SlideShare a Scribd company logo

Ethics

computer ethics

1 of 22
Download to read offline
Computer Ethics
A Necessarily Brief Introduction
Ethics
Each society establishes rules and limits
on accaptable behaviour
These rules form a moral code
Sometimes the rules conflict
In general they are beliefs or conventions
on good and evil, good or bad conduct,
justice and injustice
The rules sometimes do not cover new
situations
Examples:
Employee monitoring.
Downloading music using Napster
software at no charge.
Robert Hansen, FBI agent, convicted
for providing information to Russia.
DoubleClick sued for planning to
reveal Web users identities.
Plagiarism.
Hackers defaced Web sites.
The world is changing
Introduction
In the industrialized world computers are changing
everything: from education to health, from voting to
making friends or making war.
Developing countries can also fully participate in
cyberspace and make use of opportunities offered by global
networks.
We are living a technological and informational revolution.
It is therefore important for policy makers, leaders,
teachers, computer professionals and all social thinkers to
get involved in the social and ethical impacts of this
communication technology.
Cyberethics and cybertechnology
Definitions.
Cyberethics is the field of applied ethics
that examines moral, legal, and social
issues in the development and use of
cybertechnology.
Cybertechnology refers to a broad range
of technologies from stand-alone
computers to the cluster of networked
computing, information and communication
technologies.
Internet ethics and information ethics.

Recommended

Ict2 somehistoricalmilestone-ja barrientos
Ict2 somehistoricalmilestone-ja barrientosIct2 somehistoricalmilestone-ja barrientos
Ict2 somehistoricalmilestone-ja barrientosJonnalyn Barrientos
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in ITRohana K Amarakoon
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 versionJohan Koren
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentationshannoncmorris
 
Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 versionJohan Koren
 

More Related Content

What's hot

Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations121487
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette JessamenTino21
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resourcesb5thom
 
Cyberspace
CyberspaceCyberspace
CyberspaceG Prachi
 
Internet Applications
Internet ApplicationsInternet Applications
Internet ApplicationsMarlon Jamera
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemFaHaD .H. NooR
 
Webinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenCapitolTechU
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethicssmartinson
 
Presentation to esl class
Presentation to esl classPresentation to esl class
Presentation to esl classLaura Perry
 
Internet safety cyberbullying
Internet safety cyberbullyingInternet safety cyberbullying
Internet safety cyberbullyingJMFarkas
 
Steve Luczynski Mitigating Aviation Cyber Risk
Steve Luczynski  Mitigating Aviation Cyber RiskSteve Luczynski  Mitigating Aviation Cyber Risk
Steve Luczynski Mitigating Aviation Cyber RiskCapitolTechU
 
Information ethics
Information ethicsInformation ethics
Information ethicsomercomail
 
The Domestication of the Internet in Germany (1997-2007). Online Access and I...
The Domestication of the Internet in Germany (1997-2007). Online Access and I...The Domestication of the Internet in Germany (1997-2007). Online Access and I...
The Domestication of the Internet in Germany (1997-2007). Online Access and I...Cocoloris
 

What's hot (20)

Social, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and InnovationsSocial, Legal and Ethical Issues in Educational Technology and Innovations
Social, Legal and Ethical Issues in Educational Technology and Innovations
 
Internet research ethics
Internet research ethicsInternet research ethics
Internet research ethics
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Internet benefits and pitfalls
Internet   benefits and pitfallsInternet   benefits and pitfalls
Internet benefits and pitfalls
 
Online Ethics and Etiquette
Online Ethics and Etiquette Online Ethics and Etiquette
Online Ethics and Etiquette
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resources
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Ppt lesson 17
Ppt lesson 17Ppt lesson 17
Ppt lesson 17
 
Internet Applications
Internet ApplicationsInternet Applications
Internet Applications
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 
Webinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aiken
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethics
 
Internet
InternetInternet
Internet
 
Presentation to esl class
Presentation to esl classPresentation to esl class
Presentation to esl class
 
Internet safety cyberbullying
Internet safety cyberbullyingInternet safety cyberbullying
Internet safety cyberbullying
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
Steve Luczynski Mitigating Aviation Cyber Risk
Steve Luczynski  Mitigating Aviation Cyber RiskSteve Luczynski  Mitigating Aviation Cyber Risk
Steve Luczynski Mitigating Aviation Cyber Risk
 
Information ethics
Information ethicsInformation ethics
Information ethics
 
The Domestication of the Internet in Germany (1997-2007). Online Access and I...
The Domestication of the Internet in Germany (1997-2007). Online Access and I...The Domestication of the Internet in Germany (1997-2007). Online Access and I...
The Domestication of the Internet in Germany (1997-2007). Online Access and I...
 

