computerethics.ppt
TRANSCRIPT
-
8/10/2019 ComputerEthics.ppt
1/49
Computer Ethics
-
8/10/2019 ComputerEthics.ppt
2/49
Ethics
Ethics are the standards that guidepeople's behavior.
Ethics speaks to whether actions areright or wrong.
A person's culture, upbringing, andreligion all contribute to a personssense of ethics.
-
8/10/2019 ComputerEthics.ppt
3/49
Computer Ethics
Ethical computer systems are gainingrecognition.
-
8/10/2019 ComputerEthics.ppt
4/49
Computer Ethics
The components of an ethical computersystem are responsibility, ownership, accessand personal privacy. Responsibility concerns the accuracy and
accountability of the information. Ownership deals with who has the right to use the
information.
Access deals with who is allowed to use, view,store and process the information.
Personal privacy addresses the question of whothe information belongs to.
-
8/10/2019 ComputerEthics.ppt
5/49
ACM Code of Ethics
http://www.acm.org/about/code-of-ethics
http://www.acm.org/about/code-of-ethicshttp://www.acm.org/about/code-of-ethicshttp://www.acm.org/about/code-of-ethicshttp://www.acm.org/about/code-of-ethicshttp://www.acm.org/about/code-of-ethicshttp://www.acm.org/about/code-of-ethicshttp://www.acm.org/about/code-of-ethics -
8/10/2019 ComputerEthics.ppt
6/49
Computer Ethics Institute
http://www.computerethicsinstitute.org/ As a leader in the field, the Computer Ethics
Institute has provided an advanced forum andresource for identifying, assessing andresponding to ethical issues associated withthe advancement of information technologiesin society. Through advisory and consultativeactivities, research and education, and publicoutreach, CEI has stimulated awareness ofthe issues likely to arise as technologycontinues to develop.
http://www.computerethicsinstitute.org/http://www.computerethicsinstitute.org/ -
8/10/2019 ComputerEthics.ppt
7/49
Ten Commandments
1.Thou shalt not use a computer toharm other people. This is thefoundation for computer ethics.
-
8/10/2019 ComputerEthics.ppt
8/49
Example: Thou shalt not use acomputer to harm other
people Laser Guided Bombs
-
8/10/2019 ComputerEthics.ppt
9/49
Ten Commandments
2.Thou shalt not interfere with otherpeoples computer work. Such assending numerous thoughtless e-mailsto larger issues like purposely sendingcomputer viruses.
-
8/10/2019 ComputerEthics.ppt
10/49
Example: Thou shalt notinterfere with other peoples
computer work
-
8/10/2019 ComputerEthics.ppt
11/49
Ten Commandments
3.Thou shalt not snoop around in otherpeoples computer files. Dont golooking through other peoples computerfiles unless given permission.
-
8/10/2019 ComputerEthics.ppt
12/49
Example: Snooping
WOW and Warden
-
8/10/2019 ComputerEthics.ppt
13/49
Ten Commandments
4.Thou shalt not use a computer tosteal.
-
8/10/2019 ComputerEthics.ppt
14/49
Example: Thou shalt not use a
computer to steal. Fake Charities Phishing
-
8/10/2019 ComputerEthics.ppt
15/49
Ten Commandments
5.Thou shalt not use a computer to bearfalse witness. Dont spread rumors or
change your email address so that thereceiver of an email believes that itcame from someone other than
yourself.
-
8/10/2019 ComputerEthics.ppt
16/49
Example: Misrepresentation
Email forgery
-
8/10/2019 ComputerEthics.ppt
17/49
Ten Commandments
6.Thou shalt not copy or use proprietarysoftware for which you have not paid.
Once you buy a software system, musicCD or DVD you should not make copiesof that information and distribute it to
your friends.
-
8/10/2019 ComputerEthics.ppt
18/49
Example: Copying
-
8/10/2019 ComputerEthics.ppt
19/49
Ten Commandments
7.Thou shalt not use other peoplescomputer resources without
authorization or proper compensation.This means do not surf the internet orprint off large amounts of paper for
personal use during work hours.
-
8/10/2019 ComputerEthics.ppt
20/49
Example: Misusing resources
WiFi Surfing
-
8/10/2019 ComputerEthics.ppt
21/49
Ten Commandments
8.Thou shalt not appropriate otherpeoples intellectual output. Dont
upload information and take credit for itsuch as music, images and text.
-
8/10/2019 ComputerEthics.ppt
22/49
Example: Robbing intellectual
output Putting images on a web page
-
8/10/2019 ComputerEthics.ppt
23/49
Ten Commandments
9.Thou shalt think about the socialconsequences of the program you are
writing or the system you are designing.
-
8/10/2019 ComputerEthics.ppt
24/49
Example: Social
consequences
-
8/10/2019 ComputerEthics.ppt
25/49
Ten Commandments
10.Thou shalt use a computer in waysthat ensure consideration and respect
for your fellow humans. Just becauseyou cant always see someone face toface doesnt give you the right to offer
any less respect then you would offer ina personal encounter.
-
8/10/2019 ComputerEthics.ppt
26/49
Example: respect and
consideration
-
8/10/2019 ComputerEthics.ppt
27/49
How do you judge?
How doe we debate the ethics of anaction? Consequentialist Moral Theories Deontological Moral Theories
-
8/10/2019 ComputerEthics.ppt
28/49
Consequentialist Moral
Theories Moral rightness (or wrongness) of action
is dependent upon the consequences of
that action Ends justify the means?
What are good consequences?
