1 ethics and information technology in an academic environment catherine s. bolek, m.s. director,...

41
1 Ethics and Information Technology in an Academic Environment Catherine S. Bolek, M.S. Director, Office of Sponsored Research and Programs, Principal Investigator and IT Instructor April 2002 © 2002 University of Maryland Eastern Shore

Upload: phillip-barnett

Post on 17-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

1

Ethics and Information Technologyin an Academic Environment

Catherine S. Bolek, M.S.Director, Office of Sponsored Research and Programs, Principal Investigator and IT InstructorApril 2002

© 2002 University of Maryland Eastern Shore

2

Defining Ethics

“The field of ethics, also called moral philosophy,

involves systematizing, defending, and recommending

concepts of right and wrong behavior”.

Source: The Internet Encyclopedia of Philosophy 2001

3

Defining Technology

“The application of knowledge and skills for the achievement of

practical purposes (using technology and the Internet).

According to this definition, what might we consider

technology?

Simple tool technology (Chisel and Tablet)

Craft technology (Pen and Ink)

Mass production technology (Printing Press)

Electronic technology (Internet) ”

Source: Adapted from a site at University of North Carolina by Lippman.

4

Who Owns the Internet

It has no headquarters.

It has no central organization.

It is not regulated by federal agencies (yet).

No one officially monitors its content.

You cannot control how your messages are routed.

5

Major Ethical Issues and Information

Accessibility

Accuracy and Reliability

Free Speech and Censorship

Public and Private Use of Information

Economic Considerations

Intellectual Property and Copyright

Fair Use

Plagiarism

6

Major Ethical Issues and Information Technology

Accessibility

Accuracy and Reliability

Free Speech and Censorship

Public and Private Use of Information

Economic Considerations

Intellectual Property and Copyright

Fair Use

Plagiarism

Crime and Inappropriate Use

Security

7

If the Issues Remain the Same, What Has Changed?

Many of the Issues have Become “Enhanced” or “Intensified” as

a Direct Result of How We Access and Use Information in an

Electronic Environment. The Process Has Changed More Than

the Issues Have Changed.

8

Accessibility

What information does a person have a right to obtain?

What are the conditions under which a person can obtain information?

What are the safeguards that ensure access?

What should be done to address the “digital divide?

9

Accuracy and Reliability

Check to see whether the source is a moderated or an

unmoderated list or an anonymous FTP site.

Check online directory sources for affiliations and biographical

information.

Check and compare this source to other sources, both similar

and different ones.

Check archives of online lists for other works by this author.

Check reviews of online lists to assess the scope and purpose of

this one.

Source, D. Scott Brandt, 1996, Information Today, Inc.

10

Free Speech and Censorship

"As a matter of constitutional tradition, in the absence of

evidence to the contrary, we presume that governmental

regulation of the content of speech is more likely to interfere

with the free exchange of ideas than to encourage it. The

interest in encouraging freedom of expression in a democratic

society outweighs any theoretical but unproven benefit of

censorship."

Source: Justice John Paul Stevens, writing for the majority, Supreme Court Ruling, June 26,

1997.

11

Public and Private Use of Information

Use in the workplace

Use in public places (e.g., libraries)

Use in your home

Use in educational settings

12

13

14

Economic Considerations

Cost for Equipment and Peripherals

Cost for Internet Access

Access to Bandwidth

Cost and Time Related to Training

Recognition of the Important of Technology

E-Commerce

15

E-Commerce and B2B

Consumer Credit File Privacy

Shopping on Line

ID Theft

Online Investing

File Sharing

16

17

Intellectual Property

Patents – Inventions

Trademarks – Use of a Device to Identify Goods

Copyright – Literary Material and Artistic Performance

Designs - Products Appearance

Rights In Performance

Trade Secrets

Database Rights

Conditional Access Technology – Broadcasts and Other Types of

Transmission

Fair Use

18

Laws and Codes

Article 1, section 8

“Congress shall have the power…To promote the process of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries.”

