Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Part 55

Download as pdf or txt
Download as pdf or txt
You are on page 1of 36

‫الجزء الخامس من عدد من االجزاء‬-

‫احمد العطاب‬.‫د‬

Najran University
College of Science and Arts - Sharoura
Dr. Ahmed Alattab
‫‪Social Informatic‬‬
‫األخالق والقضايا االجتماعية المتعلقة بتكنولوجيا المعلومات واالتصاالت‬

‫‪2‬‬
Identify a range of ethical, legal, and policy issues that
impact the design and use of ICTs

Adomi, Esharenana E., ed. Frameworks for ICT Policy:


Government, Social and Legal Issues: Government,
Social and Legal Issues. IGI Global, 2010. (Chapter 9)

3
ICT Ethical Concerns
 The explosive growth of ICT and the use of its enabling
technologies have had major impacts on society and
thus raise serious ethical questions for individuals and
organizations.

 ICT has raised new ethical concerns:


 Personal privacy

 Protection of intellectual property

 User responsibility

 Acceptable access and use of information

 Software licenses and piracy


ICT Ethical Concerns

 ICT has raised new ethical concerns:


 the invasion of individual and corporate privacy,

 intellectual property rights,

 individual and societal rights

 values preservation and accountability for the

consequences arising from the use of ICT

A good ICT policy design must be able to


adequately consider these, and many other
associated issues.
ICT Policy Design Concerns

 A wide range of new laws, regulations, rules and


practices are therefore needed if society is to
manage these workplace and other changes and
development brought about by ICT. Thus the
society need to consider the following ethical and
social challenges related to ICT use:

 Recognition for personal and corporate ethics

associated with ICT.

 Striking a balance between ethical, economic and

technological (Rogerson, 2008) as well as political


ICT Policy Design Concerns
 Intellectual property rights issue (trademarks, patents,
copyright and trade secrets (Subject: Information Systems
Ethics (470CIS-2)).

 Non violation of privacy and associated rights amidst


electronic information data mining.

 The opportunity to commit crime with ICT (computer


crime).
 Legal issues and limitations.
 Consequence of using ICT.

 Professional responsibilities (Kallman and Grillo,


1996).
ICT Policy Design Concerns

 Every organization, society or nation must


recognize and address the aforementioned
issues thrown up by the enormous and
rapid change in ICT. To this end, ethics
and social issues are closely linked.
ICT Policy Design Concerns
 More of society’s activities and
opportunities enter cyberspace:
 business opportunities,
 educational opportunities,
 medical services,
 employment,
 leisure time activities.
 banking activities etc…

 To this end it becomes imperative therefore


to develop policies that will include all
parties.
Globalization Effects on ICT Policy Design

 Traditional barriers between regions,


states countries and continents no longer
exist, because of the interconnection
brought about by the Internet technology.

 For example: if an information is posted


on the Web in a culture/setting, which
does not consider such an information
offensive but is accessed by someone in
a culture/setting, where such information
is considered offensive and outlawed;

 Questions arising from this situations:


Globalization Effects on ICT Policy Design
 Questions arising from this situations:
 what kind of conflicts might arise and how
should they be tackled, and by whom?
 What policies would be fair to all
concerned?
 Will this bring about better understanding
between peoples and cultures, new shared
values and goals, new national and
international laws and policies?
 Will individual cultures become “diluted”
homogenized, blurred?

These are amongst the many social and ethical


issues related to ICT.
Reactions to these issues differ at all levels of
the information society: individuals,
organizations and government.
The Issue of privacy

 Privacy refers to the right to be left alone. (Subject:


Information Systems Ethics (470CIS-2)

 Privacy is a situation of an individual to be free

from any form of interference or surveillance.

 With the advent of ICT, there is little or no control

over an individual’s personal information.


 Example:
Every time an individual visits a site on the World
Wide Web, personal information is been collected
about that individual.
The Issue of privacy
 Information technology makes it possible for ‫تتيح تقنية المعلومات للمؤسسة جمع‬
‫البيانات والمعلومات وتخزينها وتبادلها‬
.‫واستردادها عن أي فرد‬
organization to collect, store, exchange and

retrieve data and information about any individual.

