Topic > The future challenges of computer ethics

IndexIntroductionEthical theoriesTen CommandmentsThe future challenges of computer ethicsInternet of Things (IoT)CryptocurrencyConnecting data and advanced artificial intelligenceAnalysis and evaluationRecommendationConclusionIntroductionCyber ​​ethics is a set of moral precepts that manage the use of computer. The word ethics originally comes from the Greek word which is ethos which describes as character. In general, ethics is explained as a set of morals that govern behavior that follows the concepts of right and wrong behavior of a group or individual. During World War II, Norbert Wiener founded computer ethics when he participated in the development of an anti-aircraft gun. The accident occurred between an aircraft tracking system and a portion of the fired projectiles which required the implementation of the feedback loop. Therefore, specific scientific challenges are needed that lead to the development of the cybernetics founded by Wiener. At that time, cybernetics dealt with information feedback systems that relied on the inspiration of animals and living beings. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay According to Vacura (2017), the existence of computer ethics must address the present and future ethical issues of computer technology. Widely problems faced with computer technology are unethical use of computer. Computer ethics deals with different types of unethical uses of computers such as computer crime, piracy, invasion of privacy, cyberbullying, abuse of intellectual property rights and other similar things. During the 1970s, real incidents occurred in which the first cases of computer crime occurred. Therefore, the public worries with satisfaction about the invasion of privacy. During the 1980s, influential publications in the field of computer ethics published their own book addressing issues related to unethical computer uses. The first textbook titled Computer Ethics that was published was written by Deborah Johnson and covers all issues related to using computers ethically and unethically. Ethical Theories Ethical theories involve decision making while ethics are at stake. Each ethical theory has different points of view in which it is important to guide the individual seeking help in making a decision. Each decision will lead to different consequences that are good or bad. However, some decision-making processes may not have an outcome for their actions because the right or wrong norms depend on the individual's perspective. Deontology, utilitarianism, Kantianism, and virtue ethics are some of the ethical theories listed for decision-making preferences. This research paper will further discuss the ethical theories in order to understand their different emphases. Deontology defines a theory that emphasizes duty and adheres to obligations that lead to good or bad consequences for particular cases (Chonko, 2012). For example, every leader is aware of his duty to be punctual when he attends a meeting, yet who makes him choose it as his duty even if it is a good ethical way. The theory of utilitarianism is the best description of the consequentialist theory. Utilitarianism can be divided into two types: act utilitarianism and rule utilitarianism. Act utilitarianism can be defined by its name, that is, acts that benefit people regardless of personal feelings or social constraints. On the other hand, government utilitarianism is concerned with law and benefiting people through fairness. Kantian theory is about right or wrong actions thatthey do not lead to any consequences. The action is only to fulfill the duty. Finally, virtue ethics is defined as an action that takes honesty into account. Honesty not only by telling the truth but also by doing other honest actions. Ten Commandments Nowadays, most people depend on technology and device to have a good performance. For example, people depend on computers to handle tedious jobs. However, damage from external threats could harm a vulnerable computer. Therefore, the Computer Ethics Institute established the Ten Computer Commandments to guide people to follow ethical behavior when using computers. Less or more, these Ten Commandments are an effort to raise awareness in society. First rule, don't use a computer to harm other people. From this rule we should refrain from programming the computer to do things that are dangerous to others. This is because the programmer is responsible for his own actions. For example, creating viruses to harm others is unethical behavior that should be avoided. Second rule: do not interfere with other people's computer work. This rule is further discussed where people have the right to use the computer. We should make others work easier instead of creating viruses that can destroy their valuable properties. Third rule: Don't snoop around other people's computer files. Avoid opening and reading someone's files, emails, databases and other similar things because it is an illegal activity. Rule number four: don't use your computer to steal. Without the use of cyber authorities, theft activities are bad manners towards society. While, stealing activity in computer, for example, earns profit from identity theft. So, use computer knowledge for purposes like being an ethical hacker. Rule number five is that you must not use a computer to bear false witness. Don't use your computer to create false facts, such as modifying other people's images to make an innocent person look guilty. At the same time, we should be more cautious and not easily believe everything that has been written and read on the Internet. Rule number six: You may not copy or use proprietary software that you have not paid for. This commandment is very important for the programmer, this is because coding good software is difficult. Therefore, we should appreciate their effort by purchasing the software or find an open source if we cannot afford that software. Installing pirated software can cause damage to your computer due to hidden malware. Aside from that, this rule can also mean to warn against plagiarism activities. Rule number seven, you cannot use other people's computing resources without permission or adequate compensation. Identity theft is unethical behavior that should be avoided. Intending to use someone else's identity to do bad things is illegal. Rule number eight: do not appropriate the intellectual production of others. Don't copy the work of others and pass it off as your own work. This is similar to plagiarism activities which are illegal and unethical. Rule number nine, you have to think about the social consequences of the program you're writing or the system you're designing. Leverage computer science knowledge to create software that can bring the greatest benefits to society. Avoid creating software to teach someone to steal, kill, and gamble. Finally, rule number ten is that you must always use the computer in a way that ensures consideration and respect for your fellow man. Consideration towards others is important to create a good environment with others. Use your computer wiselyfavorable and do not be selfish. Respect and be sensitive to the feelings of others. Future Challenges of Computer Ethics There are three main types of ethical issues that we face right now: personal privacy, right of access, and harmful actions (Ugbogbo & O.Michael, 2016). In terms of personal privacy, any individual or group's information data can easily be exposed worldwide. Subsequently, the right of access was quickly moved from a low priority to a higher priority. There are many attempts by hackers to get government information reported. Grimes, Fleischman & Jaeger (2009) state that malicious action can lead to damage or negative consequences, such as the intentional destruction or modification of files and programs up to the serious loss of resources due to computer viruses. However, the future challenges of computer ethics become more demanding. There are several future challenges of computer ethics: Internet of Things (IoT) An Internet of Things (IoT) is a system of interconnection between computing devices, mechanical and digital machines, objects, animals or people equipped with unique identifiers (UIDs) and the ability to transfer data over a network without involving human-to-human or human-to-computer interaction (Margaret Rouse, 2016). For example, a heart monitor implanted in the human body, a farm animal with a biochip transponder, a car equipped with a sensor that can detect tire pressure to alert the driver, or any object that can be assigned an IP address and be able to transfer data over the network. The IoT consists of smart, web-enabled devices that incorporate processors, sensors, and communications hardware to collect, send, and act on data required by their environment (Margaret Rouse, 2016). The IoT device shares the collected sensor data by connecting to an IoT gateway or edge device where the data is sent to the cloud to be analyzed or analyzed locally. The devices work without human intervention even if people interact with the devices. IoT opens up new opportunities for various companies to launch new business models and advanced services. IoT has the potential to transform how consumers and businesses approach the world by leveraging the reach of IoT beyond connectivity. Apart from this, IoT helps the organization to improve resource utilization. IoT will improve the tracking of assets such as equipment, machinery and tools using sensors and connectivity. However, IoT can be scary; companies can be hacked by other people. Many organizations do not have effective security protocols. Furthermore, IoT also reduces labor. With the automation of every task, the need for human labor decreases. Cryptocurrency A cryptocurrency is a digital or virtual currency that uses cryptography for security. Cryptocurrency is no longer easy to fake due to the security feature. Most cryptocurrencies are decentralized systems based on blockchain technology, a distributed technological ledger applied by several network computers. The first cryptocurrency-based blockchain was Bitcoin, which is still popular and highly valuable. Nowadays, there are many other cryptocurrencies with various functions or specifications. Angel and McCabe (2014) compare the forms of payment which are paper, plastic and virtual currencies, there is an asymmetric power relationship between payer and beneficiary and question the fairness of the payment. Cryptocurrencies are systems that allow you to secure online payment transactions designated in terms of virtual tokens, which represent log entries internal to the system itself. Cryptocurrencies.