Вы находитесь на странице: 1из 8

BSIT-64 (Computer Ethics & Cyber Laws)

Assignment TA (Compulsory)
1) Why is computer ethics defined? Explain its evolution. What is computer crime?
Explain different computer crimes.
Answer: - Computer ethics is the analysis of the nature and social impact of computer
technology and the formulation and justification of the policies for the ethical use of such
technology. Computer ethics examine the ethical issues surrounding computer usage and the
connection between ethics and technology. It includes consideration of both personal and social
policies for ethical use of computer technology. The goal is to understand the impact
of computing technology upon human values, minimize the damage that technology can do to
human values and to identify ways to use computer technology to advance human values. The
term computer ethics was coined in the mid-1970s by Walter Manor to refer to that field of
applied professional ethics dealing with ethical problems aggravated, transformed or created by
human technology. (James H Moor, 1997).The computer revolution is occurring in two stages.
The first stage was that of technology introduction in which computer technology was
developed and refined. The second stage is
of technological permeation in which technology gets integrated into everyday human activities.
Thusevolution of computer ethics is tied to the wide range of philosophical theories and
methodologies, which is rooted in the understanding of the technological revolution from
introduction to permeation. In the era of computer viruses and spying by hacking, computer
security is a topic of concern in the field of computer ethics. Computer crime can be can be
looked into from five different aspects: 1.Privacy and confidentiality. 2. Integrity Ensuring that
data and programs are not modified without proper authority. 3. Unimpaired service. 4.
Consistency: Ensuring that data and behaviour we see today will be the same tomorrow. 5.
Controlling access to resources. Malicious kinds of software or programmed threats provide a
significant challenge to computer security. These include viruses which cannot run on their own
but are inserted into other computer programs. Worms are software that are programmed to
move from machine to machine across networks and could consist of parts of themselves
running on
different machines; Trojan horses are programs which tend to appear as a sort of program but
actually end up doing damage behind the scenes; logic bombs check for particular favourable
conditions and then execute when such conditions arise and bacteria or rabbits are programs
which are programmed to multiply rapidly nod fill up the computers memory. Computer
crimes are normally committed by personnel who have
the permission to use the system. A hacker is one who enters the system without authorization.
It is done to steal data, commit vandalism or merely explore the system to see how it works and
see what is contained. However every act of hacking is harmful as it involves the unauthorized
entry into a system thus in fact trespassing into a persons
private domain. Even if the hacker did indeed make no changes, a computers owner
mustrun through a costly and time-consuming investigation of the compromised system
(Spafford, 1992).
2) What are the professional responsibilities? Discus the impact of Globalization
on computer ethics.

