Insufficient internet security can be dangerous. It can cause many dangerous
situations, like starting from the computer system getting infected with viruses and worms to the collapse
of an e-commerce business. Different methods have been devised to protect the transfer of data over the
internet such as information privacy and staying alert against cyber attacks.

Information Privacy: Information privacy is the privacy or protection of personal information and refers
to the personal data stored on a computer. It is an important aspect of information sharing. Information
privacy is also known as data privacy or online privacy. Some Internet privacy involves the right of
personal privacy and deals with the storing and displaying of personal information on the internet. In any
exchange of personal information over the internet, there is always a risk involved with the safety of
personal information. Internet privacy may be a cause for concern especially when online purchases,
visiting social networking sites, participating in online games or attending forums.

Privacy issues can arise in response to information from a good range of sources, such as:

• Healthcare records
• Financial institution
• Transactions
• Biological traits
• Residence records
• Location-based service

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 6


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

The risk involved in internet privacy is sometimes dangerous. In the process of data transfer over the
internet, if a password is revealed, a victim’s identity may be deceitfully used.

Some important terms:

1. Spyware: An application that obtains data without the user’s consent.

2. Malware: An application used to illegally harm online and offline computer users

3. Virus: It is a small program or software which is embedded with a legitimate program and
designed to harm your system.

4. Worms: It is a self-replicating program that spread across networks due to the poor security of
the infected computers.

5. Trojan horse: Trojan horse is a program that allows the hackers to gain remote access to a target
system.

General steps to protect our system from risks:

To minimize internet privacy violation risks, the following measures need to be taken:

1. Always use preventive software applications, like anti-virus, anti-malware, etc,

2. Avoid exposing personal data on websites with low-security levels.

3. Avoid shopping from unreliable websites

4. Always use strong passwords consisting of letters, numerals, and special characters.

5. Always keep your operating system updated.

6. Always on the firewall.

Unethical computing practices:

Unethical computer practices refer to actions or behaviors that violate moral principles, norms, or
standards in the development, use, or management of computer systems, software, and technology.
Here are some examples:

1. Hacking and cybercrime: Unauthorized access to computer systems, data theft, or malicious
attacks on networks and websites.

2. Data privacy violations: Collecting, storing, or sharing personal data without consent, or using it
for malicious purposes.

3. Software piracy and copyright infringement: Illegal copying, distribution, or use of copyrighted
software, music, or other digital content.

4. Cyberbullying and online harassment: Using technology to intimidate, threaten, or harm


individuals or groups.

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 7


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

5. ** Spamming and phishing**: Sending unsolicited emails, messages, or phishing attacks to


deceive or exploit users.

6. Malware development and distribution: Creating or spreading malicious software, such as


viruses, Trojans, or ransomware, to harm computer systems or steal data.

7. Unethical data mining and analytics: Collecting and analyzing personal data without consent, or
using it to manipulate or exploit individuals.

8. Unfair or deceptive business practices: Misleading or deceiving consumers through online


advertising, sales, or marketing tactics.

9. Lack of transparency and accountability: Failing to disclose data collection practices, algorithmic
biases, or other important information about technology use.

10. Ignoring security vulnerabilities: Failing to address known security flaws or vulnerabilities in
software or systems, putting users at risk.

Now we discuss some unethical computing practices:

1. Cyberbullying: When people bully other people by the use of electronic communication ( like the web,
telephone, etc). it’s referred to as cyberbullying. Cyberbullying has been done by friends, classmates,
relatives, any other unknown persons. Sending harmful emails to a person creates fake websites to make
fun of or to make harm a person by distributing the same fake information about a person posting and
distributing fake images of a person. These are some common ways of cyberbullying.

In most cyberbullying cases, they do not reveal their identities. Due to cyberbullying, some bullied persons
are affected emotionally or mentally. Even if those are fake information, the bullied person may become
depressed or it may affect their day-to-day life. In the case of the students or kids, it may affect their study
or they may lose self-esteem.

How to protect yourself from cyberbullying:

• Not to respond to cyberbullying.

• Never open e-mails received from unknown senders.

• Keep your password secret.

• Be careful, when you are posting something on a social site.

2. Phishing: An internet hacking activity used to steal user data. In this activity, an email is sent to the
user which misleads him/her to believe that it is from a trusted organization. After sending the email, the
attacker asks the user to visit their website, and on their website, they will ask for the personal
information of the user like password, credit card information, etc. So, this is how the attacker steals the
personal information of the user.

How to protect yourself from phishing:

• Never open a link, attachment, etc. in an email that is sent by some unknown person.

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 8


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

• Never share your personal information in an email that is asked by an unknown person.

• Always on the firewall of the computer system.

• Always check your bank statements regularly to ensure that no unauthorized transactions are
made. If unauthorized transactions are made in your account, then immediately report this issue
to your bank.

3. Hacking: It is an unethical activity in which a highly skilled technical person (or commonly known as a
hacker) enters another person’s computer without the permission of the user and steals important
data/project/applications from the computer or sometimes destroys the information from the system.

How to protect yourself from hacking:

• Never connect your system to free wifi or a free network.

• Always use strong passwords consisting of letters, numerals, and special characters.

• Before installing any application in your system, always check permission and authenticity.

• Always keep your operating system updated.

• Always use preventive software applications, like anti-virus, anti-malware, etc,

4. Spamming: It is an unethical activity in which bulk unwanted e-mail is set to you from a strange or
unknown source. Sometimes, due to bulk emails, your mail server gets full and mail bombing activity
happens. Spam mail is generally used to deliver viruses, worms, trojan horses, malware, spyware, etc. to
attack the user.

How to protect yourself from spam:

• To prevent spam mail, install filtering or blocking software.

• In your mailbox, if you find suspicious mail, then immediately delete that mail(without opening).

• Always keep your software updated.

• Never open the link that is sent by an unknown person.

5. Plagiarism: Plagiarism is stealing or copying someone else’s intellectual work (can be an idea, literary
work or academic work, etc.) and representing it as your own work without giving credit to the creator
or without citing the source of information.

How to protect yourself from plagiarism:

• While writing, always writes in your own words.

• Always use a plagiarism checker before the update.

• If you are taking someone else’s work, then always give the credit to the original author in an in-
text citation.

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 9


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

List some common computing ethics.

Solution:

• Do not use the computer to harm other people data.


