SlideShare a Scribd company logo
1 of 21
Download to read offline
Week 4: Technology and Ethics




http://www.dilbert.com
Ethics in Computing

Ethics is the study of the general nature of
morals and of the specific moral choices made by
individuals.

Because technology often moves faster than rules
can be formulated to govern it, how technology is
used is left up to the indiviual with the guidance
of their personal ethics.


                                  Page 83
Challenges
Technology challenges our ethics as individuals
and as a society, especially with regards to

 1. Social Justice
 2. Intellectual Property (Fair Use)
 3. Privacy
 4. E-Commerce (Online Gambling)
 5. Free Speech
 6. Computer Abuse
 7. The Environment
                               Page 83
1. Social Justice

Freeman Dyson, American physicist
“Science is concentrating too much on making toys
for the rich instead of addressing the necessities of
the poor.”

He proposes three technologies that can turn poor
rural areas into sources of wealth: solar energy,
genetic engineering and Internet access.

                                  Page 85
Ethical Discussion is:
Can technology be used to benefit all?

Debate Issue is:
Does technology provide economic
opportunity for all?
1. Social Justice
Ethical Discussion: Can technology be used to benefit all?

Point                              Counterpoint
•   Technology can improve         •   Problem of poverty is not an
    the quality of life of poor        issue for technologists.
    if scientists and business         Should be addressed by
    leaders get together.              religious leaders/politicians/
•   Technology can be an               education experts.
    ethical force to humanize      •   Genetic engineering may
    us, giving us the ability to       hold the promise of benefits
    impact the lives of all            but should not be explored
                                       because of risks.

                  More on Page 85 - 86
2. Intellectual Property (IP) and Fair Use
IP such as music, writing, and art us protected
through copyright law. Four criteria:
 • What is the purpose of the “fair use” of the
   work (eg is it for-profit or educational use?)
 • What is the nature of the work (eg will it be
   published or unpublished?)
 • How much material is being used?
 • Would it decrease the number of copies of the
   original?

                                Page 87
Ethical Discussion is:
What is fair about fair use?

Debate Issue is:
What kind of fair use standards
are beneficial?
2. IP and Fair Use
Ethical Discussion: What is Fair about Fair Use?

Point                           Counterpoint
•   Allowing an open            •   Existing laws have worked
    interpretation of far use       well for print media and do
    encourages dissemination        not need to be modified.
    of information.             •   Copyright holders are winin
•   Existing laws cannot cope       their rights to be aggressive.
    with widespread                 Artists or critics can use the
    dissemination of                material but must be able to
    information possible with       pay the licensing fee.
    Internet

                More on Page 87 - 88
3. Privacy

Simply put, privacy is the right to be left alone to
do as one pleases, to not have to explain your
behaviour to others.

In the digital age, we leave a trail of electronic
breadcrumbs almost everywhere we go.
Ethical Discussion is:
Is personal privacy a casualty of
the modern age?

Debate Issue is:
Should personal privacy be
protected
3. Privacy
Ethical Discussion: Should privacy be protected?

 Point                        Counterpoint
  • If I’m not doing          • If you aren’t doing
      anything wrong, you         anything wrong, you have
      have no reason to           nothing to hide.
      watch.                  •   It’s not possible to put a
  •   Requiring national ID       price on freedom or
      is like Nazis or            security therefore projects
      Soviets and                 like surveillance and
      implementation is a         national ID are worth the
      waste of tax money.         cost of implementation.

                                       Page 90
Surveillance
Surveillance
Factors propelling the surveillance revolution:
   1. Improved technology.
   2. Centralized surveillance.
   3. Unexamined assumptions that cameras provide
   security.
These developments are creating powerful
momentum toward pervasive surveillance of our
public spaces.
4. Communication and Free Speech

 Ethical Discussion is:
 When does big business limit free
 speech?

 Debate Issue is:
 Did Google make the right choice
 in China by self-censoring?

                           Page 87
4. Free Speech
Discussion: Does big business limit (Google) free speech?

