The document discusses various topics related to technology and ethics, including:
1) Social justice - Technology could be used to benefit the poor through solar energy, genetic engineering, and internet access, but there are debates around whether technology companies should focus on necessities over toys.
2) Intellectual property and fair use - There are debates around what constitutes fair use of copyrighted works and how standards could be updated for the digital age.
3) Privacy - Personal privacy is threatened in the digital age, and there are debates around surveillance and national ID systems versus individual freedoms.
4) Free speech - Google's actions in China raised debates around whether big businesses limit free speech by complying with
ETHICS01 - Introduction to Computer EthicsMichael Heron
An overview of issues related to ethics and the psychology of immorality. Intended for computing students as part of a professional and ethical issues module.
In this Slide we are Covering a Meaning of Computer Ethics and and Common Issues of Computer ethics.
Ethics is a set of moral principles that govern the behavior of an individual or group of people.
Meaning-:
Computer ethics is the application of moral principles to the use of computers and the Internet. Examples include intellectual property rights, privacy policies, and online etiquette, or "netiquette
Cyberspace and cyberethics and social networkingYUSRA FERNANDO
Cyberspace and Cyberethics and Social Networking
discusses the new realities of global computer networks, the intertwining of global economies, monopolies and their economic implications, globalization, emerging issues like global ethics, culture, and the development of the lingua franca for the Internet. It also focuses the discussion on the new realities of social networking.
In this presentation the concept of cyber-ethics is defined, some case studies are provided, as well as suggestions for how to teach cyber-ethics to students. It concludes with questions for consideration.
ETHICS01 - Introduction to Computer EthicsMichael Heron
An overview of issues related to ethics and the psychology of immorality. Intended for computing students as part of a professional and ethical issues module.
In this Slide we are Covering a Meaning of Computer Ethics and and Common Issues of Computer ethics.
Ethics is a set of moral principles that govern the behavior of an individual or group of people.
Meaning-:
Computer ethics is the application of moral principles to the use of computers and the Internet. Examples include intellectual property rights, privacy policies, and online etiquette, or "netiquette
Cyberspace and cyberethics and social networkingYUSRA FERNANDO
Cyberspace and Cyberethics and Social Networking
discusses the new realities of global computer networks, the intertwining of global economies, monopolies and their economic implications, globalization, emerging issues like global ethics, culture, and the development of the lingua franca for the Internet. It also focuses the discussion on the new realities of social networking.
In this presentation the concept of cyber-ethics is defined, some case studies are provided, as well as suggestions for how to teach cyber-ethics to students. It concludes with questions for consideration.
As the use of technology in the workplace continues to evolve and expand, social workers must examine the use of this technology within the realm of professional practice and ethical decision-making. In “Technology, Ethics, and Social Work”, we will explore some of the ethical challenges and considerations, while highlighting best practice guidelines, grounded in the National Association of Social Work (NASW)/Association of Social Work Boards (ASWB) Code of Ethics.
Learning Objectives:
1. NASW Code of Ethics Review.
2. Benefits and Challenges of Technology Use in Social Work Practice.
3. NASW/ASWB Standards for Technology.
4. Methods to Reduce Ethical Risk in Social Work Practice.
3D Printing and Permissionless Innovation (Adam Thierer March 2016)Adam Thierer
presentation by Adam Thierer of the Mercatus Center at George Mason University. Made at Univ. of Minnesota Law School symposium on "Legal Concerns in 3D Printing" on March 4, 2016.
Tutorial for ACM Multimedia 2016, given together with Gerald Friedland, with contributions from Julia Bernd and Yiannis Kompatsiaris. The presentation covered an introduction to the problem of disclosing personal information through multimedia sharing, the associated security risks, methods for conducting multimodla inferences and technical frameworks that could help alleviate such risks.
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to ComeMercatus Center
Successful innovation, which is essential to better health, safety and security, requires freedom to experiment and develop. But there is an array of government rules and processes that increasingly prohibit “permissionless” innovation.
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)Gerd Leonhard
This is an edited version of a presentation I gave at ITUWorld 2013 in Bangkok, Nov 21, 2013, see more details at http://www.futuristgerd.com/2013/11/21/here-is-the-pdf-with-my-slides-from-the-ituworld-event-in-bkk-today/ Topics: US domination of the Internet and cloud computing, big data futures, privacy failure and the global digital rights bill, the importance of trust, key issues for cloud computing, and much more. Check www.gerdtube.com for a video version (should be available soon)
If you enjoy my slideshares please take a look at my new book “Technology vs Humanity” http://www.techvshuman.com or buy it via Amazon http://gerd.fm/globalTVHamazon
More at http://www.futuristgerd.com or www.gerdleonhard.de
Download all of my videos and PDFs at http://www.gerdcloud.net
About my new book: are you ready for the greatest changes in recent human history? Futurism meets humanism in Gerd Leonhard’s ground-breaking new work of critical observation, discussing the multiple Megashifts that will radically alter not just our society and economy but our values and our biology. Wherever you stand on the scale between technomania and nostalgia for a lost world, this is a book to challenge, provoke, warn and inspire.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
2. Ethics in Computing
Ethics is the study of the general nature of
morals and of the specific moral choices made by
individuals.
