Ethics of Computer and Behavior in Ict - Essay Example

Ethics is a set of moral principles that govern the behavior of a group or Individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic contents privacy concerns, and how computers affect society. For example, while It Is easy to duplicate copyrighted electronic (or digital) content, computer ethics would suggest that it is wrong to do so without the author’s approval.

We Will Write A Custom Essay Sample On
ANY TOPIC SPECIFICALLY
FOR YOU

For Only $13.90/page


order now

And while it may be possible to access someone’s personal information on a computer system, computer ethics would advise that such an action Is unethical. As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have In areas such as artificial Intelligence and human communication. As the world of computers evolves, computer ethics continues to create ethical standards that address new issues raised by new technologies.

Ethical Behavior In CIT Remember a time when you are attending a solemn occasion and somebody cell phone suddenly rang? It must have caused a disturbance that made the cell phone owner want to be Invisible with embarrassment. What do you think that person should have done before he went there? While checking your checking your e-mail, you receive a new message from an acquaintance of yours. In any case, making him mad was the last thing on your mind. How would you respond to this kind of e-mail? There are correct ways to behave when dealing with CIT.

Knowing them will make using CIT devices a more enjoyable experience. How CIT Influences Human Values Our society is rapidly going through a technological revolution that futurists see many traditions and norms that we have grown used to. The levering force behind this ‘CT. CIT has such a strong hold and influence on us because of the integration of the computer and other associated devices into our lives. In the daily routing of a person, it’s rare that he/she does not encounter a device of some form that is used to deliver information.

Even the radio and television set fall under this category. As you may recall, convergence refers to the coming together of the different electronic communications media like the telephone, radio, Smartened, and television into one CIT devices. One of the most common convergence machines is the personal computer. You can also visit current events websites for the latest news. With the right hardware, you cam even use the computer to call abroad using a Voice over Internet Protocol (Poi). With Internet Relay Chat and Web-based messenger services like Yahoo!

Messenger or MS, you can “talk” to people in real-time even when they are half a world away. [pick] Students can spend hours entertaining themselves in Internet Cafes. Human beings are naturally social creatures. They gravitate to things or situations that allow them greater social connectivity. This is why some people take pains to write letters to penal and talk for hours over the telephone. With the computer and the Internet, they are able to take this to the next level by chatting compulsively, making friends with strangers they see in pictures but may never meet in person or joining online communities.

The tendency to disregard or belittle actual face-to-face interaction is another undesirable effect of ‘CT. One positive effect of CIT is that a person can conduct business and facilitate orientations with someone even without the need for them to meet in person. This way of working that does away with the presence of the person in an office is called Telecommuting. When a person telecommutes, this means he is only virtually present in the workplace and interacts with co-workers via the Internet using a video camera and speaker interface or by any electronic means.

Documents are sent to and from the office using fax machines or through the Internet. One-on-One meetings are possible with teleconferencing systems. Some people do not need to go to the office anymore because of the Internet. Proper Behavior When Using CIT As human values change because of CIT, so does human behavior. The simple using a cell phone in a public place might cause people to regard a person as a showoff. Undeniably, there are people who consciously flaunt their latest-mode cell phones by wearing them like necklaces. Portable CIT devices have become fashion statements or symbols of social stature.

This goes true for other CIT gadgets like MPH players and Pads (Portable Digital Assistant). But as CIT devices become more affordable, more people find it easier to own them, and thus, these have become staples of living. The commonness of CIT devices has led to the formulation of standards, or guidelines for proper behavior for people to follow. “Phonetics” advertisements are often aired on television to remind viewers that devices like cell phones can disrupt the silence of a common space, and that it should be used with discretion.

Examples of common spaces are places of worship, theaters, classrooms, and conference rooms. Proper behavior is important for the user of an CIT device; like when communication with a person, or when there is someone else present who may be affected by noise r light stereo system because they can’t hear themselves think? While CIT devices manage to bridge the gaps between people (created by differences in culture, traditions, ethnicity and religion), they can also create disputes because of their intrusion into the space of others.

You never know who may Just be offended. But there is a saying: “When in doubt, ask” The social and interpersonal issues surrounding the use of CIT devices, particularly of the computer linked to the Internet have resulted in the creation of the word “Netiquette. ” Netiquette is etiquette over the virtual world of the Internet. It is basic aspect when interacting with other people online. These rules were formulated as the Internet became more popular for communicating. Good observance of netiquette is important especially when e-mailing or chatting.

