Computer Ethics(1) IT Engineering II Instructor: Ali B. Hashemi 1 1
Main Points Computer Ethics Set of rules or standards of behavior for dealing with computer technology Academic field of study Examples of Issues in Computer Ethics How does computer ethics relate to your every day decisions? 2 2
Communities Some General Comments(1) (1) Forming communities allows us to enjoy better lives than if we lived in isolation. Instead of each person assuming responsibility for all of his or her needs such as housing, food, education, clothing, health care, etc., individuals can specialize and exchange goods and services with others. Normally, forming communities allows for an increase in the quality of life for all. 3 3
Communities Some General Comments(2) (2) But, there is a price associated with being part of a community. Communities may prohibit some actions and make other actions obligatory. Those who do not conform with the prohibitions and obligations can be punished. However, the fact that most people do live in communities provides strong evidence that the advantages of community life outweigh the disadvantages. 4 4
Defining Terms Society An association of people under a system of rules designed to advance the good of its members over time. Morality Each society has rules of conduct describing what people ought and ought not to do in various situations. Ethics the philosophical study of morality i.e. a rational examination of peoples moral beliefs and behavior. Law Some moral rules are enacted into laws for a society. must be obeyed or penalties are incurred. 5 5
What is Moral? mor al (môr¹el, mòr¹-) adjective 1. Of or concerned with the judgment of the goodness or badness of human action and character (relating to principles of right and wrong) 2. Teaching or exhibiting goodness or correctness of character and behavior: a moral lesson. 3. Conforming to standards of what is right or just in behavior; a moral life. 6 6
What is Ethics? eth ic (èth¹îk) noun a. A set of principles of right conduct. b. A theory or a system of moral values. 1. ethics (used with a sing. verb). The study of the general nature of morals and of the specific moral choices to be made by a person; moral philosophy. 2. ethics (used with a sing. or pl. verb). The rules or standards governing the conduct of a person or the members of a profession: Computer ethics. 7 7
Controls on Human Behavior Courtesy (politeness ) Law Ethics 8 8
The Scope of Behavioral Rules Individuals Organizations / Groups Society / Government 9 9
Ethical Theories The formal study of ethics: at least 2,400 years to the Greeks. In Plato s dialogue, called the Crito, Socrates uses ethical reasoning to explain why he ought to face an unjust death penalty rather than flee into exile with his family. Lots of Since ethical theories, Why should we know? examining your own conclusions about various scenarios we will study 10 10
Ethical Theories (2) some commonly studied theories ones how they can be used when making ethical judgments. An ethical theory should make it possible for a person to present a persuasive, logical argument to a diverse audience of skeptical, yet open-minded people. 11 11
Ethical Theories (3) In the following make sense of the ethical questions: What is the good? How should we live our lives to be a good person? How should we act? What is the difference between right and wrong? Moralities or moral codes can differ by time and place. ethical problem of choosing between different moralities. In this course we will consider behavior that arises because of the use of computers in the society. 12 12
The Ethical Theories We Will Consider Relativism Subjective and Cultural Divine Command Kantianism Act Utilitarianism Rule Utilitarianism Social Contract In each case, the following will be presented A definition of the theory Some scenario analysis with the theory assumed to be the guideline for decision making. Arguments for the use of the theory Arguments against the use of the theory 13 13
Caution: One Underlying Assumption I Am Making Accepting an ethical theory that allows people to make decisions based on something other than reason. In order to persuading of others that our solutions to actual moral problems are correct (our goal). 14 14
Ethical Theory: Relativism Subjective Relativism: Relativism: each person decides right and wrong for himself or herself what s right for you may not be right for me there is no universal moral norms of right and wrong. Different individuals or groups with completely opposite views of a moral problem, and both can be right. Cultural Relativism: each society decides right and wrong for itself Cultural right and wrong rests with society s actual moral guidelines Problem: No framework for conflict between societies. 15 15
