Ethical Issues
Ethical Issues
Ethical Issues
The following vignettes can be used in an open and frank discussion of computer
ethics. Review each scenario carefully and respond to each question using the
following statement, choosing the description you feel most appropriate: I feel the
actions of this individual were (very ethical / ethical / neither ethical nor unethical /
unethical / very unethical). Then, justify your response
These scenarios are based on published works by Professor Whitman and Professor
Paradice.
1. A scientist developed a theory that required proof through the construction of a
computer model. He hired a computer programmer to build the model, and the theory
was shown to be correct. The scientist won several awards for the development of the
theory, but he never acknowledged the contribution of the computer programmer.
The scientist’s failure to acknowledge the computer programmer was:
3. A student found a loophole in the university computer’s security system that allowed
him access to other students’ records. He told the system administrator about the
loophole, but continued to access others’ records until the problem was corrected two
weeks later.
The student’s action in searching for the loophole was:
The student’s action in continuing to access others’ records for two weeks was:
The system administrator’s failure to correct the problem sooner was:
8. A student enrolled in a computer class was also employed at a local business part-
time. Frequently her homework in the class involved using popular word-processing
and spreadsheet packages. Occasionally she worked on her homework on the office
computer at her part-time job, on her coffee or meal breaks.
The student’s use of the company computer was:
If the student had worked on her homework during “company time” (not during a
break), the student’s use of the company computer would have been:
9. A student at a university learned to use an expensive spreadsheet program in her
accounting class. The student would go to the university microcomputer lab and use
the software to complete her assignment. Signs were posted in the lab indicating that
copying software was forbidden. One day, she decided to copy the software anyway
to complete her work assignments at home.
If the student destroyed her copy of the software at the end of the term, her action
in copying the software was:
If the student forgot to destroy her copy of the software at the end of the term, her
action in copying the software was:
If the student never intended to destroy her copy of the software at the end of the
term, her action in copying the software was:
10. A student at a university found out that one of the local computer bulletin boards
contained a “pirate” section (a section containing a collection of illegally copied
software programs). He subscribed to the board, and proceeded to download several
games and professional programs, which he then distributed to several of his friends.
The student’s actions in downloading the games were:
The student’s actions in sharing the programs and games with his friends were:
11. State College charges its departments for computer time usage on the campus
mainframe. A student had access to the university computer system because a class
she was taking required extensive computer usage. The student enjoyed playing
games on the computer, and frequently had to request extra computer funds from her
professor in order to complete her assignments.
The student’s use of the computer to play games was:
14. One day, a student programmer decided to write a virus program. Virus programs
usually make copies of themselves on other disks automatically, so the virus can
spread to unsuspecting users. The student wrote a program that caused the
microcomputer to ignore every fifth command entered by a user. The student took his
program to the university computing lab and installed it on one of the microcomputers.
Before long, the virus spread to hundreds of users.
The student’s action of infecting hundreds of users’ disks was:
If the virus program output the message “Have a nice day,” then the student’s action
of infecting hundreds of users’ disks would have been:
If the virus erased files, then the student’s action of infecting hundreds of users’ files
would have been: