Project Status - University of Maryland Eastern Shore

Download Report

Transcript Project Status - University of Maryland Eastern Shore

Ethics and Information
Technology
in an Academic Environment
Catherine S. Bolek, M.S.
Director, Office of Sponsored Research and Programs,
Principal Investigator and IT Instructor
April 2002
1
© 2002 University of Maryland Eastern Shore
Defining Ethics
“The field of ethics, also called moral philosophy,
involves systematizing, defending, and recommending
concepts of right and wrong behavior”.
Source: The Internet Encyclopedia of Philosophy 2001
2
Defining Technology
 “The application of knowledge and skills for the achievement of
practical purposes (using technology and the Internet).
 According to this definition, what might we consider
technology?
 Simple tool technology (Chisel and Tablet)
 Craft technology (Pen and Ink)
 Mass production technology (Printing Press)
 Electronic technology (Internet) ”
 Source: Adapted from a site at University of North Carolina by Lippman.
3
Who Owns the Internet
 It has no headquarters.
 It has no central organization.
 It is not regulated by federal agencies (yet).
 No one officially monitors its content.
 You cannot control how your messages are routed.
4
Major Ethical Issues and Information
 Accessibility
 Accuracy and Reliability
 Free Speech and Censorship
 Public and Private Use of Information
 Economic Considerations
 Intellectual Property and Copyright
 Fair Use
 Plagiarism
5
Major Ethical Issues and Information
Technology
 Accessibility
 Accuracy and Reliability
 Free Speech and Censorship
 Public and Private Use of Information
 Economic Considerations
 Intellectual Property and Copyright
 Fair Use
 Plagiarism
 Crime and Inappropriate Use
 Security
6
If the Issues Remain the Same,
What Has Changed?
Many of the Issues have Become “Enhanced” or “Intensified” as
a Direct Result of How We Access and Use Information in an
Electronic Environment. The Process Has Changed More Than
the Issues Have Changed.
7
Accessibility
 What information does a person have a right to obtain?
 What are the conditions under which a person can obtain
information?
 What are the safeguards that ensure access?
 What should be done to address the “digital divide?
8
Accuracy and Reliability
 Check to see whether the source is a moderated or an
unmoderated list or an anonymous FTP site.
 Check online directory sources for affiliations and biographical
information.
 Check and compare this source to other sources, both similar
and different ones.
 Check archives of online lists for other works by this author.
 Check reviews of online lists to assess the scope and purpose of
this one.
 Source, D. Scott Brandt, 1996, Information Today, Inc.
9
Free Speech and Censorship
"As a matter of constitutional tradition, in the absence of
evidence to the contrary, we presume that governmental
regulation of the content of speech is more likely to interfere
with the free exchange of ideas than to encourage it. The
interest in encouraging freedom of expression in a democratic
society outweighs any theoretical but unproven benefit of
censorship."
Source: Justice John Paul Stevens, writing for the majority, Supreme Court Ruling, June 26,
1997.
10
Public and Private Use of Information
 Use in the workplace
 Use in public places (e.g., libraries)
 Use in your home
 Use in educational settings
11
12
13
Economic Considerations
 Cost for Equipment and Peripherals
 Cost for Internet Access
 Access to Bandwidth
 Cost and Time Related to Training
 Recognition of the Important of Technology
 E-Commerce
14
E-Commerce and B2B
 Consumer Credit File Privacy
 Shopping on Line
 ID Theft
 Online Investing
 File Sharing
15
16
Intellectual Property
 Patents – Inventions
 Trademarks – Use of a Device to Identify Goods
 Copyright – Literary Material and Artistic Performance
 Designs - Products Appearance
 Rights In Performance
 Trade Secrets
 Database Rights
 Conditional Access Technology – Broadcasts and Other Types of
Transmission
 Fair Use
17
Laws and Codes
Article 1, section 8
