Computer Ethics(1) IT Engineering II Instructor: Ali B. Hashemi

Similar documents
Computer Ethics(1) Computer Ethics. Main Points. Communities Some General Comments(2) Communities Some General Comments(1)

CS305 Topic Introduction to Ethics

Introduction to Ethics

(i) Morality is a system; and (ii) It is a system comprised of moral rules and principles.

Social Context. Social Context

Philosophical Ethics. The nature of ethical analysis. Discussion based on Johnson, Computer Ethics, Chapter 2.

Tools Andrew Black CS 305 1

Evaluating actions The principle of utility Strengths Criticisms Act vs. rule

Soraj Hongladarom Department of Philosophy Chulalongkorn University Workshop on Env. Ethics and Energy Equity, April 3, 2013

THE TEN COMMANDMENTS FOR COMPUTER ETHICS. 5. Thou shalt not use a computer to bear false witness. (To tell lies about other people)

Basics of Ethics CS 215 Denbigh Starkey

PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING

Syllabus for THE 314 Systematic Theology II 3.0 Credit Hours Spring 2015

Ethics and Professional Issues for Computing

Ethics (ETHC) JHU-CTY Course Syllabus

Is euthanasia morally permissible? What is the relationship between patient autonomy,

Ethics. PHIL 181 Spring 2018 SUMMARY OBJECTIVES

Philosophy 2: Introduction to Philosophy Section 4170 Online Course El Camino College Spring, 2015

A Framework for Thinking Ethically

Philosophy 2: Introduction to Philosophy Section 2511, Room SOCS 205, 7:45-9:10am El Camino College Fall, 2014

Quorum Website Terms of Use

Computer Ethics. Normative Ethics Ethical Theories. Viola Schiaffonati October 4 th 2018

Syllabus. Mr. Israelsen Office: 7145 Beering Hall Spring Term Office Hours: Wednesday 12:30 2:00pm and by appointment

Chapter 2 Ethical Concepts and Ethical Theories: Establishing and Justifying a Moral System

EXERCISES, QUESTIONS, AND ACTIVITIES My Answers

KCHU 228 INTRO TO PHILOSOPHY FINAL PROJECT. The Instructors Requirements for the Project. Drafting and Submitting a Project Proposal (Due: 3/3/09)

Syllabus for THE 299 Introduction to Theology 3.0 Credit Hours Fall The purpose of this course is to enable the student to do the following:

Common Morality: Deciding What to Do 1

University of New Hampshire Spring Semester 2016 Philosophy : Ethics (Writing Intensive) Prof. Ruth Sample SYLLABUS

Chapter Summaries: Introduction to Christian Philosophy by Clark, Chapter 1

NORTH SOUTH UNIVERSITY DEPARTMENT OF HISTORY AND PHILOSOPHY DHAKA, BANGLADESH

REL 3148: RELIGION AND VIOLENCE Summer B 2016

Philosophy 101: Introduction to Philosophy Section 4152 Online Course El Camino College Spring, 2017

SYLLABUS. Department Syllabus. Philosophy of Religion

Lecture 6 Workable Ethical Theories I. Based on slides 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

PL-101: Introduction to Philosophy Fall of 2007, Juniata College Instructor: Xinli Wang

Philosophy Courses Fall 2011

Syllabus for THE 299 Introduction to Theology 3.0 Credit Hours Spring The purpose of this course is to enable the student to do the following:

Louisiana Law Review. Cheney C. Joseph Jr. Louisiana State University Law Center. Volume 35 Number 5 Special Issue Repository Citation

Computer Ethics. Normative Ethics and Normative Argumentation. Viola Schiaffonati October 10 th 2017

Socratic and Platonic Ethics

Encyclopedia of Information Ethics and Security

Course Coordinator Dr Melvin Chen Course Code. CY0002 Course Title. Ethics Pre-requisites. NIL No of AUs 3 Contact Hours

Becoming a Leader. Leadership Development. Foundational Principle. Definition of Leadership in the context of God s Kingdom 1/8/2015

