COPPERSTONE UNIVERSITY
STUDENT NAME: ISAAC SICHALWE
STUDENT ID: CU-BCS-102-7075
SCHOOL: MEDIA AND ICT
COURSE: COMPUTER ETHICS
PROGRAMME: BACHELOR IN COMPUTER SCIENCE
ASSIGNMENT: ONE
LECTURER: LLOYD AMON PHIRI
DUE DATE: 20/02/2023
Table of Contents
Introduction 3
Question One 4-5
Question Two 5-6
Question Three 7-8
Question Four 8-10
Question Five 10-12
Conclusion………………………………………………………………………………………13
Reference………………………………………………………………………………….…….14
2
INTRODUCTION
Computer ethics is a branch of applied ethics that studies the ethical, social, and legal issues
related to the use and development of information technology (IT) and computer technology. It
examines the moral values and principles that guide the behavior of individuals and
organizations in the computing domain, including the development, design, use, and
management of computer systems, software, and networks. As technology advances at a rapid
pace, ethical considerations become increasingly important in the development and use of
computer systems. With the rise of artificial intelligence (AI), big data, and the Internet of
Things (IoT), ethical issues such as privacy, security, responsibility, and accountability have
become more complex and more challenging to address. The use of these technologies can have
significant impacts on individuals, organizations, and society as a whole. Computer ethics seeks
to provide guidelines and principles that can help individuals and organizations make informed
decisions about the use and development of information technology. It aims to ensure that the
benefits of technology are maximized while minimizing the potential harms that can arise from
its use. It also seeks to promote ethical behavior among individuals and organizations involved in
the design, development, and use of computer systems. Computer ethics draws upon a wide
range of disciplines, including philosophy, law, social sciences, and computer science. It is an
interdisciplinary field that requires a nuanced understanding of the technical, social, and ethical
implications of IT and computer technology. As such, computer ethics plays an increasingly
critical role in shaping the way that technology is developed, used, and regulated, and will
continue to be a vital area of study for years to come.
3
Question One
1. Think about ethical issues that are involved in carrying out your job or day to day activity.
Focus on those tasks which are non-computing related. Are they any ethical guidelines for
doing your job or activity? How these ethical guidelines were developed over time, and are
how often changes are made to them? What are the trigger of these changes if any?
Ethics play an important role in every job and daily activity we undertake. Ethics are the
moral principles and values that guide our behavior and decision-making processes. As
professionals, we are expected to adhere to certain ethical guidelines that govern our
conduct in the workplace. This assignment will discuss the ethical issues involved in non-
computing job activities, explore the existing ethical guidelines, their development over
time, and changes that have been made to them.
Ethical Issues in Non-Computing Job Activities:
Non-computing job activities can present various ethical dilemmas. For instance,
healthcare professionals may face ethical issues such as confidentiality, informed consent,
and end-of-life care. In the legal profession, lawyers may face ethical issues such as
conflicts of interest and client confidentiality. Teachers may also face ethical issues such as
discrimination, academic integrity, and plagiarism.
Guidelines for Ethical Conduct in Job Activities:
There are different ethical guidelines for different professions. For instance, the American
Medical Association (AMA) has developed the Code of Medical Ethics that outlines
ethical standards for physicians. The American Bar Association (ABA) has developed the
Model Rules of Professional Conduct that provide ethical guidelines for lawyers. Similarly,
the National Education Association (NEA) has developed the Code of Ethics that outlines
ethical standards for teachers (Association N. E., 2021).
4
Development of Ethical Guidelines:
Ethical guidelines have developed over time in response to changing societal values,
technological advancements, and cultural norms. For instance, the AMA Code of Medical
Ethics has been updated several times to reflect changes in medical practices, such as the
use of telemedicine and the legalization of medical marijuana. Similarly, the ABA Model
Rules of Professional Conduct have been amended to address emerging ethical issues, such
as the use of social media by lawyers (Association, 2021).
Changes in Ethical Guidelines:
Changes in ethical guidelines are triggered by various factors, such as new laws and
regulations, advances in technology, and social and cultural changes. For instance, the
introduction of new medical technologies may raise new ethical questions, such as the use
of gene editing to prevent hereditary diseases. In response to such developments, ethical
guidelines may be revised or updated to provide guidance on the responsible use of such
technologies (Association A. B., 2021).
