SlideShare a Scribd company logo
1 of 20
Download to read offline
QUESTIONS

WELCOME
X

1. As a future IT Educators, what are the importance
of computer ethics in our daily life?
2. What do you think will happen to computer ethics in
the past two decades? Explain?

3. Do you think the computer ethics should be
respected by majority (or all) the human inhabitants of
the Earth?
:IN COMPUTER AND INFORMATION ETHICS
What is
Computer
Ethics?

http://plato.stanford.edu/entries/ethics-computer/#DefComEth

Computer Ethics
: refer to a kind of professional ethics in
which computer professionals apply codes of
ethics and standards of good practice within
their profession.
In most countries of the world, the ―information revolution‖ has altered many aspects of
life significantly: commerce, employment, medicine, security, transportation,
entertainment, and so on. Consequently, information and communication technology
(ICT) has affected — community life, family life, careers, freedom, and democracy .
1940

1950

1960

21st
An
innovative
developments in science
and philosophy led to the
creation of a new branch
of ethics that would later
be
called
―computer
ethics‖ or ―information
ethics‖.

Norbert Wiener
a
professor
of
mathematics
and
engineering at MIT.
Together with
colleagues in

The world would undergo
―a second industrial revolution‖
— an ―automatic age‖ with
―enormous potential for good
and for evil‖ that would
generate a staggering number
of new ethical challenges and
opportunities.

While engaged in
this war effort, Wiener
and colleagues created
a new branch of applied
science that Wiener
named ―cybernetics‖
(from the Greek word
for the pilot of a ship).
Even while the War was
raging, Wiener foresaw
enormous
social
and
ethical implications of
cybernetics combined with
electronic computers.
Cybernetics (1948)
In
which
he
described his new branch
of applied science and
identified some social
and ethical implications
of electronic computers.

―It has long been clear to me that the
modern ultra rapid computing machine was
in principle an ideal central nervous system
to an apparatus for automatic control; and
that its input and output need not be in the
form of numbers or diagrams. It might very
well be, respectively, the readings of
artificial‖
Wiener‘s book included, for example:

The Human Use of
Human Beings (1950)

A book in which he
explored a number of
ethical issues that computer
and information technology
would likely generate.

1. An account of the purpose of a
human life
2. Four principles of justice
3. A powerful method for doing applied
ethics
4. Discussions of the fundamental
questions of computer ethics
5. Examples of key computer ethics
topics
―It seemed,‖
Parker said, ―that
when people entered
the computer center,
they left their ethics at
the door‖.

Donn Parker
- Computer scientist

In 1968 he published
―Rules of Ethics in
Information Processing‖

Headed the development of
the first Code of Professional
Conduct of the Association
for Computing Machinery
(eventually adopted by the
ACM in 1973).
Joseph Weizenbaum
created a computer
program that he called
‗ELIZA‘.

As an experiment, Weizenbaum
used ELIZA to provide “a crude
imitation
of
a
Rogerian
psychotherapist engaged in an
initial interview with a patient”.
Some
practicing
psychiatrists saw ELIZA as
evidence that computers soon
would
be
performing
automated psychotherapy.

Joseph Weizenbaum
created a computer
program that he called
‗ELIZA‘.

Wrote the book Computer
Power and Human Reason,
which forcefully expressed his
ethical concerns. The book,
together with his courses at MIT
and the many speeches he gave
in the 1970s, inspired a number
of thinkers and projects in
computer ethics
He began to use the
term ‗computer ethics‘ to
refer to ―ethical problems
aggravated, transformed or
created
by
computer
technology‖.

Walter Maner
Teacher in a university
course in medical ethics

These efforts spurred
the
study
of
computer ethics at a
number of colleges
and universities in
the United States.

He
developed
a
university computer ethics
course and offered a
variety of workshops and
lectures at conferences
across America.
Parker, Weizenbaum and Maner
had raised the computer ethics
consciousness of a number of American
scholars.
In
addition,
several
computing-related social and ethical
problems had become public issues in
America and Europe: computer-enabled
crime, disasters from computer failures,
invasions of privacy via computer
databases, and major law suits
regarding software ownership. The time
was right for exponential growth in
computer ethics.
Parker, Weizenbaum and Maner
had raised the computer ethics
consciousness of a number of American
scholars.
In
addition,
several
computing-related social and ethical
problems had become public issues in
America and Europe: computer-enabled
crime, disasters from computer failures,
invasions of privacy via computer
databases, and major law suits
regarding software ownership. The time
was right for exponential growth in
computer ethics.
•
•
•
•
•
•

New University Courses
Research centers
Conferences
Journals
Articles
Text Books

DIANE MARTIN

DONALD GOTTERBARN

SIMON ROGERSON KEITH MILLER
Have recently argued that
computer ethics will disappear as a
branch of applied ethics?

Deborah Johnson perspective is
that fundamental ethical theories will
remain unaffected – that computer
ethics issues are simply the same old
ethics questions with a new twist – and
consequently computer ethics as a
distinct branch of applied philosophy
will ultimately disappear.