• Do not spy on another person’s personal data.
• Do not use a computer to cause interference in other people work.
• Do not use technology to steal personal information.
• Do not spread misinformation using computer technology.
• It is wrong to claim ownership of a work that is the output of someone else’s intellect.
• In using computers for communication, be respectful with fellow members.

Question 4. List some unethical computing practices.

Solution:

• Plagiarism

• Cyberbullying

• Unauthorized Hacking

• Spamming

• Phishing

• Software piracy

Question 5. What is cybercrime?

Solution:

Cybercrime may be a criminal activity done with the help of computers and the Internet. It includes
downloading illegal data, online fraud bank transaction, etc.

Question 6. The organization that has established the guideline for copyright Law.

Solution:

WIPO

Question 7. An application that obtained data without the user’s consent.

Solution:

Data privacy refers to the practices, policies, and regulations that govern the collection, storage, use, and
sharing of personal data to protect individual privacy. It involves ensuring that individuals have control
over their personal data and that their data is handled in a secure, transparent, and responsible manner.

Data Privacy Principles:

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 10


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

• Consent - Ensuring users provide informed consent for the collection and use of their personal
data.

• Purpose Limitation - Collecting and using data only for the stated, legitimate purposes.

• Data Minimization - Collecting and retaining the minimum amount of personal data necessary.

• Storage Limitation - Deleting data when it is no longer needed for the original purpose.

• Security Safeguards - Implementing technical, administrative, and physical measures to protect


data from unauthorized access, misuse, or breach.

• Transparency - Providing clear information to users about data practices and rights.

• Individual Rights - Allowing users to access, correct, download, or delete their personal data.

Data Privacy Challenges:

• Ubiquitous Data Collection - The proliferation of connected devices and online services that collect
user data.

• Big Data Analytics - The ability to derive insights from large, diverse datasets that may contain
sensitive information.

• Cross-Border Data Flows - The complexity of ensuring data privacy protections when data moves
between different jurisdictions.

• Emerging Technologies - New innovations like AI, IoT, and biometrics that introduce novel privacy
risks.

Regulatory Compliance:

• Laws like GDPR, CCPA, HIPAA that mandate data privacy standards and user rights.

• The need for organizations to implement robust data governance and privacy programs.

• Potential fines and legal penalties for data privacy violations.

Organizational Best Practices:

• Adopting a privacy-by-design approach in product/service development.

• Conducting regular privacy impact assessments and audits.

• Providing employee training on data privacy principles and policies.

• Establishing clear incident response plans for data breach scenarios.

• Engaging with users to build trust and address privacy concerns.

User Consent and Data Protection

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 11


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

User Consent

• Definition: User consent refers to the agreement by individuals for their personal data to be
collected, processed, and used by organizations.

• Informed Consent: Users must be provided with clear, understandable information about how
their data will be used, allowing them to make an informed decision.

• Opt-In vs. Opt-Out:

o Opt-In: Users actively agree to data collection.

o Opt-Out: Users are automatically included but can refuse consent.

Importance of User Consent

• Trust: Establishing trust between users and organizations is crucial; transparency about data usage
fosters this trust.

• Legal Compliance: Many data protection laws (e.g., GDPR) require obtaining explicit consent
before processing personal data.

Data Protection

• Definition: Data protection involves safeguarding personal information from unauthorized access,
use, or disclosure.

• Key Strategies:

o Encryption: Protect data by converting it into a secure format.

o Access Controls: Limit data access to authorized personnel only.

o Regular Audits: Conduct assessments to ensure compliance with data protection policies
and regulations.

Best Practices

• Clear Policies: Organizations should have clear, accessible privacy policies explaining data
collection and usage.

• User Rights: Inform users of their rights to access, rectify, and delete their data.

• Training: Regularly train employees on data protection principles and practices to ensure
compliance.

By prioritizing user consent and robust data protection measures, organizations can enhance user trust
and comply with legal requirements.

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 12


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

Cybersecurity

Cybersecurity encompasses the strategies, technologies, and processes designed to protect systems,
networks, and data from cyber threats. It is essential for safeguarding sensitive information and ensuring
the integrity of digital assets.

Key Components of Cybersecurity

1. Network Security: Protects the integrity and usability of networks and data. Involves hardware
and software technologies to defend against unauthorized access, misuse, or denial of service.

2. Application Security. Focuses on keeping software and devices free of threats. Involves security
measures throughout the application development lifecycle.

3. Endpoint Security. Secures endpoints or devices such as computers, mobile devices, and servers.
Protects against threats targeting individual devices connected to the network.

4. Data Security. Safeguards data from unauthorized access and corruption. Involves encryption,
access controls, and secure storage practices.

5. Identity and Access Management (IAM). Ensures that the right individuals access the right
resources at the right times. Involves user authentication and authorization processes.

6. Incident Response. Prepares organizations to respond efficiently to cybersecurity incidents.


Involves identification, containment, eradication, recovery, and lessons learned.

7. Security Awareness Training. Educates employees about cybersecurity policies and best practices.
Helps to recognize and respond to potential threats like phishing attacks.

Common Cyber Threats

• Malware: Malicious software designed to disrupt, damage, or gain unauthorized access to


systems.

• Phishing: Deceptive attempts to obtain sensitive information by masquerading as a trustworthy


entity.

• Ransomware: A type of malware that encrypts data and demands payment for its release.

• Denial-of-Service (DoS) Attacks: Overwhelming a system with traffic to render it unusable.

• Insider Threats: Security risks that originate from within the organization, often from employees
or contractors.

Best Practices for Cybersecurity

1. Regular Software Updates: Keep systems and applications up to date to protect against
vulnerabilities.

2. Strong Password Policies: Implement complex passwords and change them regularly.
BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 13


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

3. Multi-Factor Authentication (MFA): Use additional verification methods to enhance account


security.

4. Data Encryption: Encrypt sensitive data both in transit and at rest to prevent unauthorized access.

5. Regular Security Audits: Conduct assessments to identify vulnerabilities and improve defenses.

Responsibilities of Cybersecurity Professionals

Cybersecurity professionals play a vital role in protecting an organization’s information systems and data.
Their responsibilities encompass a wide range of activities aimed at ensuring the confidentiality, integrity,
and availability of digital assets.

1. Risk Assessment

• Identify and evaluate potential risks to information systems.

• Analyze vulnerabilities in the organization’s infrastructure and operations.

2. Security Policy Development

• Create and implement security policies and procedures.

