Ethics

Computer Ethics
A Necessarily Brief Introduction
Ethics
Each society establishes rules and limits
on accaptable behaviour
These rules form a moral code
Sometimes the rules conflict
In general they are beliefs or conventions
on good and evil, good or bad conduct,
justice and injustice
The rules sometimes do not cover new
situations
Examples:
Employee monitoring.
Downloading music using Napster
software at no charge.
Robert Hansen, FBI agent, convicted
for providing information to Russia.
DoubleClick sued for planning to
reveal Web users identities.
Plagiarism.
Hackers defaced Web sites.
The world is changing
Introduction
In the industrialized world computers are changing
everything: from education to health, from voting to
making friends or making war.
Developing countries can also fully participate in
cyberspace and make use of opportunities offered by global
networks.
We are living a technological and informational revolution.
It is therefore important for policy makers, leaders,
teachers, computer professionals and all social thinkers to
get involved in the social and ethical impacts of this
communication technology.
Cyberethics and cybertechnology
Definitions.
Cyberethics is the field of applied ethics
that examines moral, legal, and social
issues in the development and use of
cybertechnology.
Cybertechnology refers to a broad range
of technologies from stand-alone
computers to the cluster of networked
computing, information and communication
technologies.
Internet ethics and information ethics.
Computer ethics: definition
Same as cyberethics, or
The study of ethical issues that are
associated primarily with computing
machines and the computing
profession.
The field of applied professional
ethics dealing with ethical problems
aggravated, transformed, or created
by computer technology (1970,
Maner)
Computer Ethics:
Some historical milestones
1940-1950: Founded by MIT prof Norbert
Wiener: cybernetics-science of information
feedback systems.
1960s: Donn Parker from California
examined unethical and illegal uses of
computers by professionals. 1st
code of
professional conduct for the ACM.
1970: Joseph Weizenbaum, prof at MIT,
created Eliza.
Mid 1970: Walter Maner taught 1st
course
and starter kit in computer ethics.
Computer ethics history (cont.)
1980: Issues like computer-enabled
crime, disasters, invasion of privacy
via databases, law suits about
software ownership became public.
Mid 80s: James Moore of Darmouth,
Deborah Johnson of Rensselaer,
Sherry Turkle of MIT, and Judith
Perrole published article and books.
Computer ethics history (cont. 2)
1990: Interest in computer ethics as a field
of research had spread to Europe and
Australia.
Simon Rogerson of De Montfort University
(UK) Terrell Bynum, editor of
Metaphilosophy (USA), initiated
international conferences.
Mid 90s: Beginning of a 2nd
generation of
computer ethics with more practical action.
2004: Interest spreads to Cotonou, Benin
Any unique moral issues?
Deborah Johnson: Ethics on-line.
The scope of the Internet is global
and interactive.
The Internet enables users to interact
with anonymity.
Internet technology makes the
reproducibility of information
possible in ways not possible before.
The above features make behavior
on-line morally different than off-line.
The debate continues:
James Moore: Computer technology
is “logically malleable” unlike previous
technologies. It can create “new
possibilities for human action”.
Brey: disclosing non-obvious features
embedded in computer systems that
can have moral implications.
Alison Adams: Take into account
gender-related biases. Combine
feminist ethics with empirical studies.
Sample topics in computer ethics
Computers in the workplace: a threat to
jobs? De-skilling? Health and safety?
Computer security: Viruses. Spying by
hackers.
Logical security: Privacy, integrity,
unimpaired service, consistency,
controlling access to resources.
Software ownership: Intellectual property
vs. open source.
Software development: quality, safety
Computers in the workplace
Monitoring of employees: employer
vs. employee point of view.
Loyalty- Whistle blowing.
Health issues.
Use of contingent workers.
A threat to jobs.
De-skilling.
Computer security
Viruses: programming code disguised
Worms: propagate w/o human
intervention
Trojan horses: gets secretly installed.
Logic bombs: execute conditionally.
Bacteria or rabbits: multiply rapidly.
Computer crimes: embezzlement.
Hackers: vandalism or exploration.
Denial of service attack: flood a target
site.
Logical security
Privacy invasion of email, files, and
own computer (cookies).
Shared databases.
Identity theft.
Combating terrorism: USA Patriot act.
Software ownership
Knowledge: private greed, public good.
Profit vs. affordability
Freedom of expression and access to
information
Right to communicate: share and learn in a
globalized world.
Digital divide is immoral.
Open source software: Linux. Open
access.
North-South information flow. Indigenous
knowledge.
Professional responsibility
Codes of ethics.
Professional organizations: ACM.
IEEE, CPSR
Licensing
Industry certifications
Common ethical issues: Piracy,
inappropriate sharing of information,
inappropriate usage of computing
resources.
Codes of ethics
Avoid harm to others
Be honest and trustworthy
Acquire and maintain professional
competence
Know and respect existing laws
pertaining to professional work
Avoid real or perceived conflicts of
interest
Be honest and realistic in stating
claims or estimates based on
available data
Global Information Ethics
Freedom of speech in the USA
Control of pornography
Protection of intellectual property
Invasion of privacy
Global cyberbusiness
Global education: free press
Information rich and poor
The future
Gorniak hypothesis: Computer
Ethics, a branch now of applied
ethics, will evolve into a system of
global ethics applicable in every
culture on earth. The computer
revolution will lead to a new ethical
system, global and cross-cultural. It
will supplant parochial theories like
Bentham and Kant based on isolated
cultures.
The Johnson hypothesis: Opposite.
Web sites
http://www.ijie.org, International Journal of
Information Ethics.
www.sans.org/topten.htm Top ten Internet
security flaws that system administrators
must eliminate to avoid becoming an easy
target.
http://ethics.csc.ncsu.edu/ Computer ethics
as a map.
http://www.neiu.edu/~ncaftori/ethics-course.htm
The ethics course I borrowed these
overheads from.
1 of 22

