Module 3 - Preliminary Theories
SAQ 3
- How would you classify the moral issues in computing enumerated above? Write your answer in the blank before each item and be ready to support your answers.
- Discuss how adherent of ethical egoism and altruism would analyze the following situations. Support your answers.
Case 1: Roger designed a computer program that would make detection of enemy codes easier.
In Egoist point of view, Roger designed the computer program that would make detection of enemy codes easier so that he can be recognize as a good programmer and thus make name for himself.
In Altruist point of view, Roger designed the computer program that would make detection of enemy codes easier for patriotism, to protect his country from terrorist threats or any act that
will sabotage national security.
Case 2: Perla plans to buy licensed software in the U.S. using the royalties from the sale of her book on computer ethics, and donate the software to her alma mater.
In Egoist point of view, Perla donates the software to create an impression that she is a beneficent person and at the same time to promote her computer ethics book which later she can recommend to be used as textbook in her alma mater.
In Altruist point of view, Perla wants to help her alma mater acquire licensed software and generously donate the software without asking anything in return.
Case 3: Marjo wants to create a virus that would affect only laptop operations.
In Egoist point of view, Marjo wants to be known as a good programmer and make a reputation to be the only programmer that creates a virus that attacks laptop operations only.
Case 4: Baba debugged secret code of the NBI that allowed her access all computer systems of the agency. She plans to sabotage the whole system as a form of revenge for what she considers to be the NBI’s violation of human rights.
In Egoist point of view, Baba wants to get even with the NBI for whatever harm the agency has done to her or her family. She’s doing it for her own interest without thinking of the harm her action will make to many people and the society in general. Thus, it adheres to ethical egoism.
Case 5: Tikya and John-john were contracted to design and develop a website for government agencies in the Philippines at the cost of P1 million. An added feature of the contract is that they would be contracted as computing consultants of the government.
In Egoist point of view, Tikya and John-john’s acceptance to create a website for government agencies and be computing consultants of the government is their stepping stone to be known and expand their contact. They can later on make deals outside the government that can make them earn more income.
In Altruist point of view, Tikya and John-john’s acceptance to create a website for government agencies and be computing consultants is to help the government agencies put its name on the Net and be known worldwide.
MG – morally good under all circumstances
MB – morally bad under all circumstances
MGB – morally good / bad under certain circumstances
MGB 1. software piracy
MB 2. pornography on the NetCopying of copyrighted software whatever its purpose, -may it be for selling and gaining profits or for personal use-, is morally bad for it deprives the owner of income from their own product. However, copying of software for personal use cannot be avoided due to high cost of licensed software, thus what is unethical becomes fair and just.
MB 3. creation of worms and computer virusesPornography means any written, graphic, or other forms of communication intended to excite lascivious feelings, hence pornography on the net is morally bad.
MB 4. infringement of intellectual property rights (of computer programmers)Pornography means any written, graphic, or other forms of communication intended to excite lascivious feelings, hence pornography on the net is morally bad.
MGB 5. violation of privacy (in communications via Internet)Infringement of intellectual property rights is a form of stealing and it is a violation of divine law, thus the act is morally bad.
MB 6. plagiarismViolation of privacy is morally bad; however it is morally good in circumstances where violation of such right will help protect the welfare of an individual in particular and the national security in general.
MGB 7. spammingPlagiarism is a human act that violates the righteousness, justice, equity, and fairness, hence it is morally bad.
MGB 8. hackingSpamming is morally bad if it contains worms and viruses that can destroy file or break into the recipients’ privacy; it is morally good if it is done with the good intention to inform recipients of product offers.
MB 9. computer abuseHacking is morally bad when the intention of hackers is to steal information, illegally transfer funds, destroy files, or jeopardize national security; however, hacking is morally good if the intention is to protect the welfare of people from threats of terrorism or any act that would endanger national security.
MB 10. computer crimes in generalComputer abuse means the improper use of computer and causes harm to other people, therefore it is morally bad.
Generally, computer crimes are morally bad for it do more harm than good to human.

0 Comments:
Post a Comment
<< Home