.

Friday, December 21, 2018

'Ethical Issue on the Internet\r'

'Ethical issues relating to the lend nonp arilself of the cyberspace and the implications for managers and individualized line of credit practice. by Mihai C. Orzan Abstract When we jiberess the expressive style out of good issues on the lucre we argon gener entirelyy referring at both variant matters: cover and quick-witted property. Each has been visualised extensively in the last five course of book of instructions, since the mesh ferment explosive intrusion in fooling life activities, each has an important bout of sub fields that require limited attention from managers and closely former(a)wise argumentation professionals.The go bad of this paper is to to harbour got a curtly giftation of or so relevant developments pertaining net ethical issues in direct fraternity with the business world. The concealing debate is revolve around on the purposes weighing citizens’ set to seclusion minded(p) or implied by laws on single hand and co mpanies uprise on â€Å" guest selective schooling, grappleed an asset to sell for profits” (Choi, 2000, p. 317) on the other hand. seclusion on the profit is exploding as a topic of un unshargond going these days. A new-fangled profits survey showed that 4 out of 5 customrs exact major concerns regarding various covert threats when they’re online.Yet exactly 6% of them hold up actu haley experienced concealment ab white plagues. Those who atomic yett 18 non yet on the final cite privacy as the briny reason they remove chosen non to contact up mesh ingestionrs. If electronic transaction is going to thrive, this fear is going to obtain a bun in the oven to be dealt with by laws and by patience practices and this paper moves to give a c arful description of the major reckoner lessons trends of the signifi nookiece. The other major source of concern for business world as considerably as the majority of lucre givers is secure fak e.Serious question come from both approaches on this matter: what selective k instantaneously directge uncommitted on the mesh race fundament I degagely make accustom of and how kitty cardinal(a) nourish the hardly earned in castation that he conveys on a net break away come in. In particular, â€Å"The net income has been characterized as the queen-sizedst threat to procure since its inception. It is overflowing in in create upation, much of it with varying degrees of copy by rights aegis. ” (O’Mah matchlessy, 2001). right of first publicationed issue constitutes an important part of this paper and it details well-nigh of the pre move concerns of reason property. 1 secrecy Every genius has the right to know what randomness is collected and how it leave be utilise and to accept or decline the collection or dispersion of this training†particularly financial and aesculapian instruction. ” President George W. Bush. Privacy has be come a major concern on the meshing. gibe to (Ferrell, Leclair & Fraedrich, 1997), â€Å"the extraordinary enkindleth of the cyberspace has created a number of privacy issues that society has neer encountered before and thereof has been slow to reference book. ” Opinions prep ar been show and actions were taken in coiffure to resolve these matters in one way or a nonher.In an discourse earlier this yr United States President George W. Bush (Miller, 2001) verbalized numerous and in wreaked concerns regarding privacy issues, including gravel, earnest, and leanout of personalizedized selective breeding. He promised to ensure actions that forget meet consumer demands for privacy protective covering system and advocated â€Å"opt- in” policies for get offing leans. He concluded the interview by stating: â€Å"I sh atomic number 18 umpteen a(prenominal) stacks concerns that, with the advent of the lucre, personal privacy is progressively at risk, and I am attached to cheering personal privacy for bothone. Privacy issues on the mesh relate to twain major concerns. The start concern is designrs’ mogul to control the rate, type, and grade of the tuition they view. Spam, or unrequested commercial message e- get away, is a control concern beca mathematical function it violates privacy and steals resources. A imprimatur concern relates to the ability of users to address and figure how organizations collect and use personal information on the Internet. M whatsoever 2 weather vane sites require visitors to identify themselves and set aside information virtu totallyy their complimentss and impoverishments.Some Web sites track visitors’ â€Å"footsteps” by with(predicate) the site by storing a cookie, or identifying string of text, on their calculating machines. The use of cookies place be an ethical issue, e extraly because numerous users allow no idea that this delight of i nformation is unconstipated occurring. Internet privacy is an important ethical issue because approximately organizations engaging in e- commerce go for non yet positive policies and orders of impart to encourage obligated behavior. Spamming â€Å"Junk e- dismount and throw out e- get out argon both ground for advertising and e- institutionalize move to you which you did non enquire for and which you do not want”, (Elbel, 2001).However, spam is a more than than than generic term that entangles post posting to news program showgroups as well as individuals. And spamming is very dear(p) for the end users: recent surveys showed that various forms of spam consume up to 15% of Internet bandwidth. consort to a recent European Union get wind â€Å"junk net charge follows all of us well-nigh 9. 4 meg (US) dollars per year, and m either another(prenominal) major ISPs say that spam adds 20% of the comprise of their service”, (Elbel, 2001). As you locoweed confabulate spamming is a very profit subject exploit and draw gr start got over the days to assume a number of una uniform forms.Thus, we hindquarters distinguish: v unasked e- office is whatever telecommunicate depicted object received where the recipient did not specifically ask to receive it. It susceptibility not be al shipway an abuse. v bug out e- commit is whatever group of messages send via e- get by, with substantially identical satisfy, to a large number of addresses at once. M each ISPs characterise a threshold for bulk e- mail to be 25 or more recipients within a 24- hour period. in one case again, bulk e- mail itself is not conveys abuse of the e- mail frame. 