1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 11 Democracy and the Internet Privacy.

Slides:



Advertisements
Similar presentations
Freedom of Speech (Part 3)
Advertisements

A Place for Cost-Benefit Analysis
November to educators: Let students use online social tools By Michael Allen.
Technology in Education Issues we need to know. Social, Ethical, and Legal. By: Kara Bushey ECED 201.
Week 6 Lecture Part 2 Databases in Electronic Commerce Samuel Conn, Asst. Professor.
Ethics in a Computing Culture
Developing A Strategy For The Internet Age The Five Forces Model
Department of Computer Science City College of New York City College of New York Spring 2006 Copyright © 2006 by Abbe Mowshowitz CSc 375 SOCIAL ISSUES.
Face Recognition and implications on society By Zubin Singh ICS 131.
Applied Software Project Management Andrew Stellman & Jennifer Greene Applied Software Project Management Applied Software.
“Ethics Online” Shaping social behavior online takes more than new laws and modified edicts. Deborah G. Johnson Communications of the ACM Vol. 40, No.
3 Ethics and Privacy.
Social Aspects of GIS the other side of the coin.
Student Library Media Center Safety Guidelines Prepared by: Mrs. Fitzpatrick AHS Library Media Center
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
SYSTEMS SUPPORT FOR GRAPHICAL LEARNING Ken Birman 1 CS6410 Fall /18/2014.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
The Social Effect of Information System
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
Stop cyber bullying  Forms of digital communication and collaboration tools: Blog Online forum Social networking site.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
Keeping Kids Safe on the Internet John Minelli Educational Technology Specialist Hartford School District
Privacy Privacy as a personal preference Is there such a thing as too much privacy? What will be discussed  Why privacy is an issue  Dangers of lack.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
6 Ethics and Privacy.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Ch5 1 ETHC303 Chapter 5- Privacy Instructor: Dr. Hassan Ismail Abdalla Room: E236.
Philosophy 223 Technology in the Workplace: The Concern for Privacy.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 9 Ethics in IT Societies III Plagiarism; Democracy.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
By Cheryl Costantino, M.A. June  Teachers, students and parents have responsibilities when it comes to the use of technology.  There are national.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
SAFE AND ETHICAL USE OF TECHNOLOGY By Dorreth Bailey-Oldacre 12/14/14 Professor: Dr. Barbara Gruber, PhD, CETL.
COM 354 Week 2.1 New Media Ethics. Twitter Updates What accounts to follow? Stories of the week?
Chapter 1 Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics Introduction Cybertechnology, Ethical Concepts,
THE SAFE AND ETHICAL USE OF TECHNOLOGY IN SCHOOLS PRESENTED BY JESSICA CHAIDEZ TECH 503.
Copyright © 2004 Pearson Education, Inc. Slide 9-1 Chapter 9 Ethical, Social, and Political Issues in E-commerce.
Safety and Security issues of using ICT Alys brooks.
6 Ethics and Privacy.
Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 8 Ethics in IT Societies II.
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
The Impact of Communication Technology CMT 11 Fundamentals.
1 Ethics of Computing MONT 113G, Spring 2012 Session 29 Privacy.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 7 Ethics in IT Societies.
Utilitarianism Utilitarians focus on the consequences of actions.
Digital Democracy: Political Systems Kathy E. Gill 23 June 2012.
Our Classroom Rules These are the rules we will follow this year to learn, play and have fun!
Lecture 7 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS 1.
CHAPTER 5 ETHICS & PRIVACY.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Note set 2 Sociotechnical perspective Ethical reasoning.
PROTECTING YOUR CREDIT PG NAME, TEACHER AND DATE.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 13 Privacy as a Value.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
1 Ethics of Computing MONT 113G, Spring 2012 Session 17 Sociotechnical Perspective Ethical reasoning.
1 Ethics of Computing MONT 113G, Spring 2012 Session 27 Ethics in IT Societies III Privacy.
How to prevent Identity Theft
CHAPTER FOUR OVERVIEW SECTION ETHICS
PRIVACY.
Chapter # 1 Overview of Ethics
Ethical and Social Issues in Information Systems
Interdisciplinary Program in Cognitive Science Lee, Jung-Woo
CHAPTER FOUR OVERVIEW SECTION ETHICS
Session 25 INST 301 Introduction to Information Science
INFS 452 – Computer Ethics & Society
Introduction to Computer Ethics
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
IT and Society Week 2: Privacy.
Presentation transcript:

1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 11 Democracy and the Internet Privacy

2 Turnitin.com Turnitin.com and similar sites allow teachers to check for possible plagiarism in papers turned in by their students. Should teachers use Turnitin.com? Arguments for (discussion): Arguments against (discussion):

3 Plagiarism Detection On balance, is the use of plagiarism detectors ethical? Utilitarian argument: (Are the overall consequences better than not using it)? Deontological argument: (Are people treated as ends in themselves)?

4 Democracy and the Internet What is democracy? Political power is in the hands of the citizens. Government is accountable to the citizens. Moral justification for democracy: "Individuals are sovereign over themselves." (Johnson) Therefore, they must have some say in their government. Deontological justification: Utilitarian justification:

5 Is the Internet Democratic? Is the internet inherently democratic? Does the adoption of internet technology lead to the adoption of democratic practices? Arguments for: Individuals produce and distribute information Internet provides many forums for discussion Internet provides access to more sources of information Internet facilitates associations independent of geography.

6 Is the internet democratic? Arguments against: Too much information is available--filtering is required. "Net neutrality" is not a given Surveillance capabilities Global Scope Moor's argument: The architecture of the internet constrains people's behavior. Why is this problematic? ACLU: Filtering software can greatly limit which sites are accessed. What are their arguments?

7 Privacy in IT societies What's new? What's different about information flow in IT societies from previous societies? Previous modes of information flow: Characteristics of IT information flow:

8 What Else is New? Tools for Data Mining and Managing Databases. Did not emerge in a vacuum (technological determinism) Emerged in response to government and corporate interests. New Kinds of information. Transaction generated information (TGI) Examples: Credit card Clickstream

9 Merging and Mining Data When different types of information is merged and then mined for patterns, this can produce new types of information. Examples: Clickstream profile Amazon.com recommendations Facebook friends--gaydar

10 Other Issues Distribution of information is broader and more extensive than before. Example: Credit rating. Once on a server, information can be bought, sold, given away or stolen. Information endures. Example: Images on Facebook. Errors are very hard to correct.

11 IT Societies are Surveillance Societies IT allows people to be easily tracked and monitored. Examples? Data can be used to create profiles of individuals. The data can be "mined" for patterns of behavior. Questions raised: What is the value of privacy? How does surveillance affect us and our society?