Question Two
2. Can you think of other factors that make the computer and IT environment different to a
more traditional noncompeting medium? As new technologies are introduced new factors are
arising every day. Think about relatively new technologies such as cellular communication or
satellite tracking devices? Have they cause new ethical questions? For each technology you
can think of, try to work out what it is about the technology that cause those ethical
questions?
The advancements in computer and IT environment have revolutionized the way we live
and work. These advancements have led to the creation of new technologies such as
cellular communication and satellite tracking devices, which have brought about new
ethical considerations. This paper explores the unique ethical considerations of emerging
technologies in the IT environment and how they differ from more traditional
noncompeting media.
5
Discussion:
One of the factors that make the computer and IT environment different from traditional
noncompeting media is the ability to collect and analyze large amounts of data quickly and
accurately. The use of big data analytics and machine learning algorithms raises concerns
about privacy, bias, and discrimination. As more data is collected, individuals’ private
information is at risk of being exposed. The use of machine learning algorithms can result
in biased decision making, which can lead to discrimination against certain groups of
people (Koene, 2018).
Another factor that makes the computer and IT environment different from traditional
noncompeting media is the ease of sharing information across the globe. The internet has
made it possible for individuals to access information from anywhere in the world, but it
has also made it easier for cyber criminals to steal personal information and commit fraud.
This has led to the need for stronger cybersecurity measures to protect sensitive
information (Safavi-Naini, 2019).
Relatively new technologies such as cellular communication and satellite tracking devices
have also brought about new ethical questions. Cellular communication has raised
concerns about the potential health risks associated with radiation exposure. The use of
satellite tracking devices has raised concerns about privacy, as individuals can be tracked
without their knowledge or consent (Gao, 2019).
In conclusion, the computer and IT environment differ from traditional noncompeting
media in several ways. The ability to collect and analyze large amounts of data quickly and
accurately, the ease of sharing information across the globe, and the introduction of new
technologies such as cellular communication and satellite tracking devices have brought
about new ethical considerations. As these emerging technologies continue to evolve, it is
important for individuals and organizations to consider the potential ethical implications
and take steps to mitigate any risks.
6
Question Three
3. Compare and contrast the different between a hacker breaking into a computer system and a
thief breaking in to a house. Is this a reasonable comparison? Is it a good analogy to employ
while considering the issue of hacking?
Computer hacking and housebreaking theft are two completely different types of crime.
Both involve unauthorized entry into a private property, but the methods used are different.
In this assignment, we will compare and contrast the differences between computer
hacking and housebreaking theft, and analyze whether it is a reasonable comparison and a
good analogy to use while considering the issue of hacking.
Body:
1. Methods of Entry:
Housebreaking theft involves physical entry into a building, such as a house, by breaking a
door or window. On the other hand, computer hacking involves breaking through software and
network security systems to gain unauthorized access to a computer system. This is usually
achieved by exploiting vulnerabilities in the system.
2. Intent:
The intent of a thief breaking into a house is typically to steal valuables such as cash, jewelry,
or electronics. However, the intent of a hacker breaking into a computer system can vary. It
could be to steal sensitive information, install malware or viruses, disrupt operations, or take
control of the system for their own purposes.
3. Risk and Consequence:
The risk and consequence of housebreaking theft are more direct and immediate, as the thief is
physically present in the property and could be caught red-handed by the homeowner or law
7
enforcement. The consequences of computer hacking can be far-reaching and long-lasting, as
the damage can be hidden and not immediately apparent. The compromised system could be
used to launch cyber-attacks or commit identity theft, resulting in significant financial losses
and reputational damage (Lian, 2012).
4. Legal Implications:
In most jurisdictions, housebreaking theft is a criminal offense punishable by law. Similarly,
computer hacking is also a criminal offense in most countries, and the laws related to computer
hacking are constantly evolving to address new forms of cybercrime. However, the laws
related to computer hacking are often more complex and varied, as they involve international
law, digital evidence, and the complexities of computer systems and networks (Stam, 2015).
