StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

What Is Computer Ethics by James Moor - Article Example

Cite this document
Summary
The paper "What Is Computer Ethics by James Moor" cites the code of ethics of the Australian Computer Society that encompasses all Information and Communications Technology Professionals as its members. The code puts above all Public Interest,  Honesty, and Professionalism.
 …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
What Is Computer Ethics by James Moor
Read Text Preview

Extract of sample "What Is Computer Ethics by James Moor"

of the of the of the Ethics and ICT Albert Einstein is said to have quoted as follows: “It is not enough that you should understand about applied science in order that your work may increase man’s blessings. Concern for man himself and his fate must always form the chief interest of all technical endeavors.” (Einsstein, n.d.) Ethics is the basis of each and every human interaction. The emphasis upon ethics becomes even more important when it comes to the professional execution of everyday activities that involve Information and Communications Technology Professionals. Living in a technologically advanced and dominated world today there is no refuge from Technology based products and their effects. It is therefore incumbent that the survival be embedded with ethics as basis of establishment. James Moor commented on ethics in relation to information and computer technology in the following words: “Computer ethics is not a fixed set of rules which one shellacs and hangs on the wall. Nor is computer ethics the rote application of ethical principles to a value-free technology. Computer ethics requires us to think anew about the nature of computer technology and our values. Although computer ethics is a field between science and ethics and depends on them, it is also a discipline in its own right which provides both conceptualizations for understanding and policies for using computer technology.” (Moor, 1985) Professionals linked to the field of ICT thus need to ethically responsible for a number of things. The following study is an attempt to evaluate an ethical issue related to ICT and then further on extends into an evaluation using the DOING ANALYSIS TECHNIQUE. ETHICAL ISSUE HIGHLIGHTED: “MAINTAINING PRIVACY AND SAFETY OF STAKEHOLDERS” To evaluate this current ethical issue a recent (not more than four weeks old) article form the Brimbank Weekly Newspaper was evaluated. A summary of the core idea behind the article is represented as under: TITLE OF ARTICLE: “Practice the Web Safety you Teach” SUMMARY OF THE ARTICLE The article highlights that web safety and privacy of the stakeholders’ interests should be practiced the way it is preached. Summary of the issue: The basic ethical issue that has been highlighted in the article is that Web security is the right of every individual. Ethically it becomes the responsibility of every individual who is an Information and Communications Technology Professional to safeguard privacy and security of others’ interests. Any violation in doing so is not in line with the ethical boundaries to which every ICT related individual is bound. The article further proceeds as follows: The article highlights that schools often propagate the pictures and some personal information of their students without the permission of their parents. The personal information may involve the name of the child or the grade in which he studies etc. It emphasizes the fact that schools themselves do not permit students to put up their pictures in their school uniform on the internet so that the school’s image may not get associated in any inappropriate manner. On the contrary, however the school administrative itself does not practice the same for its students who should be their most valued assets. On the contrary, if the parents try to search their child’s name on any reputable on-line search engine like Google they are shocked to find repeated entries of the child’s name in various documents. This is without the acquisition of any permission from them. Entries for children even as small as 4-5 year old are found online without any prior intimation to the child’s parents or guardians.. Parents are concerned that the availability of even the slightest of information about their children over the web may prove to be hazardous for their safety and security. Sicne the information is associated with the school name and location the kids’ security becomes highly vulnerable. Another issue highlighted is that when school authorities are contacted for the resolution of this issue they laugh at the back of the parents and do not take the sanctity of the privacy of the children seriously. Considering maintenance of children’s privacy as a trivial issue they do not take any immediate steps if parents ask them not to put any information relevant to their child in a public posting without any prior permission from them. The article emphasizes that schools should make combined regulations according to which absolutely no personal information would be put online regarding the students studying in a school. Moreover, pictures should only be put online if the guardians’ permission is sought. The pictures can be tagged by student identity names or any other names instead of disclosing the real name or any other personal information. ANALYSIS OF THE ARTICLE WITH RESPECT TO THE DOING ETHICS TECHNIQUE What is going on? Web security and privacy of individuals is not being respected by professionals linked with ICT. What are the facts? The article highlights the following facts: By using student related information publically without the parent/guardian’s approval and by taking non seriously the request for maintenance of privacy made by the parents, What are the issues? The ICT personnel belonging to the schools are severely defying three of the ACS code of ethics that have been highlighted in the beginning. Who is affected? The stakeholders of the IT related organization get affected by the violation of ethics by ICT concerned personnel. As in the case of the referenced article the stakeholders are the students of the schools as well as their parents and the schools themselves too. What can be done about it? The Australian Computer Society (ACS) encompasses all Information and Communications Technology Professionals from all levels as its members. The society maintains a code of ethics for its members. The ICT professionals living in Australia are all members of this Computer Society. Being a member of this society, each individual is bound to adhere to all ethical implications concerning information and communications’ technology. Any violation from the code of ethics of the ACS should be checked and the responsible individuals should be accounted for in terms of either being fined or being suspended from their duties for limited periods of time. What options are there? The options present are that each and every individual should play his own integral role. The following code of ethics notified by the ACS should be strictly abided by every individual on his own basis: “1. The Primacy of the Public Interest You will place the interests of the public above those of personal, business or sectional interests. 2. Honesty You will be honest in your representation of skills, knowledge, services and products. 3. Professionalism You will enhance the integrity of the Society and the respect of its members for each other.” (ACS, 2011) Which option is best – and why? “Honest is the best policy” states the famous old quotation. Thus, Honesty is the best option. Any person who adheres to honesty both with his inner self stays the same with others too. Being honest automatically leads to the implementation of ethical norms by an individual may they be a part of his personal or professional lives. WORKS CITED: Moor, James. What Is Computer Ethics? Metaphilosophy. 16(4), 266–75. 1985. Web. 2011. Macgibson, Ainslie. Practice the web safety you teach. Brimbank Weekly. September 5, 2011. Web. October 6, 2011. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(What Is Computer Ethics by James Moor Article Example | Topics and Well Written Essays - 1000 words - 1, n.d.)
What Is Computer Ethics by James Moor Article Example | Topics and Well Written Essays - 1000 words - 1. https://studentshare.org/ethics/1581038-ethics
(What Is Computer Ethics by James Moor Article Example | Topics and Well Written Essays - 1000 Words - 1)
What Is Computer Ethics by James Moor Article Example | Topics and Well Written Essays - 1000 Words - 1. https://studentshare.org/ethics/1581038-ethics.
“What Is Computer Ethics by James Moor Article Example | Topics and Well Written Essays - 1000 Words - 1”. https://studentshare.org/ethics/1581038-ethics.
  • Cited: 0 times