Some Consequences of Choosing Relativism as an Ethical Theory How can you distinguish between the lives of Adolph Hitler and Mother Teresa? Modified version: I can decide what s right for me as long as my actions don t hurt someone. solves the above dilemma, but what is harmful and what is not? 16 16
Study by C, Hampden-Turner and F. Trompenaars: Dilemma posed to people in 46 different countries You observe your best friend speeding 55 Km/h in a 30 Km/h zone. Your friend s lawyer wants you to testify under oath that your friend was under 30Km/h. What should you do? Would not testify to the lower speed Norwegians: 90% Yugoslavians: 10% Americans and Canadians: 75% Mexicans 50% cultural beliefs as to how much protection your friend has from you. Should these be accepted? 17 17
Arguments for Relativism Well-meaning and intelligent people (societies) can have totally opposite moral issues! Ethical debates are disagreeable and pointless. It is arrogant for one person (society) to judge another. Morality is reflected in actual behavior reflected in actual behavior. So, rather than trying to understand morality in a broad sense, just look at what people (societies) do. 18 18
Arguments Against Relativism as a Workable Theory The line between doing what you think is right and what you want to do is not sharply drawn. By allowing each person to decide right and wrong individually, there is no moral distinction between the actions of different people. No logic or reasoning to reach conclusions. Self-defeating to persuade others If you want to use your society's views as to right and wrong, which society will you consider yourself to be a member of? 19 19
Arguments Against Relativism as a Workable Theory No framework for reconciliations between people (or cultures) in conflict is provided. Most people do believe that most people (societies) do share some core values are these all we can use? Examples: Newborn babies are helpless and must be cared for. Slaughtering people indiscriminately is prohibited. 20 20
Ethical Theory: Divine Command Good and bad actions are determined by an interpretation of the will of a divine being or beings. God gives us an ultimate authority. We owe obedience to our creator. God is omniscient while we are not. 21 21
Arguments Against the Divine Command Theory many holy books, and some of their teachings disagree with each other. Some moral problems not addressed directly in the holy books. Unrealistic for a multicultural, secular society. The divine command theory is based on obedience, not reason. difficult to use to persuade skeptics whose religious beliefs are different than yours. 22 22
Some Consequences of Choosing Divine Command as an Ethical Theory If good means commanded by God, then good is arbitrary because Thou shall not kill human being or Thou shall kill human being you must obey! If you argue that there is no way God would command us to kill human being, because killing each other is bad!, So, there is a standard of right and wrong separate from God and you are not following the divine command theory! 23 23
Ethical Theories: Kantianism NOT on what we want to do, but what we ought to do in a situation out of respect for some appropriate moral rule. What makes a moral rule appropriate? Kant proposed the following answer to this question: Act only from moral rules that you can at the same time change to be universal moral laws. Or, Act so that you always treat both yourself and other people. Respect people Don t use people 25 24
Ethical Theories: Utilitarianism An action is right (or wrong) to the extent that it increases (or decreases) total happiness of affected parties. Action should be decided on the weight of good and harm that will result. Rule utilitarianism: adopt rules that if adopted will lead to the greatest increase in happiness 26 25
Ethical Theories: Social Contract Theory Living in a civilized society forces: The establishment of a set of moral rules A government to enforce these rules Rational people decide on moral rules (rights and duties) Negative rights include freedom of expression and privacy Positive rights obligate others to act for you, such as free education. 27 26
Applied Computer Ethics 28 27
How Does This Apply to Me? (Scott Adams http://www dilbert com 1/19/06) 29 28
Information Ethics How it might differ when using a computer: Scope Speed It seems different with a computer! 32 29
