Note addresses of authors: Floridi – Faculty of Philosophy

Slides:



Advertisements
Similar presentations
Technology and Ethics Joel Price. Lenses The first lens is as a technology user. The second lens is as an educator. The third lens is as a writer.
Advertisements

Chapter 1: The Context of SA&D Methods
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
 What are systems analysis and design?  Where do systems analysts work?  What modern business and technology trends are affecting information systems.
Understanding Business Ethics
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
(computer) Ethics CMPT Ethics and Morality Morality and ethics have same roots and meaning: Mores means manner and customs in Latin Ethos (ΗΘ0Σ)
Spring 2010 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering Privacy Concerns (Chapters [B]) Spring.
What Is Computer Ethics?
Ethics and Security ISSA International Ethics Committee V2.1 4/27/07.
Computer Ethics – The Ten Commandments
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
Computer ethics.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Computer Ethics for Computer Users
Computer Ethics Christina McCorkle.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Ethics Presented by: Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas.
© 2001 Business & Information Systems 2/e1 Chapter 3 Information System Fundamentals.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 3 Information System Fundamentals.
COMPUTER ETHICS Do you know the difference between right and wrong?
Beth Sanderson University of Washington Libraries, Bothell © Lawrence Snyder 2004 Computer / Information / Internet Ethics.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
CSC Intro. to Computing Lecture 19: Ethics & Computers.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Computer Ethics CSCI 101 Kara kelly. Ethics Ethics can be defined as a discipline in which one attempts to identify, organize, analyze, and justify human.
Ethics Business Law Sunny Hills High School Mrs. Larsen.
ICS131 – Ethics 11/17/03. IEEE-CS and ACM 1.PUBLIC - Software engineers shall act consistently with the public.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
 byte  short  int  long  float  double  boolean  char.
ETHICS IN USING COMPUTER
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS.
Statistical Fundamentals: Using Microsoft Excel for Univariate and Bivariate Analysis Alfred P. Rovai Data Ethics PowerPoint Prepared by Alfred P. Rovai.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Term II Software Engineering I (CS 508) System Analysis and Design (IS 503) Instructor Dr. Tarek Elghazaly.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Computer Ethics IT Fundamentals Battlefield High School.
Ethics and Moral reasoning
Computers Are Your Future Twelfth Edition
ISSA International Ethics Committee
Chapter 16 – Careers in Information Technology
The Legal System and Ethics in Information Security
Please read the entire presentation.
Unit 3- Introduction to Computer Ethics
Department of Philosophy and History of Science
Introduction to Computer Ethics
Introduction to Computer Ethics
Computer Ethics.
Presentation transcript:

Note addresses of authors: Floridi – Faculty of Philosophy Floridi and Sanders, Mapping the Foundationalist Debate, Ethics and Information Technology, 4 (2002) Research Skills Note addresses of authors: Floridi – Faculty of Philosophy Sanders – Programming Research Group What does this tell you? Note year of paper – it’s a bit old. How find newer writings?

go to EUCoGill conference – programme, participant list Floridi and Sanders (2002) Research Skills Relevance to Essay 1: How conduct research based on http://www.theguardian.com/technology/2013/oct/20/artificial-intelligence-impact-lives ? go to EUCoGill conference – programme, participant list check Robolaw website Google search “Watson medical AI”

How would you summarise the paper (in one or two sentences)? Floridi and Sanders (2002) The Paper How would you summarise the paper (in one or two sentences)? It examines the historical development of approaches to computer ethics arguing that CE, although not a completely new ethical domain, does require new elements to be included in any normative theory due to profoundly changing the context in which ethical problems arise

The Paper: Introduction Floridi and Sanders (2002) The Paper: Introduction ICT outpaces ethical and legal developments Cases studies(individual problem analysis) fails to address general principles Bottom-up approach (cases/problems) has been combined with more global, strategic analysis (top-down) that attempts to situate CE within the landscape of ethical theories Thesis: that Information Ethics provides a foundation for CE

The Paper: No Resolution Approach Floridi and Sanders (2002) The Paper: No Resolution Approach CE problems are unsolvable dilemmas; there’s no foundation Characterised by dramatic stories that sensitise people to the issues (pop ethics) Identifies what goes wrong but doesn’t provide systematically grounded solutions

The Paper: Professional Approach Floridi and Sanders (2002) The Paper: Professional Approach Argues there’s no fundamental difference between CE and other applied ethics fields (business, engineering, medical, etc.) Aims to proactively develop standards, obligations, responsibilities, etc., of a profession; i.e. has pragmatic goals, not metaethical But ignores the fact that issues permeate contemporary life, rather than just being professional Is not a substitute for providing a theoretical foundation and may lead to a 10 Commandments indoctrination approach

The 10 Commandments Floridi and Sanders (2002) Thou shall not use a computer in ways that may harm the people. Thou shall not interfere with other people's computer work. Thou shall not snoop around in other people's computer files. Thou shall not use a computer to steal. Thou shall not use a computer to bear false witness Thou shall not copy or use proprietary software for which you have not paid. Thou shall not use other people's computer resources without authorization or proper compensation. Thou shall not appropriate other people's intellectual output. Thou shall think about the social consequences of the program you are writing or the system you are designing. Thou shall always use a computer in ways that ensure consideration and respect for your fellow humans.

The Paper: Radical Approach - CE is a unique discipline Floridi and Sanders (2002) The Paper: Radical Approach - CE is a unique discipline Emphasises gravity and novelty of CE problems; stresses that theoretical foundation is necessary Unable to show that CE problems are unique, requiring new foundation Hard to demonstrate that a specific problem cannot be encompassed by some adaptation of an existing theory

The Paper: Professional Approach - CE as applied ethics Floridi and Sanders (2002) The Paper: Professional Approach - CE as applied ethics Classical ethical theories are sufficient CE problems are not inherently new, but only a version of existing moral issues So the approach has theoretical foundation (existing ethical theories) and is more than just for professionals (codes, standards) , is also for “citizens of the information society” Doesn’t address which normative ethical theory applies in new situations arising in CE. Nagging possibility that there may in fact be brand new ethical issues not encompassed by existing theories

The Paper: Innovative Approach - Information Ethics Floridi and Sanders (2002) The Paper: Innovative Approach - Information Ethics CE problems are unique enough to reveal limitations of existing normative ethics Substantially new moral problems enrich philosophy itself requiring new normative ethical theory Information is viewed as the third party (to the agent and the act) Positions information as the centre of attention (as opposed to the act or the agent)

The Paper: Discussion – Your views/thoughts Floridi and Sanders (2002) The Paper: Discussion – Your views/thoughts Are there ethical issues that are brand new, that existing ethical theories do not adequately encompass? Is it sufficient as a computing professional to be only concerned with the “professional approach”?