By: Raymond Morris. What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots –

Slides:



Advertisements
Similar presentations
By: Lucas Clarkson.  “could potentially launch a ‘root exploit’ attack to take control of your phone” - Dr. Xuxian Jiang  Ads use GPS, call logs, phone.
Advertisements

Chapter 1 An Overview of Ethics
ICT Ethics 2 ICT 139.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
A Dip in Silicon Valley April 20 th, 2001 R.J. Brown April 20, 2011 CSCE 390
JUSTIN MINGLEDORFF CSCE390 APRIL 11, 2012 CONSUMER TECH AND ELECTRONIC WARFARE.
BY: WILL READE Cyber and Drone Warfare. Overview Cyber attacks & Drones leave the human out of the battlefield Makes waging war “easier” when the technology.
Hackers Plan Space Satellites to Combat Censorship By: David Cocke ACM TechNews: 01/04/12 Source: BBC News (12/30/11) David Meyer Website:
The Threat of Cyber War The Issue of Cyber Security.
Judge Rejects Google’s Deal to Digitize Books Rhea McCaslin CSCE390 – Spring 2011.
The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.
Article: The Cyberweapon that could take down the Internet By Jacob Aron February 11, 2011 Presentation by Jacob Russell CSCE390 April 18 th, 2011.
Computational Thinking William C. Ridgeway 4/17/2011 CSCE 390 Professional Issues in Computer Science and Engineering.
Garrett DeBruin CSCE390 Professional Issues In Computer Science feb/feb html#
Colin Stewart.  Darpa announced it’s new project BOLT, Broad Operational Language Translation.  Given that the US fights a lot of wars in places where.
By: Amanda Stephenson. RFID RFID – Radio Frequency Identification tags Hold 128 characters Normally placed in livestock and pets for identification Chips.
China’s attempt to tighten communication Byron Alleman CSCE390 – Computer Ethics April 2011.
Ethical Decision Making Process. How to Resolve Ethical Dilemmas in Business Identify relevant facts Identify relevant issue(s) Identify primary stakeholders.
Internet probe can track you down to within 690 meters.
Cyberspace Programmers Confront Copywright Laws By: Thomas Hussey Article: ”Cyberspace Programmers Confront Copywright Laws” Date: May 10, 2000
Slides prepared by Cyndi Chie and Sarah Frye (and Liam Keliher) A Gift of Fire Third edition Sara Baase Chapter 9: Professional Ethics and Responsibilities.
Virtual War a Real Threat Will Galloway 4/18/2011 CSCE 390 Article: Virtual War a Real Threat By Ken Dilanian, Washington Bureau March 28, 2011
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 390 Professional Issues in Computer Science and Engineering Ch.6: The.
How Egypt Shutdown the Internet Drew Steptoe April 18th, 2011 CSCE 390 Professor Valtorta References: - JAMES GLANZ. “Egypt Leaders Found ‘Off’ Switch.
Ethical Theories: Deontology and Teleology
Scientific Data Management for the Protection of Human Subjects Robert R. Downs NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
Professional Decision Making Model
Ethics Lecture Dr. Christina Howe
CS 3043 Social Implications Of Computing © 2010 Keith A. Pray Class 3 Professional Ethics Keith A. Pray Instructor socialimps.keithpray.net.
Professional Ethics: Should Software Engineers Adhere to a Professional Code of Conduct? Jonathan Schiff CS 301.
CISB 412 Social and Professional Issues Professional Ethics.
“Building a Smarter Forest” -Joe Otis. Summary Several computer scientists are testing a thesis involving the use of robots in forests in order to help.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Defensive Cyber weapon in Japan ACM Jan 12 Ronessa DaSilva.
Joseph Eckstrom. The issue  A Dr. Xuxian Jiang at NCSU studied 100,000 apps and the ad libraries that they used. He made some unsettling discoveries.
By: Gregory Swinson ACM TechNews: (3/27/12) Source: "Hacking IT Systems to Become a Criminal Offence." European Parliament. Web. 11 Apr
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray Class 3 Professional Ethics Keith A. Pray Instructor socialimps.keithpray.net.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
Ng Wah Catholic Secondary School Form 5 Group Discussion Tips for students.
Autonomous Cars Use laser, radar, lidar, GPS, cameras and other sensors to drive autonomously (1) Significant, but diminishing legal hurdles (2) Major.
General Moral imperatives
Teigh Berg ACM tech news: 12/30/11 Source: Reuters (12/28/11) URL: trains-security-idUSTRE7BR0C
Matt Carrow ACM TechNews 4/4/2012.  The United Kingdom is considering a plan to allow security services to spy on all Britons’ internet activities. Government.
“Britain Weighs Proposal to Allow Greatly Increased Internet Snooping ” Article By:Anthony Faiola and Ellen Nakashima Presentation By: Dedric Guest.
Ethics.
Computer Ethics 4 4 Chapter.  Ethics Pertaining to right or wrong in conduct  Ethical In accordance with the rules or standards for right conduct or.
1 Computational Medicine An Ethical View Maliek Mcknight CSCE 390 April 23, 2010.
System Monitoring of Federal Agents Stephen Cevallos.
BRITISH PROPOSAL TO EXPAND DIGITAL SURVEILLANCE CSCE390 Computer Ethics Presentation.
Katlin Gibbons Professor Ron Sandland EDTE 519 – Section 1 January 31, 2013.
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
Lecture. 1.What are ethics? Why needed? 2.Islamic code of ethics 3.Network etiquette (8 broad rules) 4.Brief overview of ACM code of ethics 5.How to acquire.
Professional Ethics and Responsibilities Part-II
1 Meeting the Challenges of Today’s Dynamic Business Environment Chapter 1.
Net Neutrality Andrey Gavel. Summary Charge more/less for certain content online Arguments for: o More users = heavy burden o Charge more for heavy traffic.
Computer Ethics by Dr. Bun Yue Professor of Computer Science CSCI 3333.
UN vs the Internet Summary
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
The Ethics of Implementing Watson-like Algorithms in Neonatal Care
CSCE 390 Professional Issues in Computer Science and Engineering Ch
WikiLeaks avoids shutdown as supporters go on the offensive
Integrity and Ethics Achala Dahal.
CSCE 390 Professional Issues in Computer Science and Engineering Ch
ACM Code of Ethics CSCI 362: Data Structures.
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CS-480b Network Security Dick Steflik
Presentation transcript:

By: Raymond Morris

What is it? The “Internet of Things” Network of communication between devices i.e. electronics, computers, and power grids Bots – smart computer programs Used to monitor and control networks Energy use minimized by bots Eliminates excess energy use Article at:

8-Step Ethical Decision-Making Step 1: Ethical Issues Security of data collected from electronic devices. More control being given to software. Software can have bugs Humans can also make errors Software can be tampered with through a network

8-Step Ethical Decision-Making Step 2: Stakeholders General public Save energy in homes More convenience Businesses Save energy use in factories/plants/offices Earth Energy could possible be used more efficiently making for a more green planet

8-Step Ethical Decision-Making Step 3: Possible Solutions Do not use the Internet of Things at all. Use Internet of Things only within companies that are overusing too much energy, not for general public. Let everybody have access to Internet-of-Things-friendly devices. I would choose the third option, to let everybody have access.

8-Step Ethical Decision-Making Step 4: Would I let everybody use my solution? “Let everybody have access to Internet-of-Things- friendly devices.” Of course I would, letting everybody have access to it is part of the solution This would be a step forward in revolutionizing the Internet This solution treats people as ends because it seeks the greater good, and to benefit everybody with more efficient energy use.

8-Step Ethical Decision-Making Step 5: Is the solution in accord with human nature? Yes, the solution is in accord with human nature because we are advancing ourselves forward by making greater use of the Internet while helping our environment. Step 5: Is the solution balanced? I think it is balanced in the aspect that we do not deny everybody a great advantage, and excessiveness would be forcing it upon everybody, instead of offering it.

8-Step Ethical Decision-Making Step 6: Would majority agree that this is an efficient means to the end? Yes because everybody benefits in a monetary and green way. Step 6: Will this produce the greatest good for the greatest amount of people? It will create the greatest good for as many people that are willing to use it and trust software.

8-Step Ethical Decision-Making Step 7: Am I committed to this solution? I really do believe this solution is a step in the right path of making more effective use of our Internet. Step 7: Do you choose this solution in an autonomous manner, as the final arbiter of the good, free from the influence of others? I have chosen this solution in accordance with what I have seen and learned from computer science and the world today.

8-Step Ethical Decision-Making Step 8: Which philosophy influenced the solution most? I think realism influenced my solution the most because using the Internet of Things seems to be the most practical and helpful thing to do with it. Saving energy is just one use of the Internet of Things. There are many practical applications for bots, otherwise known as agents. I.e. detecting malfunctions, managing stock in stores

ACM Code Applies to the following in General Moral Imperatives: 1.1 Contribute to society and human well-being. 1.2 Avoid harm to others. 1.4 Be fair and take action not to discriminate. 1.7 Respect the privacy of others. 1.8 Honor confidentiality.