Department of Philosophy. Module descriptions 2017/18. Level C (i.e. normally 1 st Yr.) Modules

Syllabus for THE 461 History of Christianity I: Early Church 3.0 Credit hours Fall 2014

GVV Pillar 1: Values. Teaching Notes for GVV Pillar 1: Values - Page 1 of 5

Take Home Exam #2. PHI 1700: Global Ethics Prof. Lauren R. Alpert

Thinking Ethically: A Framework for Moral Decision Making

VIEWING PERSPECTIVES

PH 101: Problems of Philosophy. Section 005, Monday & Thursday 11:00 a.m. - 12:20 p.m. Course Description:

An Introduction to Ethics / Moral Philosophy

POLI 27 Ethics and Society

OTTAWA ONLINE PHL Basic Issues in Philosophy

Argument Writing. Whooohoo!! Argument instruction is necessary * Argument comprehension is required in school assignments, standardized testing, job

Unfit for the Future

Introduction to Ethics

used. probably also have an ethically as that tell us behavior they find ethical sometimes do

Radical Centrism & the Redemption of Secular Philosophy

CHAPTER 2 Test Bank MULTIPLE CHOICE

Philosophy HL 1 IB Course Syllabus

Department of Philosophy

Ethical Theory for Catholic Professionals

Do we have responsibilities to future generations? Chris Groves

Employment Agreement

Lecture 6 Workable Ethical Theories I. Based on slides 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Kramer vs. Kramer: A Dialogical Approach to Court Debates. Angela Glass. December 7, Queens University of Charlotte

Chapter 1: Introduction to Communication Studies from A Primer on Communication Studies was adapted by The Saylor Foundation under a Creative Commons

Course Syllabus. Course Description: Objectives for this course include: PHILOSOPHY 333

Philosophy 1100 Honors Introduction to Ethics

Consider the situation as local parents of children who swim in the lake. Would they agree that the excess is a "mere technicality"?

Knowledge, Reality, and Values CORC 1210 SYLLABUS

Ethics is subjective.

Morality in the Modern World (Higher) Religious, Moral and Philosophical Studies (Higher)

Lecture 8. Ethics in Science

Introduction to Philosophy Philosophy 110 Fall Term 2010 Purdue University Instructor: Daniel Kelly

Consider... Ethical Egoism. Rachels. Consider... Theories about Human Motivations

Syllabus for GTHE 551 Systematic Theology I - ONLINE 3 Credit Hours Fall 2014

PHILOSOPHY 144, Moral Issues (Makinster) ~ Saturday mornings, Room MS 117. Section 70 ~ 10:50 1:30. Spring Why Study Philosophy?

Syllabus for BIB 349 Israel in Christian Theology 3.0 Credit hours Fall 2014

Georgia Quality Core Curriculum 9 12 English/Language Arts Course: American Literature/Composition

Lecture 9. A summary of scientific methods Realism and Anti-realism

Philosophy 1100 Introduction to Ethics

Outline Lesson 2 - Philosophy & Ethics: Says Who?

-Montaigne, Essays- -Epicurus, quoted by Diogenes Laertius-

Introduction to Philosophy Philosophy 110 CRN Sec 018 Fall Term 2009 Purdue University Instructor: Daniel Kelly

GGV Pillar 7: Reasons & Rationalizations

Academic argument does not mean conflict or competition; an argument is a set of reasons which support, or lead to, a conclusion.

Chapter 3 PHILOSOPHICAL ETHICS AND BUSINESS CHAPTER OBJECTIVES. After exploring this chapter, you will be able to:

Critical Reasoning and Moral theory day 3

Q2) The test of an ethical argument lies in the fact that others need to be able to follow it and come to the same result.