Recommended

Ethics And Computing by
Ethics And ComputingEthics And Computing
Ethics And ComputingDavid Ramirez
2.8K views26 slides
Computer ethics by
Computer ethicsComputer ethics
Computer ethicsafolabidare
4.9K views4 slides
Computer Ethics by
Computer EthicsComputer Ethics
Computer Ethicsiallen
3.1K views24 slides
Computer ethics by
Computer ethicsComputer ethics
Computer ethicsJagan Nath
81.5K views24 slides
PPT Lab Assignment - Computers - Computer Ethics by
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsScøtt Lıgøckı
2.4K views6 slides
Computer Ethics Final Work by
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
2.1K views10 slides

More Related Content

What's hot

Computer ethics by
Computer ethicsComputer ethics
Computer ethicsAnkitTripathi159
139 views10 slides
computer ethics by
computer ethicscomputer ethics
computer ethicsHoney jose
2.4K views15 slides
ICT code of ethics by
ICT code of ethicsICT code of ethics
ICT code of ethicsJunaid Qadir
5.3K views34 slides
Computer ethics by
Computer ethicsComputer ethics
Computer ethicsonur karaman
1.5K views5 slides
Computer ethics & copyright by
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyrightAdyns
5.2K views5 slides
Computer ethics by
Computer ethicsComputer ethics
Computer ethicsFaraz Ahmed
1.1K views20 slides