 With ICT personal claims to privacy is threatened. ‫مع تهديدات تكنولوجيا المعلومات‬
.‫واالتصاالت الشخصية للخصوصية‬

 The unauthorized use of such information has


‫أدى االستخدام غير المصرح به لهذه‬
‫المعلومات إلى إلحاق ضرر جسيم‬
seriously damaged the privacy of individuals. .‫بخصوصية األفراد‬

 To worsen the case much of the Net and Web are


‫ فإن الكثير من اإلنترنت‬، ‫لتفاقم الحالة‬
.‫والويب أهداف سهلة للقراصنة‬
easy targets by hackers.

 Every ethical consideration must be addressed

from socio cultural and individual standpoints.


The Issue of privacy
 Meanwhile every social and ethical
consideration must take into account the
following:
 Individual right to liberty: every action must
be based on every individual’s right to
liberty without much restrictions and
unnecessary inhibitions. Every society and
culture must be recognized and respected.
 Equal rights and opportunities of every
individual must be respected. Every action
should take this into consideration.
 Action to be taken must be right and
beneficial to the organization and society:
take the action that benefits the generality
of all concerned.
 Respect for human dignity: take the action
that produces least harm
 Respect for human basic rights.
The Issue of privacy
 Meanwhile every social and ethical
consideration must take into account the
following:

 These guidelines can serve as the basics for


ethical conduct by users of information
technology.

 Can also be the basic infrastructure/guidelines


for ICT policy design to protect the privacy.

The non-consideration of these ethical


responsibilities by individuals and organizations
for their actions is primarily responsible for the
damaging effects of ICT.
Information Rights: Claim to Privacy
 Confidential information on individuals
contained in existing files and databases by
financial institutions, government agencies and
private organizations have been misused,
resulting in the invasion of privacy.

 The unauthorized access and use of such


confidential information has seriously hurt and
damaged the privacy of individuals. Invasion of
individual’s privacy occurs when there is an
intrusion into a person’s private “information
bank” with intent to expose, or encroach upon
individual’s privacy.

 The claim to privacy has to be protected by


laws and ICT policies.
Information Rights: Claim to Privacy
 The claim to privacy is protected in existing
statute books and laws of various countries,
though differences exist from countries to
countries.

 There are also protection laws about individuals


in financial services, health information
management, education and insurance.
 Example:
Europe has applied its data protection principles
both to government and the private sector. This
directive requires companies to inform individual
when they collect information about them and how
such information is to be stored and used.
 This suggests that the consent of the individual
must be given before any information can be
accessed.
Information Rights: Claim to Privacy
 Accordingly anyone “processing personal data
must comply with eight enforceable principles of
good practices, data must be;
1. Fairly and lawfully processed.
2. Processed for limited purposes.
3. Adequate, relevant and not excessive.
4. Accurate
5. Not kept longer than necessary.
6. Processed in accordance with the data
subject’s right.
7. Secure
8. Not transferred to countries without
adequate protection
Information Rights: Claim to Privacy
 These guidelines show at what
capacity and how and when claiming
privacy can take place under a very
specific lows and ICT policies.

 An information policy aims to provide


legal and institutional frameworks
within which formal information
exchange can take place. An
information policy regulates the use,
storage and communication of
information.
Intellectual Property

 Intellectual property is creative works of


individuals or organizations that have
economic value.

 These works are protected by law. This law


prevents others from copying, duplicating
and distributing such work of human
ingenuity without authorization.

 This is aimed at securing economic rewards


for their efforts.

 Patents, copyright, trademarks and trade


secrets are all forms of intellectual property.
Intellectual Property

 Patent law protects technological invasion. It


requires that an inventor or creator of any given
work is recognized by law and is given
exclusive right and monopoly for the underlying
concepts, ideas behind such work for a given
period of time.

 Copyright law protects the copying, distribution


or duplicating, in whole or in parts of any
intellectual property without permission.

 Trademarks protects brand words, symbols and


slogans of goods and services. Trade secrets
protect confidential information of any given
Intellectual Property
 The growth of the Internet and associated
technologies is a serious problem for the
protection of intellectual property.

 The Internet facilitates the transmission of


data/information freely around the world, even
copyrighted information.

 Unauthorized persons can copy duplicate and


share music and movies in the Net, through
various devices.

