SlideShare a Scribd company logo
Group Members:
1. Aniqa Asghar
2. Mahrukh Zehra
3. Zainab Jamal
4. Turab Raza
What is Ethics of Technology?
Ethics in technology is a sub-field of ethics addressing the ethical
questions specific to the Technology Age.
It is often held that technology itself is incapable of possessing moral or
ethical qualities, since "technology" is merely tool making.
FOUR ETHICAL ISSUES OF THE
INFORMATION AGE
1. PRIVACY: Two forces threaten our privacy. One is the growth of
information technology, with its enhanced capacity for surveillance,
communication, computation, storage, and retrieval. A second, and more
insidious threat, is the increased value of information in decision-making.
Information is increasingly valuable to policy makers; they covet it even if
acquiring it invades another's privacy.
2. ACCURACY: Misinformation has a way of fouling up people's lives,
especially when the party with the inaccurate information has an advantage
in power and authority.
3. PROPERTY: One of the most complex issues we face as a society is the
question of intellectual property rights. Any individual item of information
can be extremely costly to produce in the first instance. Yet, once it is
produced, that information has the illusive quality of being easy to reproduce
and to share with others. We currently have several imperfect institutions
that try to protect intellectual property rights. Copyrights, patents,
encryption, oaths of confidentiality, and such old fashioned values as trust
worthiness and loyalty are the most commonly used protectors of our
intellectual property. Problem issues, however, still abound in this area. Let
us focus on just one aspect: artificial intelligence and its expanding subfield,
expert systems.
4. ACCESS: In an information society a citizen must possess at least three things to
be literate:
 - One must have the intellectual skills to deal with information. These are skill such as
reading, writing, reasoning, and calculating. This is a task for education.
 - One must have access to the information technologies which store, convey and
process information. This includes libraries, radios, televisions, telephones, and
increasingly, personal computers or terminals linked via networks to mainframes.
This is a problem in social economics.
 - Finally, one must have access to the information itself. This requirement returns to
the issue of property and is also a problem in social economics.
IS TECHNOLOGY VALUE LOADED OR
VALUE NEUTRAL?
 According to most researches ethics is known to be value-neutral.
Like any tool, it is not the tool itself that does anything of any value.
Hence its Value free. But rather it is the user that is responsible for
whatever comes from using the tool. I think technology is simply
another tool in a long line and history of tools that have been available
to preachers for a very long time. What people do with technology is
entirely up to them.
WEAPONS
 CHEMICAL WEAPONS:
They are defined as chemical substances that can be delivered using munitions
dispersal devices to cause death or severe harm to people, animals and plants.
Example: Nerve gas, tear gas and pepper gas.
BIOLOGICAL WEAPONS:
They are defined as harmful biological agents as in pathogenic micro organisms
or neurotoxins as weapons to cause death or disease usually o a large scale.
Example: Anthrax, small pox, wheat stem rust.
History Of Biological Weapons
One of the first documented uses of biological weaponry was the use
of poison tipped arrows in Middle East dating before year 400 BC.
Such arrows were covered in a mixture of putrefied flesh and dung
containing harmful bacteria including gangrene and tetanus.
Peloponnesian war:
Another use of biological weaponry around this time was the suspected poisoning
of Athenian wells by Spartans during the Peloponnesian war (404-431 BC)
After Sparta laid siege on Athens, a deadly epidemic broke out within Athens
that wiped out roughly a quarter of population.
History Of Chemical Weapons
The use of poisonous gases during World War 1 was the first recognized use of
chemical warfare.
Poisonous gases used at that time includes chlorine gas and mustard gas. These
gases proved to be fatal in large amount, blistering skin and dissolving lungs.
Chemical and biological weapons used to wipe
out individuals or a small group on small scale
PROS
 Solid and liquid biological and
chemical agents can easily be
concealed in food or drink.
 Anonymity (harder to determine
attacker than when using
conventional weapon). Therefore,
there is a low probability for
retaliation, leading to fewer lives
lost.
CONS
 These weapons are often slow to
skill and cause unnecessary pain to
target.
 There is a degree of uncertainty as
to whether or not weapon will
eliminate the target (requires
supervision)
Chemical and biological weapons used to wipe out
individuals or a small group on Large scale
PROS
 Have the potential to put an end to
an armed conflict by quickly in
captivating enemy forces.
 Can be justified by utilitarian
approach if the lives lost and
damage done by weapon to end an
war are less than that caused by
continuation of war.
CONS
 Unintended civilian casualties
(comparable to a nuclear weapon)
 Potential to backfire.
RESEARCHES ON POSSIBLE CHEMICAL
AND BIOLOGICALAGENTS
If the agents which are being researched has not been used as a weapon, there lies
a possibility of risk that this research may fall into wrong hands and could lead
to destruction.
On the other hand if the agent being researched has already been used a weapon
only good can come out of it.
Example:
Small pox was already used as a weapon during the war so its was developed
vaccine in order to cure it.
PRIVACY
Privacy is the claim of individuals, groups or institutions
to determine for themselves when, how, and to what
extent their information should be communicated to
other.
PRIVACY HARM:
There are four types of privacy harms which are as follows:
 Intrusion
 Information collection
 Information processing
 Information dissemination
Ways To Protect Privacy
There are four ways to protect privacy i.e technology, law, markets and your
choice.
EXAMPLE: Reducing spam
Technology: Spam filters
Law: The CAN-SPAM Act
1- Illegal to send commercial email with false headers
2- You can unsubscribe from the sender
Markets: You choose an email provider that does a good job of reducing spam
Your choice: You decide not to open that email with the unpleasant header
Internet ethics- Introduction
 It describes a code of conduct for the users of internet.
 Organizations that introduce new information systems must first address
legal and ethical issues related to technologies.
Ethical and moral issues associated
with the internet
 Cyber bullying
 Provision of misleading information on websites
 Plagiarism
 Use of photo editors to distort reality
 Privacy
 Hacking
 Inappropriate websites with illicit material
What is cyber bullying?
 Electronic aggression
 Online rumors
 Posting pictures without consent/harasment
Plagiarism
 Users/students can download anything from the internet.
 They can access any information/data, copy paste it and use it as their
own information.
 Research papers are available freely that are copied very easily.
HACKING
 Into bank accounts of
online users, website hacking, computer hacking, password hacking, etc
REMEDIES
 Copyrights to avoid plagiarism
 More developed filtering software
 AUP – acceptable use policy
 Privacy policies
 Censorship of certain websites
CELL PHONES
Inappropriate cell phone usage may include
 Texting while driving
 Invading other’s privacy
 Bullying
 Harassment from wrong numbers
 Frauds/misleading dealers
 Spreading rumors
ETHICS OF HEIDDEGER
 The question concerning Technology
 Published in 1954
 Heidegger observes that because of technology, “all distances in time
and space are shrinking” and “yet the hasty setting aside of all distances
brings no nearness; for nearness does not consist in a small amount of
distance”
 Technology also brought some draw backs with it
 Workers are being treated as merely means of production only