Areas of Ethical Problems Personal intrusion Privacy Fraud Security Resources Intellectual property Inappropriate use Technology and social responsibility 33 30
Computer Ethics Issues: Examples Computers in the Workplace Computer Crime Privacy and Anonymity Intellectual Property Professional Responsibility 34 31
Computer Ethics: Standards of Conduct 36 32
The Top Ten Rules of Computer Ethics 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 37 33
The Top Ten Rules of Computer Ethics (cont.) 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 38 34
The Top Ten Rules of Computer Ethics (cont.) 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10.Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans. (From the Computer Ethics Institute) 39 35
Commentary on the 10 Commandents 1.Thou shalt not use a computer to harm other people just people? Environment?animals? The environment is clearly harmed by the production and use of computers, and by the disposal of waste computers. making a bomb : program that handles the timing of the bomb bad to steal and destroy other people s books and notebooks: bad to access and destroy their files. 40 36
Commentary on the 10 Commandents (cont.) 2.Thou shalt not interfere with other people s s computer work Computer viruses: destroying files, taking huge amounts of computer time or memory, or by simply displaying annoying messages. 41 37
Commentary on the 10 Commandents (cont.) 3.Thou shalt not snoop around in other people s s files Reading other people s e-mail messages invading their privacy. should be judged the same way as breaking into their rooms and stealing their documents. may be protected by encryption. 42 38
Commentary on the 10 Commandents (cont.) 4.Thou shalt not use a computer to steal Breaking into bank accounts should be judged the same way as robbery. 5.Thou shalt not use a computer to bear false witness false "information", rumors, false propaganda about historical events is wrong. What if stealing or bearing false witness is the only way to prevent someone from doing a much greater harm? 43 39
Commentary on the 10 Commandents (cont.) 6.Thou shalt not use or copy software for which you have not paid like a book: Obtaining illegal copies of copyrighted software is as bad as photocopying a copyrighted book. 44 40
Commentary on the 10 Commandents (cont.) 7.Thou shalt not use other people s computer resources without authorization Multiuser systems use user id s and passwords to enforce their memory and time allocations, and to safeguard information. What if it is an emergency, and the only way to stop a great harm is to use computer resources without authorization? 45 41
Commentary on the 10 Commandents (cont.) 8.Thou shalt not appropriate other people s s intellectual output the programs you write Intellectual property is a form of ownership, and may be protected by copyright laws. 46 42
Commentary on the 10 Commandents (cont.) 9.Thou shalt think about the social consequences of the program you write producing animated films for children, you are responsible for their contents 47 43
Commentary on the 10 Commandents (cont.) 10.Thou shalt use a computer in ways that show consideration and respect Like public buses or banks: queuing Be creful, There s somebody over the line. 48 44
Food for Thought Email Issues Can people (secretly) read your e-mail? Who secretly reads your e-mail? Doesn't my password protect me? Doesn t my email vanish after I delete it? What motivates a snoop? Why do I need e-mail privacy? I've got nothing to hide. What can I do to have privacy? Where can I learn more about these privacy tools? Anything else I should know? 49 45
Computer Ethics: Academic Discipline 50 46
History of Computer Ethics as a Field of Study 1940s-1950s Norbert Wiener (MIT) Notes the social/ethical implications of computer technology Long before Nagasaki nd the public awareness of the atomic bomb, it had occurred to me that we were here in the presence of another social potentiality of unheard-of importance for good and for evil. (Cybernetics: or control and communication in the animal and the machine, pp. 27-28, 28, 1948) Published in 1950 computer ethics book The Human Use of Human Beings 51 47
History of Computer Ethics as a Field of Study 1960s Donn Parker(SRI International) Unethical and illegal uses of computers by computer professionals It seemed that when people entered the computer center they left their ethics at the door 1968: Led Code of Professional Conduct for the Association for Computing Machinery (ACM). Adopted by ACM in 1973. 1970s Walter Maner (ODU) Coined computer ethics computer ethics Created starter kit in Computer Ethics and gave workshops around country 52 48