CHECK THESE SAMPLES OF What Is Computer Ethics by James Moor

Different Arguments Suggesting Violent Computer Games are Morally Wrong

The paper "Different Arguments Suggesting Violent computer Games are Morally Wrong" discusses that the most repugnant aspect of these computer games especially in god games, surfaces when certain very fundamental religious beliefs are questioned and exploited in designing a gameplay.... 193) further reveals that in the game Grand Theft Auto: Vice City, the player has to engage in sex, and then he is made to kill the computer character in order to snatch the money back....
5 Pages (1250 words) Essay

Internet and Security

A paper "Internet and Security" claims that Thomas contradicts the hope that the destruction of the Berlin wall brought to the noble relations of countries (Friedman, 67).... On 9/11, there was terror and anguish.... Attacks pioneered by Osama bin Laden pain and muddle in the universe.... hellip; The security concern expressed by Thomas Friedman in his book, “The World is flat” is the threat of terrorist groups like Al-Qaida....
4 Pages (1000 words) Coursework

Philosophy: Cyber Ethics

Computer technology according to james moor is revolutionary due to the nature of the computer itself.... Thus computer's logic can be massaged and shaped in infinite ways Philosophy: Cyber ethics Computer technology according to james moor is revolutionary due to the nature of the computer itself.... james moor discusses the following three kinds of invisibility; first and foremost is the invisible abuse which is the intentional use of the invisible operations of a computer to engage in unethical conduct....
3 Pages (750 words) Article

The Importance of Privacy

However, in our world today, information is easily collected and leaked out as james moor terms it, information is “greased” (249).... In Towards a Theory of Privacy in the Information Age, moor discusses how personal information could be collected, saved and retrieved.... As the text has it, the computer age made it very easy for criminals around the world to endanger unsuspecting victims.... hellip; In fact, even the most vigilant individual can become a victim of unscrupulous computer geeks....
6 Pages (1500 words) Essay

Bad Impacts of Computers on People and Society

For example, usage of computers is relevant in academics and professional life as computercomputer usage has the benefit of connecting friends in spite of distance, increasing the efficiency of file storage and consequently work output and creating new learning platforms (Berleur, 2009).... In addition, excessive usage of computers results in development of health problems among the computer users.... Over the last few decades, the volume of computer usage has been increasing due to innovations and advancements in technology....
6 Pages (1500 words) Research Paper

Ethical Impacts of Computer Systems on Our Personal Lives

hellip; It gives the concerns that relate to the different ethical situations. computer ethics is a group of morals that regulate the users of computers and their The users of computers need to be aware of the ethical issues that are likely to arise from their use of the computers.... The paper therefore covers the ethical impacts of the computer systems on our personal lives.... The main ethical concerns from the use of computers include effects on privacy, effects of computer on the society and the issues concerning property rights....
5 Pages (1250 words) Essay

The Ethics Of Online Retailing

The paper "The ethics Of Online Retailing" discusses the ethical issues in web marketing.... he past two decades of computer technology application has triggered a flurry of academic research concerning the proper use and abuse of the new medium.... New technology brings with it new ways of making life better for the consumer....
7 Pages (1750 words) Research Paper

The Impact of Hacking in Todays Firms

The hackers have ethics which they follow.... Those who do not abide by the ethics tarnish the name of hackers giving them a bad reputation.... An attack of a computer system affects and interrupts the operating system.... hellip; This paper tells that hacking is frequently perceived as a form of computer crime.... Hacking entails amending features of a computer system to perform a different function that the computer was not intended for....
6 Pages (1500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us