Answer: - Computer professionals have specialized knowledge and have positions with authority
and access to various forms of confidential information. Hence they are in a position to
significantly impact various aspects
of peoples lives. Along with such power to change the world comes the duty to exercise the
power responsibly (Gotterbarn, 2001). Computer professionals find themselves in a variety of
professional relationships with other people (Johnson, 1994) including: Employer employee
Client _ professional Professional _ professional Society _ professional These relationships
involve a diversity of interests and sometimes the so interests can come into conflict with each
other. Responsible computer professionals, therefore, will be aware of possible conflicts of
interests and try to avoid them. Professional organizations like the Association for Computing
Machinery (ACM) and the Institute of Electrical and Electronic Engineers (IEEE) have
established code of ethics, curriculum guidelines
and accreditation requirements to help computer professions understand and manage ethical
responsibilities. They have also adopted Code of Ethics for their members which include general
moral imperatives such as avoiding harm to others and to be honest and trustworthy,
specific professional responsibilities like acquiring and maintaining professional competence an
d knowing and respecting existing laws pertaining to professional work. The IEEE Code of Ethics
includes such principles as avoiding real or perceived conflicts of interest whenever possible.
Computer ethics is rapidly evolving into a broader and even more important field, which might
reasonably be called global information ethics. Global networks like the internet and especially
the World Wide Web are connecting people all over the globe. Efforts are on to develop mutually
agreed standards of conduct and efforts to advance and defend human values. Some of the
global issues being debated are:
Global laws: - Over two hundred countries are already interconnected by the internet. Given this
situation, what is the effect and impact of the law of one particular country on the rest of the
world? Issues regarding freedom of speech, protection of intellectual property, invasion of privacy
vary from country to country. The framing of common laws pertaining to such issues to ensure
compliance by all the countries is one of the foremost questions being debated.
Global cyber business-: Technology is growing rapidly to enable electronic privacy and security
on the internet to safely conduct international business transactions. With such advanced
technology in place, there will be a rapid expansion of global cyber business. Nations with a
technological infrastructure already in place will enjoy rapid economic growth, while rest of the
world lags behind. This disparity in levels of technology will fuel a political and economic fallout,
which could further widen the gap between the rich and the poor.
Global education: - Inexpensive access to the global information net for the rich and the poor
alike is necessary for everyone to have access to daily news from a free press, free texts,
documents, political, religious and social practices of peoples everywhere. However the impact of
this sudden and global education on different communities, cultures and religious practices are
likely to be profound. The impact on lesser known universities would be felt as older wellestablished universities begin offering degrees and knowledge modules over the internet.
3) What do you mean by Professional ethics? Explain the code of ethics. What are the
basic features of Internet? What is Cyber crime? What is an Electronic Warfare?

Answer: - Professional ethics: - A code fulfilling its function will change the approach of many
to the internet
and provide a counter pressure against the tendency to behave unethically. It would also help
many to realize that their behaviour may be unethical. The standards expected and the
realization of ones conduct will make
them pause and think about the consequences of their actions. This is summed up in the
preamble to the Software Engineering Code of Ethics and Professional Practice: These
principles should influence internet developers / users to consider broadly who is affected by
their work; to examine if they and their colleagues are treating other human beings with due
respect; to consider how the public, if reasonably well informed, would view their decisions; to
analyse how the least empowered will be effected by their decisions; and to consider whether
their acts would be judged worthy of the ideal professional working as a software engineer. In all
these judgments, concern for the health safety and welfare of public is primary; that is
public interest is central to the code.(Donald Gotternbarn, 1994).
Code of ethics: - Code of ethics are more apparitional. They are mission statements
emphasizing the professional objectives and vision. The degree of enforcement possible
is dependent on the type of code. Code of ethics, which is primarily apparitional, uses no more
that light coercion. Codes of conduct violations generally carry sanctions ranging from warning to
exclusion from the professional bodies. Violations of the codes of practice may lead to legal
action on the grounds of malpractice or negligence. The type of code used to guide behaviour
affects the type of enforcement. The hierarchy of codes parallels the three levels of ethical
obligations owed by professionals. The first level identified is a set of ethical values, such as
integrity and justice, which professionals share with other human beings by virtue of their shared
humanity. Code statements
at this level are statements of aspiration that provide vision and objectives. The second level
obliges professionals to more challenging obligations than those required at the first level. At the
second level, by virtue of their role as professionals and their special skills, they owe a higher
degree of care to those affected by their work. Every type of professional shares this second
level of ethical obligation. Code statements at this level express the obligations of all
professionals and professional attitudes. They do not describe specific behaviour details, but
they clearly indicate professional responsibilities. The third and deeper level comprises several
obligations that derive directly from elements unique to the particular professional practice. Code
elements at this level assert more specific behavioural responsibilities that are more closely
related to the state of art within the particular profession. The range of statements is from more
general apparitional statement to specific and measurable requirements. Professional code of
ethics needs to address all three of these levels.
Cyber crime: -In an influential research work, Prof. Ulrich Sieber observed that; the vulnerability
of todays information society in view of computer crimes is still not sufficiently realized: Business
es,administrations and society depend to a high degree on the efficiency and security of modern
inform ation technology. In the business community, for example, most of the monetary
transactions are administered by computers in form of deposit money. Electronic commerce
depends on safe systems for money transactions in computer networks. A companys entire
production frequently depends on the functioning of its data-processing system.
Many businesses store their most valuable company secrets electronically. Marine,

