Internet Ethics Essay
Abstract: This paper takes a look at basic ethics in relation to the Internet. By tracing the development of the Internet, it identifies perils of the World Wide Web and their moral significance to a culture trying to move successfully into the twenty-first century.
As scientists travel into the future, they are lead by ambition, imagination, and genius. In their quest to find uses for their rapidly expanding knowledge they often leave behind their morals. Failing to carefully consider the possible paths their research will follow, scientist often find that they have gone too far with out realizing it. Their creations exceed their expectations. When faced with this situation it is up to the scientist to decide how to handle these powerful and unexpected new findings. Weighing the benefits against the dangers of the new possibilities, he must decide which outweighs the other. Publication and production of the new piece of technology could easily lead to even more advanced or dangerous findings down the line. It is up to scientists to take responsibility for their work and its results.
The ability to handle this responsibility involves the establishment of concrete ethical codes which a scientist can apply to his research. Ethics are moral standards on which people base their lives by using them in decision making. Because they will never be agreed on by all the members of a society, complicated arguments arise around all issues. In science they address ways in which the world should handle its discoveries. Each branch of science has followed a steady path of progression over its years of development. As it has lengthened with time, the paths have widened with information. This is the very definition of science and is only dangerous when the path takes a turn for the worst suddenly giving something seemingly innocent the potential to cause some sort of harm. This theory is entitled the "Slippery Slope". It is used to explain the downfall of certain fields of science and help their inventors know when to draw the line between good and bad science. An example illustrating this concept involves the Human Genome Project. When scientists discovered that they were able to read genetic codes recognizing an individual's traits and determining their disorders they were amazed. Their work and focus on the project led to their ability to alter these codes thus changing one's traits and disorders. The ethical question is whether this gene therapy should be allowed. At the top of the slope is the possibility of eliminating diseases such as cystic fibrosis while at the bottom of the slope lies the possibility of altering future humans. When examining who should have access to the results, parents planning a family sit at the top of the slope while insurance companies who would cancel the policies of sick patients rest at the bottom. Each aspect of the issue has it's ups and downs, benefits and repercussions which...
Loading: Checking Spelling0%
Internet Ethics: Issues that Push the Boundaries1371 words - 5 pages Internet Ethics: Issues that Push the Boundaries Ethics in a Virtual World While the internet has brought with it a vast amount of resources, business opportunities, artistic expressions and an endless number of new conveniences, it has not been without its share of criticisms. With the emergence of this virtually unsupervised world, has come the realization that "the internet knows no physical boundaries and also no moral or ethical...
The Ethics of Internet Filtering in China3677 words - 15 pages The Ethics of Internet Filtering in China The internet boom that began in the mid-1990s was popular because of the enormous possibility of endless free flowing information. It was built upon the engineering principle of “end-to-end neutrality, an engineering rule of thumb calling for smarts at edge of the network rather than in the middle”1 said Jonathan Zittrain, an associate professor at Harvard. However, web filtering by governments...
The Legality and Ethics of Internet Advertising1914 words - 8 pages The Legality and Ethics of Internet Advertising ABSTRACT: Recently, DoubleClick.com, one of the world’s premier Internet advertising firms was at the center of a Federal Trade Commission investigation on privacy. Consumer privacy advocates have charged the company with infringing on the privacy of websurfers because of the aggressive means it uses to gather data for profit. This paper discusses the legal and moral issues surrounding...
Internet Ethics and Copyrights1441 words - 6 pages Copyrights There are many things that are good about the Internet and one of them is how fast we can share information and where your information can be saved, either in the cloud or on a hard drives. In my survey, I found that exactly half of the people use cloud storage. There are also a growing number of places that you can get movies and music for free. “In 1999, Napster, then acting outside the law, made it possible for consumers to...
Business ethics and integrity844 words - 3 pages Ethical PaperBusiness ethics and integrity are becoming more effectively in the modern business world. However, both ethics and integrity are acted in the most important roles in the business world. For example, if you want to become successful businessman or you want to stand your high position in the business world, and then you must to fully understand...
Computer Ethics967 words - 4 pages One of the major concerns for business currently is Computer Ethics (CE) or information ethics. Computer Ethics is a new division of ethics growing and changing at a startling rate as technology evolves. The term "Computer Ethics" can be interpreted from different perspectives. For instance, as explained by Luciano Floridi,...
