Promoting Ethics to Computer Science Students: a “HOW TO” Guide Zenia C. Bahorski Ph.D. MACUL Conference Detroit, MI March 17, 2011 CC BY-NC-SA.

Slides:



Advertisements
Similar presentations
Technology. Technology – vocabulary Look at the machine and write down what it does What it doesName of Machine Heats your house10. Boiler Lets you make.
Advertisements

Telecommunications & Networking
Communication Transferring information from one person to another. Communication is used to instruct, clarify interpret, notify, warn, receive feedback,
Transmitting & Receiving Contents  Hardware for Transmitting & Receiving:By Ryan Caulfield  Software for Transmitting & Receiving: By Todd John  Non-Computer.
Syllabus Case Histories WW III Almost Medical Killing Machine
M. Guymon Pleasant Grove High School Spring 2003 Ethics & Computer Technology Day 18.
Computer Technology Day 18
Ethical and Social Issues in Information Systems
Software Engineering Disasters
Ethics in a Computing Culture
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Professional Ethics and Responsibilities
Business Plug-In B7 Ethics.
4.1 © 2007 by Prentice Hall 4 Chapter Ethical and Social Issues in Information Systems.
1 CMSC 132: Object-Oriented Programming II Software Development I Department of Computer Science University of Maryland, College Park.
A Gift of Fire Third edition Sara Baase
Understanding and Building Basic Networks Chapter 3 The Other Internet.
Chapter 1: Introduction To Computer | SCP1103 Programming Technique C | Jumail, FSKSM, UTM, 2005 | Last Updated: July 2005 Slide 1 Introduction To Computers.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
E Marketing E Newsletter and E-Surveys Are They For You???
Termination Process Team 1: Anuj Kumar Agrawal Mohaammed Al-baqmi
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Moon Messages The Liquids. To communicate we use radio waves headsets to interact As radiowaves can travel through a vaccume HOW DO WE COMMUNICATE?
ICT at Work Global Communication.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
1 Introduction to Security Chapter 11 Information Technology (IT) Security.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Ethics & Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.
Unit 3 Computers The development of computers I am very old now. I was born in China. Many people used me for calculating in the past, but now I am.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IT Introduction to Information Technology. The Internet & World Wide Web Began in 1969 with the ARPANET (Advanced Research Project Agency Network)
Chapter 4 – Slide 1 Effective Communication for Colleges, 10 th ed., by Brantley & Miller, 2005© Technology and Electronic Communication.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved BUSINESS DRIVEN TECHNOLOGY Chapter Eighteen Creating a Wireless Organization.
MATSEC Past Papers May 2010 Paper 1 Paper 2A. What is the difference between each of the following pairs of items? Syntax Error Caused by forgetting certain.
Software Errors. There’s a bug in our code [Probably] The first software bug Harvard Mark II – Electromechanical machine Moth found in relay Found by.
16 October Reminder Types of Testing: Purpose  Functional testing  Usability testing  Conformance testing  Performance testing  Acceptance.
Technology. Technology – vocabulary Look at the machine and write down what it does What it doesName of Machine Heats your house10. Boiler Lets you make.
Lecture 08 – Documentation, debugging.  docstring  A special kind of string (text) used to provide documentation  Appears at the top of a module 
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 9: Professional Ethics and Responsibilities.
Ethics.
©UNT in partnership with TEA1 Telecommunications & Networking Unit Subtitle: Modems.
R. Stewart Fayetteville High School Ethics & Computer Technology Day 18.
Ethical Issues in Computing
Chapter 7 What Can Computers Do For Me?. How important is the material in this chapter to understanding how a computer works? 4.
Legal and Ethical Issues in Computer Security Csilla Farkas
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter 11 Information Systems Management Read this unit prior to the presentation.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
Computer Technology Semester 2 Final Exam Review.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
SOFTWARE FAILURES.
FUNDAMENTALS OF COMPUTER SYSTEMS Lesson 1. Starter What is the difference between hardware and software?
Information Technology Acceptable Use An Overview
Technology in Your Life
Computer Basics Technology’s Impact.
ECE 103 Engineering Programming Chapter 2 SW Disasters
* 07/16/96 CMPE 101 Introduction to Information Technologies Chapter 1: Computers and You Copyright © 2012 Pearson Education, Inc. Publishing as Prentice.
Ethical and Social Issues in Information Systems
Change Management Team
The Top 10 bugs
Ethical and Social Issues in Information Systems
An Introduction to Software Engineering
Technology.
The Internet: Encryption & Public Keys
Software Engineering Disasters
Presentation transcript:

Promoting Ethics to Computer Science Students: a “HOW TO” Guide Zenia C. Bahorski Ph.D. MACUL Conference Detroit, MI March 17, 2011 CC BY-NC-SA

Introduction What would you do? Why is discussing ethics important for our students? Do programmers have a Code of Ethics? Project –Examples & Samples –Brainstorming Ideas

