Computers are now used extensively by universities, colleges, and other institutions of learning throughout the United States. There are several important issues, which must be addressed with regards to the ethical use of computers and information technology by students.
One important issue is the security and privacy of communications. Learning institutions that do not encrypt e-mail should inform students that messages can be intercepted as they move through the network. There can also be modifications made to messages or their copies. For this reason, students should be aware that messages sent through the system should not be considered as confidential and may be similar to discussing something openly with another individual in a public place.
Another important issue for students is data integrity. Students should maintain their data with secure backups, which can be accessed if there is a data breach. Many times the best approach to this issue is to have a remote online backup of all important information.
Another agency which is based in the United States is the Institute of Electrical and Electronics Engineers (IEEE). This group is based in New York City and has over 400,000 members who are located in more than 150 countries. Approximately, half of these people are in the United States. This group is concerned with standards, including those regarding ethics in the information technology and computer science arena.
In addition to the IEEE and ACM, there are a number of other agencies in the United States, which have communities concerned with computer and information technology ethics. These agencies include the National Science Foundation (NSF) and the Defense Advanced Research Projects Agency (DARPA).
Computer and information technology ethics include the topic of computer crimes. These types of crimes can involve international spying done by hackers, computer viruses, breaches of confidentiality and privacy, theft of copyrighted material, breaches of patents, and a wide variety of other actions, which have been determined to be illegal.
The American laws regarding computer crimes can be divided into five general categories. These include those which protect data by ensuring it is consistently presented, the control of access to limited resources, the provision of unimpaired services, integrity of hardware and software, and the confidentiality and privacy of individuals and groups. For example, the willful distribution of a computer virus can fall into the category of a crime which affects the integrity of software. It may also impair services or the consistent presentation of data. Hackers generally engage in activities, which breach privacy or confidentiality laws.
The term "hacker" was originally coined during the 1960s and referred to an individual who did programming. Visionary pioneer programmers such as Steve Jobs or Bill Gates would have been included in this category. However, the term now is most often used to indicate individuals who have malicious intentions and hope to sabotage computer or information systems, spread viruses, or infiltrate networks.
There are many ways in which malicious hackers can adversely affect information technology and computers in the United States. These methods fall into the categories of spying on e-mail, creating zombie computers, gaining back door access, infecting systems or a computer with a virus, hacking of passwords, and the logging of keystrokes.
The penalties for hacking vary from one location to another in the United States. However, hacking often results in crimes, which are considered felonies and can involve substantial fines and jail terms. This is especially true when the activity of negatively affects the smooth operation of the United States government.
In the United States and many other developed countries, there is frequent reference made to an "information society." This refers to the crucial role now played by intangible assets, which comprise the increasing knowledge-based economy. In this situation, ethics regarding information systems and computers becomes increasingly important. The modern society has a wide range of information-intensive services. These include actions in the fields of insurance, finance, communications, property, and myriad forms of business.
Society in the United States is now faced with a situation in which there must be significant infrastructures designed for communication and information technologies. This involves the ever-changing complexity of these systems and evolving technologies. There must be laws and ethical codes developed, which take into account the relatively short life cycle of many types of new technology. There must also be an estimate made of the value of intangible items such as useful ideas.
IMPORTANCE OF THE ISSUES
As the United States becomes more reliant on computers and other types of information technology, the topic of ethics and laws regarding this technology become increasingly important. In fact, developing appropriate ethics and laws in the area of technology can be conceptualized as creating an infrastructure of knowledge. In order for the United States economy to operate properly, there must be an underlying physical infrastructure such as roads, railroads, airports, and hospitals. Similarly, there is an increasing requirement for a knowledge infrastructure which includes laws governing e-commerce, intellectual property rights, privacy, confidentiality, and the access to resources, which may be limited. The need for this knowledge infrastructure is quickly becoming as important as the physical infrastructure.
MESSAGE OF THE ANALYSIS
This analysis provides a clear message regarding the importance of ethics regarding information technology and computers in the United States. As the country becomes more reliant on being able to engage in communications and business transactions through linked computers, there are key ethical issues for these activities which must be addressed. These issues include areas such as campus ethics, community values, computer crimes, hacking, and the social impact of computer ethics. It is crucial that these items be resolved quickly and efficiently. The United States has the opportunity to become a worldwide leader in computer and information technology. In order to secure this honored status, the country will need to address the ethical issues involved.
There is an increasing trend for the global economy to become more reliant on computers and information technology. Like other highly-developed countries, the United States is merely several years ahead of the developing nations. This means that over the next few years and decades, advanced forms of information technology will become more common in other areas of the world. This will most likely result in a global economy which is ever more reliant on information technology, which is reliable and consistent. The ethical issues which are now faced by the United States and other technologically advanced societies set the stage for future resolutions of these problems globally.
Floridi, L. The Cambridge handbook of information and computer ethics. Cambridge University Press. Cambridge: UK.
Mingers, J., & Walsham, G. Toward ethical information systems: the contribution of discourse ethics. MIS Quarterly, 34(4), 833-854.
Brey, P. Values in technology and disclosive computer ethics. The Cambridge handbook of information and computer ethics, 41-58.
Masrom, M., Ismail, Z., Hussein, R., & Mohamed, N. An Ethical Assessment of Computer Ethics Using Scenario Approach. International Journal of Electronic Commerce.
Kenny, R., Pierce, J., & Pye, G. Ethical considerations and guidelines in web analytics and digital marketing: a retail case study. In AiCE: Proceedings of the 6th Australian Institute of Computer Ethics conference (pp. 5-12). Australian Institute of Computer Ethics.
Kuzu, A. Problems related to computer ethics: Origins of the problems and suggested solutions. The Turkish Online Journal of Educational Technology, 8(2), 1303-6521.
Iyadat, W., Iyadat, Y., Ashour, R., & Khasawneh, S. University Students and Ethics of Computer Technology Usage: human resource development. E-Learning and Digital Media, 9(1), 43-49.
A Professional Tool to Disavow Toxic Links and Extract Domain Names from URL / URI. Online. tomasz.com/domain-url-disavow-tool.html
Karim, N. S. A., Zamzuri, N. H. A., & Nor, Y. M. Exploring the relationship between Internet ethics in university students and the big five model of personality. Computers & Education, 53(1).
Aziz, A. A., Lokman, A. M., Ishak, S. A., & Yusof, Z. M. The social aspect of human computer activities: An investigation of information technology ethics. In User Science and Engineering (i-USEr), International Conference. IEEE.
Verify Your IP - Check and Confirm an IP address of other people. Online. verifyyourip.com
DiBiase, D., Harvey, F., Goranson, C., & Wright, D. The GIS Professional Ethics project: practical ethics for GIS professionals. Teaching Geographic Information Science and Technology in Higher Education.
Author InfoUniversity Campus Technology Editor
More about Author
Student editor of a university newspaper.