Chapter 7: Ethics and Ownership – 9618 CS AS Level Notes
Notes › Chapter 7
Chapter 7 · Paper 1

Ethics and Ownership

Professional ethics, intellectual property, software licensing, copyright law, and the societal impact of computing.

7.1 Ethics and Ownership

7.1 Ethics and Ownership

What Is Ethics in Computing?

Definition

Ethics are moral principles that govern a person's behaviour or the conducting of an activity. In computing, ethics guide how professionals create, use and manage technology responsibly.

Computing professionals face unique ethical responsibilities because their work affects:

Privacy
of individuals whose data they handle
Safety
of systems used in critical infrastructure
Security
of networks and personal information
Society
through automation, AI and misinformation

Professional Bodies: BCS and IEEE

BCS — British Computer Society

  • UK professional body for computing
  • Sets standards for computing professionals
  • Members must follow a Code of Conduct
  • Code: act in public interest; maintain competence; respect confidentiality; work within law

IEEE — Institute of Electrical and Electronics Engineers

  • Global professional body (US-based)
  • Develops technical standards worldwide
  • IEEE Code of Ethics covers: public safety; conflict of interest; honesty; fairness to colleagues
Why professional bodies matter: They create accountability. Members can be struck off for unethical behaviour. They set expectations that employers and clients can trust.

Intellectual Property (IP)

Intellectual Property

Intellectual Property refers to creations of the mind — software, music, books, inventions. IP law protects creators' rights to benefit from their work. The main forms relevant to computing are copyright and patents.

Protection TypeWhat It CoversDurationExample
CopyrightAutomatically protects creative works: software code, written text, music, images70 years after author's deathSource code of an application
PatentProtects inventions/innovations; requires registrationUp to 20 yearsA novel hardware invention
Trade SecretConfidential business information kept privateIndefinite (while secret)Google's search algorithm
TrademarkProtects brand names, logosRenewable indefinitelyApple logo, Microsoft Windows name

Software Licensing

🏢 Commercial / Proprietary

Pay to use; source code hidden; redistribution prohibited. Example: Microsoft Office, Adobe Photoshop.

🆓 Open Source

Source code freely available; can be studied, modified, redistributed (usually). Example: Linux, Firefox, Python.

🔬 Shareware

Free to try for limited time/features; pay to unlock full version. Example: WinRAR trial.

💸 Freeware

Free to use at no cost; source code NOT provided; redistribution usually prohibited. Example: Adobe Acrobat Reader.

✅ Open Source — Advantages

  • Free to use and distribute
  • Community finds and fixes bugs fast
  • Transparent — can audit security
  • Customisable for specific needs
  • No vendor lock-in

⚠️ Open Source — Disadvantages

  • No dedicated support guarantee
  • Anyone can create malicious forks
  • May lack polished user experience
  • Documentation sometimes poor
  • Commercial support costs money

Copyright Infringement

Copyright Infringement

Using, copying, or distributing copyrighted work without permission or a valid licence. This includes: pirating software, sharing unlicensed music, copying source code without attribution.

Consequences: Civil lawsuits → financial damages. Criminal prosecution (for commercial-scale piracy). For organisations: fines, reputational damage, loss of trading licence.

Impact of Computing on Society

AreaPositive ImpactsNegative / Ethical Concerns
EmploymentNew tech jobs; remote working; productivity toolsAutomation displaces manual workers; skills gap
PrivacyBetter authentication; encrypted communicationsMass surveillance; data harvesting by corporations
HealthMedical diagnosis AI; wearable health monitorsSedentary lifestyle from screen time; cyber-addiction
EnvironmentSmart energy grids; precision agriculture; remote work reduces travelData centre energy consumption; e-waste disposal
EducationOnline learning; access to global knowledgeDigital divide; misinformation online
Artificial IntelligenceMedical imaging; fraud detection; accessibility toolsBias in AI decisions; deepfakes; autonomous weapons

Ethical Scenarios (Click to Reveal)

💼 A developer discovers a critical security flaw after a product ships. What should they do?
Ethical action: Report the vulnerability to management immediately. Work to patch it urgently. If the company refuses to act and public safety is at risk, consider responsible disclosure (informing users). Hiding the flaw would violate BCS/IEEE codes of conduct (public interest obligation).
🔓 A programmer is asked to build a backdoor into software for government surveillance. Should they?
Ethical tension: Arguments for: legal obligation if government orders; national security. Arguments against: violates user privacy; backdoors can be discovered by malicious actors; undermines encryption for everyone. BCS code says professionals must respect confidentiality and act in the public interest — there is genuine conflict here.
📋 A company uses employee monitoring software to track every keystroke. Is this ethical?
Analysis: May be legal if disclosed in employment contract. Ethically problematic if excessive — violates privacy principles. Must balance employer's right to ensure productivity against employee's right to dignity. Transparency (employees knowing they are monitored) reduces the ethical concern somewhat.
Scroll to Top