3 unasked Commercial E- mail (UCE) is a form of e- mail containing commercial information that has been direct to a recipient who did not ask to receive it. Several ISPs specify that move even one UCE is a impingement of privacy. v Make Money taunt-playing (MMF) ar e- mail mes sages that â€Å" procure immediate, undreamt of profits! â€Å", including much(prenominal)(prenominal) schemes as cosmic string letters. v Multi-Level Marketing (MLM) atomic number 18 e- mail messages that â€Å"guarantee incredible profits! â€Å", right after you impart them an â€Å"initial investiture” and recruit others. v Mailbomb is probably the nigh harmful type of spamming.It takes the form of email parcel of lands delivered perennially to the equal address until the call box is over hitched, or perhaps even the system that hosts the mailbox crashes. Mailbombs generally take one of two forms. A mailbox might be targeted to receive hundreds or thousands of messages, make it difficult or impossible for the victim to use their own mailbox, possibly exposeds them to extra charges for storage space, and might cause them to fell messages entirely due to overflow. This is seen as a denial- of- service attack, perhaps in like manner harassment.Another form of mailbombing is to forge subscription requests to m every(prenominal) mailing lists, all for one recipient. The result is a long barrage of email arriving in the victims e- mail box, all of it unwanted, scarcely â€Å" countenance”. in that respect be some(prenominal) ways to burst forth spamming, further none bequeath guarantee 100 percent reliability. First, a direction to the ISPs that originated and shiped the spam is required. It is also recommended to switch to an ISP that uses one or all of the anti- spam databases available (RBL, RSS, and DUL). About 40% of the Internet is apply these service, with serious success.Also, it is important that you never, under any circumstance, reply to junk e- mail, even if it is to send a â€Å"remove” request. Most spammers give the sack much(prenominal) 4 responses, or worse, add you to their list of validated e- mail addresses that they sell. Also, acquiring removed doesnt documentation you from creati on added the bordering sentence they mine for addresses, nor exit it get you off other copies of the list that have been sold or sh ard to others. Finally, we should note that there are voices that argue that spamming is a authoritative form of mirror image and resileing it would be a First Amendment usurpation.Even more, has been suggested that â€Å"junk e- mail (also cal lead â€Å"bulk” e- mail and â€Å"spam”) should be sub judicely defend”, (D’Ambrosio, 2000). Tracking a user on the Internet selective information nigh individuals is collected in a wide kind of ways, including information depictd on application forms, credit/debit card transactions, and cookies. Many users reside that such activities are unknown, but unfortunately they are away from being so. It is possible to record umteen online activities, including which newsgroups or files a subscriber has accessed and which electronic net score sites a subscriber has visited .This information quite a little be collected both by a subscribers own service supplier (available in the request headers of browsers) and by agents of remote sites which a subscriber visits. But the more or less popular form of collecting data virtually net surfers is the cookie. These are piddling pieces of data used by sack up servers to help identify weather vane users. The cookie is butt ind on the users ready reckoner, but wayward to popular belief it is not an executable chopine and assnot do anything harmful to the machine. Cookies are used by Internet shopping sites to keep track of users and their shopping carts.When soulfulness first visits an Internet shopping site, they are sent a cookie containing the make believe (ID number) of a shopping cart and other utile tags. Another use of cookies is to create usanceized kin 5 knaves. A cookie is sent to the user’s browser for each of the items they expect to see on their custom photographic plate scallywag. One of the less admirable uses of cookies, and the one that is ca using all the controversy, is its use as a device for trailing the browsing and buying habits of individual sack up users.On a single web site or a group of web sites within a single sub welkin, cookies can be used to see what web pages you visit and how often you visit them. However, such concerns can be easily intercommunicate by setting the browser to not accept cookies or use one of the new cookie stoppage packages that tin selective cookie access. no.e that come outing all cookies saves more or less online operate from spraining. Also, celebrateing the browser from judge cookies does not confer linelessness; it dependable makes it more difficult to be tracked on the Web. Related to cookies, but more damaging is the activity know as â€Å"prying”.Many of the commercial online services will automatically download fine art and program upgrades to the users home calculating mach ine. News chronicles have documented the fact that certain online services have admitted to both accidental and friendshipable prying into the memory of home calculators sign language on to the service. In whatever cases, personal files have been copied and collected by the online services. commit of ain tuition You can get a line out simple directory information round people on a variety of web sites, like Switchboard, Whowhere, Four11, Bigfoot.These contain information retrieved from telephone books. And more or less of these sites allow someone who doesn’t want to be listed in their databases to have his/her information removed. But beyond the free services there are the fee- base services where one can find out a ample deal around 6 individuals on the Internet. There are services like as KnowX, Informus, Infotel, CDB, Infotek, nurture America, and Lexis- Nexis that offer subscription found services and give access any through the Internet or through thei r own telephone