The computer is considered one of the most technological advances of the twentieth century. As the general public becomes increasingly computer literate,’ the gap between technology and peoples’ intellect notably shrinks. The readily available computers, software, and assorted output devices have enlightened many but, in turn, have increased the using of computers for unethical activities, privacy invasion and illegal purposes. Legal sanctions against abusive use of computers are a reactive approach. A proactive approach is to teach students about computer ethics in classrooms. Effective teaching methods are the presentation of ethical scenarios. It is anticipated that through this method, students will personalize the need for developing ethical standards of behavior. The ultimate goal is for students, if necessary, to change their set of personal beliefs to include ethics. The computer is considered one of the most important technological advances of the twentieth century. Security and privacy issues have been in existence long before the computer became a vital component of organizations’ operations. Nevertheless, the operating features of a computer make it a dangerous tool. Computer technologies with reliable error detection and recording capabilities, permit the invasion of a supposedly secure environment to occur on a grand scale and go undetected withought any suspicion . Furthermore, computer and communications technology permits the invasion of a persons’ privacy. Two forces threaten privacy: one, the growth of information technology with its enhanced capacity for surveillance, communication, computation, storage and retrieval and two, the more dangerous threat, the increased value of information in decision making. Information has become more vital in the competitive environment, thus, decision makers want it even if it violates somebody else’s privacy. Violation of ones personal privacy, via computers may in part be due to the unclear understanding of responsibility on the part of those involved. Is it a management or a technical concern? Ethical standards that evolved over the history of civilization deal with interpersonal relationships. What is right or wrong? What one should do and not do when dealing with other people. Ethical behavior in a business environment has not been as clearly defined. When businesses were small and owned by only a few individuals, traditional ethical standards were applied to meet different situations. However, as businesses became larger, the ethical relations did not provide any clear behavioral guidelines. Likewise, the principles of ethical relationships were even less relative to the corporate environments. Recently, there has been an increased interest in ethical standards for computer professionals. This concern is heightened by the current focus on the people side’ of computer security. Is it a violation of copyright laws to copy software? Is this as serious as stealing’ data or illegally infiltrating and viewing data in a computer database? As the general public becomes increasingly computer literate’, the gap between technology and people’s intellect noticeably shrinks. Computer systems are no longer composed of one large, simple, straightforward batch-oriented computer. They are now integrated real-time currently available computers, software, and assorted output devices that have enlightened many. The danger is now more apparent that computer abuse will soon increase dramatically if it is not cut short by legal methods and if people do not adapt some code of ethic. Sometimes people display ethics when it is convenient and to their advantage. At other times they set any ethical standards aside by rationalizing that there is a greater good that should be considered. Unfortunately ethical behavior is not part of the law of nature, but part of a person’s set of beliefs and behavior. An important aspect of computer users ethical abuse includes the privacy question. Why exactly is a person’s privacy important? There is no simple answer to this question, as long as people have concerns and commitments that may be harmed by personal disclosures. There are several reasons why medical records should be kept private, having to do with the consequences to individuals, facts concerning them becoming public knowledge. The average patient does not realize the importance of the confidentiality of medical records. Passing out information on a S.T.D can wreck a marriage. Revealing a pattern of alcoholism or drug abuse can result in a person losing his job or make it impossible for the person to obtain a job or insurance protection. When people apply for credit they are often investigated, and the result is a file of information about them. Now there is something to be said in favor of such investigations. Organizations granting credit need to know if the credit applicants are financially reliable. The trouble is that all sorts of other information go into such data bases. For example, it is possible that information exists about the applicant’s organization membership, political views, and so forth. obviously it is unfair for one’s application for credit to be influenced by such irrelevant matters. We live in an information-based society. More and more institutions are collecting data about people and their activities. Every time you get on an airplane, rent a car, apply for a job, register in a educational institution, you voluntarily cause a file to be created. You may also become another entry on an existing file. These are not temporary files since most of them are permanent or occasionally modified. These types of files can be used to relate you to others and come up with conclusions such as: Who are you traveling with? Have you rented a car from this agency before and where did you rent it? Who else registered with you? There can be many other implications. Namely, any institution that gets a computer inevitably figures out ways to fill the computer to capacity. And when it’s filled to the capacity, it goes out and gets itself another computer. What is the solution to the increasing penetration of computers that violate security and invade a person’s privacy? Are laws and legal methods the only resolution? The primary problem with relying on legal methods to protect information and punish violators is that they are reactive approaches. A proactive approach is teaching students about the need for ethical standards of behavior for computer professionals and computer users in the classrooms. This may help assure that people who have an ethical code of behavior will not be tempted to illegally penetrate and copy data. The first issue which students should be introduced to is ethical standards of behavior when using computers. The second issue is when this exposure takes place. The need for clear ethical standards can penetrate one’s life and should be a topic for discussion in all disciplines. However, this paper is concerned only with cultural-related disciplines. Maybe the eighteen year old freshman in an introductory computer course can be exposed to ethical standards for computer users. Yet, the curriculum of this course covers many other important topics. Upper level students majoring in computer information systems or computer science are a better group for developing a teaching method for imprinting ethical standards of conduct when using computers. These topics can be taught as one computer-related course or included in the curriculum of another course. There are different classroom procedures for exposing students to the abstract subject of computer users ethical behavior. I prefer the presenting scenarios for discussion. However, most teachers do not like to experiment with new teaching methods, some prefer to stay with a teaching style that is comfortable and familiar. Therefore, what I believe is the most desirable approach may not be everybody’s approach. Before listing the three methods for teaching ethical standards, the computer- specific ethical issues are as follows:
2. Producing computer programs. Computer programs are assets. Should they be subject to the same concepts of ownership as other assets?