Governance

Patent Act (35 U.S. Code)

Copyright Act (37 Code)

General Agreement on Tariffs and Trade

Case Law and Judicial Opinions

19

Plagiarism

“Is Cutting and Pasting the Enemy of Thought?”Source Jamie McKenzie, The Educational

Technology Journal, Vol. 7, No 8, May 1998

“Copy from one, it’s plagiarism; copy from two it’s research.”

Adlai Stevenson When Does Borrowing become Stealing?

Are new policies needed to cover electronic copying and inappropriate use?

20

21

22

23

24

Use “Goggle” to Catch Cheaters

Enter a sentence or sentence fragment enclosed in

“quotation marks" in the search line.

Verify with a second sentence or sentence fragment.

Print a hard copy and staple the original document

to the students paper and ask for an explanation.

Be prepared, the explanations are always great!

25

26

27

Crime and Antisocial Behavior

Viruses

Hacking

Internet Auction Fraud

Childhood Pornography

Solicitation of Minors

Hate Mail

Spamming and Junk Mail

Flaming and Foul language

28

Cost of Viruses

On April 13, 2002, a National Public Radio

reporter stated that the cost to businesses for

lost revenue and repair from the “love bug”

virus was between 5 and 15 billion dollars.

29

Internet Protection Acts

Children’s Internet Protection Act and

Neighbor Children’s Internet Protection Act

Appeals to prurient interest in nudity, sex, or excretion.

Depicts, in a patently offensive way, an actual or

simulated sex act.

Lacks serious literary, artistic, political, or scientific value.

30

Other Inappropriate Use

Illegal Downloads (e.g., Napster)

Hogging Bandwidth and Server Space

Game Playing (e.g., How Many Games of Solitaire are Allowed

in a Given Business Day)

Viewing Pornography in Common Lab Setting

Resetting Common Technology Equipment

Hoaxes

Chain Letters

31

Hoaxes Are High Cost Activities

According to the U.S. Department of Energy

If 50,000,000 people respond * 1/60 hour * $50/hour

the cost to business could be a staggering $41.7 million.

32

33

34

Why Don’t Chain Letters Work

Copies in Your Generation position

10 – 100 10 1,000 9 10,000 8 100,000 7 1,000,000 6 10,000,000 5

Source: Rutgers University Home Page on Chain Letters, April 2002.

35

36

Security

Breaches

Disruptions

Ensuring Intellectual Property

Ensuring Privacy and Confidentiality

Human Subjects

Protected Information

37

The Ethical Issues and Information Technology

Accessibility

Accuracy and Reliability

Free Speech and Censorship

Public and Private Use of Information

Economic Considerations

Intellectual Property and Copyright

Fair Use

Plagiarism

Crime and Inappropriate Use

Security

38

Ensuring the Best Outcome

Keep Informed.

Participate in Public and Professional Forums.

Let Legislators Know About Your Concerns.

Discuss These Issues with Your Students, Colleagues, and Your

Administrators.

Get Involved.

39

Ten Commandments for Technology Ethics

1. Thou shalt not use a technology to harm other people.

2. Thou shalt not interfere with other people's technology work.

3. Thou shalt not snoop around in other people's files.

4. Thou shalt not use technology to steal.

5. Thou shalt not use technology to bear false witness.

6. Thou shalt not use or copy software for which you have not paid.

7. Thou shalt not use other people's technological resources without authorization.

8. Thou shalt not appropriate other people's intellectual output.

9. Thou shalt think about the social consequences of the program you write.

10. Thou shalt use technology in ways that show consideration and respect. Adapted from Arlene Rinaldi and Florida Atlantic University, Copyright 1998

40

Thank You for Your Interest.

41

Contact Information

Catherine Bolek, MS

Director of Sponsored Research and Programs

University of Maryland Eastern Shore

Princess Anne, Maryland 21841

410-651-6714

410-651-7768 (fax)

[email protected]