Lecture 2: What is Computer Ethics? Special Status of Computer Ethics It is not enough that you should understand about applied science in order that your.

Slides:



Advertisements
Similar presentations
ENGR2216 FORTRAN PROGRAMMING FOR ENGINEERS. Chapter 1 The computer CPU MEMORY INPUT/OUTPUT DEVICES DATA REPRESENTATION BINARY SYSTEM OCTAL & HEXADECIMAL.
Advertisements

CyberEthics Essay Outline
Introduction to Computer Ethics
Software Requirements
Chapter 1 Data Storage. 2 Chapter 1: Data Storage 1.1 Bits and Their Storage 1.2 Main Memory 1.3 Mass Storage 1.4 Representing Information as Bit Patterns.
Computer Ethics Overview Gordon College. Introduction  Computer ethics is growing and changing as computers are growing and changing growing and changinggrowing.
Introduction to Computer Ethics
Ethical Issues in IRM, IT, KM By Daniel P. McAlerney.
Fall 2014 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering What is Computer Ethics? Fall 2014 Marco Valtorta.
Department of Information System Faculty of Computing & Information Technology King Abdul Aziz University, Jeddah, KSA.
COMPUTER ETHICS & COMPUTER HACKING. Introduction Ethics is the branch of philosophy that involves systemizing, defending and recommending concepts of.
Social and Economic Impacts of IT Professor Matt Thatcher.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 5 Slide 1 Requirements engineering l The process of establishing the services that the.
Information and communication technology (ICT) capability Australian Curriculum, F10.
Chapter 1: Introduction To Computer | SCP1103 Programming Technique C | Jumail, FSKSM, UTM, 2005 | Last Updated: July 2005 Slide 1 Introduction To Computers.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
Information Technology Ms. Abeer Helwa. Computer Generations First Generation (Vacuum Tubes) -They relied on the machine language to perform operations.
Computer ethics.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
Ethics and Computing : A NEW PARADIGM Benjamin Wage.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
Ethics and the Information Revolution Terrell Ward Bynum
Computer Ethics.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Bits and Bytes in a computers memory Inside the computer are millions of electronic switches. These are grouped together in bundles of 8. A switch can.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
© 2001 Business & Information Systems 2/e1 Chapter 3 Information System Fundamentals.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 3 Information System Fundamentals.
Pengantar Teknologi Informasi dan Ilmu Komputer Information Technology and Data Representation PTIIK- UB.
Numeric Processing Chapter 6, Exploring the Digital Domain.
MATSEC Past Papers May 2010 Paper 1 Paper 2A. What is the difference between each of the following pairs of items? Syntax Error Caused by forgetting certain.
Checking data Chapter 7 Prepared by:Sir Mazhar Javed.
The Beauty and Joy of Computing Lecture #3 : Creativity & Abstraction UC Berkeley EECS Lecturer Gerald Friedland.
Unit 3- Introduction to Computer Ethics
10-Sep Fall 2001: copyright ©T. Pearce, D. Hutchinson, L. Marshall Sept Recall Objective: understand computers at machine level interested.
Chapter 1 Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics Introduction Cybertechnology, Ethical Concepts,
Readings in Cyberethics Notes from book by Spinello.
Reason, Relativity, and Responsibility in Computer Ethics
Marwan Al-Namari 1 Digital Representations. Bits and Bytes Devices can only be in one of two states 0 or 1, yes or no, on or off, … Bit: a unit of data.
1 3 Computing System Fundamentals 3.6 Errors Prevention and Recovery.
COMP135/COMP535 Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 2 Lecture 2 – Digital Representations.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 7 Ethics in IT Societies.
Do software developers have an ethical duty? KELLEN STUART.
Ethical Implications In The Age Of Information
Software Engineering, COMP201 Slide 1 Software Requirements BY M D ACHARYA Dept of Computer Science.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Information Systems in Organizations 1.2 What’s in it for you? 1.3 Ethics of analysis and use of systems, data and information.
Professional Ethics and Responsibilities Part-II
1 Software Requirements Descriptions and specifications of a system.
End Show What is Information Communication Technology ? Processing of data via computer Using the technologies from computing, electronics, and telecommunications.
Chapter 4 – Requirements Engineering
Chapter 5 – Requirements Engineering
Introduction to the C Language
Ethical Dilemmas Dilemma – a choice between two options.
Unit 3- Introduction to Computer Ethics
Lecture # 1 M.Sc / BS(CS)/ BS(I.T) DPT.
Ethical and Social Issues in Information Systems
Chapter 1 Data Storage.
Computer Science I CSC 135.
Introduction to Computer Ethics
Fall 2018 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering What is Computer Ethics? Fall 2018 Marco Valtorta.
Introduction to Computer Ethics
Special Status of Computer Ethics
Computer Ethics.
COMPUTER ETHICS & COMPUTER HACKING
Introduction to Computer Ethics
Presentation transcript:

Lecture 2: What is Computer Ethics? Special Status of Computer Ethics It is not enough that you should understand about applied science in order that your work may increase man’s blessings. Concern for man himself & his fate must always form the chief interest of all technical endeavors. (Albert Einstein)

What is Computer Ethics? Ethical problems aggravated, transformed or created by computer technology. (Maner) – Old ethical problems made worse by computers – e.g. data security/privacy – others came into existence because of computer technology – e.g. data loss due to malware, online hacking of bank accounts Pose new versions of standards moral problems and moral dilemmas, exacerbating old problems & forcing to apply ordinary moral norms in uncharted realms. (Johnson) How would you compare the above two view points?

