Invitation to Computer Science 5th Edition

Slides:



Advertisements
Similar presentations
Key Points in Writing Case Studies
Advertisements

Professional Ethics for Computer Scientists. Who are these guys and what are their purported ethical lapses? 2.
Chapter 15: Making Decisions about Computers, Information, and Society Invitation to Computer Science, Java Version, Third Edition.
Bledsoe et al., Paramedic Care Principles & Practice Volume 1: Introduction © 2006 by Pearson Education, Inc. Upper Saddle River, NJ Chapter 7 Ethics in.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Law I Chapter 18.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Computers and Crime Breaking and Entering Eavesdropping Harassment Vandalism Destruction of Private Property Possession of Stolen Goods Theft.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
Computer Security and Penetration Testing
Security, Privacy, and Ethics Online Computer Crimes.
Ethics CS351. What are ethics? Dictionary: –1. A system or set of moral principles. –2. The rules of conduct recognized in respect to a particular class.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
Chapter 15: Making Decisions about Computers, Information, and Society Invitation to Computer Science, C++ Version, Third Edition.
Ethical Theories: Deontology and Teleology
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
Introduction Our Topic: Mobile Security Why is mobile security important?
Computer Ethics.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Question: Future Sessions AI and Military (UAS) Virtual Worlds Privacy and NSA Free Software Movement.
Introduction to Ethical Theory I Last session: “our focus will be on normative medical ethics, i.e., how people should behave in medical situations” –
CMPT 880/890 Writing labs. Outline Intro to the writing part of 880 Communication in research Overview of topics Today: Grammar quiz Research writing.
Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Computer Ethics A Necessity for the new era. Why is Computer Ethics Important? The creation and existence of new questions that older laws cannot answer.
1 Ethics of Computing MONT 113G, Spring 2012 Session 18 Ethical reasoning.
Humanities 375, September 8, Why are we reading this book? u 1. To raise your sensitivity to circumstances involving information technology that.
OCR Level 2 Cambridge Technicals in Business
ETHICS and COMPUTERS An Overview 23/04/2017.
ETHICS, POLICY & SECURITY ISSUES
ETHICS, POLICY & SECURITY ISSUES
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Ethical reasoning 2 Consequentialism: We can decide the right action (alternative, option, in a decision) by considering consequences, rather than just.
Communicating Results what can we say and to whom.
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Intro to Ethics CSCI 327 Social Implications of Computing.
Ethical Decision Making , Ethical Theories
CSE 1111 Week 3 Ethical Relativism Basically asserts that there are no standards or rules of behavior that can reasonably be applied at all times and in.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 5 Analogical Reasoning.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 21 Intellectual Property III.
Introducing Ethical Capability Focus on F-6. Objectives  an overview of the Ethical Capability curriculum  introduction of an ethical issue planning.
Introducing Ethical Capability Focus on Objectives  an overview of the Ethical Capability curriculum  introduction of an ethical issue planning.
EECS 690 January 27, Deontology Typically, when anyone talks about Deontology, they mean to talk about Immanuel Kant. Kant is THE deontologist.
Bledsoe et al., Essentials of Paramedic Care: Division 1 © 2007 by Pearson Education, Inc. Upper Saddle River, NJ Division 1 Introduction to Advanced Prehospital.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Basic concepts in Ethics
CS 2315 review.
Ethical reasoning 2 Consequentialism: We can decide the right action (alternative, option, in a decision) by considering consequences, rather than just.
Please read the entire presentation.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
BCT 2.00 Analyze Technology Issues
Why Study Ethics and computing?
Humanties 7th grade Mrs.Revilla
Communication Technology in a Changing World
Lecture 28 Social & Legal Issues (S&G, ch. 14)
What Are Ethics? What are the objectives?
Chapter 15: Making Decisions about Computers, Information, and Society
COSC-100 (Elements of Computer Science) Prof. Juola
Presentation transcript:

Invitation to Computer Science 5th Edition Chapter 17 Making Decisions about Computers, Information, and Society

Objectives In this chapter, you will learn about: Case studies involving: MP3 PGP Hackers Technology and ethics Genetic information and medical research What we covered and what we did not Invitation to Computer Science, 5th Edition

Introduction In this chapter: We introduce skills that will help you to think and reason carefully when making personal decisions about computing Invitation to Computer Science, 5th Edition 3

Case Studies Case 1: The Story of MP3-Compression Codes, Musicians, and Money 1989: Fraunhofer Institute patented MP3 in Germany 1997: Tomislav Uzelac created the first commercially viable MP3 playback program 1998: WinAmp was offered for free on the Internet Peer-to-peer file sharing: set up by Napster Invitation to Computer Science, 5th Edition 4

Figure 17.1 Peer-to-Peer File Sharing Created by Napster Invitation to Computer Science, 5th Edition

