Lecture 06 Cyberethics By Dr. Saqib Iqbal.

Slides:



Advertisements
Similar presentations
Business Ethics for Real Estate: A. Glean
Advertisements

Ethics, Values & Issues in Cybertechnology >>> CS222.01
Chapter 15: Making Decisions about Computers, Information, and Society Invitation to Computer Science, Java Version, Third Edition.
Ethics for the Information Age
Moral Reasoning Making appropriate use of facts and opinions to decide the right thing to do Quotations from Jacob Needleman’s The American Soul A Crucial.
Chapter 6 Ethical Principles Applied to Sport Management.
IS 376 Ethics and Convergence
Concepts, methodologies and Codes of Cyberethics
Social Responsibility and Ethics in Strategic Management
Philosophy 223 Relativism and Egoism. Remember This Slide? Ethical reflection on the dictates of morality can address these sorts of issues in at least.
Social Research Methods
What Is Cyberethics? Cyberethics is the study of moral, legal, and social issues involving cybertechnology. It examines the impact that cybertechnology.
CyberEthics Essay Outline
A Gift of Fire, 2edChapter 10: Professional Ethics and Responsibilities1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues.
Ethical Issues.
The Corporation and Its Stakeholders
Introduction to Computer Ethics
Fall 2014 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering What is Computer Ethics? Fall 2014 Marco Valtorta.
Department of Information System Faculty of Computing & Information Technology King Abdul Aziz University, Jeddah, KSA.
 To provide an overview of teaching and learning related to ethical dilemmas in preparation for AS3.4.
CSC385 Professional and Ethical Issues in Computer Science
Basic Principles: Ethics and Business
Experiences in Undergraduate Studies in the University of Zaragoza LEFIS Undergraduate studies Oslo, 19 th -20 th May 2006.
Introduction to Computer Science
By: 1. Kenneth A. Kim John R. Nofsinger And 2. A. C. Fernando.
“A man without ethics is a wild beast loosed upon this world.”
CSC385 Professional and Ethical Issues in Computer Science
Ethics CS4310 Fall 2012 Updated 2/09. What is a Profession?
Business Ethics Mrs. Ransey Business Essentials. Standards and Essential Questions Standards BCS-BE-11: The student compares and contrasts common ethical.
Chapter 4 Business Ethics and Social Responsibility.
Professional Ethics in Software Engineering Curricula Gordana DODIG-CRNKOVIC Ivica CRNKOVIC Department of Computer Science and Electronics, Mälardalen.
Ethical Principles Applied to Sport Management Chapter 6
Philosophy 2803 – Health Ethics Andrew Latus. Introduction Ethics Study of right and wrong/good and bad A Branch of Philosophy Central Question = “How.
Virtual Canada 2.0. » Knowledge is not just information » Knowledge is not philosophy (but it can be approached through philosophical inquiry) » There.
Philosophy 224 Responding to the Challenge. Taylor, “The Concept of a Person” Taylor begins by noting something that is going to become thematic for us.
Chapter 1 Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics Introduction Cybertechnology, Ethical Concepts,
1 THE DESIGN OF INTELLECTUAL MOVEMENTS Stuart Umpleby The George Washington University Washington, DC.
Readings in Cyberethics Notes from book by Spinello.
Ethical Awareness Professional Ethics Unit 7. Professional ethics carries additional moral responsibilities. It could mean professional individuals possess.
Reason, Relativity, and Responsibility in Computer Ethics
Introduction to Political Philosophy What is politics, what is philosophy, what is political philosophy and intro to the state of nature.
CIS 200 Professional and ethical issues in computing Edited by Rawan T
Professional Ethics and Responsibilities
Computer Ethics 4 4 Chapter.  Ethics Pertaining to right or wrong in conduct  Ethical In accordance with the rules or standards for right conduct or.
First week. Catalog Description This course explores basic cultural, social, legal, and ethical issues inherent in the discipline of computing. Students.
Statistical Fundamentals: Using Microsoft Excel for Univariate and Bivariate Analysis Alfred P. Rovai Data Ethics PowerPoint Prepared by Alfred P. Rovai.
Mrs. Ransey Business Essentials
CIS What Is Cyberethics? Cyberethics is the study of moral, legal, and social issues involving cybertechnology. As a field of applied ethics, it:
Basic Principles: Ethics and Business
NEED WHY DO Computer Scientists NEED A CODE OF ETHICS? What counts as EVIDENCE Warrant Backing Grounds Depends on your “REASON(S)” Computer Scientists.
Inquiry Primer Version 1.0 Part 4: Scientific Inquiry.
Business Ethics Concepts & Cases 商业伦理 国贸学院 张小俊
BUS 660 Entire Course (2 Sets) FOR MORE CLASSES VISIT This Tutorial contains 2 Sets of Papers for each Assignment (Check Details Below)
Ethics CS4310 Fall 2011 Updated 2/09. What is a Profession?
Philosophy, Logic and Human Existence ETHICS AND HUMAN CONDUCT IN THE SOCIETY.
PHILOSOPHY AS A SECOND ORDER DISCIPLINE
1 Ethics of Computing MONT 113G, Spring 2012 Session 17 Sociotechnical Perspective Ethical reasoning.
AN INTRODUCTION Ethics + Ethical Reasoning & Social Justice.
Lecture 5 Cyberethics. What Is Cyberethics? Cyberethics is the study of moral, legal, and social issues involving cybertechnology. It examines the impact.
PHILOSOPHY AS A SECOND ORDER DISCIPLINE
PowerPoint® Slides to Accompany
Introduction to Moral Theory
Lecture 10: Planning and Formulating IS Strategy
Introduction to Computer Ethics
chapter 3: Ethics, Technology and Values
Social Research Methods
Chapter 5 Ethical Decision Making
Introduction to Computer Ethics
Introduction to Computer Ethics
Presentation transcript:

Lecture 06 Cyberethics By Dr. Saqib Iqbal

Uniqueness Issue (Continued) Traditionalists and uniqueness proponents are each partly correct. Traditionalists correctly point out that no new ethical issues have been introduced by computers. Uniqueness proponents are correct in that cybertechnology has complicated our analysis of traditional ethical issues.

Uniqueness Issue (Continued) So we must distinguish between: (a) unique technological features, and (b) any (alleged) unique ethical issues. Two scenarios from the text: (a) Computer professionals designing and coding a controversial computer system (b) Software piracy

Case Illustration of a Policy Vacuum: Duplicating Software In the early 1980s, there were no clear laws regarding the duplication of software programs, which was made easy because of personal computers. A policy vacuum arose. Before the policy vacuum could be filled, we had to clear up a conceptual muddle: What exactly is software?

Cyberethics as a Branch of Applied Ethics Applied ethics, unlike theoretical ethics, examines "practical" ethical issues. It analyzes moral issues from the vantage-point of one or more ethical theories. Ethicists working in fields of applied ethics are more interested in applying ethical theories to the analysis of specific moral problems than in debating the ethical theories themselves.

Cyberethics as a Branch of Applied Ethics (continued) Three distinct perspectives of applied ethics (as applied to cyberethics): Professional Ethics Philosophical Ethics Descriptive Ethics

Perspective # 1: Professional Ethics According to this view, cyberethics is the field that identifies and analyzes issues of ethical responsibility for computer professionals. Consider a computer professional's role in designing, developing, and maintaining computer hardware and software systems. Suppose a programmer discovers that a software product she has been working on is about to be released for sale to the public, even though it is unreliable because it contains "buggy" software. Should she "blow the whistle?"

Professional Ethics Don Gotterbarn (1991) argued that all genuine computer ethics issues are professional ethics issues. Computer ethics, for Gotterbarn is like medical ethics and legal ethics, which are tied to issues involving specific professions. He notes that computer ethics issues aren’t about technology – e.g., we don’t have automobile ethics, airplane ethics, etc.

Criticism of Professional Ethics Perspective Gotterbarn’s model for computer ethics seems too narrow for cyberethics. Cyberethics issues affect not only computer professionals; they effect everyone. Before the widespread use of the Internet, Gotterbarn’s professional-ethics model may have been adequate.

Perspective # 2: Philosophical Ethics From this perspective, cyberethics is a field of philosophical analysis and inquiry that goes beyond professional ethics (Gotterbarn). Moor (1985), defines computer ethics as: ...the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology. [Italics Added.]

Philosophical Ethics Perspective (continued) Moor argues that automobile and airplane technologies did not affect our social policies and norms in the same kinds of fundamental ways that computer technology has. Automobile and airplane technologies have revolutionized transportation, resulting in our ability to travel faster and farther than was possible in previous eras. But they did not have the same impact on our legal and moral systems as cybertechnology.

Philosophical Ethics: Standard Model of Applied Ethics Philip Brey (2000) describes the “standard methodology” used by philosophers in applied ethics research as having three stages: 1) Identify a particular controversial practice as a moral problem. 2) Describe and analyze the problem by clarifying concepts and examining the factual data associated with that problem. 3)Apply moral theories and principles to reach a position about the particular moral issue.

Perspective #3: Cyberethics as a Field of Descriptive Ethics The professional and philosophical perspectives both illustrate normative inquiries into applied ethics issues. Normative inquiries or studies are contrasted with descriptive studies. Descriptive investigations report about "what is the case“; normative inquiries evaluate situations from the vantage-point of the question: "what ought to be the case."