Typed words do not have intonations and other emotional cues that tell the reader what the typist is truly feeling. Words on the screen are sometimes misread or misunderstood by the person on the receiving end. Take for example, the statement: Mimi are such a stud! ” This sentence, when used in a typical conversation, can either make a male reader flattered or angry because “stud” can mean (among other things) Great Guy’ and “a male horse used for breeding purposes. ” When a person gets angry after reading your e-mail, you have technically flamed him. Flaming is the offense to a person because of an e-mail message.

The incidences of flaming are reduced when you choose your words and explain yourself carefully. The use of emoticons is very useful here. Emotions are little faces that you can make by using keystrokes which approximate faces that appear to smile, frown, or exhibit some other emotion. Using them lets your reader be aware of your emotional state, r of what your want him/her to believe your sentiment to be. [pick]Knowledge of netiquette can make e-mailing a more pleasurable experience. CIT has a great impact on human values because it gives people a choice on how to go about their daily routines.

Among the aspects of life that it influences are courtship, work, family, and traditions. The popular use of CIT devices and the Internet as tools of communication has made “netiquette” an essential part of modern life. While there are no specific laws regarding this, knowledge, and application of proper etiquette when communicating over the Internet helps in calculating social interaction in cyberspace. 1 . Thou shall not use a computer to harm other people’s computer work. 2. Thou shall not snoop around in other people’s computer work. 3. Thou shall not use a computer to harm other people. . Thou shall not use a computer to steal. 5. Thou shall not use a computer to bear false witness. 6. Thou shall not copy or use proprietary software for which you have not paid. 7. Thou shall not use other people’s computer resources without authorization or proper compensation. 8. Thou shall not appropriate other people’s intellectual output. 9. Thou shall think about the social consequences of the program you are writing or the system you are designing. 10. Thou shall always use a computer in ways that ensure consideration and respect for your fellow humans.

Questions: Why is it Important to Follow Computer Ethics? ; Prevents Misuse of Personal Information ; Prevents Theft of Intellectual Property ; Prevents Loss of Various Jobs in the field of Software Development ; Makes Your Computer a Better and Safe places to be at How computer ethics impact society? Society is increasingly finding itself in conflict because of the ethical dilemmas caused by technology. Computer ethics are a rapidly growing societal issue; a significant uncertainty is the impacts it has on the values of privacy and security.

The relationship that exists between privacy and security is a volatile one. In this age of digital tracking capabilities, many people across the globe are Concerned with the loss of privacy that occurs with each law passed and technical development. Others are more troubled with the need for heightened security in this time of escalating global hostilities and feel every technology should be implemented to preserve safety. Determining which value is of more importance is rather subjective depending on your personal values. What are some effects of CIT on Human Values? Erosion of Traditions ; Diversification ; Union of Home and Office ; Strengthening of Family Bonds ; Reduction of Pollution ; Do not use all-capital letters when e-mailing. Capital letters make it appear you are shouting and may “flame” the reader. ; Use emoticons when necessary. They make sure your emotions are conveyed so you will not be misunderstood. ; Keep messages short. People pay money for the time they spend online. They may not want to spend too much time reading a long message. ; Do not reveal secrets.

A message over the Internet may be stored and read by others. ; Avoid Spamming. Unsolicited e-mails or advertisements are bothersome and a waste of time when they have to be deleted one by one. They also congest servers. ; Use text abbreviations when needed. Abbreviations help shorten messages when e-mailing or chatting. They are useful when quick answers are needed. Does the computer ethic affect the Globalization? Computer ethics today is rapidly evolving into a broader and even more important lied, which might reasonably be called “global information ethics”.

Global networks like the Internet and especially the world-wide-web are connecting people all over the earth. Consider Just a few of the global issues: ; Global Laws ; Global Cyber business ; Global Educational Computer ethics, as presented here, is modeled on other professional ethics. It can use moral reasoning models that are similar to those in other professional ethics. The theory of computer ethics we have presented does not rule out the examination of critical concerns like the impact of technology on the nature of work or computer read.

The theory puts these concerns in other ethical categories. The former is a concern of sociology and the latter is a concern of property rights.