Wiener-Maner-Górniak
point of view sees computer
technology
as
ethically
revolutionary, requiring human
beings to reexamine the
foundations of ethics and the
very definition of a human life.
X

Thank You For
Listening…
By: Romeo T. Navarro Jr.
Jonnalyn Barrientos

II-BSICTE

More Related Content

What's hot

Quotes that inspire us at ITinvolve
Quotes that inspire us at ITinvolveQuotes that inspire us at ITinvolve
Quotes that inspire us at ITinvolveITinvolve, Inc.
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyRachel Farnese
 
Ethical and social_issues_in_information_system
Ethical and social_issues_in_information_systemEthical and social_issues_in_information_system
Ethical and social_issues_in_information_systemKwame Afreh
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesMichael Zimmer
 
Cyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityCyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityDavid B. Whittier, Ed D
 
Trends In Higher Ed
Trends In Higher EdTrends In Higher Ed
Trends In Higher Edmonacofamily
 
Ethics of computing in pharmaceutical research
Ethics of computing in pharmaceutical researchEthics of computing in pharmaceutical research
Ethics of computing in pharmaceutical researchsuresh gautam
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin itRushana Bandara
 
Positive & Negative Sides of Internet
Positive  &  Negative  Sides of  InternetPositive  &  Negative  Sides of  Internet
Positive & Negative Sides of InternetSagarneel Majumder
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingYUSRA FERNANDO
 

What's hot (18)

Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Quotes that inspire us at ITinvolve
Quotes that inspire us at ITinvolveQuotes that inspire us at ITinvolve
Quotes that inspire us at ITinvolve
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Ethical and social_issues_in_information_system
Ethical and social_issues_in_information_systemEthical and social_issues_in_information_system
Ethical and social_issues_in_information_system
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
Cyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityCyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school community
 
Trends In Higher Ed
Trends In Higher EdTrends In Higher Ed
Trends In Higher Ed
 
Ethics of computing in pharmaceutical research
Ethics of computing in pharmaceutical researchEthics of computing in pharmaceutical research
Ethics of computing in pharmaceutical research
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
Positive & Negative Sides of Internet
Positive  &  Negative  Sides of  InternetPositive  &  Negative  Sides of  Internet
Positive & Negative Sides of Internet
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networking
 
Illegal File Sharing
Illegal File SharingIllegal File Sharing
Illegal File Sharing
 
Illegal file sharing4
Illegal file sharing4Illegal file sharing4
Illegal file sharing4
 

Viewers also liked

Cell block tango powerpoint
Cell block tango powerpointCell block tango powerpoint
Cell block tango powerpointKye Ostby
 
Smash book challenge
Smash book challengeSmash book challenge
Smash book challengeLola DT
 
Trabajo football
Trabajo footballTrabajo football
Trabajo footballvictor2499
 
computer forensics
computer forensicscomputer forensics
computer forensicsshivi123456
 

Viewers also liked (9)

Cell block tango powerpoint
Cell block tango powerpointCell block tango powerpoint
Cell block tango powerpoint
 
Smash book challenge
Smash book challengeSmash book challenge
Smash book challenge
 
Seminario 6
Seminario 6Seminario 6
Seminario 6
 
Global warming
Global warmingGlobal warming
Global warming
 
Seminario 7
Seminario 7Seminario 7
Seminario 7
 
Maxon
MaxonMaxon
Maxon
 
Trabajo football
Trabajo footballTrabajo football
Trabajo football
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Bases digitales
Bases digitalesBases digitales
Bases digitales
 

Similar to Ict2 somehistoricalmilestone-ja barrientos

Introduction to modern computerethics.ppt
Introduction to modern  computerethics.pptIntroduction to modern  computerethics.ppt
Introduction to modern computerethics.ppteastitech
 
Ethics And Computing
Ethics And ComputingEthics And Computing
Ethics And ComputingDavid Ramirez
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsScøtt Lıgøckı
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxOxfordRiNorth
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethicsSaqib Raza
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxpatricke8
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxmccormicknadine86
 
Computer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information TechnologyComputer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information TechnologyLinaCovington707
 
Strategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxStrategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxjohniemcm5zt
 
Engineering Social Justice Presentation
Engineering Social Justice PresentationEngineering Social Justice Presentation
Engineering Social Justice PresentationNasser Saleh PhD P.Eng
 

Similar to Ict2 somehistoricalmilestone-ja barrientos (20)

Introduction to modern computerethics.ppt
Introduction to modern  computerethics.pptIntroduction to modern  computerethics.ppt
Introduction to modern computerethics.ppt
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics And Computing
Ethics And ComputingEthics And Computing
Ethics And Computing
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
a.pptx
a.pptxa.pptx
a.pptx
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docx
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docx
 
Computer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information TechnologyComputer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information Technology
 
Introduction to ethics 1
Introduction to ethics 1Introduction to ethics 1
Introduction to ethics 1
 
Computers
ComputersComputers
Computers
 
Strategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxStrategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docx
 
An ABC of cyberethics
An ABC of cyberethicsAn ABC of cyberethics
An ABC of cyberethics
 
