DEVELOPMENT OF COMPUTER ETHICAL FRAMEWORK FOR INFORMATION SECURITY (EDUCATIONAL CONTEXT) MEYSAM NAMAYANDEH A thesis submitted in fulfillment of the requirements for the award of the degree of Master of Computer Science (Information Security) Centre for Advanced Software Engineering Faculty of Computer Science and Information System Universiti Teknologi Malaysia MARCH 2009 DEDICATION To my beloved Father and Mother ACKNOWLEDGEMENT This thesis would not have been possible without warm support of my family. The words come alive and inspire me by many reasons for writing these words. My father, who had guided me in breathless moments to happiness shelters and my mother for her unspeakable miracle. To my brother, Mohammad for his supports and her lovely wife Hengameh. To my lovely sister Marjan, the only angel in my entire life and her husband Mohsen, whom I may not be able to elaborate his character. Of course, I never forget my niece and nephews after all these years away from them. Even though, I may not find the appropriate words to describe them in few sentences, but this would remain in my heart to pray for them and I wish their holiness shadow would shine on me until the time without the end. Walking through all these years and meeting interesting people one after the other, there are few friends of mine whom I wish all the best to them while we were in India. As my second phase of life started in Malaysia, I wish to thanks Hossein and Tahmineh for their true meaning of friendship while we were spending our moments together. As the end of this acknowledgment, I have to dedicate my extreme appreciation to Dr. Rabiah Ahmad and my supervisor Dr. Maslin Masrom whom I may not experience this level of academic stage without their warm and bottomless guidance. ABSTRACT Information security and ethics have viewed as one of the foremost areas of concern and interest by academic researchers and industry practitioners. They are defined as an all-encompassing term that refers to all activities needed to secure information and systems that supports it in order to facilitate its ethical use. In this research, this very important part of current studies introduced and the fundamental concepts of a security framework are discussed. To achieve the goals of information security and ethics in Malaysian setting, there is a need of proper research and Malaysian students at Universiti Teknologi Malaysia International Campus Kuala Lumpur are chosen as a case study. Many kinds of technology-induced issues involve economic, political, social, operational and others. However, the most important and controversial issues often deals with such legal and ethical matters as security and privacy from educational aspects. Using survey research, insight is provided regarding the extent to which and how university student have dealt with issues of computer ethics and results of designed information security and computer ethics framework on their future career and behavioral experience are addressed. ABSTRAK Keselamatan maklumat dan etika dilihat sebagai satu daripada bidang utama yang menjadi perhatian dan menarik minat para penyelidik akademik dan pengamal industri. Ia ditakrifkan sebagai istilah terangkum yang merujuk kepada semua aktiviti yang diperlukan untuk menyelamatkan maklumat dan sistem yang menyokongnya, dengan tujuan untuk memudahkan penggunaan secara beretika. Dalam penyelidikan ini, kajian semasa keselamatan maklumat dan etika diperkenalkan dan konsep asas rangka kerja keselamatan dibincang. Sejarah etika komputer yang meluas juga dikaji. Untuk mencapai matlamat keselamatan maklumat dan etika dalam persekitaran Malaysia, suatu kajian yang tersusun diperlukan dan pelajar-pelajar di Universiti Teknologi Malaysia International Campus Kuala Lumpur telah dipilih sebagai kajian kes. Terdapat banyak jenis teknologi yang menyebabkan tercetusnya isu-isu yang berkait dengan ekonomi, politik, sosial, operasi dan lain-lain. Walau bagaimanapun, isu kontroversi paling utama adalah yang berhubung dengan isu undang-undang dan etika seperti keselamatan dan kerahsiaan daripada aspek pendidikan. Dengan menggunakan penyelidikan kaji selidik, kefahaman mendalam tentang bagaimana pelajar-pelajar universiti menangani isu-isu etika komputer dikemukakan dan dapatan kajian rangka kerja keselamatan maklumat dan etika komputer yang dibangunkan terhadap kerjaya masa depan pelajar dan pengalaman lakuan dibentang. vii TABLE OF CONTENTS CHAPTER TITLE …... .. PAGE DECLARATION ......................................................................................... v DEDICATION ............................................................................................ vi ACKNOWLEDGEMENT ........................................................................ vii ABSTRACT .............................................................................................. viii ABSTRAK ................................................................................................... ix TABLE OF CONTENTS .......................................................................... vii LIST OF TABLES ..................................................................................... xii LIST OF FIGURES .................................................................................. xiii LIST OF APPENDICES .......................................................................... xiv 1 INTRODUCTION............................................................................................... 1 1.1 Background of Problem .......................................................................... 2 1.2 Problem Statement .................................................................................. 3 1.3 Project Aim ............................................................................................. 4 1.4 Project Objective..................................................................................... 5 1.5 Project Scope .......................................................................................... 5 1.6 Importance of Study................................................................................ 5 1.7 Summary ................................................................................................. 6 2 LITERATURE REVIEW................................................................................... 7 2.1 Introduction ............................................................................................. 7 viii 2.2 Computer and Educational Society......................................................... 8 2.3 Computer Ethics Historical Milestones .................................................. 9 2.3.1 1970s ............................................................................................. 9 2.3.2 1980s ........................................................................................... 10 2.3.3 1990s ........................................................................................... 10 2.3.4 2000s ........................................................................................... 10 2.4 Defining the Field of Computer Ethics ................................................. 14 2.5 Topics in Computer Ethics ................................................................... 16 2.5.1 Computers in the Workplace ........................................................ 16 2.5.2 Computer Crime ........................................................................... 17 2.5.3 Privacy .......................................................................................... 18 2.5.4 Intellectual Property ..................................................................... 19 2.5.5 Accuracy ....................................................................................... 20 2.5.6 Accessibility ................................................................................. 20 2.5.7 Morality ........................................................................................ 21 2.5.8 Moral Model ................................................................................. 22 2.5.9 Awareness..................................................................................... 23 2.6 Developing Computer Security Awareness .......................................... 24 2.6.1 Basic Principals of Computer Ethics .......................................... 24 2.7 Types of Typical Attacks ..................................................................... 27 2.8 Types of Prevention ............................................................................. 29 2.9 Training and Education ......................................................................... 30 2.10 Training and Security Dimension ......................................................... 32 2.11 Educational Aspect ............................................................................... 34 2.12 Why Teach Computer Ethics ................................................................ 36 2.13 Ethical Issues to be Addressed.............................................................. 38 2.14 Code of Computer Ethics and Acceptable Use policy .......................... 38 2.15 Instructional Approach to Scenario Method ........................................ 43 2.15.1 Instructional Approach One 43 2.15.2 Instructional Approach Two 44 2.15.3 Instructional Approach Three 44 2.16 Ethics as Foundation of Information Security ...................................... 45 2.17 Related Research................................................................................... 48 2.18 2.17.1 Deindividuation Model 49 2.17.2 Planned Behavior Model 51 2.17.3 ISSX model 53 Summary ............................................................................................... 55 3 RESEARCH METHODOLOGY .................................................................... 56 3.1 Introduction ........................................................................................... 56 3.2 Survey Design ....................................................................................... 57 3.3 Research Philosophy ............................................................................. 58 3.3.1 Quantitative Research 58 3.4 Research Purpose Types ........................................................................ 59 3.4.1 Descriptive 59 3.4.2 Explanatory 60 3.4.3 Experimental 61 3.5 Data Collection Method ........................................................................ 61 3.5.1 Research Flowchart 62 3.5.2 Data Sampling Method 63 3.5.3 Instrumentation and Data Analysis 64 3.6 Research Planning and Schedule .......................................................... 66 3.7 Limitation of Research.......................................................................... 67 3.8 Summary ............................................................................................... 67 4 RESULT AND DISCUSSION ......................................................................... 68 4.1 Introduction ........................................................................................... 68 4.2 Research Framework ............................................................................ 68 4.3 Educational Approaches ....................................................................... 71 4.4 Information Security and Computer Ethics .......................................... 71 4.4.1 Scenario Framework 73 4.5 Purpose of Distributed Survey .............................................................. 75 4.6 Demographics ....................................................................................... 76 4.7 Educational Perception ......................................................................... 78 4.7.1 Awareness ................................................... 78 4.7.2 Privacy ......................................................................................... 79 4.7.3 Intellectual property ..................................................................... 80 4.7.4 Accessibility ................................................................................ 81 4.7.5 Morality ....................................................................................... 82 4.7.6 Accuracy ...................................................................................... 82 4.7.7 Information Security Perception .................................................. 84 4.7.8 Computer Ethics Perception ........................................................ 84 4.8 Real Time Scenarios Analysis .............................................................. 85 4.8.1 Scenario Number One ................................................................. 86 4.8.2 Scenario Number Two ................................................................. 87 4.8.3 Scenario Number Three ............................................................... 89 4.9 Summary ............................................................................................... 90 5 CONCLUSION AND RECOMMENDATION .............................................. 91 5.1 Summary ............................................................................................... 91 5.2 Contribution of Study ........................................................................... 92 5.3 Direction of Future work ...................................................................... 92 REFERENCES ......................................................................................................... 94 Appendices A-B ............................................................................................ 101-113 xii LIST OF TABLES TABLE NO. … TITLE …. PAGE 2.1 Classified Recent Ethical Research............................................... 12 2.2 Field of Interest ............................................................................. 13 4.1 Awareness ..................................................................................... 78 4.2 Privacy .......................................................................................... 79 4.3 Intellectual Property ...................................................................... 80 4.4 Accessibility .................................................................................. 81 4.5 Morality ......................................................................................... 82 4.6 Accuracy ....................................................................................... 83 4.7 Information Security ..................................................................... 84 4.8 Computer Ethics ............................................................................ 85 4.9 Scenario No 1 ................................................................................ 86 4.10 Scenario No.2 ................................................................................ 88 4.11 Scenario No 3 ................................................................................ 89 LIST OF FIGURES FIGURE NO. TITLE PAGE 2.1 Moral Model (Mellisa, 2006) ................................................................ 23 2.2 Basic Ethical Principles (Spinello, 2002).............................................. 25 2.3 Ethical Characteristics (Lee, 2003) ....................................................... 26 2.4 Deindividuation Model (Zimbardo, 1969) ............................................ 50 2.5 Planned Behavior Model (Azjen, 1985)................................................ 51 2.6 ISSX Model (Jussipekka and Seppo, 1998) .......................................... 54 4.1 Research Framework............................................................................. 69 4.2 Development Process ............................................................................ 70 4.3 Ethical Scenario Framework ................................................................. 73 4.4 Demographic Information ..................................................................... 76 4.5 Majors ................................................................................................... 77 4.6 Age ........................................................................................................ 77 4.7 Educational Analysis............................................................................. 83 4.8 Scenario Chart No.1 .............................................................................. 87 4.9 Scenario Chart No.2 .............................................................................. 88 4.10 Scenario chart No.3 ............................................................................... 90 LIST OF APPENDICES APPENDICES TITLE …... PAGE A Guideline .101 B Survey 108 1 INTRODUCTION CHAPTER 1 INTRODUCTION The current development in information and communication technologies have impacted all sectors in our daily life where does not matter whether it is technical or routine. To ensure effective working of information security, various controls and measures had implemented like the current policies and guidelines between computer developers. However, lack of proper computer ethics within information security is affecting educational society day by day. Undoubtedly, the most important of these controls is to define an understandable framework or model for students who roles future computer engineer or scientist. Hence, this project examines awareness (Hamid, 2007) and information of students in computer ethics from educational aspect. The complex interaction among engineering, technology and social, needs new educational challenges programs to prepare professional and technical skills (Boehlefeld, 1996). In today`s life it is an undeniable issue about the effects of ethics in our routine and technological life. Even though, engineer, technician, student or undemanding user, are connecting to internet from moment to moment but still they may not be aware of computer ethics that has become somewhat of a cottage industry recently in this era. Understanding computer ethics in security element is an important feature, in fact it has served as the organizing of major conferences (Kluwer, 2000). Those responsible for the development and application of computer technology faced with decisions of increasing complexity, which are accompanied by many ethical 2 dilemmas (Moor, 1998). Such person explains that computer technology is a special and unique technology, and hence the associated ethical issues warrant special attention. Indeed, points out that there is a need to understand the basic cultural, social, legal and ethical issues inherent in the discipline of computing. For these reasons, it is imperative that as a future computer professionals taught the meaning of responsible conduct (Langford, 2000). As information technology and the internet become ubiquitous and pervasive in our daily lives, a more thorough understanding of issues and concern over the information security and ethics is becoming one of the hottest trends in the whirlwind of research and practice of information technology. This is chiefly due to the recognition that whilst advances in information technology have made it possible for generation, collection, storage, processing and transmission of data at a staggering rate from various sources (Hamid, 2007). 1.1 Background of Problem Activities of computer are matters of calculation and not judgment. As computing become more prevalent, computer ethics becomes more difficult to minimize the threat and risks to the current technological century (Hamid, 2007). Similar to other technological invention throughout history, information technology tends to have both positive and negative effects on society, and tends to raise moral and ethical concern (Tavani, 2001). Computer ethics is defined as the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such a technology (Johnson, 1985).The number and kinds of application of computing increase dramatically each year and the impact of computing has felt around the planet. 3 The ubiquitous use of electronic mail, electronics transfer, reservation systems, the World Wide Web etc, places millions of inhabitants on the planet in a global electronic village (Philip, 2007). Communication and action at a distance have never been easier and this is definitely evolution of computer generation. The area of improper computer used and computer ethics has not remained unattended situations. Now, entire population of developed countries is in the permeation stage of revolution in which computers are rapidly moving into every aspect of daily life. Inspire by all the given views the question approaching our mind. The effects of information technology parallel the impact of other revolution (Moor,1998) equates the computer revolution with the industrial revolution citing two distinct stages involving technological introduction and technological permeation where during the latter stage, society has dramatically transformed computer technology to become an integral part of all institutions. Information age has important consequences for human being. Essentially, it has ushered a new range of emerging computer activities that have revolutionized the way that keeps the people connected but what if this important factor of the current life, itself become hazardous for educated users. 