Professional Documents
Culture Documents
AnswerThe term computer ethics was coined in the mid 1970s by Walter Manor to
refer to that field of applied professional ethics dealing with ethical problems
aggravated, transformed, or created by human technology. Computer ethics
is the analysis of the nature and social impact of computer technology, and
the formulation and justification of the policies for the ethical use of such
technology. Computer ethics examine the ethical issues surrounding
computer usage and the connection between ethics and technology. It
includes consideration of both personal and social policies for ethical use of
computer technology. The goal is to understand the impact of computing
technology upon human values, minimize the damage that technology can do
to human values, and to identify ways to use computer technology to
advance human values.
1.Examine the social and ethical issues arising out of the presence of
computers in the workplace.
AnswerThe social and ethical issues that can arise out of the presence of computers
in the workplace are:
Task Automation: At workplace, computers have become universal tools that
can in principle perform any task and hence pose a threat to jobs. They are
far more efficient than humans in performing many tasks. Therefore,
economic incentives to replace humans with computerized devices are very
high. In the industrialized world, many workers doing jobs as bank tellers,
autoworkers, telephone operators, typists, and graphic artists, have already
been replaced by computers. Even professionals like medical doctors,
lawyers, teachers, accountants, and psychologists are finding that computers
can perform many traditional duties performed by workers and professionals.
On the other hand, the computer industry has generated a wide range of new
jobs in the form of hardware engineers, software engineers, system analysts,
webmasters, information technology teachers, and computer sales clerks.
Even when a job is not eliminated by computers, the job profile could be
radically altered. An airplane pilot may be assisted by computers to make
choice about the best landing times and air corridor selection. So, job gains
and losses are to be viewed in the context of the society we live in.
Health and Safety: Another workplace issue concerns health and safety. Often
radiation from machines, repetitive injuries, and posture related problems are
common at computer dominated workplaces. Another concern is poisonous
non biodegradable computer waste, which is causing a major threat to the
environment. When information technology is introduced into the work place,
it is important to consider the likely impact upon health and job satisfaction
of workers who will use it. The advent of stress in the workplace due to the
introduction of computers is becoming more and more evident.
Employee Monitoring: Another major concern is the employee monitoring or
surveillance by the organizations using sophisticated computer driven
technology. Some amount of monitoring may be vital for protecting the
interest of the employer and to increase productivity, but excess of such
surveillance can becomes unethical.
Global networks like the Internet and especially the World Wide Web (WWW)
are connecting people all over the globe. Efforts are on to develop mutually
agreeable standards of conduct and efforts to advance and defend human
values. Globalization has led to the discussion of the following issues:
Global Laws: Over 200 countries are already interconnected by the Internet.
Given this situation, what is the effect and impact of the law of one particular
country on the rest of the world? Issues regarding freedom of speech,
protection of intellectual property, invasion of privacy vary from country to
country. The framing of common laws pertaining to such issues to ensure
compliance by all the countries is one of the foremost questions being
debated.
Global Cyber Business: Technology is growing rapidly to enable electronic
privacy and security on the Internet to safely conduct international business
transactions. With such advanced technology in place, there will be a rapid
expansion of global cyber business. Nations with a technological
infrastructure already in place will enjoy rapid economic growth, while the
rest of the world will lag behind. This disparity in levels of technology will fuel
political and economic fallout, which could further widen the gap between the
rich and the poor.
Global Education: Inexpensive access to the global information net for the
rich and the poor alike is necessary for everyone. However the impact of this
sudden and global education on different communities, cultures, and religious
practices is likely to be profound. The impact on lesser known universities
would be felt as older well-established universities begin offering degrees and
knowledge modules over the Internet.
Global Scope: The Internet has a global reach. Internet technology has much
broader scope and access than conventional modes of communications and
data retrieval. With little effort, a user can reach hundreds and thousands of
individuals around the globe. The ability to reach many people quickly and
easily is not exactly new or unique compared to radio or television
communication. But the significant difference between the Internet and
television and radio is that in the case of radio and television, communication
is in most cases one way whereas in the case of Internet it is interactive. It is
this interactivity, which is the unique characteristic of the Internet. Not just
interactivity, customizability, easy usability, and accessibility are also distinct
features of Internet.
