Chapter 15: Making Decisions about Computers, Information, and Society

Slides:



Advertisements
Similar presentations
Professional Ethics for Computer Scientists. Who are these guys and what are their purported ethical lapses? 2.
Advertisements

Chapter 15: Making Decisions about Computers, Information, and Society Invitation to Computer Science, Java Version, Third Edition.
Invitation to Computer Science 5th Edition
Social Responsibility and Ethics in Strategic Management
Phil 160 Kant.
Ethics in a Computing Culture
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
Written By KEVIN J. O’BRIEN Published: December 28, 2009 By The New York Times A Report by Michael Abdullah.
Chapter 15: Making Decisions about Computers, Information, and Society Invitation to Computer Science, C++ Version, Third Edition.
© 2005 Prentice-Hall, Inc. 3-1 Chapter 3 Ethics and Social Responsibility.
Game March 22, 2005Ashley Irvin/ Copyright Copyright and Plagiarism for Students Exploring the world of copyright and plagiarism.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
CS 3043 Social Implications Of Computing Keith A. Pray Instructor socialimps.keithpray.net CLASS 3 ETHICS © 2015 Keith A. Pray.
Ethical Use of Computers. Ethics and Responsibilities in the Computing Process Every profession operates with a set of ethics that help to define the.
Electronic Mail Security. Authentication and confidentiality problems Two systems: - PGP (Pretty Good Privacy) - S/MIME (Science Multipurpose Internet.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Business Ethics BY: Joshua m. Standifer.
Computer ethics.
UNIT 2: CONTEXT. Chapter 3: Ethics & Social Responsibility.
Computer Ethics.
AS Philosophy & Ethics Mrs Sudds What are your expectations?
 You will face ethical dilemmas in your career – count on it!  Your decisions will affect: ◦ your professional reputation. ◦ your employability. ◦ the.
Technology in Focus: Information Technology Ethics
CMSC 100 Computing in the World: Ethical Implications of Computing Professor Marie desJardins Tuesday, November 27, 2012 Thu 11/29/12 1 Future of Computing.
Ethical Issues in Computer Science (slides modified by Erin Chambers)
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Rights, Safety, & Security.  What rights do you have in a “digital” society?  Digital rights are freedoms extended to every student, administrator,
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
1 Chapter 3: Ethics and Social Responsibility Copyright Cengage Learning 2013 All Rights Reserved Introduction to Designed & Prepared by Laura Rush B-books,
ETHICS and COMPUTERS An Overview 23/04/2017.
Bio-informatics and Ethics DOLCE Workshop Keith W. Miller May 21, 2002.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Chapter 2: Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the need to protect the nation’s cyber.
CS 3043 Social Implications Of Computing Keith A. Pray Instructor socialimps.keithpray.net CLASS 3 ETHICS.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Ethical Decision Making , Ethical Theories
Group 7 CIS03 June 09, Socially responsible computing is a major concern because of the many ways an information worker’s work can affect other.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 5 Analogical Reasoning.
 In both business and marketing it is important to be ethical ( it’s also important to be in ethical in life).  In the short term, making unethical.
Introducing Ethical Capability Focus on F-6. Objectives  an overview of the Ethical Capability curriculum  introduction of an ethical issue planning.
Introducing Ethical Capability Focus on Objectives  an overview of the Ethical Capability curriculum  introduction of an ethical issue planning.
Negligence Tort law establishes standards for the care that people must show to one another. Negligence is the conduct that falls below this standard.
Topic : Privacy and Anonymity. Definition Privacy is the ability of individuals and groups to determine for themselves when, how and to what extent information.
Chapter 4 Ethical Standards. Introduction Limits to what law, regulations, and accrediting standards and requirements can govern In the absence of law,
SOC 120 Students Guide -tutorialrank.com
Ethics and Moral reasoning
Basic concepts in Ethics
Moral Theory Review.
Lecture 01: A Brief Summary
PowerPoint® Slides to Accompany
Basic Principles: Ethics and Business
ISNE101 Dr. Ken Cosh.
Principles of Health Care Ethics
BCT 2.00 Analyze Technology Issues
Data Protection Act and Computer Misuse Act ANSWERS.
Encryption, Cryptography, and Steganography:
Chapter 13 Security and Ethical Challenges.
Why Study Ethics and computing?
Electronic Mail Security
Communication Technology in a Changing World
Strategies to Persuade Your
Lecture 28 Social & Legal Issues (S&G, ch. 14)
Exploring Bioethics.
Ethical Theory Seeking a Standard for Morally Correct Action
Basic Principles: Ethics and Business
Presentation transcript:

Chapter 15: Making Decisions about Computers, Information, and Society Invitation to Computer Science, Java Version, Third Edition

Objectives In this chapter, you will learn about Case studies What we covered and what we did not Invitation to Computer Science, Java Version,Third Edition

Introduction Many personal and societal issues are related to computing and information Decisions regarding these issues should be well-informed and well-reasoned Invitation to Computer Science, Java Version,Third Edition

Case Studies Case 1: The Story of MP3—Compression Codes, Musicians, and Money Case 2: PGP—The U.S. Government vs. Phil Zimmermann Case 3: Hackers—Public Enemies or Gadflies? Case 4: Genetic Information and Medical Research Invitation to Computer Science, Java Version,Third Edition

Case 1: The Story of MP3—Compression Codes, Musicians, and Money MP3 protocol Compresses digital files that store audio information Napster Enabled peer-to-peer file sharing Allowed users to share music files with other users and obtain music files from other users Invitation to Computer Science, Java Version,Third Edition

Peer-to-Peer File Sharing Created by Napster Figure 15.1 Peer-to-Peer File Sharing Created by Napster Invitation to Computer Science, Java Version,Third Edition

Case 1: The Story of MP3— Compression Codes, Musicians, and Money (continued) Recording companies filed a suit against Napster on grounds of copyright infringement Napster lost the case and subsequent appeals Invitation to Computer Science, Java Version,Third Edition

Case 1: The Story of MP3— Compression Codes, Musicians, and Money (continued) Ethical question Is it ethically right to swap copyrighted MP3 files? Ethics The study of how to decide if something is morally right or wrong Invitation to Computer Science, Java Version,Third Edition

Case 1: The Story of MP3— Compression Codes, Musicians, and Money (continued) A consequentialist focuses on the consequences of an act to determine if the act is good or bad Utilitarians The most well-known consequentialists Focus on the consequences of an act on everyone to determine if it is good or bad Invitation to Computer Science, Java Version,Third Edition

Case 1: The Story of MP3— Compression Codes, Musicians, and Money (continued) Utilitarian argument #1: MP3 copying is OK Utilitarian argument #2: MP3 copying is not OK Invitation to Computer Science, Java Version,Third Edition

Case 1: The Story of MP3— Compression Codes, Musicians, and Money (continued) A dialectic We move back and forth between different viewpoints, criticizing each and trying to learn from each Goal: Both sides move closer to the truth from two different perspectives Invitation to Computer Science, Java Version,Third Edition

Case 2: PGP—The U.S. Government vs. Phil Zimmermann Phillip Zimmermann Concerned about bills introduced in the U.S. Congress to allow the government to restrict the use of encryption Developed the PGP (Pretty Good Privacy) encryption algorithm Made PGP freely available to anyone Invitation to Computer Science, Java Version,Third Edition

Case 2: PGP—The U.S. Government vs. Phil Zimmermann (continued) U.S. Government started a criminal investigation against Zimmermann Claim: Zimmermann had released a technology that would allow criminals and terrorists to avoid detection by law enforcement agencies Invitation to Computer Science, Java Version,Third Edition

Case 2: PGP—The U.S. Government vs. Phil Zimmermann (continued) Ethical question Was it right for Zimmerman to distribute his encryption program, or was the government right to try to prohibit its distribution? Analogies can be used to explore ethical questions In any analogy between two things, there are both similarities and differences Invitation to Computer Science, Java Version,Third Edition

Case 2: PGP—The U.S. Government vs. Phil Zimmermann (continued) A dialectic argument that uses analogies One analogy supports a particular view of the situation Another analogy supports an opposing view of the situation The participants in the discussion explore the strengths and weaknesses of each argument Invitation to Computer Science, Java Version,Third Edition

Case 2: PGP—The U.S. Government vs. Phil Zimmermann (continued) Simplification for exploring the PGP controversy using analogies The discussion is limited to the use of the PGP algorithm for email security Analogy #1: Email is like a private conversation Analogy #2: Email is like phone conversations Invitation to Computer Science, Java Version,Third Edition

Case 2: PGP—The U.S. Government vs. Phil Zimmermann (continued) In both analogies, there are similarities and differences between the two things being compared Only the similarities and differences that are ethically relevant should be considered Invitation to Computer Science, Java Version,Third Edition