Engineering Social Justice Presentation
Engineering Social Justice PresentationEngineering Social Justice Presentation
Engineering Social Justice Presentation
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Ict2 somehistoricalmilestone-ja barrientos

  • 2.
  • 3. X 1. As a future IT Educators, what are the importance of computer ethics in our daily life? 2. What do you think will happen to computer ethics in the past two decades? Explain? 3. Do you think the computer ethics should be respected by majority (or all) the human inhabitants of the Earth?
  • 4. :IN COMPUTER AND INFORMATION ETHICS
  • 5. What is Computer Ethics? http://plato.stanford.edu/entries/ethics-computer/#DefComEth Computer Ethics : refer to a kind of professional ethics in which computer professionals apply codes of ethics and standards of good practice within their profession.
  • 6. In most countries of the world, the ―information revolution‖ has altered many aspects of life significantly: commerce, employment, medicine, security, transportation, entertainment, and so on. Consequently, information and communication technology (ICT) has affected — community life, family life, careers, freedom, and democracy .
  • 8. An innovative developments in science and philosophy led to the creation of a new branch of ethics that would later be called ―computer ethics‖ or ―information ethics‖. Norbert Wiener a professor of mathematics and engineering at MIT.
  • 9. Together with colleagues in The world would undergo ―a second industrial revolution‖ — an ―automatic age‖ with ―enormous potential for good and for evil‖ that would generate a staggering number of new ethical challenges and opportunities. While engaged in this war effort, Wiener and colleagues created a new branch of applied science that Wiener named ―cybernetics‖ (from the Greek word for the pilot of a ship). Even while the War was raging, Wiener foresaw enormous social and ethical implications of cybernetics combined with electronic computers.
  • 10. Cybernetics (1948) In which he described his new branch of applied science and identified some social and ethical implications of electronic computers. ―It has long been clear to me that the modern ultra rapid computing machine was in principle an ideal central nervous system to an apparatus for automatic control; and that its input and output need not be in the form of numbers or diagrams. It might very well be, respectively, the readings of artificial‖
  • 11. Wiener‘s book included, for example: The Human Use of Human Beings (1950) A book in which he explored a number of ethical issues that computer and information technology would likely generate. 1. An account of the purpose of a human life 2. Four principles of justice 3. A powerful method for doing applied ethics 4. Discussions of the fundamental questions of computer ethics 5. Examples of key computer ethics topics
  • 12. ―It seemed,‖ Parker said, ―that when people entered the computer center, they left their ethics at the door‖. Donn Parker - Computer scientist In 1968 he published ―Rules of Ethics in Information Processing‖ Headed the development of the first Code of Professional Conduct of the Association for Computing Machinery (eventually adopted by the ACM in 1973).
  • 13. Joseph Weizenbaum created a computer program that he called ‗ELIZA‘. As an experiment, Weizenbaum used ELIZA to provide “a crude imitation of a Rogerian psychotherapist engaged in an initial interview with a patient”.
  • 14. Some practicing psychiatrists saw ELIZA as evidence that computers soon would be performing automated psychotherapy. Joseph Weizenbaum created a computer program that he called ‗ELIZA‘. Wrote the book Computer Power and Human Reason, which forcefully expressed his ethical concerns. The book, together with his courses at MIT and the many speeches he gave in the 1970s, inspired a number of thinkers and projects in computer ethics
  • 15. He began to use the term ‗computer ethics‘ to refer to ―ethical problems aggravated, transformed or created by computer technology‖. Walter Maner Teacher in a university course in medical ethics These efforts spurred the study of computer ethics at a number of colleges and universities in the United States. He developed a university computer ethics course and offered a variety of workshops and lectures at conferences across America.
  • 16. Parker, Weizenbaum and Maner had raised the computer ethics consciousness of a number of American scholars. In addition, several computing-related social and ethical problems had become public issues in America and Europe: computer-enabled crime, disasters from computer failures, invasions of privacy via computer databases, and major law suits regarding software ownership. The time was right for exponential growth in computer ethics.
  • 17. Parker, Weizenbaum and Maner had raised the computer ethics consciousness of a number of American scholars. In addition, several computing-related social and ethical problems had become public issues in America and Europe: computer-enabled crime, disasters from computer failures, invasions of privacy via computer databases, and major law suits regarding software ownership. The time was right for exponential growth in computer ethics.
  • 18. • • • • • • New University Courses Research centers Conferences Journals Articles Text Books DIANE MARTIN DONALD GOTTERBARN SIMON ROGERSON KEITH MILLER
  • 19. Have recently argued that computer ethics will disappear as a branch of applied ethics? Deborah Johnson perspective is that fundamental ethical theories will remain unaffected – that computer ethics issues are simply the same old ethics questions with a new twist – and consequently computer ethics as a distinct branch of applied philosophy will ultimately disappear. Wiener-Maner-Górniak point of view sees computer technology as ethically revolutionary, requiring human beings to reexamine the foundations of ethics and the very definition of a human life.
  • 20. X Thank You For Listening… By: Romeo T. Navarro Jr. Jonnalyn Barrientos II-BSICTE