Lecture 28 Social & Legal Issues (S&G, ch. 14)

Slides:



Advertisements
Similar presentations
Yr 9 Test = Revision Ethical Decisions Crime and Punishment Where do our morals come from? Is it ever right to Kill? Is the media to blame? If you do something.
Advertisements

Professional Ethics for Computer Scientists. Who are these guys and what are their purported ethical lapses? 2.
Chapter 15: Making Decisions about Computers, Information, and Society Invitation to Computer Science, Java Version, Third Edition.
Invitation to Computer Science 5th Edition
Ethical Decision Making
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Chapter 14 Social and Legal Issues. Chapter Outline A gift of fire A gift of fire Here, there, everywhere Here, there, everywhere Privacy Privacy The.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Chapter 15: Making Decisions about Computers, Information, and Society Invitation to Computer Science, C++ Version, Third Edition.
Computer and Ethics. Ethical Problems Proliferation of computers and their networks have created new ethical problems The ACM has issued a Code of Ethics.
CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal.
9/4/20151 Computer Security Social Legal and Ethical issues.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
 Ethics, also known as moral philosophy, is a branch of philosophy that addresses questions about morality—that is, concepts such as good and evil, right.
© 2000 John Wiley & Sons, Inc. Davison and Neale: Abnormal Psychology, 8e Abnormal Psychology, Eighth Edition by Gerald C. Davison and John M. Neale Lecture.
ETHICS and COMPUTERS An Overview 23/04/2017.
Cosc 4765 Ethics and security. Security Computer security crosses over legal and ethics lines in many places. –Hacking is pretty much always illegal.
Ethical Theories Unit 9 Ethical Awareness. What Are Ethical Theories? - Explain what makes an action right or wrong - Have an overview of major ethical.
Moral Issues In Policing. Moral Issues in Policing Should police be held to the same or higher standards than other members of society? – Courage? – Fairness?
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
ETHICS in the WORKPLACE © 2012 Cengage Learning. All Rights Reserved. Chapter 2 Ethical Principles.
Ethical Decision Making , Ethical Theories
Business Ethics Chapter # 3 Ethical Principles, Quick Tests, and Decision-Making Guidelines  The best kind of relationship in the world is the one in.
 In both business and marketing it is important to be ethical ( it’s also important to be in ethical in life).  In the short term, making unethical.
Professional Ethics and Responsibilities Part-II
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
ETHICAL BASES FOR LAWS Chapter 2. Ethics A practice of deciding what is right or wrong in a reasoned, impartial manner  Decision affects you.
Individual Factors: Moral Philosophies and Values
Chapter 1.1 Foundations of Law. Bell Ringer #1 Write this sentence in your notebook and complete it. Explain! “If our country did not have a legal system,
Reward and Punishment.
What is Law?  Jurisprudence – the study of law and legal philosophy  Law can be defined as the rules and regulations made and enforced by government.
Computer Ethics IT Fundamentals Battlefield High School.
Ethics and Moral reasoning
Privacy and the Law.
Introduction to Philosophy
McGraw-Hill/Irwin Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.
DIGITAL CITIZENSHIP What You Should Know!.
Design and modeling 10 step design process
Magruder’s American Government
Ten-Stage Design Process
CSCE 390 Professional Issues in Computer Science and Engineering Ch
RESEARCH METHODS Lecture 9
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Ten-Stage Design Process
What Makes Integrative Negotiation Different?
Lecture 01: A Brief Summary
PowerPoint® Slides to Accompany
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Chapter 11 crime and security in the networked economy
Ethical Dilemmas in Leadership
Objective 1.02: Understand the Ethics & Structure of Law
Public Recording of Police
ISNE101 Dr. Ken Cosh.
Lesson 2- Protecting Yourself Online
BCT 2.00 Analyze Technology Issues
Intellectual Property Lawyers
Protection of News Sources
10 Stages Of the Engineering Design Process
Why Study Ethics and computing?
Faculty of Science IT Department By Raz Dara MA.
Communication Technology in a Changing World
Individual Factors: Moral Philosophies and Values
Lecture 27 Social & Legal Issues (S&G, ch. 14)
Year 9 – Is there a right way to live?
Computer Security Social Legal and Ethical issues
Lesson 2- Protecting Yourself Online
What Are Ethics? What are the objectives?
RESEARCH METHODS Lecture 09
Chapter 15: Making Decisions about Computers, Information, and Society
C H A P T E R 4 Federalism.
Presentation transcript:

Lecture 28 Social & Legal Issues (S&G, ch. 14) 2/23/2019 5:02 PM Lecture 28 Social & Legal Issues (S&G, ch. 14) 2/23/2019 CS 100 - Lecture 28

Simulation & Models Recall our discussion of models: a model is intended to address a certain class of questions or issues models make simplifying assumptions Recall the omission of aerodynamic stability from bridge models before the Tacoma Narrows Bridge disaster Nevertheless, computer models & simulations are essential 2/23/2019 CS 100 - Lecture 28