1.2 Problem Statement The internet has enormous impact on society, hacking, spam, denial of service attack are now common (Mellisa, 2006). Computer ethics can be define as the process of reflection on the moral meaning of action. This definition is meant to be broad and foundational and to incorporate several components of computer ethics in education (Waskul and Douglass, 1996). In fact, there was no comprehensive research that influences with Malaysian educational system in security area where in technology development it roles such an important factor to train our students and future engineers in order to alert them from social impact. 4 Malaysia is ranked 8 out of 10 top-infected countries in the Asia Pacific region as a target for cyber attackers (Sani, 2006). Those who seek to understand the changes from impact to benefit are realizing that information technology not only has already influenced lives profoundly but also will continue to do so in even greater and diverse way. In addition, it is necessary to understand the consequences of technology can be both positive and negative and raised ethical issues and concern. Computer ethics also called information technology ethics which is concerned with the ethical issues and conflicts that arise in the use of information technology and information systems. Further, it is about revealing the more impacts of technology shocks which are morally controversial but people are facing problem due to lack of ethics awareness in computer science. Here this question may across our mind that why they are developing it in computer field. An appropriate answer would be computer ethics has not made for particular topic; it is about people who are unaware of social impact of computer. In Malaysia, students should aware that computer ethics it is not simply a study in which grasp some fundamental truth in one static moment of time. It`s rather an ongoing process in which one is constantly engaged in a dialogue with ideas, people, history, tradition, other discipline and issues (Sani, 2006). 1.3 Project Aim The aim of this project is to develop a computer ethical framework. In addition, to describe what information security represents from computer ethics in educational context. 5 1.4 Project Objective The objectives of research are ¾ To investigate student`s awareness on information security and ethical issues within university campus. ¾ To evaluate the concept of computer ethics in terms of information security. ¾ To develop a computer ethics framework to focus on ethical behavior and information security. 1.5 Project Scope The project scope is limited to University Technology Malaysia (International Campus, Kuala Lumpur) students to receive acknowledgment from the given questionnaire and discussions. It will be based on a more comprehensive understanding of key ethical issues, which are rooted in significant behavioral assumption. However, the scope focus on the given theories and related security concepts. 1.6 Importance of Study As computer scientist entered to new century of information technology, it is undeniable to see the growth of interest in research and practice of all aspects of information security and ethics where information security and ethics is the top IT priority-facing organizations. However, the major task is to build this important issues from the basis of the current educational system and aware the students about computer ethics and related information security. 6 1.7 Summary The recent research indicates that there is an increasing demand for developing computer ethics as a field worthy of study. As a result, computer ethics is becoming a field in need of research based upon a necessity to provide information for education which is related to security concepts. The legal structure appears to be limited in its ability to provide ethical behavior effectively. While not wishing to be alarmists, research suggests the needs to be concerted effort on the part of the all the computer professional societies to update their ethical codes and to incorporate a process of continual security. Computer practitioners do not have a single representative organization which can control membership in the profession; there is no representative organization to impose sanctions for the violations of professional behavior. The absence of a single organization does not impede the development of professional ethics standards. The focus of this approach to computer ethics is on the individual professional's responsibility in the practice of his craft. As the standards of this craft are being developed, so are the standards of professional computer ethics. Computer ethics as presented here gives a clear description of the relation of values to the work of the computer professional and sets forth criteria for making ethical decisions in that process. The focus on stories about the failures of the product has misdirected us. They may be interesting stories to listen to, but they convey little information about computer ethics. Computer ethics as presented here gives a clear description of the relation of values to the work of the computer professional and sets forth criteria for making ethical decisions in that process. 2 LITERATURE REVIEW CHAPTER 2 LITERATURE REVIEW 2.1 Introduction Computer ethics is a new branch of ethics that is growing and changing rapidly as computer technology grows and develops. The term "computer ethics" is open to interpretations both broad and narrow. On the one hand, for example, computer ethics might understand very narrowly as the efforts of professional philosophers to apply traditional ethics (Langford, 2000). On the other hand, it is possible to construe computer ethics in a very broad way to include, as well, standards of professional practice, codes of conduct, aspects of computer law, public policy, corporate ethics even certain topics in the sociology and psychology of computing. Our information-driven society and endless request for more acknowledgment has created an extensive dependency on computer and information technology. This reliance upon computers has resulted in ethical concern and legal issues promoting organizational leaders to raise serious questions about computer ethics and the concepts of related information security. A major contributing factor to these concerns and issues has been the use of internet and many capabilities. Consequently, information technology has begun to affect community life, family life, human relationships, education, freedom, democracy, and so on. Computer ethics in the broadest sense can be understood as that branch of applied ethics, which studies and analyzes such social and ethical impacts of information technology (Philip, 2007). 8 Research showing the legal issues surrounding information technology and development of computer ethics as a better response to ethical dilemmas will all review. The review of literature provides insights from educational community and then turns to study showing the effectiveness of ethical instruction within a university campus. 2.2 Computer and Educational Society The prominence of information technology resulting in dependence on computer as necessary tool has penetrated all of society (Langford, 2000), including education aspects. However, the speed at which technological advancements have progressed appears to have been far faster than consideration of their impact upon cultural norms and values or the development or norm governing the use of technologies. In addition, these new technologies have caused new ethical and legal question to emerge (Langford, 2000). Information technology represents skills so that some argue that makes unique ethical claims and triggers distinct nations about right and wrong. Some of key areas of ethical concern that have been raised include, accessing without authorization, illegal copying of licensed soft ware hacking in to the network that violets university codes of conduct (Langford, 2000). Educational leaders have tended to dazzled by technologies or have pressured to keep up with trends in their use or application. As a result, they may have made decision without properly planning for and understanding the ethical problems that have come with their use and application (Smith, 2002). Moreover, inadequate of ethical codes and teaching about computer ethical issues become even more apparent in today`s controversial and constantly changing technological environment. In this environment, new ethical dilemmas are created and acting wrongfully becomes easier. Educational leaders must address these ethical issues because they 9 have a unique opportunity to help educate computer users to make the best moral decision. 2.3 Computer Ethics Historical Milestones As the computer ethics was one of the major topics which have been throughout the past decades, in order to prevent the people from the social impact, here in this part of literature review, will have a short milestone on computer ethics and related history of designed. 2.3.1 1970s During the late 1960s, Joseph Weizenbaum, a computer scientist at Massachusetts Institute of Technology in Boston, created a computer program that he called ELIZA. In his first experiment with ELIZA, he scripted it to provide a crude imitation of a psychotherapist engaged in an initial interview with a patient. Weizenbaum was shocked at the reactions people had to his simple computer program, some practicing psychiatrists saw it as evidence that computers would soon be performing automated psychotherapy. Even computer scholars at Masochist Institute of Technology became emotionally involved with the computer, sharing their intimate thoughts with it. Weizenbaum was extremely concerned that an "information processing model" of human beings was reinforcing an already growing tendency among scientists, and even the general public, to see humans as mere machines. In the mid 1970s, Walter Maner began to use the term computer ethics to refer to that field of inquiry dealing with ethical problems aggravated, transformed or created by computer technology. Maner offered an experimental course on the subject at University. During the late 1970s, Maner generated much interest in university-level computer ethics courses. He offered a variety of workshops and 10 lectures at computer science conferences and philosophy conferences across America. 2.3.2 1980s By the 1980s, a number of social and ethical consequences of information technology were becoming public issues in the world, issues like computer-enabled crime, disasters caused by computer failures, invasions of privacy via computer databases, and major law suits regarding software ownership (Deborah, 1985). Because of the work of Parker and others, the foundation had been laid for computer ethics as an academic discipline. In the mid-80s, James Moor of Dartmouth College published his influential article "What Is Computer Ethics? In Computers and Ethics, a special issue of the journal on that particular time. 2.3.3 1990s During the 1990s, new university courses, research centers, conferences, journals, articles and textbooks appeared, and a wide diversity of additional scholars and topics became involved. The mid-1990s has heralded the beginning of a second generation of computer ethics, which contain the new concept of security. The time has come to build upon and elaborate the conceptual foundation whilst, in parallel, developing the frameworks within which practical action can occur, thus reducing the probability of unforeseen effects of information technology application. 2.3.4 2000s The computer revolution can divided into three stages, two of which have already occurred, the introduction stage and the permeation stage. The world entered the third and most important stage the power stage in which many of the 11 most serious social, political, legal, and ethical questions involving information technology will present themselves on a large scale (Langford, 2000). The important mission in this era is to believe that future developments in information technology will make computer ethics more vibrant and more important than ever. Computer ethics is made to research about security and it`s beneficial aspects. It can be seen from this brief review that there are many views of what computer ethics comprises. This richness of opinion is probably due to a difference in perception of computing characteristics, the adopted focus - broadly split between the outcome/symptom of computing or the undertaking of computing, and the disciplinary background. Starting points are certainly different and include the properties of computer technology, the concept of computing, the application of computing and the human value impact of computing. ¾ The perspectives can analyze using several sub categories: ¾ social - considering the computing-impact on society ¾ professional - considering the manner of professional activity ¾ universal activist - inclusive of communities around the globe ¾ parochial - restricted consideration of current and future issues ¾ ethics only - drawing only from ethics theory ¾ multi-disciplinary - blending theory from several disciplines 12 Table 2.1: Classified Recent Ethical Research For example, Moor adopts a universal conceptual multi-disciplinary stance, Gorniak adopts an environmental universal ethicist stance, Maner is a properties ethicist and so on. What does this mean regarding the uniqueness claim? Those that have a very strong emphasis on the technological makeup are likely to see computing as unique. Those adopting a universal stance are more likely to subscribe to elements of uniqueness. Those who have strong application elements in their stance are more likely to question the wholly unique position. In the context of this research, it is interesting to analyze to what purpose these particular stances have putted. It is clear that the all the authors reviewed in this review have argued a particular stance to explain why and how certain situations and decisions have occurred and to give some insight to the future. It is also clear that these stances have used to substantiate the importance of a particular direction of computer ethics or justify some holistic label for computer 13 ethics. The Table 2.2 shows, for each author, the main thrust with respect to uniqueness and the underlying message as to the nature of computer ethics that the uniqueness stance has been used to justify and promote. For example, Johnson's genus-species stance is the justification for using existing theory for computer ethics in other words the "use the old order" holistic label. Table 2.2: Field of Interest Bynum's stance of computing being all pervasive is used to argue that computer ethics is about the human values and technology equation whilst pervasiveness is used by Anderson to promote the idea that computer ethics is important for all people in a technologically-dependent world. 14 2.4 Defining the Field of Computer Ethics James Moor's (Moor, 1998) definition of computer ethics in his article was much broader and wider ranging than that of relevant methods. It is independent of any specific philosopher's theory (Moor, 1998) and it is compatible with a wide variety of methodological approaches to ethical problem solving. Over the past decade, Moor's definition has been the most influential one (Moor, 1998). He defined computer ethics as a field concerned with policy vacuums and conceptual security models" regarding the social and ethical use of information technology. In the past decades, there was less discipline known as computer ethics. However, beginning with researchers in the 1990s, active thinkers in computer ethics began trying to delineate and define computer ethics as a field of study. Some old ethical (Smith, 2002) problems are made worse by computers, while others are wholly new because of information technology. By analogy with the more developed field of medical ethics, others focused attention upon applications of traditional ethical theories used by philosophers doing "applied ethics in information technology". A typical problem in computer ethics arises because there is a policy vacuum about how computer technology should be used (Davison, 2000). Computers provide us with new capabilities and these in turn give us new choices for action. Often, either no policies for conduct in these situations exist or existing policies seem inadequate. A central task of computer ethics is to determine what we should do in such cases, that is, formulate policies to guide our actions (Davison, 2000). One difficulty is that along with a policy vacuum there is often a conceptual vacuum. Although a problem in computer ethics may seem clear initially, a little reflection reveals a conceptual muddle. What is needed in such cases is an analysis that provides a coherent conceptual framework within which to formulate a policy for action. Moor said that computer technology is genuinely revolutionary because it is logically malleable. 15 According to (Moor, 1998) the computer revolution is occurring in two stages. The first stage was that of "technological introduction" in which computer technology was developed and refined. This already occurred. The second stage one that the industrialized world has only recently entered is that of technological permeation in which technology gets integrated into everyday human activities and into social institutions, changing the very meaning of fundamental concepts, such as money, education, work, and fair elections (Fowler, 2002). The danger is now more apparent that computer abuse will soon increase dramatically if it has not curtailed by legal sanctions and if people do not adapt some code of ethics. Sometimes people employ ethics when it is convenient and to their advantage. At other times, they set any ethical standards aside by rationalizing that there is a greater good that should considered. Unfortunately, ethical behavior is not part of the law of nature, but part of a person has set of beliefs and behavior. What is the solution to this increasing penetration by computers that violate security and invade a person’s privacy? Are laws and legal sanctions the only resolution? A proactive approach is teaching students about the need for ethical standards of behavior for computer professionals and users in classrooms. This may help assure that people who have an ethical code of behavior will not be tempted to illegally penetrate and copy data. Way of defining the field of computer ethics and security concern is very powerful and suggestive (Smith, 2002). It is broad enough to be compatible with a wide range of philosophical theories and methodologies, and it is rooted in a perceptive understanding of how technological revolutions proceed. Currently it is the best available definition of the field. The Computer Ethics Institute, a leader in the discipline, has comprised a guideline to help computer users in their ethical decisions. 16 2.5 Topics in Computer Ethics No matter which re-definition of computer ethics one chooses, the best way to understand the nature of the field is through some representative examples of the issues and problems that have attracted research and scholarship. Consider, for example, the following topics: 2.5.1 Computers in the Workplace Although computers occasionally need repair, but they don't require sleep, don't get tired, they don't go home ill or take time off for rest and relaxation. At the same time, computers are often far more efficient than humans in performing many tasks. Therefore, economic incentives to replace humans with computerized devices are very high. Indeed, in the industrialized world many workers already have been replaced by computerized devices bank tellers, auto workers, telephone operators, typists, graphic artists, security guards, assembly-line workers. In addition, even professionals like medical doctors, lawyers, teachers, accountants and psychologists are finding that computers can perform many of their traditional professional duties quite effectively. The employment outlook, however, is not all bad. Consider, for example, the fact that the computer industry already has generated a wide variety of new jobs, hardware engineers, software engineers, systems analysts, webmasters, information technology teachers, computer sales clerks, security consultants and so on. Thus, it appears that, in the short run, computer-generated unemployment will be an important social problem; but in the end, information technology will create many more jobs than it eliminates. 