More Related Content

What's hot

Ethics in marketing ppt
Ethics in marketing pptEthics in marketing ppt
Ethics in marketing ppt
toch_faculty
 
Importance of Ethics
Importance of EthicsImportance of Ethics
Importance of Ethics
Sayak Sarkar
 
Utilitarianism
UtilitarianismUtilitarianism
Utilitarianism
NaimAlmashoori
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technologyWish Mrt'xa
 
Information age
Information ageInformation age
Information age
MarkCarmeloAzor
 
Ethical Frameworks Intro
Ethical Frameworks IntroEthical Frameworks Intro
Ethical Frameworks Intro
Mia Eaker
 
Ethical leadership
Ethical leadershipEthical leadership
Ethical leadership
kdore
 
Professional ethics-Unit5
Professional ethics-Unit5Professional ethics-Unit5
Professional ethics-Unit5
LovelitJose
 
The evolution of the technology
The evolution of the technologyThe evolution of the technology
The evolution of the technology
notengo123
 
Science Technology and society
Science Technology and societyScience Technology and society
Science Technology and society
Manvi Yadav
 
ICT Benefits
ICT BenefitsICT Benefits
ICT Benefits
Rene Summer
 
[GE207] Session01: Introduction to Digital Technology
[GE207] Session01: Introduction to Digital Technology[GE207] Session01: Introduction to Digital Technology
[GE207] Session01: Introduction to Digital Technology
Sukanya Ben
 