• Ensure policies are aligned with industry standards and regulations.

3. Monitoring and Detection

• Continuously monitor networks and systems for suspicious activity.

• Utilize security tools to detect and respond to threats in real time.

4. Incident Response

• Develop and maintain an incident response plan for addressing security breaches.

• Lead investigations into security incidents, including containment and recovery.

5. User Education and Training

• Conduct regular training sessions for employees on security best practices.

• Raise awareness about common threats, such as phishing and social engineering.

6. Vulnerability Management

• Regularly conduct vulnerability assessments and penetration testing.

• Prioritize and remediate identified vulnerabilities in systems and applications.

7. Access Control Management

• Implement and manage identity and access management systems.

• Ensure that users have appropriate access levels based on their roles.

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 14


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

8. Compliance and Regulatory Requirements

• Ensure adherence to relevant laws and regulations (e.g., GDPR, HIPAA).

• Prepare for and conduct audits to demonstrate compliance.

9. Data Protection

• Implement measures to protect sensitive data, including encryption and secure storage.

• Develop data classification policies to manage data sensitivity levels.

10. Collaboration and Communication

• Work with other IT teams to integrate security into all aspects of technology.

• Communicate security risks and strategies to stakeholders at all levels.

Conclusion

The responsibilities of cybersecurity professionals are critical to safeguarding an organization’s digital


landscape. By proactively managing risks and fostering a culture of security awareness, they can effectively
mitigate potential threats and enhance overall security posture.

Intellectual Property (IP)

Intellectual Property (IP) refers to the legal rights that protect creations of the mind, such as inventions,
artistic works, designs, symbols, names, and images used in commerce. IP rights enable creators to control
the use of their creations and receive recognition or financial benefits.

Types of Intellectual Property

1. Copyright

o Protects original works of authorship, including literature, music, film, and software.

o Grants the creator exclusive rights to reproduce, distribute, and display the work.

2. Patents

o Protects inventions and processes for a specific period (usually 20 years).

o Provides the inventor exclusive rights to use, sell, or license the invention.

3. Trademarks

o Protects symbols, names, and slogans used to identify goods or services.

o Helps consumers distinguish between different brands and prevents confusion.

4. Trade Secrets

o Protects confidential business information that provides a competitive edge (e.g.,


formulas, practices).

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 15


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

o No registration is needed; protection is maintained as long as the information remains


secret.

5. Industrial Designs

o Protects the ornamental or aesthetic aspects of a product.

o Covers the visual design of objects, enhancing their marketability.

Importance of Intellectual Property

• Encourages Innovation: Provides creators with the motivation to develop new ideas and products
by ensuring they can benefit from their work.

• Economic Growth: IP contributes to economic growth by fostering competition and innovation in


various industries.

• Consumer Trust: Trademarks and copyrights help maintain quality and authenticity, allowing
consumers to make informed choices.

• Revenue Generation: IP can be a significant source of revenue through licensing, sales, and
partnerships.

Challenges in Intellectual Property

• Infringement: Unauthorized use of IP can lead to legal disputes and financial losses.

• Global Enforcement: IP laws vary by country, making enforcement challenging in a global


marketplace.

• Digital Piracy: The rise of the internet has made it easier to copy and distribute IP without
permission.

Best Practices for Protecting Intellectual Property

1. Register IP Rights: Where applicable, register copyrights, trademarks, and patents to formalize
protection.

2. Use Contracts: Implement non-disclosure agreements (NDAs) and licensing agreements to protect
trade secrets and other IP.

3. Monitor Use: Regularly monitor the market for potential infringements and take action when
necessary.

4. Educate Employees: Train staff on the importance of IP and the organization’s policies on
protecting it.

Copyright

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 16


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

Copyright is a legal protection that grants the creator of original works exclusive rights to their use and
distribution, typically for a limited time. This protection applies to various forms of creative expression,
including literature, music, art, software, and films.

Key Features of Copyright

1. Originality: The work must be original and exhibit a minimal level of creativity. This means it
cannot be a copy of another work.

2. Fixation: The work must be fixed in a tangible medium of expression. This can include physical
formats (like books or paintings) or digital formats (like PDFs or MP3s).

3. Automatic Protection: Copyright protection is automatic upon the creation of the work; there is
no need for formal registration in many jurisdictions (though registration can offer additional legal
benefits).

Rights Granted by Copyright

Copyright holders have several exclusive rights, including:

• Reproduction Right: The right to make copies of the work.

• Distribution Right: The right to sell or otherwise distribute copies of the work.

• Public Performance Right: The right to perform the work publicly (e.g., music, theater).

• Public Display Right: The right to display the work publicly (e.g., art).

• Derivative Works Right: The right to create adaptations or derivative works based on the original.

Duration of Copyright

In many countries, copyright lasts for the life of the creator plus an additional number of years (e.g., 70
years in the U.S. and EU). For works created by corporations, copyright typically lasts for a fixed number
of years from publication or creation, depending on jurisdiction.

Limitations and Exceptions: Allows limited use of copyrighted material without permission for purposes
such as criticism, comment, news reporting, teaching, scholarship, or research. Works that are no longer
protected by copyright are considered public domain and can be freely used by anyone. A licensing system
that allows creators to grant certain usage rights while retaining others.

Infringement and Enforcement: Infringement mean Unauthorized use of copyrighted material constitutes
infringement, which can lead to legal action. Enforcement mean Copyright holders can sue for damages,
seek injunctions, and recover profits made from the infringement.

Best Practices for Copyright Protection: Although not required, registering can provide legal advantages
in case of infringement. Include a copyright notice (© [Year] [Author/Owner]) to inform others of your
rights. Inform employees and collaborators about copyright laws and the importance of respecting IP
rights. Keep track of where and how your works are used to identify potential infringements.
BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 17


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

Conclusion

Copyright is a critical element of intellectual property law that protects the rights of creators. By
understanding copyright principles and actively managing their rights, creators can safeguard their works
and promote fair use in a balanced manner.

Copyright Principles

Understanding the fundamental principles of copyright is essential for creators, users, and legal
professionals. Here are the key principles that govern copyright protection:

1. Originality The work must be an original creation of the author, showing a minimal degree of creativity.
Implication: Works that are copied from others, or that do not involve any creative input, do not qualify
for copyright protection.