“Congress shall have the power…To promote the process of
science and useful arts, by securing for limited times to authors
and inventors the exclusive right to their respective writings and
discoveries.”
Governance
Patent Act (35 U.S. Code)
Copyright Act (37 Code)
General Agreement on Tariffs and Trade
Case Law and Judicial Opinions
18
Plagiarism
 “Is Cutting and Pasting the Enemy of Thought?”
 Source Jamie McKenzie, The Educational
Technology Journal, Vol. 7, No 8, May 1998
 “Copy from one, it’s plagiarism; copy from two it’s
research.”
 Adlai Stevenson
 When Does Borrowing become Stealing?
 Are new policies needed to cover electronic copying and
inappropriate use?
19
20
21
22
23
Use “Goggle” to Catch Cheaters
 Enter a sentence or sentence fragment enclosed in
“quotation marks" in the search line.
 Verify with a second sentence or sentence fragment.
 Print a hard copy and staple the original document
to the students paper and ask for an explanation.
 Be prepared, the explanations are always great!
24
25
26
Crime and Antisocial Behavior
 Viruses
 Hacking
 Internet Auction Fraud
 Childhood Pornography
 Solicitation of Minors
 Hate Mail
 Spamming and Junk Mail
 Flaming and Foul language
27
Cost of Viruses
On April 13, 2002, a National Public Radio
reporter stated that the cost to businesses for
lost revenue and repair from the “love bug”
virus was between 5 and 15 billion dollars.
28
Internet Protection Acts
 Children’s Internet Protection Act and
 Neighbor Children’s Internet Protection Act
 Appeals to prurient interest in nudity, sex, or excretion.
 Depicts, in a patently offensive way, an actual or simulated
sex act.
 Lacks serious literary, artistic, political, or scientific value.
29
Other Inappropriate Use
 Illegal Downloads (e.g., Napster)
 Hogging Bandwidth and Server Space
 Game Playing (e.g., How Many Games of Solitaire are Allowed
in a Given Business Day)
 Viewing Pornography in Common Lab Setting
 Resetting Common Technology Equipment
 Hoaxes
 Chain Letters
30
Hoaxes Are High Cost Activities
According to the U.S. Department of Energy
If 50,000,000 people respond * 1/60 hour * $50/hour
the cost to business could be a staggering $41.7 million.
31
32
33
Why Don’t Chain Letters Work
Copies in
Generation
Your
position
10
100
1,000
10,000
100,000
1,000,000
10,000,000
–
10
9
8
7
6
5
Source: Rutgers University Home Page on Chain Letters, April 2002.
34
35
Security
 Breaches
 Disruptions
 Ensuring Intellectual Property
 Ensuring Privacy and Confidentiality
 Human Subjects
 Protected Information
36
The Ethical Issues and
Information Technology
 Accessibility
 Accuracy and Reliability
 Free Speech and Censorship
 Public and Private Use of Information
 Economic Considerations
 Intellectual Property and Copyright
 Fair Use
 Plagiarism
 Crime and Inappropriate Use
 Security
37
Ensuring the Best Outcome
 Keep Informed.
 Participate in Public and Professional Forums.
 Let Legislators Know About Your Concerns.
 Discuss These Issues with Your Students, Colleagues, and Your
Administrators.
 Get Involved.
38
Ten Commandments for
Technology Ethics
 1. Thou shalt not use a technology to harm other people.
 2. Thou shalt not interfere with other people's technology work.
 3. Thou shalt not snoop around in other people's files.
 4. Thou shalt not use technology to steal.
 5. Thou shalt not use technology to bear false witness.
 6. Thou shalt not use or copy software for which you have not paid.
 7. Thou shalt not use other people's technological resources without
authorization.
 8. Thou shalt not appropriate other people's intellectual output.
 9. Thou shalt think about the social consequences of the program you
write.
 10. Thou shalt use technology in ways that show consideration and
respect.
Adapted from Arlene Rinaldi and Florida Atlantic University, Copyright 1998
39
Thank You for Your Interest.
40
Contact Information
Catherine Bolek, MS
Director of Sponsored Research and Programs
University of Maryland Eastern Shore
Princess Anne, Maryland 21841
410-651-6714
410-651-7768 (fax)
[email protected]
41