Anonymity: The second important feature of the Internet is that it provides a
certain kind of anonymity. On the Internet, individuals have the possibility of
creating a different profile, ensuring that information about them cannot be
traced while in communication with others on the Internet. It is a silent
feature of Internet communication and people can deliberately avoid seeing
or hearing one another directly. Anonymity makes accountability for ones
action difficult to achieve and tends to diminish trust in the information that
is being exchanged. The feature of anonymity has also facilitated the
development of virtual information.
The open and anonymous nature of communications on the web, has led to
the development of software with stealth to gather information intelligently.
An inference is made from information gathered without our knowledge or
consent, which is termed as virtual information. This type of information
adds information to a persons profile and tends to redefine a persons digital
persona. This is an invasion of ones virtual privacy.
Reproducibility: The third feature is not just a feature of the Internet, but of
information technology in general. Electronic information exists in the form
that makes it easy to copy without any loss of originality or value in the
process of reproduction. Copied data or software is perfectly usable. Copied
data or software leaves no evidence behind and the creator/owner of the data
or software could remain unaware of their work being copied. Reproducibility
facilitates anonymity.
prevalent:
One approach or school of thought believes that it is important to examine an
issue under independently justified principles of what one considers being
right. The idea here is to follow the principles that articulate what is morally
right irrespective of the consequences. This is referred to as deontological
approach. In this approach, one starts out with one or more moral principles
and see how they apply to particular cases.
The other school of thought believes that it is important to look for the course
of action that maximizes the good. This approach involves determining which
action yields the best consequences measured in some standard of the
good or morality. This approach referred to as teleological approach
involves deciding on what is good for population. It also spells out what is
wrong with actions that interfere with attempts to get it.
Internet can also be used by businesses for managing their records and they
can make use of electronic bookkeeping. An on-line banking service is
another area, which can be used by the businesses. These services can be
used for funds transfer, payroll management, and electronic bill payment.
from the executive director, support from the board, and the presence of a
"key user" staff person.
The Internet enables an organization to strengthen relationships with its
current audiences as it enables targeted, fast, and consistent communication.
It can also enable nonprofits to reach out to new audiences through effective
use of search engines and "viral marketing".
Strategic use of technology is likely to require long-term collaborations with
for-profit and nonprofit partners.
Technology can be used to mobilize people globally around a common cause
to achieve world-changing results far beyond the promise of enabling
nonprofit organizations to perform important functions, such as fundraising
and recruiting volunteers more effectively.
Legislation is the most fertile source of law. Subject to limitations flowing from
the constitutional doctrine, that matters of policy cannot be delegated, the
legislature can vest a subordinate authority with power to make rules, orders,
etc.
It is different from codified law because codified laws are made formally by a
law making body of people, where as common laws have their enunciations
through decisions of courts.
card frauds, non-availability of web and application servers, and new virus
attacks are common. These defacements are done by hackers and this
process is called as hacking.
Software piracy and other forms of product piracy: This includes illegal access
of computer programs. It also includes copying the softwares of the
individuals to gather more information.
Damages: The party who has broken the contract needs to pay compensation
for any loss or damage that has occurred to the party with whom such a
contract was entered into.
Specific performance of the contract: In certain cases, the court directs
against the party in default for the "specific performance" of the contract.
This means that the party will be asked to perform the obligations that he
needs to perform according to the contract.
Injunction: An injunction is a preventive relief and is granted at the discretion
of the court. The discretion of the court is not arbitrary but is guided by
judicial principles. A further check on the discretion is the provision for
correction through an appeal in a higher court.
But the certifying authority can revoke a digital signature certificate issued by
it, if required.
3. Explain the difference between the system of Hash Value Creation and
Asymmetric key Encryption
Answer-
2. What is UNCITRAL?
AnswerUNCITRAL stands for United Nations Commission on International Trade Law.
UNCITRAL was established by the General Assembly in 1966 (Resolution
2205(XXI) of 17 December 1966). The General Assembly gave the
Commission the general mandate to further the progressive harmonization
and unification of the law of international trade. The Commission has since
come to be the core legal body of the United Nations system in the field of
international trade law.