Advertisement

On the Morality of Teaching Students IT Crime Skills

  • Martin S. Olivier
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 642)

Abstract

A superficial introduction to the world of viruses, worms and other malware is often sufficient to get students dreaming about the potential power wielded by those technologies. One needs about a minute to teach them how to build a powerful Trojan Horse, how to distribute such a construction as targeted malware and how to monetise the few minutes they invested in such an effort. Such teaching is rewarding since it is one of the few examples where many students immediately apply their new skills to impress friends. Of course the intention is not to make them criminals, but to gain the deep understanding of issues that would otherwise require them to spent hours with books that discuss abstract concepts that often remains abstract.

The question is whether computing educator should ever even consider teaching students skills that may be abused in this manner.

In this paper I argue that knowledge to harm and knowledge to help overlap in many professional contexts. The lecture argues questions on the morally of imparting potentially malicious knowledge should differentiate between imparting it to those entering a profession and imparting it to the masses. While this does not prevent the professional from abusing knowledge, it is argued that the benefit to society will outweigh the harm. In the non-professional context little benefit is likely to accrue to society, but opportunistic abuse of knowledge already acquired is significantly more probable than the possibility of someone purposefully acquiring and abusing such knowledge.

However, even more important than professionalism is the sense of community. It is argued that meaningful professional communities that are able to use harmful knowledge responsibly are rare in computing. Hence care should be exercised when potentially harmful information is to be taught and self-censorship ought to be exercised in general.

Keywords

Ethics of computing Professional ethics Professionalism in IT Invited keynote lecture 

References

  1. 1.
    Bentham, J.: An Introduction to the Principles of Morals and Legislation. Dover (2007)Google Scholar
  2. 2.
    Fan, Y., Thomas, M., Wang, Y.: Do project managers have organizational career paths? a study of the current state of career development for IT project managers. In: Proceedings International Conference on IS Management and Evaluation (ICIME 2015), pp. 40–48 (2015)Google Scholar
  3. 3.
    Harris, C.E., Pritchard, M.S., Rabins, M.J.: Engineering Ethics: Concepts and Cases. 3rd ed. Thomson Wadsworth (2005)Google Scholar
  4. 4.
    Himanen, P.: Hacker Ethic and the Spirit of the Information Age. Floris Books (1999)Google Scholar
  5. 5.
    Hobbes, T.: Leviathan, or the Matter, Forme, and Power of a Common-wealth Ecclesiasticall and Civill. Andrew Crooke, London (1651)Google Scholar
  6. 6.
    IoD: Third report on corporate governance for South Africa. Institute of Directors, Johannesburg (2009)Google Scholar
  7. 7.
    Maslow, A.H.: A theory of human motivation. Psychol. Rev. 50, 370–396 (1943)CrossRefGoogle Scholar
  8. 8.
    Medical Protection Society: MPS subscription rates. Technical report, MPS0162: 11/14, South Africa (2015)Google Scholar
  9. 9.
    Mill, J.S.: The Basic Writings of John Stuart Mill: On Liberty, the Subjection of Women and Utilitarianism. Modern Library (2002)Google Scholar
  10. 10.
    OCarroll, A.: Working Time, Knowledge Work and Post-Industrial Society – Unpredictable Work. Palgrave Macmillan (2015)Google Scholar
  11. 11.
    Parry, R.: Episteme and techne. In: Zalta, E.N. (ed.) The Stanford Encyclopedia of Philosophy. Stanford University (2014)Google Scholar
  12. 12.
    Smith, C.M.: Origin and uses of primum non nocere – Above all, do no harm!. J. Clin. Pharmacol. 45(4), 371–377 (2005)CrossRefGoogle Scholar
  13. 13.
    Thackeray-Ritchie, A.: Miss Dymond. Elder & Co., Smith (1886)Google Scholar

Copyright information

© Springer International Publishing AG 2016

Authors and Affiliations

  1. 1.Department of Computer ScienceUniversity of PretoriaPretoriaSouth Africa

Personalised recommendations