Chapter 1: The Importance of Business Ethics
Chapter 1: The Importance of Business Ethics�Chapter 1: The Importance of Business Ethics�
Chapter 1: The Importance of Business Ethics
Firdaus Fitri Zainal Abidin
 
Ethics in politics
Ethics in politics Ethics in politics
Ethics in politics
Rushikesh Tambat
 
Values,ethics and culture
Values,ethics and cultureValues,ethics and culture
Values,ethics and culture
Lt.P.Abdul Azees Farook College
 
Types of Ethics
Types of EthicsTypes of Ethics
Types of Ethics
Saqib Raza
 
information technology
information technology information technology
information technology
taiba qazi
 
Chapter 6: Utilitarianism
Chapter 6: UtilitarianismChapter 6: Utilitarianism
Chapter 6: Utilitarianismdborcoman
 

What's hot (20)

Ethics in marketing ppt
Ethics in marketing pptEthics in marketing ppt
Ethics in marketing ppt
 
Importance of Ethics
Importance of EthicsImportance of Ethics
Importance of Ethics
 
Utilitarianism
UtilitarianismUtilitarianism
Utilitarianism
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technology
 
Normative theory
Normative theoryNormative theory
Normative theory
 
Information age
Information ageInformation age
Information age
 
Ethical Frameworks Intro
Ethical Frameworks IntroEthical Frameworks Intro
Ethical Frameworks Intro
 
Ethical leadership
Ethical leadershipEthical leadership
Ethical leadership
 
Professional ethics-Unit5
Professional ethics-Unit5Professional ethics-Unit5
Professional ethics-Unit5
 
The evolution of the technology
The evolution of the technologyThe evolution of the technology
The evolution of the technology
 
Science Technology and society
Science Technology and societyScience Technology and society
Science Technology and society
 
ICT Benefits
ICT BenefitsICT Benefits
ICT Benefits
 
[GE207] Session01: Introduction to Digital Technology
[GE207] Session01: Introduction to Digital Technology[GE207] Session01: Introduction to Digital Technology
[GE207] Session01: Introduction to Digital Technology
 
Chapter 1: The Importance of Business Ethics
Chapter 1: The Importance of Business Ethics�Chapter 1: The Importance of Business Ethics�
Chapter 1: The Importance of Business Ethics
 
Ethics in politics
Ethics in politics Ethics in politics
Ethics in politics
 
Values,ethics and culture
Values,ethics and cultureValues,ethics and culture
Values,ethics and culture
 
Types of Ethics
Types of EthicsTypes of Ethics
Types of Ethics
 
information technology
information technology information technology
information technology
 
Chapter 6: Utilitarianism
Chapter 6: UtilitarianismChapter 6: Utilitarianism
Chapter 6: Utilitarianism
 
Ethics
EthicsEthics
Ethics
 

Similar to Ethics of technology

Ethics
EthicsEthics
Ethics
EthicsEthics
Week9 lecture notes com325
Week9 lecture notes com325Week9 lecture notes com325
Week9 lecture notes com325
Olivia Miller
 
a.pptx
a.pptxa.pptx
a.pptx
angadveer4
 
Introduction to ethics 1
Introduction to ethics 1Introduction to ethics 1
Introduction to ethics 1
syedsaqibrazarizvi
 
Lecture 1_Introduction to Science, Technology, and Society.pptx
Lecture 1_Introduction to Science, Technology, and Society.pptxLecture 1_Introduction to Science, Technology, and Society.pptx
Lecture 1_Introduction to Science, Technology, and Society.pptx
MarionneMarquez1
 
Intimate technology - the battle for our body and behaviour
Intimate technology - the battle for our body and behaviourIntimate technology - the battle for our body and behaviour
Intimate technology - the battle for our body and behaviour
Karlos Svoboda
 
IntroToCybersecurityEthics.pdf
IntroToCybersecurityEthics.pdfIntroToCybersecurityEthics.pdf
IntroToCybersecurityEthics.pdf
JevieApatan
 
