Download presentation
Presentation is loading. Please wait.
Published byMaximillian Robertson Modified over 9 years ago
1
1/10/2016 1 Ethics and Computing Why is Ethics such an issue with computing in particular? Principles of ethics are the same - theft is theft whether using a computer or not But computers give rise to new questions as to how these principles are to be applied. There can remain gaps or “lacuna” within which new policies have to be made.
2
1/10/2016 2 Issues Why is Ethics such an issue with computing in particular? Health Speed/Pervasiveness Storage Identity Transnationality Copying Content Power Privacy Technical Issues
3
1/10/2016 3 Health Health device control Obesity Education Copy-cat “gaming”: Grand Theft Auto in the dock over US road killing
4
1/10/2016 4 SPEED/ Pervasiveness “Immediate” responses are possible using email causing problems that would never have occurred before. Flames Reply All phenomena
5
1/10/2016 5 STORAGE Vast amounts of data can be stored on individuals including transactions, locations, goods bought etc Privacy and Accuracy of information become an issue Information can be shared in multiple ways
6
1/10/2016 6 IDENTITY Forgery Spoofing identity (impersonation) Pervasive mistaken identity
7
1/10/2016 7 TRANSNATIONALITY It can cross borders with impunity What is legal in one country can be viewed by another in a country where it is illegal
8
1/10/2016 8 COPYING Information can be taken form its original source and used elsewhere with ease. Copyright can easily be infringed
9
1/10/2016 9 Content Pornography Gambling Chat rooms
10
1/10/2016 10 POWER Gender - Computer Science is still a male- dominated field, is this male domination an inequity, or just an amoral accident? Race and Social Class is the computer such a basic tool that all should have equal access to it?
11
1/10/2016 11 PRIVACY Selling private data - harvesting e-mail addresses then sell that information to mass marketers (spam) Opt-in vs. opt-out for solicitation - Is it unfair to marketers to prevent them by law from sending e-mail only to those who have in some way requested it?
12
1/10/2016 12 Technical Issues Reverse engineering other companies software Professional conduct - see codes later
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.