1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 13 Privacy as a Value.

Slides:



Advertisements
Similar presentations
Business Ethics for Real Estate: A. Glean
Advertisements

Pentti Mäkinen Central Chamber of Commerce of Finland Benefits of low regulation environment Brussels
IS SPAM ETHICAL? ETHICAL REFECTIONS ON THE PROBLEM OF SPAM... Sudharsan Chandrashekaran.
Chapter 15: Making Decisions about Computers, Information, and Society Invitation to Computer Science, Java Version, Third Edition.
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
Click Wrap Contracts Richard Warner.  Web sites typically contain an agreement defining the terms on which the web site may be used.  In many cases,
Ethics in a Computing Culture
1 Creativity and the Age-Old Resistance to Change Problem in RE Gil Regev Donald C. Gause Alain Wegman.
Identifying needs and establishing requirements Chapter 7a.
Ethics in Life Sciences: From theory to the real world Lecture No. 11 Video Link Further Inf. For further information and video link please click on the.
HEDIS Audit – Appropriate Monitoring and Oversight of Vendors Presenter: Yolanda Strozier, MBA Project Manager, EQRO Services.
Henry Prakken August 23, 2013 NorMas 2013 Argumentation about Norms.
CS 3043 Social Implications Of Computing Keith A. Pray Instructor socialimps.keithpray.net CLASS 3 ETHICS © 2015 Keith A. Pray.
Human Rights and Patient Care Anahit Harutyunyan Armenia.
1 1 Interoperating: MIT’s Fusion Center Prototype & JHU/APL’s Back End Attribute Exchange (Identity Management Testbed) January 2013.
Robert Crawford, MBA West Middle School.  Summarize the danger of sharing personal information on the internet.  Explain how cookies and global unique.
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
Does morality depend on God?
Critical Thinking: A User’s Manual
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
The Ethics of Internet Research Rebecca Eynon, Jenny Fry and Ralph Schroeder Oxford Internet Institute, University of Oxford
Philosophy 223 Technology in the Workplace: The Concern for Privacy.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 9 Ethics in IT Societies III Plagiarism; Democracy.
REVISIONS TO GENERAL EDUCATION STUDENT LEARNING OUTCOMES Auburn University Senate Information Item, August 2014.
Privacy in Healthcare Challenges Associated with Implementing Privacy in an Electronic Health Records Environment John P. Houston, J.D. Vice President,
Kant ETHICS WITHOUT DIVINE AUTHORITY CONTINUED. Recap of Key terms from last lesson Rationalism Empiricism Deontological Absolute Innate Morality.
1 Building a Sustainable Framework for Open Access to Research Data Through Information and Communication Technologies Gideon Emcee Christian telecentre.org.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 17 Software as Intellectual Property.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Front Page Title Name Introduction Appropriate Images The Legal Issues -Personal Data -Freedom of Information -Computer Crimes Ethical Issues -
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy in Context: Contextual Integrity Peter Radics Usable Security – CS 6204.
1 THE DESIGN OF INTELLECTUAL MOVEMENTS Stuart Umpleby The George Washington University Washington, DC.
HA405: Leadership and Ethics in Health Care Week 2 Seminar
September XACML: Consistency analysis Luigi Logrippo Université du Québec University of Ottawa
Assignment Help From Requirements Elicitation to Elicitation.
Ethical Decision Making , Ethical Theories
Applied Ethics Introduction & Theories Computer Science.
Responsible Data Use: Copyright and Data Matthew Mayernik National Center for Atmospheric Research Version 1.0 Review Date.
Intro to Chapter 42 In small groups of 3 or 4 complete the following questions on chart paper. 1. Define Privacy in general 2. Define Privacy at - School.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 11 Democracy and the Internet Privacy.
1 Ethics of Computing MONT 113G, Spring 2012 Session 29 Privacy.
Utilitarianism Utilitarians focus on the consequences of actions.
Professionalism/Customer Service in the Health Environment Unit 8 Ethical and Cultural Issues Related to Communication and Customer Service Lecture 8a.
An act is moral if it brings more good consequences than bad ones. What is the action to be evaluated? What would be the good consequences? How certain.
Chapter 7 Theories of Social Responsibility, The Corporate Social Audit and Corporate Sustainability.
Monitoring Employees on Networks
Kant and Kantian Ethics: Is it possible for “reason” to supply the absolute principles of morality?
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 5 Analogical Reasoning.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 21 Intellectual Property III.
-Computers influence your health greatly!!!!! -Some people become computer addicts.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
 Welcome! The objective of this 26 slide presentation is to: 1. Identify the fundamental concepts and key issues of ethics and morality. 2. Describe rules.
 Being free from public attention that means not being watched or disturbed by other people.
1 Ethics of Computing MONT 113G, Spring 2012 Session 27 Ethics in IT Societies III Privacy.
Privacy, Discrimination and Review
FORMULA FOR DECISION MAKING
Privacy and the Law.
What Is ISO ISO 27001, titled "Information Security Management - Specification With Guidance for Use", is the replacement for BS It is intended.
Virtue Ethics & Moral Reasoning
Human Rights and Patient Care
Elements of Argument The Toulmin Model.
Kant and Kantian Ethics:
Enquiry Based Learning (EBL) and Human Rights
Ethics.
Dissemination Working Group Luxembourg, May 2009
Internet Safety Sixth Grade.
Chapter 15: Making Decisions about Computers, Information, and Society
Ethics and Politics of Computational Social Science
Presentation transcript:

1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 13 Privacy as a Value

2 Definition of Privacy the state or condition of being free from being observed or disturbed by other people : she returned to the privacy of her own home. the state of being free from public attention : a law to restrict newspapers' freedom to invade people's privacy. When we say we value "privacy", clearly we do not mean absolute privacy. What do we mean?

3 Privacy as a Value Control of information about ourselves is important for our autonomy (freedom from external control or influence; independence). We need to release information about ourselves in some contexts, but should have control over whether it flows to other places.

4 Privacy as Contextual Integrity Nissenbaum (2004) argued that there are information norms for every domain of life. People have certain expectations about these in each domain: 1)What kinds of information is appropriate for this context? 2)How will information be distributed in this context? Examples of appropriate information: Applying for a loan Visiting a doctor Examples of distribution norms: Medical information Credit reports

5 Development of Norms Formal norms: Established by legislation or specific policies of an organization. Informal norms: Established and enforced by social expectations. Changing norms: New technology creates situation like a "policy vacuum" for norms. New technology allows collection and distribution of new forms of information. Organizations may use the technology without informing clients. IT tools are often invisible to users and adopted without public announcement. This makes privacy difficult to protect.

6 Privacy Discussions Read your scenario. Present argument for the described practice. Present argument against the described practice. Conclusion: Is the practice overall good or bad (use utilitarian and/or deontological reasoning.)