In a 2 to 3 page paper, research and discuss the dilemmas we now fac.pdf
In a 2 to 3 page paper, research and discuss the dilemmas we now fac.pdfIn a 2 to 3 page paper, research and discuss the dilemmas we now fac.pdf
In a 2 to 3 page paper, research and discuss the dilemmas we now fac.pdf
jaronkyleigh59760
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
OxfordRiNorth
 
Computers what-about_our_future
Computers  what-about_our_futureComputers  what-about_our_future
Computers what-about_our_futureKwame Afreh
 
Outline D
Outline DOutline D
Outline Dbutest
 
Ethical Aspects of Science and Technology
Ethical Aspects of Science and TechnologyEthical Aspects of Science and Technology
Ethical Aspects of Science and Technology
Sushmita Mae Leones
 
L1. Introduction to Science, Technology and Society.pptx
L1. Introduction to Science, Technology and Society.pptxL1. Introduction to Science, Technology and Society.pptx
L1. Introduction to Science, Technology and Society.pptx
JohnPaulNavarro7
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 versionJohan Koren
 
MIL lesson 6.pptx
MIL lesson 6.pptxMIL lesson 6.pptx
MIL lesson 6.pptx
RobinMallari
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
Gemy Chan
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 

Similar to Ethics of technology (20)

Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Week9 lecture notes com325
Week9 lecture notes com325Week9 lecture notes com325
Week9 lecture notes com325
 
a.pptx
a.pptxa.pptx
a.pptx
 
Introduction to ethics 1
Introduction to ethics 1Introduction to ethics 1
Introduction to ethics 1
 
Lecture 1_Introduction to Science, Technology, and Society.pptx
Lecture 1_Introduction to Science, Technology, and Society.pptxLecture 1_Introduction to Science, Technology, and Society.pptx
Lecture 1_Introduction to Science, Technology, and Society.pptx
 
Intimate technology - the battle for our body and behaviour
Intimate technology - the battle for our body and behaviourIntimate technology - the battle for our body and behaviour
Intimate technology - the battle for our body and behaviour
 
IntroToCybersecurityEthics.pdf
IntroToCybersecurityEthics.pdfIntroToCybersecurityEthics.pdf
IntroToCybersecurityEthics.pdf
 
In a 2 to 3 page paper, research and discuss the dilemmas we now fac.pdf
In a 2 to 3 page paper, research and discuss the dilemmas we now fac.pdfIn a 2 to 3 page paper, research and discuss the dilemmas we now fac.pdf
In a 2 to 3 page paper, research and discuss the dilemmas we now fac.pdf
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Computers what-about_our_future
Computers  what-about_our_futureComputers  what-about_our_future
Computers what-about_our_future
 
PIAFinalPaper
PIAFinalPaperPIAFinalPaper
PIAFinalPaper
 
Outline D
Outline DOutline D
Outline D
 
Ethical Aspects of Science and Technology
Ethical Aspects of Science and TechnologyEthical Aspects of Science and Technology
Ethical Aspects of Science and Technology
 
L1. Introduction to Science, Technology and Society.pptx
L1. Introduction to Science, Technology and Society.pptxL1. Introduction to Science, Technology and Society.pptx
L1. Introduction to Science, Technology and Society.pptx
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
 
MIL lesson 6.pptx
MIL lesson 6.pptxMIL lesson 6.pptx
MIL lesson 6.pptx
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 

More from Arsalan Humayun

HR Department of a Pharma Company
HR Department of a Pharma CompanyHR Department of a Pharma Company
HR Department of a Pharma Company
Arsalan Humayun
 
ERP implementation at a Pharma company in Pakistan
ERP implementation at a Pharma company in PakistanERP implementation at a Pharma company in Pakistan
ERP implementation at a Pharma company in Pakistan
Arsalan Humayun
 
Marketing of a pharma (Basic)
Marketing of a pharma (Basic)Marketing of a pharma (Basic)
Marketing of a pharma (Basic)
Arsalan Humayun
 
lack of latest machinery causing to produce low quality drugs by local pharma...
lack of latest machinery causing to produce low quality drugs by local pharma...lack of latest machinery causing to produce low quality drugs by local pharma...
lack of latest machinery causing to produce low quality drugs by local pharma...
Arsalan Humayun
 
Roche pharma IS Audit and Management
Roche pharma IS Audit and ManagementRoche pharma IS Audit and Management
Roche pharma IS Audit and Management
Arsalan Humayun
 
Roche pharma IS Audit and Management
Roche pharma IS Audit and ManagementRoche pharma IS Audit and Management
Roche pharma IS Audit and Management
Arsalan Humayun
 
Globalization business ethics
Globalization business ethicsGlobalization business ethics
Globalization business ethics
Arsalan Humayun
 
Silk bank Gap analysis
Silk bank Gap analysisSilk bank Gap analysis
Silk bank Gap analysis
Arsalan Humayun
 
Existence of allah
Existence of allahExistence of allah
Existence of allah
Arsalan Humayun
 
Management practices in a pharma comoany
Management practices in a pharma comoanyManagement practices in a pharma comoany
Management practices in a pharma comoany
Arsalan Humayun
 
Financial statement
Financial statementFinancial statement
Financial statement
Arsalan Humayun
 
Child labor in Pakistan
Child labor in PakistanChild labor in Pakistan
Child labor in Pakistan
Arsalan Humayun
 
POM Pharma
POM PharmaPOM Pharma
POM Pharma
Arsalan Humayun
 

More from Arsalan Humayun (13)

HR Department of a Pharma Company
HR Department of a Pharma CompanyHR Department of a Pharma Company
HR Department of a Pharma Company
 
ERP implementation at a Pharma company in Pakistan
ERP implementation at a Pharma company in PakistanERP implementation at a Pharma company in Pakistan
ERP implementation at a Pharma company in Pakistan
 
Marketing of a pharma (Basic)
Marketing of a pharma (Basic)Marketing of a pharma (Basic)
Marketing of a pharma (Basic)
 
lack of latest machinery causing to produce low quality drugs by local pharma...
lack of latest machinery causing to produce low quality drugs by local pharma...lack of latest machinery causing to produce low quality drugs by local pharma...
lack of latest machinery causing to produce low quality drugs by local pharma...
 
Roche pharma IS Audit and Management
Roche pharma IS Audit and ManagementRoche pharma IS Audit and Management
Roche pharma IS Audit and Management
 
Roche pharma IS Audit and Management
Roche pharma IS Audit and ManagementRoche pharma IS Audit and Management
Roche pharma IS Audit and Management
 
Globalization business ethics
Globalization business ethicsGlobalization business ethics
Globalization business ethics
 
Silk bank Gap analysis
Silk bank Gap analysisSilk bank Gap analysis
Silk bank Gap analysis
 
Existence of allah
Existence of allahExistence of allah
Existence of allah
 
Management practices in a pharma comoany
Management practices in a pharma comoanyManagement practices in a pharma comoany
Management practices in a pharma comoany
 
Financial statement
Financial statementFinancial statement
Financial statement
 
Child labor in Pakistan
Child labor in PakistanChild labor in Pakistan
Child labor in Pakistan
 
POM Pharma
POM PharmaPOM Pharma
POM Pharma
 

Recently uploaded

Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
shetivia
 
Introduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.pptIntroduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.ppt
VishnuVenugopal84
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
egoetzinger
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
DOT TECH
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
pchutichetpong
 
2. Elemental Economics - Mineral demand.pdf
2. Elemental Economics - Mineral demand.pdf2. Elemental Economics - Mineral demand.pdf
2. Elemental Economics - Mineral demand.pdf
Neal Brewster
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Quotidiano Piemontese
 
Seminar: Gender Board Diversity through Ownership Networks
Seminar: Gender Board Diversity through Ownership NetworksSeminar: Gender Board Diversity through Ownership Networks
Seminar: Gender Board Diversity through Ownership Networks
GRAPE
 
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
conose1
 
Analyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar modelAnalyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar model
ManthanBhardwaj4
 
The European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population agingThe European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population aging
GRAPE
 
BYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptxBYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptx
mikemetalprod
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYC
DOT TECH
 
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
nexop1
 
can I really make money with pi network.
can I really make money with pi network.can I really make money with pi network.
can I really make money with pi network.
DOT TECH
 
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
muslimdavidovich670
 
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
obyzuk
 
Earn a passive income with prosocial investing
Earn a passive income with prosocial investingEarn a passive income with prosocial investing
Earn a passive income with prosocial investing
Colin R. Turner
 