While there are some similarities between housebreaking theft and computer hacking, the two
are fundamentally different crimes. Housebreaking theft involves physical entry and
immediate risk, while computer hacking involves exploiting vulnerabilities in software and
network systems. Comparing the two may be a useful analogy to illustrate the concept of
unauthorized entry, but it is important to recognize that computer hacking is a distinct type of
crime that requires a separate set of laws and regulations (Wall, 2008).
Question Four
4. Consider a scenario where a person walks down a street trying each door. If he founds and
unlocked door, he goes in and looks around. Is this situation analogous to a hacker scanning
ports on a computer and find an opened port and goes in a look around and take a few things?
However, also consider that in computer terms, some ports are considered public ports (for
example, port 80 where web pages are served from). For example, is it reasonable to assume
that if port 80 is available, the owner of the site gives you permission to access the site?
The proliferation of internet-connected devices has increased the incidence of hacking and
unauthorized access to systems. This phenomenon raises ethical and legal questions
regarding the boundaries of permissible behavior in accessing computer systems. This paper
explores the ethical and legal implications of uninvited access by drawing an analogy
8
between a person walking down the street trying each door and a hacker scanning ports on a
computer.
Analogies between scanning doors and ports:
In the physical world, walking down a street and trying each door to see if it is unlocked and
going in to look around is considered trespassing. Similarly, scanning ports on a computer to
find an open port and gain access to the system without authorization is considered hacking.
Both scenarios involve uninvited access to someone else's property.
However, there is a distinction to be made between public and private spaces. In the physical
world, some spaces are considered public, such as parks or government buildings, while
others are considered private, such as someone's home or a business. Similarly, in computer
terms, some ports are considered public, such as port 80 where web pages are served from,
while others are considered private, such as port 22 used for remote access.
Permission to access public ports:
In the physical world, if a door is unlocked, it does not necessarily mean that the owner of the
property has given permission to enter. Similarly, if a port is open, it does not necessarily
mean that the owner of the system has given permission to access it. However, in the case of
public ports, such as port 80, it is reasonable to assume that the owner of the site has given
permission to access the site.
Ethical and legal implications:
The unauthorized access to a computer system is considered a crime under the Computer
Fraud and Abuse Act (CFAA) in the United States. The law prohibits the intentional access
of a protected computer without authorization or exceeding authorized access. Unauthorized
access to a computer system can result in various consequences such as loss of data, loss of
business, and reputational damage.
9
The analogy between scanning doors and ports can help to understand the ethical and legal
implications of uninvited access to computer systems. While some ports are considered
public and can be accessed without permission, unauthorized access to a computer system is
generally considered illegal and can have serious consequences. It is essential to respect the
boundaries of permissible behavior when accessing computer systems and to obtain explicit
permission before accessing private spaces or ports (United States Congress. "18 U.S. Code §
1030 - Fraud and related activity in connection with computers." Legal Information Institute,
2018).
Question Five
5. How far can you take this argument? For example, if a wireless signal is available, could you
derived from that the owner gives you permission to access it? In some culture, a public
water well or tap, is considered to be freely available to all that come passed. Should publicly
accessible wireless signal then fall under the same category?
The emergence of wireless technology has made it easier for individuals to access the
internet and communicate with one another. The availability of wireless signals in public
spaces has led to a debate about whether accessing them without permission is ethical or
legal. This assignment explores the argument that if a wireless signal is available, the owner
gives permission to access it. It also considers whether publicly accessible wireless signals
should be treated similarly to public water wells or taps.
Argument:
The argument that the availability of a wireless signal implies permission to use it is not
universally accepted. Some argue that accessing a wireless signal without permission is a
violation of the owner's privacy and property rights. However, others contend that the mere
presence of a wireless signal in a public space suggests that the owner intends for it to be
used by those who require it (González-Hernández, J., & González-Fernández, D, 2019).
10
One possible basis for the argument that the availability of a wireless signal implies
permission to use it is the legal doctrine of "implied consent." This doctrine holds that
individuals may give consent to others by their actions, even if they do not explicitly do so in
writing or verbally (González-Hernández, J., & González-Fernández, D, 2019). For example,
if someone leaves their front door open, it may be considered an implicit invitation for others
to enter. Similarly, if someone leaves their wireless signal unsecured or broadcasts it in a
public space, it could be interpreted as an implicit invitation to access it.
