Ethics in a Computing Culture

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Cyber Safety Assessment Review
Chapter 15: Making Decisions about Computers, Information, and Society Invitation to Computer Science, Java Version, Third Edition.
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
Organizing Your Argument The Argumentative Essay.
Legal and Ethical Issues. Overview Issues of responsibility for libel, obscenity and indecency Aspects of copyright Issues involved in user agreement.
Cyberbullying Donna Kozica, LCSW Social Work Department Chairperson.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
DNA Databases Ethical Issues and Legal Implications.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Privacy Fundamentals Ethics in a Computing Culture Ch. 3, pp
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
By Corinne Vassallo, Melody Lu, Natalie Severson, Michael Ghormley, Stephanie Mao.
WRITING WITH A PURPOSE ICS 139w 08/10/2011. The Goal of Writing What are some possible reasons for writing? What are some goals of writing a (formal)
Getting Started: Research and Literature Reviews An Introduction.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
INTERNET SAFETY FOR STUDENTS
The University of Kansas Medical Center Shadow Experience Training.
How Well Do You Know Copyright? Connie Murphy Hylton High School Library 2008.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
WEEK 3 THE TERM PAPER. WHAT IS A TERM PAPER? An academic essay that is rather lengthy, prepared by an academic writer Written in a concise and well documented.
COMPUTER ETHICS Do you know the difference between right and wrong?
Lindsey Cunningham Education and Technology. What is Digital Citizenship? Digital Citizenship is the principle of teaching appropriate and responsible.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
6 Ethics and Privacy.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
CHAPTERCHAPTER 8 Evaluation. Topics Covered in Chapter 8 The Purpose of Evaluation Objectives: A Prerequisite for Evaluation Current Status of Measurement.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
The Case Against eBay Richard Warner. Critics of Trespass  Mark Lemley contends that the courts failed to grasp the real issue.  Lemley insists that.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
As a student in the NCCVT school district, you are privileged to have access to your own individual account on the District network. Your account.
Informational Text Evaluating an Argument Informational Text Connecting to the Literature Introducing the Informational Text Vocabulary Informational Reading.
6 Ethics and Privacy.
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
CHAPTER 5 ETHICS & PRIVACY.
Databases vs the Internet. QUESTION: What is the main difference between using library databases and search engines? ANSWER: Databases are NOT the Internet.
What’s the Big Deal About Internet Privacy?. Today’s Objective I can explain to Mr. Bates why companies collect information about visitors on their websites.
CONTENT AGGREGATION PRACTICES: RIGHT FROM WRONG? PRESENTATION BY: MICHELE MOREHOUSE.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Mass Media Law 18 th Edition Don Pember Clay Calvert Chapter 8 Invasion of Privacy: Publication of Private Information and False Light McGraw-Hill/Irwin.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 15 Creating Collaborative Partnerships.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 13 Privacy as a Value.
Privacy, data protection and connected cars Lilian Edwards, Professor of Internet Law University of Strathclyde Researcher in Residence, Digital Catapult.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
Fourth Amendment Search and Seizure Civil Liberties.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
Technological Awareness for Teens and Young Adults.
Task Two – Suggested Structure By Catherine McSherry.
Creating your online identity
STATES AREN’T DUNN DISAGREEING ON THE FOURTH AMENDMENT
UNIT 4 – THE COST OF FREE LESSON 4.
UNIT 4 – THE COST OF FREE LESSON 6.
The Issues with Technology in education
CHAPTER 3 Ethics and Privacy.
IT and Society Week 2: Privacy.
Presentation transcript:

Ethics in a Computing Culture Chapter 3 Privacy

Objectives What is privacy? How is personal privacy interpreted, and how is it protected by law? How is technology adding or removing security? Ethics in a Computing Culture

Case: Security Class When you write email using a school email account, do you consider the exchanged content to be private? Why or why not? Is the situation different with company account instead of a school account? Ethics in a Computing Culture

Case: Michael’s Essay When considering the outcome of Michael’s essay submittal, which of the actions led to a violation of Michael’s privacy? Which of the actions were unethical, but did not violate Michael’s privacy? What if Michael’s personal information had not been included in the paper? What if only his name, but not his grade, was included? Ethics in a Computing Culture