air, and space control systems, as well as medical supervision rely to a great extent on modern
computer systems. Computers and the internet also play an increasing role in the education and
leisure of minors. International computer
networks are the nerves of the economy, the public sector and society. The security of these
computer and communication systems and their protection against computer crime is
therefore of essential importance.
Electronic warfare: -In the meantime, the possibilities of computer manipulations have also
been recognized in the military sector. Strategic Information Warfare has become a form of
potential warfare of its own. This type of warfare is primarily directed to paralyze or manipulate
the adversarys computer systems. The dependency of military systems on modern information
systems became evident in 1995 when a tiger-team of the US Air Force succeeded in sending
seven ships of the US Navy to a wrong destination due to manipulations via computer networks.
Thus broadly speaking, the following specified nature of offences are recognized by respective
nation states in their legislations. The list by no means is to be construed as exhaustive but only
illustrative.
4) Brief the evolution of Computer Ethics. What are the three levels of computer ethics?
Explain.
Answer: - The computer revolution is occurring in two stages. The first stage was that of
technology introduction in which computer technology was developed and refined. The second
stage is of technological permeation in which technology gets integrated into everyday human
activities. Thus evolution of computer ethics is tied to the wide range of philosophical theories
and methodologies, which is rooted in the understanding of the technological revolution from
introduction to permeation. In the 1940s and 1950s computer ethics as a field of study had its
roots in the new field of research called cybernetics-the science of information feedback
systems undertaken by Professor Norbert Weiner,
the concepts of cybernetics led Weiner to draw some remarkable ethical conclusions about the
technology that is now called information and communication technology. He foresaw
revolutionary social and ethical consequences with the advance of technology. In his view the
integration of computer technology into society would eventually constitute the remaking of
society, which he termed as the second industrial revolution. He predicted that workers would
have to adjust to radical changes in the workplace, governments would need to establish new
laws and regulations, industries would need to create
new policies and practices, professional organizations would need to develop new code of
conduct for their members, sociologists and psychologists would need to study and understand
new social and psychological phenomena and philosophers
would need to rethink and redefine old social and ethical concepts. In the 1960sDon Parker of
SRI Inc. began to examine the unethical and illegal uses of computers by computer professions.
He published Rules of Ethics in Information Processing and headed the development of the first
code of professional
conduct for the association of computing machinery. The 1970s saw Walter Maner coin the term
Computer Ethics to refer to that field of inquiry dealing with ethical problems aggravated,
transformed by computer technology. He disseminated his starter Kit in computer ethics, which
contained curriculum materials and guidelines to develop and teach computer ethics. By the
1980s a number of social and ethical consequences of information technology were becoming