Similar to Ethics

Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxOxfordRiNorth
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethicsSaqib Raza
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethicssyed ahmed
 

Similar to Ethics (20)

Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Introduction to ethics 1
Introduction to ethics 1Introduction to ethics 1
Introduction to ethics 1
 
What Are The Ethics Of Computer Ethics
What Are The Ethics Of Computer EthicsWhat Are The Ethics Of Computer Ethics
What Are The Ethics Of Computer Ethics
 
The Problem Of Computer Ethics
The Problem Of Computer EthicsThe Problem Of Computer Ethics
The Problem Of Computer Ethics
 
Computer Ethics Essay
Computer Ethics EssayComputer Ethics Essay
Computer Ethics Essay
 
Persuasive Essay On Computer Ethics
Persuasive Essay On Computer EthicsPersuasive Essay On Computer Ethics
Persuasive Essay On Computer Ethics
 
Computer Ethics And Its Effect On Society
Computer Ethics And Its Effect On SocietyComputer Ethics And Its Effect On Society
Computer Ethics And Its Effect On Society
 
Ethics In Computer Ethics
Ethics In Computer EthicsEthics In Computer Ethics
Ethics In Computer Ethics
 
An ABC of cyberethics
An ABC of cyberethicsAn ABC of cyberethics
An ABC of cyberethics
 
Computer Ethics And Information Systems
Computer Ethics And Information SystemsComputer Ethics And Information Systems
Computer Ethics And Information Systems
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
a.pptx
a.pptxa.pptx
a.pptx
 
Information Ethics Essay
Information Ethics EssayInformation Ethics Essay
Information Ethics Essay
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethics
 
Computer Engineering Ethics
Computer Engineering EthicsComputer Engineering Ethics
Computer Engineering Ethics
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 

More from chrisjosewanjira

More from chrisjosewanjira (7)

Private cloud reference model ms
Private cloud reference model msPrivate cloud reference model ms
Private cloud reference model ms
 
Ethics
EthicsEthics
Ethics
 
Telecommunications architectures and standards
Telecommunications architectures and standardsTelecommunications architectures and standards
Telecommunications architectures and standards
 
E business models
E business modelsE business models
E business models
 
Computer components
Computer componentsComputer components
Computer components
 
Threads
ThreadsThreads
Threads
 
Mechanistic systems
Mechanistic systemsMechanistic systems
Mechanistic systems
 

Recently uploaded

Building Products That Think- Bhaskaran Srinivasan & Ashish Gupta
Building Products That Think- Bhaskaran Srinivasan & Ashish GuptaBuilding Products That Think- Bhaskaran Srinivasan & Ashish Gupta
Building Products That Think- Bhaskaran Srinivasan & Ashish GuptaISPMAIndia
 
Launching New Products In Companies Where It Matters Most by Product Director...
Launching New Products In Companies Where It Matters Most by Product Director...Launching New Products In Companies Where It Matters Most by Product Director...
Launching New Products In Companies Where It Matters Most by Product Director...Product School
 
Synergy in Leadership and Product Excellence: A Blueprint for Growth by CPO, ...
Synergy in Leadership and Product Excellence: A Blueprint for Growth by CPO, ...Synergy in Leadership and Product Excellence: A Blueprint for Growth by CPO, ...
Synergy in Leadership and Product Excellence: A Blueprint for Growth by CPO, ...Product School
 
Pragmatic UI testing with Compose Semantics.pdf
Pragmatic UI testing with Compose Semantics.pdfPragmatic UI testing with Compose Semantics.pdf
Pragmatic UI testing with Compose Semantics.pdfinfogdgmi
 
Battle of React State Managers in frontend applications
Battle of React State Managers in frontend applicationsBattle of React State Managers in frontend applications
Battle of React State Managers in frontend applicationsEvangelia Mitsopoulou
 
Mind your App Footprint 🐾⚡️🌱 (@FlutterHeroes 2024)
Mind your App Footprint 🐾⚡️🌱 (@FlutterHeroes 2024)Mind your App Footprint 🐾⚡️🌱 (@FlutterHeroes 2024)
Mind your App Footprint 🐾⚡️🌱 (@FlutterHeroes 2024)François
 
