Ethics in a Computing Culture

Slides:



Advertisements
Similar presentations
A Gift of Fire, 2edChapter 4: Can We Trust the Computer?1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers.
Advertisements

CSC 300, Winter Assignments Week 5 Work on your paper / presentation topic –papers are due 20 February (Tuesday) for both sections! Reading: Baase.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Implications and Security Issues of the Internet By Neelesh Patel.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Can We Trust the Computer?
Principles of Financial Accounting, 11e
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
©Ian Sommerville 2000CS 365 Ariane 5 launcher failureSlide 1 The Ariane 5 Launcher Failure June 4th 1996 Total failure of the Ariane 5 launcher on its.
Professional Ethics and Responsibilities
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 9: Professional Ethics and Responsibilities.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Chapter 7 Cash Accounting, 21st Edition Warren Reeve Fess
A Gift of Fire Third edition Sara Baase
Computer and Ethics. Ethical Problems Proliferation of computers and their networks have created new ethical problems The ACM has issued a Code of Ethics.
Software Quality Assurance
Trust, Safety and Reliability
Trust, Safety, & Reliability Part 2 MALICE. Malware Malware: short for “malicious software” Hackers: people who write and deploy malware Worm: program.
Money on demand! The Checking Account
Ethical and Social...J.M.Kizza 1 Module 8: Software Issues: Risks and Liabilities Definitions Causes of Software Failures Risks Consumer Protection Improving.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
B. Ross Cosc 4f79 1 Ethical and Legal issues From: Building Expert Systems: Principles, Procedures and Applications, E.M. Awad, West Pub. Co., 1996, ISBN.
Checking Accounts. What is a Checking Account? 1.A checking account is a sum of money that you deposit in a bank or other financial institution, to hold.
© Janice Regan, CMPT 128, Jan CMPT 128 Introduction to Computing Science for Engineering Students Creating a program.
Software Quality Assurance Lecture #8 By: Faraz Ahmed.
Copyright (c) 2003 CPTTM 1 Common fears of a software development manager Common fears of a software development manager: –Deadline.
Transaction Processing System
The Simple Side of Computer Security for The Brownies That Like To Read!!
Viruses & Destructive Programs
1 Can We Trust the Computer? What Can Go Wrong? Case Study: The Therac-25 Increasing Reliability and Safety Perspectives on Failures, Dependence, Risk,
Liability for Computer Errors Not covered in textbook.
Lecture 30 Chapter 07 Cash Task Force Image Gallery clip art included in this electronic presentation is used with the permission of NVTech Inc.
INVARIANTS EEN 417 Fall When is a Design of a System “Correct”? A design is correct when it meets its specification (requirements) in its operating.
Checking data Chapter 7 Prepared by:Sir Mazhar Javed.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
CS 4001Mary Jean Harrold 1 Can We Trust the Computer?
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
Trust, Safety & Reliability INTRODUCTION TO COMPUTER ERRORS TEXTBOOK: BRINKMAN’S ETHICS IN A COMPUTING CULTURE READING: CHAPTER 5, PAGES ,
0 Glencoe Accounting Unit 2 Chapter 11 Copyright © by The McGraw-Hill Companies, Inc. All rights reserved. Protecting Cash In any business, cash is used.
Tutorial 1: Date: 19/09/2012 Instructor: Hanif Ullah
1 CS 501 Spring 2002 CS 501: Software Engineering Lecture 24 Delivering the System.
CHAPTER 16 Introduction to Financial Management for Business.
©Ian Sommerville 2004Software Engineering Case Studies Slide 1 The Internet Worm Compromising the availability and reliability of systems through security.
Financial Accounting Fundamentals
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Topic 5: Basic Security.
Chapter 11 Working with Credit Card Methods of Processing Credit Cards Preparing for Cyber Cash Authoring a Credit card Transaction.
Internet Safety Internet Safety LPM
1 IAF0620, 5.0 AP, Exam Jaan Raik ICT-524, , Digital systems verification.
Catholic University College of Ghana Fiapre-Sunyani INFORMATION TECHNOLOGY I Audrey Asante, Faculty of ICST Data Protection and Security Computers and.
Computer Organization Instruction Set Architecture (ISA) Instruction Set Architecture (ISA), or simply Architecture, of a computer is the.
Understand Malware LESSON Security Fundamentals.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
©2001 Southern Illinois University, Edwardsville All rights reserved. Today Finish Ethics Next Week Research Topics in HCI CS 321 Human-Computer Interaction.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Topic: Reliability and Integrity. Reliability refers to the operation of hardware, the design of software, the accuracy of data or the correspondence.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Information Systems Design and Development Security Risks Computing Science.
By: Jeremy Henry and Wen Yang Chew.  Professional Ethics ◦ What is it? ◦ How it differs from general ethics.  Ethical Guidelines for Computer Professionals.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
1 Chapter 1- Introduction How Bugs affect our lives What is a Bug? What software testers do?
1 Advanced Computer Programming Project Management: Basics Copyright © Texas Education Agency, 2013.
Can We Trust the Computer? FIRE, Chapter 4. What Can Go Wrong? What are the risks and reasons for computer failures? How much risk must or should we accept?
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
PowerPoint® Slides to Accompany
Faculty of Science IT Department By Raz Dara MA.
Presentation transcript:

Ethics in a Computing Culture Chapter 5 Trust, Safety, and Reliability

Objectives Why does software fail? What are the consequences of software failure? How can we help prevent software failures from occurring in the future? Ethics in a Computing Culture

Causes of Computer Failure A computer might fail to meet expectations by: Hardware errors (malfunction) Software errors (bugs) Being programmed to solve the wrong problem (programmers fail to deliver client expectations) Misuse (a computer is provided erroneous data) Communication failure (human misunderstands a computer prompt) Malice (hackers) Ethics in a Computing Culture

Causes of Computer Failure (continued) Suppose a word processor marks a sentence as a fragment, but the sentence is grammatically correct. What type of error is this likely to be? Suppose an ATM gives someone less cash than was charged to his or her account. What type of error is this likely to be? Ethics in a Computing Culture

Case: Ariane 5 Flight 501 Suppose we knew the identity of the people who made the decision to omit the code necessary to handle the arithmetic overflow error, which caused the rockets during the Ariane 5 flight to self-destruct. Would you hold those people responsible for the accident? Suppose lives had been lost due to the Ariane 5 disaster. Should anyone be considered guilty of criminal negligence? Ethics in a Computing Culture

Case: Pentium Floating Point Divide Did Intel have a moral obligation to replace the defective Pentium 5 chips, even for those users who had no need for high precision? When employees of Intel first discovered the bug, did they have an ethical responsibility to make the problem public? Ethics in a Computing Culture

Case: Pentium Floating Point Divide (continued) Suppose a bank was relying on computers that had the Intel Pentium 5 chip to perform extensive computations relating to investments. Suppose further that the error in the chip caused the bank to lose a significant amount of money. Does Intel have a moral obligation to compensate the bank for its loss? This is not a question of Intel’s legal liability. Ethics in a Computing Culture

Case: Why Software Fails The consequences of the faulty program in the chemist conference scenario were not especially costly, but caused a few participants (approx. 300 of a supposed 6,000 chemists) to be inconvenienced. Is this number sufficient enough for either the conference organizers or the programmer to have any ethical responsibility? Assuming the conference organizers had a limited budget, was the organizers’ decision to hire a student to do the programming a moral one? Ethics in a Computing Culture

Bugs and Public Safety Safety-critical software: software that may affect someone’s safety if it fails to work properly Decision point: a place in computer code where the next instruction executed depends on input data Control programs: programs that control some sort of machinery Ethics in a Computing Culture

Bugs and Public Safety (continued) Real time: a program must do something within a specific amount of time Multiprocess: programs that execute at the same time as one or more other programs Ethics in a Computing Culture

Bugs and Public Safety (continued) Many executives of software production companies, as well as several famous computer scientists, have asserted that the most important skill needed by a software developer is the ability to communicate. Would more extensive testing of the software have prevented the Ariane flight failure? Ethics in a Computing Culture

Bugs and Public Safety (continued) Brooks’s Law: “Adding people to a late project makes it later.” Adding new people adds new lines of communication, which increase the chances of miscommunication or missed communication Ethics in a Computing Culture

Case: Therac-25 Therac-25: machine designed for cancer treatments radiation overdose occurred at the Kennestone Oncology Center in Marietta, Georgia in 1985 Less than 2 months later, a woman received a severe radiation burn to her hip from a Therac-25 machine Douglas Birsch: applied ethicist who argues that both the programmer who designed Therac’s software and the company’s quality assurance officer bear significant moral responsibility for the accidents Ask students if they agree with Birsch’s assessment. Ethics in a Computing Culture

Case: A&P’s Cash Register Scandal The A&P cash register scandal: only possible because people trusted a computer to do arithmetic correctly Is it morally permissible to accept a computer’s calculations without actually checking it? Ethics in a Computing Culture

Case: A&P’s Cash Register Scandal (continued) Suppose you had a long grocery bill. You add up the prices of the individual items by hand, and your answer is considerably more than the total on the bill you paid. Adding them again, you get the same answer. Would you assume that you added incorrectly, or that the computer did? Ethics in a Computing Culture

Malware Malware: short for “malicious software” Hackers: people who write and deploy malware Worm: program that makes copies of itself and propagates those copies through a network to infect other computers Virus: similar to a worm, but resides in another program program that must execute in order for the virus to propagate Ethics in a Computing Culture

Malware (continued) Spyware: program that is secretly installed for the purpose of collecting information about the computer’s user or users Trojan horse: software that masquerades as an innocent or useful program, but that is actually designed for a malicious purpose Rootkit: program that embeds itself into a computer’s operating system and acquires special privileges that would normally be available to the operating system Ethics in a Computing Culture

Case: Stuxnet Worm Stuxnet: a computer worm that has significantly set back the Iranian nuclear development program extremely sophisticated software, speculated to have been created by the CIA and the Israeli governmant Can the people who wrote the Stuxnet worm be considered ethical hackers? Ethics in a Computing Culture

Nuclear Shutdown System Darlington Nuclear Generating Station: the first Canadian nuclear station to use computers to run the emergency shutdown systems for its reactors written by nuclear engineers who knew how to program, that is, written by experts in the domain of the application for which the program was intended Ask students if it is better to have experts on a particular technology write safety-critical programs or to have software engineers write them? Why? Ethics in a Computing Culture