The argument that publicly accessible wireless signals should be treated similarly to public
water wells or taps is also subject to debate. In some cultures, public water sources are
considered to be freely available to all who pass by, regardless of whether they contributed to
its construction or maintenance (Ben-Yehuda, 2016). This view is based on the belief that
access to water is a fundamental human right. Some proponents of this view argue that public
wireless signals should be treated similarly, as they provide access to information and
communication that is necessary for daily life.
Counterargument:
One counterargument to the idea that the availability of a wireless signal implies
permission to use it is that not all wireless signals are intended for public use. Some
wireless signals are intended only for the private use of the owner or authorized users
(González-Hernández, J., & González-Fernández, D, 2019). In these cases, accessing the
signal without permission could be considered a violation of privacy and property rights.
Additionally, some wireless signals may be intentionally left unsecured to entice users to
connect to them, only to be used for malicious purposes such as stealing personal
information.
The debate over whether the availability of a wireless signal implies permission to use it
and whether publicly accessible wireless signals should be treated similarly to public
water sources is a complex and nuanced issue. While the doctrine of implied consent and
11
the belief in the fundamental right to access information and communication may support
the idea that accessing publicly available wireless signals is permissible,
counterarguments about privacy and security concerns must also be considered.
Ultimately, the legality and ethics of accessing wireless signals without permission may
depend on the specific circumstances of each case.
12
CONCLUSION
In conclusion, computer ethics has become an increasingly important field as technology
continues to advance and become more integrated into our lives. It involves understanding the
ethical considerations related to the development, use, and impact of computer technology. One
of the key issues in computer ethics is the responsibility of developers and users to consider the
potential harm that their technology may cause. This includes issues such as data privacy,
security, and the potential for automation to lead to job displacement. Ethical considerations are
also important when it comes to the development of artificial intelligence, which has the
potential to greatly impact our society in both positive and negative ways. Another important
aspect of computer ethics is the need for transparency and accountability in the development and
use of technology. This includes issues such as the responsible use of algorithms, the ethical
considerations of data collection and analysis, and the need for open-source technology that can
be audited and improved by a community of experts. Overall, computer ethics plays an important
role in ensuring that technology is developed and used in a way that is responsible, ethical, and
serves the greater good. As technology continues to advance, it is important for individuals and
organizations to take a proactive approach to understanding and addressing the ethical
implications of their actions, and for society as a whole to continue to engage in critical
conversations about the role of technology in our lives.
13
REFERENCE
1. Association, A. B. (2021). Retrieved from Model rules of professional conduct:
https://www.americanbar.org/groups/professional_responsibility/publication
2. Association, A. M. (2021). Code of medical ethics. Retrieved from https://www.ama-
assn.org/delivering-care/ama-code-medical-ethic
3. Association, N. E. (2021). Retrieved from Code of ethics:
https://www.nea.org/home/30442.htm
4. Ben-Yehuda, H. (2016). The right to water in the Occupied Palestinian Territory.
Learning from theory, law and the Oslo negotiations. Water International, 855-871.
5. Gao, J. (2019). Satellite Surveillance and Privacy. Journal of Business Ethics, 983-996.
6. González-Hernández, J., & González-Fernández, D. (2019). Is the use of open Wi-Fi
signals legal? A study of the relationship between privacy and freedom., Telematics and
Informatics, 37, 133.
7. Koene, A. (2018). Privacy, Ethics, and Big Data Analytics: A Literature Review. 51(4),
1-38.
8. Lian, F. &. (2012). Internet and psychological aspects of victimhood. International
Journal of Cyber Criminology, 701-714.
9. Safavi-Naini, R. (2019). Cybersecurity: Ethics and Accountability in the Digital. Journal
of Business Ethics,, 159(2), 385-387.
10. Stam, K. R. (2015). Cybercrime and the laws governing the internet. John Marshall
Journal of Information Technology & Privacy Law, 467-486.
11. United States Congress. "18 U.S. Code § 1030 - Fraud and related activity in connection
with computers." Legal Information Institute, C. L. (2018). Retrieved from
https://www.law.cornell.edu/uscode/text/18/1030
12. Wall, D. S. (2008). Cybercrime. The transformation of crime in the information age.
Polity.
14