HBR SERIES METAL HOUSED RESISTORS POWER ELECTRICAL ABSORBS HIGH CURRENT DURIN...
HBR SERIES METAL HOUSED RESISTORS POWER ELECTRICAL ABSORBS HIGH CURRENT DURIN...HBR SERIES METAL HOUSED RESISTORS POWER ELECTRICAL ABSORBS HIGH CURRENT DURIN...
HBR SERIES METAL HOUSED RESISTORS POWER ELECTRICAL ABSORBS HIGH CURRENT DURIN...htrindia
 
My Journey towards Artificial Intelligence
My Journey towards Artificial IntelligenceMy Journey towards Artificial Intelligence
My Journey towards Artificial IntelligenceVijayananda Mohire
 
Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31
Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31
Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31shyamraj55
 
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...UiPathCommunity
 
The Future of Product, by Founder & CEO, Product School
The Future of Product, by Founder & CEO, Product SchoolThe Future of Product, by Founder & CEO, Product School
The Future of Product, by Founder & CEO, Product SchoolProduct School
 
"DevOps Practisting Platform on EKS with Karpenter autoscaling", Dmytro Kozhevin
"DevOps Practisting Platform on EKS with Karpenter autoscaling", Dmytro Kozhevin"DevOps Practisting Platform on EKS with Karpenter autoscaling", Dmytro Kozhevin
"DevOps Practisting Platform on EKS with Karpenter autoscaling", Dmytro KozhevinFwdays
 
Power of 2024 - WITforce Odyssey.pptx.pdf
Power of 2024 - WITforce Odyssey.pptx.pdfPower of 2024 - WITforce Odyssey.pptx.pdf
Power of 2024 - WITforce Odyssey.pptx.pdfkatalinjordans1
 
AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...
AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...
AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...ISPMAIndia
 
LF Energy Webinar: Introduction to TROLIE
LF Energy Webinar: Introduction to TROLIELF Energy Webinar: Introduction to TROLIE
LF Energy Webinar: Introduction to TROLIEDanBrown980551
 
Revolutionizing The Banking Industry: The Monzo Way by CPO, Monzo
Revolutionizing The Banking Industry: The Monzo Way by CPO, MonzoRevolutionizing The Banking Industry: The Monzo Way by CPO, Monzo
Revolutionizing The Banking Industry: The Monzo Way by CPO, MonzoProduct School
 
From Challenger to Champion: How SpiraPlan Outperforms JIRA+Plugins
From Challenger to Champion: How SpiraPlan Outperforms JIRA+PluginsFrom Challenger to Champion: How SpiraPlan Outperforms JIRA+Plugins
From Challenger to Champion: How SpiraPlan Outperforms JIRA+PluginsInflectra
 
How AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxHow AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxInfosec
 
"Testing of Helm Charts or There and Back Again", Yura Rochniak
"Testing of Helm Charts or There and Back Again", Yura Rochniak"Testing of Helm Charts or There and Back Again", Yura Rochniak
"Testing of Helm Charts or There and Back Again", Yura RochniakFwdays
 

Recently uploaded (20)

Building Products That Think- Bhaskaran Srinivasan & Ashish Gupta
Building Products That Think- Bhaskaran Srinivasan & Ashish GuptaBuilding Products That Think- Bhaskaran Srinivasan & Ashish Gupta
Building Products That Think- Bhaskaran Srinivasan & Ashish Gupta
 
Launching New Products In Companies Where It Matters Most by Product Director...
Launching New Products In Companies Where It Matters Most by Product Director...Launching New Products In Companies Where It Matters Most by Product Director...
Launching New Products In Companies Where It Matters Most by Product Director...
 
Synergy in Leadership and Product Excellence: A Blueprint for Growth by CPO, ...
Synergy in Leadership and Product Excellence: A Blueprint for Growth by CPO, ...Synergy in Leadership and Product Excellence: A Blueprint for Growth by CPO, ...
Synergy in Leadership and Product Excellence: A Blueprint for Growth by CPO, ...
 
Pragmatic UI testing with Compose Semantics.pdf
Pragmatic UI testing with Compose Semantics.pdfPragmatic UI testing with Compose Semantics.pdf
Pragmatic UI testing with Compose Semantics.pdf
 
Battle of React State Managers in frontend applications
Battle of React State Managers in frontend applicationsBattle of React State Managers in frontend applications
Battle of React State Managers in frontend applications
 
Mind your App Footprint 🐾⚡️🌱 (@FlutterHeroes 2024)
Mind your App Footprint 🐾⚡️🌱 (@FlutterHeroes 2024)Mind your App Footprint 🐾⚡️🌱 (@FlutterHeroes 2024)
Mind your App Footprint 🐾⚡️🌱 (@FlutterHeroes 2024)
 
HBR SERIES METAL HOUSED RESISTORS POWER ELECTRICAL ABSORBS HIGH CURRENT DURIN...
HBR SERIES METAL HOUSED RESISTORS POWER ELECTRICAL ABSORBS HIGH CURRENT DURIN...HBR SERIES METAL HOUSED RESISTORS POWER ELECTRICAL ABSORBS HIGH CURRENT DURIN...
HBR SERIES METAL HOUSED RESISTORS POWER ELECTRICAL ABSORBS HIGH CURRENT DURIN...
 