Because technology often moves faster than rules
can be formulated to govern it, how technology is
used is left up to the indiviual with the guidance
of their personal ethics.
Page 83
3. Challenges
Technology challenges our ethics as individuals
and as a society, especially with regards to
1. Social Justice
2. Intellectual Property (Fair Use)
3. Privacy
4. E-Commerce (Online Gambling)
5. Free Speech
6. Computer Abuse
7. The Environment
Page 83
4. 1. Social Justice
Freeman Dyson, American physicist
“Science is concentrating too much on making toys
for the rich instead of addressing the necessities of
the poor.”
He proposes three technologies that can turn poor
rural areas into sources of wealth: solar energy,
genetic engineering and Internet access.
Page 85
5. Ethical Discussion is:
Can technology be used to benefit all?
Debate Issue is:
Does technology provide economic
opportunity for all?
6. 1. Social Justice
Ethical Discussion: Can technology be used to benefit all?
Point Counterpoint
• Technology can improve • Problem of poverty is not an
the quality of life of poor issue for technologists.
if scientists and business Should be addressed by
leaders get together. religious leaders/politicians/
• Technology can be an education experts.
ethical force to humanize • Genetic engineering may
us, giving us the ability to hold the promise of benefits
impact the lives of all but should not be explored
because of risks.
More on Page 85 - 86
7. 2. Intellectual Property (IP) and Fair Use
IP such as music, writing, and art us protected
through copyright law. Four criteria:
• What is the purpose of the “fair use” of the
work (eg is it for-profit or educational use?)
• What is the nature of the work (eg will it be
published or unpublished?)
• How much material is being used?
• Would it decrease the number of copies of the
original?
Page 87
8. Ethical Discussion is:
What is fair about fair use?
Debate Issue is:
What kind of fair use standards
are beneficial?
9. 2. IP and Fair Use
Ethical Discussion: What is Fair about Fair Use?
Point Counterpoint
• Allowing an open • Existing laws have worked
interpretation of far use well for print media and do
encourages dissemination not need to be modified.
of information. • Copyright holders are winin
• Existing laws cannot cope their rights to be aggressive.
with widespread Artists or critics can use the
dissemination of material but must be able to
information possible with pay the licensing fee.
Internet
More on Page 87 - 88
10. 3. Privacy
Simply put, privacy is the right to be left alone to
do as one pleases, to not have to explain your
behaviour to others.
In the digital age, we leave a trail of electronic
breadcrumbs almost everywhere we go.
11. Ethical Discussion is:
Is personal privacy a casualty of
the modern age?
Debate Issue is:
Should personal privacy be
protected
12. 3. Privacy
Ethical Discussion: Should privacy be protected?
Point Counterpoint
• If I’m not doing • If you aren’t doing
anything wrong, you anything wrong, you have
have no reason to nothing to hide.
watch. • It’s not possible to put a
• Requiring national ID price on freedom or
is like Nazis or security therefore projects
Soviets and like surveillance and
implementation is a national ID are worth the
waste of tax money. cost of implementation.
Page 90
14. Surveillance
Factors propelling the surveillance revolution:
1. Improved technology.
2. Centralized surveillance.
3. Unexamined assumptions that cameras provide
security.
These developments are creating powerful
momentum toward pervasive surveillance of our
public spaces.
15.
16. 4. Communication and Free Speech
Ethical Discussion is:
When does big business limit free
speech?
Debate Issue is:
Did Google make the right choice
in China by self-censoring?
Page 87
17. 4. Free Speech
Discussion: Does big business limit (Google) free speech?
Point Counterpoint
Google acted unethically Google’s actions justified
• Google sacrificed free- • Companies are free to pursue
speech for business. profits as long as they follow
• Cooperating with the country’s laws.
China violates human • Withdrawing from China
rights. would further restrict free
speech.
More on Page 94
18. 5. Computer Abuse
Using a computer or the Internet to harm another
individual. By providing anonymity the Internet
facilitates such unsavory activities.
Everyone agrees that protecting children from
harm is an important goal but the question is how
best to accomplish it?
19. Ethical Discussion is:
Does restricting online
information protect children?
Debate Issue is:
Is filtering or monitoring
software helpful?
20. 5. Computer Abuse
Ethical Discussion: Does restricting online information
protect children?
Point Counterpoint
• Filtering software is • Filtering routinely blocks
the only way to good as well as bad.
protect children • Educating children about
from violence and responsible Internet use is
porn. more effective.
• Parents need to be • Filtering widens the
assured that schools “digital divide” by
and libraries are adversely affecting the
“safe havens.” poor.
Page 96
21. 6. Environmental
Issues
Ethical Discussion: Does
excessive gadgetry lead to
excessive levels of
hazardous e-waste.
http://www.youtube.com/watch?v=67j7JlEZzpQ&feature=related