2. Fixation: The work must be fixed in a tangible medium of expression, meaning it must be captured in a
form that can be perceived, reproduced, or otherwise communicated. Examples: This includes written
texts, recorded music, digital files, and visual art.

3. Automatic Protection Principle: Copyright protection is automatic upon the creation of the work; no
formal registration is required in many jurisdictions. While registration is not mandatory, it can provide
legal advantages and facilitate enforcement.

4. Exclusive Rights: Copyright holders possess exclusive rights to: Reproduce the work, distribute copies,
publicly perform or display the work, create derivative works based on the original. These rights allow
creators to control how their works are used and to profit from them.

5. Duration of Copyright: Copyright lasts for the life of the author plus a specific number of years (e.g., 70
years in many countries). Corporate Works: For works created by corporations, copyright duration may
differ, often lasting a set number of years from publication.

6. Limitations and Exceptions: Allows limited use of copyrighted material without permission for purposes
such as criticism, comment, news reporting, teaching, scholarship, or research. Public Domain: Works that
are no longer under copyright protection can be freely used by anyone. Creative Commons: Licensing
options that allow creators to grant certain permissions while retaining other rights.

7. Moral Rights: In some jurisdictions, moral rights protect the personal and reputational interests of the
creator, such as the right to attribution and the right to object to derogatory treatment of the work. Moral
rights exist independently of the economic rights granted to copyright holders.

8. Transfer of Rights: Copyright holders can transfer their rights to others through contracts. Copyright
can be licensed, allowing others to use the work under specified conditions while retaining ownership.

9. Infringement and Enforcement: Unauthorized use of copyrighted material constitutes infringement,


which can lead to legal consequences. Copyright holders have the right to sue for damages, seek
injunctions, and recover profits made from infringement.

Conclusion

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 18


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

These principles form the foundation of copyright law, balancing the interests of creators with the public's
access to creative works. Understanding these principles helps individuals and organizations navigate
copyright issues effectively, promoting creativity while respecting the rights of creators.

Open Source vs. Proprietary Software

Open source and proprietary software represent two distinct approaches to software development and
distribution. Each has its own advantages, disadvantages, and philosophies.

Open-Source Software

Definition: Open source software is software whose source code is made available to the public. Users can
view, modify, and distribute the code freely.

Key Characteristics:

• Accessibility: The source code is openly available for anyone to use, study, and modify.

• Community Collaboration: Often developed collaboratively by a community of developers and


users.

• Licensing: Distributed under licenses that comply with the Open Source Definition, such as the
GNU General Public License (GPL) or MIT License.

• Cost: Typically free to use, although some projects may offer paid support or services.

Advantages:

• Flexibility: Users can modify the software to fit their specific needs.

• Transparency: Open code allows for peer review, which can lead to improved security and quality.

• Community Support: Many open source projects have active communities providing support and
updates.

• No Vendor Lock-In: Users are not tied to a single vendor for support, updates, or features.

Disadvantages:

• Usability: Some open source software may lack user-friendly interfaces compared to proprietary
alternatives.

• Support: Professional support may be limited or require payment; reliance on community forums
can be a drawback for businesses.

• Compatibility: Open source software might not always integrate seamlessly with proprietary
systems.

Proprietary Software

Definition: Proprietary software is software that is owned by an individual or company. The source code
is kept secret, and users must purchase licenses to use the software.

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 19


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

Key Characteristics:

• Ownership: The software is owned by a specific entity, which controls its distribution and
modification.

• Licensing: Users must agree to specific terms of use, often limiting how the software can be used
or modified.

• Cost: Typically requires a purchase or subscription fee.

Advantages:

• User-Friendly: Often designed with a focus on user experience, resulting in intuitive interfaces and
features.

• Professional Support: Generally comes with dedicated customer support and regular updates
from the vendor.

• Integration: Proprietary software may offer better integration with other proprietary systems and
tools.

Disadvantages:

• Cost: Licensing fees can be significant, especially for enterprise solutions.

• Lack of Flexibility: Users cannot modify the software; they must rely on the vendor for updates
and new features.

• Vendor Lock-In: Businesses may become dependent on a specific vendor for future support and
upgrades.

The different between open-source software and proprietary software

Feature Open-Source Software Proprietary Software

Source Code Available for public access Not available; kept secret by the owner

Cost Generally free or donation-based Typically requires purchase or subscription

Modification Users can modify the software Users cannot modify the software

Support Community-driven, may have paid Professional support often included


options

Flexibility Highly flexible and customizable Limited to the features provided by the
vendor

Transparency High transparency; code is openly Low transparency; users trust the vendor's
reviewed claims

Digital Divide
BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 20


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

The digital divide refers to the gap between individuals, households, businesses, and geographic areas that
have access to modern information and communication technology (ICT) and those that do not. This divide
is characterized by disparities in access to the internet, digital devices, and digital literacy.

Key Aspects of the Digital Divide

1. Access to Technology

o Physical Access: Availability of devices (e.g., computers, smartphones) and internet


connectivity (e.g., broadband, mobile networks).

o Infrastructure: The quality and reach of telecommunications infrastructure can


significantly impact access, especially in rural or underserved areas.

2. Economic Factors

o Affordability: The cost of internet services and devices can be prohibitive for low-income
households, limiting access.

o Income Disparities: Higher income levels often correlate with better access to technology
and the internet.

3. Educational Disparities

o Digital Literacy: Skills and knowledge required to effectively use digital technologies vary
widely, affecting individuals' ability to benefit from available resources.

o Education Systems: Schools in affluent areas may provide more resources and training in
technology, while those in low-income areas may lack sufficient support.

4. Geographic Disparities

o Urban vs. Rural: Urban areas often have better infrastructure and connectivity compared
to rural regions, leading to a significant access gap.

o Global Divide: Differences in technology access are also evident between developed and
developing countries.

5. Social and Cultural Factors

o Age: Older adults may have more difficulty adapting to new technologies compared to
younger generations.

o Cultural Attitudes: Attitudes towards technology can influence adoption and usage
patterns.

Consequences of the Digital Divide

• Economic Inequality: Limited access to digital resources can hinder job opportunities, economic
growth, and overall social mobility.

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 21


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

• Educational Disadvantages: Students without access to technology may fall behind in their studies
and miss out on critical learning opportunities.

• Social Isolation: Individuals without internet access may feel disconnected from social networks,
information, and services.

• Limited Civic Engagement: Access to information about civic rights and responsibilities is often
mediated by technology, affecting participation in democratic processes.