Issues of the Internet771 words - 3 pages As computers advance, society is coming together steadily through the rising use of the Internet. We interact with one another every day by using the Internet as a tool of communication. Through the evolution of the global electronic era, certain ethical, security, and productivity questions arise. As electronic communication becomes essential in the daily...
Development of a code of ethics: IT challenges1721 words - 7 pages The problem to be investigated is how information technology has changed the way society perceives ethics; how information technology can be used ethically, and how to develop a code of ethics to alleviate many ethical issues. Information Technology: Social Perceptions The internet is a relatively new phenomenon; society has not yet recognized the huge social impact that information technology has had and will have in the future. Within the...
Professional Values and Ethics1221 words - 5 pages Values and Ethics apply to both our personal and professional lives. Understanding and implementing values and ethics in everyday practices will promote ones success in personal as well as professional career. This paper will define, and identify at least three sources of professional values and ethics. It will also describe how professional values and ethics can affect career success.Value is listed in the
Current Ethical Issue1621 words - 6 pages An important part of the ethics of business is computer ethics (CE) or information ethics. According to Luciano Floridi the urgency of computer ethics has not yet been raised to the status of a philosophically respectable topic. Most philosophers view computer ethics as a "professional ethic" rather than a true ethics issue. The purpose of this paper will be to examine some of the legal issues of the Internet and the privacy of those who use...
HR Experiential Problem Solving957 words - 4 pages What legislative act prompted many U.S. companies to develop internal ethical policies and procedures? The Sarbanes-Oxley Act created new standards for the accountability of businesses and corporations and it includes penalties for acts of misconduct. The Act stipulates new financial reporting obligations, including the adherence to internal controls and procedures which are to certify the validity of their financial records. These accounting...
Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct. Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into three primary influences:
- The individual's own personal code.
- Any informal code of ethical conduct that exists in the work place.
- Exposure to formal codes of ethics.
The term computer ethics was first coined by Walter Maner, a professor at Bowling Green State University. The conceptual foundations of computer ethics are investigated by information ethics, a branch of philosophical ethics promoted, among others, by Luciano Floridi.
The concept of computer ethics originated in the 1940s with MIT professor Norbert Wiener, the American mathematician and philosopher. While working on anti-aircraft artillery during World War II, Wiener and his fellow engineers developed a system of communication between the part of a cannon that tracked a warplane, the part that performed calculations to estimate a trajectory, and the part responsible for firing. Wiener termed the science of such information feedback systems "cybernetics," and he discussed this new field with its related ethical concerns in his 1948 book, Cybernetics. In 1950, Wiener's second book, The Human Use of Human Beings, delved deeper into the ethical issues surrounding information technology and laid out the basic foundations of computer ethics.
A bit later during the same year the world's first computer crime was committed. A programmer was able to use a bit of computer code to stop his banking account from being flagged as overdrawn. However, there were no laws in place at that time to stop him, and as a result he was not charged.[unreliable source?] To make sure another person did not follow suit, an ethics code for computers was needed.
In 1973, the Association for Computing Machinery (ACM) adopted its first code of ethics.SRI International's Donn Parker, an author on computer crimes, led the committee that developed the code.
In 1976, medical teacher and researcher, Walter Maner noticed that ethical decisions are much harder to make when computers are added. He noticed a need for a different branch of ethics for when it came to dealing with computers. The term "computer ethics" was thus invented.
In the year 1976 Joseph Weizenbaum made his second significant addition to the field of computer ethics. He published a book titled Computer Power and Human Reason, which talked about how artificial intelligence is good for the world; however it should never be allowed to make the most important decisions as it does not have human qualities such as wisdom. By far the most important point he makes in the book is the distinction between choosing and deciding. He argued that deciding is a computational activity while making choices is not and thus the ability to make choices is what makes us humans.
At a later time during the same year Abbe Mowshowitz, a professor of Computer Science at the City College of New York, published an article titled "On approaches to the study of social issues in computing." This article identified and analyzed technical and non-technical biases in research on social issues present in computing.
During 1978, the Right to Financial Privacy Act was adopted by the United States Congress, drastically limiting the government's ability to search bank records.
