ETHC303 Full Summary
ETHC303 Full Summary
ETHC303 Full Summary
Morality: system of rules that guide human conduct. There are two types, directives (micro)for
individuals and social policies for society (macro) and the principles that evaluate the rules
3- to convince someone to adopt or reject 4- provide consistencies and logic for our
a certain position beliefs
1- they identify what it means to do the 2- they assume people have free will to
right thing make their own rational decisions
3- their goal is to contribute to the well- 4- they distinguish
being of society obligations& responsibilities vs choice
and personal preference
Goals of ethical principles:
chapter 2
pov of the world:
1- selfish
2- ethical: respect others and their core values
Ethical theories:
1- Subjective Relativism
Relativism: no norm of right or wrong
Subjective relativism: each person decides what’s right and wrong
3- Ethical Egoism
The morally right action is the action that provides self with maximum long term benefit
4- Duty-based(Kantianism/Deontology)
Created by Immanuel Kant
Said that having a good will give a reason to do the right thing
1st formulation: act only from moral rules you want to be universal
“if you do it everyone should do it. its not fair to make an exception to yourself’’
Examples:
- you forgot your wallet and you’re hungry so you steal and if you approve of stealing
whether you admit it or not then what you’re doing is universalizing your action. You’re
saying everyone should steal
2nd formulation: act so you treat humanity and yourself as an end and never a
mean to an end
“Don’t use people to achieve stuff if they don’t consent to that”
“don’t manipulate people to purely use them”
The case for katanism:
1. rational
2. produces moral guidelines
3. treats people as moral equals
4. workable
5- Act Utilitarianism
By: Jeremy Bentham and john Stuart mill
An action is good if it benefits someone and bad if it harms someone. Morality has nothing to do
with it.
Sum>0 its good
Sum <0 its bad
6- Rule Utilitarianism
We should adopt rules which if followed by everyone will increase overall happiness
Difference between act and rule utilitarianism
Act utilitarianism applies Principle of Utility to individual actions
Rule utilitarianism applies Principle of Utility to moral rules
We need rules and rules create morality and rational people accept these rules for their benefit
8- Principle of justice
By: john rawl
Each person may claim a “fully adequate” number of basic rights and liberties, so long as these
claims are consistent with everyone else having a claim to the same rights and liberties
Any social and economic inequalities must:
• Be associated with positions that everyone has a fair and equal opportunity to
achieve
• Be to the greatest benefit of the least-advantaged members of society (the
difference principle)
Chapter 3
Profession: a calling that requires specialized knowledge and academic preparation
- states the principles and core values to the work of a particular occupational group
- promotes the values of the profession over personal, societal, and sometimes institutional
t/f
- most organizational follow a unified code of ethics
F they usually have an internal code
- Members in an organization share the same human values and social ideals
T
Function of ethics?
1. Accountability
o Can make members of professions accountable to colleges and public
2. Enforcement
o It enables organizations to encourage and enforce standards of good practice and
compliance with norms by identifying ethically unacceptable behavior
3. Tool
o Useful for decisions for computer practitioners
Format of ethics?
1. For different roles: acm
2. For different groups: imis
3. For professional relations: software engineering code of ethics
4. Most straightforward: ieee
5. For leadership: acm, bsc
1. software specifications
Most errors are because of requirements shortages
Non-diligence: when important documents are not fully reviewed and failure happens when they
don't evaluate specs carefully or pay attention to staff when they voice concerns
2. Software design
Ie: user interface, designers don’t know everything about all the systems they designed for
instance the it department doesn’t know how to work on edugate without explaining
Solution: communication
3. Extreme pressure
Mea culpa:sorry for that, When a product is released with bugs
Canceled vacation syndrome: when manager pressure staff to cancel plans for the projects
Using an effective methodology protect s from legal liability since it reduces errors and follows
methods that are harder to prove
2. Quality assurance
methods within development to guarantee reliability of operation of product
Multiple software are unlikely to fail at the same time under the same conditions
1. Invasion of privacy
A company can make admins monitor browsing and emails and they can feel its unethical if they
don't have any clause in their contracts that allows them to do so
2. Equality in reporting
Admins use their values to decide if the infraction is worthy of report and decide which
employees will get in trouble
3. Sensitive information
They know sensitive information about the company’s business practices. So if they move to
another company they should decide if they can use that know and if they signed any contracts
4. Whistle blowing
They can come across unethical or illegal activities and have to decide to report or not
6. Consultation fees
Security consultants can exploit companies fear for money
Terms:
Ethical behavior: how an individual or an organization ensures that all decisions, actions and
stakeholder’s interactions conform to the individuals organizations moral and professional
principles
Chapter 5
Types of phishing?