What is Computer Ethics? (contd.) Computer ethics concerns with – policy vacuum & conceptual muddle – regarding social & ethical use of computer technology (Moor) Policy vacuum: – how computer technology should be used. – Often existing policies are inadequate for new capabilities/choice of actions – e.g. making Facebook profile picture public without user’s authorization Conceptual muddle: – A complex situation in which it becomes absolutely difficult to figure out right vs. wrong

What is Computer Ethics? (contd.) Computer Ethics identifies & analyzes the impact of I.T on such social & human values – as health, wealth, work, knowledge, opportunity, freedom, democracy, privacy, security etc. (Bynum) Professional ethics – guide the day to day activities of computing professional, whoever involved in design & development of computer artifacts. (Gotterbarn)

Summarized definitions of Computer Ethics Maner’s ethical problems transformed into new ones Johnson’s new version of moral problems Moor’s policy vacuum & conceptual muddle Bynum’s------impact of I.T on social & human values Gotterbarn’s-----guide day to day activities of computing professionals

e.g. rumors e.g. break into bank accounts Copying programs Is program harmful to society? Don’t be rude e.g. hacking

Levels of justification to study Computer Ethics We should study computer ethics because; – will make us behave like responsible professionals. – will teach us how to avoid computer abuse & catastrophes – the advance of computing technology will continue to create temporary policy vacuums Challenge/ refute these levels of justification

Levels of justification to study Computer Ethics (contd.) ……because; – use of computing technology permanently transforms certain ethical issues to the degree that their alternatives require independent study – use of computing technology creates, and will continue to create, novel ethical issues that require special study – set of novel & transformed issues is large enough & coherent enough to define a new field

The special status of Computer Ethics Unique properties of computing technology – Uniquely stored: stores integer in fixed size words, integer range: 32,767 – overflow if larger, corrupting stored value – Uniquely malleable: “logically malleable” - unique characteristic of computing they can be shaped and molded - in terms of inputs, outputs & connecting logical operations Handicap people can input via; – voice commands, head-pointer, mouth stick

The special status of Computer Ethics (contd.) – Uniquely complex Can understand code in its static form vs. unexpected behaviour of the same code when executed no governing laws, principles of science are fully applicable on construction of software as compared to other domains e.g. aeronautical engineering where working of airplanes is clearly understandable due to principles of physics & mathematical functions Special responsibility on software engineer for thorough testing & validation of program behaviour Study article: “No silver bullet” by F.P Brook

The special status of Computer Ethics (contd.) – Uniquely fast: performs computation in a matter of micro seconds vs. manual calculations Role of computers in stock markets – Uniquely cheap: performs millions of computations each second, the cost of an individual calculation approaches to zero If someone steals one rupee from a each of 100,000 bank accounts monthly, s/he would have 1200,000 at the end of year – few such cases in real world have been reported

The special status of Computer Ethics (contd.) – Uniquely cloned Possible to make exact copy of an artifact Software piracy – Uniquely discrete Changes to a single bit can have drastic consequences “In the discrete world of computing there is no meaningful metric in which small change & small effects go hand in hand & there never will be” (Dijkstra)

The special status of Computer Ethics (contd.) – Uniquely coded Computers operate by constructing codes upon codes upon codes cylinder – tracks – sectors – records – fields – characters – bytes – binary digits Danger of data being stored in meaningless jumbles of letters, numbers & computer symbols E.g. in 1989, 200 reels of 17 year old public health service tapes were destroyed because no one could determine what names & numbers meant on them The main reason is due to rapid rate of obsolescence for I/O devices, evolution of media formats etc.

Summarized unique properties Uniquely stored – fixed size words in memory Uniquely malleable – logically malleable Uniquely complex – code in static vs. when executed Uniquely fast – computation in microseconds Uniquely cheap – cost of computation=zero Uniquely cloned – bit by bit identical copy of original Uniquely discrete – small change –larger effects Uniquely coded – layered approach Give an example for each property

Concluding the special status of computer ethics Locomotive revolutionized transport industry – but no such thing as locomotive ethics Telephone changed the way humans communicate – But no such thing as telephone ethics Tractor transformed the agriculture – But no such thing as tractor ethics Why, therefore, should be any such thing as Computer Ethics?

references Text book; – PART 1: What is computer Ethics? – Chapter 2: Unique Ethical problems in I.T – Recommended studies; No silver bullet by F.P Brooks,---(in order to understand the unique inherent characteristics of software)