Philosophical Ethics Syllabus-Summer 2018

think that people are generally moral relativists. I will argue that people really do believe in moral

ETHICS IN ENGINEERING. Lecture 2/4

PHILOSOPHY. Chair: Karánn Durland (Fall 2018) and Mark Hébert (Spring 2019) Emeritus: Roderick Stewart

Introduction to culture and worldview analysis. Asking questions to better understand ourselves and others

Introduction to Philosophy Crito. Instructor: Jason Sheley

TH 501 Semlink+: Theology Survey I Spring 2019 All Campuses

Thank you for taking this first step in choosing Hernando Christian Academy as your comprehensive educational partner in your child s education!

10/12/2015. Karen Russom, CPA, CMA, CIA, CGMA

Transcription:

Computer Ethics(1) IT Engineering II Instructor: Ali B. Hashemi 1 1

Main Points Computer Ethics Set of rules or standards of behavior for dealing with computer technology Academic field of study Examples of Issues in Computer Ethics How does computer ethics relate to your every day decisions? 2 2

Communities Some General Comments(1) (1) Forming communities allows us to enjoy better lives than if we lived in isolation. Instead of each person assuming responsibility for all of his or her needs such as housing, food, education, clothing, health care, etc., individuals can specialize and exchange goods and services with others. Normally, forming communities allows for an increase in the quality of life for all. 3 3

Communities Some General Comments(2) (2) But, there is a price associated with being part of a community. Communities may prohibit some actions and make other actions obligatory. Those who do not conform with the prohibitions and obligations can be punished. However, the fact that most people do live in communities provides strong evidence that the advantages of community life outweigh the disadvantages. 4 4

Defining Terms Society An association of people under a system of rules designed to advance the good of its members over time. Morality Each society has rules of conduct describing what people ought and ought not to do in various situations. Ethics the philosophical study of morality i.e. a rational examination of peoples moral beliefs and behavior. Law Some moral rules are enacted into laws for a society. must be obeyed or penalties are incurred. 5 5

What is Moral? mor al (môr¹el, mòr¹-) adjective 1. Of or concerned with the judgment of the goodness or badness of human action and character (relating to principles of right and wrong) 2. Teaching or exhibiting goodness or correctness of character and behavior: a moral lesson. 3. Conforming to standards of what is right or just in behavior; a moral life. 6 6

What is Ethics? eth ic (èth¹îk) noun a. A set of principles of right conduct. b. A theory or a system of moral values. 1. ethics (used with a sing. verb). The study of the general nature of morals and of the specific moral choices to be made by a person; moral philosophy. 2. ethics (used with a sing. or pl. verb). The rules or standards governing the conduct of a person or the members of a profession: Computer ethics. 7 7

Controls on Human Behavior Courtesy (politeness ) Law Ethics 8 8

The Scope of Behavioral Rules Individuals Organizations / Groups Society / Government 9 9

Ethical Theories The formal study of ethics: at least 2,400 years to the Greeks. In Plato s dialogue, called the Crito, Socrates uses ethical reasoning to explain why he ought to face an unjust death penalty rather than flee into exile with his family. Lots of Since ethical theories, Why should we know? examining your own conclusions about various scenarios we will study 10 10

Ethical Theories (2) some commonly studied theories ones how they can be used when making ethical judgments. An ethical theory should make it possible for a person to present a persuasive, logical argument to a diverse audience of skeptical, yet open-minded people. 11 11

Ethical Theories (3) In the following make sense of the ethical questions: What is the good? How should we live our lives to be a good person? How should we act? What is the difference between right and wrong? Moralities or moral codes can differ by time and place. ethical problem of choosing between different moralities. In this course we will consider behavior that arises because of the use of computers in the society. 12 12

The Ethical Theories We Will Consider Relativism Subjective and Cultural Divine Command Kantianism Act Utilitarianism Rule Utilitarianism Social Contract In each case, the following will be presented A definition of the theory Some scenario analysis with the theory assumed to be the guideline for decision making. Arguments for the use of the theory Arguments against the use of the theory 13 13

Caution: One Underlying Assumption I Am Making Accepting an ethical theory that allows people to make decisions based on something other than reason. In order to persuading of others that our solutions to actual moral problems are correct (our goal). 14 14

