Share This

Wednesday, October 13, 2010

The Internet and the death of ethics

By  Dennis O'Reilly

Some people see the Internet as a mirror held up to our culture. If it is, the mirror shows us in an unflattering light.

From newsroom staffers caught off guard on camera in a private moment gone viral on YouTube to dorm room trysts streamed live online, people have no shame about the despicable content they post on the Web. Respect and courtesy are quaint, outdated notions to these Internet citizens.

The people charged with protecting us from such abhorrent behavior not only fail to prevent it, they tacitly or explicitly encourage these breaches in morality because it means more page views, more customers, and more money. For example, YouTube's Community Guidelines state that the company works 24 hours a day, seven days a week to find and remove content that violates its ethical standards. Yet the same poor-taste, non-age-restricted videos appear there week after week, month after month.

Unfortunately, it isn't just misguided college kids or mean-spirited news junkies who propagate these crimes against fairness and human kindness. At a company I worked for, I discovered a senior executive had plagiarized about a dozen different Web sites in a report he had written for a client. He had copied the material directly from the sites and pasted it into his document, changing only a word or two here and there. (In a future post, I'll describe how I inadvertently discovered the plagiarism.)

Nowhere in the document had he mentioned that the material was taken from these sites. When I brought this serious breach of ethics to his attention, he replied, "Don't worry about it."

I told him I was worried about it and insisted he cite in the report the origin of the material. Ultimately, links to the pages from which he "borrowed" were inserted into the document, and a paragraph was added to state that much of the text was taken directly from the sites--though the material appeared without quote marks and without the explicit permission of the sites themselves.

The author of the report is a noted and well-respected scientist. I can only assume that the temptation of stealing the material was too great for him to pass up. If such an esteemed, well-regarded individual succumbed to the Internet's siren song of immorality without a second thought, have we lost the battle to preserve ethics in the online world once and for all?

Internet codes of ethics through the years

In January 1989, the Internet Advisory Board issued a memo entitled Ethics and the Internet (RFC 1087) that focused primarily on the need to protect the U.S. government's "fiduciary responsibility to the public to allocate government resources wisely." These guidelines were intended to protect the government's investment in the Internet infrastructure from disruption or lack of access resulting from "irresponsible use."

The five activities proscribed by this code were seeking unauthorized access, disrupting the intended use of the Internet, wasting resources, corrupting data, and compromising the privacy of users. The Computer Ethics Institute has since devised the Ten Commandments of Computer Ethics (PDF), which take a much broader approach.

Computer Ethics Institute's Ten Commandments of Computer Ethics
The Computer Ethics Institute's Ten Commandments of Computer Ethics entreat computer users to treat each other with "consideration and respect." 
(Credit: Computer Ethics Institute)
 
Along with admonitions not to steal computer resources, use computers to steal or to "bear false witness," or use proprietary software without paying for it is a commandment stating that "thou shalt not appropriate other people's intellectual output." I was delighted to see the last of the ten commandments: "Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans."

If this last commandment were actually enforced, the YouTube video archive would be considerably smaller.

Pleas for netiquette go unheeded
At the dawning of the Web in 1994, Virginia Shea released the Core Rules of Netiquette, which later became a book and Web site. As Ms. Shea points out, the rules describe good online manners and don't address the legal issues entailed in appropriate use of the Internet. However, she states in rule No. 2, "Adhere to the same standards of behavior online that you follow in real life," that any illegal activity is bad netiquette.

If you're charged with educating students about Internet ethics, the University of Illinois offers Scenarios for Teaching Internet Ethics, which cover such topics as employers reading their employees' e-mail without permission, social-network users posting negative comments about people, and even writers copying material from Web sites and pasting it into their own reports without attribution.

Chris MacDonald maintains the EthicsWeb.ca site, which includes a list of Applied Ethics Resources for businesses, media, health care providers, researchers, government agencies, and computer professionals. Unfortunately, many of the links on the site are no longer active. I hope this doesn't indicate a loss of interest on the part of those sites' developers. It certainly can't be for lack of a need for such resources.

The fight for an ethical Internet may be a lost cause, if only because people's moral compasses appear to be irreparably damaged. Several years ago, a person I worked for instructed me and my co-workers to lie to writers about assignment due dates in an attempt to receive the assignments in a more timely manner.

Another former boss put my name on an e-mail he wrote to the columnists who worked for us, because he knew the columnists would be more willing to accept what the message proposed if they thought it came from me rather than from him. In both cases, I refused to comply.