4. Artificial intelligence and Expert Systems. Should the images of computers as thinking machines and replacements for human errors and as humanlike in nature declare them from any serious considerations. These roles of computers specify a starting point for developing a method for conveying the need for ethical standards for conduct for computer users. The first teaching approach to teaching of ethics is to inform that ethics is a code of behavior or begin with a clearly defined dictionary definition of ethics. “A set of principles of right conduct; A theory or a system of moral values” or put quite simply knowing the difference between right and wrong. In turn, specify the risks and implications of the abuse of computer systems. These could be a series of lectures in a computer course. This method will inform students about the meaning of ethics. Will this excite students and ensure they will adopt the “right” behaviors? Maybe, yet lectures are often the least effective way for students to learn and reflect beyond a casual examination of any lecture notes. The second method to fill students with a sense of an ethical code of behavior is to assign readings in current periodicals and newspapers and have them point out how some action or irresponsibility displayed is a contradiction to a ethical code. There are many articles about professionals adapting to and violating real-life ethical issues. However, a majority of the students need to evaluate their own ethical behavior code before they can consider anyone else’s. The third method is to get each student to personalize the topics of computer ethics by the presentation of scenarios. A typical scenario for a student is as follows: A company bought a Microsoft computer program for a part time student to use at work. The license agreement states, “You should make a backup copy of this program, but you may only use the program on a single machine at any one time.” Knowing you have permission to make a backup, why not make other copies for friends? They only use one computer each and these are backup copies. After all, making backups appears to stick to the “spirit” of the license agreement. Was this student’s action in giving copies of the program to friends acceptable or unacceptable? Since this particular case requires personal interpretation of copying software, a common problem for students, it can become immediately relevant. Another scenario that includes ethical issues relative to student behavior is as follows: A university student gets a part-time job as a data entry clerk. His job was to enter personal student data into the university database. Some of this data was available in the student directory, but some of is it was not. He was attracted to a girl in his algebra class and wanted to ask her out. Before asking her, he decided to access her records in the database to find out about her background. Were the student’s actions in accessing a fellow student’s personal information acceptable or unacceptable? Initially ask students to write answers anonymously to the questions posed by that scenario. In a separate paragraph ask them to determine what they would do in that situation. Having a class discussion of the scenario and responses allows the students to hear other viewpoints and alerts them to issues that they might not have previously considered. Choosing scenarios that are more relevant to students are more likely to result in a student’s interest of the situation. A meaningful sequence of scenarios may alter student’s attitude toward a code of ethical behavior. The subject of the scenarios can move to examples of business situations. These can cause the student to reason their possible ethical behavior in their future. The teacher can act as an information source concerning the legal issues of a scenario, but not express their own personal ethical attitude to a scenario. For the reason that we do not want the teacher influencing any ideas or questions that may be brought up by any of the students. Examples of business-oriented scenarios are as follows: An employee at the metropolitan courthouse had access to all the records in the data base. Over the past weeks, she had become suspicious about her neighbor’s current purchases. The neighbor had bought new lawn furniture, had her house painted and gotten a new expensive car. The employee decided to access her neighbor’s records to determine how this neighbor could afford these purchases. Was the courthouse employee’s action acceptable, or unacceptable? If the employee suspected that the neighbor might be involved in criminal activity, would that make her actions acceptable? A computer programmer enjoyed building computer systems to give to his friends. He would frequently go to his office on Saturday when no one was working and use his employer’s computer in his office to develop systems for his friends. He did not have to sneak in to the building and he had to sign a register at a security desk each time he entered on the weekends. Was the programmer’s use of the company computer in his office acceptable or unacceptable? A combination of the three instructional approaches can be an entire curriculum, or a significant part of another curriculum. Lectures, readings and experimental teaching seem to actively involve students in the learning process. Teaching standards for ethical behavior has two primary objectives. The first is the teacher’s emphasis on the importance of the subject. The second is to attempt to motivate students to incorporate a code of ethics into their behavior. Likewise, the objective is to ensure that ethical concerns are always a motive for following this code, not just when it is convenient. A beginning step of the teaching process is encouraging students to dissipate in scenario discussions. The next step is to make students think about how they with react and personally handle these different issues. The ultimate goal is the modification of the students’ ethical behavior, if necessary.