 Digitized versions of books can be easily


made available to millions of people to
download through the Internet without
permission.
Intellectual Property
 There is therefore the need for the development of
new intellectual property rights protection
strategies in this era of rapid development of ICT,
capable of protecting software, eBooks, music and
motion picture.

 A wide range of new laws are needed if society is


to manage these issues associated with the digital
environment.
In-class Activity
 Read the following example from google “YouTube”, and
summarize what are the Policies they used to protect
Intellectual Property?

https://support.google.com/youtube/answer/4597810?hl=en

You are given only 7 minutes

Read the following example from Udemy (Udemy is a global


destination for teaching and learning online), and summarize
what are the Policies they used to protect Intellectual
Property?

https://www.udemy.com/terms/copyright/

You are given only 7 minutes


Intellectual Property

 In an attempt to protect intellectual property


rights; most nations of the world signed the
agreement on Trade Related Aspects of
Intellectual Property Rights (TRIPS) in 1994.
TRIPS is administered by World Trade
Organization (WTO) to strengthen legal
protection of intellectual property rights
around the world. The TRIPS agreement is a
harmonized standard in intellectual property
rights (IPR) protection.
Ethical Policy Framework

 Organization and governments must develop policies that take into


account related ethical and social issues.

 Rogerson (1998, p.1) provides the following steps to help


organizations to establish an ethics policy to address the ethical
issues arising in the use of ICT.

1) Decide the organization’s policy, in broad terms, in relation to


ICT.

2) Form a statement of principles.


Ethical Policy Framework ‫إطار السياسة األخالقية‬

1) Decide the organization’s policy, in broad terms, in relation to


ICT.

This should:

 Take account of the overall objectives of the organization, drawing


from such existing sources as the organizational plan or mission
statement;

 Use the organization’s established values, possibly set out in its


code of practice, for guidance in determining how to resolve ethical
issues;

 Get the scope of policy in terms of matters to be covered;


Ethical Policy Framework

2) Form a statement of principles that


would probably include:
 Respect for privacy and confidentiality;
 Avoid ICT misuse;
 Avoid ambiguity regarding ICT status,
use and capability;
 Be committed to transparency of actions
and decisions related to ICT;
 Adhere to relevant laws and observe
the spirit of such laws;
 Support and promote the definition of
standards in, for example, development,
documentation and training;
Ethical Policy Framework

2) Form a statement of principles that would


probably include:

 Identify the key areas where ethical issues may

arise for the organization, such as:


 ownership of software and data;
 integrity of data;
 preservation of privacy;
 prevention of fraud and computer misuse;
 the creation and retention of
documentation;
 the effect of change on people both
employees and others;
Ethical Policy Framework

2) Form a statement of principles that


would probably include:
 Consider the application of policy and
determine in detail the approach to each
area of sensitivity that has been identified.
 Communicate practical guidance to all
employees, covering:
 The clear definition and assignment
of responsibilities;
 Awareness training on ethical
sensitivities;
 The legal position regarding
intellectual property, data protection
and privacy;
Ethical Policy Framework

2) Form a statement of principles that


would probably include:

 Communicate practical guidance to all

employees, covering:
 The explicit consideration of social
cost and benefit of ICT
application;
 The testing of systems (including
risk assessment where public
health, safety and welfare, or
environmental concerns arise);
 Documentation standards; and
 Security and data protection
Ethical Policy Framework

 The development of such ethical


policy should require active
participation of individuals,
organizations, government,
professional bodies and
associations, NGOs (Non-
governmental organizations) and
ultimately the world community.
Conclusion

 ICT and the Internet will fundamentally,


irreversibly and comprehensively affect our
ethics and social systems. Clearly therefore,
the critical role of government, organizations
professional bodies and individuals at this
time is heightened rather than diminished.
Conclusion
 It is therefore proposed that organizations,
government and professional bodies
should put in place a robust information
policy that takes into account ethical and
social issues arising from the use of ICT.
 The policy is expected to address such
issues such as:
 privacy,
 software licenses and agreement,
 acceptable use of information in electronic
environment,
 user responsibility,
 permission rights,
 acceptable ICT use,
 security and authorized use and users,
among others….
Conclusion

 Advances and use of ICT has made the


protection of intellectual property
difficult. There is therefore the need for
ethical consideration by people who
manufacture and use ICT. Organization
should develop ethics policy
statements to guide individuals in
making appropriate use of ICT.
36

You might also like