Computer Ethics. What is Computer Ethics? Deborah G. Johnson: Respect for Proprietary Rights Richard Stallman: Sharing Eugene H. Spafford: Something irrelevant.

Slides:



Advertisements
Similar presentations
Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Advertisements

Reaching Within, Part Two:. What is a dilemma? Dilemma From the Greek: Di—two Limos—horns Literally, Two horned.
Business Ethics What you really need to know!. What is Ethics?  A practice of deciding what is right or wrong.  Ethical decisions must affect you or.
Business Ethics Fundamentals
Social and Ethical Implications CMSC 101 November 21, 2013 Bhuvana Bellala and Marie desJardins.
Why? Simple clear purpose and principles give rise to complex intelligent behavior. Complex rules and regulations give rise to simple stupid behavior.
MODULE TWO Ethical and Legal Issues. Objectives: Particpants will: Understand privacy, confidentiality and ethics as they relate to being a volunteer.
Cyber Character for Netizens Cyber Character for Netizens Joe Showker Rockingham County Schools “Cyber Character” is ethical citizenship for internet computer.
L Social Atomism: as rational, self-interested individuals, we are interested in promoting the social good through a contract because it benefits us personally.
Ethics and Responsibility
Introduction to Computer Ethics
Limits on Political Authority 1)Morality: laws obligate only if they are moral, that is, if they are consistent with reason or the natural law (Stoics).
Fall 2014 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering What is Computer Ethics? Fall 2014 Marco Valtorta.
ETHICS Definition Legal vs. ethical Frameworks or theories Ethical principles.
Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Ethics Lecture Dr. Christina Howe
 SOVEREIGNTY- The idea that all nations are INDEPENDENT from each other.  JURISDICTION- Boundaries within which a government has authority. They may.
Human Rights Act 1998 The European convention on human rights The European convention on human rights The Convention rights The Convention rights How does.
ITGS Standard Level Mr Gavin Johnson. ITGS The Diploma Programme information technology in a global society (ITGS) course is the study and evaluation.
Identifying Human Rights The protections offered by the ECHR and the Human Rights Act 1998 Brayne & Carr: Law for Social Workers: 10e Chapter 3.
©2007 by The McGraw-Hill Companies, Inc. All rights reserved. The aim of this tutorial is to help you learn to analyze and evaluate arguments involving.
What Should Be A Crime?. Recall: Two Main Perspectives 1. Achieving social order outweighs concerns for social justice. 2. CJ system goals must be achieved.
Ethical Argument Doping Control 1. Ethical Implications of Doping Control. 2. The legal implication of prohibition. 3. Enforcement- Loss of civil rights.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
1 Ethics of Computing MONT 113G, Spring 2012 Session 18 Ethical reasoning.
Philosophy 223 Technology in the Workplace: The Concern for Privacy.
ETHICS, POLICY & SECURITY ISSUES
ETHICS, POLICY & SECURITY ISSUES
1 Business Ethics and Social Responsibility l an oxymoron?!?! l What is GOOD vs. What is Bad! l behaviour of business and the treatment of stakeholders.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
“Why am I Exploited if I’m Paid but not if I’m Not Paid?”: Exploitation, Commodification and Commercial Surrogacy Tammy Johnson.
Ethics of Community-Based Prevention Research: A Reflection and Dialogue Stephen B. Fawcett University of Kansas.
Archives Research as Unfinished Business Trudy Huskamp Peterson.
Chapter 1 Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics Introduction Cybertechnology, Ethical Concepts,
Illinois Department of Aging 2012 Elder Rights Conference Reaching Within Session T13.
Ethics.
Readings in Cyberethics Notes from book by Spinello.
1 Ethics of Computing MONT 113G, Spring 2012 Session 16 Introduction to Computer Ethics.
Reason, Relativity, and Responsibility in Computer Ethics
November 2004 SFEU Supporting Children’s Rights and Entitlements Outcome One Explain the importance of children’s rights and entitlements.
ETHICS in the WORKPLACE © 2012 Cengage Learning. All Rights Reserved. Chapter 1 Welcome to Ethics.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Ethical & Legal Issues MODULE FIVE:. Objectives: Students will: Understand privacy, confidentiality and ethics as they relate to being a volunteer. Understand.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 5 Analogical Reasoning.
Doc.JUDr.Soňa Skulová, Ph.D. Principles of Good Governance.
Basic Principles: Ethics and Business
 Description of Inheritance  Base Class Object  Subclass, Subtype, and Substitutability  Forms of Inheritance  Modifiers and Inheritance  The Benefits.
The Ethics of Privacy in the Digital Society Ethical issues of emerging information and communication technologies Professor Bernd Carsten Stahl.
Key Knowledge Confidentiality Year 4 Medical Ethics and Law Thread Course The Ethox Centre, University of Oxford.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Ethical Intuitions about Risks Sabine Roeser Philosophy Department, Faculty of Technology, Policy and Management, Delft University.
 Welcome! The objective of this 26 slide presentation is to: 1. Identify the fundamental concepts and key issues of ethics and morality. 2. Describe rules.
1 Ethics of Computing MONT 113G, Spring 2012 Session 17 Sociotechnical Perspective Ethical reasoning.
How Does Government Secure Natural Rights?
CS 2315 review.
Ethical dimension of nursing and health care
Ethical, Social, and Political Issues in E-commerce
Paper 1 | GCSE Computer Science | Ethical, legal, cultural & environmental issues | Required knowledge How to investigate & discuss Computer Science technologies.
INTRODUCTION TO BUSINESS ETHICS
Data Protection & Human Rights
Learning Area 1 Information And Communication Technology and Society
Moral principles of CSR
Introduction to Computer Ethics
What is Ethics? Ethics: A code of moral principles used to set standards of “good” and “bad” Ethical Behavior: What is accepted as good and right according.
Introduction to Computer Ethics
Computer Ethics.
FUNDAMENTAL SOCIAL RIGHTS IN EU
Concise Guide to Critical Thinking
Introduction to Computer Ethics
Natural Laws applied to voluntary euthanasia
Presentation transcript:

Computer Ethics

What is Computer Ethics? Deborah G. Johnson: Respect for Proprietary Rights Richard Stallman: Sharing Eugene H. Spafford: Something irrelevant - the general public too uneducated Peter G. Neumann: Must be replaced by security John Weckert: A complex matter James H. Moor: A matter of privacy Swedish Banks: Good taste Krystyna Górniak-Kocikowska: Something global NSF–Ethics of Human Enhancements: Something that lags (far) behind Council of Europe: Computer ethics?

High speed computers- privacy Computers memory undercuts human fraility to assist privacy Greased information is available for any purpose Core values= a value humans and cultures need for survival. Privacy is not a core value, but it expresses a core value Normative privacy-protected by ethical, legal conventional norms Normative privacy often natural as well James H Moor

Views and principles Restricted access view:focuses what to concider when developing policies for protecting privacy The publicity principle:rules and conditions that govern private situations should be clear and known to the persons affected by them The adjustment principle: If the private circum stanses justify a change in parameters of a private situation, then the alteration should be an explicit and public part of rules and conditions that govers the private situation

Ethics is implicit in this paper: The harm caused by the discloser will be so much less than the harm prevented that an impartial person would permit breach in this and in morally similar situations Ethics in this paper- implicit and ends up in dilemman of what is best, right, wrong and so on

Human Enhancement [HE]- technology into our bodies Definitions of HE: Changes the structure and function of the body Discusses grey zones- when is it HE and when it is not? Questions what is morally problematic and what is not Uses the concepts ethic and moral without defining them Ethics in this paper-just uses, no defintions Ethics of human enhancements

Questions to discuss What are the concequences of differences in understandings of ethics? Can technology and technology design be used to increase ethical quality and reduce negative concequences of differences in conceptual interpretations?

Old and new ways of thinking With the virtualization of data, the way we are thinking and interacting with it changes. The question about harm that is done when “violating” virtual property/artifacts is much harder to answer. –Those authors that try to find analogies in the material world, struggle to make their argumentation coherent. Is a new ethical framework needed?

Perception of data Personal Information Creation The issue of privacy The issue of property