My Journey towards Artificial Intelligence
My Journey towards Artificial IntelligenceMy Journey towards Artificial Intelligence
My Journey towards Artificial Intelligence
 
In sharing we trust. Taking advantage of a diverse consortium to build a tran...
In sharing we trust. Taking advantage of a diverse consortium to build a tran...In sharing we trust. Taking advantage of a diverse consortium to build a tran...
In sharing we trust. Taking advantage of a diverse consortium to build a tran...
 
Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31
Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31
Unleash the Solace Pub Sub connector | Banaglore MuleSoft Meetup #31
 
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...
 
The Future of Product, by Founder & CEO, Product School
The Future of Product, by Founder & CEO, Product SchoolThe Future of Product, by Founder & CEO, Product School
The Future of Product, by Founder & CEO, Product School
 
"DevOps Practisting Platform on EKS with Karpenter autoscaling", Dmytro Kozhevin
"DevOps Practisting Platform on EKS with Karpenter autoscaling", Dmytro Kozhevin"DevOps Practisting Platform on EKS with Karpenter autoscaling", Dmytro Kozhevin
"DevOps Practisting Platform on EKS with Karpenter autoscaling", Dmytro Kozhevin
 
Power of 2024 - WITforce Odyssey.pptx.pdf
Power of 2024 - WITforce Odyssey.pptx.pdfPower of 2024 - WITforce Odyssey.pptx.pdf
Power of 2024 - WITforce Odyssey.pptx.pdf
 
AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...
AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...
AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...
 
LF Energy Webinar: Introduction to TROLIE
LF Energy Webinar: Introduction to TROLIELF Energy Webinar: Introduction to TROLIE
LF Energy Webinar: Introduction to TROLIE
 
Revolutionizing The Banking Industry: The Monzo Way by CPO, Monzo
Revolutionizing The Banking Industry: The Monzo Way by CPO, MonzoRevolutionizing The Banking Industry: The Monzo Way by CPO, Monzo
Revolutionizing The Banking Industry: The Monzo Way by CPO, Monzo
 
From Challenger to Champion: How SpiraPlan Outperforms JIRA+Plugins
From Challenger to Champion: How SpiraPlan Outperforms JIRA+PluginsFrom Challenger to Champion: How SpiraPlan Outperforms JIRA+Plugins
From Challenger to Champion: How SpiraPlan Outperforms JIRA+Plugins
 
How AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptxHow AI and ChatGPT are changing cybersecurity forever.pptx
How AI and ChatGPT are changing cybersecurity forever.pptx
 
"Testing of Helm Charts or There and Back Again", Yura Rochniak
"Testing of Helm Charts or There and Back Again", Yura Rochniak"Testing of Helm Charts or There and Back Again", Yura Rochniak
"Testing of Helm Charts or There and Back Again", Yura Rochniak
 