8. Stay in control and search for a website through a web engine dont click on hyperlinks
9. Email hijacking is rampant
10. Foreign offers are fake
Terms:
Phishing: obtaining personal information such as credit card numbers through fraudulent emails
to look authentic
spear phishing: targeted attack on a specific individual
Whaling: targeting people within an organization
Phishing test: allows you to find if your team is vulnerable to attack before they happen and
take the proper measures
Vishing: phishing on the phone
Smshing: the act of using mobile text messages to lure victims into immediate action such as
downloading malware
Impersonation: pretexting another person with the goal of obtaining information or access to a
person, company, or a system
Dumpster diving: a huge amount of information collected through company dumpsters
Social engineering: manipulating people for information
Chapter 7
Cybercrime: a crime that involves computers
Data diddling: unauthorized altering of data and then changing it back when processing is done.
Salami attack: financial crimes. Make modifications in a single case that would go unnoticed
since they’re so small.
Trojans: keyloggers
Web jacking: taking complete control of a website for monetary of political purposes for a
ransom.
Email spoofing: forgery of email hears so that they fake the recipient of that email.
Credit card skimming small device to steal card info in a transaction.
Identity theft: imposter gets a hold of key information and use it to impersonate.
Domain name dispute: two domains in the same name to attract people.
Classifications of cybercrime:
1. Individuals
1.1. Email spoofing
1.2. Spamming
1.3. Phishing
1.4. Cyberstalking
1.5. Cyber defamation
1.6. Cyber pornography
2. Property
2.1. Credit card skimming
2.2. Intellectual property crimes
2.3. Software piracy
2.4. Identity theft
2.5. Ddos attack
2.6. Hacking
2.7. Virus
2.8. Cybersquatting
2.9. Copyright infringement
2.10. Ipr violations
3. Government
3.1. Dos attack
3.2. Email bombing
3.3. Logic bombing
3.4. Data diddling
3.5. Sale of illegal articles
3.6. Cyber terrorism
3.7. Cyber warfare
3.8. Pirated software
3.9. Accessing confidential information
1. Enhancement of IS
2. Protection of rights of computing
3. Protection of public interest, morals, common values
4. Protection of national economy
penalties of cybercrime:
Chapter 6
Copyright term: laws guarantee copyright for an amount of time
Wipo: world intellectual property rights, a UN agency, which provides protection over digital
media
Patents: strongest protection for software since the inventor has monopoly over the use of that
invention
Plagiarism detection systems: check submitted material against databased of electronic content
Reverse engineering: taking sw or hw apart to understand it, copy it, improve it
Intellectual objects: what intellectual property consists of, intangible objects that represent ones
ideas or works
Elements in a property:
1. Individual
2. Object
3. Relation to individual
1. Anglo-American law
Rationale is a type of natural right that should be granted to individuals since they require
thinking and work.
- hardware have patent rights and intellectual property rights thus SW’s should also have it
1. macro
whether or not software should be protected by private property
2. micro
whether or not an individual can make an illegal copy of SW
1. Copyright laws
Protects authored works such as software, art etc.
2. Patent laws
Protects inventions.
3. Trade secret law
Helps safeguard information to an organization success.
Goals of patents:
1. Foster invention
2. Promote disclosure of inventions
3. Assure ideas in the public domain are free use
Results of patents:
1. Improve the economy
2. Increase the employment
3. Make lives better
Types of patents:
1. Utility patent: granted in terms for 17 years which can be extended for 5
2. Design patent
3. Patent on plants
Lets say I kept my invention a secret then I got fussy when someone else claimed it, do I
have the legal right?
No, patents are recognized when they’re publicized
The patent claim must be:
1. A process, machine, manufacture, composition of matter, new improvement
2. Must be useful
3. Must be novel
4. Must be not obvious to a person having ordinary skill in the same field
1. Patents:20 years
2. Plant varieties: 20 years
3. Industrial designs:10 years
4. Layout designs of circuits: 10 years
Chapter 6.2
Copy protection systems: They vary in features, and one widely used to be Software Passport
(previously known as Armadillo). These cost something, but they’ll save time, nerves, and
money in a long run. If you choose to use this kind of anti-piracy options
Demo and Full versions: Simply create separate versions of your product. Your demo version
might contain only 30% of the assets, and when people purchase the full version, you can give
them the full 100% of the elements. It’s very practical and inexpensive way to copy protect your
program.
Online Registration: If you have features that require Internet, you can use online copy
protection for your product.
Discount / Lower prices: Some people say that this might help getting rid of some pirates. The
problem with this approach is naturally that when you lower your price, you get less profits per
sale. Then the problem continues: lowering your product price doesn’t not necessarily lead to
increased sales.
Give for Free: Some people have done radical moves and are giving their product for free.
These guys might use advertising to generate income while providing their product for no cost.
Legal Action: If your product ends up hacked and into some illegal site, contact the internet
service provider and legal authorities. You should threaten the pirates if it is possible with a law
suit. As a last resort you should go for a legal action.
T or f
- Culture plays a factor in piracy.
T