Vous êtes sur la page 1sur 35

Objectives:

At the end of the lesson, the 3rd Year CoEd will be able to
To be able to define the word ethics and to know the importance and act according to a code of principles; To address ethical, legal and other issues involved in using internet, To have a clear understanding of Intellectual Property Rights (IPR) in digital environment, To explore possible solution in addressing these issues, and To explore possible solution in addressing these issues, and

INTRODUCTION

Globalization and digital convergence in the emerging knowledge society has raised complex ethical, legal and societal issues. We are faced with complex and difficult questions regarding the freedom of expression, access to information, the right to privacy, intellectual property rights, and cultural diversity. ICT is an instrumental need of all humans for the gathering of information and knowledge, and as such, should be guaranteed as a basic right to all human beings.

INTRODUCTION contd..

All over the world, rights that are already legally recognised are daily being violated, whether in the name of economic advancement, political stability, religious causes, the campaign against terrorism, or for personal greed and interests. Violations of these rights have created new problems in human social systems, such as the digital divide, cybercrime, digital security and privacy concerns, all of which have affected peoples lives either directly or indirectly.

What is Ethics?

Definition: Ethic, ethical, ethics


Ethics is concerned with issues of value, such as judgments about what constitutes "good" or "bad" behavior in any given context. Ethics are the standards, values, morals, principles, etc., which guide one's decisions or actions. ICT Ethics relate to the standards of conduct governing individual, institutions societies & or international use of information & communication technology
(Merriam-Websters Collegiate Dictionary)

Moral code
Set of rules Establishes boundaries of generally accepted behavior Different rules often have contradictions

Morality
Social conventions about right and wrong Widely shared

Morality may vary by:


Age Cultural group Ethnic background Religion Gender

The Importance of Integrity


Integrity is a cornerstone of ethical behaviour

People with integrity


Act in accordance with a personal code of principles Extend to all people the same respect and consideration that you desire Apply the same moral standards in all situations

THE ETHICAL, LEGAL AND OTHER ISSUES INVOLVED IN USE OF ICT

Netiquettes
ETHICS GOVERNING INTERNET acceptable behavior on the Net, mostly related to use of e-mail and relay chat For Example:
Be brief, keep paragraphs short Try to use mixed upper and lowercase Use CAPITALS & special characters for emphasis only Do not SPAM or send junk e-mail Refrain from flaming (sending hate messages) Follow acceptable standards of politeness as used in all kinds of communication Be wary of virus hoaxes, urban legends and chain letters

Intellectual Property Rights

Intellectual Property Rights (contd)


Plagiarism using somebody elses work and claiming it as your own Copyright Law protection of the authors original work Fair Use reproduction of materials for educational and research purpose Software piracy theft and illegal reproduction of software File swapping exchange of digital materials like audio and video over the Net without the owners permission

Civil liberties
issues regarding the rights of an individual
Freedom of speech ability to express oneself on the Internet Personal privacy and records confidentiality handling of personal information, e-mail and other electronic correspondence
in the USA the FBI uses a software named Carnivore to spy on email passing through ISPs collection of users data i.e. personal information and browsing habits by some software (spyware), and using it directly or selling it for a profit

Censorship regulation or control of content


for example: use of blocking or filtering software

Cybercrimes (Computer facilitated crimes)


Hacking / Cracking breaking-in to computer systems with or without malicious intent Dissemination of Viruses, Worms, Trojan Horses, and other similar destructive software Denial of service and other attacks Internet Fraud false advertisement and malpractices of individuals and companies Spamming sending unsolicited e-mail Flaming sending of hate messages Pornography proliferation of obscene and indecent materials

Some issues of IPR in digital environment

Intellectual Property Rights


Intellectual property (IP) refers to works by created by inventors, authors and artists. These works are unique and have value in the market place. Intellectual property laws cover ideas, inventions, literary, creations, unique names, business models, industrial processes, computer program codes and more.

Shima Mohd - Master In Instructional Technology Faculty Of Education, University Of Malaya

There are four types of Intellectual Property protection


1. 2. 3. 4. Patents for invention Trademarks for brand identity Designs for product appearance Copyright for material.

Shima Mohd - Master In Instructional Technology Faculty Of Education, University Of Malaya

Some issues of IPR in digital environment

Recap of copyright IPR and E-learning Teacher Students Libraries Peer to peer sharing of files E-publishing and open Access Open Source and Open Access Licensing

Nature of Copyright
Exclusive right given by law for a certain term of years to an author, composer, designer, etc to print, publish, and sell copies of his original work. Applies to literary, dramatic, musical work, computer program, artistic work, irrespective of the media- paper, cinematographic films including sound track and video films, records, CDs, tapes, DVDs, VCDs Given to a person or organization responsible for creation/intellectual input, skill to a work.

Nature of copyright
Multiple nature of rights: bundle of different rights in the same work To reproduce and store in any material form and medium To issue copies to the public To perform in public or communicate to the public To make film or recording in respect of the work Translation, adaptation and to do the above in respect of translation and adaptation. To sell or give on hire, or offer for sale or hire any copy of the computer program, regardless of whether such copy has been sold or given on hire on earlier occasions.

Acts of infringement
Doing without license or permission Acts that the owner has exclusive rights (reproduction, communication, performance in public, adaptation and translation) Permits for profit any place to be used for communication Makes for sale or hire or sells for hire Distributes Exhibits imports

Copying
Casual connection: objective similarity
Indirect copying: 2-D to 3-D, adaptation Substantial copying: How much is reasonable? The legislation does not specify a percentage that is acceptable in all circumstances.
The courts would look to see whether all or a "substantial part" of the work has been copied. "substantial" can relate to quality just as much as quantity. A small but key part of the work could be ruled by a court to be a "substantial part

In Addressing these Ethical Issues

Ethics in Information Technology


Public concern about the ethical use of information technology includes:
E-mail and Internet access monitoring Peer-to-peer networks violation of copyright Unsolicited e-mail Hackers and identify theft Plagiarism Cookies and spyware

Ethics in Information Technology (continued)


The general public has not realized the critical importance of ethics as applied to IT

Important technical decisions are often left to technical experts


General business managers must assume greater responsibility for these decisions They must be able to make broad-minded, objective, ethical decisions based on technical savvy, business know-how, and a sense of ethics They must also try to create a working environment in which ethical dilemmas can be discussed openly, objectively, and constructively

Fifteenth Congress Second Regular Session Begun and held in Metro Manila, on Monday the Twenty-fifth day of July two thousand eleven. [ Republic Act No. 10175 ]

AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFORE AND FOR OTHER PURPOSES.
Be it enacted by the Senate and House of Representatives of the Philippines in Congress assembled:

Video Presentation

Summary
Ethics is a set of beliefs about right and wrong behaviour
Ethics in business is becoming more important because the risks associated with inappropriate behaviour have grown Corporations want to protect themselves and their employees from legal action

7-step approach to ethical decision making


Trends contributing to the risk of using information technology unethically include:
Growth of the Internet Ability to capture and store vast amounts of personal data online Greater reliance on information systems

References
http://www.slideshare.net/aleeya91/ict-computer-ethics
https://www.google.com.ph/#q=ethics+in+ICT.ppt http://www.tomw.net.au/technology/it/ictethics.shtml http://en.wikipedia.org/wiki/Cybercrime_Prevention_Act_of_2012 http://www.ccsr.cse.dmu.ac.uk/resources/general/ethicol/Ecv8no2.html http://www.youtube.com/watch?v=sIFfYxgDpRo

Vous aimerez peut-être aussi