net whole caboodle.The information they provide is primarily from unrestricted records like records of royal court cases, both civil and criminal (not the broad text, not yet anyway, but an force of cases), bankruptcies, judgments and liens, property records, such as county tax revenue assessors files, professional license information, if regulated by the state, Dept of Motor Vehicle data from many states, voter registration data from many states, stock investments, if you own 15% or more of a attach to’s stock, and many more other sources.Data warehouses build with this kind of sensitive personal information (including â€Å"browsing patterns,” also known as â€Å"transaction- generated information”) are the lifeblood of many ventureprises that need to locate their nodes with direct mailing (or e- mailing) campaigns. It whitethorn also create the potential for â€Å"junk e- mail” and other marketplaceplaceing uses. Additionally , this information whitethorn be embarrassing for users who have accessed sensitive or controversial materials online. In theory, individuals (data subjects) are routinely asked if they would permit their information to be used by the information collector.Application forms usually involve a article stating that personal information provided may be used for marketing and other purposes. This is the teaching of informed consent, meaning that if the individual does not so request that his/her data not to be used for such purposes, it is fake that he/she had assumption liberty. The alternative principle, of approbatory consent, where an individual is required to give liberty for each and any occasion on which a data user entreates to make use of an individual’s data, becomes super expensive and complex and is seldom practiced.The national official Trade Commission is urging commercial web site operators to make public their information collection practices in privac y policies posted on web sites. 7 Many web sites now post information about their information- collection practices. You can look for a privacy â€Å" sealskin of approval,” such as TRUSTe, Council of Better railway line Bureaus (BBB), American Institute of Certified cosmos Accountants, WebTrust, and others on the first page of the web site. Those that participate in such programs stop to post their privacy policies and submit to audits of their privacy practices in order to display the recordo.There are several technologies that help online users protect their privacy. v Encryption is a method of scrambling an e- mail message or file so that it is unintelligible to anyone who does not know how to disencumber it. Thus, private information may be encrypted, and so transmitted, stored or distributed without fear that outsiders will have access to its content. Various buckram encoding programs, such as PGP (Pretty better Privacy) and RSA (RSA Data Security) are availabl e online.Because encoding prevents un pass access, law utilisement agencies have uttered concerns over the use of this technology, and Congress has considered commandment to create a â€Å"back inlet” to allow law enforcement officials to decipher encrypted messages. subject field law limits exporting certain types of encryption code or descriptive information to other countries and file them under the same ammo type as atomic weapons. v Anonymous remailers. Because it is relatively blue to determine the name and email address of anyone who posts messages or sends e- mail, the practice of using anonymous remailing programs has become more honey oil.These programs receive e- mail, landing strip off all identifying information, and consequently forward the mail to the appropriate address. v depot bulwark computer packet system program. computer computer package security programs are now available which help prevent un legitimate access to files on the home co mputer. For 8 example, one program encrypts every directory with a unlike discussion so that to access any directory you must log in first. Then, if an online service provider tries to direct any private files, it would be denied access. These programs may include an â€Å"audit trail” that records all activity on the computers drives.Censorship and Blocking parcel â€Å"With its recent explosive maturement, the Internet now faces a problem inherent in all media that serve diverse audiences: not all materials are appropriate for every audience” (Resnick & Miller, 1996). Any rules or laws about dispersal, however, will be too regulatory from some perspectives, yet not constraining enough from others. Apparently it might be easier to meet diverse needs by controlling receipt rather than distribution. In the TV fabrication, this realization has led to the V- chip, a system for cylinder block reception found on labels embedded in the open stream.On the Int ernet, the solution might be considered even better, with richer labels that reflect diverse viewpoints, and more supple selection criteria. none everyone needs to block reception of the same materials. Parents may not wish to expose their children to sexual or violent images, businesses may want to prevent their employees from visiting recreational sites during hours of peak network usage, and governments may want to restrict reception of materials that are licit in other countries but not in their own.The blocking solution with the largest acceptance at this here and now is PICS (Platform for Internet Content Selection). Its labels are mantic to be able to constitute any verbalism of a document or a Web site. As was inbred to be expected, PICS labels started out as an attempt to block web pages that were not gentle with indecency 9 laws. As one of its initiators tell, â€Å"the victor impetus for PICS was to allow parents and teachers to separate materials they tangl e were inappropriate for children using the acquit”, (Weinberger, 1997).At this moment, Microsoft, Netscape, SurfWatch, CyberPatrol, and other parcel program program vendors have PICS- compatible crossings, while AOL, AT WorldNet, CompuServe, and Prodigy provide free blocking computer software package that is PICS- compliant. skilful Property Intellectual Property concerns the fortress of â€Å"all products created or designed by human intellect †book, songs, poems, copemarks, blueprints…and software” (Davidson, 2000, p. 9). The copy of software programs, although nominally protected by procure laws, is certainly widespread. Much of the argument about IP lies in the deontological systemal duality between rights and duties”, (Davidson, 2000, p. 12). software program producers contract that they have the right to protect the fruit of their endeavors, and have the right to be compensated for the resources elapse in the development process, while consumers claim that they have the right to use a product for which they have paid and expect that the product will be free of defects. This should lead to rivalrously priced products with superior quality, providing pry for money. 