During the same year Terrell Ward Bynum, the professor of Philosophy at Southern Connecticut State University as well as Director of the Research Center on Computing and Society there, developed the first ever curriculum for a university course on computer ethics. Bynum was also editor of the journal Metaphilosophy. In 1983 the journal held an essay contest on the topic of computer ethics and published the winning essays in its best-selling 1985 special issue, “Computers and Ethics.”
In 1984, the United States Congress passed the Small Business Computer Security and Education Act, which created a Small Business Administration advisory council to focus on computer security related to small businesses.
In 1985, James Moor, Professor of Philosophy at DartMouth College in New Hampshire, published an essay called "What is Computer Ethics?" In this essay Moor states the computer ethics includes the following: "(1) identification of computer-generated policy vacuums, (2) clarification of conceptual muddles, (3) formulation of policies for the use of computer technology, and (4) ethical justification of such policies."
During the same year, Deborah Johnson, Professor of Applied Ethics and Chair of the Department of Science, Technology, and Society in the School of Engineering and Applied Sciences of the University of Virginia, got the first major computer ethics textbook published. Johnson's textbook identified major issues for research in computer ethics for more than 10 years after publication of the first edition.
In 1988, Robert Hauptman, a librarian at St. Cloud University, came up with "information ethics," a term that was used to describe the storage, production, access and dissemination of information.[unreliable source?] Near the same time, the Computer Matching and Privacy Act was adopted and this act restricted United States government programs identifying debtors.
In the year 1992, ACM adopted a new set of ethical rules called "ACM code of Ethics and Professional Conduct" which consisted of 24 statements of personal responsibility.
Three years later, in 1995, Krystyna Górniak-Kocikowska, a Professor of Philosophy at Southern Connecticut State University, Coordinator of the Religious Studies Program, as well as a Senior Research Associate in the Research Center on Computing and Society, came up with the idea that computer ethics will eventually become a global ethical system and soon after, computer ethics would replace ethics altogether as it would become the standard ethics of the information age.
In 1999, Deborah Johnson revealed her view, which was quite contrary to Górniak-Kocikowska's belief, and stated that computer ethics will not evolve but rather be our old ethics with a slight twist.[unreliable source?]
Privacy is one of the major issues that has emerged since the internet has become part of many aspects of daily life. Internet users hand over personal information in order to sign up or register for services without realizing that they are potentially setting themselves up for invasions of privacy.[better source needed]
Another example of privacy issues, with concern to Google, is tracking searches. There is a feature within searching that allows Google to keep track of searches so that advertisements will match your search criteria, which in turn means using people as products.
Identifying ethical issues as they arise, as well as defining how to deal with them, has traditionally been problematic. In solving problems relating to ethical issues, Michael Davis proposed a unique problem-solving method. In Davis's model, the ethical problem is stated, facts are checked, and a list of options is generated by considering relevant factors relating to the problem. The actual action taken is influenced by specific ethical standards.
Various national and international professional societies and organizations have produced code of ethics documents to give basic behavioral guidelines to computing professionals and users. They include:
- Association for Computing Machinery
- ACM Code of Ethics and Professional Conduct
- Australian Computer Society
- ACS Code of Ethics
- ACS Code of Professional Conduct
- British Computer Society
- BCS Code of Conduct
- Code of Good Practice (retired May 2011)
- Computer Ethics Institute
- Ten Commandments of Computer Ethics marri
- IEEE Code of Ethics
- IEEE Code of Conduct
- League of Professional System Administrators
- The System Administrators' Code of Ethics
- Bynum, Terrell Ward (June 2000). "The foundation of computer ethics". ACM SIGCAS Computers and Society. 30 (2): 6–13. doi:10.1145/572230.572231. (subscription required)
- Floridi, Luciano (1999). "Information Ethics: On the Theoretical Foundations of Computer Ethics"(PDF). Ethics and Information Technology. 1 (1): 37–56. Archived from the original(PDF) on 9 November 2005.
- Floridi, Luciano; Sanders, J.W. (2002). "Computer Ethics: Mapping the Foundationalist Debate"(PDF). Ethics and Information Technology. 4 (1): 1–9.
- Haag, Stephen; Cummings, Maeve; McCubbrey, Donald J. (2003). Management Information Systems: For the Information Age (4th ed.). New York: McGraw-Hill. ISBN 978-0-07-281947-2.