17 Even when a job is not eliminated by computers (Floridi, 1999) it can be radically altered. For example, airline pilots still sit at the controls of commercial airplanes but during much of a flight the pilot simply watches as a computer flies the plane. Similarly, those who prepare food in restaurants or make products in factories may still have jobs; but often they simply push buttons and watch as computerized devices actually perform the needed tasks. In this way, it is possible for computers to cause "de-skilling" of workers, turning them into passive observers and button pushers. Again, however, the picture is not all bad because computers also have generated new jobs which require new sophisticated skills to perform, for example, computer assisted drafting and keyhole surgery. 2.5.2 Computer Crime In this era of computer "viruses" and international spying by "hackers" who are thousands of miles away, it is clear that computer security is a topic of concern in the field of Computer ethics (Floridi, 1999). The problem is not so much the physical security of the hardware (protecting it from theft, fire, flood, etc.) but rather logical security, which is divided into several aspects: ¾ Privacy and confidentiality ¾ Integrity: assuring that data and programs are not modified without proper authority ¾ Unimpaired service ¾ Consistency: ensuring that the data and behavior we see today will be the same tomorrow ¾ Controlling access to resources 18 Malicious kinds of software, or programmed threats, provide a significant challenge to computer security. These include viruses, which cannot run on their own, but rather are inserted into other computer programs .Trusted personnel who have permission to use the computer system normally commit computer crimes, such as embezzlement or planting of logic bombs. Computer security, therefore, must also be concerned with the actions of trusted computer users. 2.5.3 Privacy It may define as the claim of individuals to determine for themselves when, to whom, and to what extent individually identified data about them is communicated or used (Smith, 2002). Most invasions of privacy are not this dramatic or this visible. Rather, they creep up on us slowly as, for example, when a group of diverse files relating to a student and his or her activities are integrated into a single large database (Smith, 2002). Collections of information reveal intimate details about a student and can thereby deprive the person of the opportunity to form certain professional and personal relationships (Smith, 2002). This is the ultimate cost of an invasion of privacy. So why integrate databases in the first place. It is because the bringing together of disparate data makes the development of new information relationships possible Questions of anonymity on the internet are sometimes discussed in the same context with questions of privacy and the internet, because anonymity can provide many of the same benefits as privacy. Similarly, both anonymity and privacy on the internet can be helpful in preserving human values such as security, mental health, self-fulfillment and peace of mind. Unfortunately, privacy and anonymity also can be exploited to facilitate unwanted and undesirable computer-aided activities in cyberspace, such as money laundering, drug trading, terrorism, or preying upon the vulnerable. 19 2.5.4 Intellectual Property One of the more controversial areas of computer ethics concerns the intellectual property rights connected with software ownership. Some people, like Richard Stallman who started the Free Software Foundation, believe that software ownership should not allow at all. He claims that all information should be free, and all programs should be available for copying, studying and modifying by anyone who wishes to do so. Others argue that software companies or programmers would not invest weeks and months of work and significant funds in the development of software if they could not get the investment back in the form of license fees or sales (Walters, 2001). Today's software industry is a multibillion-dollar part of the economy; and software companies claim to lose billions of dollars per year through illegal copying (Spinello, 2003). Many people think that software should be own able, but "casual copying" of personally owned programs for one's friends should also permitted. The software industry claims that millions of dollars in sales are lost because of such copying. Ownership is a complex matter, since there are several different aspects of software that can be owned and three different types of ownership: copyrights, trade secrets, and patents. One can own the following aspects of a program: ¾ The source code which is written by the programmer(s) in a high-level computer language like Java or C++. ¾ The "object code", which is a machine-language translation of the source code. ¾ The algorithm, which is the sequence of machine commands that the source code and object code represent. ¾ The "look and feel" of a program, which is the way the program appears on the screen and interfaces with users. 20 A very controversial issue today owns a patent on a computer algorithm. A patent provides an exclusive monopoly on the use of the patented item, so the owner of an algorithm can deny others use of the mathematical formulas that are part of the algorithm. Mathematicians and scientists are outraged, claiming that algorithm patents effectively remove parts of mathematics from the public domain, and thereby threaten to cripple science (Walters, 2001). 2.5.5 Accuracy Represents the legitimacy, precision and authenticity with which information is rendered. Because of the pervasiveness of information about individuals and organizations contained in information systems, special care must be taken to guard against errors and to correct known mistakes. Difficult questions remain when inaccurate information is shared between computer systems. Any framework should describe the legal liability issues associated with information (Melissa, 2006). Who is held accountable for the errors? this is an important question may come across every researcher`s mind or which party liable for inexact or incorrect information that leads to devastation of another. In addition, who is responsible for the authenticity, fidelity and accuracy of information? Who is to be held accountable for errors in information and how is the injured party to be made whole? Some data available in information systems masquerading as the gospel truth is completely in error. Today, in the information industry, which are producing so many details about so many people and their activities it would be such an important objective to have this concept spread out the companies. 2.5.6 Accessibility Regarding this important aspect of research this question may come across the people’s mind (Adam, 2001), who is held accountable for errors? Who can you 21 trust in order to outsource your project? In fact, in term computer ethics accessibility means, what kind of information would available for the legal users and students. What information does a person or an organization have a right or a privilege to obtain, under what conditions and with what safeguards? At the same time computer usage flourishes among some, there exists a large group of informationpoor people who have no direct access to computational technology and who have little training in its use. The educational and economic ante can be quite high when playing the modern information game. Many people cannot or choose not to pay it and hence are excluded from participating fully. In effect, they may become information dropouts (Mason, 1986). 2.5.7 Morality Unlike the other aspects where knowledge is object, this dimension is qualitatively different in that subject is explored in relation to object. In other words seeks to have students explore, explain, defend, question, deconstruct, and redefine their personal beliefs of right and wrong against the backdrop (Melissa, 2006). Therefore, the ethical framework that researchers are interested in is not a description of what is accepted as right and wrong by groups of people. This is known as descriptive ethics, while useful in some areas, descriptive ethics does not offer enough insight into who or where our students are ethically and how mentors, can create opportunities for them to grow. Nor students are interested in normative ethics, which are ethical frameworks for deciding what should be right and wrong. In this part, normative ethics are as a tool for students to explore, question, reframe, defend, tear down, and certainly rebuild their personal ethical awareness. 22 Instead, the moral development dimension describes the stages and transitions that humans experience as they develop morally (Langford, 2000). As they develop their own personal beliefs and behaviors about right and wrong. Developmental psychologists tend to agree that ethical development is epochal, meaning that the changes experience in our personal beliefs about right and wrong occur in distinct phases or stages. Furthermore, the growth is cumulative with each stage building on the previous stage. 2.5.8 Moral Model As Figure 2.1 shows, this is at the heart of interest in the moral development dimension. In this model (Melissa, 2006), researchers wanted to create educational opportunities that allow students to examine their existing beliefs regarding ethical and technical issues and in relation to existing technical, professional, legal, and cultural solutions (Melissa, 2006). In an earlier section, it described how students examine these solutions with an external, objective point of view. Now, the student is positioned at the centre of the intersecting circles. The is aim to create educational opportunities that allow and encourage students to explore “who am I now” in relation to technical, professional, cultural, and legal solutions to these ethical and security issues, and asks questions such as what is the relationship between who I am, who I want to be, and these issues and solutions? 23 Figure 2.1: Moral Model (Mellisa, 2006) 2.5.9 Awareness The most important factor in effective computer security is people their attitudes, their actions, and their sense of right and wrong (Huff and Frey, 2005). Problems and issues raised in the computing environment, Topics to be discussed include misuse of computers, concepts of privacy, codes of conduct for computer professionals, disputed rights to products, defining ethical, moral, and legal parameters, and what security practitioners should do about ethics. The issue of computer security has fallen into the gray area that educators and industry alike have avoided for fear that too little knowledge could be hazardous and too much could be dangerous (Huff and Frey, 2005). Most organizations acknowledge the need for data security, but at the same time, approach security as hardware. It may be more important, and far more successful to address the issue of data security as an attitude rather than a technology. The technology may vary between companies and vendors, but the attitudinal parameters can remain constant (Huff and Frey, 2005). If individuals, through awareness and knowledge, develop an ethical, moral attitude toward computer security, the transitions into the future will be much smoother (Cruz and Frey 2003). 24 Companies are beginning to offer very well organized, sophisticated awareness programs for their employees with the idea that the more employees know about security, the more likely they are to recognize danger points and possible breaches. 2.6 Developing Computer Security Awareness The rapid increase in the use of sophisticated computers has proliferated in the past decade. Organizations' dependence on the reliability, security, and confidentiality of data is critical. Along with this mushrooming growth in dependence on computers, organizations are faced with the dilemma of numerous violations (Pierson and Bauman, 2004), either intentional or unintentional of their computer systems. Companies are beginning to offer very well organized, sophisticated awareness programs for their employees with the idea that the more employees know about security, the more likely they are to recognize danger points and possible breaches. Effective security programs must be a team effort by all students. 2.6.1 Basic Principals of Computer Ethics For the proper use of information in an information society, the education relating to information ethics may present its goals as follows: First, respect for others must be cultivated. Second, although sharing beneficial information is welcome, other people’s intellectual property right must not be infringed. Third, various forms of information will be used productively. Fourth, telecommunications and the Internet will be used for acceptable time periods so that it does not harm actual life. 25 Figure 2.2: Basic Ethical Principles (Spinello, 2002) (Spinello, 2002) presented shown in Figure 2.2, four basic principles of information ethics, as the respect of intellectual property rights, the respect for privacy, a proper mark, and the prohibition of mischief. First, the respect for intellectual property, which stands on the basis of a cultural conviction that original work remains the property of its owner. Second, the respect of privacy, which we have to deal with actively with more specific information. It should be understood by the youth that hacking is a criminal offence, hurting other people. Methods for protecting an individual’s computer system should be taught. Accordingly, the fact that spreading viruses damages other people and the prevention of virus attacks should be taught, the youth should protect their system by learning about precautionary measures against viruses. Information ethics, we can see that even though ethics has been emphasized absolutely and universally, it has actually occurred as a function of local ethics. In 26 conclusion, information ethics in the future should be a discipline that carries out functions as shown in Figure 2.3. Figure 2.3: Ethical Characteristics (Lee, 2003) It must help us give careful consideration on all types of ethical problems the development of information and communications technology produces. Third, information ethics is transformative ethics. It must put emphasis on the necessity of human experience and the transformation of the system and policy. This is because it appears as a reaction against the dysfunction of large amounts of information, especially, the disorder and chaos in cyberspace. Fourth, information ethics must be universally global ethics, not one or the other, but must consist of both global and local disciplines. Internet crime, otherwise known as cybercrime, has involved intelligent, automated, larger-scale, distributed attacks, causing serious damage. In the past, hacking primarily displayed the hacker’s ability; however, modern hacking has evolved into antisocial actions, using the hacker’s knowledge for a criminal intent. Looking into the subject of hacking according to various situations, hackers have no regard for selling, distributing, falsifying, or destroying confidential information of a country, company, or individual (Lee, 2003). 27 This is regarded, because of a lack of proper information ethics, which is caused by the perception of being anonymous in cyberspace. According to the changes in the information society, it is common for personal injuries of revelation and forgery by malicious individuals obtaining databases with personal information, penetrating weak security systems. The most common reported disclosure of damage caused by stealing social security numbers, smart cards, frauds and internet hacking banking as such phishing, denial of service attack and SSL. 2.7 Types of Typical Attacks As practice has shown, attack types are only limited to one’s imagination .In principal, a number of attack types have been shown to compromise most of the known attacks experienced by corporate entities. The most common types of system attacks are as follows: ¾ Social engineering: This attack relies on the element of human weaknesses in protecting access information. ¾ Malicious Code: These types of attacks are often distributed via email attachments and infect large numbers of users. They may be created such that they self replicate. Such code, once activated, may destroy information, provide future improper access to a network, or lock-up a system. ¾ Distributed Denial of Service: This type of attack is often used when other protections have provided adequate security to the network. When such protections have denied attackers access, such attackers may resort to denying authorized users access to the network by overloading and hence crippling the network such that its performance significantly degrades or ceases to function altogether. 28 ¾ Physical perimeter penetration: Access to a user’s facility or network is gained by unauthorized physical access to the network circumventing other security implementations. ¾ Password cracking: Typically, lists of the most used passwords are tried as a means of unauthorized access to another’s network. ¾ Screen emulators: This is where low-level access is gained to a network and a screen emulator is placed on the access server that brings up a false screen that emulates the proper login screen. This false screen asks for the user’s login and password and then brings up a screen that states login incorrect, please try again. Actually, the login was correct and the false screen emulation program has now captured another user’s correct login and password. Via this means, low-level authorized parties may capture higher-level authorized parties logins and passwords (Tavani, 2001). ¾ Data diddling or destruction: Improper access is gained and an entity’s information is improperly changed or destroyed. ¾ Wireless intercepts: Intercepting either a wireless communication or signals that emanate from electronic devices. For instance, for only several hundred dollars in parts costs computer screens can be read from a half a mile or more away from the oscillations that emanate from the computer thereby thwarting access controls, authentication, encryption and other protections. ¾ As an additional issues on privacy and intrusion on personal data this could help the educators to understand the ethical behavior from information security dimension and invasion of personal information 29 2.8 Types of Prevention The current concept today in evaluating a computer security program is prevention on the front end, not just punishment on the backend. This concept represents a preventative maintenance attitude and should practiced by all members, to be fully effective and a part of life-long learning (Pierson and Bauman, 2004), ethical awareness should become a vital part of our educational system, starting in elementary schools and continuing through college classes (Tavani, 2001). Once employees or students are in the particular environment, their ethical education should not cease. Educational centers must constantly, assess their courses and orient for students on all facets of ethics and security. By building a strong base in terms of ethics awareness and constantly reiterating the vital necessity to maintain these base, educational systems will reasonably assured that they do, in fact, have a secure system. Many tools, processes and procedures have developed in an attempt to thwart improper access, utilization or destruction of networks, or information assets. No single step will likely result in adequate protection. In fact, as in weapons of destruction, there is an escalation in protection capability that is then matched or surpassed in Destructive capability, with this cycle constantly repeating. In practice, professional assistance should be sought in undertaking a threat analysis and designing and implementing concomitant adequate protections. Moreover, this is a process and not an end in and of itself. That is, as technology advances so do attacks that then require newer, usually more comprehensive defenses (Huff and Frey, 2005). ¾ Threat Assessment ¾ Security Plan, Policies, Procedures and Architecture Definition ¾ Physical Security (fences, locks, surge protectors, etc.) 30 ¾ Power Filtering and UPS devices to thwart oscillation interception and interpretation of power flows ¾ Access Controls (Firewalls, Passwords, Biometrics, etc.) ¾ Intrusion Detection Tools ¾ Virus Protection Tools ¾ Encryption (PKI and Private Key Systems) ¾ Authentication (digital certificates, tokens, digital signatures) ¾ Network Management Tools (Scanners, Sniffers, Profilers, Honey pots, Shunts) 2.9 Training and Education New security techniques to protect networks provide companies additional layers of security (beyond firewalls and encryption), providing better overall security. These innovative network security solutions include honey pots or decoys, air gaps, exit controls, self-healing tools and denial-of-service defenses . ¾ As a practical matter, it is suggested that at a minimum entities should ¾ Undertake a thorough threat assessment tempered by a cost/benefit analysis carried out by competent professionals on an ongoing basis, and develop and implement a plan. 31 ¾ Employ proven, and if prudent, government certified computer security tools and physical protections employing the concepts of “depth of and diversity in defense”. ¾ Continually re-examine and test, your own systems’ vulnerabilities. ¾ Implement appropriate back-up functions and redundancies as necessary. ¾ Update your defensive capabilities as determined as necessary from time to time. ¾ Continually train and educate your staff relative to threats and defenses and use outside professional assistance to fill in any gaps. ¾ Participate in educational, institutional or governmental forums that provide. Education, alerts, and assistance relative to threats. ¾ Obtain adequate insurance. ¾ Developing an Ethics Awareness Policy in Organizations If a company, organization or university decides to develop an Ethics Awareness, numerous factors should addressed (Spinello, 2003). A number of terms are used to describe the various ways in which an individual's competence or standards may be measured, Working definitions of these terms are: ¾ Certification: An affirmation by a governmental or private organization that an individual has met certain qualifications. ¾ Licensing: The administrative lifting of a legislative prohibition. 