What is a system of moral standards or values used as a guideline for computer users it needs to stop the current technology products from being exploited?

In Technology Ethics, the Markkula Center for Applied Ethics addresses issues arising from transhumanism and human enhancement ethics, catastrophic risk and ethics, religion and technology ethics, and space ethics.

AI ethics and corporate tech ethics development and training are researched, created, and delivered in collaboration with Internet Ethics.

By Brian Patrick Green, director of Technology Ethics

Technology ethics is the application of ethical thinking to the practical concerns of technology. The reason technology ethics is growing in prominence is that new technologies give us more power to act, which means that we have to make choices we didn't have to make before. While in the past our actions were involuntarily constrained by our weakness, now, with so much technological power, we have to learn how to be voluntarily constrained by our judgment: our ethics.

For example, in the past few decades many new ethical questions have appeared because of innovations in medical, communications, and weapons technologies. There used to be no need for brain death criteria, because we did not have the technological power to even ask the question of whether someone were dead when their brain lost functioning – they would have soon died in any case.  But with the development of artificial means of maintaining circulation and respiration this became a serious question. Similarly, with communications technologies like social media we are still figuring out how to behave when we have access to so many people and so much information; and the recent problems with fake news reflect how quickly things can go wrong on social media if bad actors have access to the public. Likewise with nuclear weapons, we never used to need to ask the question of how we should avoid a civilization-destroying nuclear war because it simply wasn’t possible, but once those weapons were invented, then we did need to ask that question, and answer it, because we were – and still are – at risk for global disaster.

These changes obviously present some powerful risks, and we should ask ourselves whether we think such changes are worthwhile – because we do have choices in the technologies we make and live by. We can govern our technologies by laws, regulations, and other agreements. Some fundamentally ethical questions that we should be asking of new technologies include: What should we be doing with these powers now that we have developed them? What are we trying to achieve? How can this technology help or harm people? What does a good, fully human life look like? As we try to navigate this new space, we have to evaluate what is right and what is wrong, what is good and what is evil.

As an example, artificial intelligence is a field of technological endeavor that people are exploring in order to make better sense of the world. Because we want to make sense out of the world in order to make better choices, in a way, AI has a fundamentally ethical aspect. But here we need to not mistake efficiency for morality – just because something is more efficient does not mean that it is morally better, though often efficiency is a dramatic benefit to humanity. For example, people can make more efficient weapons – more efficient at killing people and destroying things – but that does not mean they are good or will be used for good. Weapons always reflect, in an ultimate sense, a form of damage to the common good, whether the weapon is ever used or not (because its cost could have been spent on something better).

Returning to AI, lots of the organizations are exploring AI with a goal in mind that is not necessarily the best goal for everyone. They are looking for something good, whether it is making sense of large datasets or improving advertising. But is that ultimately the best use for the technology? Could we perhaps apply it instead to social issues such as the best way to structure an economy or the best way to promote human flourishing? There are lots of good uses of AI, but are we really aiming towards those good uses, or are we aiming towards lower goods?

Additionally, we’ve become so powerful now that we not only have the power to destroy ourselves, but we also have the ability to change ourselves. With CRISPR and synthetic biology, we can choose to genetically modify people, and by implanting biomedical devices into our bodies and brains we can change how we function and think. Right now, most medical interventions are done for therapy, but in the future, we'll have to consider enhancement, as well. At some point we could potentially even change human nature.

That’s a tremendous power, one that must be matched with serious reflection on ethical principles such as dignity, fairness, and the common good. The temptation to power without ethics is something we need to avoid now more than ever. If one is powerful without goodness, one becomes dangerous and capable of very evil actions. In fact, such dangerous power may well destroy itself and perhaps take many innocent lives with it.

As long as there is technological progress, technology ethics is not going to go away; in fact, questions surrounding technology and ethics will only grow in importance. As we travel this path into the future together, we will choose the kind of future we create. Given our growing technological power, we need to put more and more attention towards ethics if we want to live in a better future and not a worse one.

This article is adapted from the video What Is Technology Ethics?

COMPUTER ETHICSBY:AMPUMUZA DALTON[emailprotected]+256751051810Bishop Stuart UniversityETHICS IN GENERALA guideline is needed to stop the current technology products frombeing exploited for example replicating original CDs and selling themas pirated software, this unethical behaviour can be controlled by thecode of conducts.Unethical refers to any code of conducts that are not conforming toapproved standards of social or professional behaviour. Computer ethics is a system of moral standards or values used as aguideline for computer users.THE TEN COMMANDMENTS OF COMPUTER ETHICSThe United States Institute of Computer Ethics has come out with theTen Commandments of Computer Ethics. These principles considerthe effective code of conducts for the proper use of informationtechnology. The Ten commandments of computer ethics are :1. You shall not use a computer to harm other people.2. You shall not interfere with other people's computer work.[emailprotected]

