Download presentation
Presentation is loading. Please wait.
1
Chapter 3: Ethics in IT-configured societies
2
Scenarios Scenario 3.1. Google in China: “ Don’t be evil”
Google( created in 1998 by Serge Brin and Larry Page) is the most popular search engine and is famous for its motto “ Don’t be evil” However, Google was criticized for filtering particular content in some countries France: Google filters out anti-Semitic websites to comply with national laws against hate speech
3
The most important controversy was about Google’s entry into China where Google accepted, upon the government’s request to filter all references to Taiwan, Tibet… As a response, Google said that “don’t be evil” also requires “don’t be illegal”→ respect the laws of the country of operation
4
Did Google do anything wrong?
Is there an ethical difference between filtering hate speech in France and filtering political speech in China?
5
Scenario 3.2. Turing doesn’t need to know
Indira is communicating with Hal by instant messages to obtain information about a software. During the exchange of messages Indira asks herself if Hal is a human or a computer program designed to answer questions What difference does it make whether Hal is human or not?
6
Scenario 3.3. Turnitin Dot Com
A professor at a university decides to run the papers presented by his students through a plagiarism detection system Turnitin.com to compare the papers to the content of the Web and to a database collected by the company Did he do anything wrong? How will widespread use of plagiarism detection system affect university environment?
7
Introduction: IT-Configured Societies
“Information society”= Society in which IT constitutes a part of the general infrastructure Aim of the chapter: understand the role of IT in configuring ethical issues and shaping social values
8
Technology as the instrumentation of human action
Human action is the central focus of ethics Technology is understood as “the instrumentation of human action” Connection between ethics and technology Instrumentation through IT of the actions of individuals and organizations in IT-configured societies
9
Thus, expansion of types of actions that could be done by individuals, especially inconceivable actions before the existence of the technology “Sending spam”, “searching the Web” and “blogging” were inconceivable before the creation of the internet
10
2 advantages for ethical analysis:
Humans are the agents of actions Detect the contribution of instrumentation to the character of human actions
11
Cyborgs, robots and humans
Objections to the account of technology as the instrumentation of human action The account does not take into consideration the “agency” of technology ( concept developed by STS scholars) i.e. the power of technology in society. It does not recognize the contribution of technology to the world. Counter critic: The account focuses on both contributions of human and technology
12
The account keeps technology too linked to human action although IT systems have the potential to become autonomous actors. Computer programs, bots and robots will work autonomously and humans will not understand the technology to an extent that we will qualify them as moral agents Counter critic: It is the efforts deployed by human beings that contributed to the development of these so called “ moral agents”
13
These 2 objections rely on a main idea that technological development keeps going without human intentional activity Technology is human-made and human activity is required for production and development of technology
14
Suggestion to qualify human beings as “cyborgs”: human-technology combination
Human beings live intertwined with technology, around them and also implanted in their bodies ( heart monitors, replacement joints…)
15
3 Features of IT-Configured Activities
Global, Many-to-Many Scope Expansion of the reach of individual communication through the Internet Internet-instrumented communication has a global scope Other means of communication have also a global scope: radio, telephone, television Characteristics of the internet: easy, immediate, affordable and many-to-many communication
16
Distinctive identity conditions
Anonymity on the internet? Not accurate: Monitoring of communications on the internet by service providers Possibility to trace communications by parties that whether have a legal right or the technology to access the information
17
2 distinctive identity conditions in internet communication
Mediation: Internet is mediated through a vast sociotechnical system Variability of the range of available identity conditions A person’s physical appearance, voice and facial expressions could be used to identify a person in the offline world but not on the internet So, difference between online and offline identity conditions
18
Reproducibility A significant aspect of Internet communication
Electronic information is easy to copy without: Any loss of quality or value in the reproduction No evidence that electronic information was copied dangerous implications for property rights and crimes
19
Expansion of the scope of communication in time and place: endurance of messages sent
Expansion of the possibilities of disconnection between words and people: copy information by someone and claim to be theirs
20
IT-configured Domains of life
Virtuality, avatars and role-playing games Opportunities for participation in virtual environments where players ( situated anywhere in the world) interact with one another in real time through avatars, characters created by them
21
Confrontation between the 2nd feature of IT-configured activities and virtual games: distinctive identity conditions Players don’t know each other in the offline world, anonymous Players are pseudonymous since their identity is in their avatar
22
Scenario 1.1. virtual rape: How should we think about the behavior of Bungle and/or the behavior of the person controlling Bungle? Virtual world→ virtual punishment of Bungle? Unclear solution Analogy between behavior in virtual environment and harmful images as pornography and violent films in offline world
23
Offline, individuals are held legally and morally liable for exposing pornography to adults without being warned Bungle harmed the other players by exposing them to a level of unexpected violence Implicitly, players adhere to social norms of behavior similar to the offline ones Thus, the person behind Bungle broke those norms
24
The administrator of the game had also social norms and the software was set up in a way that each player could control his own avatar Thus, Bungle’s controller gained unauthorized access to the system and took control of characters created by others
25
What is your opinion about it?
The player behind Bungle violated the social( thinking of other players) and technological norms( software) of the game No final word is set to solve the virtual rape What is your opinion about it?
26
Friendship and social networking
Instrumentation of friendship in IT-configured societies through social networking sites Can true friendships be formed online? A study has indicated that friendships cannot be created online but existing offline ones can be maintained online
27
Another study( Cocking and Matthews 2000) has demonstrated that real friendships could not be established and maintained online because Internet biases main aspects of a person’s character Internet weakens interactions with people Open debate
28
In all cases, individuals construct their identities, whether it is offline( clothing, hair cut) or online (social networking sites, information and images posted online…) by using the technical structures Thus, the architecture of a system can make a difference in how one constructs his identity and in the conception that friends have of us
29
Education and plagiarism detection
Existence of issues of plagiarism before the apparition of IT Internet→ reproducibility and accessibility of information have increased the danger
30
2 kinds of plagiarism: Cut and paste a text and claiming it as one’s own Cut and paste, manipulating a text and claiming it as one’s own
31
Solution: use plagiarism detection systems as Turnitin ( scenario 3. 3
Major issues of these systems Reliability: Some plagiarized papers are not detected whereas some nonplagiarized papers are identified as plagiarized Mistrust between teachers and students: teachers start to suspect a large number of papers→ mistrust → students will not develop maturity
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.