Case: Michael’s Essay (cont.) Is it unethical for professors to use Plagiarism Preventer without student consent? Is it unethical for Plagiarism Preventer to give the full text of students’ works to third parties? Ethics in a Computing Culture

Theories and Conceptions of Privacy “right to be let alone”: a conception of privacy that focuses on the grievance felt by the harmed party and on actions that directly make them feel harassed, embarrassed, or exposed Ask students if a bystander videotapes a police officer writing a traffic ticket, is the officer’s right to be let alone violated? Ethics in a Computing Culture

Privacy as Concealment Judge Posner argues there is no fundamental right to privacy and that people are interested in privacy only to conceal their own wrongdoing or prevent embarrassment How would restricting information until others understand the context benefit someone in Michael’s situation? Does Posner’s opinion fall in line with the application of delaying access to private information like Michael’s paper? Ethics in a Computing Culture

Solove’s Taxonomy of Privacy Problems top-down: starting with a single clear definition, and then discovering that not all privacy problems are covered by the definition bottom-up: starting with a list of the common kinds of privacy problems and building a definition up How are top-down and bottom-up applied in Solove’s taxonomy of privacy? Ethics in a Computing Culture

Solove’s Taxonomy of Privacy Problems (continued) Ethics in a Computing Culture

Solove’s Taxonomy of Privacy Problems (continued) Ethics in a Computing Culture

Solove’s Taxonomy of Privacy Problems (continued) PleaseRobMe: a Web site that allowed users to find houses where the owners were away from home Aggregated social networking status updates (such as Twitter, Foursquare, Flickr, and Facebook) and home address information The information PleaseRobMe gathered was already freely available on the Internet Ask students to debate whether a Web site like PleaseRobMe is morally wrong or in the right. Ethics in a Computing Culture

Privacy in Practice and in the Law Some experts argue against the idea of “a reasonable expectation of privacy” Claim it introduces subjectivity into decisions Private depends on context ― did a person think he or she had privacy at the time? Is this dependence on context a strength or a weakness when used to interpret the Fourth Amendment? Ethics in a Computing Culture

Multicultural Perspectives Libel: publishing or broadcasting false statements about another person, usually with the intent of harming the other person’s reputation Most legal systems recognize libel as a crime Imagine that a writer from Country A posts an article on a server residing in Country B, about someone who resides in Country C. The article is readable only by people in Country D (readers from other countries trying to access the article receive an error message). If countries A, B, C, and D have very different libel laws, which country’s laws ought to apply, and why? Ethics in a Computing Culture

Interdisciplinary Topic: Panopticism Michel Foucault: Essay “Panopticism,” (1979) explores the influence of persistent surveillance on society, comparing modern society to the modern prison Bentham’s Panopticon prison design Ethics in a Computing Culture

Interdisciplinary Topic: Panopticism (continued) Besides crime, what are some other beneficial aspects of surveillance in a modern society? Judge Posner argues that before modern times, people had very little privacy because an entire family would live together in a single room. Is this situation of constant observation by other family members an example of panoptic structure? Ethics in a Computing Culture

Interdisciplinary Topic: Panopticism (continued) In what ways can social networking be liberating? Name a way the features of social networking can be oppressive. Ultimately, are social networking services likely to be liberating or oppressive to a society? Ethics in a Computing Culture

Case: Camera Phone Predator Alert Act Does it make sense that this bill singles out camera phones, instead of addressing all digital cameras and video-recording devices? Would the enacted law make it illegal to own a camera phone that takes pictures silently? Ethics in a Computing Culture

Case: The Texas Infant DNA Database Imagine you were a state health official who would make a decision about whether or not to pass on DNA sequences to the US military. Explain why you would or would not support the action. Would your opinion change if the group responsible for compiling the database was a for-profit organization instead of the US military? Would it be better or worse? Would you be more comfortable if the DNA were not released to the US military until 18 years after it was collected? Ethics in a Computing Culture

Case: Lower Merion School District Use an act utilitarian argument to evaluate whether or not the LMSD should have installed the remote Theft Track software on student laptops. Compare the costs of the lawsuit to the costs of laptop thefts, and consider the probability of being sued versus the probability of a laptop being stolen. Ethics in a Computing Culture