Evaluating Models How well is the underlying science understood? What sorts of simplifying assumptions are made? How well does the model agree with experimental results? 2/23/2019 CS 100 - Lecture 28

Lecture 28 2/23/2019 5:02 PM Computer Crime Often just a new or “better” way to commit traditional crimes Ampliative aspects of computer technology may allow committing crimes on a larger scale Reductive aspects of computer technology may make it harder to detect crimes, identify criminals, etc. Ampliative: in past, could steal only one (or a wallet’s worth) of credit cards at a time; now can steal hundreds of thousands of numbers at one time 2/23/2019 CS 100 - Lecture 28

Some Kinds of Computer Crime Lecture 28 2/23/2019 5:02 PM Some Kinds of Computer Crime Fraud, embezzlement & theft Stealing (data) “Hacking” (system cracking) individual systems the information infrastructure benign hacking? Viruses & worms: reproduce selves virus: hides in another program worm: an independent program It is difficult to get accurate data on the extent of these crimes, since victims (businesses) tend to hide them. 2/23/2019 CS 100 - Lecture 28

Constitutional & Civil Liberties Issues 1st Amendment protects freedom of speech & press 4th Amendment protects against unreasonable search & seizure Do they apply to electronic & other new media? So far, the courts generally have held them to apply, but there is much uncertainty 2/23/2019 CS 100 - Lecture 28

Communication Media Is the operator of a communication medium responsible for the information it carries? analogy: telephone companies & post office analogy: a privately-owned meeting room Can the operator restrict this information? analogy: private presses 2/23/2019 CS 100 - Lecture 28

Encryption & Wiretapping Encryption can be used to ensure privacy & authenticity may be used for legal/illegal purposes May be subject to export restrictions What provisions should be made for government interception & recording of communications? What limits should be imposed on the government? 2/23/2019 CS 100 - Lecture 28

Lecture 28 2/23/2019 5:02 PM These questions are especially relevant to issues such as the “USA PATRIOT” Act 2/23/2019 CS 100 - Lecture 28

How do we address these issues? Engineering issues (efficiency, economy, elegance) addressed by engineering analysis & other kinds of technical expertise Legal issues addressed by lawyers, courts, etc. Ethical issues addressed by ethicists & ethical analysis 2/23/2019 CS 100 - Lecture 28

New Ethical Issues Consider a relatively well-defined ethical problem: Is it ethical to “hack” into someone else’s computer system (and do no damage)? Traditional moral codes do not address this issue! So we must apply ethical analysis 2/23/2019 CS 100 - Lecture 28

Ethical Analysis Only touching on a few basic ideas Ethics = “the study of how to decide if something is morally right or wrong” What criteria are used for judging the rightness or wrongness of an action? There are several well-established approaches to defining criteria 2/23/2019 CS 100 - Lecture 28

Consequentialism If the consequences of an act are on the whole good, then the act is good If the consequences of an act are on the whole bad, then the act is bad Good or bad for whom? Utilitarian criterion: the greatest total happiness Also, may be difficult to predict consequences 2/23/2019 CS 100 - Lecture 28

Deontological Criterion Deontology = the study of moral obligation Rather than focusing on the consequences of an act, deontological arguments focus on the inherent nature of the act Two important questions: What is the intent of the act? Is it a defensible, responsible act? 2/23/2019 CS 100 - Lecture 28

Two Important Tools of Ethical Analysis Dialectic Analogy 2/23/2019 CS 100 - Lecture 28

Dialectical Method Root meaning of dialectic is conversation Philosophical dialectic: a method of approaching the truth by moving critically among two or more viewpoints The strengths & weaknesses of each viewpoint are revealed, especially from the perspective of the others Ideal outcome: a synthesis that combines the strengths & eliminate the weaknesses More commonly, leads to better understanding of improved viewpoints 2/23/2019 CS 100 - Lecture 28

Analogical Method Identify analogous situations that are more familiar or better understood Identify similarities & differences between the analogy and the issue of concern Consider their relevance to the issue Explore competing analogies dialectically 2/23/2019 CS 100 - Lecture 28

A Method of Ethical Analysis Identify stakeholders Identify what is at stake (utilitarian step) Identify duties & responsibilities (deontological step) Think of & evaluate analogies Make a decision or repeat the steps 2/23/2019 CS 100 - Lecture 28

Three Case Studies Sharing music files Zimmerman & PGP encryption “Hacking” computer systems 2/23/2019 CS 100 - Lecture 28

Reminder: Final Exam Monday, May 3 2:45 – 4:45 2/23/2019 CS 100 - Lecture 28

Next Time: a movie on the history of computing & a short quiz (to ensure you pay attention!) 2/23/2019 CS 100 - Lecture 28