CDS 130 - 003 Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©

Slides:



Advertisements
Similar presentations
Chapter 1: The Context of SA&D Methods
Advertisements

An Introduction of Multimedia Etiquette Nicole Huang.
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Cyber Ethics for Teacher Candidates Teresa Chen Department of Advanced Studies in Education and Counseling California State University, Long Beach.
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
 What are systems analysis and design?  Where do systems analysts work?  What modern business and technology trends are affecting information systems.
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Issues in Implementing Technology in Schools
Computer ethics.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Computer Ethics for Computer Users
Copyright © 2014 Pearson Education, Inc. 1 Managers are facing unique challenges as Digital Technologies permeate the workplace Chapter 1 - Managing in.
Computer Ethics Christina McCorkle.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
© 2001 Business & Information Systems 2/e1 Chapter 3 Information System Fundamentals.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
COMPUTER ETHICS Do you know the difference between right and wrong?
Beth Sanderson University of Washington Libraries, Bothell © Lawrence Snyder 2004 Computer / Information / Internet Ethics.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
Computer Crimes Career & Technology Education Department.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
CSC Intro. to Computing Lecture 19: Ethics & Computers.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Computer Ethics CSCI 101 Kara kelly. Ethics Ethics can be defined as a discipline in which one attempts to identify, organize, analyze, and justify human.
Ethics Business Law Sunny Hills High School Mrs. Larsen.
ICS131 – Ethics 11/17/03. IEEE-CS and ACM 1.PUBLIC - Software engineers shall act consistently with the public.
1 Chapter 11. Using Information Ethically Managing and Using Information Systems: A Strategic Approach by Keri Pearlson PowerPoint Slides prepared by Gene.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
Netiquette INFORMATION TECHNOLOGY AND ACQUIRING INFORMATION (JÄRVELÄ, RITVA-LIISA)
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
The History of Computers Hardware, Software, Programs, Computers Safety Tips, and Computer Ethics.
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
 byte  short  int  long  float  double  boolean  char.
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Computer Ethics IT Fundamentals Battlefield High School.
Chapter 16 – Careers in Information Technology
Internet Etiquette or Netiquette
Note addresses of authors: Floridi – Faculty of Philosophy
The Legal System and Ethics in Information Security
Internet Etiquette or Netiquette
Unit 3- Introduction to Computer Ethics
Ethics & Privacy CSCI 101.
Presentation transcript:

CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©

Where We Are? 1.Introduction 2.Computer Fundamentals 3.Measurements 4.Scientific Simulation –Project 1 5.Visualization 6.Data Analysis 7.Ethics 8.Communication 9.Project 2 due and in-class presentation (Dec. 7)

Impact of Computing Technology

Computing Ethics Ethics: also known as moral philosophy, is a branch of philosophy that addresses questions about morality – that is, concepts such as goof and evil, right and wrong, etc Computer Ethics is a branch of philosophy which deals with how computing professionals should make decisions regarding professional and social conduct

Computing Ethics Issues are new, and yet new issues are emerging ~ 60 years of computer ~ 30 years of internet 12 years of Google.com 6 years of Facebook.com 6 months of Ipad It means that there is no standard solution yet.

Impact of Computing Technology

Computing Ethics Computing ethics are different from other professional ethics. Internet is promoting information sharing Internet is global Internet is interactive Internet is anonymous Internet is fast and reproductive.

Ethic Issues 1.Storage of personal information, e.g, in social networking websites such as Facebook 2.Software piracy 3.File sharing: share music, movies using programs such as Napster, Kazaa, BitTorrent 4.Monitoring of employee 5.Computer security: virus, worms, Trojan horses, cookies.

Case Study Similar Programs from Two Students In a computer class, students are asked to do an independent project involving a sizable programming in JAVA. The teacher noticed remarkable similarity among the programs turned in by student A and B. The algorithms are identical. The orderings of the lines of the source code are identical. There are only a few changes on the names of the variables. The teacher determined that one of the students must have copied the code from the other student. Question: (1) What is wrong? Why? (2) How should the teacher respond to the issue? Why? (3) When the teacher informed the two students about the “copying”, how should the students respond to it? Why?

Case Study Copying music/movie from internet There are websites providing free music and movies. Many people download them and share with friends, especially among young people Question: (1) What is wrong with the web host? Why? And why do they do this? (2) What is wrong with the users? Why? (3) What penalty should be given? By who? (4) Legal issue versus ethical issue?

The Ten Commandments For Computer Ethics 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not use or copy software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you write. 10. Thou shalt use a computer in ways that show consideration and respect. By the Computer Ethics Institute

The End