What is a policy vacuum give an example, and explain it using the standard account

Recommended textbook solutions

What is a policy vacuum give an example, and explain it using the standard account

Tonal Harmony, Workbook

8th EditionByron Almen, Dorothy Payne, Stefan Kostka

1,387 solutions

What is a policy vacuum give an example, and explain it using the standard account

Ways of the World: A Global History

3rd EditionRobert W. Strayer

232 solutions

What is a policy vacuum give an example, and explain it using the standard account

U.S. History

1st EditionJohn Lund, Paul S. Vickery, P. Scott Corbett, Todd Pfannestiel, Volker Janssen

567 solutions

What is a policy vacuum give an example, and explain it using the standard account

America's History for the AP Course

9th EditionEric Hinderaker, James A. Henretta, Rebecca Edwards, Robert O. Self

961 solutions

Merriam-Webster defines ethics as “the discipline dealing with what is good and bad, and with moral duty and obligation.”

In this case, Computer Ethics is a set of principles that regulate the use of computers. Vast research relating to computer ethics has been carried out mostly in developed nations. However, due to the dynamics of technology usage, we continuously face challenges around what is considered proper usage of our electronic devices.

Some common challenges are: Is it ethically right to connect to a coffee cafe’s free WiFi if you’re not in the cafe as a customer? — while most people don’t see what is morally wrong with doing so, it still doesn’t make it ethically right. Is jailbreaking your iPhone unethical? Is sending out personal emails using work email? How about taking advantage of the free calling minutes on a work phone to make personal calls? The truth is (unless stated otherwise) there is no standard or straightforward answer. In the first example, if the coffee cafe were to have a policy in place or state “Free WiFi — available to customers only,” then that makes it a criminal violation, not an ethical dilemma. When there are no policies in place, it is a bit hard to charge someone with a crime.

Image Source: WiFi Net News

The article “What is Computer Ethics,” published in 1985 by James Moor, outlines the primary problem in applying ethics to computers. Moor said there exists a “policy vacuum” in computer ethics, which is the lack of standard procedures or rules that govern actions that deal with the use of technology in a way that follows ethical values. Another identified issue associated with Computer Ethics is “conceptual vacuum,” which is the lack of a specific definition of terms that provide one with an understanding of the elements in a specific model or system. Moor’s work helped pave the development of policies and guidelines for ethics in technology.

Today, most organizations have ethical dos and don’ts. But what happens when there is no specified code of computer ethics in place? Even though there are many ethical standards, policies, and guidelines set by many companies, organizations, and bodies (ACM, CISSP, CEI, etc.) outlining how to use computers and related technologies. The issue is, unless you are part of one of these associations, it doesn’t apply to you.

The same issue applies to Nigerian organizations (especially small businesses). Unless they have a standard Code of Computer Ethics, one can always get away with doing something unethical, but not illegal. NITDA has some excellent policies and guidelines. It will be interesting to see other agencies implement such. The easiest way to overcome computer ethical issues is to have a defined Code of Computer Ethics.

I understand it will be hard to determine the details of the Code of Computer Ethics. But one approach is to understand individual activities that result in unwanted acts.

Another approach is using the model proposed by Michael Davis. In Davis’ model, “the ethical problem is stated, facts are checked, and a list of options generated by considering relevant factors relating to the problem created.” In general, defining how to deal with ethical issues as they arise has always been problematic.

Finally, when it comes to deciding how to act where neither policies, ethics, nor guidelines are available. The easiest way to understand the ethical ramifications is by attempting to associate the act with one of the most widely used Code of Computer Ethics. The Ten Commandments of Computer Ethics created in 1992 by the Computer Ethics Institute (CEI) are:

  1. Thou shalt not use a computer to harm other people.
  2. Thou shalt not interfere with other people’s computer work.
  3. Thou shalt not snoop around in other people’s computer files.
  4. Thou shalt not use a computer to steal.
  5. Thou shalt not use a computer to bear false witness.
  6. Thou shalt not copy or use proprietary software for which you have not paid (without permission).
  7. Thou shalt not use other people’s computer resources without authorization or proper compensation.
  8. Thou shalt not appropriate other people’s intellectual output.
  9. Thou shalt think about the social consequences of the program you are writing or the system you are designing.
  10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.

To learn more about the CEI Code of Ethics, visit their web page.

What are policy vacuums?

A policy vacuum exists when there is insufficient political and scientific pressure for policies to be produced, where the issue at hand is not considered salient and where there is lack of mobilisation to create policy change.

What is Moors standard account of computer ethics?

On my view, computer ethics is the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology.

Why is it difficult to fill policy vacuum?

Some policy vacuums cannot easily be filled because of conceptual muddles. In these cases, conceptual muddles first need to be elucidated before clear policies can be formulated and justified.

What is computer ethics give situations or examples?

1) Thou shalt not use a computer to harm other people: 2) Thou shalt not interfere with other people's computer work: 3) Thou shalt not snoop around in other people's files: 4) Thou shalt not use a computer to steal: 5) Thou shalt not use a computer to bear false witness: 6) Thou shalt not use or copy software for ...