Asking Ethical Questions Ethics The study of how to decide if something is morally right or wrong Consequentialism Focuses on the consequences of an act to determine if the act is good or bad Utilitarians Answer the question Good for whom? with a hearty, Good for everyone! Invitation to Computer Science, 5th Edition

Utilitarian Argument #1: MP3 Copying is OK Market research Shows that MP3 downloading has increased the sale of music CDs Invitation to Computer Science, 5th Edition

Utilitarian Argument #2: MP3 Copying is Not OK The decline of music CD sales Long-term effect of widespread copying of copyrighted materials Dialectic Used by ethicists to try to get better and better ethical decisions Ultimate goal is for both sides to “win” by moving closer to the truth from two different perspectives Invitation to Computer Science, 5th Edition

Case 2: PGP: The U.S. Government vs. Phil Zimmermann 1991 Phillip Zimmermann developed an encryption algorithm called “Pretty Good Privacy,” PGP In any analogy between two “things,” there are both similarities and differences Invitation to Computer Science, 5th Edition

Case 2: PGP: The U.S. Government vs. Phil Zimmermann (continued) Analogy #1: E-mail is Like a Private Conversation Analogy #2: E-mail is Like Phone Conversations Some similarities and differences in Analogy #1 The presumed audience may be larger than intended Private conversation is high-bandwidth Conversation happens in real time Having e-mail capability costs money Invitation to Computer Science, 5th Edition

Case 2: PGP: The U.S. Government vs. Phil Zimmermann (continued) Some similarities and differences in Analogy #2 Phone calls typically include more information than e-mails Both phone calls and e-mails are done at a physical distance Phone calls are meant to be in real time, but e-mails are asynchronous Invitation to Computer Science, 5th Edition

Case 2: PGP: The U.S. Government vs. Phil Zimmermann (continued) Analyzing the ethical significance of the similarities and differences Three methods of communication all differ in the amount of information exchanged PGP allows e-mail users to return to the default of privacy What are the consequences of enforcing a ban on PGP, and what are the consequences of allowing people to use PGP? Invitation to Computer Science, 5th Edition

Case 3: Hackers: Public Enemies or Gadflies? Someone who breaks into computer systems and launches Internet worms and viruses or perpetrates other computer-related vandalism Invitation to Computer Science, 5th Edition

Analogy: Breaking into a Computer is Like Breaking into Someone’s House Similarities between burglars and hackers In both cases, the intruders are there without our permission and without us being aware of their presence Differences between burglars and hackers Burglar is likely to take something from your house, and that removal will deprive you of something Hacker takes your intellectual property and privacy Invitation to Computer Science, 5th Edition

Utilitarian Argument: Costs and Benefits of Hacking Challenges when using a utilitarian argument in a dialectic about hacking It is sometimes hard to predict consequences with any accuracy There seems to be a distinction between “good hackers” and “bad hackers” Invitation to Computer Science, 5th Edition

Deontological Argument: Hacking with a Golden Heart Utilitarian and other consequentialist arguments Focus on the consequences of an act to determine if the act is ethical Deontologist Focuses more on the intent of an act and how that act either is or is not a defensible, responsible act Invitation to Computer Science, 5th Edition

Deontological Argument: Hacking with a Golden Heart (continued) The “hacker ethic” claims Information sharing is a powerful positive good It is the ethical duty of hackers to facilitate access to information and computing resources System cracking for fun and exploration is ethically OK as long as the cracker commits no theft, vandalism, or breach of confidentiality Invitation to Computer Science, 5th Edition

Thinking Straight about Technology and Ethics Paramedic ethics for technology Who are the stakeholders in this situation? What does each stakeholder have to gain or lose? What duties and responsibilities in this situation are important to the stakeholders? Can you think of an analogous situation that doesn’t involve computing? Either make a decision or revisit the steps Invitation to Computer Science, 5th Edition

Case 4: Genetic Information and Medical Research Step 1: Identify stakeholders Step 2: What is at stake? Step 3: Identify duties and responsibilities Step 4: Think of analogies Step 5: Make a decision or loop through the method again Invitation to Computer Science, 5th Edition

What We Covered and What We Did Not Technical decisions Involve human values, whether we recognize it or not When you have to decide if something involving technology is right or wrong Remember to think carefully about consequences and duties Invitation to Computer Science, 5th Edition

Summary Ethics Dialectic Deontologist The “hacker ethic” claims The study of how to decide if something is morally right or wrong Dialectic Used by ethicists to try to get better and better ethical decisions Deontologist Focuses more on the intent of an act and how that act either is or is not a defensible, responsible act The “hacker ethic” claims Information sharing is a powerful positive good Invitation to Computer Science, 5th Edition