Utilitarianism: best actions are those whichproduce the greatest utility (happiness orpleasure)
-
8/10/2019 ComputerEthics.ppt
29/49
Deontological Moral Theories
Focus on the actions as right or wrongwith respect to some rules or duties
Looks at inputs rather than outcomes
-
8/10/2019 ComputerEthics.ppt
30/49
(enough for now)
-
8/10/2019 ComputerEthics.ppt
31/49
Issues: Voting Machines
Their ability to be hacked both remotely (viadirect modem connection) and locally (viaportable programmers and memory cards).There are videos on youtube showing collegestudents breaking into current in use votingmachines, and showing how easy it is to usea simple memory card, with a few lines ofcode, to modify the voting results.
The ability to withstand blackouts, hardwarefailure, etc
Their use by the disabled
-
8/10/2019 ComputerEthics.ppt
32/49
Issues: Voting Machines
(Cont.) Even without hanging chads, the touch
screens might misinterpret the voters'
intent if the they are misaligned Political ties of the manufacturers.
-
8/10/2019 ComputerEthics.ppt
33/49
Issues: Search Engines
-
8/10/2019 ComputerEthics.ppt
34/49
Case Study: James Baker
http://www.mit.edu/activities/safe/safe/cases/umich-baker-
story/Baker/timeline.html http://www.mit.edu/activities/safe/safe/c
ases/umich-baker-story/throwout.1
http://www.mit.edu/activities/safe/safe/cases/umich-baker-story/Baker/timeline.htmlhttp://www.mit.edu/activities/safe/safe/cases/umich-baker-story/Baker/timeline.htmlhttp://www.mit.edu/activities/safe/safe/cases/umich-baker-story/Baker/timeline.htmlhttp://www.mit.edu/activities/safe/safe/cases/umich-baker-story/throwout.1http://www.mit.edu/activities/safe/safe/cases/umich-baker-story/throwout.1http://www.mit.edu/activities/safe/safe/cases/umich-baker-story/throwout.1http://www.mit.edu/activities/safe/safe/cases/umich-baker-story/throwout.1http://www.mit.edu/activities/safe/safe/cases/umich-baker-story/throwout.1http://www.mit.edu/activities/safe/safe/cases/umich-baker-story/throwout.1http://www.mit.edu/activities/safe/safe/cases/umich-baker-story/throwout.1http://www.mit.edu/activities/safe/safe/cases/umich-baker-story/throwout.1http://www.mit.edu/activities/safe/safe/cases/umich-baker-story/Baker/timeline.htmlhttp://www.mit.edu/activities/safe/safe/cases/umich-baker-story/Baker/timeline.htmlhttp://www.mit.edu/activities/safe/safe/cases/umich-baker-story/Baker/timeline.htmlhttp://www.mit.edu/activities/safe/safe/cases/umich-baker-story/Baker/timeline.htmlhttp://www.mit.edu/activities/safe/safe/cases/umich-baker-story/Baker/timeline.htmlhttp://www.mit.edu/activities/safe/safe/cases/umich-baker-story/Baker/timeline.html -
8/10/2019 ComputerEthics.ppt
35/49
Issues
Privacy of victim Threats
Therapy Role playing in creative writing Obseentity Due Process Internet
Publishing medium Internet crossing jurisdictional boundaries Appropriate use
-
8/10/2019 ComputerEthics.ppt
36/49
Case Studies: surivilence
-
8/10/2019 ComputerEthics.ppt
37/49
Case Studies: cable guy
-
8/10/2019 ComputerEthics.ppt
38/49
Case study: privacy
http://research.csc.ncsu.edu/efg/ethics/papers/ASEE05Miranda.pdf
http://research.csc.ncsu.edu/efg/ethics/papers/ASEE05Miranda.pdfhttp://research.csc.ncsu.edu/efg/ethics/papers/ASEE05Miranda.pdfhttp://research.csc.ncsu.edu/efg/ethics/papers/ASEE05Miranda.pdfhttp://research.csc.ncsu.edu/efg/ethics/papers/ASEE05Miranda.pdf -
8/10/2019 ComputerEthics.ppt
39/49
Case study: Napster
"The MP3 files that you locate usingNapster are not stored on Napster's
servers. Napster does not, and cannot,control what content is available to youusing the Napster browser."
-
8/10/2019 ComputerEthics.ppt
40/49
-
8/10/2019 ComputerEthics.ppt
41/49
More issues:
http://www.haggertyinc.com/phpBB_CSCC35507W/viewforum.php?f=12
-
8/10/2019 ComputerEthics.ppt
42/49
Perfection in CG
-
8/10/2019 ComputerEthics.ppt
43/49
Dove Billboard
http://www.youtube.com/watch?v=hibyAJOSW8U
-
8/10/2019 ComputerEthics.ppt
44/49
-
8/10/2019 ComputerEthics.ppt
45/49
-
8/10/2019 ComputerEthics.ppt
46/49
-
8/10/2019 ComputerEthics.ppt
47/49
-
8/10/2019 ComputerEthics.ppt
48/49
Q i
-
8/10/2019 ComputerEthics.ppt
49/49
Quiz
Case Studies in Information and Computer Ethics by RichardSpinello, ISBN #: 013533845x
Introduce the case study including: The companies and individuals involved The computer technology and information systems involved
The ethics: Identify the ethical questions and dilemmas Identify what choices or actions the parties took
Comparison: How is this case similar to cases we have already studied? How is this case different?
Personal discussion: How would you personally have handled the situation