English Articles of Computer Ethics
The ethical use of computers and other types of electronic information technology (IT) devices is known as ‘‘computer ethics’’ or ‘‘cyber ethics.’’ These concepts informally emerged beginning in the 1950s with the invention of mainframe computers initially used by U.S. government agencies, followed by colleges and universities. However, the term ‘‘computer ethics’’ was not articulated until Walter Maner did so in the mid-1970s. The ideas behind computer ethics involve complex considerations about how to behave properly—i.e., according to the laws, social customs, and moral standards of society—when using IT devices and information systems including the Internet. All forms of technology, including IT, used by people that allow people to access and use public and privately owned networks along with information should involve responsible use of computers, cell phones, PDAs, and other devices. For example, if a person uses a computer to access and share information over the Internet, he should do so in ways that comply with applicable civil and criminal laws and/or in ways that do not violate the rights of or harm other people. This, the essence of cyber ethics, can be difficult to achieve in certain instances. Today the ability to access information quickly online has created an ‘‘on-demand society’’ consisting of many people who frequently do not consider the possible harm they may be causing to other people.
The first users of computers faced many unprecedented challenges having to do with network access along with the use and exchange of data. As computer use and complexity increased, opportunities arose that allowed even more and comparatively unrestricted access to information via the Internet. Over time users were empowered with newer technologies and also were conditioned to access and respond to information in a variety of ways, according to their own interests, often with little adult or managerial oversight. Consider the modern practice of ‘‘flaming’’ that occurs when people disrespectfully interact with each other online. Frequently this happens when a person comments or posts something in a defamatory, insulting, or hostile manner about another person or organization only to have it negatively reacted to. Such online ‘‘shouting’’ can disrupt chat forums, blogs, and other online community exchanges, causing emotional harm or worse to people or organizations involved or named.
Computer/cyber ethics is a critical issue in modern societies in which millions of people now use many types of IT devices in their everyday lives. Cybercrime statistics along with an increasing number of research studies indicate that young people as well as adults do not behave ethically online, and that, beginning with a person’s earliest exposure to computers, he can easily become a victim and victimizer of other people.
Academic misconduct, piracy, cyber bullying, and other forms of online abuse and cybercrime cause harm in various ways, but what is considered responsible use of IT devices and information systems varies among people and situations. Not everyone, for example, believes that pirating music is wrong, even though it is illegal: while many young people would never think of stealing a music CD from a store in a shopping mall, they will use peer-to-peer networks to illegally download songs without paying to do so. What do you think about this issue? Can you think of other cybercrime issues or online behaviors that are controversial? Today society debates cyber ethics in areas pertaining to copyright and other intellectual property rights issues, the creation and enforcement of laws, formulation of public policies, professional codes of conduct, information security practices, software license agreements, and hardware reseller’s mandates, among other issues. Technology use struggles against regulation, with consumers, businesses, and governments all seeking to predominate over what constitutes the ethical use of computers. With no uniform standards on computer use, a few employment sectors and professional membership associations are creating their own codes of conduct. At the organizational level these frequently take the form of ‘‘acceptable computer/network use policies’’ and may be complemented with cyber ethics training. Unfortunately, the results amount to a ‘‘wild west approach’’ to cyber ethics, with conflicting interests among different populations and groups of computer users. In cyber ethics, there is no such thing as ‘‘model traffic laws’’ as exist throughout the United States when it comes to operating motor vehicles. All too often ITusers make up their own ‘‘rules’’ when using the Internet, which is the social equivalent of everyone driving any way they desire with little or no regard for other motorists.
The results of this lack of uniformity is that overall guidance on good behavior and best practices tends to be absent from users’ initial computer experiences and in their continued decision-making processes. Thus children, when first taught how to use computers or portable gaming devices, are seldom provided with age-appropriate instruction in cyber ethics. The same is true for millions of youth and young adults who may go through their entire educational preparation in middle school, high school, and college without receiving any cyber ethics training. Since most users of computer technology lack any formalized ethical instruction, it is no surprise that the social and economic impacts and levels of harm caused by cybercrimes are increasing.
As users age, their exposure, experience, and technical capabilities to engage in cybercrime activities increase. Lacking cyber ethics education along with instruction in information security and Internet safety contributes to online victimization and offenses. In recognizing this, many institutions and organizations are providing guidance, information, and model practices and policies related to sound use of IT devices. I-SAFE, Inc. and the National Center for Missing and Exploited Children (NCMEC) are two nonprofit organizations that develop online instructional resources for teachers, parents, and youth that relate to using computers responsibly. Adults need to review the current information on technology and educate themselves on impact in areas of concern. For example, businesspeople and business owners need to understand their firm’s policies on the use of technology, or, if a person owns a business, he needs to ensure that he has a policy aligned with his corporate goals. Educators and government officials need to create ways to enable parents and members of the community to learn basic computer etiquette, and then provide uniform instruction options for students and others. To stay current on the issue, a person need only search the Internet on the term ‘‘ethical computer use,’’ ‘‘computer ethics,’’ and ‘‘cyber ethics,’’ or, where available, take a course having to do with the philosophy of ethics that emphasizes controversial online behaviors.