Ethical Theory: Relativism Subjective Relativism: Relativism: each person decides right and wrong for himself or herself what s right for you may not be right for me there is no universal moral norms of right and wrong. Different individuals or groups with completely opposite views of a moral problem, and both can be right. Cultural Relativism: each society decides right and wrong for itself Cultural right and wrong rests with society s actual moral guidelines Problem: No framework for conflict between societies. 15 15

Some Consequences of Choosing Relativism as an Ethical Theory How can you distinguish between the lives of Adolph Hitler and Mother Teresa? Modified version: I can decide what s right for me as long as my actions don t hurt someone. solves the above dilemma, but what is harmful and what is not? 16 16

Study by C, Hampden-Turner and F. Trompenaars: Dilemma posed to people in 46 different countries You observe your best friend speeding 55 Km/h in a 30 Km/h zone. Your friend s lawyer wants you to testify under oath that your friend was under 30Km/h. What should you do? Would not testify to the lower speed Norwegians: 90% Yugoslavians: 10% Americans and Canadians: 75% Mexicans 50% cultural beliefs as to how much protection your friend has from you. Should these be accepted? 17 17

Arguments for Relativism Well-meaning and intelligent people (societies) can have totally opposite moral issues! Ethical debates are disagreeable and pointless. It is arrogant for one person (society) to judge another. Morality is reflected in actual behavior reflected in actual behavior. So, rather than trying to understand morality in a broad sense, just look at what people (societies) do. 18 18

Arguments Against Relativism as a Workable Theory The line between doing what you think is right and what you want to do is not sharply drawn. By allowing each person to decide right and wrong individually, there is no moral distinction between the actions of different people. No logic or reasoning to reach conclusions. Self-defeating to persuade others If you want to use your society's views as to right and wrong, which society will you consider yourself to be a member of? 19 19

Arguments Against Relativism as a Workable Theory No framework for reconciliations between people (or cultures) in conflict is provided. Most people do believe that most people (societies) do share some core values are these all we can use? Examples: Newborn babies are helpless and must be cared for. Slaughtering people indiscriminately is prohibited. 20 20

Ethical Theory: Divine Command Good and bad actions are determined by an interpretation of the will of a divine being or beings. God gives us an ultimate authority. We owe obedience to our creator. God is omniscient while we are not. 21 21

Arguments Against the Divine Command Theory many holy books, and some of their teachings disagree with each other. Some moral problems not addressed directly in the holy books. Unrealistic for a multicultural, secular society. The divine command theory is based on obedience, not reason. difficult to use to persuade skeptics whose religious beliefs are different than yours. 22 22

Some Consequences of Choosing Divine Command as an Ethical Theory If good means commanded by God, then good is arbitrary because Thou shall not kill human being or Thou shall kill human being you must obey! If you argue that there is no way God would command us to kill human being, because killing each other is bad!, So, there is a standard of right and wrong separate from God and you are not following the divine command theory! 23 23

Ethical Theories: Kantianism NOT on what we want to do, but what we ought to do in a situation out of respect for some appropriate moral rule. What makes a moral rule appropriate? Kant proposed the following answer to this question: Act only from moral rules that you can at the same time change to be universal moral laws. Or, Act so that you always treat both yourself and other people. Respect people Don t use people 25 24

Ethical Theories: Utilitarianism An action is right (or wrong) to the extent that it increases (or decreases) total happiness of affected parties. Action should be decided on the weight of good and harm that will result. Rule utilitarianism: adopt rules that if adopted will lead to the greatest increase in happiness 26 25

Ethical Theories: Social Contract Theory Living in a civilized society forces: The establishment of a set of moral rules A government to enforce these rules Rational people decide on moral rules (rights and duties) Negative rights include freedom of expression and privacy Positive rights obligate others to act for you, such as free education. 27 26

Applied Computer Ethics 28 27

How Does This Apply to Me? (Scott Adams http://www dilbert com 1/19/06) 29 28

Information Ethics How it might differ when using a computer: Scope Speed It seems different with a computer! 32 29

Areas of Ethical Problems Personal intrusion Privacy Fraud Security Resources Intellectual property Inappropriate use Technology and social responsibility 33 30