What's hot(20)

computer ethics by Honey jose
computer ethicscomputer ethics
computer ethics
Honey jose2.4K views
ICT code of ethics by Junaid Qadir
ICT code of ethicsICT code of ethics
ICT code of ethics
Junaid Qadir5.3K views
Computer ethics & copyright by Adyns
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
Adyns5.2K views
Computer ethics by Faraz Ahmed
Computer ethicsComputer ethics
Computer ethics
Faraz Ahmed1.1K views
Computer Ethics Presentation by katespeach
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
katespeach15.8K views
Computer ethics & copyright by Vehitaltinci
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
Vehitaltinci4K views
Identify ethical use of computers by Al Forte
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
Al Forte1.2K views
ETHICS01 - Introduction to Computer Ethics by Michael Heron
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
Michael Heron1.8K views
Presentation computer ethics by Yuyul Yieyien
Presentation computer ethicsPresentation computer ethics
Presentation computer ethics
Yuyul Yieyien687 views
Computer Ethics Presentation by guest65a1c4
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c458K views
COMPUTER ETHICS by RJ Khan
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
RJ Khan4.3K views
Social, Legal & Ethical Aspects of Computing. by muhammad-Sulaiman
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
muhammad-Sulaiman7.3K views

Viewers also liked

Nfwordle by
NfwordleNfwordle
NfwordleNadine Fray
877 views12 slides
Chapter 2 by
Chapter 2Chapter 2
Chapter 2gbrand
2.2K views16 slides
How to teach Ethics to Computer Science Students by
How to teach Ethics to Computer Science StudentsHow to teach Ethics to Computer Science Students
How to teach Ethics to Computer Science StudentsPer Arne Godejord
1.6K views43 slides
Ethics as viewed from Computer Games by
Ethics as viewed from Computer GamesEthics as viewed from Computer Games
Ethics as viewed from Computer GamesPer Arne Godejord
4.3K views31 slides
Ethics and privacy ppt 3rd period by
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
5.2K views15 slides
Ethics in the workplace by
Ethics in the workplaceEthics in the workplace
Ethics in the workplaceviviandabu
40.1K views46 slides

Viewers also liked(10)

Chapter 2 by gbrand
Chapter 2Chapter 2
Chapter 2
gbrand2.2K views
How to teach Ethics to Computer Science Students by Per Arne Godejord
How to teach Ethics to Computer Science StudentsHow to teach Ethics to Computer Science Students
How to teach Ethics to Computer Science Students
Per Arne Godejord1.6K views
Ethics and privacy ppt 3rd period by charvill
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
charvill5.2K views
Ethics in the workplace by viviandabu
Ethics in the workplaceEthics in the workplace
Ethics in the workplace
viviandabu40.1K views
Privacy , Security and Ethics Presentation by Hajarul Cikyen
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
Hajarul Cikyen20.4K views
Workplace Ethics PowerPoint Presentation by Andrew Schwartz
Workplace Ethics PowerPoint PresentationWorkplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint Presentation
Andrew Schwartz142.5K views
2015 Upload Campaigns Calendar - SlideShare by SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
SlideShare2M views

Similar to Ethics

Topic-2.2_InfoPrivacy-IT-Ethics.pptx by
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxOxfordRiNorth
0 views35 slides
Introduction to ethics by
Introduction to ethicsIntroduction to ethics
Introduction to ethicsSaqib Raza
2K views40 slides
Computer Ethics Essay by
Computer Ethics EssayComputer Ethics Essay
Computer Ethics EssayPay To Do My Paper UK
12 views21 slides
Persuasive Essay On Computer Ethics by
Persuasive Essay On Computer EthicsPersuasive Essay On Computer Ethics
Persuasive Essay On Computer EthicsPay For A Paper Canada
5 views21 slides

Similar to Ethics(20)

Topic-2.2_InfoPrivacy-IT-Ethics.pptx by OxfordRiNorth
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
OxfordRiNorth0 views
Introduction to ethics by Saqib Raza
Introduction to ethicsIntroduction to ethics
Introduction to ethics
Saqib Raza2K views
239 325 ethics by syed ahmed
239 325 ethics239 325 ethics
239 325 ethics
syed ahmed1.3K views
Chapter 1 by Hajar Len
Chapter 1Chapter 1
Chapter 1
Hajar Len1.3K views
Chapter 1 by Hajar Len
Chapter 1Chapter 1
Chapter 1
Hajar Len1.4K views