32 ¾ Accreditation: An affirmation by a governmental or private organization that an educational institution meets certain standards. ¾ Ethics: A standard of conduct drawn up by an organization to protect the consumer and competition against unfair practices. 2.10 Training and Security Dimension In terms of computer ethics, security would be an undeniable factor of it. Therefore, short review on information security which is apply able in computer ethics will help the researcher to identify the further study (Cruz and Frey, 2004). Many different terms have been used to describe security in the IT areas. Information security has become a commonly used concept, and is a broader term than data security and IT security. Information is dependent on data as a carrier and on IT as a tool to manage the information. Information security is focused on information that the data represent, and on related protection requirements. So the definition of information system security as the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats. Four characteristics of information security are: availability, confidentiality, integrity and accountability, simplified as the right information to the right people in the right time. ¾ Availability: concerns the expected use of resources within the desired timeframe. ¾ Confidentiality: relates to data not being accessible or revealed to unauthorized people 33 ¾ Integrity: concerns protection against undesired changes. ¾ Accountability: refers to the ability of distinctly deriving performed operations from an individual. Both technical and administrative security measures are required to achieve these four characteristics. Administrative security concerns the management of information security, strategies, policies, risk assessments, education etc. Planning and implementation of security requires a structured way of working. This part of the overall security is at an educational level and concerns. Technical security concerns measures to be taken in order to achieve the overall requirements, and is subdivided into physical security and IT security. Physical security is about physical protection of information, fire protection and alarm systems. The aim of researcher`s framework is to describe what information security represents from computer ethics view, combining the definitions and descriptions mentioned above. All requirements from the organizations concerning these characteristics must fulfill for information security to achieve. In this approach, three major aspect of security in terms of technical, formal and informal level of security will be studied (Spinello, 2003). Technical level security: From a technical perspective, the preservation of confidentiality, integrity availability and accountability requires the adoption of IT security solutions such as encryption of data and communication, physical eavesdropping, access control systems, secure code programming, authorization and authentication mechanisms, database security mechanisms, intrusion detection systems, firewalls. At this level, it is possible to introduce frameworks and methods for the selection of the appropriate technological solution depending on the needs for a particular application with respect to security in computer ethics. Formal level security: The formal level of Information Security is related with the set of policies, rules, controls, standards, etc. aimed to define an interface between the technological subsystem (Technical level) and the behavioral subsystem 34 (Informal level and computer ethics). According with many definition of an Information Security, this is the level where much of the effort of the Information Security is concentrated. An interesting review of the security literature identifies a trend in information system research moving away from a narrow technical viewpoint towards a socio-organizational perspective. In fact, the first methods for addressing security at this level are checklist, behavior analysis and evaluation (Pierson and Bauman, 2004). At the beginning such methods have been grounded in particular well-defined reality (i.e. military), focusing on a functionalist view of reality. However many philosophers show that the definition of rules, standards and controls becomes more complicated than the design of technical systems. Informal level security: In the domain of the informal level of Information Security, the unit of analysis is individual and the research is concerned about behavioral issues like values, attitude, beliefs, and norms that are dominant, and influencing an individual employee regarding security practices in an organization (Pierson and Bauman, 2004). The solutions suggested in this domain are more descriptive than prescriptive in nature and the findings at this level need to effectively implement through other levels (i.e. formal and technical). An interesting review of research papers in the behavioral or computer ethical domain is, looking at used theories, suggested solutions, current challenges, and future research. 2.11 Educational Aspect Computer education now begins in elementary school and is not longer a restricted technical specialty learned only by those who are going to design or program computers. Because of the widespread prevalence of computers in society (Spinello, 2003) a core of ethical precepts relating to computer technology should be communicated not only to computer professionals, but to the general public through all levels of education. The issue should be viewed from the perspective of society and perspective of computer professionals. 35 In looking at the computer ethics there is a great emphasis upon incorporating ethical and social impact issues throughout the curriculum starting at the point when children first become computer users in school. In particular, there are a set of guidelines regarding what students in general need to know about computer ethics (Johnson, 1999). The preparation of future computer professionals should be examined at both the high school and university computer science curriculum. The researchers are in the process of developing new recommendations at both levels of curriculum. In the high school curriculum, there will be both general and specific approaches to ethics and social impact issues. The general approach is to incorporate these concerns across the curriculum, not just in computer courses. This is in keeping with the philosophy that computers should be integrated across the curriculum as a tool for all disciplines. The specific approach is to develop social impact modules within the computer courses that will focus on these concerns (Hyder and Werth and Browne, 1993). The dilemma is whether this new strand should be present in all computer science courses or should be taught in a stand-alone course. Some great philosophers, had discussions of ethics in the context of other computer science courses in the curriculum to eliminate the tendency of professors to skip over ethical considerations with the excuse that it is taught in ethics. However, they recognize the possibility that the ethics material could receive short shrift in a crammed technical syllabus, as is alleged to occur in many law schools. When combined with other computer science core material, the teaching of ethics is made complicated by the fact that it is not as concrete as the rest of the curriculum. In accepting the value-laden nature of technology, researchers should recognize the need to teach a methodology of explicit ethical analysis in all decisionmaking related technology. It may borrow from the strategy of traditional university ethics courses to use case studies (Hyder and Werth and Browne, 1993). Some researcher agreed that (Meyer, 2001) they must teach students to use the preliminary of ethical concepts developed by the computer professional societies 36 to first deal with hypothetical cases in order to prepare them to deal with real ethical dilemmas in the future. The challenge to computer educators is to develop strategies that will raise the awareness of students regarding ethical and moral issues related to computer technology at the same time that they are developing their technical expertise. The existing research and studies related to computer ethics in education provide insight and understanding concerning student perceptions, concern of educators, effectiveness of ethical instruction can, in fact, make a difference promoting ethical decisions by computer users (Staehr, 2002). Information technology is in filtrating almost every aspect of educational institution from kindergarten to universities. 2.12 Why Teach Computer Ethics Numerous ethical and social issues caused by computer technology arise. According to (Staehr, 2002) these issues have three unique characteristics: ¾ New concerns are rapidly emerging, ¾ Computer ethics presents a continuous stream of new situations, and ¾ Computerized information systems are usually complex. Ideally, students should be equipped with theories of philosophy and ethics pertinent to these characteristic, as well as the skills to analyze, evaluate, and react appropriately to ethical dilemmas. It may arise during their careers as IT professionals.(Staehr, 2002) identified the following main categories in which these ethical and social concerns usually arise: 37 ¾ Computer crime and computer security, ¾ Software theft and intellectual property rights, ¾ Computer hacking and the creation of viruses, ¾ Computer and information system failure, ¾ Invasion of privacy, ¾ Social implications of artificial intelligence and expert systems. It is often within the context of these categories, that the behavioral actions of the IT professional impact on society. Researcher believes this to be one of the main reasons as to why Computer Science or Information Security instructors should sensitize their students, the IT professionals of the future, to actions that underpin concepts such as “good”, “moral”, “ethical”, and “beneficial” for society at large. This is in agreement who states that the teaching of CE should aim towards several important goals, namely: ¾ Increased sensitivity to ethical concerns and situations. ¾ Reasoning about alternative courses of action and the integrity to make moral decisions. A certain historical perspective is gained by recalling two major contributions in the teaching of computer science. The nine core subject areas in algorithms and data structures, architecture, artificial intelligence and robotics, database and information retrieval, human-computer communication, numerical and symbolic computations, operating systems, programming languages, and software methodology and engineering. The recognition of the social, ethical and professional context of computer science was included as one of the foundational principles. 38 2.13 Ethical Issues to be Addressed Appropriate conduct in some areas of ethical behavior is easier to teach than others. Many aspects of computer crime, for example, are easier for most people to grasp. Abuses of automated teller machines and electronic funds transfer systems is becoming more common but is obvious to all as criminal activity. Other areas such as software piracy and new laws governing ‘hacking’ and malicious software, however, are often hard to understand. To many individuals involved with breaking into computer systems and networks, their activities seem like harmless intrusions that have not caused any damage (Cappel, 1995). The issue of an individual’s right to privacy is often harder to understand when the victim is a faceless entity. Just like a small child who has to be taught that it is not polite to enter someone’s room and start looking through their possessions, users of computer networks need to be taught that snooping through someone’s files and email is also not polite or ethical. For too long the public’s perception of the normal computer intruder was a high school (or younger) student who was doing it for fun, not for any malicious intent (Cappel, 1995). In addition to representing a pressing business and social concern, computer ethics increasingly has seen as an important area of study. Many universities have added computer ethics to their curricula, a measure that is now required for a computer science department to earn certification by the Computer Accreditation Board. Even elementary and secondary school students exposed to computer-ethics lessons in the early 2000s. 2.14 Code of Computer Ethics and Acceptable Use policy This summary of the Code of Computer Ethics and Acceptable Use Policy outlines the ethical, acceptable, and unacceptable use of information systems. It is intended to identify key security issues for which individuals, colleges, departments, and units are responsible. 39 1) Privacy and confidentiality must be balanced with the need for the university to manage and maintain networks and systems against improper use and misconduct. 2) Exceptions to privacy of information allow to access, monitor or disclose confidential or personal information residing on its information networks and systems. 3) Policies for protection of information and security practices are defined as: ¾ Protection of information depends on who has created the information, who is maintaining the information, the nature of the information itself, and whether there are specific federal and/or state laws or university requirements or guidelines associated with the use and distribution of the information. ¾ University information: Students, faculty and staff are responsible for accessing only confidential and business university information for which they are authorized and are required to comply with security policies established by the university or specific departments. ¾ Individuals are responsible for securing and protecting their information based on the level of risk associated with its loss or misuse. ¾ Password security: users are responsible for passwords and activities linked to their accounts and must follow university standards for maintaining and managing passwords. ¾ User security practices: users are required to employ security practices to prevent unauthorized activity. Such practices include using password protected screen savers, not storing passwords in obvious places, securely transferring information. 40 ¾ Security for IT systems: to protect systems individuals must use and promptly upgrade virus-scanning software, security patches, operating and other software, and any other security measures for specific security threats. ¾ Reporting security breaches Individuals are expected to prevent computer equipment under their control from being infected with malicious software by the use of preventive software and monitoring and take immediate action to prevent the spread of any acquired infections from any computers under their control. Individuals should power down the computer or disconnect it from the campus network then report IT security incidents to an information technology support professional. First attempt to contact local department, college, or designated information support professional. 4) Framework for unacceptable use activities in addition to illegal violations includes: ¾ Excessive non-priority use of computing resources, such as recreational activities or non-academic or business services. ¾ Unacceptable system and network activities. ¾ Engaging in or effecting security breaches or malicious use of network. ¾ Circumventing user authentication or accessing data, accounts, or systems that the user is not expressly authorized to access. ¾ Interfering with or denying service to another user on the campus network or using university facilities or networks to interfere with or deny service to persons outside the university. 41 ¾ Unauthorized use of intellectual property ¾ Engaging in unauthorized copying, distribution, display or publishing of copyrighted material including, but not limited to, digitization and distribution of photographs from magazines, books, or other copyrighted sources; copyrighted music or video; and the installation of any copyrighted software without an appropriate license. ¾ Using, displaying or publishing licensed trademarks, including Iowa State university’s trademarks, without license or authorization or using them in a manner inconsistent with terms of authorization. ¾ Exporting software, technical information, encryption software, or technology in violation of international or regional export control laws. ¾ Breaching confidentiality agreements or disclosing trade secrets or pre-publication research. ¾ Using computing facilities and networks to engage in academic dishonesty prohibited by university policy (such as unauthorized sharing of academic work, plagiarism). ¾ Inappropriate or malicious use of IT systems ¾ Setting up file sharing in which protected intellectual property is illegally shared. ¾ Intentionally introducing malicious programs into the network or server (viruses, worms, Trojan horses, and email bombs). 42 ¾ Inappropriate use or sharing of university-authorized IT privileges or resources. ¾ Changing another user’s password, access, or authorizations. ¾ Misuses of e-mail and communications activities. ¾ Sending unsolicited email messages, including the sending of "junk mail" or other advertising material to individuals who did not specifically request such material, except as approved under the mass e-Mail policy and effective e-communication policy. ¾ Engaging in harassment via email, telephone, or paging, whether through language, frequency, or size of messages. ¾ Masquerading as someone else by using their e-mail or internet address or electronic signature. ¾ Soliciting email from any other email address, other than that of the poster's account, with the intent to harass or to collect replies. ¾ Creating or forwarding "chain letters" or solicitations for business schemes. ¾ Using email originating from within Iowa State’s networks for commercial purposes or personal gain. ¾ Sending the same or similar non-business-related messages to large numbers of email recipients or newsgroups. 43 2.15 Instructional Approach to Scenario Method There are different classroom procedures for exposing students to the abstract subject of computer users’ ethical behavior. The author prefers presenting scenarios for discussions (Couger, 1989). However, all faculty members do not ‘dive into the waters of a new teaching model.’ Some prefer to stay with a teaching style that is comfortable and familiar. Therefore, what the author believes is the most desirable approach may not be everybody’s approach. Before enumerating three methods for teaching the subject of ethical standards, the computer-specific ethical issues are as follows: ¾ Storing and processing data. Should an unauthorized use of otherwise unused computer services or information stored in computers raise questions of appropriateness and fairness? ¾ Producing computer programs. Computer programs are assets. Should they be subject to the same concepts of ownership as other assets? ¾ Outputting computer information. To what degree must computer services and users of computers, data and programs be responsible for the integrity and appropriateness of computer output? ¾ Artificial Intelligence and Expert Systems. Should the images of computers as thinking machines, absolute truth products, infallible, and replacements for human errors and as anthropomorphic in nature absolve them from any serious considerations? 