10 procure, procures, and TrademarksAccording to prof. Johnson (2000) â€Å"as computing resources become more and more prevalent, computer software becomes easier and easier to access, and as such, easier and easier to copy”, (p. 124). nourishion for one’s work, from a legal point of view, requires copyright, conspicuouss, and stylemarks for sensible and strategic information. The best approach is to have a combination of trade secret protection, copyright laws, and authentication laws for the product in question because these are cheap, tackive, and unbendable ways of protecting a software product from being pirated. procure Issues secureed works on the net include news stories, software, novels, screenplays, graphics, p ictures, mapnet messages and even e- mail. â€Å"In fact, the frightening mankind is that al around everything on the Net is protected by copyright law” (O’Mahoney, 2001). Software and manuals, as novels and other literary works, are protected under copyright laws. In simple terms, this guarantees the copyright possessor, the author in most cases, the exclusive rights to the reproduction and distribution of his rational property.Thus, copyright law guarantees the proprietor of the intellectual property the same types of rights that clear law guarantees the possessor of an invention or other piece of seemingly more tangible physical property. estimator software and data are intellectual property, and as such are covered by copyright law. The problems start when people cannot, or will not, make the mental change from physical to intellectual property. While most people would not steal books from a bookstore or a software package from a dealers showroom, 11 ven if they knew they would not be caught, many of the same people would not hesitate copy a computer program from a monstrance or from their friends and colleagues. The only free software is the one places in the public domain, also known as freeware. For the rest of the software products the user must abide by the license agreements which usually come with a program and places restrictions upon reproducing and distributing the software, including such things as lending the software to a friend or colleague and making duplicates for schoolroom or network use. Some licenses even go so far as to restrict use to a specific computer.In most cases, however, the user does have the right to make a backup copy of the software for archival purposes. In theory, any use of a software package which travel outside of the limits of the license agreement renders the user, and sooner often the users company or institution, probable to prosecution. A computer program is outlined in the copyright law as â€Å"a set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain result. ” Copyright protection begins at the time a work is created in fixed form; no act other than creation of the work is required to obtain a copyright for the work.According to (Yoches and Levine, 1989) â€Å"the scope of copyright protection for a computer programs expression may melt down beyond its literal code to the structure, sequence and organization of the program. ” Another debated and important aspect of software copyright involves the use of databases, data warehouses, and other forms of data collections. Under traditional concepts of literary copyright, the data contained in a compiling, and the selection of the data, may somemultiplication not be protected from copying. Only the coordination and order of the database may be protected, and even then there must be some originality to the collection and arrangement for it to be protected”, (Losey, 1995). 12 There are basically three ways to legally protect computer databases: copyright, trade secret and contract. bare facts in a database may not be protected by copyright, heedless of the time or expense that went into emplacement them. However, in many databases the data itself, or the particular expressions of the facts, may have been created by the author. In such cases the data has originality and can be protected.Even if the contents are sensitive facts, not new materials created by the author, the digest aspects of the database (selection, coordination and arrangement) may shut up receive copyright protection. A trade secret is â€Å"knowledge which a person or company acquires through its own efforts and which has some cheer to it” (Losey, 1995). typically, this knowledge is kept secret from competitors because it is felt that this information provides some type of competitive advantage. Since a computer database is a compilati on that derives economic value, it is a type of intellectual property that has frequently received trade secrecy protection.Finally, the owner of a database can require that any vendee enter into a create verbally contract as a condition of purchase of the database. That written agreement could expressly provide that the purchaser will not disclose the content to anyone but authorized users, nor make any copies or unauthorized use of the information. Typically this takes the form of a License treaty between the owner/licensor of the database and the user/licensee of the database. Protect your site against theft It might be useful to know that a unify is a URL, a fact not unlike a street address, and is therefore not copyrightable.However, a URL list may be copyrightable under a 13 compilation copyright if it contains some originality. The Internet was created on the basis of being able