Tuesday, July 29, 2014

Netiquette IQ and Ethics - Beyond Netiquette 101

Critical to etiquette and Netiquette are ethics. The article below discusses some of the major areas where ethics can be violated. These discussions go far beyond Netiquette 101.
=============================================


Ethical Problems in Computing

Wednesday, July 25, 2012  
 Lou Berzai, CCP/CSP  www.aitp.org



Because of its constantly changing nature, the area of computer technology is one that is difficult to assign a specific set of moral codes, although it is necessary that ethics be considered when making decisions in this area. Computing creates a whole new set of ethical problems, unique unto itself. Such problems include:

"…the unauthorized use of hardware, the theft of software, disputed rights to products, the use of computers to commit fraud, the phenomenon of hacking and data theft, sabotage in the form of viruses, responsibility for the reliability of output, making false claims for computers, and the degradation of work.” (Forester 4)

These problems engender a whole new set of ethical questions, including:

  • "is copying software really a form of stealing”
  • "are so-called ‘victimless' crimes… more acceptable than crimes with human victims”
  • "does information on individuals stored in a computer constitute an intolerable invasion of privacy?” (Forester 4 – 5)

These questions demand that ethical principles be applied to their resolution because without the consideration of ethics, these gray areas can easily become completely black.

To begin with, it seems that there are four big areas of computer ethics. They are "(1) computer crime; (2) responsibility for computer failure; (3) protection of computer property, records, and software; and (4) privacy of the company, workers, and customers”. (De George 338) This part of our discussion will focus primarily on computer crime and privacy.

Computer Crime is intellectual, white-collar crime. Those that commit such crimes must be intelligent enough to manipulate a computer system and in such a position to access it in the first place. One example of computer crime is stealing funds via computer. Often the worst that can happen to such a thief is that he/she is merely required to return the stolen money. Many times that person will be fired, assuming he/she is an employee, but may be quickly hired by a competitor because of his/her skill. This creates practically no deterrent to committing computer theft because legal action is not often taken against the perpetrator.

Another example is unauthorized computer entry. In entering a computer unauthorized, the perpetrator can steal a company's trade secrets and data. Such a crime could be committed by an employee aiming to sell such secrets to a competitor or by an outside source wanting to steal such secrets to promote his/her own well-being. This crime involves both an invasion of property and privacy and also compromises the computer system itself.

This crime goes along with the idea of hacking. Hacking is defined as "any computer-related activity which is not sanctioned or approved of by an employer or owner of a system or network” (Forester 44). Such an activity deals with the ethical dilemma of who actually owns information and who should have access to that information. At many universities, Computer Science professors have their students hack into the university's system to prove their skill and knowledge of computer systems.

This poses a serious ethical dilemma. Since the students are not causing any harm to the system, is such an action morally reprehensible or acceptable? Many computer professionals feel that this act is not ethically sanctioned and the Computer Science professors must address the issue of computer ethics more fervently in their classes.

Another area of computer ethics regards privacy. The privacy issue focuses on the computer's most basic functions, "its capacity to store, organized, and exchange records”. (Johnson 58)  A great deal of the concern has to do with the amount of information gathering that is made possible by computers. This puts people's personal information in a vulnerable position. If someone hacks into a computer system, all this information is at his/her disposal. In this way, such crimes as identity theft can occur.

Furthermore, when stored information can be easily exchanged, the effect of a small error can be magnified. Such errors can stay in the system indefinitely. Computers "create the possibility that incidents in one's life or errors in one's records will follows one through life, profoundly affecting how one is perceived and treated”. (Johnson 60)  It is because of this effect that people lose control over their lives and the information about them.

Thus it seems that there are both good and bad consequences of computerized records. A good consequence is that an organization's need for information suggests "access to relevant information might improve decision making and, therefore, make organizations more efficient”. (Johnson 63) This in turn provides a positive result for the individual because it could mean better services or savings.

However, bad consequences still exist. These are related to the fact that "information is used to make decisions about individuals and such decisions may be based on irrelevant and inaccurate information."(Johnson 63) There is no way to insure that the power exercised by organizations because of this access to information is used fairly. Thus it seems that there should be a balance between the need for information on the part of an organization and the interests of the individual.

Another area of concern in conjunction with all of this has to do with the power computer professionals wield because of their knowledge of computer systems. Computer professionals can act in one of two ways: "(1) When it is unclear, assume information is in the public realm until there is some evidence that it is not; or (2) When it is unclear, assume information is private unless or until there is evidence that it is not”.  (Johnson 70)  It is desirable that a professional adopt the second rule because it allows the professional to protect him or herself from ethical indiscretions, while the first allow for a greater chance of ethical breach.

There are two main reasons for concern regarding this allocation of power to computer professionals. "First, increasing power in the hands of some often leads to exploitation of others, and this is an ethical matter. Second, certain kinds of power are necessary for a decent life, a moral life, and so this also may be an ethical matter”. (Johnson 73)  Computer professionals should have an obligation to use the information they have access to in a proper manner, but some chose to use this information immorally to the detriment of others.

The power of the computer professional also poses a threat because it is entirely centralized. As noted previously, computers allow for large amounts of information to be stored in one small space. Concern about this centralization arose because "people reasoned that in a democratic society there is a struggle between the government and the citizenry such that as government agencies become more and more powerful, citizen control and citizen input may become less and less effective”.  (Johnson74) Some people fear that if the government has too much control over information, their privacy will be compromised. Those who do not want to see computers in the hands of the government but rather in the hands of individuals, oppose the centralization of power.

This idea of the centralization of power coincides with the concept that technology contributes to feeling of alienation. Alienation has to do with loss of control in the world in which one lives. This is visible in the fact that because of increased technology advancements, computers have taken over jobs that once belonged to people.

An example of this is the concept of artificial intelligence (AI). This is an attempt by computer experts to simulate the components of human intelligence through machines. This engenders many ethical dilemmas, however, because it forces one to ask "not just whether AI itself is a possible goal, but whether AI is a proper goal of human endeavor”. (Forester 129)  It degrades the human condition to replace humans with intelligent machines, so is this really necessary? This ties in with the original dilemma about the power manifested in technology. It is of key importance that those who hold such power do not abuse it.

Computer technology brings about a whole new field of ethical dilemmas. From computer crime to privacy to the power of computer professionals, this technology has shifted the way the business world must think about ethical decisions. Yet this is difficult because there is no overarching positive ethical force in the American business community. Combined with the fact that technology changes so rapidly, it is hard to establish firm moral codes of conduct regarding computers and follow them strictly.
There are many gray areas for which to account. Many times people chose to blame the computers when they run into trouble. In reality, however, it is the people that make the mistakes because they are the ones that created the technology. People merely use computers as scapegoats to avoid responsibility. This is why it is of utmost significance to educate people about the power, and potential abuses, of computer technology. It is only in doing so that society will acquire a firm grasp of computer ethics and handle moral dilemmas regarding computing in an ethical and proper manner. 
===============================
In addition to this blog, I have authored the premiere book on Netiquette, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki


 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County New Jersey.

==========================================


No comments:

Post a Comment