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdfTumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
Henry Tapper
 
Instant Issue Debit Cards
Instant Issue Debit CardsInstant Issue Debit Cards
Instant Issue Debit Cards
egoetzinger
 

Recently uploaded (20)

Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
 
Introduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.pptIntroduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.ppt
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
 
2. Elemental Economics - Mineral demand.pdf
2. Elemental Economics - Mineral demand.pdf2. Elemental Economics - Mineral demand.pdf
2. Elemental Economics - Mineral demand.pdf
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
 
Seminar: Gender Board Diversity through Ownership Networks
Seminar: Gender Board Diversity through Ownership NetworksSeminar: Gender Board Diversity through Ownership Networks
Seminar: Gender Board Diversity through Ownership Networks
 
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
 
Analyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar modelAnalyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar model
 
The European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population agingThe European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population aging
 
BYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptxBYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptx
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYC
 
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
 
can I really make money with pi network.
can I really make money with pi network.can I really make money with pi network.
can I really make money with pi network.
 
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
 
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
 
Earn a passive income with prosocial investing
Earn a passive income with prosocial investingEarn a passive income with prosocial investing
Earn a passive income with prosocial investing
 
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdfTumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
Tumelo-deep-dive-into-pass-through-voting-Feb23 (1).pdf
 
Instant Issue Debit Cards
Instant Issue Debit CardsInstant Issue Debit Cards
Instant Issue Debit Cards
 