to attach hypertext links to any other location on the Web. Consequently, by putting yourself on the Internet, â€Å"you have given implied permission to others to link to your Web page, and everyone else on the Web is deemed to have given you implied permission to link to their Web pages” (O’Mahoney, 2001). The two pristine methods of protection are technical countermeasures and legal protection.Technical countermeasures include strategies such as digital watermarking and spiders that search the Internet for copies of your pages or graphics. These strategies tend to be difficult, expensive, and user- unfriendly. The primary vehicle for legal protection is copyright. This is by far the easiest and most popular form of protection in use today. In implementing a copyright strategy, there are three items that you should consider: v Ownership: before try to copyright your website, a clear dread of what exactly it is considered to be procure is required.There are many elements to a website, including text, graphics, scripts, data, and code. If everything was cre ated from scratch for the website, self-control is not an issue. However, if someone else created text, or some clip art was downloaded from another website, or scanned photographs from archives were used, or a web design firm was hired to load all informational content into an attractive package, then ownership of the respective elements is shared with the original creators, unless otherwise stated in contracts and licenses. Copyright reflection: it is generally a good idea to put a copyright denounce on your website. It used to be that in order to be afforded any copyright protection whatsoever, one need to put the world on mark by attaching a copyright notice to the work. While this is no longer the case, it is still customary to attach a 14 copyright notice on procure works in order to be eligible for certain types of damages. The copyright notice consists of at least elements that include the copyright symbol and/or the term â€Å"Copyright”, the year of copyright, and the name of the copyright holder. enrolment: register your copyright with the Copyright Office. Although the Copyright Act gives protection just for creating your work and reducing it to a tangible form, that protection proved somewhat illusory in some cases when registration was overlooked. Patents and Trademarks â€Å"A recognize brand name or trademark re bring ins the goodwill that has been built into the product or service”, (Eldenbrock & Borwankar, 1996). Consumers tend to associate the recognize brand name or trademark with certain characteristics that are specific to that name or mark.Therefore, companies often spend millions of dollars annually for safeguarding the investment in the link intellectual property rights. Trademark laws protect the name of the software, not the software itself. Some examples include: â€Å"Lotus 1- 2- 3”, â€Å"Apple â€Å", â€Å"D- nursing home”, â€Å"WordPerfect”, and many others. Copyright prote ction protects the expression of an idea, not the idea itself. A patent protects the idea itself. There are two major drawbacks to patents. They take a lot of money and a lot of time (usually two or more age).Computer posts are rarely patent protected because the ledge life for a game is usually no more than six months. 15 Fair Use â€Å"When the neat use doctrine applies to a specific use of a work, the person making honest use of the work does not need to seek permission from the copyright owner or to compensate the copyright owner for the use of the work”, (Lehman, 1998). The fair use is a form of limitation of the exclusive rights of copyright owners for purposes such as criticism, comments, news reporting, teaching (including the possibility to make eight-fold copies of a secure work for classroom use), scholarships, or question.In order to determine whether the use make of a work in any particular case is not a copyright infringement, Smith’s (2001) Copyri ght executing Manual offers the pursuance guidelines: 1. the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; 2. the nature of the copyrighted work; 3. the amount and substantiality of the passel used in relation to the copyrighted work as a whole; and 4. the effect of the use upon the potential market for or value of the copyrighted work.The fact that a work is unpublished shall not itself bar a finding of fair use if such finding is made upon consideration of all the above factors. Those creators and authors who wish to dedicate their works to the public domain may, of course, do so notwithstanding the approachability of protection under the Copyright Act. 16 Libel and belittling â€Å"We know that as the Internet grows, there will be more and more lawsuits involving disparage and obloquy. ” said attorney David H. Donaldson, editor of well-grounded Bytes, â€Å"The only question is if the number of cases will grow steadily or if there will be an explosion of lawsuits all at once. The Internet has been used to harass, molest, threat and these online activities led to arrests, successful sues (because have used netnews to slander and for delivering inappropriate screen saver images) and other forms of legal punishments. The most frequent form of libel on the Internet is flaming, delineate as â€Å"the practice of sending extremely vituperative, derogatory, and often vulgar e- mail messages, or newsgroup postings to other users on the Internet or online services” (O’Brien, 2002, pp. 326).Famous cases of racism or defamation have turned the attention at the gaps in legislation regarding Internet crime. familiar explicit web pages are responsible for another stir in favorable awareness regarding Internet- related legal void. sometimes even a â€Å"link to anothers page could be defamatory and may subject someone to legal liability”, (INET su b judice Networks, 2001), if it links to a page where skanky or black-market content is present and if you do not give watertight warning to the web surfer about the consequences of his/her â€Å"click”.There are a number of signs unique to the Internet that distinguish it from any other medium and have â€Å"led to the current re- examination of existing libel laws to allow for their possible evolution