Computer Ethics Issues: Examples Computers in the Workplace Computer Crime Privacy and Anonymity Intellectual Property Professional Responsibility 34 31

Computer Ethics: Standards of Conduct 36 32

The Top Ten Rules of Computer Ethics 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 37 33

The Top Ten Rules of Computer Ethics (cont.) 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 38 34

The Top Ten Rules of Computer Ethics (cont.) 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10.Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans. (From the Computer Ethics Institute) 39 35

Commentary on the 10 Commandents 1.Thou shalt not use a computer to harm other people just people? Environment?animals? The environment is clearly harmed by the production and use of computers, and by the disposal of waste computers. making a bomb : program that handles the timing of the bomb bad to steal and destroy other people s books and notebooks: bad to access and destroy their files. 40 36

Commentary on the 10 Commandents (cont.) 2.Thou shalt not interfere with other people s s computer work Computer viruses: destroying files, taking huge amounts of computer time or memory, or by simply displaying annoying messages. 41 37

Commentary on the 10 Commandents (cont.) 3.Thou shalt not snoop around in other people s s files Reading other people s e-mail messages invading their privacy. should be judged the same way as breaking into their rooms and stealing their documents. may be protected by encryption. 42 38

Commentary on the 10 Commandents (cont.) 4.Thou shalt not use a computer to steal Breaking into bank accounts should be judged the same way as robbery. 5.Thou shalt not use a computer to bear false witness false "information", rumors, false propaganda about historical events is wrong. What if stealing or bearing false witness is the only way to prevent someone from doing a much greater harm? 43 39

Commentary on the 10 Commandents (cont.) 6.Thou shalt not use or copy software for which you have not paid like a book: Obtaining illegal copies of copyrighted software is as bad as photocopying a copyrighted book. 44 40

Commentary on the 10 Commandents (cont.) 7.Thou shalt not use other people s computer resources without authorization Multiuser systems use user id s and passwords to enforce their memory and time allocations, and to safeguard information. What if it is an emergency, and the only way to stop a great harm is to use computer resources without authorization? 45 41

Commentary on the 10 Commandents (cont.) 8.Thou shalt not appropriate other people s s intellectual output the programs you write Intellectual property is a form of ownership, and may be protected by copyright laws. 46 42

Commentary on the 10 Commandents (cont.) 9.Thou shalt think about the social consequences of the program you write producing animated films for children, you are responsible for their contents 47 43

Commentary on the 10 Commandents (cont.) 10.Thou shalt use a computer in ways that show consideration and respect Like public buses or banks: queuing Be creful, There s somebody over the line. 48 44

Food for Thought Email Issues Can people (secretly) read your e-mail? Who secretly reads your e-mail? Doesn't my password protect me? Doesn t my email vanish after I delete it? What motivates a snoop? Why do I need e-mail privacy? I've got nothing to hide. What can I do to have privacy? Where can I learn more about these privacy tools? Anything else I should know? 49 45

Computer Ethics: Academic Discipline 50 46

History of Computer Ethics as a Field of Study 1940s-1950s Norbert Wiener (MIT) Notes the social/ethical implications of computer technology Long before Nagasaki nd the public awareness of the atomic bomb, it had occurred to me that we were here in the presence of another social potentiality of unheard-of importance for good and for evil. (Cybernetics: or control and communication in the animal and the machine, pp. 27-28, 28, 1948) Published in 1950 computer ethics book The Human Use of Human Beings 51 47

History of Computer Ethics as a Field of Study 1960s Donn Parker(SRI International) Unethical and illegal uses of computers by computer professionals It seemed that when people entered the computer center they left their ethics at the door 1968: Led Code of Professional Conduct for the Association for Computing Machinery (ACM). Adopted by ACM in 1973. 1970s Walter Maner (ODU) Coined computer ethics computer ethics Created starter kit in Computer Ethics and gave workshops around country 52 48

