computerethics.ppt

Upload: balabsg

Post on 02-Jun-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/10/2019 ComputerEthics.ppt

    1/49

    Computer Ethics

  • 8/10/2019 ComputerEthics.ppt

    2/49

    Ethics

    Ethics are the standards that guidepeople's behavior.

    Ethics speaks to whether actions areright or wrong.

    A person's culture, upbringing, andreligion all contribute to a personssense of ethics.

  • 8/10/2019 ComputerEthics.ppt

    3/49

    Computer Ethics

    Ethical computer systems are gainingrecognition.

  • 8/10/2019 ComputerEthics.ppt

    4/49

    Computer Ethics

    The components of an ethical computersystem are responsibility, ownership, accessand personal privacy. Responsibility concerns the accuracy and

    accountability of the information. Ownership deals with who has the right to use the

    information.

    Access deals with who is allowed to use, view,store and process the information.

    Personal privacy addresses the question of whothe information belongs to.

  • 8/10/2019 ComputerEthics.ppt

    5/49

    ACM Code of Ethics

    http://www.acm.org/about/code-of-ethics

    http://www.acm.org/about/code-of-ethicshttp://www.acm.org/about/code-of-ethicshttp://www.acm.org/about/code-of-ethicshttp://www.acm.org/about/code-of-ethicshttp://www.acm.org/about/code-of-ethicshttp://www.acm.org/about/code-of-ethicshttp://www.acm.org/about/code-of-ethics
  • 8/10/2019 ComputerEthics.ppt

    6/49

    Computer Ethics Institute

    http://www.computerethicsinstitute.org/ As a leader in the field, the Computer Ethics

    Institute has provided an advanced forum andresource for identifying, assessing andresponding to ethical issues associated withthe advancement of information technologiesin society. Through advisory and consultativeactivities, research and education, and publicoutreach, CEI has stimulated awareness ofthe issues likely to arise as technologycontinues to develop.

    http://www.computerethicsinstitute.org/http://www.computerethicsinstitute.org/
  • 8/10/2019 ComputerEthics.ppt

    7/49

    Ten Commandments

    1.Thou shalt not use a computer toharm other people. This is thefoundation for computer ethics.

  • 8/10/2019 ComputerEthics.ppt

    8/49

    Example: Thou shalt not use acomputer to harm other

    people Laser Guided Bombs

  • 8/10/2019 ComputerEthics.ppt

    9/49

    Ten Commandments

    2.Thou shalt not interfere with otherpeoples computer work. Such assending numerous thoughtless e-mailsto larger issues like purposely sendingcomputer viruses.

  • 8/10/2019 ComputerEthics.ppt

    10/49

    Example: Thou shalt notinterfere with other peoples

    computer work

  • 8/10/2019 ComputerEthics.ppt

    11/49

    Ten Commandments

    3.Thou shalt not snoop around in otherpeoples computer files. Dont golooking through other peoples computerfiles unless given permission.

  • 8/10/2019 ComputerEthics.ppt

    12/49

    Example: Snooping

    WOW and Warden

  • 8/10/2019 ComputerEthics.ppt

    13/49

    Ten Commandments

    4.Thou shalt not use a computer tosteal.

  • 8/10/2019 ComputerEthics.ppt

    14/49

    Example: Thou shalt not use a

    computer to steal. Fake Charities Phishing

  • 8/10/2019 ComputerEthics.ppt

    15/49

    Ten Commandments

    5.Thou shalt not use a computer to bearfalse witness. Dont spread rumors or

    change your email address so that thereceiver of an email believes that itcame from someone other than

    yourself.

  • 8/10/2019 ComputerEthics.ppt

    16/49

    Example: Misrepresentation

    Email forgery

  • 8/10/2019 ComputerEthics.ppt

    17/49

    Ten Commandments

    6.Thou shalt not copy or use proprietarysoftware for which you have not paid.