What would you do? Ethics Scenarios… –Scenario #1: You’ve been looking for a job for 6 months. You finally answer an add for a company that writes gaming programs. You are against violent games, especially violence against women in games. You find out that you are to to be put on a team that is writing a game that is very violent. Do you A.take the job? B.take the job until something else comes around? C.not take the job? Something else has to be out there. –“Ethics is knowing the difference between what you have a right to do and what is right to do.” Potter Stewart (brainyquote.com)

What would you do? Scenario #2: You are a programmer and get a job at a company that produces the “Whac-A-Mole” arcade cabinet. You hear that you are about to lose your job. Do you… A.Talk your supervisor into upgrading the chip in the machine and install a virus to make it fail after, say 511 games? B.When the arcade cabinets start to fail, do you raise your rates (from $60 to $150 per chip)? C.Knowing that the arcade cabinet will fail, do you start up your own repair company? D.Do you make Bob's Space Racers lose over $100,000? E.Is your name Marvin Walter Wimberly Jr. of Orlando? 2/11 “Integrity is doing the right thing, even if nobody is watching.” [author unknown] (thinkexist.com) bobsspaceracers.com

Why is discussing ethics important for our students? Teachers/students should know existing laws Teachers/students should advocate social responsibilities and encourage other to do so And… –Because ISTE says so –Because The State of Michigan says so –Because the ACM says so And… Because it is the “right thing to do.”

Do programmers have a Code of Ethics? Association for Computing Machinery – –Contents & Guidelines A.General Moral Imperatives. B.More Specific Professional Responsibilities. C.Organizational Leadership Imperatives. D.Compliance with the Code. E.Acknowledgments.

Do programmers have a Code of Ethics? Major Computer Malfunctions! –Ballistic Missile Early Warning System (Sept. 6, 1960) in Thule, Greenland sent an alert of an impending missile attack to NORAD. The BMEWS radar was actually detecting (pinging) the moon. The amount of time set to detect a missile was too long (the returning echo traveling at the speed of light). They shortened the listening mode of the radar to two seconds eliminating the round-trip effect of the radar to the moon and back. (Logic error/Faulty algorithm) –Patriot Missile (1991) rounding error kills 28; the computer program is unable to judge the time of impact of an incoming missile (Software rounding error).

Do programmers have a Code of Ethics? Major Computer Malfunctions! (cont…) –Ariane Rocket (1996) with 4 research satellites is purposefully exploded after it runs an algorithm to convert a number from 64 bit to 16 bit format (Overflow error). –Mars Climate Orbiter (1998) crashed into Mars when imperial measurements were passed to a module that expected metric units (Passing of wrong data “type” to modules written by other teams) –Y2K (1999) bug was caused with entry of year stored as last 2 digits was store as ‘90’; 1995 was stored as ‘95’; how would they have stored 1900 and 2000? (Cost-cutting) –Multidata Systems International Corporation’s (2000) software for their radiation therapy device allowed erroneous entries which then miscalculate doses, killing 8. (Programs must be Robust!)

Project: Examples & Samples Exploring ACM’s Code of Ethics Investigating Intellectual Property Weighing the Risks The “Balancing Act” of Technology

Project: Examples & Samples Exploring ACM’s Code of Ethics –Have students write a report (APA format) on the general moral imperatives and the more specific professional responsibilities of programmers and how this code would affect them as programmers. Have the students discuss their findings on the day the report is due. –Pick one of the general moral imperatives or one of the more specific professional responsibilities and elaborate on the issue. Have the students find examples in real life where there was a clear breach of the issue.

Project: Examples & Samples Investigating Intellectual Property –Go over Intellectual Property (see slide handout for a sample) –What is intellectual property? Have students bring in examples of a copyrighted work, a patented item, or a trademark –What are the limitations of using others' intellectual property? Have the students define the Principles of Fair Use (using examples from online sources) - (see fair use computer activity)

Project: Examples & Samples Weighing the Risks: –Investigate technological disasters Therac 25 –Have the students determine the fault of The company that wrote the software The company that made the machine The hospital The technicians –Have the students get into groups to determine how were each ‘at fault’.

Project: Examples & Samples The “Balancing Act” of Technology –Pick a technology and define its uses: Modern cell phones Software used in trading of stocks Social networking sites Digital cameras Radio frequency Identification (RFID) –Have the students list: The advantages of the technology The disadvantages of the technology The unintended uses of the technology –Assessment: Have the students explain how/why the advantages outweigh the disadvantages or how/why the disadvantages outweigh the advantages.

Project: Brainstorming Brainstorming Session

Contact Information Zenia C. Bahorski Ph.D. – –Web Address: people.emich.edu/zbahorski –U.S. Mail: Department of Computer Science Eastern Michigan University Ypsilanti, MI –MACUL SigCS Communications Officer Join the MACUL SIG_CS Group! To subscribe to the group, send an message to: