On the Morality of Teaching Students IT Crime Skills
A superficial introduction to the world of viruses, worms and other malware is often sufficient to get students dreaming about the potential power wielded by those technologies. One needs about a minute to teach them how to build a powerful Trojan Horse, how to distribute such a construction as targeted malware and how to monetise the few minutes they invested in such an effort. Such teaching is rewarding since it is one of the few examples where many students immediately apply their new skills to impress friends. Of course the intention is not to make them criminals, but to gain the deep understanding of issues that would otherwise require them to spent hours with books that discuss abstract concepts that often remains abstract.
The question is whether computing educator should ever even consider teaching students skills that may be abused in this manner.
In this paper I argue that knowledge to harm and knowledge to help overlap in many professional contexts. The lecture argues questions on the morally of imparting potentially malicious knowledge should differentiate between imparting it to those entering a profession and imparting it to the masses. While this does not prevent the professional from abusing knowledge, it is argued that the benefit to society will outweigh the harm. In the non-professional context little benefit is likely to accrue to society, but opportunistic abuse of knowledge already acquired is significantly more probable than the possibility of someone purposefully acquiring and abusing such knowledge.
However, even more important than professionalism is the sense of community. It is argued that meaningful professional communities that are able to use harmful knowledge responsibly are rare in computing. Hence care should be exercised when potentially harmful information is to be taught and self-censorship ought to be exercised in general.
KeywordsEthics of computing Professional ethics Professionalism in IT Invited keynote lecture
- 1.Bentham, J.: An Introduction to the Principles of Morals and Legislation. Dover (2007)Google Scholar
- 2.Fan, Y., Thomas, M., Wang, Y.: Do project managers have organizational career paths? a study of the current state of career development for IT project managers. In: Proceedings International Conference on IS Management and Evaluation (ICIME 2015), pp. 40–48 (2015)Google Scholar
- 3.Harris, C.E., Pritchard, M.S., Rabins, M.J.: Engineering Ethics: Concepts and Cases. 3rd ed. Thomson Wadsworth (2005)Google Scholar
- 4.Himanen, P.: Hacker Ethic and the Spirit of the Information Age. Floris Books (1999)Google Scholar
- 5.Hobbes, T.: Leviathan, or the Matter, Forme, and Power of a Common-wealth Ecclesiasticall and Civill. Andrew Crooke, London (1651)Google Scholar
- 6.IoD: Third report on corporate governance for South Africa. Institute of Directors, Johannesburg (2009)Google Scholar
- 8.Medical Protection Society: MPS subscription rates. Technical report, MPS0162: 11/14, South Africa (2015)Google Scholar
- 9.Mill, J.S.: The Basic Writings of John Stuart Mill: On Liberty, the Subjection of Women and Utilitarianism. Modern Library (2002)Google Scholar
- 10.OCarroll, A.: Working Time, Knowledge Work and Post-Industrial Society – Unpredictable Work. Palgrave Macmillan (2015)Google Scholar
- 11.Parry, R.: Episteme and techne. In: Zalta, E.N. (ed.) The Stanford Encyclopedia of Philosophy. Stanford University (2014)Google Scholar
- 13.Thackeray-Ritchie, A.: Miss Dymond. Elder & Co., Smith (1886)Google Scholar