History of Computer Ethics as a Field of Study 1970s Joseph Weizenbaum MIT CS created a program he called ELIZA imitation of psychotherapist engaged in initial interview with patient Outcry from psychotherapists computers would replace them Public began to see people as machines 53 49
History of Computer Ethics as a Field of Study 1980s Computer ethics becomes an academic discipline Public issues: Computer-enabled crime Disasters caused by computer failure Privacy invasion via databases Law suits over software ownership James Moor of Dartmouth College published article What is Computer Ethics Deborah Johnson published book Computer Ethics first textbook Terrell Ward Bynam & Maner created the first international disciplinary conference on computer ethics 54 50
History of Computer Ethics (some points of view) Any unique moral issues? Deborah Johnson: Ethics on-line. The scope of the Internet is global and interactive. The Internet enables users to interact with anonymity. Internet technology makes the reproducibility of information possible in ways not possible before. The above features make behavior on-line morally different than off-line. 55 51
History of Computer Ethics (some points of view) James Moore: Computer technology is logically malleable[flexible] unlike previous technologies. It can create new possibilities for human action. Brey: disclosing non-obvious features embedded in computer systems that can have moral implications. Alison Adams: Take into account gender-related biases. Combine feminist ethics with empirical studies. 56 52
History of Computer Ethics as a Field of Study 1990s Lots of research Freedom Democracy Knowledge Privacy Security Notion of (computer) professional ethics Computer professional == anyone involved in the design and development of computer artifacts (Gotterbarn, 1991) 57 53
Sample topics in computer ethics Computers in the workplace: a threat to jobs? Deskilling? Health and safety? Computer security: Viruses. Spying by hackers. Logical security: Privacy, integrity, unimpaired service, consistency, controlling access to resources. Software ownership: Intellectual property vs. open source. Software development: quality, safety 58 54
Computers in the workplace Monitoring of employees: employer vs. employee point of view. Health issues. A threat to jobs. De-skilling. 59 55
Computer security Viruses: programming code disguised Worms: propagate w/o human intervention Trojan horses: gets secretly installed. Logic bombs: execute conditionally. Computer crimes: embezzlement. Hackers: vandalism or exploration. Denial of service attack: flood a target site. 60 56
Logical security Privacy invasion of email, files, and own computer (cookies). Shared databases. Identity theft. 61 57
Software ownership Knowledge: private greed, public good. Digital divide is immoral. Open source software. North-South information flow. Indigenous knowledge. 62 58
Professional responsibility Codes of ethics. Professional organizations: ACM. IEEE, CPSR Licensing Industry certifications 63 59
Codes of ethics Avoid harm to others Be honest and trustworthy Acquire and maintain professional competence Know and respect existing laws pertaining to professional work Be honest and realistic in stating claims or estimates based on available data 64 60
Sources and Other Information Bynum, Terrell, "Computer Ethics: Basic Concepts and Historical Overview", The Stanford Encyclopedia of Philosophy (Winter 2001 Edition), Edward N. Zalta (ed.) <http://plato.stanford.edu/archives/win2001/entries/ethics-computer> Ethics in Computing: http://ethics.csc.ncsu.edu/ Computer Ethics Institute http://www.brook.edu/its/cei/cei_hp.htm 65 61
Sources and Other Information (cont d) Netiquette: RFC 1855 (rfc1855) - Netiquette Guidelines http://www.dtcc.edu/cs/rfc1855.html Netiquette Home Page http://www.albion.com/netiquette/ Netiquette (From Wikipedia, the free encyclopedia) http://en.wikipedia.org/wiki/netiquette 66 62
Summary Computer Ethics Field of study Set of rules or standards of behavior for dealing with computer technology Examples of issues in computer ethics How does computer ethics relate to your every day decisions? 10 Rules of Computer Ethics Netiquette 67 63
Second Homework Assignment Write an essay for the subject you talked about. Define the most important issue. Additional points for strong, consistent logic that supports your argument. Submit 1 copy: Electronic copy email File must be named <Title.FullName>.doc Privacy on the Internet.Ali B. Hashemi.doc 68 64