2.15.1 Instructional Approach One The first pedagogical approach to the teaching of ethics is to lecture that ethics is a code of behavior. Begin with a clearly defined dictionary definition of ethics. A set of principles of right conduct; A theory or a system of moral values; The 44 rules or standards governing the conduct of a person or the members of a profession. Subsequently continue to lecture on the behavioral code of ethics for computer professionals. In turn, specify the risks and implications of the abuse of computer systems. These could be part of a series of lectures in a computer course. This method will inform students about the meaning of ethics. Will this excite students and ensure they will adopt the right behaviors? Maybe, yet lectures are often the least effective way for students to learn and reflect beyond a casual examination of any lecture notes. 2.15.2 Instructional Approach Two The second method to imbue students with a sense of an ethical code of behavior is to assign readings in current periodicals and newspapers. There are many articles about professionals adapting to and violating real-life ethical issues. Reading periodicals may start a few students personalizing ethical issues. However, how does the instructor reach the other students who do not reflect on ethical questions? A majority of the students need to evaluate their own ethical behavior code before they can consider computer professionals’ codes. 2.15.3 Instructional Approach Three The third method is to get each student to personalize the topics of computer ethics by way of the presentation of scenarios. A typical scenario predicament for students is as follows: A. A company bought a micro software computer program for a part time student to use at work. The license agreement stipulates, a person should make a backup copy of this program, but he may only use the program on a single machine at any one time. Knowing he has permission to make a backup copy, why not make other copies for 45 friends? They only use one computer each and these are backup copies. After all, making backups appears to adhere to the ‘spirit’ of the license though not the ‘letter’ of the license agreement. Was this student’s action in giving copies of the program to friends acceptable, questionable or unacceptable? B. Since this particular case requires personal interpretation of copying software, a common dilemma for students, it can become immediately relevant. Another scenario that includes ethics issues applicable to student behavior is as follows: A university student obtained a parttime job as a data entry clerk. His job was to enter personal student data into the university database. Some of this data was available in the student directory, but some of it was not. He was attracted to a student in his algebra class and wanted to ask her out. Before asking her, though, he decided to access her records in the database to find out about her background. Were the student’s actions in accessing a fellow student’s personal information acceptable, questionable, our unacceptable (Sackson, 1998). Initially ask students to write answers anonymously to the questions posed by a scenario. In a separate paragraph ask them to determine what they would do in the same situation. After receiving the written responses, have a class discussion of the scenario and responses This method allows the students to hear other viewpoints and alerts them to issues that they might not have previously considered. Choosing scenarios that are more relevant to students are more likely to result in a student’s personalization of the situation. A meaningful sequence of scenarios may alter student’s attitudes toward a code of ethical behavior (Sackson, 1998). 2.16 Ethics as Foundation of Information Security Ethics is an important facet of comprehensive security of information systems. Research in ethics and information systems has been also carried outside the 46 information security community. Anyhow, researcher (Jussipekka and Seppo, 1998) sees that the relationship of hackers and information security personnel has not yet been properly analyzed. Within this short review, a philosophical point of view shall be taken, and problems of establishing ethical protection measures against violations of information security shall be studied (Cruz and Frey, 2003). The major argument is that hacking ethics is significantly different from information security ethics (Jussipekka and Seppo, 1998) and therefore major difficulties must be solved to establish widely accepted standards for ethical usage on information systems and communication networks. This argument is supported by an extensive analysis and comparison of philosophical and ethical theories. This analysis leads to quite opposite results of the main stream arguments that support the need of common ethical foundation for the security of information systems. A new group and social contract based security layer shall be added on top of ethical layer. This addition provides with a framework that is feasible within the current technology, supports natural social behavior of human beings and is iterative enabling forming of larger communities from smaller units. Typically, the hacking community has been arguing for the freedom of information. Security community has been opposing by arguing that system intrusion and hacking, even if no actual harm is caused, is unethical and criminal activity that one should not commit to, even if technically possible(Cruz and Frey,2003). The question rising from this conflict is how can these two groups claim they have a right to tell each other what is ethical and what is not. Recently, the trend appears to be that the ethics approved by the security community is having the law enforcement (Cruz and Frey, 2003). Several attempts around the world have made to enforce proper behavior in the information society by juridical methods. From information security, point of view hackers have seen as criminals, unaware of the results of their immoral activities making fun out of serious problems. Hacker community, on the other hand, sees information security staff as militants that respecting the freedom of individual and information (Fowler, 2002). 47 Information security specialists tend to specify what ethical behavior is and what not (Jussipekka and Seppo, 1998) is. On the other hand, typical approach among hackers is that their activity provides good outcome for the information security community by identifying vulnerabilities in systems. These approaches unfortunately are in a strong conflict (Jussipekka and Seppo, 1998). Further depth into the conflict can found by introducing another dimension to the classification of ethical theories into two categories: Phenomenologist vs. Positivist and individualist vs. collectivist ethics (Jussipekka and Seppo, 1998). Phenomenologism vs. Positivism: According to the phenomenological school, what is good is given in the situation, derived from the logic and language of the situation or from dialogue and debate about “goodness”. Positivism encourages s to observe the real world and derive ethical principles inductively. Individualism vs. Collectivism: According to the individualistic school, the moral authority is located in the individual (Jussipekka and Seppo, 1998), whereas collectivism says that a larger collectivity must care the moral authority. Major schools, based on these concepts, can listed to be Collective Rule-Based Ethics, Individual Rule- Based Ethics (Waskul and Douglass, 1996). Ethical protection measures intend to provide a common high moral code for the usage of communication networks. It is very difficult to find common values between hackers and information security personnel. As these values cannot be identified, there is no need for common moral code to protect these values (Adam, 2001). The truth values of ethical value statements are subjective and can therefore not be transferred from one moral system to another. Universality is a fatal requirement for ethical and moral systems, especially when the relationship of culture and moral is agreed upon the given situation to students (Adam, 2001). 48 2.17 Related Research The importance of teaching computer ethics is becoming one of the main factors of university nowadays. However, as the paper outline says defining issues test of moral judgment are important, significantly larger increase moral judgment better enable students to decide under the certain computer ethical circumstances. Further, as per to the consideration of the researcher, there is a lack of conceptual framework in order to show the potential meaning of security. Even though, all the aspect like developing ethics in education , moral development, issues test have been studied but still student may not be aware define the security area in their professional career. From Malaysian perspective, review of related research indicates the existence of conflicting views concerning the ethical perceptions of students. In several papers that studied under Malaysian students shows about conducted of awareness in a survey for 245 students to analyze Malaysian student`s information from ethical views and behavioral awareness. Their finding reveals a high proportion of young adults actively struggling with their concept of ethics and behavior. They also found that a large number of students are engaged in their daily life regarding lack of awareness in information security (Masrom and Ismail, 2008). Given the explosive growth of computer ethics during the past two decades, the field appears to have a very robust and significant future (Deborah, 1985). However, some philosophers and Deborah Johnson have recently argued that computer ethics will disappear as a separate branch of applied ethics into global ethics. He expressed a view, which, upon first sight, may seem to be the same as before. Deborah’s hypothesis addresses the question of whether or not the name computer ethics (or perhaps information ethics) will continue to be used by ethicists and others to refer to ethical questions and problems associated with information technology. 49 On Deborah’s view, as information technology becomes very commonplace as it is integrated and absorbed into our everyday surroundings and is perceived simply as aspect of ordinary life we may no longer notice its presence. At that point, we would no longer need a term like ‘computer ethics’ to single out a subset of ethical issues arising from the use of information technology. Computer technology would be absorbed into the fabric of life, and computer ethics would thus be effectively absorbed into ordinary ethics. 2.17.1 Deindividuation Model Deindividuation (Zimbardo, 1969) theory is a social psychological account of the individual in the crowd. Deindividuation is a psychological state of decreased self-evaluation, causing anti-normative and disinherited behavior. As Figure 2.4 depicts, the impact of deindividuation theory in science and society (especially 20th century politics) make it one of social science's contributions that are more influential. Deindividuation theory is rooted in some of the earliest social psychological theorizing, more than a century ago. It seeks to explain the apparent transformation of rational individuals into an unruly group or crowd. It posits that the group provides an environment in which the individual, submerged and anonymous suffers from a loss of self-awareness. 50 Figure 2.4: Deindividuation Model (Zimbardo, 1969) Deindividuation hinders reflection about the consequences of actions, rendering social norms impotent while increasing suggestibility to random outside influences. In addition, it has been proposed, that deindividuation marks a transition from individual identity to social dimensions of the self (Zimbardo, 1969). This transition to a social identity may increase responsiveness to social norms particular to the crowd, instead of decreasing responsiveness to generic social norms, as suggested by deindividuation theory. Some have noted that the computer is often considered one of the most socially distancing and impersonal modes of communication and that computer communication represents only one-step above no communication. Some researcher states, because computer breaks down hierarchy and cut cross norms and organizations boundaries, people behave differently when using them. New technology tends to have an unintended social effect because it permanently changes the way social and work activities are organized. The computer has become a communication tool, and is referred to some individuals as social 51 activity. Information technology also has the ability to break down hierarchical and departmental barriers. 2.17.2 Planned Behavior Model The theory of Researched Action expanded to become the theory of planned behavior. The central factor of this theory is individual`s intention to perform a give behavior. Intention assumed to capture motivational factors that influence behavior. These are indications of how hard people are willing to try and how much effort is exerted in order to perform the behavior (Walters, 2001). This theory postulates three dimension of intention: a) attitude towards behavior and degree to which a person has favorable or unfavorable evaluation of behavior b) the social factor, or subjective norm is to perform or not to perform the behavior; and c) the last determinant is the difficulty of performing the behavior based upon prior experience and anticipated action (Azjen,1985 and Walters, 2001). Figure 2.5: Planned Behavior Model (Azjen, 1985) 52 This theory postulates three dimension of intention: a) attitude towards behavior and degree to which a person has favorable or unfavorable evaluation of behavior b) the social factor, or subjective norm is to perform or not to perform the behavior; and c) the last determinant is the difficulty of performing the behavior based upon prior experience and anticipated action (Azjen,1985 and Walters, 2001). The main purpose of this theory was: ¾ To predict and understand motivational influences on behavior that is not under the individual's volitional control. ¾ To identify how and where to target strategies for changing behavior. ¾ To explain virtually any human behavior such as why a person buys a new car, votes against a certain candidate, is absent from work or engages in premarital sexual intercourse. This theory provides a framework to study attitudes toward behaviors. According to the theory, the most important determinant of a person's behavior is behavior intent. The individual's intention to perform a behavior is a combination of attitude toward performing the behavior and subjective norm. The individual's attitude toward the behavior includes; Behavioral belief, evaluations of behavioral outcome, subjective norm, normative beliefs, and the motivation to comply. If a person perceives that the outcome from performing a behavior is positive, she/he will have a positive attitude forward performing that behavior. The opposite can also be stated if the behavior is thought to be negative. If relevant others see performing the behavior as positive and the individual is motivated to meet the exceptions of relevant others, then a positive subjective norm is expected. If relevant others see the behavior as negative, and the individual wants to meet the expectations of these "others", then the experience is likely to be a negative subjective norm for the individual. 53 Attitudes and subjective norm are measured on scales using phrases or terms such as like/unlike, good/bad, and agree/disagree. The intent to perform a behavior depends upon the product of the measures of attitude and subjective norm. A positive product indicates behavioral intent. 2.17.3 ISSX model To establish a new foundation for the security of distributed systems, three fundamental requirements shall be set for the proposed framework. First, the framework must support the natural behavior of human beings with establishment of social contracts. Second, the framework must be iterative in the sense that large systems can composed from smaller sub systems. Third, the Framework must be feasible within current technologies (Jussipekka and Seppo, 1998). First requirement is crucial to guarantee that no conflicts exist with behaviour of human beings within society in general and in the context of public distributed systems. This requirement is satisfied by the group establishment procedure. Humans within a group can be expected to follow the acceptable code of conduct within that group. Similarly, different groups can form larger groups that are essential to satisfy the second requirement (Jussipekka and Seppo, 1998). The model must support forming of groups first of human beings, and then by combining groups and establishing communication links between different groups. This is supported by the nature of group behavior. 54 Figure 2.6: ISSX Model (Jussipekka and Seppo, 1998) As Figure 2.6 shows security of information systems requires both technical and non-technical measures, special effort must be paid on the assurance that all methods support each other and do not set contradictory or infeasible requirements for each other. Security protocols have been established for secure group communications and therefore the uppermost level in the extended ISSX model can be enforced using existing technology (Adam, 2001). As groups expand, it is not only those groups get new members, but also different groups with common interests act in cooperation to achieve their goals. Further, the ISSX model assumes managerial and administrative layers on top of operational layer. This is on align with commonly agreed view that comprehensive information security requires participation of several administrative layers and strongly depends on the managerial commitment. Inclusion of legal and ethical measures is also justified (Jussipekka and Seppo, 1998). As has been shown within (Jussipekka and Seppo, 1998), there is a need for legal and ethical measures to provide with comprehensive security of information systems from tow given aspect stated below. Ethics negotiation phase is where organizations or individuals representing themselves negotiate the content of ethical communication agreement over specific communication channels. Also, to have the respected phase from security phases and 55 related analysis on this an important of study to mature the concept of information security and ethics within educational context. Ethics enforcement phase is where each organization enforces changes in the ethical code of conduct by specifying administrative and managerial routines, operational guidelines, monitoring procedures, and sanctions for unacceptable behavior. Organizations or university individuals involved in negotiation should code desired ethical norms in terms of acceptable behavior within the information processing. In the optimal case, ethics has the law enforcement and juridical actions against violations can prosecute in court. 2.18 Summary To enable student to make wise ethical decisions, it is necessary to make them active participants instead of passive observers in the making of moral choices. Consequently, the content of ethics courses should not be about what is right or wrong but how to recognize when there is problem. Therefore, it becomes apparent that educating computer users may not be concern about how to make the best decision, if a problem arises. Also, as a main heart of study it would be an undeniable element of educating computer user from different perspective of morality, attitudes, awareness and scenarios. The solution would be, to revise the policies, subjects or analysis of computer students that guide the technology in the correct ethical framework and get rid the most of vulnerabilities and social impact. Computer technology is particularly powerful due to its potential to change how people think about human beings. 