public issues in America and Europe. Issues like computer enabled crime, disasters caused by
computer failures, invasions of privacy through computer databases etc. become the order of the
day. This led to an explosion of activities in the field of computer ethics. The 1990s heralded
the beginning of the second generation of computer ethics. Past experience led to the situation,
which helped to build and elaborate the conceptual foundation while developing the frameworks
within which practical action can occur, thus reducing the unforeseen effects of information
technology application. Computer ethics questions can be raised and studied at various levels.
Each level is vital to the overall goal of protecting and advancing human values. On the most
basic level, computer ethics tries to sensitize people to the fact that computer technology has
social and ethical consequences. Newspapers, magazines and TV
news programs have highlighted the topic of computer ethics by reporting on events relating to
computer viruses, software ownership law suits, and computer aided bank robbery, computer
malfunction, computerized weapons etc. These articles have helped to sensitize the public at
large to the fact that computer technology can threaten human values as well as advance them.
The second level consists of someone who takes interest in computer ethics cases, collects
examples, clarifies them, looks for similarities and differences, reads related works, attends
relevant events to make preliminary assessments and after comparing them, suggests possible
analyses. The third level of computer ethics referred to as theoretical computer ethics applies
scholarly theories from philosophy, social science, law etc. to computer ethics cases and
concepts in order to deepen the understanding of issues. All three level of analysis are important
to the goal of advancing and defending human values. (James H Moor, 1997)
5) What are the codes of ethics? Compare its significance with present day scenario.
Answer: - Professional societies have used the codes to serve the following functions:
i) Inspiration: - Codes function as an inspiration for positive stimulus for ethical conduct.
Codes also serve to inspire confidence in the customer or user.
ii) Guidance: - Historically, there has been a transition away from regulatory codes designed
to penalize divergent behavior and internal dissent, towards codes which help someone
determine a course of action through moral judgement.
iii) Education: - Codes serve to educate, both prospective and existing members of the
profession about their shared commitment to undertake a certain quality of work and the
responsibility for the wellbeing of the customer and user of the developed product. Codes also
serve to educate managers of groups of professionals and those who make rules and laws
related to the profession about expected behaviour. Codes also indirectly educate the public at
large about what the professionals consider to be a minimal acceptable ethical practice in the
field, even if practiced by a non-professional.
iv) Support for positive action: - Codes provide a level of support for the professional who
decides to take positive action. They provide an environment in which it will be easier, than it
would otherwise be, to resist pressure to do what the professional would rather not do. The code
could be used as a counter pressure against the urging by others to have the professional to act
in ways inconsistent with an ethical pattern of behaviour.
v) Deterrence and discipline: Codes can serve as a formal basis
for action against a professional. The code defines a reasonable expectation for all practitioners.

A failure to meet these expectations could serve as a formal


basis in some organizations to revoke membership or suspend license to practice.
vi) Enhance the professions public image: - Codes serve to educate multiple constituencies
about the ethical obligations and the responsibilities of the professional. They educate
the professionals about what they should expect from themselves and what they should expect
from their colleagues. Codes also serve to educate society about its rights, about what society
has a right to expect from the practicing professional. A code fulfilling its function will change the
approach of many to the internet and provide a counter pressure against the tendency to behave
unethically. It would also help many to realize that their behaviour may be unethical. The
standards expected and the realization of ones conduct will
make them pause and think about the consequences of their actions. This is summed up in the
preamble to the Software Engineering Code of Ethics and Professional Practice: These
principles should influence internet developers / users to consider broadly who is affected by
their work; to examine if they and their colleagues are treating other human beings with due
respect; to consider how the public, if reasonably well informed, would view their decisions; to
analyse how the least empowered will be effected by their decisions; and to consider whether
their acts would be judged worthy of the ideal professional working as a software engineer. In
all these judgments, concern for the health safety and welfare of public is primary; that is public
interest is central to the code.
(Donald Gotternbarn, 1994).
6) State and Discuss primary assumptions of a legal system. What are the basic features
of Internet? Explain
Answer: - Any legal system is premised upon the following primary assumptions as a
foundation. They are:
a) Sovereignty
b) Territorial Enforcement
c) Notion of property
d) Paper based transactions
e) Real relationships
a) Sovereignty: -Law making power is a matter of sovereign prerogative. As a result, the writ of
sovereign authority runs throughout wherever sovereign power exercises authority. Beyond its
authority, which is always? Attributed to determinate geographical boundaries, the sovereign
cannot regulate a subject matter through legal intervention. However, in the cyber context,
geography is a matter of history, in the sense that barriers in terms of distance and
geographical boundaries do not make much sense.
b) Enforcement: -Any law in real world context can only be subjected to predetermine territorial
for cement. In other words, the territory over which the sovereign authority exercises power
without any qualification or impediment will be able to enforce the law. However, this proposition
carries some exceptions. It is a normal practice in the case of criminal law, the sovereign
authority enjoins extra-territorial jurisdiction as well. It is to indicate that even if the crime is
committed beyond the limits of territory, the sovereign authority will be able to initiate
prosecution, provided if the custody of
the person is fetched. Towards this end, it is a normal practice to invoke extradition proceedings (
which reflect mutual understanding and undertaking to co-operate with each other nation in

