CSC 411 Ethics “What Is Computer Ethics?”

Slides:



Advertisements
Similar presentations
Lecture 2: What is Computer Ethics? Special Status of Computer Ethics It is not enough that you should understand about applied science in order that your.
Advertisements

Wrap-Up Wednesday/Friday 10th Week. Goals of this course Give students a broader, more realistic view of the discipline of computer science as they decide.
CyberEthics Essay Outline
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
COMPUTER AND INFORMATION ETHICS By: Richard Ramos.
1. By the end of this lecture you should be able … To describe in general terms how computers function To describe the fetch-execute cycle To explain.
B1051 Fundementals of Information Technology (Intro)
Computer Ethics Overview Gordon College. Introduction  Computer ethics is growing and changing as computers are growing and changing growing and changinggrowing.
Introduction to Computer Ethics
Fall 2014 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering What is Computer Ethics? Fall 2014 Marco Valtorta.
Department of Information System Faculty of Computing & Information Technology King Abdul Aziz University, Jeddah, KSA.
COMPUTER ETHICS & COMPUTER HACKING. Introduction Ethics is the branch of philosophy that involves systemizing, defending and recommending concepts of.
Ethics and Computing : A NEW PARADIGM Benjamin Wage.
Ethics and the Information Revolution Terrell Ward Bynum
1.1 1 Introduction Foundations of Computer Science  Cengage Learning.
ITGS Standard Level Mr Gavin Johnson. ITGS The Diploma Programme information technology in a global society (ITGS) course is the study and evaluation.
TSPE Piney Woods Chapter “What Is Computer Ethics?” Greg T Harber Department of Computer Science Stephen F Austin State University The.
Computer Engineering Department College of Computer Sciences and Engineering.
© 2007 by Prentice Hall 1 Introduction to databases.
Information Ethics Prof. Madya Dr. Rozinah Jamaludin 11 March 2010.
Ethical and Social...J.M.Kizza1 Module 5: Intellectual Property Rights and Computer Technology  Computer Products and Services  Instruments of Protection.
Chapter 1 Introduction.
Chapter 1 Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics Introduction Cybertechnology, Ethical Concepts,
EE3A1 Computer Hardware and Digital Design
Readings in Cyberethics Notes from book by Spinello.
Reason, Relativity, and Responsibility in Computer Ethics
Computer Engineering Department (KFUPM) Computer Engineering Department Sadiq M. Sait College of Computer Sciences and Engineering.
Strand 1: Social and ethical significance SL/HL core Social and ethical considerations linked to specified IT developments. Students must study the following.
Computer Architecture Furkan Rabee
Integrating Your Sources QUOTATIONS, PARAPHRASING, AND SUMMARIZING.
1 January 31, Documenting Software William Cohen NCSU CSC 591W January 31, 2008.
Fluency with Information Technology
Ethics & Social Responsibility
Introduction: Computer programming
Advanced Higher Modern Languages
Session 11: Fair and Acceptable Use and Copyright
Director, The Flashlight Project
INTRODUCTION TO COMPUTERS
Computers: Tools for an Information Age
The Legal System and Ethics in Information Security
Computer Basics Technology’s Impact.
Ethics & Social Responsibility
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
TECHNOLOGY IN ACTION.
This presentation uses a free template provided by FPPT.com Computer Name: Ojen Shrestha Class: XI Section: G 1 Date:
What’s happening here? Olivia and Tom are studying for a Degree in Structural Engineering. Their task is to design a steel structure and calculate the.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
INF 103 Education for Service-- snaptutorial.com.
INF 103 Teaching Effectively-- snaptutorial.com
INF 103 Education for Service-- tutorialrank.com
Computer Science I CSC 135.
AN INTRODUCTION TO Computer science
Introduction to Computer Ethics
Automating Profitable Growth™
Chapter 1 – Introduction to Computers
Introduction to Digital Electronics
Plagiarism and Copyrights
Fall 2018 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering What is Computer Ethics? Fall 2018 Marco Valtorta.
Plagiarism What it is. Avoiding it.. Plagiarism What it is. Avoiding it.
Computer ethics in computer science curriculum
Introduction to Information Technology & Communication
Introduction to Computer Ethics
Special Status of Computer Ethics
Computer Ethics.
Leading Into Our Futures
COMPUTER ETHICS & COMPUTER HACKING
Introduction to Computer Ethics
Saturday, 02 November 2019Saturday, 02 November 2019
Presentation transcript:

CSC 411 Ethics “What Is Computer Ethics?” Greg T Harber Department of Computer Science Stephen F Austin State University The BS in Computer Science has since 2000 been accredited by the Computing Accreditation Commission of ABET. The BS in Computer Information Systems established in 2012 (changed from BBA) The BA degree in Information Technology established in 2008 is one of only a few ITEC programs in Texas and is growing rapidly.