56 3 RESEARCH METHODOLOGY CHAPTER 3 RESEARCH METHODOLOGY 3.1 Introduction After examining the many and various ethical problems and issues caused by information technologies and their uses, the analysis of literature and review of previous attempts to create computer ethics framework, the need for further research focusing on computer ethics and conditions that needs in higher education level is evident. The design of research questions consisted of five-point scale, ranging from Strongly Disagree, Disagree, Neutral, Agree and followed by Strongly Agree. Survey participants consisted of 331 (out of 431) students of University Technology Malaysia. An online instrument been distributed among students in order to receive the acknowledgment throughout URL address from zoomerang data center and online instrument development. It lists the participant’s field, age also, the contact details of the presenter was available that if in case anybody would like to have further interest in computer ethics, they could be in contact throughout email or phone. However, as it was mentioned in the survey, the results will remain confidential to the researcher and it will be used for the purpose of this study only. 57 3.2 Survey Design Start ISSX Mellisa Review on Models Planned Behavior Deindividuation Evaluate the Feasibility Design Instrument Distribute the Survey Data Assortment Analyze with SPSS Conclusion Online 58 3.3 Research Philosophy Most research projects share the same general structure. Everybody might think of this structure as following the shape of an hourglass. The research process usually starts with a broad area of interest, the initial problem that the researcher wishes to study. For instance, the researcher could be interested in how to use computers to improve the performance of students in mathematics (Bazely, 2003). However, this initial interest is far too broad to study in any single research project. The researcher has to narrow the question down to one that can reasonably study in a research project. This might involve formulating a hypothesis or a focus question. For instance, the researcher might hypothesize that a particular method of computer instruction in math will improve the ability of elementary school students in a specific district. At the narrowest point of the research hourglass, the researcher is engaged in direct measurement or observation of the question of interest. 3.3.1 Quantitative Research Quantitative research is used to investigate research questions. There is a potentially infinite array of possible quantitative research designs, and in the human sciences particularly, it can be difficult to do pure, experimental research. Thus, a great many adaptations of experimental designs, called quasi-experimental and nonexperimental designs have developed. It is important to consider a range of possible quantitative research designs and their strengths and weaknesses, before adopting any particular design (Bazely, 2003). In the social sciences particularly, quantitative research is often contrasted with qualitative research which is the examination, analysis and interpretation of observations for the purpose of discovering underlying meanings and patterns of relationships, including classifications of types of phenomena and entities, in a manner that does not involve mathematical models. 59 Approaches to quantitative psychology were first modeled on quantitative approaches in the physical sciences by Gustav in his work on psychophysics, which built on the work. Although a distinction is commonly drawn between qualitative and quantitative aspects of scientific investigation, it has been argued that the two go hand in hand. For example, based on analysis of the history of science, concludes large amounts of qualitative work have usually been prerequisite to fruitful quantification in the physical sciences. The questionnaire will measure this study. Measuring the results from the distributed questionnaire specify the result. Therefore, we have to come to disintegration the numeric information. Thus, it is known as quantitative study. 3.4 Research Purpose Types The broad purpose of descriptive research in `Education' is to study the present problems of the students, teachers, administration, curriculum, teaching learning process, and the like, and to suggest some solutions to these problems. For example, many researchers conducted a descriptive research on classroom discipline and used the collected information to formulate a `system of discipline' which now has been used by many teachers in their classrooms to maintain discipline among students. 3.4.1 Descriptive Sometimes referred to as non-experimental or co relational research, descriptive research studies the relationships among non-manipulated variables only. In this type of research, the investigator selects the relevant variables from the events/conditions that have already occurred or exist at present, and analyzes their relationship without introducing any manipulations to the variables. In descriptive research, researcher studies the events or human behavior in natural settings, because 60 sometimes it would be difficult to manipulate the variables, and because sometimes it is unethical. Therefore, this and other types of relationships between and among the variables are studied under natural conditions of the classroom, home, factory, offices. Because of its ease in use, descriptive research is the most popular and widely used method in educational research. The descriptive research method is easy to use because in this method, the research data can be very easily obtained and interpreted. The results of descriptive research provide us with a platform to make important decisions and also generate more research ideas to be tested by the future researchers (Croom, 2002). 3.4.2 Explanatory When the purpose of the study is to explore a new universe, one that has not been studied earlier, the research design, is called explanatory. The research purpose in this case is to gain familiarity in unknown areas. Often explanatory research design is used to formulate a problem for precise investigation, or aims at formulating research design. Thus, often when the universe of study is an unknown community, explanatory design forms the first step of research, after which other types of research designs can be used. Instead of concentrating on just unspecific areas and selecting a few aspects for consideration (as may be the case in descriptive research design), researchers gather such a great variety of data that they are able to see the actors in their total life situation. Explanatory studies are not to be confused with raw empiricism, with fact gathering that is unrelated to sociological theory. The explanatory study always carries with it a set of concepts that guide the researcher to look for the facts. 61 3.4.3 Experimental The research design that is used to test a research design of causal relationship under controlled situation is called experimental design. The essence of the experimental design lies in its testing research design derived from a theory. Experimentation in sociology raises certain important questions, viz. ethical question, difficulties in forming a control sample and retaining it over time; the difficulties encountered in controlling the extraneous environment, etc. Realizing these problems, in some of the 'experiments' carried out by sociologists, the experimental sample is used as the control sample. It is debatable whether the absence of a control means a non experimental study. This actually is a modification of the classic experimental design. Further, due to this survey two-discussion class was given. As expected, responses resulting from the survey and class discussion provided insight points regarding the nature, social impact and ethical issues concern with the key security between students (Croom, 2002). 3.5 Data Collection Method In order to make a comprehensive study in detail, required information must be collected. For the purpose of this research, questionnaire and pilot study has been chosen because of certain problems and difficulties on hypotheses. The data gathering was carried out through questionnaire and the data analysis will be based on a sample data. The survey was designed to determine the perception and awareness of students regarding the fundamental concept of computer ethics and related security framework (Croom, 2002). 62 An online survey has been distributed among current student of University Technology Malaysia (International Campus, Kula Lumpur) which was designed to examining the level of awareness, morality, knowledge and interest of student in computer ethics and related security concept 3.5.1 Research Flowchart Review Class Discussion (Pre Test) Data Analysis Survey Distribution Data Analysis Conclusion End 63 3.5.2 Data Sampling Method There are many types of sampling methods which may suits to this kind of research. However, as long as the main focus of this research is on University Technology Malaysia (International Campus, Kuala Lumpur) therefore mainly, stratified random sampling and cluster sampling remain the only useful method for the purpose of further research. 3.5.2.1 Stratified Random Sampling Stratified random sampling method is useful when populations are divided into subgroups depending on particular characteristics. In fact, when the nature of the issues to be investigated means that it is important to give respondents from particular subgroups an equal chance of representation and this would not happen through random sampling. Methods of the relevant characteristics to be used for stratification are identified on the basis of the questions to be asked, female or male students or even from which year and department they belong to. A random list is then drawn up for each subgroup and respondents chosen randomly within each. However potential problems may results on identification of the characteristics for classification of respondents is crucial and may need to be refined during investigation. In fact cluster sampling is divided the population into groups, or clusters. A number of clusters are selected randomly to represent the population, and then all units within selected clusters are included in the sample. No units from non-selected clusters are included in the sample. They are represented by those from selected clusters. This differs from stratified sampling, where some units are selected from each group (Rache, 2008). 64 3.5.2.2 Cluster Sampling Cluster sampling is useful when clusters are randomly selected and all individuals or households in particular clusters are interviewed and mostly, beneficial when the target population is very large. Cluster sampling has several advantages as like: reduced costs, simplified field work and administration is more convenient. Instead of having a sample scattered over the entire coverage area, the sample is more localized in relatively few centers. Cluster sampling’s disadvantage is that less accurate results are often obtained due to higher sampling error than for simple random sampling with the same sample size. In addition, multi-stage sampling is like cluster sampling, but involves selecting a sample within each chosen cluster, rather than including all units in the cluster. Thus, multi-stage sampling involves selecting a sample in at least two stages. In the first stage, large groups or clusters are selected. These clusters are designed to contain more population units than are required for the final sample. In the second stage, population units are chosen from selected clusters to derive a final sample. If more than two stages are used, the process of choosing population units within clusters continues until the final sample is achieved (Rache, 2008). 3.5.3 Instrumentation and Data Analysis As it has been shown in result and discussion, the collected data was analyzed with the help of Microsoft Excel. However, benefits of some other soft ware analysis like SPSS would be undeniable according to certain circumstances. SPSS stands for one the most useful tool for statistical analysis. It is used for market researchers, healthcares, survey companies and educations. 65 Statistics include in the base software are: ¾ Descriptive Analysis ¾ Bivariate statistics ¾ Prediction for numeral outcomes ¾ Prediction for identifying groups SPSS and descriptive analysis is among the most widely used programs for this research. The original SPSS manual been describe as one of the most useful tools for research analysis located in US and around the world. It is also graphical user interface where it carries two option views. The data view shows a spread sheet view of cases (rows) and variables (column). The variable views displays the metadata dictionary where each row represents a variable and shows the variable name, variable label, measurement types and variety of other characteristics. Cells in both views can be manually edited, defining the file structure and allowing data entry without using command syntax. This may be sufficient for small datasets. Larger datasets such as statistical surveys are more often created in data entry software, or entered during computer-assisted personal interviewing, by scanning and using optical character recognition and optical mark recognition software, or by direct capture from online questionnaires. 66 3.6 Research Planning and Schedule No Activity 1 Literature Review 2 Problem Definition 3 Present the Research Proposal 4 Develop the Proposed Framework 5 Class Discussion and Survey (Pre Test) 6 Analyses Collected Data 7 Integrate The Data 8 Test the Online Instrument 9 Evaluate the Proposed Framework 10 Write up the Thesis Report Week 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 67 3.7 Limitation of Research There are several limitations of the research. The most noticeable limitation relates to small sample size. The theory of deindividuation may possibly help to explain why the students may lose their motivation to complete the survey or even not submitting it. The brighter answer, which would be under this theory, will be that, students have believed that their lack of participation would not be identifiable. Second reason would be the lecturer is not capable of teaching this portion of study well, and then they lose their future interest and may not attend in lectures or discussions. Final reason is related to the higher than anticipated number of existing policies or framework that means the concept of a computer ethics framework might not have been operationally defined well for the respondents. 3.8 Summary The finding from this survey, despite from limitations and small size, are still an important and relatively unique contribution to this study. The survey did accomplish the basic objective which was design to fulfill and provided the necessary data and idea needed to develop a more useful computer ethics framework and instructional plan. The information from the study proved that computer ethics and related security concept are very valuable factor of every educational centre and UTM University as well. 4 RESULT AND DISCUSSION CHAPTER 4 RESULT AND DISCUSSION 4.1 Introduction This chapter has been written in order to complete the related literature review and mentioned objective in chapter one. In addition, scenario method analyses with respect to related analysis been studied. 4.2 Research Framework The research framework been developed in order to evaluate the lack of understanding of students on computer ethics and information security. The overall importance of this study is based upon the premise that information obtained from previous literature related to computer ethics on university campus, coupled with related ethical scenarios that are most involved with computer ethics needs, issues and problems on educational context. The developed scenarios would accompanied by recommendations for implementing an actual core of study with respect to computer ethics and information security. Researcher has developed a framework for development of information security with computer ethics respect to educational conception. The further discussion follows the exact code of ethics, which are including Privacy, Property, Accuracy and Accessibility. 69 As Figure 4.1 depicts, framework examines information security and computer ethics from two major dimensions: the educational and information security. In addition, research framework are also explored to suggested the educational core of computer ethics which is the effective ways to teach information security along with computer ethics from the basis of educational level rather than higher level. The educational dimension is focusing on the core of information security, which considers along with awareness and morality. Figure 4.1: Research Framework In fact, educational dimension is explored from various perspectives to have relevance for group rather than individuals where the focus of this issue has been mentioned in literature review. Examples of questions in order to guide the development of research framework references include: have you ever heard about computer ethics? What are ethical dilemmas and its social impacts? The other main phase of educational dimension is moral development that includes personal beliefs related to their background of computer ethics. In fact, it focus on morality and further effectiveness that how individual morality can change their attitude and therefore acquire appropriate awareness hence evaluate ethical 70 dilemmas. Research approaches present methods and creative ideas for teaching of computer ethics with respect of information security for diverse audiences. Figure 4.2: Development Process As Figure 4.2 shows, the developing process obtained from the existing theories and models. The framework`s dimensions cover the basic levels for computer ethics lectures and class room discussions related to ethical behavior of future computer scientists. The main emphasis is to presents creative and beneficial methods for learning experiences in various kinds of information security ethics. The authors place particular focus that will require students to build and rebuilt their beliefs in different ways in order to know unethical behaviors and their social impact on their future career. 71 4.3 Educational Approaches A computer ethics policy is only the first step in the process of instilling ethical behavior on every university campus. In addition to educating students, emphasizes that one of the most important factors for successful ethical education is for faculty to promote and maintain a climate consistent with high ethical standards. Researcher recommends that teaching approaches should begin with a dictionary definition of computer ethics relating to secure method of computer use. This should be reinforced by role-playing to determine how computer ethics would fit in real-life scenarios and followed by encouraging students to personalize the topic within group discussion. Many researchers also offer advice for effective teaching information security strategies. They begin with guidelines for an instructional unit. First, instructors should begin by introducing key concepts and definitions relating to computer ethics. Second, they need to include relevant historical and legal information related to ethical use of computer. Next, they should provide real-life examples (Scenarios) of common ethical issues that may be of personal relevance to students. Researchers suggest involving student participation through assigned reading, computer based activities, writing assignments, role-playing and classroom discussion. As an additional activity to elicit student’s participation is the use of mock trials of cases involving unethical use of technology. A meaningful follow-up could include having students conduct survey of other student’s attitudes concerning computer ethics and information security issues. 4.4 Information Security and Computer Ethics As the public becomes increasingly computer literate, the gap between technology and information security shrinks. Computer systems are no longer composed of one large, simple, straightforward batch-oriented computer. They are 72 now integrated real-time query-based systems. The computers of former years understood by the knowledgeable few, but currently available computers, software, and assorted output devices have enlightened many. The danger is now more apparent that computer abuse will soon increase dramatically if it is not curtailed by legal sanctions and if people do not adapt some code of ethics Sometimes people employ ethics when it is convenient and to their advantage. At other times, they set any ethical standards aside by rationalizing that there is a greater good that should be considered. Unfortunately, ethical behavior is not part of the law of nature, but it would be future threats on human status. An important aspect of computer user’s ethical abuse includes the privacy question. Why exactly is a person’s privacy important? There is no simple answer to this question, as long as people have concerns and commitments that may be harmed by personal disclosures. There are several reasons why medical records should be kept private, having to do with the consequences to individuals that facts concerning them becoming public knowledge. The average patient does not realize the importance of the confidentiality of medical records. Passing out information on venereal disease can wreck a marriage. Revealing a pattern of alcoholism or drug abuse can result in a person losing his job or make it impossible for the person to obtain insurance protection (Brier, 1997). When people apply for credit they are often investigated, and the result is a fat file of information about them. Now there is something to be said in favor of such investigations. Organizations granting credit need to know if the credit-applicants are financially reliable. The trouble is that all sorts of other information go into such data bases. For example, it is possible that information exists about the applicant’s organization membership, political views, and so forth. Clearly it is unfair for one’s application for credit to be influenced by such irrelevant matters (Collins, 1992). 