Ethics of technology

  • 1.
  • 2. Group Members: 1. Aniqa Asghar 2. Mahrukh Zehra 3. Zainab Jamal 4. Turab Raza
  • 3. What is Ethics of Technology? Ethics in technology is a sub-field of ethics addressing the ethical questions specific to the Technology Age. It is often held that technology itself is incapable of possessing moral or ethical qualities, since "technology" is merely tool making.
  • 4. FOUR ETHICAL ISSUES OF THE INFORMATION AGE 1. PRIVACY: Two forces threaten our privacy. One is the growth of information technology, with its enhanced capacity for surveillance, communication, computation, storage, and retrieval. A second, and more insidious threat, is the increased value of information in decision-making. Information is increasingly valuable to policy makers; they covet it even if acquiring it invades another's privacy.
  • 5. 2. ACCURACY: Misinformation has a way of fouling up people's lives, especially when the party with the inaccurate information has an advantage in power and authority.
  • 6. 3. PROPERTY: One of the most complex issues we face as a society is the question of intellectual property rights. Any individual item of information can be extremely costly to produce in the first instance. Yet, once it is produced, that information has the illusive quality of being easy to reproduce and to share with others. We currently have several imperfect institutions that try to protect intellectual property rights. Copyrights, patents, encryption, oaths of confidentiality, and such old fashioned values as trust worthiness and loyalty are the most commonly used protectors of our intellectual property. Problem issues, however, still abound in this area. Let us focus on just one aspect: artificial intelligence and its expanding subfield, expert systems.
  • 7. 4. ACCESS: In an information society a citizen must possess at least three things to be literate:  - One must have the intellectual skills to deal with information. These are skill such as reading, writing, reasoning, and calculating. This is a task for education.  - One must have access to the information technologies which store, convey and process information. This includes libraries, radios, televisions, telephones, and increasingly, personal computers or terminals linked via networks to mainframes. This is a problem in social economics.  - Finally, one must have access to the information itself. This requirement returns to the issue of property and is also a problem in social economics.
  • 8. IS TECHNOLOGY VALUE LOADED OR VALUE NEUTRAL?  According to most researches ethics is known to be value-neutral. Like any tool, it is not the tool itself that does anything of any value. Hence its Value free. But rather it is the user that is responsible for whatever comes from using the tool. I think technology is simply another tool in a long line and history of tools that have been available to preachers for a very long time. What people do with technology is entirely up to them.
  • 9. WEAPONS  CHEMICAL WEAPONS: They are defined as chemical substances that can be delivered using munitions dispersal devices to cause death or severe harm to people, animals and plants. Example: Nerve gas, tear gas and pepper gas. BIOLOGICAL WEAPONS: They are defined as harmful biological agents as in pathogenic micro organisms or neurotoxins as weapons to cause death or disease usually o a large scale. Example: Anthrax, small pox, wheat stem rust.
  • 10. History Of Biological Weapons One of the first documented uses of biological weaponry was the use of poison tipped arrows in Middle East dating before year 400 BC. Such arrows were covered in a mixture of putrefied flesh and dung containing harmful bacteria including gangrene and tetanus.
  • 11. Peloponnesian war: Another use of biological weaponry around this time was the suspected poisoning of Athenian wells by Spartans during the Peloponnesian war (404-431 BC) After Sparta laid siege on Athens, a deadly epidemic broke out within Athens that wiped out roughly a quarter of population.
  • 12. History Of Chemical Weapons The use of poisonous gases during World War 1 was the first recognized use of chemical warfare. Poisonous gases used at that time includes chlorine gas and mustard gas. These gases proved to be fatal in large amount, blistering skin and dissolving lungs.
  • 13. Chemical and biological weapons used to wipe out individuals or a small group on small scale PROS  Solid and liquid biological and chemical agents can easily be concealed in food or drink.  Anonymity (harder to determine attacker than when using conventional weapon). Therefore, there is a low probability for retaliation, leading to fewer lives lost. CONS  These weapons are often slow to skill and cause unnecessary pain to target.  There is a degree of uncertainty as to whether or not weapon will eliminate the target (requires supervision)
  • 14. Chemical and biological weapons used to wipe out individuals or a small group on Large scale PROS  Have the potential to put an end to an armed conflict by quickly in captivating enemy forces.  Can be justified by utilitarian approach if the lives lost and damage done by weapon to end an war are less than that caused by continuation of war. CONS  Unintended civilian casualties (comparable to a nuclear weapon)  Potential to backfire.
  • 15. RESEARCHES ON POSSIBLE CHEMICAL AND BIOLOGICALAGENTS If the agents which are being researched has not been used as a weapon, there lies a possibility of risk that this research may fall into wrong hands and could lead to destruction. On the other hand if the agent being researched has already been used a weapon only good can come out of it. Example: Small pox was already used as a weapon during the war so its was developed vaccine in order to cure it.
  • 16. PRIVACY Privacy is the claim of individuals, groups or institutions to determine for themselves when, how, and to what extent their information should be communicated to other. PRIVACY HARM: There are four types of privacy harms which are as follows:  Intrusion  Information collection  Information processing  Information dissemination
  • 17. Ways To Protect Privacy There are four ways to protect privacy i.e technology, law, markets and your choice. EXAMPLE: Reducing spam Technology: Spam filters Law: The CAN-SPAM Act 1- Illegal to send commercial email with false headers 2- You can unsubscribe from the sender Markets: You choose an email provider that does a good job of reducing spam Your choice: You decide not to open that email with the unpleasant header
  • 18. Internet ethics- Introduction  It describes a code of conduct for the users of internet.  Organizations that introduce new information systems must first address legal and ethical issues related to technologies.
  • 19. Ethical and moral issues associated with the internet  Cyber bullying  Provision of misleading information on websites  Plagiarism  Use of photo editors to distort reality  Privacy  Hacking  Inappropriate websites with illicit material
  • 20. What is cyber bullying?  Electronic aggression  Online rumors  Posting pictures without consent/harasment Plagiarism  Users/students can download anything from the internet.  They can access any information/data, copy paste it and use it as their own information.  Research papers are available freely that are copied very easily.
  • 21. HACKING  Into bank accounts of online users, website hacking, computer hacking, password hacking, etc REMEDIES  Copyrights to avoid plagiarism  More developed filtering software  AUP – acceptable use policy  Privacy policies  Censorship of certain websites
  • 22. CELL PHONES Inappropriate cell phone usage may include  Texting while driving  Invading other’s privacy  Bullying  Harassment from wrong numbers  Frauds/misleading dealers  Spreading rumors
  • 23. ETHICS OF HEIDDEGER  The question concerning Technology  Published in 1954  Heidegger observes that because of technology, “all distances in time and space are shrinking” and “yet the hasty setting aside of all distances brings no nearness; for nearness does not consist in a small amount of distance”
  • 24.  Technology also brought some draw backs with it  Workers are being treated as merely means of production only