Case 2: PGP—The U.S. Government vs. Phil Zimmermann (continued) Analogies give a better understanding of the ethical issues behind the PGP debate A decision about PGP affects security and privacy Catching criminals and stopping terrorists are two good things Having personal privacy is a good thing Invitation to Computer Science, Java Version,Third Edition

Case 2: PGP—The U.S. Government vs. Phil Zimmermann (continued) The utilitarian perspective What would be the consequences of enforcing a ban on PGP? What would be the consequences of allowing people to use PGP? Invitation to Computer Science, Java Version,Third Edition

Case 2: PGP—The U.S. Government vs. Phil Zimmermann (continued) Using analogies and a utilitarian analysis The increased security of a PGP ban would be bought at a very high price Invitation to Computer Science, Java Version,Third Edition

Case 3: Hackers—Public Enemies or Gadflies? Definition of hacking for this discussion Gaining unauthorized access to someone else’s computer system Ethical question Is there an ethical case to be made in support of computer hackers? Invitation to Computer Science, Java Version,Third Edition

Case 3: Hackers—Public Enemies or Gadflies? (continued) Analogy Breaking into a computer is like breaking into someone’s house The similarities and differences between burglars and hackers should be analyzed Utilitarian analysis What is gained/lost when a computer is hacked? Invitation to Computer Science, Java Version,Third Edition

Case 3: Hackers—Public Enemies or Gadflies? (continued) Two challenges when using a utilitarian argument It is sometimes hard to predict consequences with any accuracy There seems to be a distinction between “good” hackers and “bad” hackers Invitation to Computer Science, Java Version,Third Edition

Case 3: Hackers—Public Enemies or Gadflies? (continued) A deontological argument can be used to try to meet these challenges Deontological arguments focus on Intent of an act How that act is/is not defensible Invitation to Computer Science, Java Version,Third Edition

Case 3: Hackers—Public Enemies or Gadflies? (continued) Deontological perspective on hacking Is the act of hacking into another person’s computer system inherently unethical? At the end of the analysis, questions are raised about the claims of the hacker ethic Invitation to Computer Science, Java Version,Third Edition

Thinking Straight about Technology and Ethics A “paramedic method” for computer ethics Goal is not to become a research ethicist, but to gain skills in Recognizing ethical questions regarding computing Reasoning carefully about answers to those questions Invitation to Computer Science, Java Version,Third Edition

Thinking Straight about Technology and Ethics (continued) Questions to ask in dealing with an ethical problem Who are the stakeholders in this situation? What does each stakeholder have to gain or lose? What duties and responsibilities in this situation are important to the stakeholders? Invitation to Computer Science, Java Version,Third Edition

Thinking Straight about Technology and Ethics (continued) Questions to ask in dealing with an ethical problem (continued) Can you think of an analogous situation that does not involve computing? If so, does that analogous situation clarify the situation that does involve computing? Either make a decision or revisit the steps Invitation to Computer Science, Java Version,Third Edition

Case 4: Genetic Information and Medical Research Fictional case You are at your doctor for a routine checkup The doctor asks you to participate in a study of genetic diversity and disease by donating some skin cells for the study The doctor informs you that your skin cells will be identified only by a randomly assigned number and your zip code Should you donate your cells? Invitation to Computer Science, Java Version,Third Edition

Case 4: Genetic Information and Medical Research (continued) The paramedic method Step 1: Identify stakeholders Step 2: What is at stake? Step 3: Identify duties and responsibilities Step 4: Think of analogies Step 5: Make a decision or loop through the method again Invitation to Computer Science, Java Version,Third Edition

What We Covered and What We Did Not Introduced a few of the issues involving technology and society Discussed how to apply the following to computer ethics Utilitarian ideas Deontological ideas Analogies Invitation to Computer Science, Java Version,Third Edition

What We Covered and What We Did Not (continued) Topics not mentioned Rawlsian negotiation Virtue ethics Any number of other ethical techniques Invitation to Computer Science, Java Version,Third Edition

Summary of Level 6 Level 6: Social Issues Looked at several case studies involving computer technology Showed how even straightforward situations have many different ethical implications Provided some tools for coping with ethical decision making Invitation to Computer Science, Java Version,Third Edition

Summary Ethics: How to decide if something is morally right or wrong Utilitarian: Focus on the consequences of an act on everyone to determine if it is good or bad Dialectic: Move back and forth between different viewpoints, criticizing each and trying to learn from each Invitation to Computer Science, Java Version,Third Edition

Summary (continued) Analogies can help explore ethical questions Deontological arguments focus on the intent of an act and how that act either is or is not a defensible, responsible act Invitation to Computer Science, Java Version,Third Edition