Bridging the Digital Divide

1. Infrastructure Development

o Investment in telecommunications infrastructure to expand internet access in


underserved areas.

o Public-private partnerships to improve connectivity and service delivery.

2. Affordability Initiatives

o Programs to subsidize internet access and technology for low-income households.

o Development of low-cost devices and service plans.

3. Education and Training

o Programs to enhance digital literacy, particularly for older adults and disadvantaged
groups.

o Integration of technology education into school curricula to prepare students for a digital
world.

4. Community Engagement

o Local initiatives to provide access to technology in community centers, libraries, and


schools.

o Collaboration with non-profits and community organizations to raise awareness and


provide resources.

5. Policy and Advocacy

o Support for policies that promote equitable access to technology and the internet.

o Advocacy for universal internet access as a fundamental right.

Conclusion

Addressing the digital divide is essential for fostering equality and ensuring that all individuals can
participate fully in the digital age. By focusing on access, affordability, education, and community
engagement, stakeholders can work towards bridging this critical gap and promoting inclusivity.

Social Responsibilities in Information Technology


BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 22


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

Social responsibilities in the field of information technology (IT) encompass the ethical obligations that
individuals and organizations have towards society. These responsibilities reflect how technology impacts
various aspects of life, including privacy, security, accessibility, and the environment.

Key Areas of Social Responsibility

1. Data Privacy and Protection

o User Consent: Ensure that users are informed and give explicit consent before their data
is collected or processed.

o Data Security: Implement robust measures to protect personal data from breaches and
unauthorized access.

o Transparency: Clearly communicate data practices and policies to users.

2. Cybersecurity

o Protection of Information: Safeguard sensitive information from cyber threats and


attacks.

o Incident Response: Have plans in place to respond to data breaches and security incidents
effectively.

o Education: Provide training for employees and users on best practices for cybersecurity to
reduce risks.

3. Digital Accessibility

o Inclusivity: Design technology and digital content that is accessible to all users, including
those with disabilities.

o Standards Compliance: Follow established guidelines (e.g., WCAG) to ensure that


websites and applications are usable by everyone.

4. Ethical Use of Technology

o AI and Automation: Ensure that AI systems are designed to be fair and unbiased, avoiding
discrimination in decision-making processes.

o Responsible Innovation: Consider the ethical implications of new technologies and how
they affect society.

5. Environmental Responsibility

o Sustainable Practices: Adopt eco-friendly practices in the development and disposal of


technology (e.g., e-waste recycling).

o Energy Efficiency: Develop energy-efficient software and hardware to minimize


environmental impact.

6. Community Engagement
BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 23


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

o Local Support: Contribute to local communities through initiatives that provide


technology access, training, and resources.

o Volunteerism: Encourage employees to engage in volunteer activities that leverage their


IT skills for social good.

7. Intellectual Property Respect

o Copyright Compliance: Respect copyright laws and avoid the unauthorized use of
software and digital content.

o Open Source Contributions: Support and contribute to open-source projects that benefit
the community.

8. Economic Impact

o Job Creation: Contribute to local economies by creating jobs and providing training
opportunities in technology fields.

o Fair Labor Practices: Ensure fair treatment of employees and promote diversity and
inclusion within the workforce.

Personal Conduct in Information Technology

Personal conduct refers to the ethical behavior and professional standards that individuals in the
information technology (IT) field are expected to uphold. Maintaining high personal conduct is crucial for
fostering trust, integrity, and professionalism in the industry.

Key Principles of Personal Conduct

1. Integrity

o Honesty: Be truthful in all professional interactions, including communications with


colleagues, clients, and stakeholders.

o Accountability: Take responsibility for your actions and their consequences, both positive
and negative.

2. Respect

o Colleagues and Clients: Treat everyone with respect, regardless of their background, role,
or perspective.

o Diversity and Inclusion: Promote an inclusive environment that values diverse viewpoints
and experiences.

3. Professionalism

o Work Ethic: Demonstrate dedication and commitment to your work, meeting deadlines
and delivering quality results.

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 24


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

o Continuous Learning: Stay current with industry trends, tools, and best practices through
ongoing education and training.

4. Confidentiality

o Data Protection: Respect the confidentiality of sensitive information, including client data,
proprietary software, and internal communications.

o Non-Disclosure: Adhere to non-disclosure agreements and avoid sharing confidential


information without permission.

5. Compliance

o Legal and Ethical Standards: Follow all relevant laws, regulations, and professional codes
of conduct applicable to your work.

o Intellectual Property Rights: Respect copyright, trademarks, and patents, avoiding


unauthorized use of others' work.

6. Responsible Use of Technology

o Ethical Decision-Making: Consider the ethical implications of technology solutions and


their impact on users and society.

o Cybersecurity Awareness: Prioritize cybersecurity best practices in your work to protect


data and systems from threats.

7. Communication

o Clarity and Transparency: Communicate clearly and transparently with colleagues and
clients, ensuring that information is accessible and understandable.

o Constructive Feedback: Provide and accept feedback in a constructive manner, fostering


a culture of improvement.

8. Community Engagement

o Social Responsibility: Engage in initiatives that support community development,


technology access, and education.

o Volunteering: Use your skills to contribute to non-profit organizations or community


projects that leverage technology for social good.

Conclusion

Upholding high standards of personal conduct in the IT field is essential for fostering a positive work
environment and maintaining the integrity of the profession. By embodying principles of integrity, respect,
professionalism, and ethical behavior, IT professionals can contribute to a culture of trust and
accountability, benefiting both their organizations and society as a whole.

