ACM Code of Ethics and Professionalism (Excerpt)  GENERAL MORAL IMPERATIVES Contribute to society and human well-being Avoid harm to others Be honest.

Slides:



Advertisements
Similar presentations
Professional Ethics Social Implications of Computers.
Advertisements

Computer Literacy and ICT Engineers 橋本 義平 Hashimoto Yoshihei (情報工学)
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Vladimir Misic: 10 Professionalism and Ethics Ownership and Protection.
ICT Ethics 2 ICT 139.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Judge Rejects Google’s Deal to Digitize Books Rhea McCaslin CSCE390 – Spring 2011.
COMP 381.  Ownership and property  Rights of ownership: Blackstonian Bundle Exclude anyone from the property Use it as sees fit Receive income from.
Ownership of Computer Software Ethical Questions and Concerns.
Computer Engineering 294 IP R.Smith 5/ Intellectual Property What is it? Why is it important? – What is it designed to do? What are its basic forms?
COMP 381.  Copyright Term author + 70, corporate 95  DRM enabling copying is criminal constrains who can use tracks who is viewing Copyright and DRM.
CptS 401 Adam Carter. Quiz Question 1 According to the book, it is important to legally protect intellectual property for the following reason(s): A.
Computers Are Your Future © 2005 Prentice-Hall, Inc.
Professional Codes of Ethics Professionalism and Codes of Ethics.
Intellectual Property
Ethics Lecture Dr. Christina Howe
What is Ethics? Ethics is concerned with: n The values and guidelines by which we live, and how they are justified n Standards of right and wrong n Identification.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
7/3/08 Created by Mae Thomas Property Rights There can be consequences if you violate others' intellectual property rights. (That is, if you copy something.
What is Intellectual Property ? Patents- protection of technology Trademarks- protection of domain names and product identity Copyrights- protection of.
CS 3043 Social Implications Of Computing © 2010 Keith A. Pray Class 3 Professional Ethics Keith A. Pray Instructor socialimps.keithpray.net.
Computer Ethics for Computer Users
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
2 December Deliverables check list  Documentation: updated Functional spec Design doc User manuals Test plan  Code Commented source and how I.
Copyright and Intellectual Property Issues in the Digital Environment Amy Ginther Project NEThics (sm) Office of Information Technology University of Maryland.
13 Intellectual Property 1 Aaron Schiff ECON Reading: Cabral p , Deak p
… concern the legal ownership and use of intellectual property, such as software, music, movies, data, and information. Links: Video: Too Much Copyright.
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray Class 3 Professional Ethics Keith A. Pray Instructor socialimps.keithpray.net.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
The Freedom of Information Act (FOIA) is a law that gives you the right to access information from the federal government. It is often described as the.
AOF Entrepreneurship Unit 3, Lesson 10 Intellectual Property Protections Copyright © 2009–2012 National Academy Foundation. All rights reserved.
General Moral imperatives
17 April Reverse Engineering Ethics Privacy Introduction.
Maintenance Reverse Engineering Ethics
21 April  Ownership and property  Rights of ownership: Blackstonian Bundle ◦ Exclude anyone from the property ◦ Use it as sees fit ◦ Receive income.
© Dr Adnan Gutub Ethics Dr Adnan Gutub. © Dr Adnan Gutub Outline What are Ethics? Protection of Rights Professional Ethics & Computer Ethics Moral & Ethical.
1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2004 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CD5590.
Ownership of Software Software represents the results of intellectual rather than purely physical efforts and is therefore inherently non- tangible. So.
Ethics.
Ethics. Technology  Technology is not an immutable force – people make decisions about what technologies and products to develop and how to use them.
Professional Ethics & Codes of Conduct Lecture 3.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Ethical Issues in Computing
Legal and Ethical Issues in Computer Security Csilla Farkas
©2001 Southern Illinois University, Edwardsville All rights reserved. Today Finish Ethics Next Week Research Topics in HCI CS 321 Human-Computer Interaction.
Chapter 18 The Legal Aspects of Sport Marketing. Objectives To introduce the key legal concepts and issues that affect the marketing of the sport product.
Intellectual Property Rights TrademarksTrademarks: protects novel marks & designs used in marketing & advertising for an indefinite period as long as in.
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
TECH VOCAB. ETHICS The rules that we use to define behaviors as “right” or “wrong” page 6.
Chapter Four Intellectual Property in Cyberspace.
IT depends on several codes of ethics 1. PUBLIC - IT engineers shall act consistently with the public interest. 2. CLIENT AND EMPLOYER - IT engineers shall.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
Lecture. 1.What are ethics? Why needed? 2.Islamic code of ethics 3.Network etiquette (8 broad rules) 4.Brief overview of ACM code of ethics 5.How to acquire.
Entrepreneurship CHAPTER 8 SECTION 1.  When you develop a new product or service, you create an asset that must be protected.  Intellectual property.
Copyright Quiz How Well Do You Know Copyright?. Copyright Quiz: True or False Only materials with a copyright symbol,©, are protected. If it doesn’t have.
A GUIDE TO COPYRIGHT & PLAGIARISM Key Terms. ATTRIBUTION Identifying the source of a work. For example, a Creative Commons "BY" or attribution license.
Computers Are Your Future
CSCI 392 Review of Computing and Society
CSCI 392: Seminar in Computing and Society
ETHICS INTELLECTUAL PROPERTY
A Gift of Fire Third edition Sara Baase
Professional Codes of Ethics
Intellectual Property Rights
ACM Code of Ethics CSCI 362: Data Structures.
CS-480b Network Security Dick Steflik
Presentation transcript:

ACM Code of Ethics and Professionalism (Excerpt)  GENERAL MORAL IMPERATIVES Contribute to society and human well-being Avoid harm to others Be honest and trustworthy Be fair and take action not to discriminate Honor property rights including copyrights and patent Give proper credit for intellectual property Respect the privacy of others Honor confidentiality  ORGANIZATIONAL LEADERSHIP IMPERATIVES Articulate social responsibilities Enhance the quality of working life Proper and authorized uses of computing and communication resources Ensure that those affected by a system have their needs clearly articulated; validate the system to meet requirements Protect the dignity of users

Intellectual Honesty McConnell, Code Complete  Refusing to pretend you’re an expert when you’re not  Readily admitting your mistakes  Trying to understand a compiler warning rather than suppressing the message  Clearly understanding your program – not compiling it to see if it works  Providing realistic status reports  Providing realistic schedule estimates & holding your ground when mgmt asks you to adjust

Whistle Blowing  What are the alternatives?  When is it okay?  When is it not a choice?

Ethics of a project  fairness to the knowing users  implications for unknowing users

Are all projects worth doing?  Intended misuse  Potential misuse  Unexpected consequences Google glasses

 Responsibility to users Making it clear that its another site Protection from inappropriate material  Responsibility to other site owners Bypassing advertisements ○ Ticketmaster and Microsoft Use of their resources (e.g., images) Hyperlinks

 Ownership and property  Rights of ownership: Blackstonian Bundle Exclude anyone from the property Use it as sees fit Receive income from Transfer property to someone else  Intellectual property: intellectual objects What is Intellectual Property?

 Physical objects Zero-sum gain: one user at a time Significant cost in both development and replication  Intellectual objects Used by many at once Significant cost in development, marginal cost in replication Intellectual Property v. Real Property

Need for Protection  need to recover the development costs  knowledge of future ownership is incentive to increase value

 Free flow of ideas  First amendment freedom of speech  Creative ideas build on society and culture  Pay what you want Music, Textbooks, Games, Books, Software MusicTextbooksGamesBooksSoftware Arguments against IP

 Copyright  Patent  Trademark Legal Protection

 1790: 14 + renew  1909: 28 + renew  1976 : author + 50, corporate 75  1998: author + 70, corporate 95 Copyright: How Long?

 Enabling copying is criminal Preclude through architecture  Problems Constrains who can use ○ Exceptions will be too constrained for someone Tracks who is viewing Digital Rights Management

Digital Millenium Copyright Act (‘66)  Illegal to … bypass technical measures used to protect access manufacture or distribute technologies primarily designed or produced to circumvent technical measures remove or alter copyright management information  Universal City Studios, Inc. v. Reimerdes (Aug ‘00) 8 studios sued 2600 Magazine ○ posting DeCSS bypasses Content Scrambling System (CSS) -commercially distributed DVD

 Responsibility of those enabling it Software Network providers  Cases: software Napster Grockster Bit Torrent  Cases: network providers Verizon Six Strikes Copying copyrighted materials

APIs: Oracle v Google  Issue: Android APIs are very Java-like  Android VM was built in a “cleanroom environment”  Oracle sued over the APIs  Ruling: not copyrightable Ruling: not copyrightable  Ruling overturned Ruling overturned

 Physical objects Process, machine or composition of matter NOT laws of nature, scientific principles, algorithms  Criteria Novel Not previously described Non-obvious Useful Patents

 Hardware, software, processes NOT laws of nature, scientific principles, algorithms  Can patent new applications or combinations  Criteria Novel Not previously described Non-obvious Useful Patents A man "has a right to use his knife to cut his meat, a fork to hold it; may a patentee take from him the right to combine their use on the same subject?" -- Thomas Jefferson

 Processes vs. algorithms  What is non-obvious?  Examples Name Your Price (Priceline) One-click (Amazon)  Opinions Marco Arment (inherently problematic) Marco Arment Paul Graham (patents === software patents) Paul Graham Software & Business Process Patents

Recent Activity  German legislature: resolution calling for cessation  New Zealand considering outright ban  US courts appear to be backing off Bilski v Kappos (Supreme, 2010) ○ Hedging the risk of commodities fluctuation ○ Claims denied CLS v Alice (Circuit, 2013) ○ Trading platform to assure that neither side renigs ○ Claims denied

 Word, phrase or symbol  “Pithily” identifies  Infringement: used by someone else  Dilutions Blurring – dissimilar products Tarnishment – negative or compromising  Has been applied to domain names Cybersquatting Parody or criticism Trademarks

 Cybersquatting.net,.org,.com, … Punctuation (hyphenation, etc.) Phrases, nicknames  Parody, criticism, complaint (cybergriping) Property rights vs. free speech Bringing people to the site under false pretenses Including the name in the url vs. appearing to be the site Domain Names