More from chrisjosewanjira

Private cloud reference model ms by
Private cloud reference model msPrivate cloud reference model ms
Private cloud reference model mschrisjosewanjira
432 views11 slides
Telecommunications architectures and standards by
Telecommunications architectures and standardsTelecommunications architectures and standards
Telecommunications architectures and standardschrisjosewanjira
431 views22 slides
E business models by
E business modelsE business models
E business modelschrisjosewanjira
19.8K views43 slides
Ethics by
EthicsEthics
Ethicschrisjosewanjira
326 views22 slides
Computer components by
Computer componentsComputer components
Computer componentschrisjosewanjira
314 views8 slides
Threads by
ThreadsThreads
Threadschrisjosewanjira
283 views3 slides

Recently uploaded

hamro digital logics.pptx by
hamro digital logics.pptxhamro digital logics.pptx
hamro digital logics.pptxtupeshghimire
10 views36 slides
The Dark Web : Hidden Services by
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
14 views24 slides
Affiliate Marketing by
Affiliate MarketingAffiliate Marketing
Affiliate MarketingNavin Dhanuka
17 views30 slides
IETF 118: Starlink Protocol Performance by
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol PerformanceAPNIC
414 views22 slides
Marketing and Community Building in Web3 by
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3Federico Ast
14 views64 slides
How to think like a threat actor for Kubernetes.pptx by
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptxLibbySchulze1
5 views33 slides

Recently uploaded(9)

The Dark Web : Hidden Services by Anshu Singh
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh14 views
IETF 118: Starlink Protocol Performance by APNIC
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC414 views
Marketing and Community Building in Web3 by Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast14 views
How to think like a threat actor for Kubernetes.pptx by LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze15 views
Building trust in our information ecosystem: who do we trust in an emergency by Tina Purnat
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergency
Tina Purnat110 views
ATPMOUSE_융합2조.pptx by kts120898
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptx
kts12089835 views