- Johnson, Deborah G. (2001). Computer Ethics (3rd ed.). Upper Saddle River, NJ: Prentice Hall. ISBN 978-0-13-083699-1.
- Martin, C. Dianne; Weltz, Elaine Yale (June 1999). "From awareness to action: integrating ethics and social responsibility into the computer science curriculum". ACM SIGCAS Computers and Society. 29 (2): 6–14. doi:10.1145/382018.382028. (subscription required)
- MacKinnon, Barbara (2011). Ethics: Theory and Contemporary Issues (7th ed.). Belmont, CA: Wadsworth. ISBN 978-0-538-45283-0.
- Quinn, Michael J. (2011). Ethics for the Information Age (4th ed.). Boston, MA: Addison-Wesley. ISBN 978-0-13-213387-6.
- Moor, James H. (1985). "What is Computer Ethics?". In Bynum, Terrell Ward. Computers & Ethics. http://rccs.southernct.edu/what-is-computer-ethics/#what-is-computer-ethics: Blackwell. pp. 266–75. ISSN 0026-1068.
- Mowshowitz, Abbe (March 1981). "On approaches to the study of social issues in computing". Communications of the ACM. 24 (3): 146–155. doi:10.1145/358568.358592. (subscription required)
- Stamatellos, Giannis (2007). Computer Ethics: A Global Perspective. Jones and Bartlett. ISBN 978-0-7637-4084-9.
- Tavani, Herman T. (2004). Ethics & Technology: Ethical Issues in an Age of Information and Communication Technology. Hoboken, NJ: John Wiley and Sons. ISBN 978-0-471-24966-5.
- ^ abcdefghijBynum, Terrell Ward. "A Very Short History of Computer Ethics". Southern Connecticut Wein University. Archived from the original on 2008-04-18. Retrieved 2011-01-05.
- ^Pierce, Margaret Anne; Henry, John W. (April 1996). "Computer ethics: The role of personal, informal, and formal codes". Journal of Business Ethics. 15 (4): 425–437. doi:10.1007/BF00380363. (subscription required)
- ^Floridi, Luciano (2010), "Information Ethics", in Floridi, Luciano, The Cambridge Handbook of Information and Computer Ethics, Cambridge University Press, pp. 77–100, ISBN 9780521717724
- ^ abcdefgBynum, Terrell (21 December 2014). "Computer Ethics: Basic Concepts and Historical Overview". Stanford Encyclopedia of Philosophy. Center for the Study of Language and Information, Stanford University.
- ^ abc"A Brief History of Computer Ethics". Learning Computing History. 5 December 2004.
- ^"Alumni Hall of Fame: Donn Parker". SRI International. Retrieved 2013-06-13.
- ^"Obituary: Joseph Weizenbaum". The Tech. 128 (12) (Online ed.). Cambridge, MA: MIT News office. 14 March 2008. Retrieved 29 April 2015.
- ^"The Right to Financial Privacy Act". Electronic Privacy Information Center. Retrieved 29 April 2015.
- ^Small Business Computer Security and Education Act of 1984 at Congress.gov
- ^Computer Matching and Privacy Protection Act of 1988 at Congress.gov
- ^ ab"ACM Code of Ethics and Professional Conduct". ACM. 16 October 1992. Retrieved 2014-08-09.
- ^CSC300 Lecture Notes @ University of Toronto, 2011. For more information on this topic, please visit the Electronic Privacy Information Center website.
- ^ACS Code of Ethics(PDF), Australian Computer Society, 12 June 2012, archived from the original(PDF) on 14 May 2013
- ^Graham, Ruth, ed. (July 2012), ACS Code of Professional Conduct(PDF), Australian Computer Society, archived from the original(PDF) on 6 April 2014
- ^Code of Conduct for BCS Members(PDF), BCS, The Chartered Institute for IT, 8 June 2011
- ^"BCS Trustee Board agrees revised Code of Conduct". BCS, The Chartered Institute for IT. 3 May 2011.
- ^"7.8 IEEE Code of Ethics", IEEE Policies, Section 7 - Professional Activities, IEEE
- ^IEEE Code of Conduct(PDF), IEEE, June 2014
- ^"The System Administrators' Code of Ethics". League of Professional System Administrators. USENIX Association. 2006.