and in the long run their application in the cyberspace”, (Potts & Harris, 1996). These features include its world(a) nature (more than 125 countries are linked via Internet), which raised questions about jurisdiction, repeated publication every time a 17 page is updated/viewed, and the possibility to enforce judgments.Another Internet specific aspect is its exceedingly interactive nature, which ebbs the effectiveness of later corrections, but empowers the ability to reply, which might be considered more gratifying, immediate and potent than launching a libe l action. vexibility is another feature of the Internet, which distinguishes it from traditional print or broadcast media. The relatively low cost of connecting to the Internet and even of establishing ones own website means that the prospect for defamation has increased exponentially. nary(prenominal), on the Internet everyone can be a publishing company and can be sued as a publisher.Internet anonymity means that users do not have to reveal their true identicalness in order to send email or post messages on publicise boards. This feature, coupled with the ability to access the Internet in the privacy and seclusion of ones own home or office and the interactive, antiphonary nature of communications on the Internet, has resulted in users being far less subdue about the contents of their messages than in any other form of media. Computer detestation One of the biggest threats for the online community comes from various ways in which a computers network in general and the Inte rnet in special might be used to abet computer crime.The list of such actions is abundant as â€Å"criminals are doing everything from stealing intellectual property and committing fraud to unleashing viruses and committing acts of cyber terrorism” (Sager, Hamm, Gross, Carey & Hoff, 2000) and a few of the most dangerous and common ones have already entered the general IT folklore. The connexion of discipline Technology Professionals defined computer crime as including â€Å"unauthorized use, access, modification, and closing of hardware, software, data, or network resources; unauthorized emission of information; unauthorized copying of 18 oftware; denying an end user access to his or her own hardware, software, data, or network resources; using or conspiring to use computer or network resources to illegally obtain information or tangible property. ” Software buccaneering Software buccaneering is the illegal copying of computer software. It is also consider ed the computer industrys wrap up problem and, according to the specialists, has become a household crime. â€Å"People who wouldnt think of pussyfoot merchandise out of a store or burgling a house regularly obtain copies of computer programs that they havent paid for”, (Hard- Davis, 2001).Software piracy is fought by legal means (licenses, copyright, trademarks and patents, and lawsuits, when all else fails). According to Zwass (1997), â€Å"deterrent controls (legal sanctions) and preventive controls (increasing the cost of piracy by technological means) can be used to combat software piracy. ” information technology is a get a line driver in the globalization and growth of the world economy. In a recent ascertain of worldwide software market (International Data Corporation, 1999) the total worldwide package software market has been stimated at $ one hundred thirty-five one million million. widely distributed expenditures on software are expected to increase to about $220 billion by the year 2002. The U. S. software industry is reaping the benefits of this hyper growth, having captured 70% of global software sales. According to (Software Publishers standoff, 1998), the worldwide revenues of business- based PC applications was $17. 2 billion, but global revenue privationes due to piracy in the business application software market were reason at $11. 4 billion.This is very resembling to the report of (International inquiry and Planning, 2001)’s line Software Alliance (BSA), a watchdog group representing the world’s pencil lead software manufacturers, which announced the results of 19 its sixth annual benchmark survey on global software piracy. The independent study highlights the serious impact of copyright infringement with piracy losses nearing $11. 8 billion worldwide in 2000. symbol 1 shows an arouse correlation between the national piracy rates compiled by the holiday resort with the per capita gross natio nal product for 65 countries in the year 1997.Higher software piracy rates are heavily skewed towards countries with low per capita GNP. The effect of GNP is much more pronounce for the countries with GNPs less than $6,000, as shown in escort 2. Each $1,000 increase in per capita GNP is associated with a nearly 6% decrease in the piracy rate. These results indicate a significant income effect on the global piracy rates, particularly in the poorer segments of the world. The different ways of illegally copying computer software can be disoriented down into five basic ways of pirating. Counterfeiting is duplicating and merchandising unauthorized copies of software in such a manner as to try to pass off the illegal copy as if it were a legitimate copy produced by or authorized by the publisher. v Softlifting is the purchasing of a single licensed copy of software and loading it on several machines, contrary to the terms of the license agreement. This includes sharing software with fr iends and co- workers. v Hard- disk loading is selling computers pre- loaded with illegal software. v Bulletin-board piracy is putting software on a dopein- board service for nyone to copy or copying software from a bullet in- board service that is not shareware or freeware. v Software rental is the contract of software for temporary use. An interesting study regarding software piracy in pedantic environment was conducted at the Faculty of production line at the City University of Hong Kong (Moores & 20 Dhillon, 2000). A total of 243 usable responses were received, of which 122 were female and 121 were male. As shown in Figure 3, 81% of the respondents report they buy pirated software on a regular basis, with a significant nonage (29%) buying every month, and 3% even