73 4.4.1 Scenario Framework From scenarios perspective, rapidly changing environment requires a continuous, adaptable, and enhances able personal approach to ethics. fortunately for it professionals, this approach is not a foreign concept, continuous improvement has been a cornerstone of professional development, quality improvement, and software process improvement through the capability maturity models of the software engineering institute. Figure 4.3: Ethical Scenario Framework Ethical scenario framework is a personal framework that responds to an IT professional is need for guidance in ethical decision-making. It is designed to see to IT that IT professionals integrate ethics into their personal and professional lives. 74 As Figure 4.3 illustrates the approach as the interactions among three elements: ¾ The IT professional seeks to be ethical in conduct and decisionmaking. ¾ The real world is a constantly changing, enormously complex environment of people, cultures, products, events, and so on. The world continually presents situations that call for decisions, actions, and reactions from it professionals. Scholars and practitioners from the supporting ethics community are also valuable references. This resource pool also includes educational programs, training (especially in multimedia and interactive formats), consultants, ethics advisors, and hardcopy and online documents including laws, codes of ethics, institutional policies and procedures, and ethics self tests. Scenario framework also allows the IT professional to give something back to the industry by contributing to the pool of ethical resources, an activity consistent with being a professional. One opportunity is to cooperate with in-house ethics training by providing a case study or scenario for discussion. Ethics start out as personal. When researchers upbringing, values, ingrained sense of right and wrong, moral predicaments, and moments of anguish integrated over a lifetime influence how they perceive the morality of today’s actions and choices. No alarm will ring to prompt that this is one of those times when people should apply what they learned (or forgot) from those ethics training sessions last year. Moreover, with IT continually changing, some of today’s ethical dilemmas were not even around last year. So IT professionals can benefit from a personal framework for recognizing and understanding the ethical dimensions in the situations they encounter every day. Educational programs and company training can help IT 75 professionals improve their awareness of ethics issues, but the IT profession needs more help for several reasons. In software, such models arose because of the nature of software development, the certainty of changes in essential elements (such as subject content and application environment) and the enormous leverage people can have on the final outcomes. The same is true today of ethical decision-making in it. Therefore, it makes sense to think about applying continuous-improvement models and techniques to ethics enhancement. 4.5 Purpose of Distributed Survey It is important to reiterate the main purpose of the survey portion of the study was not to find the data that represent community of UTM campus, but to obtain useful input from student`s views regarding computer ethical conditions and analysis in their campuses. A secondary purpose of survey was to obtain useful input that focused upon participants reactions to elements of a working computer ethics scenario and accompanying instructional plan being developed and proposed by this study. The results obtained from completed survey and response sheets have provided a great deal of interesting and useful data that successfully met these survey objectives and contributed greatly to the proposed model and ethical instruction plan. In addition, responses to certain key questions do indicate the presence of deindividuated behavior among computer users on college campus within the research area. The question planned for this purpose, did indicate the presence of computer ethics among the current users or students of computer science. 76 In addition, as morality, awareness, intellectual property and privacy play a very important aspect of this research. It was a main part of survey to analyze these issues and further effects on students. 4.6 Demographics Out of 431 students 331 (Response Rate:76.79%) has participated in the survey where all the respondents agreed to answer the entire question motivationally. Students were asked to respond each of the questions using a five-point likert scale, ranging from strongly disagree to strongly agree. 200 180 160 140 120 100 80 60 40 20 0 Male Female Figure 4.4: Demographic Information 77 Maajors En ngineering 24% Post Graduate 10% Colleege Studeents 36% % Diplo oma 30 0% Figure 4.5 5: Majors Thhe result of the survey and respon nse sheets are a examineed below in n light of the key research quesstions that guided g this research. r Age Chart 200 150 100 50 0 Under 19 20 to o 25 Figure 4.6: Age 2 26 and above 78 4.7 Educational Perception The question focused on this dimension, been designed in order to evaluate and analyze the level of awareness on computer ethics and information security. In addition, PAPA model also remain the heart of research for the further appraisal on computer ethics and information security. 4.7.1 Awareness The basic research question stated in research explored through the survey was to extent to educational dimension along with the examined elements as awareness, morality and PAPA model that has been discovered in 1986. As shown in Table 4.1, more than (63.44%) of the respondent whether strongly agreed that they have heard about information security. Of those who participated in the survey, a little under (3.32%) did not have any idea about information security and computer ethics only (15.10%) where strongly disagreed that they have never been informed about information security and ethics. Table 4.1: Awareness Variable about N F I believe that Universities have N the main role to inform students about Information Security F Ethics and their social impacts. I believe in Computer Ethical N principles and I apply them to F my educational life. Have you heard Information Security? N= Number F= Frequency Awareness Strongly Disagree Disagree 50 Neutral Agree 11 210 Strongly Agree 60 - 15.10% 3.32% 63.44% 18.12% - - 33 271 27 - - 9.96% 81.87% 8.15% - 80 93 101 57 - 24.16% 28.09% 30.51% 17.22% 79 As also Table 4.1 indicates, most of those responding (81.87%) agreed or strongly agreed (8.12%) that Universities have the main role to inform students about information security ethics and their social impacts. This an important result proof that, students themselves believe in educational institution and leaders on the main factor of awareness and educating them with respect to information security and computer ethics. While being informed from social impact of computer and lack of ethical awareness, more than (24.16%) of students disagreed that they believe in computer ethical principles and rules where this result may indicates the more need of ethical morality and study in University Technology Malaysia. In addition (30.51%) were agreed on ethical rules and using them on their daily and career life which is a small and doubted result for a developed country like Malaysia. 4.7.2 Privacy A number of variables in the measuring (Mason, 1986) model were an attempt to determine whether information security felt the computer ethics from PAPA model or it is in more need of research and analyses. Table 4.2: Privacy Variable Computer privacy is the main N factor of Computer Ethics. F Computer privacy can protect me from losing my private N information. F N= Number F= Frequency Privacy Strongly Disagree Disagree Neutral Agree Strongly Agree - - 50 87 194 - - 15.10% 26.28% 58.61% - - 16 291 24 - - 4.83% 87.91% 7.25% 80 A shown in Table 4.2 almost three quarters either agreed or strongly agreed with the statement that ethical problems had increased since then or after. However, students unanimously agreed or strongly agreed that computer privacy can protect their private information from hackers, crackers and internet thefts. Finally, (58.61%) were strongly agreed that privacy is the main factor of computer ethics based on PAPA model where only (15.10%) did not have any idea on this element 4.7.3 Intellectual property As the main discussion in Table 4.3 and debate on computer rule and regulations, copy right and intellectual policies remain the heart of study of any researchers and scholars. In order to continue the mission of previous researcher on this key factor of computer ethics, researcher focus on the main question that, whether students believe in copy rights or not and if in case they are aware of following purpose, on which level of understanding they can differentiate between copied software and original software. Table 4.3: Intellectual Property Variable I believe in copyrights rules N and regulation. F Does your University have formally stated policies N regarding copying software for F educational purpose? Copyright Strongly Disagree Disagree Neutral Agree Strongly Agree - 13 78 168 72 - 3.92% 23.56% 50.75% 21.75% 79 62 161 29 - 23.86% 18.73% 48.64% 8.76% - N= Number F= Frequency More than (21.75%) of students they were strongly agreed that they believe in copyright rules and regulations followed by (50.75%), where (23.64%) indicates their neutral opinion on this debate. Even though with the attended number students on their lack of awareness in copyright rules, (42.59%) of students were totally 81 agreed that their university itself do not have any stated copyright policy that can inspire students to act and behave on copyright rules. 4.7.4 Accessibility Another basic research question that they study attempted to answer was concerned with how participants might enforced to use violated software and asked whether they share their private information with others or not. While respondent were given the opportunity to answer their question without any identification number or signature, they answer could not target that researcher as expected to be. Table 4.4: Accessibility Variable I use violated copied software N regularly. F I do share my private information and password with N my close friends. F Accessibility Strongly Disagree Disagree Neutral Agree Strongly Agree - 21 13 201 96 - 6.34% 3.92% 60.72% 29% 199 39 - 80 13 60.12% 11.78% - 24.16% 3.92% N= Number F= Frequency On the other hand, Table 4.4 indicates that, almost (60.72%) were expressed disagreement with the idea that they respect to software product key and they use original versions. Further, (60.12%) indicates that, they do not share their personal data along with close friend. 82 4.7.5 Morality Another fundamentals research question from chapter 1 that guided the survey focused on the extent of the influent of computer ethics with personal morality. Out of two question been reviewed on this an important factor of any research, as it is shown in Table 4.5 all participants either agreed (19.03%) or strongly agreed (59.81%) that they respect to others private information. almost (21.14%) did not have any comments on this question with their neutral answer. As morality is one of main factor of computer ethics regarding this research the results been taken from survey indicates a clear answer in any research area. Table 4.5: Morality Variable I always respect to my friends N private information and I never want to access their F personal data. I never want to become unethical hacker even if I N have the talent and ability. F Morality Strongly Disagree Disagree Neutral Agree Strongly Agree - - 70 63 198 - - 21.14% 19.03% 59.81% 38 22 128 103 40 11.48% 6.64% 38.67% 31.11% 12.08% N= Number F= Frequency 4.7.6 Accuracy Another important area of questioning sought to determine that in which level of usage they influent password policy in their career. As it is shown in the Table 4.6, most of participants (53.47%) were strongly disagree or disagree that they never forget password. From the earlier analysis this may conclude on PAPA model comment, about human weakness of computer ethics followed by (25.07%) agreed that they rarely forget their password. 83 Table 4.6: Accuracy Accuracy Strongly Disagree Disagree Variable I rarely forget my password. N (Example: E-learning, Smart card) F Neutral Agree Strongly Agree 121 56 - 83 71 36.55% 16.91% - 25.07% 21.45% N= Number F= Frequency Final phase of educational dimension on research model will focus on every dimension`s result in order to compare which phase would be more effective as an educational elements. As Figure 4.7 shows every details of stated dimension are as follows that researcher can retrieve the purpose of this study from the given analysis. Educational Analysis 250 200 150 100 50 0 Figure 4.7: Educational Analysis These figures and analysis, stated that students have less attention on accuracy and property where morality indicates the student`s intention to ethical behavior even though they are not been alert before this research. Therefore, as an earlier conclusion, we can conclude that we, as educational leaders should focus on accuracy and awareness of our students in order to prevent from future and upcoming problems. 84 4.7.7 Information Security Perception Table 4.7 shows the results of research assumption concerning the information security perception. More respondent did not have any comment on lack of security policy in their campus (39.27%). In addition, according to the results the attended number of students either strongly disagreed (9.66%) or disagreed that UTM campus do not have any vulnerability of security administration policy. In addition, frequent number of students was agreed (89.12%) that information security and computer security can protect their private information and personal data. In Table 4.7, even though most of the students were agree on this element to use and regulate information security but still (9.36%) of student find lack of trust and use on this important information technology era. Not surprisingly, (23.86%) of students were disagreed that information security may not be helpful for their future career. Table 4.7: Information Security Variable I find lack of Security Policy N Administration in my campus. F Information Security and Computer Security can fully N protect my private information. F I agree, if I want to join to any N company they will asked about my knowledge based on F Information Security. ` Strongly Disagree Neutral Disagree Agree Strongly Agree 89 - 32 80 130 9.66% 24.16% 39.27% 26.88% - - - 5 295 - - 1.51% 89.12% 9.36% - 79 94 80 - 23.86% 28.39% 24.16% 23.56% 31 78 N= Number F= Frequency 4.7.8 Computer Ethics Perception Table 4.8 shows, ethical question relating to final phase of research focusing on applicability of computer ethics and ethical conflicts. Of respondent, (60.72%) were agree on applicability of computer ethics and frameworks to all users but still 85 (19.93%) still did not have any idea on this an important issue of current technology. On the other hand, (25.07%) of students are emphasizing on neutral element when they have been asked violating software may conflicts ethical principal rules and regulations. In addition, (33.23%) of students agreed on this element that computer ethics conflicts computer ethics. Table 4.8: Computer Ethics Computer Ethics Strongly Disagree Disagree Variable I believe in applicability of N Computer Ethics Policy to all users. (Faculty, Stuff, Student ) F I agree violating copyright laws Computer Ethics. Neutral Agree Strongly Agree - - 66 201 64 - - 19.93% 60.72% 19.33% software conflict N - 87 83 110 51 F - 26.28% 25.07% 33.23% 15.40% N= Number F= Frequency 4.8 Real Time Scenarios Analysis The following are scenarios represent typical ethical issues that arise when we use computers irrespective of computer ethics. Computer science educators who address ethical issues demonstrate that ethical concerns about computing are appropriate and important to the study and profession of computer science. When ethical theories will apply in the context of traditional computer science courses, students are encouraged to view ethical decision-making and conduct as important professional skills that are relevant to the computing field. Rather than deflecting attention away from the significant theoretical and technical content of a course, considerations of the larger context of computing can actually enhance the study of a computer science topic. For almost all of recorded history, ethical issues have been decided according to neighborhood, community or national norms. These have been our main purpose in order to develop the stated 86 scenarios to evaluate Malaysian students perspective by one of the best method been introduce in ethics research area. 4.8.1 Scenario Number One A university student, who is technical assistant of his /her supervisor, has already received an access code, which might be useful for other student. Also, as a developer he/she was assigned the task of developing software to control the number of print out pages in order to charge students for the facility expenses. While, he/she is acting in both the character (Student and teacher assistant) will it be an ethical behavior if he/she can share the free username and password for his/her friend. Table 4.9: Scenario No 1 Variable Frequency Percent Valid Percent Cumulative Percent Strongly Disagree 18 5.4 5.5 5.5 Disagree 90 27.2 27.3 32.7 Neutral 75 22.7 22.7 55.5 Agree 113 34.1 34.2 89.7 Strongly Agree 35 10.3 10.3 Total 331 100 100.0 100.0 As we can see from Figure 4.8 most of students (34.10%) of students agreed on where close number (27.20 %) disagreed followed by (22.70%) neutral on this unethical behavior. Even though many awareness been given to the students through outs courses that these action may not be useful for students perception but still researchers could conclude that still there are lack of attention exist among students computer ethics backgrounds. 87 Fiigure 4.8: Scenario S Chart No.1 4.8.2 Scenario Num mber Two A person X, buy onlinee software in order to his/her prooject enhan ncement. Prior to ussing the sofftware, a friend fr of perrson X whoo is person Y, needs to o use the software ,so person X share his/hher usernam me and passsword for fuurther devellopment. Is this Computer C E Ethical behhavior regaarding intellectual prooperties ru ules and regulationns? Thhis scenario been desiggned in ordeer to evaluaate copyrighht perspectiive from Malaysiann students. As Table 4.10 depiicts, researcher conclude from strongly disagree (11.50%) ( too disagree (19.40%) an nd from stroongly agreee (10.30%) to agree (31.10%). From one of the maain elementss on compuuter ethics which is copyright rules and regulation r M Malaysian s students werre mostly giiven their sttatement eq qually on both ethiccally and unnethically behavior. b Th his scenarioo also indicaates and proves the need of coomputer ethics course in Malaysian n core of edducational ssystem. 