Social, Legal and
Professional issues - Use of
computer
• Honesty is the underlying principle for all computer use.
• At one extreme, significant violations of academic integrity
may result in penalties including dismissal from the
company.
• More generally, common sense, civility, and respect for
another's rights and computer property is as important to
community as proper treatment of equipment.
• Respect the privacy of others. Do not in any way examine
or change files or passwords belonging to others. Do not
violate the privacy of individuals or organizations.
• Respect the integrity of the computing systems. Do not
develop or use programs that invade, damage, or alter
computing systems or software. Do not in any way harass
other users.
• Always identify the user accurately. Never use someone
else's account. Do not use fraudulent means to avoid
accounting for the use of computing services.
• Respect copyrights and licenses. To copy a licensed
computer program is illegal; it is indeed theft.
• Respect the intellectual property of others. Individual
programming assignments are expected to be done by
individual students; do not take another's work or ideas to
call your own.
• Exhibit responsible, sensible use of computer hardware,
software, and data.
Ethical rules for computer users
• Do not use computers to harm other users.
• Do not use computers to steal others information.
• Do not access files without the permission of the owner.
• Do not copy copyrighted software without the author’s permission.
• Always respect copyright laws and policies.
• Respect the privacy of others, just as you expect the same from others.
• Do not use other user's computer resources without their permission.
• Use Internet ethically.
• Complain about illegal communication and activities, if found, to
Internet service Providers and local law enforcement authorities.
• Users are responsible for safeguarding their User Id and Passwords.
They should not write them on paper or anywhere else for
remembrance.
• Users should not intentionally use the computers to retrieve or modify
the information of others, which may include password information,
files, etc..
Use of Software
• Software enables us to accomplish many different tasks with
computers.
• Unfortunately, in order to get our work done quickly and
conveniently, some people make and use unauthorized
software copies.
In terms of copyright, there are four broad classifications of
software:
• Commercial
• Shareware
• Freeware
• Public Domain
Commercial
• COMMERCIAL software represents the majority of software
purchased from software publishers, commercial computer
stores, etc.
• When you buy software, you are actually acquiring a license
to use it, not own it
commercial software licenses stipulate that
• the software is covered by copyright,
• although one archival copy of the software can be made, the backup
copy cannot be used except when the original package fails or is
destroyed,
• modifications to the software are not allowed,
• decompiling (i.e., reverse engineering) of the program code is not
allowed without the permission of the copyright holder, and
• development of new works built upon the package (derivative works)
is not allowed without the permission of the copyright holder.
Shareware
shareware software licenses stipulate that
• the software is covered by copyright,
• although one archival copy of the software can be made, the backup
copy cannot be used except when the original package fails or is
destroyed,
• modifications to the software are not allowed,
• decompiling (i.e., reverse engineering) of the program code is not
allowed without the permission of the copyright holder, and
• development of new works built upon the package (derivative works)
is not allowed without the permission of the copyright holder.
Freeware
FREEWARE software licenses stipulate that
• the software is covered by copyright,
• copies of the software can be made for both archival and distribution
purposes but that distribution cannot be for profit,
• modifications to the software is allowed and encouraged,
• decompiling (i.e., reverse engineering) of the program code is allowed
without the explicit permission of the copyright holder, and
• development of new works built upon the package (derivative works)
is allowed and encouraged with the condition that derivative works
must also be designated as FREEWARE.
Public Domain
PUBLIC DOMAIN software
• copyright rights have been relinquished,
• software copies can be made for both archival and distribution
purposes with no restrictions as to distribution,
• modifications to the software are allowed,
• decompiling (i.e. reverse engineering) of the program code is allowed,
and
• development of new works built upon the package (derivative works)
is allowed without conditions on the distribution or use of the
derivative work.
ETHICAL USE OF SOFTWARE
• Software enables us to accomplish many different tasks with
computers.
• Unfortunately, in order to get their work done quickly and
conveniently, some people justify making unethical use of
software.
• Some principles governing the ethical use of software are:
• Do not use a software in ways that may harm other people- It is
unethical to use software to harm another user.
It includes harming or corrupting other users’ data or files.
It is unethical to write programs, which on execution lead to stealing,
copying or gaining unauthorized access to other users’ data.
Being involved in practices like hacking, spamming, phishing or cyber
bullying does not conform to software ethics.
• Do not use software to cause interference in other users’ work - Computer
software can be used in ways that disturb other users or disrupt their
work.
Viruses, for example, are programs meant to harm useful computer
programs or interfere with the normal functioning of a computer.
(malicious software can disrupt the functioning of computers in more ways
than one.
It may overload computer memory through excessive consumption of
computer resources, thus slowing its functioning.
It may cause a computer to function wrongly or even stop working. Using
malicious software to attack a computer is unethical.
• Refrain from copying software or buying pirated copies of software.
Pay for software unless it is free –
Like any other artistic or literary work, software is copyrighted. A piece
of code is the original work of the individual who created it.
It is copyrighted in his name. In case of a developer writing software
for the organization he works for, the organization holds the copyright
for it.
Copyright holds true unless its creators don’t announce it is not.