    Once you buy a software system, musicCD or DVD you should not make copiesof that information and distribute it to

    your friends.

  • 8/10/2019 ComputerEthics.ppt

    18/49

    Example: Copying

  • 8/10/2019 ComputerEthics.ppt

    19/49

    Ten Commandments

    7.Thou shalt not use other peoplescomputer resources without

    authorization or proper compensation.This means do not surf the internet orprint off large amounts of paper for

    personal use during work hours.

  • 8/10/2019 ComputerEthics.ppt

    20/49

    Example: Misusing resources

    WiFi Surfing

  • 8/10/2019 ComputerEthics.ppt

    21/49

    Ten Commandments

    8.Thou shalt not appropriate otherpeoples intellectual output. Dont

    upload information and take credit for itsuch as music, images and text.

  • 8/10/2019 ComputerEthics.ppt

    22/49

    Example: Robbing intellectual

    output Putting images on a web page

  • 8/10/2019 ComputerEthics.ppt

    23/49

    Ten Commandments

    9.Thou shalt think about the socialconsequences of the program you are

    writing or the system you are designing.

  • 8/10/2019 ComputerEthics.ppt

    24/49

    Example: Social

    consequences

  • 8/10/2019 ComputerEthics.ppt

    25/49

    Ten Commandments

    10.Thou shalt use a computer in waysthat ensure consideration and respect

    for your fellow humans. Just becauseyou cant always see someone face toface doesnt give you the right to offer

    any less respect then you would offer ina personal encounter.

  • 8/10/2019 ComputerEthics.ppt

    26/49

    Example: respect and

    consideration

  • 8/10/2019 ComputerEthics.ppt

    27/49

    How do you judge?

    How doe we debate the ethics of anaction? Consequentialist Moral Theories Deontological Moral Theories

  • 8/10/2019 ComputerEthics.ppt

    28/49

    Consequentialist Moral

    Theories Moral rightness (or wrongness) of action

    is dependent upon the consequences of

    that action Ends justify the means?

    What are good consequences?

    Utilitarianism: best actions are those whichproduce the greatest utility (happiness orpleasure)

  • 8/10/2019 ComputerEthics.ppt

    29/49

    Deontological Moral Theories

    Focus on the actions as right or wrongwith respect to some rules or duties

    Looks at inputs rather than outcomes

  • 8/10/2019 ComputerEthics.ppt

    30/49

    (enough for now)

  • 8/10/2019 ComputerEthics.ppt

    31/49

    Issues: Voting Machines

    Their ability to be hacked both remotely (viadirect modem connection) and locally (viaportable programmers and memory cards).There are videos on youtube showing collegestudents breaking into current in use votingmachines, and showing how easy it is to usea simple memory card, with a few lines ofcode, to modify the voting results.

    The ability to withstand blackouts, hardwarefailure, etc

    Their use by the disabled

  • 8/10/2019 ComputerEthics.ppt

    32/49

    Issues: Voting Machines

    (Cont.) Even without hanging chads, the touch

    screens might misinterpret the voters'

    intent if the they are misaligned Political ties of the manufacturers.