Ethics

  • 1. Computer Ethics A Necessarily Brief Introduction
  • 2. Ethics Each society establishes rules and limits on accaptable behaviour These rules form a moral code Sometimes the rules conflict In general they are beliefs or conventions on good and evil, good or bad conduct, justice and injustice The rules sometimes do not cover new situations
  • 3. Examples: Employee monitoring. Downloading music using Napster software at no charge. Robert Hansen, FBI agent, convicted for providing information to Russia. DoubleClick sued for planning to reveal Web users identities. Plagiarism. Hackers defaced Web sites.
  • 4. The world is changing
  • 5. Introduction In the industrialized world computers are changing everything: from education to health, from voting to making friends or making war. Developing countries can also fully participate in cyberspace and make use of opportunities offered by global networks. We are living a technological and informational revolution. It is therefore important for policy makers, leaders, teachers, computer professionals and all social thinkers to get involved in the social and ethical impacts of this communication technology.
  • 6. Cyberethics and cybertechnology Definitions. Cyberethics is the field of applied ethics that examines moral, legal, and social issues in the development and use of cybertechnology. Cybertechnology refers to a broad range of technologies from stand-alone computers to the cluster of networked computing, information and communication technologies. Internet ethics and information ethics.
  • 7. Computer ethics: definition Same as cyberethics, or The study of ethical issues that are associated primarily with computing machines and the computing profession. The field of applied professional ethics dealing with ethical problems aggravated, transformed, or created by computer technology (1970, Maner)
  • 8. Computer Ethics: Some historical milestones 1940-1950: Founded by MIT prof Norbert Wiener: cybernetics-science of information feedback systems. 1960s: Donn Parker from California examined unethical and illegal uses of computers by professionals. 1st code of professional conduct for the ACM. 1970: Joseph Weizenbaum, prof at MIT, created Eliza. Mid 1970: Walter Maner taught 1st course and starter kit in computer ethics.
  • 9. Computer ethics history (cont.) 1980: Issues like computer-enabled crime, disasters, invasion of privacy via databases, law suits about software ownership became public. Mid 80s: James Moore of Darmouth, Deborah Johnson of Rensselaer, Sherry Turkle of MIT, and Judith Perrole published article and books.
  • 10. Computer ethics history (cont. 2) 1990: Interest in computer ethics as a field of research had spread to Europe and Australia. Simon Rogerson of De Montfort University (UK) Terrell Bynum, editor of Metaphilosophy (USA), initiated international conferences. Mid 90s: Beginning of a 2nd generation of computer ethics with more practical action. 2004: Interest spreads to Cotonou, Benin
  • 11. Any unique moral issues? Deborah Johnson: Ethics on-line. The scope of the Internet is global and interactive. The Internet enables users to interact with anonymity. Internet technology makes the reproducibility of information possible in ways not possible before. The above features make behavior on-line morally different than off-line.
  • 12. The debate continues: James Moore: Computer technology is “logically malleable” unlike previous technologies. It can create “new possibilities for human action”. Brey: disclosing non-obvious features embedded in computer systems that can have moral implications. Alison Adams: Take into account gender-related biases. Combine feminist ethics with empirical studies.
  • 13. Sample topics in computer ethics Computers in the workplace: a threat to jobs? De-skilling? Health and safety? Computer security: Viruses. Spying by hackers. Logical security: Privacy, integrity, unimpaired service, consistency, controlling access to resources. Software ownership: Intellectual property vs. open source. Software development: quality, safety
  • 14. Computers in the workplace Monitoring of employees: employer vs. employee point of view. Loyalty- Whistle blowing. Health issues. Use of contingent workers. A threat to jobs. De-skilling.
  • 15. Computer security Viruses: programming code disguised Worms: propagate w/o human intervention Trojan horses: gets secretly installed. Logic bombs: execute conditionally. Bacteria or rabbits: multiply rapidly. Computer crimes: embezzlement. Hackers: vandalism or exploration. Denial of service attack: flood a target site.
  • 16. Logical security Privacy invasion of email, files, and own computer (cookies). Shared databases. Identity theft. Combating terrorism: USA Patriot act.
  • 17. Software ownership Knowledge: private greed, public good. Profit vs. affordability Freedom of expression and access to information Right to communicate: share and learn in a globalized world. Digital divide is immoral. Open source software: Linux. Open access. North-South information flow. Indigenous knowledge.
  • 18. Professional responsibility Codes of ethics. Professional organizations: ACM. IEEE, CPSR Licensing Industry certifications Common ethical issues: Piracy, inappropriate sharing of information, inappropriate usage of computing resources.
  • 19. Codes of ethics Avoid harm to others Be honest and trustworthy Acquire and maintain professional competence Know and respect existing laws pertaining to professional work Avoid real or perceived conflicts of interest Be honest and realistic in stating claims or estimates based on available data
  • 20. Global Information Ethics Freedom of speech in the USA Control of pornography Protection of intellectual property Invasion of privacy Global cyberbusiness Global education: free press Information rich and poor
  • 21. The future Gorniak hypothesis: Computer Ethics, a branch now of applied ethics, will evolve into a system of global ethics applicable in every culture on earth. The computer revolution will lead to a new ethical system, global and cross-cultural. It will supplant parochial theories like Bentham and Kant based on isolated cultures. The Johnson hypothesis: Opposite.
  • 22. Web sites http://www.ijie.org, International Journal of Information Ethics. www.sans.org/topten.htm Top ten Internet security flaws that system administrators must eliminate to avoid becoming an easy target. http://ethics.csc.ncsu.edu/ Computer ethics as a map. http://www.neiu.edu/~ncaftori/ethics-course.htm The ethics course I borrowed these overheads from.