SlideShare a Scribd company logo
Week 4: Technology and Ethics




http://www.dilbert.com
Ethics in Computing

Ethics is the study of the general nature of
morals and of the specific moral choices made by
individuals.

Because technology often moves faster than rules
can be formulated to govern it, how technology is
used is left up to the indiviual with the guidance
of their personal ethics.


                                  Page 83
Challenges
Technology challenges our ethics as individuals
and as a society, especially with regards to

 1. Social Justice
 2. Intellectual Property (Fair Use)
 3. Privacy
 4. E-Commerce (Online Gambling)
 5. Free Speech
 6. Computer Abuse
 7. The Environment
                               Page 83
1. Social Justice

Freeman Dyson, American physicist
“Science is concentrating too much on making toys
for the rich instead of addressing the necessities of
the poor.”

He proposes three technologies that can turn poor
rural areas into sources of wealth: solar energy,
genetic engineering and Internet access.

                                  Page 85
Ethical Discussion is:
Can technology be used to benefit all?

Debate Issue is:
Does technology provide economic
opportunity for all?
1. Social Justice
Ethical Discussion: Can technology be used to benefit all?

Point                              Counterpoint
•   Technology can improve         •   Problem of poverty is not an
    the quality of life of poor        issue for technologists.
    if scientists and business         Should be addressed by
    leaders get together.              religious leaders/politicians/
•   Technology can be an               education experts.
    ethical force to humanize      •   Genetic engineering may
    us, giving us the ability to       hold the promise of benefits
    impact the lives of all            but should not be explored
                                       because of risks.

                  More on Page 85 - 86
2. Intellectual Property (IP) and Fair Use
IP such as music, writing, and art us protected
through copyright law. Four criteria:
 • What is the purpose of the “fair use” of the
   work (eg is it for-profit or educational use?)
 • What is the nature of the work (eg will it be
   published or unpublished?)
 • How much material is being used?
 • Would it decrease the number of copies of the
   original?

                                Page 87
Ethical Discussion is:
What is fair about fair use?

Debate Issue is:
What kind of fair use standards
are beneficial?
2. IP and Fair Use
Ethical Discussion: What is Fair about Fair Use?

Point                           Counterpoint
•   Allowing an open            •   Existing laws have worked
    interpretation of far use       well for print media and do
    encourages dissemination        not need to be modified.
    of information.             •   Copyright holders are winin
•   Existing laws cannot cope       their rights to be aggressive.
    with widespread                 Artists or critics can use the
    dissemination of                material but must be able to
    information possible with       pay the licensing fee.
    Internet

                More on Page 87 - 88
3. Privacy

Simply put, privacy is the right to be left alone to
do as one pleases, to not have to explain your
behaviour to others.

In the digital age, we leave a trail of electronic
breadcrumbs almost everywhere we go.
Ethical Discussion is:
Is personal privacy a casualty of
the modern age?

Debate Issue is:
Should personal privacy be
protected
3. Privacy
Ethical Discussion: Should privacy be protected?

 Point                        Counterpoint
  • If I’m not doing          • If you aren’t doing
      anything wrong, you         anything wrong, you have
      have no reason to           nothing to hide.
      watch.                  •   It’s not possible to put a
  •   Requiring national ID       price on freedom or
      is like Nazis or            security therefore projects
      Soviets and                 like surveillance and
      implementation is a         national ID are worth the
      waste of tax money.         cost of implementation.

                                       Page 90
Surveillance
Surveillance
Factors propelling the surveillance revolution:
   1. Improved technology.
   2. Centralized surveillance.
   3. Unexamined assumptions that cameras provide
   security.
These developments are creating powerful
momentum toward pervasive surveillance of our
public spaces.
4. Communication and Free Speech

 Ethical Discussion is:
 When does big business limit free
 speech?

 Debate Issue is:
 Did Google make the right choice
 in China by self-censoring?

                           Page 87
4. Free Speech
Discussion: Does big business limit (Google) free speech?

 Point                          Counterpoint
 Google acted unethically       Google’s actions justified
  •   Google sacrificed free-   •   Companies are free to pursue
      speech for business.          profits as long as they follow
  •   Cooperating with              the country’s laws.
      China violates human      •   Withdrawing from China
      rights.                       would further restrict free
                                    speech.



                More on Page 94
5. Computer Abuse

Using a computer or the Internet to harm another
individual. By providing anonymity the Internet
facilitates such unsavory activities.

Everyone agrees that protecting children from
harm is an important goal but the question is how
best to accomplish it?
Ethical Discussion is:
Does restricting online
information protect children?

Debate Issue is:
Is filtering or monitoring
software helpful?
5. Computer Abuse
Ethical Discussion: Does restricting online information
protect children?

 Point                         Counterpoint
  • Filtering software is      • Filtering routinely blocks
      the only way to              good as well as bad.
      protect children         •   Educating children about
      from violence and            responsible Internet use is
      porn.                        more effective.
  •   Parents need to be       •   Filtering widens the
      assured that schools         “digital divide” by
      and libraries are            adversely affecting the
      “safe havens.”               poor.

                                        Page 96
6. Environmental
                               Issues
                               Ethical Discussion: Does
                               excessive gadgetry lead to
                               excessive levels of
                               hazardous e-waste.




http://www.youtube.com/watch?v=67j7JlEZzpQ&feature=related

More Related Content

What's hot

PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsScøtt Lıgøckı
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
Michael Heron
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
muhammad-Sulaiman
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
AnkitTripathi159
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
WonderingAriana
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
SKS
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
Rownel Cerezo Gagani
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networking
YUSRA FERNANDO
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in IT
Rohana K Amarakoon
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethics
Junaid Qadir
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Geoffrey Lowe
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
Vehitaltinci
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resourcesb5thom
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
Rushana Bandara
 

What's hot (20)

PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer Ethics
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
Cyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networkingCyberspace and cyberethics and social networking
Cyberspace and cyberethics and social networking
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in IT
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethics
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Computer Ethics in Digital Resources
Computer Ethics in Digital ResourcesComputer Ethics in Digital Resources
Computer Ethics in Digital Resources
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 

Viewers also liked

Computer Ethics Project 2009
 Computer Ethics Project 2009 Computer Ethics Project 2009
Computer Ethics Project 2009
Theresa Jay
 
Nav Topic 9 vhf omni range (vor)
Nav Topic 9 vhf omni range (vor)Nav Topic 9 vhf omni range (vor)
Nav Topic 9 vhf omni range (vor)Izah Asmadi
 
"Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work""Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work"
Tawny Brown
 
Business ethics C8 -ethics_technology
Business ethics C8  -ethics_technologyBusiness ethics C8  -ethics_technology
Business ethics C8 -ethics_technology
Izah Asmadi
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethicsaleeya91
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
Fizaril Amzari Omar
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
Rachel Farnese
 

Viewers also liked (8)

Computer Ethics Project 2009
 Computer Ethics Project 2009 Computer Ethics Project 2009
Computer Ethics Project 2009
 
Nav Topic 9 vhf omni range (vor)
Nav Topic 9 vhf omni range (vor)Nav Topic 9 vhf omni range (vor)
Nav Topic 9 vhf omni range (vor)
 
"Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work""Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work"
 
Business ethics C8 -ethics_technology
Business ethics C8  -ethics_technologyBusiness ethics C8  -ethics_technology
Business ethics C8 -ethics_technology
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethics
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 

Similar to Ethics Presentation

Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 versionJohan Koren
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
SheejamolMathew
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 versionJohan Koren
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
egschool
 
Digital citizenship josti
Digital citizenship jostiDigital citizenship josti
Digital citizenship jostiSandy Munnell
 
9 Elements of Digital Citizenship and the 5 fluencies.
9 Elements of Digital Citizenship and the 5 fluencies.9 Elements of Digital Citizenship and the 5 fluencies.
9 Elements of Digital Citizenship and the 5 fluencies.
Robert Tsiliiyiannis
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
samkvarughese
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
Omnia Magdy
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
JannahAboulhassan
 
Digital citizenship powerpoint
Digital citizenship powerpoint Digital citizenship powerpoint
Digital citizenship powerpoint
Omnia Magdy
 
Digital Age - Rules for Netizens
Digital Age  - Rules for NetizensDigital Age  - Rules for Netizens
Digital Age - Rules for Netizens
Premanand Edward Malyakkal
 
3D Printing and Permissionless Innovation (Adam Thierer March 2016)
3D Printing and Permissionless Innovation (Adam Thierer March 2016)3D Printing and Permissionless Innovation (Adam Thierer March 2016)
3D Printing and Permissionless Innovation (Adam Thierer March 2016)
Adam Thierer
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
Premanand Edward Malyakkal
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
Symeon Papadopoulos
 
GCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptxGCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptx
sangeetha865539
 
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
Mercatus Center
 
The future of internet
The future of internetThe future of internet
The future of internetpsp710
 
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
Gerd Leonhard
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technologyJohan Koren
 

Similar to Ethics Presentation (20)

Naughty or nice 2003 version
Naughty or nice 2003 versionNaughty or nice 2003 version
Naughty or nice 2003 version
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Digital citizenship josti
Digital citizenship jostiDigital citizenship josti
Digital citizenship josti
 
9 Elements of Digital Citizenship and the 5 fluencies.
9 Elements of Digital Citizenship and the 5 fluencies.9 Elements of Digital Citizenship and the 5 fluencies.
9 Elements of Digital Citizenship and the 5 fluencies.
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
 
Digital citizenship powerpoint
Digital citizenship powerpointDigital citizenship powerpoint
Digital citizenship powerpoint
 
Digital citizenship powerpoint
Digital citizenship powerpoint Digital citizenship powerpoint
Digital citizenship powerpoint
 
Digital Age - Rules for Netizens
Digital Age  - Rules for NetizensDigital Age  - Rules for Netizens
Digital Age - Rules for Netizens
 
3D Printing and Permissionless Innovation (Adam Thierer March 2016)
3D Printing and Permissionless Innovation (Adam Thierer March 2016)3D Printing and Permissionless Innovation (Adam Thierer March 2016)
3D Printing and Permissionless Innovation (Adam Thierer March 2016)
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
GCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptxGCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptx
 
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
 
The future of internet
The future of internetThe future of internet
The future of internet
 
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 

More from University of Calgary, School of Creative and Performing Arts

2017 04 571
2017 04 5712017 04 571
2017 03 571
2017 03 5712017 03 571
2017 02 571
2017 02 5712017 02 571
Performance in Virtual Worlds
Performance in Virtual WorldsPerformance in Virtual Worlds
Game Genres
Game GenresGame Genres
Serious Games
Serious GamesSerious Games
Layers of Performativity
Layers of PerformativityLayers of Performativity
Motion Capture
Motion CaptureMotion Capture
Core and Shell of Games
Core and Shell of GamesCore and Shell of Games
Voice Acting Animation
Voice Acting AnimationVoice Acting Animation
Canadian Actors and Auteurs
Canadian Actors and AuteursCanadian Actors and Auteurs
Foreign Films and Cultural Signs
Foreign Films and Cultural SignsForeign Films and Cultural Signs
Principles of Animation
Principles of AnimationPrinciples of Animation
Comedy and A Full Arch of Experience
Comedy and A Full Arch of ExperienceComedy and A Full Arch of Experience

More from University of Calgary, School of Creative and Performing Arts (20)

2017 07 571
2017 07 5712017 07 571
2017 07 571
 
2017 08 571
2017 08 5712017 08 571
2017 08 571
 
2017 07 571
2017 07 5712017 07 571
2017 07 571
 
2017 05 571
2017 05 5712017 05 571
2017 05 571
 
2017 04 571
2017 04 5712017 04 571
2017 04 571
 
2017 02a. 571
2017 02a. 5712017 02a. 571
2017 02a. 571
 
2017 04 571
2017 04 5712017 04 571
2017 04 571
 
2017 03 571
2017 03 5712017 03 571
2017 03 571
 
2017 02 571
2017 02 5712017 02 571
2017 02 571
 
Performance in Virtual Worlds
Performance in Virtual WorldsPerformance in Virtual Worlds
Performance in Virtual Worlds
 
Game Genres
Game GenresGame Genres
Game Genres
 
Serious Games
Serious GamesSerious Games
Serious Games
 
Layers of Performativity
Layers of PerformativityLayers of Performativity
Layers of Performativity
 
Motion Capture
Motion CaptureMotion Capture
Motion Capture
 
Core and Shell of Games
Core and Shell of GamesCore and Shell of Games
Core and Shell of Games
 
Voice Acting Animation
Voice Acting AnimationVoice Acting Animation
Voice Acting Animation
 
Canadian Actors and Auteurs
Canadian Actors and AuteursCanadian Actors and Auteurs
Canadian Actors and Auteurs
 
Foreign Films and Cultural Signs
Foreign Films and Cultural SignsForeign Films and Cultural Signs
Foreign Films and Cultural Signs
 
Principles of Animation
Principles of AnimationPrinciples of Animation
Principles of Animation
 
Comedy and A Full Arch of Experience
Comedy and A Full Arch of ExperienceComedy and A Full Arch of Experience
Comedy and A Full Arch of Experience
 