  • 8/10/2019 ComputerEthics.ppt

    33/49

    Issues: Search Engines

  • 8/10/2019 ComputerEthics.ppt

    34/49

    Case Study: James Baker

    http://www.mit.edu/activities/safe/safe/cases/umich-baker-

    story/Baker/timeline.html http://www.mit.edu/activities/safe/safe/c

    ases/umich-baker-story/throwout.1

    http://www.mit.edu/activities/safe/safe/cases/umich-baker-story/Baker/timeline.htmlhttp://www.mit.edu/activities/safe/safe/cases/umich-baker-story/Baker/timeline.htmlhttp://www.mit.edu/activities/safe/safe/cases/umich-baker-story/Baker/timeline.htmlhttp://www.mit.edu/activities/safe/safe/cases/umich-baker-story/throwout.1http://www.mit.edu/activities/safe/safe/cases/umich-baker-story/throwout.1http://www.mit.edu/activities/safe/safe/cases/umich-baker-story/throwout.1http://www.mit.edu/activities/safe/safe/cases/umich-baker-story/throwout.1http://www.mit.edu/activities/safe/safe/cases/umich-baker-story/throwout.1http://www.mit.edu/activities/safe/safe/cases/umich-baker-story/throwout.1http://www.mit.edu/activities/safe/safe/cases/umich-baker-story/throwout.1http://www.mit.edu/activities/safe/safe/cases/umich-baker-story/throwout.1http://www.mit.edu/activities/safe/safe/cases/umich-baker-story/Baker/timeline.htmlhttp://www.mit.edu/activities/safe/safe/cases/umich-baker-story/Baker/timeline.htmlhttp://www.mit.edu/activities/safe/safe/cases/umich-baker-story/Baker/timeline.htmlhttp://www.mit.edu/activities/safe/safe/cases/umich-baker-story/Baker/timeline.htmlhttp://www.mit.edu/activities/safe/safe/cases/umich-baker-story/Baker/timeline.htmlhttp://www.mit.edu/activities/safe/safe/cases/umich-baker-story/Baker/timeline.html
  • 8/10/2019 ComputerEthics.ppt

    35/49

    Issues

    Privacy of victim Threats

    Therapy Role playing in creative writing Obseentity Due Process Internet

    Publishing medium Internet crossing jurisdictional boundaries Appropriate use

  • 8/10/2019 ComputerEthics.ppt

    36/49

    Case Studies: surivilence

  • 8/10/2019 ComputerEthics.ppt

    37/49

    Case Studies: cable guy

  • 8/10/2019 ComputerEthics.ppt

    38/49

    Case study: privacy

    http://research.csc.ncsu.edu/efg/ethics/papers/ASEE05Miranda.pdf

    http://research.csc.ncsu.edu/efg/ethics/papers/ASEE05Miranda.pdfhttp://research.csc.ncsu.edu/efg/ethics/papers/ASEE05Miranda.pdfhttp://research.csc.ncsu.edu/efg/ethics/papers/ASEE05Miranda.pdfhttp://research.csc.ncsu.edu/efg/ethics/papers/ASEE05Miranda.pdf
  • 8/10/2019 ComputerEthics.ppt

    39/49

    Case study: Napster

    "The MP3 files that you locate usingNapster are not stored on Napster's

    servers. Napster does not, and cannot,control what content is available to youusing the Napster browser."

  • 8/10/2019 ComputerEthics.ppt

    40/49

  • 8/10/2019 ComputerEthics.ppt

    41/49

    More issues:

    http://www.haggertyinc.com/phpBB_CSCC35507W/viewforum.php?f=12

  • 8/10/2019 ComputerEthics.ppt

    42/49

    Perfection in CG

  • 8/10/2019 ComputerEthics.ppt

    43/49

    Dove Billboard

    http://www.youtube.com/watch?v=hibyAJOSW8U

  • 8/10/2019 ComputerEthics.ppt

    44/49

  • 8/10/2019 ComputerEthics.ppt

    45/49

  • 8/10/2019 ComputerEthics.ppt

    46/49

  • 8/10/2019 ComputerEthics.ppt

    47/49

  • 8/10/2019 ComputerEthics.ppt

    48/49

    Q i

  • 8/10/2019 ComputerEthics.ppt

    49/49

    Quiz

    Case Studies in Information and Computer Ethics by RichardSpinello, ISBN #: 013533845x

    Introduce the case study including: The companies and individuals involved The computer technology and information systems involved

    The ethics: Identify the ethical questions and dilemmas Identify what choices or actions the parties took

    Comparison: How is this case similar to cases we have already studied? How is this case different?

    Personal discussion: How would you personally have handled the situation