cases of crime commission). However, serious impediment in this respect is, the proceedings
must comply with the principle of double criminality. It means that, in both the countries, the
alleged act of commission must have been criminalized. In the context of cyber law, there are
only twelve countries in the globe, where relevant laws have been enacted. But when it comes to
Civil law, say in the case of international contracts, pertinent principles of Private International
Law are invoked to address these issues. When it comes to cyber context, territory does not hold
any meaning. Connectivity without any constraint is the strength of cyber world.
c) Notion of Property: - The obtaining premise (though of late subjected to marginal change) of
the legal
response considers property as tangible and physical. With the advent of intellectual property,
undoubtedly, this concept or understanding of property has undergone change. In the cyber
context, property in the form of digitized services or goods poses serious challenges to this legal
understanding.Similarly, domain names raise fundamental questions vis--vis the legal understa
nding of whatconstitutes property.
d) Real Relationships: - Quite often, legal response considers relationships, which are real
world oriented. In view of connectivity, pace and accuracy as to transmission, in the
cyber context, these relationships acquire unique distinction of virtual character. In the broad
ambit of trade and commerce, it is the commercial transaction in the form of contracts, which
constitutes the foundation of legal relationship. Hence, if the relationships are virtual, what should
be the premise of contract law, which is basically
facilitating in nature? Even with regard to other activities, which are potentially vulnerable to pros
cription, what kind of legal regulation is required to be structured?
e) Paper Based Transactions: - Obtaining legal response considers and encourages people to
create and constitute legally binding relationships on the basis of paper-based transactions. No
doubt, the definition of document as is obtaining under Section 3 of Indian Evidence Act, 1872
takes within its fold material other than paper also, still popularly the practice covers only paper
based transactions. But in the cyber context, it is the digital or electronic record, which forms the
basis of electronic transactions. As a result of which transactions will be on the basis of electronic
records. In the light of these seemingly non-applicable foundations, the legal system originating
from a particular sovereign country has to face complex challenges in formalizing the structure of
legal response. However, the inherent complexity did not deter select countries in making an
attempt in this regard. From the obtaining patterns it can be understood that, substantial
numbers of these countries have apparently considered the following benchmarks in structuring
the relevant legal response. Application of the existing laws duly modified to suit the medium
of cyber context with an appropriate regulatory authority monitoring the process and
adjudicating the rights and liabilities of respective stakeholders; respective legislations enacted
by the concerned sovereign states with a deliberate attempt to encourage and facilitate
international co-operation to enforce these laws. The IP provides for telepresence or
geographically extended sharing of scattered resources. An internet user may employ her
internet link to access computers, retrieve
information,or control various types of apparatus from around the world. These electronic
connections are entirely transparent to the user. Access to internet resources is provided via a
system of request and reply; when an online user attempts to access information or services on
the network, his/her local computer requests such access from the remote server computer

where the addressee is housed. The remote machine may grant or deny the
request, based on its programmed criteria, only if the request is granted does the server tender
the information to the users machine. These features make available a vast array of
interconnected information, including computerized digitalized text and graphics and sound. A
crop of private internet access providers has
developed to offer network access and facilities to such customers outside the research
community. Consequently, although the academic and scientific research community remains
an important part of the internet community as a whole, private and commercial traffic has
become a dominant force in the development and growth of the electronic frontiers. In particular,
the network offers novel opportunities for transactions involving information based goods and
services.

Вам также может понравиться