Project Status - University of Maryland Eastern Shore
Download
Report
Transcript Project Status - University of Maryland Eastern Shore
Ethics and Information
Technology
in an Academic Environment
Catherine S. Bolek, M.S.
Director, Office of Sponsored Research and Programs,
Principal Investigator and IT Instructor
April 2002
1
© 2002 University of Maryland Eastern Shore
Defining Ethics
“The field of ethics, also called moral philosophy,
involves systematizing, defending, and recommending
concepts of right and wrong behavior”.
Source: The Internet Encyclopedia of Philosophy 2001
2
Defining Technology
“The application of knowledge and skills for the achievement of
practical purposes (using technology and the Internet).
According to this definition, what might we consider
technology?
Simple tool technology (Chisel and Tablet)
Craft technology (Pen and Ink)
Mass production technology (Printing Press)
Electronic technology (Internet) ”
Source: Adapted from a site at University of North Carolina by Lippman.
3
Who Owns the Internet
It has no headquarters.
It has no central organization.
It is not regulated by federal agencies (yet).
No one officially monitors its content.
You cannot control how your messages are routed.
4
Major Ethical Issues and Information
Accessibility
Accuracy and Reliability
Free Speech and Censorship
Public and Private Use of Information
Economic Considerations
Intellectual Property and Copyright
Fair Use
Plagiarism
5
Major Ethical Issues and Information
Technology
Accessibility
Accuracy and Reliability
Free Speech and Censorship
Public and Private Use of Information
Economic Considerations
Intellectual Property and Copyright
Fair Use
Plagiarism
Crime and Inappropriate Use
Security
6
If the Issues Remain the Same,
What Has Changed?
Many of the Issues have Become “Enhanced” or “Intensified” as
a Direct Result of How We Access and Use Information in an
Electronic Environment. The Process Has Changed More Than
the Issues Have Changed.
7
Accessibility
What information does a person have a right to obtain?
What are the conditions under which a person can obtain
information?
What are the safeguards that ensure access?
What should be done to address the “digital divide?
8
Accuracy and Reliability
Check to see whether the source is a moderated or an
unmoderated list or an anonymous FTP site.
Check online directory sources for affiliations and biographical
information.
Check and compare this source to other sources, both similar
and different ones.
Check archives of online lists for other works by this author.
Check reviews of online lists to assess the scope and purpose of
this one.
Source, D. Scott Brandt, 1996, Information Today, Inc.
9
Free Speech and Censorship
"As a matter of constitutional tradition, in the absence of
evidence to the contrary, we presume that governmental
regulation of the content of speech is more likely to interfere
with the free exchange of ideas than to encourage it. The
interest in encouraging freedom of expression in a democratic
society outweighs any theoretical but unproven benefit of
censorship."
Source: Justice John Paul Stevens, writing for the majority, Supreme Court Ruling, June 26,
1997.
10
Public and Private Use of Information
Use in the workplace
Use in public places (e.g., libraries)
Use in your home
Use in educational settings
11
12
13
Economic Considerations
Cost for Equipment and Peripherals
Cost for Internet Access
Access to Bandwidth
Cost and Time Related to Training
Recognition of the Important of Technology
E-Commerce
14
E-Commerce and B2B
Consumer Credit File Privacy
Shopping on Line
ID Theft
Online Investing
File Sharing
15
16
Intellectual Property
Patents – Inventions
Trademarks – Use of a Device to Identify Goods
Copyright – Literary Material and Artistic Performance
Designs - Products Appearance
Rights In Performance
Trade Secrets
Database Rights
Conditional Access Technology – Broadcasts and Other Types of
Transmission
Fair Use
17
Laws and Codes
Article 1, section 8
“Congress shall have the power…To promote the process of
science and useful arts, by securing for limited times to authors
and inventors the exclusive right to their respective writings and
discoveries.”
Governance
Patent Act (35 U.S. Code)
Copyright Act (37 Code)
General Agreement on Tariffs and Trade
Case Law and Judicial Opinions
18
Plagiarism
“Is Cutting and Pasting the Enemy of Thought?”
Source Jamie McKenzie, The Educational
Technology Journal, Vol. 7, No 8, May 1998
“Copy from one, it’s plagiarism; copy from two it’s
research.”
Adlai Stevenson
When Does Borrowing become Stealing?
Are new policies needed to cover electronic copying and
inappropriate use?
19
20
21
22
23
Use “Goggle” to Catch Cheaters
Enter a sentence or sentence fragment enclosed in
“quotation marks" in the search line.
Verify with a second sentence or sentence fragment.
Print a hard copy and staple the original document
to the students paper and ask for an explanation.
Be prepared, the explanations are always great!
24
25
26
Crime and Antisocial Behavior
Viruses
Hacking
Internet Auction Fraud
Childhood Pornography
Solicitation of Minors
Hate Mail
Spamming and Junk Mail
Flaming and Foul language
27
Cost of Viruses
On April 13, 2002, a National Public Radio
reporter stated that the cost to businesses for
lost revenue and repair from the “love bug”
virus was between 5 and 15 billion dollars.
28
Internet Protection Acts
Children’s Internet Protection Act and
Neighbor Children’s Internet Protection Act
Appeals to prurient interest in nudity, sex, or excretion.
Depicts, in a patently offensive way, an actual or simulated
sex act.
Lacks serious literary, artistic, political, or scientific value.
29
Other Inappropriate Use
Illegal Downloads (e.g., Napster)
Hogging Bandwidth and Server Space
Game Playing (e.g., How Many Games of Solitaire are Allowed
in a Given Business Day)
Viewing Pornography in Common Lab Setting
Resetting Common Technology Equipment
Hoaxes
Chain Letters
30
Hoaxes Are High Cost Activities
According to the U.S. Department of Energy
If 50,000,000 people respond * 1/60 hour * $50/hour
the cost to business could be a staggering $41.7 million.
31
32
33
Why Don’t Chain Letters Work
Copies in
Generation
Your
position
10
100
1,000
10,000
100,000
1,000,000
10,000,000
–
10
9
8
7
6
5
Source: Rutgers University Home Page on Chain Letters, April 2002.
34
35
Security
Breaches
Disruptions
Ensuring Intellectual Property
Ensuring Privacy and Confidentiality
Human Subjects
Protected Information
36
The Ethical Issues and
Information Technology
Accessibility
Accuracy and Reliability
Free Speech and Censorship
Public and Private Use of Information
Economic Considerations
Intellectual Property and Copyright
Fair Use
Plagiarism
Crime and Inappropriate Use
Security
37
Ensuring the Best Outcome
Keep Informed.
Participate in Public and Professional Forums.
Let Legislators Know About Your Concerns.
Discuss These Issues with Your Students, Colleagues, and Your
Administrators.
Get Involved.
38
Ten Commandments for
Technology Ethics
1. Thou shalt not use a technology to harm other people.
2. Thou shalt not interfere with other people's technology work.
3. Thou shalt not snoop around in other people's files.
4. Thou shalt not use technology to steal.
5. Thou shalt not use technology to bear false witness.
6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other people's technological resources without
authorization.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you
write.
10. Thou shalt use technology in ways that show consideration and
respect.
Adapted from Arlene Rinaldi and Florida Atlantic University, Copyright 1998
39
Thank You for Your Interest.
40
Contact Information
Catherine Bolek, MS
Director of Sponsored Research and Programs
University of Maryland Eastern Shore
Princess Anne, Maryland 21841
410-651-6714
410-651-7768 (fax)
[email protected]
41