James H. Moor Is the Daniel P. Stone Professor of Intellectual and Moral Philosophy at Dartmouth College. He earned his Ph.D. in 1972 from Indiana University. Considered one of the pioneering theoreticians in the field of computer ethics. His research also includes study in philosophy of artificial intelligence, philosophy of mind, philosophy of science, and logic. http://www.dartmouth.edu/~jmoor/

WHAT IS COMPUTER ETHICS? The article first appeared in Terrell Ward Bynum, ed., Computers & Ethics, Blackwell, 1985, pp.266 – 75. (A special issue of the journal Metaphilosophy.) Four Sections: * A Proposed Definition * The Revolutionary Machine * Anatomy of the Computer Revolution * The Invisibility Factor

Focus of Essay What makes computers different from other technologies? How this difference makes a difference in ethical considerations. Characterize "computer ethics" Show why it is both intellectually interesting and enormously important

A PROPOSED DEFINITION Computer ethics is the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology "computer technology" includes computers and associated technology (“software as well as hardware and concerns about networks connecting computers as well as computers themselves”)

Historical Aside First Generation 1642 – 1940's Second Generation 1947 - 1958 Third Generation 1959 – today Progression von Neumann architecture Transistor Integrated Circuit Microprocessor

Historical Aside Internet 1969 – 1981 ARPAnet 1982 – 1995 TCP/IP, NSF, Ethernet, PC 1995 – today WWW, .com, Windows 95 Cellular network, satellite coverage Ethernet 1980 – 1985 wi-fi

Issues A "policy vacuum" exists about how computers should be used: Computers give us new capabilities which in turn give us new choices to formulate actions Usually no policy is in place or the existing one is inadequate

Issues The "central task" of computer ethics: To determine what we should do in these cases, i.e., formulate policies to guide our actions. Example used to clarify the "conceptual vacuum:” Formulate a policy for protecting software (intellectual property)

Issues, cont. What is software? Just IP or an idea, algorithm, code text? Use copyright or patent system? Is a machine readable program the same (a copy) as a human readable program? Intellectual infrastructure for software You must understand all of the above before you can make a policy

THE REVOLUTIONARY MACHINE What is special about the computer? Affordable Abundant (pervasive) Fast, small, easy-to-use, powerful But these attributes are not enough for it to be "revolutionary" What is revolutionary? Logical Malleability

THE REVOLUTIONARY MACHINE It can be shaped or molded to do any activity that can be characterized in terms of inputs, outputs, and the connecting logical operations. Its applications are limitless. The "universal tool" “I think logical malleability explains the already widespread application of computers and hints at the enormous impact computers are destined to have.”

ANATOMY OF THE COMPUTER REVOLUTION What social impact will computers have? The computer revolution will follow a two stage development: Introduction 1940 – 1980 Permeation 1980 - today It will become an integral part of institutions throughout our society - transforming everything

COMPUTER REVOLUTION Examples: Voting - Use to count votes easily | Is it a fair election? Money - Use to count and track money | What is money? Educate - Use to assist education | What is education? Work – Use to expedite routine work | What is the nature of work?

In brief, the argument is as follows: The revolutionary feature of computers is their logical malleability. Logical malleability assures the enormous application of computer technology. This will bring about the Computer Revolution. During the Computer Revolution many of our human activities and social institutions will be transformed. These transformations will leave us with policy and conceptual vacuums about how to use computer technology. Such policy and conceptual vacuums are the marks of basic problems within computer ethics. Therefore, computer ethics is a field of substantial practical importance.

THE INVISIBILITY FACTOR What is operationally suspect about computer technology? “Most of the time and under most conditions computer operations are invisible.” Three kinds of invisibility which can have ethical significance: Invisible abuse - the intentional use of the invisible operations of a computer to engage in unethical conduct

THE INVISIBILITY FACTOR a) steal excess interest - theft b) invasion of the property and privacy of others c) surveillance Invisible programming values Programmer's value judgments, e.g., AA Sabre chose AA flights, Training simulation Invisible complex calculations - too complex fo human inspections and understanding

Examples Black-Scholes equation- a way not only to calculate the value of options but all kinds of other financial assets. Moved into derivatives. Long-Term Capital Management - "It showed the danger of this kind of algorithmically-based trading if you don't keep an eye on some of the indicators that the more conventional people would use"

Examples, cont. Black-Scholes changed the culture of Wall Street, from a place where people traded based on common sense, experience and intuition, to a place where the computer said yes or no. Modeling – weather, health, research

Examples, cont. "As the age of autonomous cars and drone surveillance draws nearer, it's reasonable to expect government to increasingly automate enforcement of traffic laws. Tolerance Frequency of data collection Duration of time

Examples, cont. Capitol Records v. ReDigi Inc. ReDigi is basically a digital version of a used-record store first sale doctrine - applies to physical items “Do you really own something if it's just a bunch of ones and zeroes on your computer? If you take a digital song and you move someplace else, did you actually move it or did you just make a copy and destroy the original?”