Recently uploaded

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Ethics Presentation

  • 1. Week 4: Technology and Ethics http://www.dilbert.com
  • 2. Ethics in Computing Ethics is the study of the general nature of morals and of the specific moral choices made by individuals. Because technology often moves faster than rules can be formulated to govern it, how technology is used is left up to the indiviual with the guidance of their personal ethics. Page 83
  • 3. Challenges Technology challenges our ethics as individuals and as a society, especially with regards to 1. Social Justice 2. Intellectual Property (Fair Use) 3. Privacy 4. E-Commerce (Online Gambling) 5. Free Speech 6. Computer Abuse 7. The Environment Page 83
  • 4. 1. Social Justice Freeman Dyson, American physicist “Science is concentrating too much on making toys for the rich instead of addressing the necessities of the poor.” He proposes three technologies that can turn poor rural areas into sources of wealth: solar energy, genetic engineering and Internet access. Page 85
  • 5. Ethical Discussion is: Can technology be used to benefit all? Debate Issue is: Does technology provide economic opportunity for all?
  • 6. 1. Social Justice Ethical Discussion: Can technology be used to benefit all? Point Counterpoint • Technology can improve • Problem of poverty is not an the quality of life of poor issue for technologists. if scientists and business Should be addressed by leaders get together. religious leaders/politicians/ • Technology can be an education experts. ethical force to humanize • Genetic engineering may us, giving us the ability to hold the promise of benefits impact the lives of all but should not be explored because of risks. More on Page 85 - 86
  • 7. 2. Intellectual Property (IP) and Fair Use IP such as music, writing, and art us protected through copyright law. Four criteria: • What is the purpose of the “fair use” of the work (eg is it for-profit or educational use?) • What is the nature of the work (eg will it be published or unpublished?) • How much material is being used? • Would it decrease the number of copies of the original? Page 87
  • 8. Ethical Discussion is: What is fair about fair use? Debate Issue is: What kind of fair use standards are beneficial?
  • 9. 2. IP and Fair Use Ethical Discussion: What is Fair about Fair Use? Point Counterpoint • Allowing an open • Existing laws have worked interpretation of far use well for print media and do encourages dissemination not need to be modified. of information. • Copyright holders are winin • Existing laws cannot cope their rights to be aggressive. with widespread Artists or critics can use the dissemination of material but must be able to information possible with pay the licensing fee. Internet More on Page 87 - 88
  • 10. 3. Privacy Simply put, privacy is the right to be left alone to do as one pleases, to not have to explain your behaviour to others. In the digital age, we leave a trail of electronic breadcrumbs almost everywhere we go.
  • 11. Ethical Discussion is: Is personal privacy a casualty of the modern age? Debate Issue is: Should personal privacy be protected
  • 12. 3. Privacy Ethical Discussion: Should privacy be protected? Point Counterpoint • If I’m not doing • If you aren’t doing anything wrong, you anything wrong, you have have no reason to nothing to hide. watch. • It’s not possible to put a • Requiring national ID price on freedom or is like Nazis or security therefore projects Soviets and like surveillance and implementation is a national ID are worth the waste of tax money. cost of implementation. Page 90
  • 14. Surveillance Factors propelling the surveillance revolution: 1. Improved technology. 2. Centralized surveillance. 3. Unexamined assumptions that cameras provide security. These developments are creating powerful momentum toward pervasive surveillance of our public spaces.
  • 15.
  • 16. 4. Communication and Free Speech Ethical Discussion is: When does big business limit free speech? Debate Issue is: Did Google make the right choice in China by self-censoring? Page 87
  • 17. 4. Free Speech Discussion: Does big business limit (Google) free speech? Point Counterpoint Google acted unethically Google’s actions justified • Google sacrificed free- • Companies are free to pursue speech for business. profits as long as they follow • Cooperating with the country’s laws. China violates human • Withdrawing from China rights. would further restrict free speech. More on Page 94
  • 18. 5. Computer Abuse Using a computer or the Internet to harm another individual. By providing anonymity the Internet facilitates such unsavory activities. Everyone agrees that protecting children from harm is an important goal but the question is how best to accomplish it?
  • 19. Ethical Discussion is: Does restricting online information protect children? Debate Issue is: Is filtering or monitoring software helpful?
  • 20. 5. Computer Abuse Ethical Discussion: Does restricting online information protect children? Point Counterpoint • Filtering software is • Filtering routinely blocks the only way to good as well as bad. protect children • Educating children about from violence and responsible Internet use is porn. more effective. • Parents need to be • Filtering widens the assured that schools “digital divide” by and libraries are adversely affecting the “safe havens.” poor. Page 96
  • 21. 6. Environmental Issues Ethical Discussion: Does excessive gadgetry lead to excessive levels of hazardous e-waste. http://www.youtube.com/watch?v=67j7JlEZzpQ&feature=related