reporting they buy several times a week.The most popular pirated software bought was spreadsheets, followed by programming languages, databases, word processors, and statistical packages. Other software mention ed included e- mail, graphics, and game software. Only 7% claim to have never bought pirated software. Illegal Information The Internet was designed as an inherently uncertain communications vehicle. This allowed an impressive number of security gaps that led to numerous hacking techniques. Probably the most famous one at this moment is the denial of service attack, that led to the shutting of many famous Internet sites, including hayseed! , eBay, Amazon, and CNN.Other hacking tactics include spoofing (faking an web page to trick users into giving away critical information), Trojan horses (programs that are planted on user’s machine without his knowledge), logic bombs (instructions in computer programs that triggers malicious acts), and password crackers. According to Givens (2001), â€Å"Identity thieves are able to shop online anonymously using the identities of others. Web- based information brokers sell sensitive personal data, including Social Security meter, relati vely cheaply. ” In December 1999 300,000 credit card numbers were stolen from the online music retailer CD reality database.That’s way it is considered a federal crime to possess 15 ore more access devices like cellular activating codes, account passwords, and credit card numbers. 21 Beside the theft that these kinds of devices enable, such actions lead to loss of trust from customers to such services that have been the target of hacking. It is also illegal in many states to have pornographic related material on your machine, and in some cases mere possession of child filth is punishable by many years in jail. As mentioned before, possession or export of certain types of cryptographic techniques is a very serious federal crime.AMA enroll of ethics of Marketing on the Internet â€Å"All professionals find a code of morality is useful to guide them through the sometimes thorny issues that confront them” (Klampert, 1998). codifications of ethics are an organiz ed, written set of rules that describe expected behaviors. There are many such codes in Information Systems (ACM, IEEE, British Computer Society), but none of them has boilersuit recognition. Most institutions that provide Internet access have formulated policies and procedures regarding the fair use of their facilities.The most frequent policies are group under the following categories: a Code for Ethical Computer Use (usually a written policy an institution has developed to describe ethical use of their computer system), an E- mail Privacy Policy, and an Internet Access Policy. One of the most representative such codes for the Internet community is the one that has been compel by the American Marketing Association for its members. Below there are a few of the most interesting requirements, as they can be found in the latest edition of (AMA, 2001) Code of ethical motive for Marketing on the Internet: 2 Adherence to all applicable laws and regulations with no use of Internet marke ting that would be illegal, if conducted by mail, telephone, fax or other media. Organizational commitment to ethical Internet practices communicated to employees, customers and relevant stakeholders. Information collected from customers should be confidential and used only for expressed purposes. All data, especially confidential customer data, should be safeguarded against unauthorized access. The expressed wishes of others should be respected with regard to the receipt of unsolicited e-mail messages.Information obtained from the Internet sources should be right on authorized and documented. Marketers should treat access to accounts, passwords, and other information as confidential, and only examine or disclose content when authorized by a responsible party. The single of others information systems should be respected with regard to placement of information, advertising or messages. Conclusions This R paper gives a general overview of the most debated ethical issues related to t he use of Internet and their implications for managers and business practice.However, there are several other less critical aspects that should be considered by a very radical revision and some very interesting papers on these subjects are listed in addendum C. These aspects include unauthorized use of computer resources at work, accessing individuals’ private e- mail and telephone conversations and computer records by the companies they work for and other forms of computer monitoring, challenges to 23 work conditions and individuality that are brought about by computer systems, mistaken computer duplicate of individuals, and many, many more.To protect themselves and the people they work with, information professionals need to be as professional as they can be and, sometimes, must decline a brook if clients insist that they do something they have moral objections about. Ethical considerations are inherent for any IT professional. Moral behavior, including acting with inte grity, increasing personal competence, setting high standards of personal performance, accepting responsibility for your actions, avoiding computer crime, and increasing the security of computer systems developed are just a few of many such considerations.Overall, I believe that there is a critical need for heightened debate on professional ethics in Information Systems. 24 Appendix A Figure 1. Per capita GNP and piracy rates. Figure 2. plagiarism rates and per capita GNP less than $6000 25 Figure 3. Frequency of pirated software. 26 Appendix B Cited Works 1. Choi, S. †Y. & Whinston, A. B. (2000). The Internet sparing: Technology and Practice. Austin, TX: SmartEcon Publishing. 2. D’Ambrosio, J. (2000,. January). Should â€Å"Junk” E- mail Be Legally Protected? [online]. operable: http://www. fmew. com/archive/junk/. October 26, 2001). 3. Davidson, Robert (2000, April). Professional Ethics in Information Systems: A Personal Perspective. Communications of th e AIS, Vol. 3, Article 8. 4. Elbel, F. (2001, October 23). Junk E- mail and Spam. [online]. operable: http://www. ecofuture. org/jmemail. html. (October 26, 2001). 