The ten common ethical behaviour for computer professionals:

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 25


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

o Personal integrity/claim of competence


o Personal responsibility for work
o Responsibility to employer/client
o Responsibility to profession
o Confidentiality of information
o Conflict of interest
o Dignity/worth of people
o Public safety, health, and welfare
o Participation in professional societies
o .Increasing public knowledge about

Philosophical Ethics

• 2. One ought to right the wrongs that one has inflicted on others (reparation)
• One ought to distribute goods justly (justice)
• One ought to improve the lot of others with respect to virtue, intelligence, and happiness
• (beneficence)
• One ought to improve oneself with respect to virtue and intelligence (self-improvement)
• One ought to exhibit gratitude when appropriate (gratitude)
• One ought to avoid injury to others (non- injury)

Rights-based Ethics (Contractarianism)

Focuses on moral principle instead of consequences. A right can be defined as entitlement to something.
In the

field of Information Technology, Ernest Kallman identified three specific rights:

o The right to know


o The right to privacy
o The right to property

Additional Principles

In addition to the normative principles given above, an individual can make a rational appeal to The Ten

Commandments of Computer Ethics has advocated by Arlene Rinaldi's Netiquette Webpage:

o Thou shalt not use a computer to harm other people


o Thou shalt not interfere with other people's computer work
o Thou shalt not snoop around in other people's computer files
o Thou shalt not use a computer to steal
o Thou shalt not use a computer to bear false witness
o Thou shalt not copy or use proprietary software for which you have not paid for
o Thou shalt not use other people's computer resources without authorisation or proper
compensation
o Thou shalt not appropriate other people's intellectual output

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 26


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

o Thou shalt think about the social consequences of the program you are writing or the
system you are designing
o Thou shalt always use a computer in ways that insure consideration and respect for your
fellow human being To be ethical, an action should elicit a positive response to all
applicable primary questions and a negative response to each clarification:

• Is it honourable? Is there anyone from whom you would like to hide the action?

• Is it honest? Does it violate any agreement, actual or implied, or otherwise betray a trust?

• Does it avoid the possibility of a conflict of interest? Are there other considerations that might

bias your judgement?

• Is it within your area of competence? Is it possible that your best effort will not be adequate?

• Is it fair? Is it detrimental to the legitimate interests of others?

• Is it considerate? Will it violate confidentiality or privacy, or otherwise harm anyone or anything?

• Is it conservative? Does it unnecessarily squander time or other valuable resources?

and consensus of many members. The code itself has several roles:

• Serve the interests of the Public.

• Protects the Public.

• Promotes worthy practices.

• Statement of shared commitment of members of the profession.

• Statement of agreed values.

• Statement of agreed rules.

• Sensitises members to important issues.

• Mechanism for educating for those entering the profession, companies and clients.

The code also ensures collective responsibility, so that various parties do not only think of individuals in
the

profession but rather a collective unit of the profession. If a profession speaks out on an issue, it is more
effective

as a group. Examples of this are issues such as protection of whistle blowers and gender bias.

Professional Ethics in Information Technology

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 27


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

Professional ethics in information technology (IT) refer to the moral principles and standards that guide
the behavior of individuals and organizations in the field. These ethics are crucial for maintaining trust,
integrity, and accountability in a rapidly evolving technological landscape.

Key Principles of Professional Ethics

1. Integrity

o Honesty: IT professionals should be truthful in their communications and representations.

o Transparency: Maintain openness about capabilities, limitations, and potential conflicts


ter
of interest. ver
on
2. Confidentiality ocC
talD
f To
o Data Protection: Respect and protect the confidentiality y o of sensitive information,
c op
including client data and proprietary information. ion
t
v alua
o Non-Disclosure: Adhere to agreements that eprevent unauthorized sharing of confidential
f r ee
information. e
by th
d
3. Competence
d uce
Pro
o Skill Development: Continuously update skills and knowledge to stay current with
technological advancements and industry best practices.

o Quality of Work: Deliver work that meets established standards and fulfills client needs.

4. Respect for Intellectual Property

o Copyright and Licensing: Acknowledge and respect copyright laws, licensing agreements,
and intellectual property rights.

o Attribution: Properly attribute the works of others when using or referencing their ideas
or creations.

5. Professionalism

o Ethical Conduct: Exhibit behavior that reflects well on the profession, avoiding actions
that could damage its reputation.

o Accountability: Take responsibility for one’s actions and decisions, both personally and on
behalf of the organization.

6. Fairness and Equity

o Non-Discrimination: Treat all individuals fairly, without discrimination based on race,


gender, age, or other characteristics.

o Inclusivity: Promote diversity and inclusion in the workplace and the technology
developed.

7. Social Responsibility
BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 28


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

o Community Engagement: Use technology to benefit society, addressing social issues and
improving quality of life.

o Environmental Sustainability: Consider the environmental impact of technology solutions


and strive for sustainable practices.

8. Compliance with Laws and Regulations

o Legal Adherence: Follow all relevant laws, regulations, and organizational policies
governing technology use and data management.

o Ethical Decision-Making: Make decisions that align with ethical standards, even when
there is no legal obligation.

Importance of Professional Ethics

• Trust Building: Adhering to ethical standards fosters trust between IT professionals, clients, and
the public.

• Reputation Maintenance: Upholding ethical conduct enhances the reputation of the individual
and the organization.

• Risk Mitigation: Ethical practices reduce the risk of legal issues, data breaches, and other negative
consequences.

• Guidance in Dilemmas: A strong ethical framework provides guidance in complex situations where
the right course of action may not be clear.

Conclusion

Professional ethics play a vital role in shaping the behavior and decisions of individuals in the IT field. By
adhering to ethical principles, IT professionals can contribute to a positive and responsible technological
environment, benefiting both their organizations and society as a whole. Emphasizing integrity,
confidentiality, competence, and social responsibility is essential for maintaining the trust and respect
necessary for the profession's success.

Many groups wish to be considered professional. To achieve this status the group needs to bee organised

into a formal unit. They must also demonstrate a domain of activity and that if the group has control over
this domain that it will be safer and more effectively run. The group must convince the public that lay
people can not adequately judge the group and that only the group themselves are capable of judging
themselves. Usually, professional monopolies are granted on conditions that they must regulate
themselves and that they must further the interests of the public.

This means that a professional group must:

• Convince the public of their special knowledge.


• Show that important social functions are at stake.

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 29


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

• Convince the public to trust the group (usually by means of code of Ethics) For success the group
needs:
• Formal organisation to gives the group monopoly
• Collective autonomy in order to justify individual autonomy for members
• Self regulation

Employer - Employee Relationships

This often involved the conditions of employments. This can be explicit in the contracts (concerns

responsibilities and salary) but many important issues are left out (overtime). Some are specified by laws
such as sick and annual leaves, while some are negotiated by unions such as retrenchment rules.

Moral foundation for this relationship:

• Is contractual

• Individuals should be treated with respects and not merely as a means.

• Neither party should take advantage of the other. Employee should be honest with their qualification
and employer should not exploit employee (decent wage, safe environment, etc.) Another important issue
is what does the employee owe?

