1 ethics and information technology in an academic environment catherine s. bolek, m.s. director,...
TRANSCRIPT
1
Ethics and Information Technologyin an Academic Environment
Catherine S. Bolek, M.S.Director, Office of Sponsored Research and Programs, Principal Investigator and IT InstructorApril 2002
© 2002 University of Maryland Eastern Shore
2
Defining Ethics
“The field of ethics, also called moral philosophy,
involves systematizing, defending, and recommending
concepts of right and wrong behavior”.
Source: The Internet Encyclopedia of Philosophy 2001
3
Defining Technology
“The application of knowledge and skills for the achievement of
practical purposes (using technology and the Internet).
According to this definition, what might we consider
technology?
Simple tool technology (Chisel and Tablet)
Craft technology (Pen and Ink)
Mass production technology (Printing Press)
Electronic technology (Internet) ”
Source: Adapted from a site at University of North Carolina by Lippman.
4
Who Owns the Internet
It has no headquarters.
It has no central organization.
It is not regulated by federal agencies (yet).
No one officially monitors its content.
You cannot control how your messages are routed.
5
Major Ethical Issues and Information
Accessibility
Accuracy and Reliability
Free Speech and Censorship
Public and Private Use of Information
Economic Considerations
Intellectual Property and Copyright
Fair Use
Plagiarism
6
Major Ethical Issues and Information Technology
Accessibility
Accuracy and Reliability
Free Speech and Censorship
Public and Private Use of Information
Economic Considerations
Intellectual Property and Copyright
Fair Use
Plagiarism
Crime and Inappropriate Use
Security
7
If the Issues Remain the Same, What Has Changed?
Many of the Issues have Become “Enhanced” or “Intensified” as
a Direct Result of How We Access and Use Information in an
Electronic Environment. The Process Has Changed More Than
the Issues Have Changed.
8
Accessibility
What information does a person have a right to obtain?
What are the conditions under which a person can obtain information?
What are the safeguards that ensure access?
What should be done to address the “digital divide?
9
Accuracy and Reliability
Check to see whether the source is a moderated or an
unmoderated list or an anonymous FTP site.
Check online directory sources for affiliations and biographical
information.
Check and compare this source to other sources, both similar
and different ones.
Check archives of online lists for other works by this author.
Check reviews of online lists to assess the scope and purpose of
this one.
Source, D. Scott Brandt, 1996, Information Today, Inc.
10
Free Speech and Censorship
"As a matter of constitutional tradition, in the absence of
evidence to the contrary, we presume that governmental
regulation of the content of speech is more likely to interfere
with the free exchange of ideas than to encourage it. The
interest in encouraging freedom of expression in a democratic
society outweighs any theoretical but unproven benefit of
censorship."
Source: Justice John Paul Stevens, writing for the majority, Supreme Court Ruling, June 26,
1997.
11
Public and Private Use of Information
Use in the workplace
Use in public places (e.g., libraries)
Use in your home
Use in educational settings
14
Economic Considerations
Cost for Equipment and Peripherals
Cost for Internet Access
Access to Bandwidth
Cost and Time Related to Training
Recognition of the Important of Technology
E-Commerce
15
E-Commerce and B2B
Consumer Credit File Privacy
Shopping on Line
ID Theft
Online Investing
File Sharing
17
Intellectual Property
Patents – Inventions
Trademarks – Use of a Device to Identify Goods
Copyright – Literary Material and Artistic Performance
Designs - Products Appearance
Rights In Performance
Trade Secrets
Database Rights
Conditional Access Technology – Broadcasts and Other Types of
Transmission
Fair Use
18
Laws and Codes
Article 1, section 8
“Congress shall have the power…To promote the process of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries.”
Governance
Patent Act (35 U.S. Code)
Copyright Act (37 Code)
General Agreement on Tariffs and Trade
Case Law and Judicial Opinions
19
Plagiarism
“Is Cutting and Pasting the Enemy of Thought?”Source Jamie McKenzie, The Educational
Technology Journal, Vol. 7, No 8, May 1998
“Copy from one, it’s plagiarism; copy from two it’s research.”
Adlai Stevenson When Does Borrowing become Stealing?
Are new policies needed to cover electronic copying and inappropriate use?
24
Use “Goggle” to Catch Cheaters
Enter a sentence or sentence fragment enclosed in
“quotation marks" in the search line.
Verify with a second sentence or sentence fragment.
Print a hard copy and staple the original document
to the students paper and ask for an explanation.
Be prepared, the explanations are always great!
27
Crime and Antisocial Behavior
Viruses
Hacking
Internet Auction Fraud
Childhood Pornography
Solicitation of Minors
Hate Mail
Spamming and Junk Mail
Flaming and Foul language
28
Cost of Viruses
On April 13, 2002, a National Public Radio
reporter stated that the cost to businesses for
lost revenue and repair from the “love bug”
virus was between 5 and 15 billion dollars.
29
Internet Protection Acts
Children’s Internet Protection Act and
Neighbor Children’s Internet Protection Act
Appeals to prurient interest in nudity, sex, or excretion.
Depicts, in a patently offensive way, an actual or
simulated sex act.
Lacks serious literary, artistic, political, or scientific value.
30
Other Inappropriate Use
Illegal Downloads (e.g., Napster)
Hogging Bandwidth and Server Space
Game Playing (e.g., How Many Games of Solitaire are Allowed
in a Given Business Day)
Viewing Pornography in Common Lab Setting
Resetting Common Technology Equipment
Hoaxes
Chain Letters
31
Hoaxes Are High Cost Activities
According to the U.S. Department of Energy
If 50,000,000 people respond * 1/60 hour * $50/hour
the cost to business could be a staggering $41.7 million.
34
Why Don’t Chain Letters Work
Copies in Your Generation position
10 – 100 10 1,000 9 10,000 8 100,000 7 1,000,000 6 10,000,000 5
Source: Rutgers University Home Page on Chain Letters, April 2002.
36
Security
Breaches
Disruptions
Ensuring Intellectual Property
Ensuring Privacy and Confidentiality
Human Subjects
Protected Information
37
The Ethical Issues and Information Technology
Accessibility
Accuracy and Reliability
Free Speech and Censorship
Public and Private Use of Information
Economic Considerations
Intellectual Property and Copyright
Fair Use
Plagiarism
Crime and Inappropriate Use
Security
38
Ensuring the Best Outcome
Keep Informed.
Participate in Public and Professional Forums.
Let Legislators Know About Your Concerns.
Discuss These Issues with Your Students, Colleagues, and Your
Administrators.
Get Involved.
39
Ten Commandments for Technology Ethics
1. Thou shalt not use a technology to harm other people.
2. Thou shalt not interfere with other people's technology work.
3. Thou shalt not snoop around in other people's files.
4. Thou shalt not use technology to steal.
5. Thou shalt not use technology to bear false witness.
6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other people's technological resources without authorization.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you write.
10. Thou shalt use technology in ways that show consideration and respect. Adapted from Arlene Rinaldi and Florida Atlantic University, Copyright 1998
41
Contact Information
Catherine Bolek, MS
Director of Sponsored Research and Programs
University of Maryland Eastern Shore
Princess Anne, Maryland 21841
410-651-6714
410-651-7768 (fax)