 Point                          Counterpoint
 Google acted unethically       Google’s actions justified
  •   Google sacrificed free-   •   Companies are free to pursue
      speech for business.          profits as long as they follow
  •   Cooperating with              the country’s laws.
      China violates human      •   Withdrawing from China
      rights.                       would further restrict free
                                    speech.



                More on Page 94
5. Computer Abuse

Using a computer or the Internet to harm another
individual. By providing anonymity the Internet
facilitates such unsavory activities.

Everyone agrees that protecting children from
harm is an important goal but the question is how
best to accomplish it?
Ethical Discussion is:
Does restricting online
information protect children?

Debate Issue is:
Is filtering or monitoring
software helpful?
5. Computer Abuse
Ethical Discussion: Does restricting online information
protect children?

 Point                         Counterpoint
  • Filtering software is      • Filtering routinely blocks
      the only way to              good as well as bad.
      protect children         •   Educating children about
      from violence and            responsible Internet use is
      porn.                        more effective.
  •   Parents need to be       •   Filtering widens the
      assured that schools         “digital divide” by
      and libraries are            adversely affecting the
      “safe havens.”               poor.

                                        Page 96
6. Environmental
                               Issues
                               Ethical Discussion: Does
                               excessive gadgetry lead to
                               excessive levels of
                               hazardous e-waste.




http://www.youtube.com/watch?v=67j7JlEZzpQ&feature=related

More Related Content

What's hot

PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsScøtt Lıgøckı
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsMichael Heron
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.muhammad-Sulaiman
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldRownel Cerezo Gagani
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingYUSRA FERNANDO
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in ITRohana K Amarakoon
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethicsJunaid Qadir
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyrightVehitaltinci
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resourcesb5thom
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin itRushana Bandara
 

What's hot (20)

PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer Ethics
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networking
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in IT
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethics
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resources
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 

Viewers also liked

Computer Ethics Project 2009
 Computer Ethics Project 2009 Computer Ethics Project 2009
Computer Ethics Project 2009Theresa Jay
 
Nav Topic 9 vhf omni range (vor)
Nav Topic 9 vhf omni range (vor)Nav Topic 9 vhf omni range (vor)
Nav Topic 9 vhf omni range (vor)Izah Asmadi
 
"Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work""Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work"Tawny Brown
 
Business ethics C8 -ethics_technology
Business ethics C8  -ethics_technologyBusiness ethics C8  -ethics_technology
Business ethics C8 -ethics_technologyIzah Asmadi
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethicsaleeya91
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityFizaril Amzari Omar
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 

Viewers also liked (8)

Computer Ethics Project 2009
 Computer Ethics Project 2009 Computer Ethics Project 2009
Computer Ethics Project 2009
 
Nav Topic 9 vhf omni range (vor)
Nav Topic 9 vhf omni range (vor)Nav Topic 9 vhf omni range (vor)
Nav Topic 9 vhf omni range (vor)
 
"Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work""Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work"
 
Business ethics C8 -ethics_technology
Business ethics C8  -ethics_technologyBusiness ethics C8  -ethics_technology
Business ethics C8 -ethics_technology
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethics
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 

Similar to Ethics Presentation

Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 versionJohan Koren
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 versionJohan Koren
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipegschool
 
Digital citizenship josti
Digital citizenship jostiDigital citizenship josti
Digital citizenship jostiSandy Munnell
 
9 Elements of Digital Citizenship and the 5 fluencies.
9 Elements of Digital Citizenship and the 5 fluencies.9 Elements of Digital Citizenship and the 5 fluencies.
9 Elements of Digital Citizenship and the 5 fluencies.Robert Tsiliiyiannis
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpointOmnia Magdy
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpointJannahAboulhassan
 
Digital citizenship powerpoint
Digital citizenship powerpoint Digital citizenship powerpoint
Digital citizenship powerpoint Omnia Magdy
 
3D Printing and Permissionless Innovation (Adam Thierer March 2016)
3D Printing and Permissionless Innovation (Adam Thierer March 2016)3D Printing and Permissionless Innovation (Adam Thierer March 2016)
3D Printing and Permissionless Innovation (Adam Thierer March 2016)Adam Thierer
 
GCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptxGCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptxsangeetha865539
 
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to ComeMercatus Center
 
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)Gerd Leonhard
 
The future of internet
The future of internetThe future of internet
The future of internetpsp710
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technologyJohan Koren
 

Similar to Ethics Presentation (20)

Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 version
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital citizenship josti
Digital citizenship jostiDigital citizenship josti
Digital citizenship josti
 
9 Elements of Digital Citizenship and the 5 fluencies.
9 Elements of Digital Citizenship and the 5 fluencies.9 Elements of Digital Citizenship and the 5 fluencies.
9 Elements of Digital Citizenship and the 5 fluencies.
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
 
Digital citizenship powerpoint
Digital citizenship powerpoint Digital citizenship powerpoint
Digital citizenship powerpoint
 
Digital Age - Rules for Netizens
Digital Age  - Rules for NetizensDigital Age  - Rules for Netizens
Digital Age - Rules for Netizens
 
3D Printing and Permissionless Innovation (Adam Thierer March 2016)
3D Printing and Permissionless Innovation (Adam Thierer March 2016)3D Printing and Permissionless Innovation (Adam Thierer March 2016)
3D Printing and Permissionless Innovation (Adam Thierer March 2016)
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
GCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptxGCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptx
 
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
 
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
 
The future of internet
The future of internetThe future of internet
The future of internet
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 

More from University of Calgary, School of Creative and Performing Arts

More from University of Calgary, School of Creative and Performing Arts (20)

2017 07 571
2017 07 5712017 07 571
2017 07 571
 
2017 08 571
2017 08 5712017 08 571
2017 08 571
 
2017 07 571
2017 07 5712017 07 571
2017 07 571
 
2017 05 571
2017 05 5712017 05 571
2017 05 571
 
2017 04 571
2017 04 5712017 04 571
2017 04 571
 
2017 02a. 571
2017 02a. 5712017 02a. 571
2017 02a. 571
 
2017 04 571
2017 04 5712017 04 571
2017 04 571
 
2017 03 571
2017 03 5712017 03 571
2017 03 571
 
2017 02 571
2017 02 5712017 02 571
2017 02 571
 
Performance in Virtual Worlds
Performance in Virtual WorldsPerformance in Virtual Worlds
Performance in Virtual Worlds
 
Game Genres
Game GenresGame Genres
Game Genres
 
Serious Games
Serious GamesSerious Games
Serious Games
 
Layers of Performativity
Layers of PerformativityLayers of Performativity
Layers of Performativity
 
Motion Capture
Motion CaptureMotion Capture
Motion Capture
 
Core and Shell of Games
Core and Shell of GamesCore and Shell of Games
Core and Shell of Games
 
Voice Acting Animation
Voice Acting AnimationVoice Acting Animation
Voice Acting Animation
 
Canadian Actors and Auteurs
Canadian Actors and AuteursCanadian Actors and Auteurs
Canadian Actors and Auteurs
 
Foreign Films and Cultural Signs
Foreign Films and Cultural SignsForeign Films and Cultural Signs
Foreign Films and Cultural Signs
 
Principles of Animation
Principles of AnimationPrinciples of Animation
Principles of Animation
 
Comedy and A Full Arch of Experience
Comedy and A Full Arch of ExperienceComedy and A Full Arch of Experience
Comedy and A Full Arch of Experience
 

