Date published 

 

In what way does the online domain shape our (moral) practices in it? Since the introduction of the consumer internet, this question has quickly. PDF | 3+ hours read | Computing technologies and artifacts are increasingly integrated into most aspects of our professional, social, and private. property rights, privacy, free speech and professional ethics. Is computer ethics different to those that came before. Partially, the answer is no since all fields have .

Author:MARYA ZEHNER
Language:English, Spanish, Arabic
Country:Thailand
Genre:Science & Research
Pages:248
Published (Last):31.12.2015
ISBN:388-9-16961-926-4
Distribution:Free* [*Registration needed]
Uploaded by: EUGENA

74716 downloads 123633 Views 19.73MB PDF Size Report


Computer Ethics Pdf

The Cambridge Handbook of Information and Computer Ethics that only display certain files (e.g. pdf files) whose legitimate origin has been ascertained. In particular, I want to characterize computer ethics and show why this emerging On my view, computer ethics is the analysis of the nature and social impact. In the s and early s, the field of study that is now called “computer ethics” was given a solid foundation by Professor Norbert Wiener of MIT. Unhappily.

To act responsibly, they should reflect upon the wider impacts of their work, consistently supporting the public good. The Code is designed to inspire and guide the ethical conduct of all computing professionals, including current and aspiring practitioners, instructors, students, influencers, and anyone who uses computing technology in an impactful way. Additionally, the Code serves as a basis for remediation when violations occur. The Code includes principles formulated as statements of responsibility, based on the understanding that the public good is always the primary consideration. Each principle is supplemented by guidelines, which provide explanations to assist computing professionals in understanding and applying the principle. Section 1 outlines fundamental ethical principles that form the basis for the remainder of the Code. Section 2 addresses additional, more specific considerations of professional responsibility. Section 3 guides individuals who have a leadership role, whether in the workplace or in a volunteer professional capacity.

The internet holds massive amounts of information, accessible by search engines such as Google. Teachers can find a plethora of information to add to their curriculum, and students have the amazing ability to research anything within a matter of seconds.

There are no limits to what the internet can bring. Moreover, statistics shows in a recent study, Microsoft teamed up with the National Cyber Security Alliance , surveying K private and public schools all over the United States.

The survey shows there are almost 60 million students and teachers today. The need for educating this enormous group of individuals is vital. The Philippines had been in the revolutionary stage of information technology since e-commerce law also known as Republic Act — E-Commerce Law of the Philippines has been established in the year Currently, a blog from rappler reported that a Senator Nancy Binay wants students to learn cyberethics.

According to the interview, Binay explained that the proposal she made in Senate Resolution aims to promote responsible use of the Internet through education instead of laws that may restrict free speech Macaraig, A.

Computer ethics

Moreover, the Philippine government itself is aware of the potentials of internet crimes in the Philippines. This proceed is an example of a serious governance in terms of computer netethics or computer network ethics.

The Philippines is experiencing computing ethical dilemma in terms of moral values, privacy, and other norms that affects an individuals whole being.

Among those were reported in different news organizations such as cyber sex, pornography, cyber stalking, identity thief, and financial thief and alike.

It is a training institution in education, arts and sciences, and management and entrepreneurships.

As an institution it is expected to be a catalyst and produced a graduate that has the norms and values of the university as responsible citizens of the Republic of the Philippines. Such rules and standards is a result of the series of workshops initiated by the professional organization in Information Technology education, PSITE Philippine Society of IT Educators , where IT educators, practitioners, students and stakeholders in the IT industry are invited as participants to the workshop with the presence of a technical panel from CHED.

The curriculum includes courses that will facilitate the development of the students in the different disciplines of Information Technology. Hence, basic courses in the curriculum will help the student to become knowledgeable in the different academic areas that will mold them to become a International Journal of Education and Research Vol. However, despite of being in the field of Information Technology and having the subject of computer ethics in the curriculum, students sometimes forgotten to act according to the norms and standards in the field.

