Chapter Twelve: Computer Ethics and the Internet Review

Slides:



Advertisements
Similar presentations
Copyright 2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest 12-1 Internet Marketing Intelligence Chapter 12.
Advertisements

Chapter Four: Abortion
Technology in Education Issues we need to know. Social, Ethical, and Legal. By: Kara Bushey ECED 201.
Ethics.
Chapter Ten: Discrimination Review Applying Ethics: A Text with Readings (10 th ed.) Julie C. Van Camp, Jeffrey Olen, Vincent Barry Cengage Learning/Wadsworth.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
1 Freedom of Expression Prepared By Joseph Leung.
CS 305 Topics Covered. Chapter 1: Overview of Ethics What is ethics? Ethics is a set of beliefs about right and wrong behavior. These beliefs are guided.
Exceptions to free speech. Free speech as an exercise of liberty: when are we justified in restricting it? According to Mill’s Harm Principle? “The only.
Introduction to Computer Ethics
Freedom of Speech in Cyberspace 1. The U.S. Constitution - The 1 st Amendment: The 1 st Amendment Congress shall make no law respecting an establishment.
Chapter Seven: Capital Punishment Applying Ethics: A Text with Readings (10 th ed.) Julie C. Van Camp, Jeffrey Olen, Vincent Barry Cengage Learning/Wadsworth.
Chapter 5 Freedom of Expression
. 4.1 Understanding ethical and social issues related to systems. 4.2 Ethics in an information society. 4.3 The moral dimensions of information systems.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Chapter Four: Abortion Review Applying Ethics: A Text with Readings (10 th ed.) Julie C. Van Camp, Jeffrey Olen, Vincent Barry Cengage Learning/Wadsworth.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Ethics Applied to Computerized World “Privacy” (Morality and Machines S. L. Edgar) **** CS575 *** Jules R. NYA BAWEU.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Chapter Eleven: Animal Rights and Environmental Ethics
Introduction to Computer Science
Questions, Quandaries, and Random Thoughts Laura E. Hunter
1 Internet Ethics and Research Collaborations Between Industry and Universities Michael C. Loui Department of Electrical & Computer Engineering, and Coordinated.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Computer Ethics.
Technology in Focus: Information Technology Ethics
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Chapter Eight: War, Terrorism and Civil Liberties Review Applying Ethics: A Text with Readings (10 th ed.) Julie C. Van Camp, Jeffrey Olen, Vincent Barry.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 11 Issues in Implementing Technology in Schools START This multimedia product and its contents are.
Computer Ethics A Necessity for the new era. Why is Computer Ethics Important? The creation and existence of new questions that older laws cannot answer.
Norton UniversityBusiness Concepts and Social Issues 1 PART TWO Business Concepts and Social Issues.
Bus 297D/13 Legal Aspects of Managing Technology & New Product Development Instructor: Dr. Stan Malos Course Introduction and Overview Question: Why do.
The Library’s Internet Acceptable Use Policy What it is for Why it is important What you need to know How you can help users understand it.
Ethical and Social Impact of Information Systems
Chapter Five: Euthanasia Review Applying Ethics: A Text with Readings (10 th ed.) Julie C. Van Camp, Jeffrey Olen, Vincent Barry Cengage Learning/Wadsworth.
Rights Of Library Users By Keao White Rationale for this Workshop The purpose of this workshop is to give an in depth presentation covering the rights.
C OMPUTER E THICS : A G LOBAL PERSPECTIVE BY G IANNIS S TAMATELLOS Chapter 1 – Ranette Halverson.
Chapter One: Moral Reasons Review Applying Ethics: A Text with Readings (10 th ed.) Julie C. Van Camp, Jeffrey Olen, Vincent Barry Cengage Learning/Wadsworth.
CyberEthics Morality and Law in Cyberspace Chapter 3: Free Speech and Content Control in Cyberspace By Jennifer, Linda, Paul, Paula, and Stephne.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
Every student you have, just like any citizen in the United States, has a right to privacy  An ethical issue that arises when an individual’s right to.
Readings in Cyberethics Notes from book by Spinello.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Professional Ethics Readings in CyberEthics Edited by Richard A. Spinello and Herman T. Tavani, Jones and Bartlett Computer Science, 2003 Professional.
Intellectual property (cont.) 1. Software as intellectual property 2  The law concerning software is not clear and is steal being formulated  In USA.
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
Chapter Eleven: Animal Rights and Environmental Ethics Review Applying Ethics: A Text with Readings (10 th ed.) Julie C. Van Camp, Jeffrey Olen, Vincent.
Chapter Nine: Globalization and Social Justice Review Applying Ethics: A Text with Readings (10 th ed.) Julie C. Van Camp, Jeffrey Olen, Vincent Barry.
Chapter Eight: War, Terrorism and Civil Liberties Applying Ethics: A Text with Readings (10 th ed.) Julie C. Van Camp, Jeffrey Olen, Vincent Barry Cengage.
Copyright, 2000 © Prentice Hall Magruder’s American Government C H A P T E R 19 Civil Liberties: First Amendment Freedoms.
Chapter 10: Ethics, Privacy, and Security Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Chapter Five: Euthanasia
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
Social, Ethical and Legal Issues Madeline Webb.  Legal Issues  Social Issues  Ethical Issues.
Chapter Twelve: Computer Ethics and the Internet Applying Ethics: A Text with Readings (10 th ed.) Julie C. Van Camp, Jeffrey Olen, Vincent Barry Cengage.
Freedom of Expression.
Please read the entire presentation.
Chapter Three: Sexual Morality Review
Video: Digital citizenship is defined as the norms of appropriate,
Introduction to Computer Ethics
Chapter 3 How effectively does Canada’s Charter of Rights and Freedoms protect your individual rights?
– Communication Technology in a Changing World
Ethical Use of Computers
Introduction to Computer Ethics
Chapter 3 How effectively does Canada’s Charter of Rights and Freedoms protect your individual rights?
Presentation transcript:

Chapter Twelve: Computer Ethics and the Internet Review Applying Ethics: A Text with Readings (10th ed.) Julie C. Van Camp, Jeffrey Olen, Vincent Barry Cengage Learning/Wadsworth

What Is Computer Ethics? How does James Moor, a pioneer in computer ethics, understand it? “analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology” How else can we understand “computer ethics”? Examination of policies and guidelines for how to behave ethically in the computer and internet environment How can we use ethical reasoning methods to chart well-reasoned path to decision making in using computers and the Internet?

What are the Major Issues in Computer Ethics? What are issues of Freedom of Expression on the Internet and how should we analyze them? Defamation Obscenity and pornography Inappropriate material for children What privacy issues are presented by computers and the Internet? What are problems of Intellectual Property and Plagiarism with computers and the Internet? What are examples of Computer Crime and how should they be analyzed? What is the Technological “Divide”?

“The Constitution in Cyberspace: Law and Liberty Beyond the Electronic Frontier” Laurence H. Tribe What is Tribe’s Goal? mapping the text and structure of the Constitution onto the texture and topology of cyberspace What are Tribe’s Five axioms (assumptions) shaping American constitutional law and how to adapt them to cyberspace? What is his proposal? The Constitution protects people, not places Constitutional principles should not depend on technological method or medium of information

“Free Speech in Cyberspace” Richard A. Spinello In what ways do free speech and content control present a major moral problem of the Information Age? How should we address pornography in cyberspace? What are the key statutes and court decisions concerning free speech on the Internet? What are the ethical issues presented by hate speech on the Internet? Can anonymous speech be justified ethically? Should spam be protected as commercial free speech?

“Is it Moral to Make Copies of Software for My Friends?” Bernard Gert Can illegally copying software be justified? Is the law is clearly unjust? Is it morally justifiable to break morally acceptable laws to benefit oneself or friends? Is the law morally unacceptable? Does ethical reasoning require an intimate knowledge of the nature of software? Why/why not?

“Cyberstalking, Personal Privacy, and Moral Responsibility” Herman T “Cyberstalking, Personal Privacy, and Moral Responsibility” Herman T. Tavani and Frances S. Grodzinsky Cyberstalking: what is it and how does it differ from ordinary stalking? What privacy rights regarding Internet search engines and public records do we have? What rights should we have? What moral obligations do all internet users have to others who are being cyberstalked?