• Loyalty – can invite some unfairness (boss’s son) or loss of criticality (just agree with boss)

• Trade secrets/knowledge in a field. There are many means of dealing with this, by making sure that:
Employee can only sell specific knowledge – but this is considered wrong, Employees sign contract not to
reveal secrets gain during employment as part of the job, Employees sign contract not to work in similar
area for a certain period after leaving the company.

Client – Professional Relationships

Recall Carl and his safety concern. His company should have told the military that the project was late. In
this respect, his company was not acting well. Additionally, Carl tried to work through his company but
failed. The client (the military) depends on professional for the knowledge and expertise in the special
area.

There are different models for this kind of relationships:

• Agency: Professional is the agent and does exactly what client tells him to do (like telling

a stockbroker to buy “Telkom”).

• Paternalistic: Professional makes all the decisions and the client abrogates all decision making.

• Fiduciary: Both parties play a role by working together. The professional offers options while

the client decides which one to take. This requires trust on both sides and that the decision

process is shared.
BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 30


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

Society – Professional Relationship

This relationship is usually shaped by law, but the law (or people who makes them) can not foresee

everything - consider Carl’s case. If Society licenses a professional society then the professional society:

• Must serve the interests of Society in general.


• Certainly, must not harm Society.
• Professional Ethics, must maintain itself.
• Must take DUE CARE based on the special knowledge it processes.

Professional – Professional Relationships

Many believe that this relationship is self-serving. They see members as only having an obligation to other

members. This might create a reluctance to criticize another professional. Often such scenarios are
complex, especially when it is difficult to tell if it’s a genuine errors or incompetence.

For a professional society to flourish there must also be advantages to Society from it:

• Members must consider what they owe to each other to maintain standards of conduct.
• There is a need for disciplinary hearing procedure.
• Members have important obligation such as much not take bribes, not lie about qualifications or
fudge the results.

Conflicting Responsibilities

For a professional, there exist many conflicts between the four types of relationships that they take part
in. This is most common between the responsibilities with employer and society. Consider the Carl’s case
again – the company needs contracts to survive but Carl’s concern is his responsibilities to society. So when
does a professional ‘rock the boat’ when it comes to society versus other relationships? There is no easy
answer but generally:

• Professional must be convinced of their position.


• Must consult managers at different levels of their company first.
• If they whistle blow, they must be prepared to lose their jobs.

Another issue is fragmentation. Where as medical profession sees the entire problem, computing
professionals often sees a small part of the system and as such it can be very difficult to pass judgement.
and consensus of many members.

The code itself has several roles:

• Serve the interests of the Public.


• Protects the Public.
• Promotes worthy practices.
• Statement of shared commitment of members of the profession.
• Statement of agreed values.
• Statement of agreed rules.
BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 31


ETHIC IN ICT MELLINIUIM INSTITUTE OF SCIENCE AND MANAGEMENT STUDIES

• Sensitizes members to important issues.


• Mechanism for educating for those entering the profession, companies and clients.

The code also ensures collective responsibility, so that various parties do not only think of individuals in
the profession but rather a collective unit of the profession. If a profession speaks out on an issue, it is
more effective as a group. Examples of this are issues such as protection of whistle blowers and gender
bias.

REFERENCE

• [Link]
technology#:~:text=Ethics%20and%20security%20in%20information%20technology%201%20Th
e,ethics%20in%20the%20age%20of%20advanced%20technologies%20
• [Link]
technologies/?utm_campaign=Search%20%7C%20DSA%20%7C%20All&msclkid=c4b664eeb10c1
1204d3703e5cf68aaf3&utm_source=bing&utm_medium=cpc&utm_term=bokus&utm_content=
DSA%20-%20All

1. Luppicini, Rocci (2010). Technoethics and the Evolving Knowledge Society: Ethical Issues in
Technological Design, Research, Development, and Innovation. Advances in Information Security,
Privacy, and Ethics. IGI Global. doi:10.4018/978-1-60566-952-6. ISBN 978-1-60566-952-6.

2. ^ Bunge, Mario; The Hegeler Institute (1977). Sugden, Sherwood J. B. (ed.). "Towards a
Technoethics". Monist (in German). 60 (1): 96–107. doi:10.5840/monist197760134. ISSN 0026-
9662.

3. ^ Luppicini, Rocci; Adell, Rebecca, eds. (2009). Handbook of Research on Technoethics. IGI
Global. doi:10.4018/978-1-60566-022-6.ch001. ISBN 978-1-60566-022-6.

4. ^ Winner, Langdon (1980). "Do Artifacts Have Politics?". Daedalus. 109 (1): 121–136. ISSN 0011-
5266. JSTOR 20024652.

5. ^ Luppicini, Rocci; Adell, Rebecca, eds. (2009). Handbook of Research on Technoethics. IGI
Global. doi:10.4018/978-1-60566-022-6.ch014. ISBN 978-1-60566-022-6.

6. ^ Jump up to:a b c d e f g h i j k l m n o Luppicini, R. (2008). The emerging field of Technoethics. In R.


Luppicini and R. Adell (eds.). Handbook of Research on Technoethics. Hershey: Idea Group Publishing

7. ^ Moor, James H. (2005). "Why We Need Better Ethics for Emerging Technologies". Ethics and
Information Technology. 7 (3): 111–119. doi:10.1007/s10676-006-0008-0. ISSN 1388-
1957. S2CID 27160198.

8. ^ Jump up to:a b Kranzberg, Melvin (1986). "Technology and History: "Kranzberg's


Laws"". Technology and Culture. 27 (3): 544–
560. doi:10.2307/3105385. JSTOR 3105385. S2CID 111941661.

BY OCHIRA PAUL JOHN, TEL:0923663994 EMAIL OCHIRAPAUL@[Link]

OCHIRA PAUL JOHN 32


REVISION AND SUMMARY QUIZZ

1. computer related morals, principals, and values.


a) Computer Abuse
b) Computer Ethics
c) Intellectual Property
d) Copyright
2. The term used to describe when a person does not have legal rights to copy someone else's
work is called?
a) Privacy Invasion
b) Copyright
c) Intellectual Property
d) Trolling
3. Any so�ware that covertly gathers user informa�on through the user's internet connec�on
without his or her knowledge: usually for adver�sing purposes.
a) Trojan Horse
b) Free Ware
c) Computer Cookie
d) Spyware
4. Is a small text file which contains an ID tag, placed on computer by a website. The website saves
a complementary file with a matching ID tag.
a) Spyware
b) Computer Worm
c) Computer Cookie
d) Computer Bomb
5. A form of so�ware that collects informa�on about the user in order to display adver�sements in
the browser based on the informa�on it collects from the user's browsing paterns.
a) Adware
b) Free ware
c) Share ware
d) Public domain So�ware
6. This is misusing computer equipment to inten�onally damage it.
a) Computer bomb
b) Computer Virus
c) An� Virus Program
d) Computer Abuse
7. This is the unwanted and illegal copying and use of so�ware.
a) Commercial So�ware
b) Public domain so�ware
c) So�ware Policy
d) Site License
8. This is someone who uses a computer to gain illegal access to other computer systems, and files,
usually through the use of telecommunica�ons
a) Site license
b) Trojan Horse
c) Spyware
d) Computer Hacker
9. This is a program that automa�cally checks each disk as it is inserted into the disk drive and
scans all data from telecommunica�on devices to locate and give warning of nay virus that may
be likely to enter a computer.
a) An� Virus Program
b) Computer bomb
c) Computer worm
d) Trojan Horse
10. These are ideas put into ac�on, such as wri�ng, music, art, computer code, and inven�ons that
can be protected under copyright or patent laws.
a) Intellectual Property
b) Copy Protect
c) Share Ware
d) Public Domain So�ware
11. Grants the user the right to make a specified number of copies of a so�ware program for the use
on mul�ple computers.
a) Share Ware
b) Public Domain So�ware
c) Commercial So�ware
d) Site License
12. This is to protect so�ware against unwanted or illegal duplica�on by wri�ng computer code
within the programs that prevents simple copying.
a) Intellectual Property
b) Share Ware
c) Copy Protect
d) Trojan Horse
13. This is a program used to search for viruses that may be established on a hard drive. (Doesn't
automa�cally search)
a) Virus Disinfectant Program
b) Free Ware
c) Computer Worm
d) Spyware
14. This is a destruc�ve code that gains access to a computer disguised as something such as a
desirable so�ware program. Once inside the computer, it can do damage but it cannot spread
from disk to disk or computer to computer.
a) Computer worm
b) Adware
c) Trojan Horse
d) Computer Bomb
15. This is a destruc�ve code that bores it way through a computer's files. It can move from
computer to computer, dropping off segments of itself as it goes.
a) Trojan Horse
b) Computer Worm
c) Spyware
d) Computer Virus
16. This is copyrighted so�ware that is distributed free of charge on a trial basis. A normal fee is
charged if the user decides to keep it.
a) Share Ware
b) Site License
c) Adware
d) Free Ware
17. This is a program that contains destruc�ve code with copies itself onto other computer files.
a) Computer Bomb
b) Computer Virus
c) Spyware
d) Computer Cookie
18. This is destruc�ve code that is set to ac�vate at a certain �me or when a specific ac�on is taken.
a) Spyware
b) Adware
c) Computer Bomb
d) Computer Virus
19. This is copyrighted so�ware that is given away free of charge but is s�ll the property of the
owner and the user doesn't have the right to distribute copies, just the owner.
a) Free Ware
b) Adware
c) Share Ware
d) Public Domain So�ware
20. This is copyrighted so�ware that is distributed free of charge on a trial basis. A normal fee is
charged if the user decides to keep it.
a) Public Domain So�ware
b) Commercial So�ware
c) Share Ware
d) So�ware Piracy
21. This is so�ware, donated for public use that can be freely copied and distributed.
a) Share Ware
b) Commercial So�ware
c) Copyright
d) Public Domain So�ware

22. This is copyrighted so�ware available for purchase.


a) Site License
b) Commercial So�ware
c) Share Ware
d) Adware
23. What is another word for ethics?
a) Loyal
b) Character
c) Values
d) Honesty
24. Aiming abusive and insul�ng messages at another person online is called...
a) Targe�ng
b) Flaming
c) Spewing
d) Arguing
25. Using a source without giving credit to the original author is known as...
a) Plagiarism
b) Chea�ng
c) Copying/Pas�ng
d) Paraphrasing
26. When did the Computer Ethics Ins�tute publish a code of ethics for computer users?
a) 1995
b) 1999
c) 1988
d) 1998

27. Which of the following is a ques�on you should ask yourself before you make a move to do
something ques�onable?
a) How would you feel if your behavior made front-page news?
b) How would you feel if your parents found out?
c) How would you feel about this next week?
d) How would you feel if your behavior was different?

28. Which of the following is NOT one of the Ten Commandments of Computer Ethics?
a) Thou shalt not use or copy so�ware for which you have not paid.
b) Thou shalt think about the social consequences of the program you write.
c) Thou shalt not interfere with other people's computer work.
d) Thou shalt not use a computer to do something fun.

29. E�quete on the Internet is known as...


a) In�quete
b) Ne�quete
c) E�quete
d) Webiquete
30. Is copying facts such as phone number, addresses, and names considered plagiarism?
a) Yes
b) No
Select and answer only one ques�ons from this sec�on (40mks)

1. a. Define the term ethic in technology (5mks)


• Computer ethics
• ethic
• unethical
• Cyberbullying
• Copyright
b. Outline five (5) major ethical issues faced by Informa�on Technology (IT) (5mks)
c. Explain the five (5) types of technology ethics that you know (5mks)
d. Ethical challenges arise in many different situa�ons, iden�fy and explain the most common
ethical challenges in our different situa�on (5mks)
e. Explain the Ten commandments of computer ethics of ethic that you may know (10mks)
f. Iden�fy and explain the five (5) general steps to protect our system from risks (5mks)
g. Iden�fy and explain the five (5) Unethical compu�ng prac�ces (5mks)

2. a. Define the following in ethical situa�on (5mks)


• Spyware
• Malware
• Virus
• Worms:
• Trojan horse:
b. Outline men�ons, five (5) how to protect yourself from cyberbullying (5mks)
c. Iden�fy and outline (5) rules or Principles of data privacy (5mks)
b. Explain the Key Components of Cybersecurity that you may know (5mks)
c. Explain (5) five Common Cyber Threats that you know (5mks)
d. Outline five (5) Best Prac�ces for Cybersecurity in technology world (5mks)
e. Explain the key Responsibili�es of Cybersecurity Professionals (5mks)
f. Importance of Intellectual Property in technology environment (5mks)

………………………………Good luck………………………….

You might also like