Recently uploaded

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Ethics Presentation

  • 1. Week 4: Technology and Ethics http://www.dilbert.com
  • 2. Ethics in Computing Ethics is the study of the general nature of morals and of the specific moral choices made by individuals. Because technology often moves faster than rules can be formulated to govern it, how technology is used is left up to the indiviual with the guidance of their personal ethics. Page 83
  • 3. Challenges Technology challenges our ethics as individuals and as a society, especially with regards to 1. Social Justice 2. Intellectual Property (Fair Use) 3. Privacy 4. E-Commerce (Online Gambling) 5. Free Speech 6. Computer Abuse 7. The Environment Page 83
  • 4. 1. Social Justice Freeman Dyson, American physicist “Science is concentrating too much on making toys for the rich instead of addressing the necessities of the poor.” He proposes three technologies that can turn poor rural areas into sources of wealth: solar energy, genetic engineering and Internet access. Page 85
  • 5. Ethical Discussion is: Can technology be used to benefit all? Debate Issue is: Does technology provide economic opportunity for all?
  • 6. 1. Social Justice Ethical Discussion: Can technology be used to benefit all? Point Counterpoint • Technology can improve • Problem of poverty is not an the quality of life of poor issue for technologists. if scientists and business Should be addressed by leaders get together. religious leaders/politicians/ • Technology can be an education experts. ethical force to humanize • Genetic engineering may us, giving us the ability to hold the promise of benefits impact the lives of all but should not be explored because of risks. More on Page 85 - 86
  • 7. 2. Intellectual Property (IP) and Fair Use IP such as music, writing, and art us protected through copyright law. Four criteria: • What is the purpose of the “fair use” of the work (eg is it for-profit or educational use?) • What is the nature of the work (eg will it be published or unpublished?) • How much material is being used? • Would it decrease the number of copies of the original? Page 87
  • 8. Ethical Discussion is: What is fair about fair use? Debate Issue is: What kind of fair use standards are beneficial?
  • 9. 2. IP and Fair Use Ethical Discussion: What is Fair about Fair Use? Point Counterpoint • Allowing an open • Existing laws have worked interpretation of far use well for print media and do encourages dissemination not need to be modified. of information. • Copyright holders are winin • Existing laws cannot cope their rights to be aggressive. with widespread Artists or critics can use the dissemination of material but must be able to information possible with pay the licensing fee. Internet More on Page 87 - 88
  • 10. 3. Privacy Simply put, privacy is the right to be left alone to do as one pleases, to not have to explain your behaviour to others. In the digital age, we leave a trail of electronic breadcrumbs almost everywhere we go.
  • 11. Ethical Discussion is: Is personal privacy a casualty of the modern age? Debate Issue is: Should personal privacy be protected
  • 12. 3. Privacy Ethical Discussion: Should privacy be protected? Point Counterpoint • If I’m not doing • If you aren’t doing anything wrong, you anything wrong, you have have no reason to nothing to hide. watch. • It’s not possible to put a • Requiring national ID price on freedom or is like Nazis or security therefore projects Soviets and like surveillance and implementation is a national ID are worth the waste of tax money. cost of implementation. Page 90
  • 14. Surveillance Factors propelling the surveillance revolution: 1. Improved technology. 2. Centralized surveillance. 3. Unexamined assumptions that cameras provide security. These developments are creating powerful momentum toward pervasive surveillance of our public spaces.
  • 15.
  • 16. 4. Communication and Free Speech Ethical Discussion is: When does big business limit free speech? Debate Issue is: Did Google make the right choice in China by self-censoring? Page 87
  • 17. 4. Free Speech Discussion: Does big business limit (Google) free speech? Point Counterpoint Google acted unethically Google’s actions justified • Google sacrificed free- • Companies are free to pursue speech for business. profits as long as they follow • Cooperating with the country’s laws. China violates human • Withdrawing from China rights. would further restrict free speech. More on Page 94
  • 18. 5. Computer Abuse Using a computer or the Internet to harm another individual. By providing anonymity the Internet facilitates such unsavory activities. Everyone agrees that protecting children from harm is an important goal but the question is how best to accomplish it?
  • 19. Ethical Discussion is: Does restricting online information protect children? Debate Issue is: Is filtering or monitoring software helpful?
  • 20. 5. Computer Abuse Ethical Discussion: Does restricting online information protect children? Point Counterpoint • Filtering software is • Filtering routinely blocks the only way to good as well as bad. protect children • Educating children about from violence and responsible Internet use is porn. more effective. • Parents need to be • Filtering widens the assured that schools “digital divide” by and libraries are adversely affecting the “safe havens.” poor. Page 96
  • 21. 6. Environmental Issues Ethical Discussion: Does excessive gadgetry lead to excessive levels of hazardous e-waste. http://www.youtube.com/watch?v=67j7JlEZzpQ&feature=related