  1. 1. INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY
  2. 2.  1.1.1.1 Define ICT. ICT is the technology required for information processing, in particular, the use of electronic computers, communication devices and software applications to convert, store, protect, process, transmit and retrieve information from anywhere, anytime.
  3. 3.  INFORMATION Information refers to the knowledge obtained from reading, investigation, study or research. The tools to transmit information are the telephone, television and radio. Information is knowledge and helps us to fulfill our daily tasks.  COMMUNICATION Communication is an act of transmitting messages. It is a process whereby information is exchanged between individuals using symbols, signs or verbal interactions. Communication is important in order to gain knowledge.  TECHNOLOGY Technology is the use of scientific knowledge, experience and resources to create processes products that fulfill human needs. Technology is vital in communication
  4. 4.  1.1.1.2 Evolution of computers. COMPUTER GENERATIONS  First Generation (1940-1956)  SECOND GENERATION (1956-1963)  THIRD GENERATION (1964-1971)  FOURTH GENERATION (1971- PRESENT)   FIFTH GENERATION (PRESENT & BEYOND)  NEW ERA COMPUTER
  5. 5.  1.1.2.1 The usage of ICT in everyday life ◊ EDUCATION In education, teachers, students, researchers and school administrators benefits from the usage of ICT. ◊ BANKING In the banking, customers, businessman & bank administrator benefits from the usage of ICT. ◊ INDUSTRY Computers are used to facilitate production planning and control systems, to support chain management and to help in product design in the industrial sector. In the industrial sector, workers, researchers and administrator benefits from the usage of ICT. ◊ E-COMMERCE E-commerce helps in boosting the economy. It makes buying and selling activities easier, more efficient and faster. For this application, computers, Internet and shared software are needed. In the e-commerce sector, customers, suppliers and employees benefits from the usage of ICT.
  6. 6. 1.1.2.2 Differences between computerised and non-computerised systems. Computerised Non-Computerised more interesting & interactive depends on teachers & textbook experiences all transactions are done by banking was done manually computers Computers and Production was slow because telecommunications industry everything was done depended on became very popular and profitable human labour. since production can be increased through an all day operation. E-commerce plays an important Trading was made using the barter role in the economic scene. It system and it was then later includes distribution, buying, developed into currency. selling and servicing products that are done electronically
  7. 7. FASTER COMMUNICATION SPEED SOCIAL LOWER PROBLEMS COMMUNICATION COST impact of ICT on society BORDERLESS RELIABLE MODE OF COMMUNICATION COMMUNICATION EFFECTIVE PAPERLESS SHARING OF ENVIRONMENT INFORMATION
  8. 8. COMPUTER ETHICS Computer ethics is a system of moral standards or values used as a guideline for computer users. It is needed to stop the current technology products from being exploited. Ethics is a moral philosophy where a person makes a specific moral choice and sticks to it. Code of ethics in computing means moral guidelines to refer to when using the computer and the Internet.
  9. 9. INTELLECTUAL PROPERTY Intellectual property refers to any product of human intellect that is unique and has value in the market place. This covers ideas, inventions, unique name, computer program codes and many more. PRIVACY Privacy in IT refers to data and information privacy. In general, data include texts, numbers, sounds, images and video. Information privacy is described as the rights of individuals and companies to deny or restrict the collection and use of information about them. CYBER LAW Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
  10. 10. ETHICS LAW  Guideline: As a guideline to  Control: As a rule to control computer users. computer users.  Moral Standards: Ethical behaviour  Judicial Standards: Law is judged is judged by moral standards. by judicial standards.  No Punishments: No punishment for  Must Follow: Computer users must anyone who violates ethics. follow the regulations and law.  Free To Follow: Computer users are  Punishments: Penalties, free to follow or ignore the code of imprisonments and other punishments ethics. for those who break the law.  Immoral: Not honouring computer  Depends On Country: Depends on ethics means ignoring the moral country and state where the crime is elements (immoral). committed.  Universals: Universal, can be  Prevent Misusing Of Computers: To applied anywhere, all over the world prevent misuse of computers.  Produce Ethical Computer Users: To  Crime: Not honouring the law produce ethical computer users means committing a crime.
  11. 11. Intellectual property laws are needed to establish and safeguard the intellectual property which refers to works created by inventors, authors and artists. It is also needed as businesses today continue to expand globally. There are four types of Intellectual Property protection. They are patents for invention, trademarks for brand identity, designs for product appearance and copyright for material.
  12. 12. •he privacy laws in Malaysia emphasises on the Privacy following: •Security Services to review the security policy Security Management to protect the resources law Security Mechanism to implement the required security services Security Objects, the important entities within the system environment Utilities •Example: anti-spam program, firewall, anti- spyware and antivirus. software
  13. 13. Methods of Authentication There are two commonly used authentication methods, which are biometric device and callback system. Biometric device is a device that translates personal characteristics into a digital code that is compared with a digital code stored in the database. Biometric devices include Fingerprint Recognition, Facial Recognition, Hand Geogmetry, Iris Scanning, Retinal Scanning, Voice Recognition and Signature Verification. Callback system refers to the checking system that authenticates the user. Methods of Verification There are two methods used in verification, which are user identification and processed object. User identification refers to the process of validating the user. Processed object refers to something the user has such as identification card, security token and cell phone.
  14. 14. Pornography Pornography: can lead to criminal acts such as exploitation of women and children can lead to sexual addiction or perversion can develop low moral value towards other men, women or children can erode good religious, cultural and social beliefs and behaviour Slander Slander: can develop into a society that disregards honesty and truth can develop bad habit of spreading untruths and rumours can lead to unnecessary argument can cause people to have negative attitudes towards another person
  15. 15.  Cyber Law is needed as in the recent years, many concerns and issues were raised on the integrity and security of information, legal status of online transactions, privacy and confidentiality of information, intellectual property rights and security of government data placed on the Internet. 1.2.4.2 Computer crimes below Theft Fraud Attacks Copyright Infringement
  16. 16. Computer security means protecting our computer systems and the information they contain against unwanted access, damage, destruction or modification. Three types of computer security are: hardware security software security/data security network security 1.3.2 .1 Security Threats Malicious code Hacking Natural disaster