The university is composed of a diverse students coming from different part of the country, region, and towns with different values, beliefs, intellectual understanding or educational background, experience, attitudes and others.

Because of these, this makes the university vulnerable to computer ethics predicament. It is on this premise that this study deemed necessary to assess the level of awareness in computer ethics for responsible computing. In this context, the Leyte Normal University had a typical problem in Computer Ethics that arises from students because there is a policy vacuum about how computer technology should be used.

It is understood that computer provide us with new capabilities and these in turn give us new choices for action. However, despite of an existing computer laboratory policies it seem that there is no strict enforcement from authorities concerned and such policies are obsolete or inadequate with the changing times.

In which case there is a need to revisit and review in order to formulate a strong and appropriate policies attuned with the demand of the present time. Further, this study is also supported with the golden rule, utilitarianism and pluralism theory as its theoretical underpinning. It states that one should consider only the consequence of the action and the number of people positively affected when making a decision. Researchers argue that IT evolution has created completely new ethical problems and thus expanded existing ethical questions.

The theory presented is very much applicable in the study regarding student awareness of computer ethics. Students has the responsibility as to how one should act in order to abide by ethical rules. However, every individual has a unique perspective towards ethics, which depends greatly upon factors such as culture, environment, and personal development.

Objectives of the Study The main thrust of this research is to gauge the degree of awareness for responsible computing relative to computer ethics.

The Cambridge Handbook of Information and Computer Ethics

What is the profile of the respondents in terms of: 1. What is the level of awareness in computer ethics in terms of: 2. What are the least computer ethics indicators that the respondents are not aware of?

What input can be develop to increase the level of awareness for responsible computing based on the findings of the study? This was done for the determination of samples directly involved in the study and for the distribution of the questionnaires. The data is presented on the table below. Data Gathering Instruments The researcher used surveyed questionnaires as main data gathering tool for this study. The instrument consists of two parts; the first part is composed of the demographic profile of the respondents the second part focused on the computer ethics awareness.

WHAT IS COMPUTER ETHICS - Semantic Scholar

Data collections was done through personal distribution and were given enough time to think about the questions as stated on the questionnaire, thus producing more accurate information period. Statistical Treatment of Data Responses from the questionnaires were directly encoded in an excel format. The data were analyzed using the Statistical Package for Social Sciences SPSS software — descriptive statistics frequency counts, percentages, and mean. The most number of respondents as shown in the table were 17 years old The data disclosed that female respondents dominates having Cloud University, came up with " information ethics ", a term that was used to describe the storage, production, access and dissemination of information.

Main article: internet privacy Privacy is one of the major issues that has emerged since the internet has become part of many aspects of daily life.

Internet users hand over personal information in order to sign up or register for services without realizing that they are potentially setting themselves up for invasions of privacy. There is a feature within searching that allows Google to keep track of searches so that advertisements will match your search criteria, which in turn means using people as products. Google was sued in due to tracking user location without permission.

With the increase in social networking sites, more and more people are allowing their private information to be shared publicly. On the surface, this may be seen as someone listing private information about them on a social networking site, but below the surface, it is the site that could be sharing the information not the individual.

This is the idea of an opt-in versus opt-out situation. There are many privacy statements that state whether there is an opt-in or an opt-out policy. Typically an opt-in privacy policy means that the individual has to tell the company issuing the privacy policy if they want their information shared or not.

Opt-out means that their information will be shared unless the individual tells the company not to share it. A whole industry of privacy and ethical tools has grown over time, giving people the choice to not share their data online. These are often open source software, which allows the users to ensure that their data is not saved to be used without their consent. In solving problems relating to ethical issues, Michael Davis proposed a unique problem-solving method.

Similar files:


Copyright © 2019 aracer.mobi. All rights reserved.
DMCA |Contact Us