I'm starting to think there are no ethics in business--my own experience does not refute this assertion. It could be that the lack of negative consequences for immoral, unethical behavior is perceived as tacit approval of such activities. In this regard, I believe the bard may have had it wrong: conscience definitely does not make cowards of us all.

 
Dennis O'Reilly has covered PCs and other technologies in print and online since 1985. Along with more than a decade as editor for Ziff-Davis's Computer Select, Dennis edited PC World's award-winning Here's How section for more than seven years. He is a member of the CNET blog Network, and is not an employee of CNET.
Newscribe : get free news in real time


Tuesday, October 12, 2010

America's Highest-Paying White-Collar Jobs

Jacquelyn Smith

Here's where to make the most without leaving a desk.

image

If you want to keep getting raises, get promoted to senior management. As tough as the economy has been, people in executive positions saw their paychecks increase by an average of 2.2% this year, to $99,700. That's according to data just released by Compdata, a national compensation survey and consulting firm in Olathe, Kan.

Compdata looked at base salaries for 26 senior management jobs below C-level. For the sixth consecutive year, commercial lending directors take the top spot, with the highest average paychecks. They are earning $132,500 in 2010, up from $128,600 last year. Ranking second on the list, general managers are making $124,800 this year, up from $118,300 last year.


"In an economy where many organizations are implementing salary freezes and reductions just to get by, it's encouraging to see salaries for many jobs rising, even if some increases are very modest," said Amy Kaminski, director of marketing for Compdata Surveys. "As industries begin to recover, it will be more important than ever for companies to make an effort to hold onto their most valuable asset--their employees. Offering a balanced yet competitive compensation package will be the key to employee retention as the economy grows."

Even the list's lowest-paying jobs are paying more than last year. Human resources managers and advertising and public relations managers rank at the bottom of the group of white-collar jobs, with average salaries of $74,900 and $73,300 respectively, but both are enjoying small year-over-year increases.

Elsewhere on the list, mortgage lending directors made 7.1% less this year than they did in 2005, but their average base salary of $100,300 was up a healthy 5.1% from last year. The biggest winners over a five-year period are finance directors, who are earning 37.9%, or $37,300, more this year than in 2005, and engineering directors, whose paychecks have grown 15%, or $19,700, in the same period.

Of the 26 jobs included in the survey, only four--national sales managers, accounting directors, marketing directors, and systems and programming managers--are earning less in 2010 than last year. Four others--development officers, mortgage lending directors, plant engineering managers, and advertising and public relations managers--have seen their paychecks shrink from 2005, but have done better since 2009.

America's Highest-Paying White-Collar Jobs
America's Fastest-Growing White-Collar Paychecks

America's Slowest-Growing White-Collar Paychecks

Pentagon’s 193 Mind-Numbing Cybersecurity Regs

Read 'Em All: Pentagon’s 193 Mind-Numbing Cybersecurity Regs

Some people may find it strange that the Defense Department, which helped create the internet, is having so much trouble securing its networks. Those people have not seen this mind-numbing, 2-foot-long chart, outlining the 193 documents that govern the activities of the Pentagon’s geek squads.

Developed by the DASD CIIA (that’s the Deputy Assistant Secretary of Defense for Cyber, Identity & Information Assurance), the goal of the chart is to “capture the tremendous breadth of applicable policies, some of which many IA practitioners may not even be aware, in a helpful organizational scheme.”

And what a breadth it is: dozens and dozens of directives, strategies, policies, memos, regulations, strategies, white papers and instructions, from “CNSSD-901: National Security Telecommunications and Information Security Systems Issuance System to “CNSSP-10: National Policy Governing Use of Approved Security Containers in Information System Security Applications to SP 800-37 R1: Guide for Applying the Risk Management Framework to Federal Information Systems.

Obviously, operating networks for the millions of people who make up the world’s largest military is no simple task: The financial, legal, organizational and technical issues are nothing short of staggering. On the other hand, the hackers trying to break into those networks don’t have to check 193 different policy documents before they launch their malware. It’s hard not to think that gives the attackers an edge.


See Also:
Read More http://www.wired.com/dangerroom/2010/10/read-em-all-pentagons-193-mind-numbing-cyber-security-regs/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+wired%2Findex+%28Wired%3A+Index+3+%28Top+Stories+2%29%29#ixzz126cSvaWh
 
Newscribe : get free news in real time