Ethics

  • 1. Computer Ethics A Necessarily Brief Introduction
  • 2. Ethics Each society establishes rules and limits on accaptable behaviour These rules form a moral code Sometimes the rules conflict In general they are beliefs or conventions on good and evil, good or bad conduct, justice and injustice The rules sometimes do not cover new situations
  • 3. Examples: Employee monitoring. Downloading music using Napster software at no charge. Robert Hansen, FBI agent, convicted for providing information to Russia. DoubleClick sued for planning to reveal Web users identities. Plagiarism. Hackers defaced Web sites.
  • 4. The world is changing
  • 5. Introduction In the industrialized world computers are changing everything: from education to health, from voting to making friends or making war. Developing countries can also fully participate in cyberspace and make use of opportunities offered by global networks. We are living a technological and informational revolution. It is therefore important for policy makers, leaders, teachers, computer professionals and all social thinkers to get involved in the social and ethical impacts of this communication technology.
  • 6. Cyberethics and cybertechnology Definitions. Cyberethics is the field of applied ethics that examines moral, legal, and social issues in the development and use of cybertechnology. Cybertechnology refers to a broad range of technologies from stand-alone computers to the cluster of networked computing, information and communication technologies. Internet ethics and information ethics.
  • 7. Computer ethics: definition Same as cyberethics, or The study of ethical issues that are associated primarily with computing machines and the computing profession. The field of applied professional ethics dealing with ethical problems aggravated, transformed, or created by computer technology (1970, Maner)
  • 8. Computer Ethics: Some historical milestones 1940-1950: Founded by MIT prof Norbert Wiener: cybernetics-science of information feedback systems. 1960s: Donn Parker from California examined unethical and illegal uses of computers by professionals. 1st code of professional conduct for the ACM. 1970: Joseph Weizenbaum, prof at MIT, created Eliza. Mid 1970: Walter Maner taught 1st course and starter kit in computer ethics.
  • 9. Computer ethics history (cont.) 1980: Issues like computer-enabled crime, disasters, invasion of privacy via databases, law suits about software ownership became public. Mid 80s: James Moore of Darmouth, Deborah Johnson of Rensselaer, Sherry Turkle of MIT, and Judith Perrole published article and books.
  • 10. Computer ethics history (cont. 2) 1990: Interest in computer ethics as a field of research had spread to Europe and Australia. Simon Rogerson of De Montfort University (UK) Terrell Bynum, editor of Metaphilosophy (USA), initiated international conferences. Mid 90s: Beginning of a 2nd generation of computer ethics with more practical action. 2004: Interest spreads to Cotonou, Benin
  • 11. Any unique moral issues? Deborah Johnson: Ethics on-line. The scope of the Internet is global and interactive. The Internet enables users to interact with anonymity. Internet technology makes the reproducibility of information possible in ways not possible before. The above features make behavior on-line morally different than off-line.
  • 12. The debate continues: James Moore: Computer technology is “logically malleable” unlike previous technologies. It can create “new possibilities for human action”. Brey: disclosing non-obvious features embedded in computer systems that can have moral implications. Alison Adams: Take into account gender-related biases. Combine feminist ethics with empirical studies.
  • 13. Sample topics in computer ethics Computers in the workplace: a threat to jobs? De-skilling? Health and safety? Computer security: Viruses. Spying by hackers. Logical security: Privacy, integrity, unimpaired service, consistency, controlling access to resources. Software ownership: Intellectual property vs. open source. Software development: quality, safety
  • 14. Computers in the workplace Monitoring of employees: employer vs. employee point of view. Loyalty- Whistle blowing. Health issues. Use of contingent workers. A threat to jobs. De-skilling.
  • 15. Computer security Viruses: programming code disguised Worms: propagate w/o human intervention Trojan horses: gets secretly installed. Logic bombs: execute conditionally. Bacteria or rabbits: multiply rapidly. Computer crimes: embezzlement. Hackers: vandalism or exploration. Denial of service attack: flood a target site.
  • 16. Logical security Privacy invasion of email, files, and own computer (cookies). Shared databases. Identity theft. Combating terrorism: USA Patriot act.
  • 17. Software ownership Knowledge: private greed, public good. Profit vs. affordability Freedom of expression and access to information Right to communicate: share and learn in a globalized world. Digital divide is immoral. Open source software: Linux. Open access. North-South information flow. Indigenous knowledge.
  • 18. Professional responsibility Codes of ethics. Professional organizations: ACM. IEEE, CPSR Licensing Industry certifications Common ethical issues: Piracy, inappropriate sharing of information, inappropriate usage of computing resources.
  • 19. Codes of ethics Avoid harm to others Be honest and trustworthy Acquire and maintain professional competence Know and respect existing laws pertaining to professional work Avoid real or perceived conflicts of interest Be honest and realistic in stating claims or estimates based on available data
  • 20. Global Information Ethics Freedom of speech in the USA Control of pornography Protection of intellectual property Invasion of privacy Global cyberbusiness Global education: free press Information rich and poor
  • 21. The future Gorniak hypothesis: Computer Ethics, a branch now of applied ethics, will evolve into a system of global ethics applicable in every culture on earth. The computer revolution will lead to a new ethical system, global and cross-cultural. It will supplant parochial theories like Bentham and Kant based on isolated cultures. The Johnson hypothesis: Opposite.
  • 22. Web sites http://www.ijie.org, International Journal of Information Ethics. www.sans.org/topten.htm Top ten Internet security flaws that system administrators must eliminate to avoid becoming an easy target. http://ethics.csc.ncsu.edu/ Computer ethics as a map. http://www.neiu.edu/~ncaftori/ethics-course.htm The ethics course I borrowed these overheads from.