88 Table 4.10 0: Scenario No.2 Variabble F Frequency Perccent Valid Percennt Cumu ulative Perrcent Stronggly Disagrree 38 11 1.5 11.5 11.5 Disagrree 64 19 9.3 19.4 30.9 Neutraal 91 27 7.5 27.6 58.5 Agreee 103 31 1.1 31.2 89.7 Strongly Agree A 35 10 0.3 10.3 Totall 331 10 00 100.0 Fiigure 4.9: Scenario S Chart No.2 10 00.0 89 4.8.3 Scenario Number Three A senior security officer has recently resigned from his/her previous company. Nevertheless, still he is aware that the username and password has not been change yet and he would access the private emails and letters. On the other hand, his/her friend, suggesting him/her to publish the dishonesty among the employees and management in order to aware stockholder to prevent from further corruptions. Is this an ethical behavior to act or not? This scenario been designed in order to test the morality of student from the unethical and ethical behavior. Interestingly, from the Table 4.11 most of students from (18.10%) strongly disagree to (36.60%) disagree followed by (22.10%) neutral. Also, (16.90%) agreed and (6.30%) strongly agreed, conclude that the action of a employee may not be ethical if he publish the dishonesty among the management throughout society because of the only reason that shows he is not the right person to act and react in this situation. However, this may need more focus as a future research. Table 4.11: Scenario No 3 Variable Frequency Percent Valid Percent Cumulative Percent Strongly Disagree 60 18.1 18.2 18.2 Disagree 121 36.6 36.7 54.8 Neutral 73 22.1 22.1 77.0 Agree 56 16.9 17.0 93.9 Strongly Agree 21 6.30 6.1 Total 331 100 100.0 100.0 90 Figuree 4.10: Scen nario chart No.3 N 4.9 Su ummary Onne may alsoo assume thaat given the increasing demand forr improvem ments and resulting rapidly r channging naturre of techno ologies, new w ethical dillemmas are concern to occur. Students must m be encoouraged and d guided inn developingg measures that are more effeective, policcies and innstruction to o insure thhat computeer ethics reemains a current annd informatiive area. In addition, Sccenario metthod as a m major elemen nt of this research could c indicaates the lackk of accuraccy and intelllectual prooperty elemeent from Malaysiann student’s perspective. p . Froom the givven third sccenario, ressearcher coould absorbb the numb bers that proves higgh volume of moralitty among students s beiing studiedd which cou uld be a major elem ment for fuurther ethicaal research to focus more m on this view and discover the lack of o others miiss understaanding of computer c etthics and innformation security. 5 CONCLUSION AND RECOMMENDATION CHAPTER 5 CONCLUSION AND RECOMMENDATION 5.1 Summary As discussed previously, educational leaders within higher education, remain the main body of computer ethics instructions. The literature supports the use of computer ethics instructions and computer ethics policies as effective measure in facilitating ethical conduct by computer users. In addition, the body of research regarding the study of behavioral models, particularly the theory of deindeviduation (Zimbardo, 1969), planned behavior (Azjen, 1985), moral model (Melissa, 2006) and ISSX model (Jussipekka and Seppo, 1998) indicates that an increased understanding and awareness of the underlying factors involved in unethical behavior are possible through the application of such theories and frameworks. Based upon the information required through the survey at UTM university (international campus), and what was found in previous research and supporting literature, the framework of computer ethics presented from information security perspective. It may serve the needs of students, staff, and faculty within University Technology Malaysia for further educational development system. The proposed computer ethics Framework should not only assist UTM University but could aid other educational leaders plagued by information technology concern and issues with respect to information security. In addition, the results from previous chapter, particularly from real time scenarios indicates the need of computer ethical courses in Malaysian educational systems. Even though, the outcome of some phases were as it was expected but it 92 would be an undeniable issue to embed this an important field of research in order to keep our students up to date and away from social impact of current technology. 5.2 Contribution of Study The findings from this study, although limited in scope, contribute to ongoing demand for scholarly research on computer ethics issues and information security in context of higher education. These findings do elucidate and verify some of the pressing concerns facing educational leaders due to information technology. In particular, computer ethics problems do exist extensively on many educational centers, however, more severe problems such as hacking, theft, and virus spreading are not currently great problems. In addition, from the student’s perspective, a result indicates the lack of computer ethics policy in UTM University. The finding from this study contributes to the existing body of literature and scholarly research on computer ethics and information security issues, policies, and educational instruction. This contribution to research may assist other scholars in their endeavor to help determine what educational leaders think about current problems and issues as well as viable solutions. In addition, the finding of this research may contribute to scholar`s understanding of computer ethics and information security within current educational settings and should raise new questions about computer ethics and information security that scholars can pursue. 5.3 Direction of Future work This study clearly reveals that there is a need for more scholarly research dealing with computer ethics and information security in educational setting. To better equip educational leaders for addressing technology-induced ethical concerns, further research is necessary using a variety of research methodologies. Research is need within the area of computer ethics instruction and more specifically computer ethics policies and their effectiveness. 93 The scope of this study was limited to University Technology Malaysia (International Campus). While the results of this study are certainly applicable within the campus, but the need of future and further research is undeniable. As the future of education becomes more technology driven and technology dependent, further studies are necessary for analyzing and anticipating the impact and implementation of such trend. Scholarly research and empirical evidence on computer ethics behavior and the effectiveness of various computer ethics policies and instructions are needed to enrich and add to the existing body of research. Other educational and organizational institution or setting should be examined to gain a more thorough understanding of computer ethical issues. Better demographic and psychographic profiles of computer users in educational environments need to be developed. Studies should not be limited to just students, but rather all users of computing resources. Qualitative studies could include both observed behavior of computer user and in depth interviews of educational leaders with respect to information security. Combining qualitative and quantities approach to this issue will assist greatly in the development of information that is valid and useful to educators and administrators. 94 REFERENCES REFERENCES Adam, A., (2001). Computer Ethics in a Different Voice. Information and Organization. Volume 11(4): 235-261. Allen, C., (1996). Conundrums of Conducting Ethical Research in Cyberspace. The Information Society. American Physiology Association, Vol.12 (3): 175-187. Ajzen, I., (2002). Attitudes, Personality, and Behavior. Buckingham, Open University Press.Vol.50: 179-211 Banerjee, D. (1998). Modeling IT Ethics. A Study of Situational Ethics. Management Information Systems Quarterly. Volume 22( 1): 31-60. Barnett, T., and Vaicys, C. (2000). The moderating effect of individuals' perception of ethical work climate on ethical judgments and behavioral intentions. Journal of Business Ethics. Volume 27 (4):351-362. Bazeley, P. (2003). Teaching mixed methods. Research Journal. Special Issue 2003. 117-126. Bazeley, P. (2004). Teaching mixed methods. Qualitative Research Journal. Special Volume 4 (3): 117-126. Berleur, J. and Bruunstein, K. (1996). Ethics of Computing: Codes, Spaces for Discussion and Law, Chapman & Hall: London. Berleur, J. (1996). IFIP Framework for Ethics, Science and Engineering Ethics (Special Issue on Global Information Ethics). Volume 2( 2): 155-165. 95 Boehlefeld, S.P. (1996). Doing the Right Thing. Ethical Cyberspace Research. The Information Society. Volume 12( 2): 141-152. Bowman, J.S., and Menzel, D.C. (1998). Teaching Ethics and Values in Public Administration Programs, Innovations, Strategies and Issues, SUNY Press. Albany. Brier, Steven (1997). How to Keep Your Privacy. Battle Lines Get Clearer. The New York Times. Bynum, T. (2006). Computer Ethics. Basic Concepts and Historical Overview . Stanford . Encyclopedia of philosophy. Cappel, J.J., (1995). A Study of Individuals Ethical Beliefs and Perceptions of Electronic Mail Privacy. Journal of Business Ethics. Volume 14 (10): 819-827. Cappel, J.J., and Kappelman, L., (1997). The Year 2000 Problem, An Ethical Perspective in year 2000 Problem. Strategies and Solutions from the Fortune 100. International Thomson Computer Press, Boston, 158-163. Croom, S. (2002). Methodology Editorial, Special issue on research methodology in operations management. International Journal of Operations and Production Management. Volume 22 (2): 148-151. Cruz, J. A., Frey, W. J. (2003). An Effective Strategy for Integration Ethics Across the Curriculum in Engineering. An ABET 2000 Challenge. Science and Engineering Ethics. Volume 17 (3): 543-568. Collins, W. R., and Miller, W., (1992). Paramedic Ethics for Computer Professionals, Journal of Systems Software, Volume 17 (3): 23-38. Couger, J.D. (1989). Preparing IS Students to Deal with Ethical Issues, Management Information Systems Quarterly. 211-218. 96 Cortada, J. W. (2002). Researching the History of Software from the 1960's. IEEE Annals of the History of Computing. Volume 24 (1): 72-79. Cowton, C.J., and Thompson, P. (2000). Do codes make a difference. The case of bank lending and the environment. Journal of Business Ethics. Volume 24 (2): 165-178. Deborah, J. (1985). Computer Ethics, Prentice-Hall. Davison, R.M. (2000). Professional Ethics in Information Systems: A Personal Perspective, Communications of the AIS. Diener, E. (1980). The absence of self-awareness and self regulation in-group members. The psychology of group influence Hillsdale, NJ. Lawrence Erlbaum. 209-242. Floridi, L. (1999). Philosophy and Computing, London. Routledge. Fowler, T.B., (2002). Technology’s Changing Role in Intellectual Property Rights, IT Pro. Volume 4(2): 39-44. Grupe, F., and Kuechler, W. (2002). Is It Time for an IT Ethics Program? Information Systems Management. Volume 19(3): 51-57. Hamid, N. (2007). Information Security and Computer Ethics. Tools ,Theories and Modeling. North Carolina University , Igbi Science Publication. 543-568. Herkert, J. (2009). Engineering Ethics Education. European Association of Engineering. Taylor and Francis Publications. 303-313. Huff, C. and Frey, W. (2005). Moral Pedagogy and Practical Ethics, in Science and Engineering Ethics (Forthcoming). 97 Janine, D. (2001). Carolyn Oxen ford Marymount University, Defining the Limits: Cyber Ethics. Jussipekka, L., Seppo, H. (1998). An Analysis of Ethics as Foundation of Information Security in Distributed Systems. HICSS. Volume 6 (6): 213-222. Kluwer, E. (2000). Journal of Business Ethics Academic Publishers. Kallman, E. ,and Grillo, J.P., (1996). Ethical Decision Making and Information Technology. An Introduction with Cases. McGraw Hill. Kini, R.B., Rominger, A. and Vijayaraman, B.(2000). An Empirical Study of Software Privacy and Moral Intensity among University Students, The Journal of Computer Information Systems. Volume 3 (6): 62-72. Langford, D. (1995). Practical Computer Ethics, London: McGraw Hill. Langford, D. (1999). Business Computer Ethics, London: Addison Wesley Longmans. Langford, D. (2000). Internet Ethics, London: Macmillan. Lee, K. (2006). Efforts for the Fixation of Systemic Information and Communication Ethics Education, Information Communication Ethics Committee. IJCSNS International Journal of Computer Science and Network Security. Volume 6 (6): 3-5. Masrom, M., and Ismail, Z., (2008). Computer Security and Computer Ethics Awareness: A Component of Management Information System, IEEE Technology and Society Magazine. Mellisa, D. (2006). A Framework for Information Security in Ethics Education system. 10th Colloquium for Information Systems Security Education University of Maryland. 98 Namayandeh, M., and Masrom, M., and Ismail Z., (2009). Development of Computer Ethics Framework for Information Security within Educational Context. SEATUC. Shibuara University, Japan. 235-240. Meyer, K. (2001). Transition Economies in. T. Brewer and A. Rugman, Oxford Handbook of International Business, Oxford. Mason, R.O. (1986). Four Ethical Issues of the Information Age. Management Information Systems Quarterly. Volume 10 (1): 5-12. Oz, E. (1992). Ethical Standards for Information Systems Professionals. A Case for a Unified Code. Management Information Systems Quarterly. Volume 16 (4): 423-433. Oz, E. (1993). Ethical Standards for Computer Professionals. A Comparative Analysis of Four Major Codes. Journal of Business Ethics. Volume 12 (9): 709-726. Pierson, J. and Bauman, B. (2004). Developing awareness of computer ethics. In Proceedings of the Ninth International Conference on Information Systems. Minneapolis, Volume 3(3): 341-342. Philip, B. (2007). Research in Philosophy and Technology. Journal of Technology. Volume 11(2): 3-8. Rache, P. (2008). Convenience Samples and Research How Are The Findings? Gerontologist. United States. Volume 48: (6). 3-12. Spinello, A. (2003). Cyber Ethics: Morality and Law in Cyberspace (2nd Ed.). Sudbury, Jones and Bartlett. Spinello, A., and Herman T., (2002). Readings in Cyber Ethics. Second Edition. 99 Sackson, M. (1974). Computer Security - Fraud: Prevention and Detection. Master’s Thesis, Pleasantville, NY: Pace University. Sackson, M . (1991). Computers and Society Impact. New York: Mitchell McGraw-Hill. 418-423. Smith, H. (2002). Ethics and Information Systems, Resolving the Quandaries, the Database for Advances in Information Systems. Volume 33 (3): 8-20. Sani, R. (2006). Cybercrime Gains Momentum . New Straits Times. Staehr, L. (2002). Helping computing students to develop a personal ethical Framework. IEEE Technology and Society Magazine. Volume 21 (2): 13-20. Steidlmeier, P. (1993). The Moral Legitimacy of Intellectual Property Claims. American Business and Developing Country Perspectives. Journal of Business Ethics. Volume 12( 2): 157-164. Tavani, H.T. (2001). Information and Communication Technology (ICT) ethics: A Bibliography of Recent Books, Ethics and Information Technology. Volume 14 (3): 77-81. Tavani, H.T. (2001). The State of Computer Ethics as a Philosophical Field of Inquiry: Some Contemporary Perspectives, Future Projections, and Current Resources. Journal of Ethics and Information Technology. Volume 3 (2): 97-108. Tavani, H.T., and Moor, J.H., (2003). Privacy Protection, Control of Information, and Privacy Enhancing Technologies. Associate Computers and Society. Volume 38 (25):6-11. Walters, G., (2001). Privacy and Security, An Ethical Analysis, ACM Computers and Society. Volume 31 (2): 8-23. 100 Wong, E.Y.W., (1994). Data Protection Legislation in Hong Kong - A Practical Perspective. Journal of Information Technology Management. Volume 5 (25): 59-63. Walsham, G. (1996). Ethical Theory, Codes of Ethics and IS Practice, Information Systems Journal. Volume 13 (2): 69-81. Waskul, D., and Douglass, M. ,(1996). Considering the Electronic Participant. Some Polemical Observations on the Ethics of On-Line Research. The Information Society.Volume 12 (2): 129-139. Hyder, S., and Werth, J., and J., Browne, C. (1993). A Unified Model for Concurrent Debugging. Proc. International Conference on Parallel Processing. Volume 3(1): 75-83. Zimbardo, P. (1969). The Human Choice, Individuation, Reason, and Order Versus Deindividuation, Impulse, and Chaos, Nebraska symposium on Motivation. Volume 17(7): 33-38. 101 Appendix A Guideline Introduction The guideline for appropriate computing behavior and ethical conduct consist of a fourteen-week instructional plan for introducing ethical subject with respect to information security in educational context. This module may be included within any existing computer course. However, an introductory and short review had been studied in this part of research. Each topic is introduced by the instructor and followed by class discussion. Each point listed below comes from college computer ethics policy. While students should have already read the policy, they may not be aware of what would be the full content of such a security and academic policy. Instructional Plan Concerning the findings from previous research, supporting literature and feedback provided by (Namayandeh, Marom and Ismail, 2009), held by Shibaura Institute of Technology in Japan and response analysis, the purpose of this chapter is to embed computer Recommendations are ethics throughout include assisting Malaysian educational educational leaders and centers. system administrations in the implementation of such a policy and plan. Additional recommendations are suggested to assist and help scholars who are interested in contributing to computer ethics further research and analysis. 102 Proposed Instructional Plan Ethics education is a critical component for overall success of a computer ethics framework and to encourage ethical behavior in general. Unfortunately, the findings in this study suggest that many educators think they should not be responsible for the ethical and moral development of others, but should simply teach objective concepts and facts. Many educational leaders and administrators also hesitate to develop ethics education. Some have suggested that if computer ethics were a required course at institution, it would be legitimizes and professors or others would be more anxious to teach it (Herkert, 2009). Importance of Ethical Instruction Some people may felt that ethical instruction would be unnecessary within educational context. It is interesting to note that at the same time many indicated high occurrences of unethical behavior that could potentially be avoided by better educating computer users. As argued (Namayandeh, Marom and Ismail, 2009) teaching the ethical aspect of computer and information security is just as important as teaching the basic computer concepts and skills. Many educational institutes have found this to be the case and have implemented various types of activities designed to empower their students for ethical action. Many researcher advices that education should assist students to become more alert at discovering moral issues, should teach them to reason ethical issues, and should clarify moral and aspiration. Some educators and administrative leaders debate whether to provide ethical instruction within all computer courses or to offer just one. Many scholars believe that ethics education is best taught and learned throughout the curriculum with a variety of ethics activities rather than compartmentalized within one course. The most effective way to reach all or most students is through integration of computer ethics and information security within all computer courses (Herkert, 2009). 103 Faculty and staff, on the other hand, could receive computer ethics instruction through workshops, seminars, or professional development activities at their particular institution. Through the integration and incorporation of ethical concepts and information security within educational context, it is hope that users will begin to see how ethical concepts relates to all issues involved in computer and apply ethical behavior to their specific fields or areas of interest. Campus Culture For the long-term success of computer ethics emphasis as describe and outlined in this chapter, it must infiltrate the very fabric and culture of educational institution. The effectiveness of computer ethics initiatives is dependent upon the influence of a common core of beliefs, attitudes and customs. Faculty, staff, and students must believe that computer ethics and information security are important and critical to the mission of global and developed society. This is one of the reasons why the computer ethics policy should begin in Malaysian educational centers, on the other hand, ethical system can easily influence with attitudes after an ongoing process rather than a short analysis. This will help insure long term success by maintaining accountability between existing members and enabling new members to adapt positive norms of behavior. Designed Course The purpose of this instructional unit is to provide students with an understanding of why ethical behavior is necessary and how to make the widest decisions when faced with ethical dilemmas. Ethical cases shows that one of the most effective method to teach ethics is to stimulate individual thinking and personal interpretation through the case based approach. The ethical cases place the students in dilemmas that each must solve one (Oz, 1992). 104 Course Flowcharts 105 Weekly Course Guidelines 106 Course Chart Ethics Cases 1. Data Alteration 2. Ethics in Higher Education 3. Worker Displacement 4. Invasion of Privacy 5. Monitoring E-mails 107 6. Obligations on Society 7. Conflicts and Priorities 8. Confidentiality 9. Obligations to Students 10. Integrity 11. Obligation to Employee 12. Availability