Obtaining illegal copies of copyrighted software is unethical.
• It is wrong to claim ownership on a work which is the output of
someone else’s intellect – Programs developed by a software
developer are his/her property.
If he is working with an organization, they are the organization’s
property.
Copying them and propagating them in one’s own name is unethical.
It applies to any creative work, program or design.
Establishing ownership on a work which is not yours is ethically wrong.
• Before developing software, think about the social impact it
can have - Looking at the social consequences that a program
can have, describes a broader perspective of looking at
technology.
Computer software on release, reaches millions.
Software like video games and animations or educational
software can have asocial impact on their users.
When working on animation films or designing video games,
for example, it is the programmer’s responsibility to
understand his target audience /users and the effect it may have
on them.
For example, a computer game for kids should not have
content that can influence them negatively.
Similarly, writing malicious software is ethically wrong. A
software developer/development firm should consider the
influence their code can have on the society at large.
Use of Internet Based Tools
• Largest communication network in the world.
• With the click of a mouse, one can update facebook, send a
tweet or write a blog post, and reach thousands of people all
across the world.
• One can also get a huge array of false information and
rumour.
Three Rules of Technology Ethics
1. Privacy—I will protect my privacy and respect the privacy of others.
2. Property—I will protect my property and respect the property of
others.
3. Appropriate use—I will use technology in constructive ways and in
ways
• Do not read other people's email
• Do not open attachments from people you do not know
• If you find someone's password, tell them in case you are not the first person
to find it
• Do not use anyone's information to gain access to their grades, or other
personal information, even if it is your best friend
• Do not use another person's software that was purchased, on your computer
• Do not pirate music or other files
• Do not copy and paste information off the Internet and pass it as your own
• Do not pretend to be someone other than who you are
• Do not go on unacceptable sites
• Do use the Internet to enrich your lives and the lives of others
Internet Ethics for everyone
• Internet ethics means acceptable behaviour for using internet.
• We should be honest, respect the rights and property of others on the
internet.
Acceptance
• One has to accept that Internet is not a value free-zone.
• It means World Wide Web is a place where values are considered in
the broadest sense so we must take care while shaping content and
services and we should recognize that internet is not apart from
universal society but it is a primary component of it.
Sensitivity to National and Local cultures
• It belongs to all and there is no barrier of national and local cultures.
• It cannot be subject to one set of values like the local TV channel or
the local newspaper we have to accommodate multiplicity of usage.
While using e-Mail and chatting
• Internet must be used for communication with family and friends.
Avoid chatting with strangers and forwarding e-mails from unknown
people /strangers.
• We must be aware of risks involved in chatting and forwarding e-mails
to strangers.
Pretending to be someone else
• We must not use internet to fool others by pretending to be someone else.
Hiding our own identity to fool others in the Internet world is a crime and
may also be a risk to others.
Avoid Bad language
• We must not use rude or bad language while using e-Mail, chatting, blogging
and social networking, We need to respect their views and should not criticize
anyone on the internet.
Hide personal information
• We should not give personal details like home address, phone numbers,
interests, passwords.
• No photographs should be sent to strangers because it might be misused and
shared with others without their knowledge.
While Downloading
• Internet is used to listen and learn about music.
• It is also used to watch videos and play games we must not use it to
download them or share copyrighted material.
• We must be aware of the importance of copyrights and issues of copyright.
Access to Internet
• The internet is a time-efficient tool for everyone that enlarges the
possibilities for curriculum growth.
• Learning depends on the ability to find relevant and reliable information
quickly and easily, and to select, understand and assess that information.
• Searching for information on the internet can help to develop these skills.
Liability for Software Error
• If software fails, who is responsible?
• If seen as a part of a machine that injures or harms, software
producer and operator may be liable
Strict liability
Software manufacturers should be held strictly liable because:
• strict liability would encourage risk spreading
strict liability would encourage the manufacturer to purchase products
liability insurance, thus passing the cost of the insurance onto the users
of the product. (issues: insurance is not easy to obtain, higher prices)
• strict liability forces manufacturers to take precautions before
marketing their product
Manufacturer are in the best position to know all potential defects and
potential harms that their products might cause.
Forcing manufacturers to pay for personal injuries created by software
defects will encourage them to be more careful.
• injured party will be adequately compensated
the application of strict liability to computer software defects would
ensure that injured plaintiffs receive adequate compensation for their
injuries, especially in fields such ATM, where defective computer
software may result in serious personal injury.
Negligence
Software manufacturers should NOT be held strictly liable because:
• strict liability will cause an undue burden upon computer software
manufacturers
it is essential to balance the need for the adoption of softwares and
automation with the risk involved in their malfunctions.
In balancing the need versus the harm, it is crucial to look at the costs
and risk of damage had the computer program not been used, and if
there are other efficient and safe methods of carrying out the same
function.
• strict products liability would hamper innovation
Implementation of strict products liability would discourage the
research and development of potentially life saving / safety enhancing /
efficient software.
If computer software manufacturers were to face strict liability for
defects in computer software which they did not know about and could
not prevent, many manufacturers would discontinue "cutting edge"
ventures