History of Computer Ethics as a Field of Study 1970s Joseph Weizenbaum MIT CS created a program he called ELIZA imitation of psychotherapist engaged in initial interview with patient Outcry from psychotherapists computers would replace them Public began to see people as machines 53 49

History of Computer Ethics as a Field of Study 1980s Computer ethics becomes an academic discipline Public issues: Computer-enabled crime Disasters caused by computer failure Privacy invasion via databases Law suits over software ownership James Moor of Dartmouth College published article What is Computer Ethics Deborah Johnson published book Computer Ethics first textbook Terrell Ward Bynam & Maner created the first international disciplinary conference on computer ethics 54 50

History of Computer Ethics (some points of view) Any unique moral issues? Deborah Johnson: Ethics on-line. The scope of the Internet is global and interactive. The Internet enables users to interact with anonymity. Internet technology makes the reproducibility of information possible in ways not possible before. The above features make behavior on-line morally different than off-line. 55 51

History of Computer Ethics (some points of view) James Moore: Computer technology is logically malleable[flexible] unlike previous technologies. It can create new possibilities for human action. Brey: disclosing non-obvious features embedded in computer systems that can have moral implications. Alison Adams: Take into account gender-related biases. Combine feminist ethics with empirical studies. 56 52

History of Computer Ethics as a Field of Study 1990s Lots of research Freedom Democracy Knowledge Privacy Security Notion of (computer) professional ethics Computer professional == anyone involved in the design and development of computer artifacts (Gotterbarn, 1991) 57 53

Sample topics in computer ethics Computers in the workplace: a threat to jobs? Deskilling? Health and safety? Computer security: Viruses. Spying by hackers. Logical security: Privacy, integrity, unimpaired service, consistency, controlling access to resources. Software ownership: Intellectual property vs. open source. Software development: quality, safety 58 54

Computers in the workplace Monitoring of employees: employer vs. employee point of view. Health issues. A threat to jobs. De-skilling. 59 55

Computer security Viruses: programming code disguised Worms: propagate w/o human intervention Trojan horses: gets secretly installed. Logic bombs: execute conditionally. Computer crimes: embezzlement. Hackers: vandalism or exploration. Denial of service attack: flood a target site. 60 56

Logical security Privacy invasion of email, files, and own computer (cookies). Shared databases. Identity theft. 61 57

Software ownership Knowledge: private greed, public good. Digital divide is immoral. Open source software. North-South information flow. Indigenous knowledge. 62 58

Professional responsibility Codes of ethics. Professional organizations: ACM. IEEE, CPSR Licensing Industry certifications 63 59

Codes of ethics Avoid harm to others Be honest and trustworthy Acquire and maintain professional competence Know and respect existing laws pertaining to professional work Be honest and realistic in stating claims or estimates based on available data 64 60

Sources and Other Information Bynum, Terrell, "Computer Ethics: Basic Concepts and Historical Overview", The Stanford Encyclopedia of Philosophy (Winter 2001 Edition), Edward N. Zalta (ed.) <http://plato.stanford.edu/archives/win2001/entries/ethics-computer> Ethics in Computing: http://ethics.csc.ncsu.edu/ Computer Ethics Institute http://www.brook.edu/its/cei/cei_hp.htm 65 61

Sources and Other Information (cont d) Netiquette: RFC 1855 (rfc1855) - Netiquette Guidelines http://www.dtcc.edu/cs/rfc1855.html Netiquette Home Page http://www.albion.com/netiquette/ Netiquette (From Wikipedia, the free encyclopedia) http://en.wikipedia.org/wiki/netiquette 66 62

Summary Computer Ethics Field of study Set of rules or standards of behavior for dealing with computer technology Examples of issues in computer ethics How does computer ethics relate to your every day decisions? 10 Rules of Computer Ethics Netiquette 67 63

Second Homework Assignment Write an essay for the subject you talked about. Define the most important issue. Additional points for strong, consistent logic that supports your argument. Submit 1 copy: Electronic copy email File must be named <Title.FullName>.doc Privacy on the Internet.Ali B. Hashemi.doc 68 64