Descriptive Ethics Perspective (continued) Scenario: A community’s workforce and the introduction of a new technology. Suppose a new technology displaces 8,000 workers in a community. If we analyze the issues solely in terms of the number of jobs that were gained or lost in that community, our investigation is essentially descriptive in nature. We are simply describing an impact that technology X has for Community Y.

Descriptive Ethics Perspective (continued) Descriptive vs. Normative Claims Consider three assertions: (1) "Bill Gates served as the Chief Executive Officer of Microsoft Corporation for many years.” (2) "Bill Gates should expand Microsoft’s product offerings.“ (3) “Bill Gates should not engage in business practices that are unfair to competitors.” Claims (2) And (3) are normative, (1) is descriptive; (2) is normative but nonmoral, while (3) is both normative and moral.

Figure 1-1: Descriptive vs. Normative Claims Descriptive Normative (Report or describe what is the case) (Prescribe what ought to be the case) Non-moral Moral Prescribe or evaluate in matters having to do with fairness and Obligation (e.g., criteria for just and unjust actions and policies). Prescribe or evaluate in matters involving standards such as art and sports   (e.g., criteria for a good painting or an outstanding athlete).

Some Benefits of Using the Descriptive Approach Huff & Finholt (1994) claim that when we understand the descriptive aspect of social effects of technology, the normative ethical issues become clearer. The descriptive perspective prepare us for our subsequent analysis of ethical issues that affect our system of policies and laws.

Table 1-2: Summary of Cyberethics Perspectives Type of Perspective Associated Disciplines Issues Examined Professional Computer Science Engineering Library/Information Science Professional Responsibility System Reliability/Safety Codes of Conduct Philosophical Philosophy Law Privacy & Anonymity Intellectual Property Free Speech Descriptive Sociology Behavioral Sciences Impact of cybertechnology on governmental/financial/ educational institutions and socio-demographic groups

Is Cyber-technology Neutral? Technology seems neutral, at least initially. Consider the cliché: “Guns don’t kill people, people kill people.” Corlann Gee Bush (19997) argues that gun technology, like all technologies, is biased in certain directions. She points out that certain features inherent in gun technology itself cause guns to be biased in a direction towards violence.

A "Disclosive" Method for Cyberethics Brey (2001) believes that because of embedded biases in cybertechnology, the standard applied-ethics methodology is not adequate for identifying cyberethics issues. We might fail to notice certain features embedded in the design of cybertechnology. Using the standard model, we might also fail to recognize that certain practices involving cybertechnology can have moral implications.

Disclosive Method (Continued) Brey notes that one weakness of the “standard method of applied ethics” is that it tends to focus on known moral controversies So that model fails to identify those practices involving cybertechnology which have moral implications but that are not yet known. Brey refers to these practices as having morally opaque (or morally non-transparent) features, which he contrasts with "morally transparent” features.

Figure 1-2 Embedded Technological Features Having Moral Implications Transparent Features Morally Opaque Features Known Features Unknown Features Users are aware of these features but do not realize they have moral implications. Examples can include:Web Forms and search- engine tools. Users are not even aware of the technological features that have moral implications   Examples can include:Data mining and Internet cookies.

A Multi-Disciplinary & Multi-Level Method for Cyberethics Brey’s “disclosive method” is multidisciplinary because it requires the collaboration of computer scientists, philosophers, and social scientists. It also is multi-level because the method for conducting computer ethics research requires the following three levels of analysis: disclosure level theoretical level application level.

Table 1-3: Three Levels in Brey’s “Disclosive Model” Level Disciplines Involved Task/Function Disclosive Computer Science Social Science (optional) Disclose embedded features in computer technology that have moral import Theoretical Philosophy Test newly disclosed features against standard ethical theories Application Social Science Apply standard or newly revised/ formulated ethical theories to the issues

Three-step Strategy for Approaching Cyberethics Issues Step 1. Identify a practice involving cyber-technology, or a feature in that technology, that is controversial from a moral perspective. 1a. Disclose any hidden (or opaque) features or issues that have moral implications 1b. If the issue is descriptive, assess the sociological implications for relevant social institutions and socio-demographic and populations. 1c. If there are no ethical/normative issues, then stop. 1d. If the ethical issue is professional in nature, assess it in terms of existing codes of conduct/ethics for relevant professional associations (see Chapter 4). 1e. If one or more ethical issues remain, then go to Step 2. Step 2. Analyze the ethical issue by clarifying concepts and situating it in a context. 2a. If a policy vacuums exists, go to Step 2b; otherwise go to Step 3. 2b. Clear up any conceptual muddles involving the policy vacuum and go to Step 3. Step 3. Deliberate on the ethical issue. The deliberation process requires two stages: 3a. Apply one or more ethical theories (see Chapter 2) to the analysis of the moral issue, and then go to step 3b. 3b. Justify the position you reached by evaluating it against the rules for logic/critical thinking (see Chapter 3).