The misuse of computer and information technology and
unethical behaviour towards this facilities have caused to losses to the
business and society. People are usually do not realize that sometimes they are
not practised the ethical or IT code of conducts. Especially who had good
knowledge and experienced in information technology and practitioners as well.
They do not equip themselves with good ethics and do not practise do and don’ts
while using the IT.
Ethics is a principles and standards that guide our
behaviour toward other people. According to Quinn (2006), ethics is the
philosophical study of morality, a rational examination into people’s moral
beliefs and behaviour. To protect the moral and avoid the misused of the IT,
computer ethics is currently practising as part of the core curriculum for all
computer science majors. The need of students to understand the basic cultural,
social, legal and ethical issues in the discipline of computing today is a
vital.
As the owner of the business and user of the information
technology, do you know how to handle the scenario as when you found your
employees search the organizational databases for sensitive corporate and
personal information to the outsiders? (Example; in private hospital, the
patient record is being sell to the insurance company), when the company
collect, buy and use information without checking the validity or accuracy of
the information? (Example; bankers and car dealers), when the individuals
create and spread viruses that cause trouble for those using and maintaining IT
systems, when the individual or your friends hack into computer systems to
steal propriety information or your employees destroy or steal propriety
company information such as schematics, sketches, customer lists and financial
reports?
By understanding of our rights, concepts and terms
related to ethical issues also is very important for us to know. Perhaps we are
more protected.
Pirated
Software is the unauthorised use, duplication, distribution or sale of copyrighted
software.
Copyright
is the legal protection afforded an expression of an idea such as a song,
video game and some types of proprietary documents.
Example
of scenario in Malaysia is, KRU Productions was initiate and launched the
campaign against the piracy of local artist towards their songs album supported
by Malaysia Government.
Intellectual Property is the intangible creative work that is embodied in physical form.
Example of scenarios that related to the IP case is, Jason R is a designer and posted a Star Wars web site. Once the site started receiving 40,000 hits a day, he received a call from Luca Film asking him to shut it down. He later posted excerpts of the phone conversation on his web site. Luca Film later was flooded with angry e-mail messages from fans who felt the company was exerting totalitarian control over products to which they felt a deep personal connection.
Counterfeit Software is the software that that is manufactured to look like the real thing and sold as such.
Example of scenario in Malaysia is, to protect their products Hewlett Packard was implant the security chip in every their cartridges, to avoid the imitation and controlling of their products in the market. It is also to show how the technology will help us to protect the product imitation.
Intellectual Property is the intangible creative work that is embodied in physical form.
Example of scenarios that related to the IP case is, Jason R is a designer and posted a Star Wars web site. Once the site started receiving 40,000 hits a day, he received a call from Luca Film asking him to shut it down. He later posted excerpts of the phone conversation on his web site. Luca Film later was flooded with angry e-mail messages from fans who felt the company was exerting totalitarian control over products to which they felt a deep personal connection.
Counterfeit Software is the software that that is manufactured to look like the real thing and sold as such.
Example of scenario in Malaysia is, to protect their products Hewlett Packard was implant the security chip in every their cartridges, to avoid the imitation and controlling of their products in the market. It is also to show how the technology will help us to protect the product imitation.
As a user, using the information technology, we should
understand our rights towards the ethical issue. The law provides guidelines in
many of this area, but how far the laws can help us to practice ethics while
using the information technology. One way an organization can begin dealing with
ethical issues is to create a corporate culture that encourages ethical
considerations and discourages dubious information dealings.
Source : http://iacis.org/iis/2010/119-128_LV2010_1431
Source : http://www2.unescobkk.org/elib/publications/ethic_in_asia_pacific
Source : Business Driven Technology, Palge Baltzan, 3rd Ed, McGraw-Hill
No comments:
Post a Comment