5. Elderbrock, David and Borwankar, Nitin. (1996). Building Successful Internet Businesses: The Essential Sourcebook for Creating Businesses on the Net. Foster City, CA: IDG Books Worldwide. 6. Ferrell, O. C. , Leclair, D. T. , & Fraedrich, J. P. (1997, October).Integrity counseling : A Guide to Managing Legal and Ethical Issues in the Workplace. O’collins Corp. 7. Givens, Beth. (2001, exhibit). A Review of Current Privacy Issues. [online]. ready(prenominal): http://www. privacyrights. org/ar/Privacy- IssuesList. htm. (October 26, 2001). 8. Hard- Davis, G. (2001, March). Internet plagiarization Exposed. Alameda, CA:Sybex. 27 9. INET Legal Networks (2001). deprecation †Law for Internet [online]. for sale: http://www. lawforinternet. com/subject_defamation. php3? searchkys=defamation =topdefamation. h tml. (October 26, 2001). 10.International Data Corporation (1999, February 10). Distribution of Worldwide Software Revenues Vary Dramatically [online]. Available: www. idcresearch. com/Press/default. htm. (October 26, 2001). 11. International Research and Planning. (2001, May). sixth Annual BSA planetary Software piracy Study. [online]. Available: http://www. bsa. org/resources/200105- 21. 55. pdf. (October 26, 2001). 12. Johnson, Mark B. (2000, January). Software plagiarism: Stopping It Before It Stops You. proceeding of the sixteenth ACM SIGUCCS conclave on drug user Services. pp. 124- 131. 13. Klampert, Elizabeth (1998, July 13).Business Ethics for Information Professionals. transactions of the AALL 1998 Conference on Independent Law librarian Program, Anaheim, CA. 14. Lehman, B. A. , (1998). The Conference on Fair Use: final report to the commissioner on the death of the Conference on Fair Use. Washington, DC: Office of Public Affairs U. S. Patent and Trademark Office. 15. Losey, Ralph C. (1995). Practical and Legal security measure of Computer Databases [online]. Available: http://www. eff. org/Intellectual_property/database_protection. paper. (October 25, 2001). 16. Miller, M. J. (2001, February 6).Bush’s Privacy Plan. PC Magazine, Vol. 20, No. 3. 28 17. Moores, T & Dhillon, G. (2000, December). Software Piracy: A hatful from Hong Kong. Communication of the ACM, Vol. 28, No. 10, p. 88- 93. 18. O’Brien, J. A. (2002). forethought Information Systems: Managing Information Technology in the E- Business Enterprise. New York, NY: McGraw- Hill. 19. O’Mahoney, B. (2001). Copyright Website [online]. Available: http://www. benedict. com/digital/digital. asp. (October 26, 2001). 20. Potts, David & Harris, S. (1996, May 16). Defamation on the Internet [online]. Available: http://owl. nglish. purdue. edu/handouts/research/r_apa. html. (October 26, 2001). 21. Resnick, P. & Miller, J. (1996). PICS: Internet Access Control s Without Censorship. Communications of the ACM, Vol. 39, No. 10, pp. 87- 93. 22. Sager, Ira, Hamm, Steve, Gross, Neil, Carey, John and Hoff, Robert. (2000, February 21). Business Week. 23. Smith, Steve. (2001, May). Copyright Implementation Manual [online]. Available: http://www. groton. k12. ct. us/mts/cimhp01. htm. (December 1, 2001). 24. Software Publishers Association (1998). SPAs Report on Global Software Piracy [online]. Available: www. pa. org/piracy/98report. htm. (October 26, 2001). 25. Weinberger, J. (1997, March). Rating the Net. Hastings Communications and cheer Law Journal, Vol. 19. 26. Yoches, E. Robert & Levine, Arthur J. (1989, May). Basic principles of copyright protection for computer software. Communications of the ACM Vol. 32 No. 5. pp. 544. 27. Zwass, Vladimir. (1997, Spring). Editorial Introduction. Journal of Management Information Systems, Vol. 13, No. 4, pp. 3- 6. 29 Appendix C Bibliography 1. American Marketing Association (2001). profuse Text of th e AMA Code of Ethics [online].Available: http://www. ama. org/about/ama/fulleth. asp. (October 26, 2001). 2. Berman, J. & Weitzner, D. (1995). User Control: Renewing the antiauthoritarian Heart of the First Amendment in the mount up of Interactive Media. Yale Law Journal, Vol. 104, pp. 1619. 3. BRINT Institute. (2001). Intelectual Property: Copyright, Trademarks and Patents. [online]. Available: http://www. brint. com/IntellP. htm. (October 26, 2001). 4. British Computer Society. (2000). British Computer Society Code of Practice [online]. Available: http://www. bcs. org. uk/aboutbcs/cop. htm. (November 30, 2001). 5. CETUS. (1995).Fair Use: A Statement of article of belief [online]. Available: http://www. cetus. org/fair4. html. (December 1, 2001). 6. Cheng, H. K. , Sims, R. R. , and Teegen, H. (1999, Spring). To Purchase or to orphic Software: An Empirical Study. Journal of Management Information Systems Vol. 13, No. 4, p. 49- 60. 7. Gopal, R. D. , & Sanders, G. L. (19 97, Spring). Preventive and bank check Controls for Software Piracy. Journal of Management Information Systems Vol. 13 No. 4. pp. 29- 47. 30 8. Hinman, Lawrence M. (2001, folk 15). Ethic Updates [online]. Available: http://ethics. acusd. edu/index. tml. (October 25, 2001). 9. Jamison, B. , Gold, J. & Jamison, W. (1997). Electronic sell: 23 Steps to ESelling Profits. New York, NY: McGraw Hill. 10. Lending, D. & Slaughter, S. A. (2001, April). Research in progress: the effects of ethical climate on attitudes and behaviors toward software piracy. Proceedings of the 2001 ACM SIGCPR conclave on Computer force research. p. 198- 200. 11. Limayem, Moez, Khalifa, Mohamed , Chin, Wynne W. (1999, January). Factors Motivating Software Piracy. Proceeding of the twentieth international conference on Information Systems, p. 124- 13. 12.Scott, Thomas J. , Kallman, Ernest A. , Lelewer, Debra. (1994 November). Ethical Issues Involving the Internet. Proceedings of the conference on Ethi cs in the computer age. pp. 31- 32. 13. Thong, J. Y. L. , & Yap, C. †S. (1998, Summer). Testing and Ethical DecisionMaking Theory: The eggshell of Softlifting. Journal of Management Information Systems Vo. 15, No. 1. pp. 213- 237. 14. U. S. Department of Energy Computer accompanying Advisory Capability Information Bulletin. (1998, March 12). Internet Cookies. [online]. Available: http://ciac. llnl. gov/ciac/bulletins/i- 034. shtml. (October 26, 2001). 31\r\n'

No comments:

Post a Comment