This document discusses different perspectives on cyberethics:
1) Professional ethics examines ethical responsibilities of computer professionals.
2) Philosophical ethics analyzes the nature and social impact of technology through ethical theories.
3) Descriptive ethics reports on the actual effects of technology without judgment, informing later normative analysis.
Cyberethics incorporates all three perspectives to understand technology's descriptive effects and prescribe ethical policies and conduct.
a simple presentation with introduction on hacking, presented by anant shrivastava on behalf of linux academy at rkdf bhopal http://academylinux.com and contact anant at http://anantshri.info
Think network forensics is just for security? Not with today’s 10G (and tomorrow’s 40G/100G) traffic, not to mention new 802.11ac wireless networks with multi-gigabit data rates. Data is traversing these networks so quickly that detailed, real-time analysis is at best a challenge. Network forensics provides key real-time statistics while saving a complete, packet-level recording of all network activity. You don’t need to worry about capturing the problem – your network forensics solution already has, allowing you to go back in time and analyze any network, application, or security condition.
a simple presentation with introduction on hacking, presented by anant shrivastava on behalf of linux academy at rkdf bhopal http://academylinux.com and contact anant at http://anantshri.info
Think network forensics is just for security? Not with today’s 10G (and tomorrow’s 40G/100G) traffic, not to mention new 802.11ac wireless networks with multi-gigabit data rates. Data is traversing these networks so quickly that detailed, real-time analysis is at best a challenge. Network forensics provides key real-time statistics while saving a complete, packet-level recording of all network activity. You don’t need to worry about capturing the problem – your network forensics solution already has, allowing you to go back in time and analyze any network, application, or security condition.
Social engineering and human error present the single biggest threat to companies in 2017. In fact, 60% of enterprise companies were targeted by social engineering attacks within the last year. As cyber security automation practices get better, attackers are increasingly relying on social engineering to make their way into systems and networks.
Visit- https://www.siemplify.co/
History of computer ethics
What is computer ethics
Computer ethics topics
Computers in the Workplace
Computer Crime
Privacy and Anonymity
Intellectual Property
Professional Responsibility
Globalization
Evolution of computer ethics
Metaethics of computer ethics
Lecture presentation to identify sets of principles, standards, or rules that guide the moral action of an individual; illustrate morality and code of conduct; apply the ten commandments of computer ethics; determine some ethical issues in computing; analyze the relevant laws in computing; criticize and argue legal issues of Data Privacy, Cybercrime and Intellectual Property.
Social engineering and human error present the single biggest threat to companies in 2017. In fact, 60% of enterprise companies were targeted by social engineering attacks within the last year. As cyber security automation practices get better, attackers are increasingly relying on social engineering to make their way into systems and networks.
Visit- https://www.siemplify.co/
History of computer ethics
What is computer ethics
Computer ethics topics
Computers in the Workplace
Computer Crime
Privacy and Anonymity
Intellectual Property
Professional Responsibility
Globalization
Evolution of computer ethics
Metaethics of computer ethics
Lecture presentation to identify sets of principles, standards, or rules that guide the moral action of an individual; illustrate morality and code of conduct; apply the ten commandments of computer ethics; determine some ethical issues in computing; analyze the relevant laws in computing; criticize and argue legal issues of Data Privacy, Cybercrime and Intellectual Property.
Presentación de la videoconferencia impartida a los alumnos de la materia "Inteligencia de Negocio" de la Maestría en Gestión de Tecnologías de la Información de la Universidad de Celaya dónde contamos con la participación de Héctor Cuesta, Chief Data Scientist de Dataxios, quién nos compartió su visión particular sobre que es el Big Data y la ciencia de datos así como algunas prácticas a tomar en cuenta al momento de desarrollar un "producto o servicio basado en datos"
Fecha: Viernes 15 de abril de 2016
Offer cue The marketplace that changes everythingsabbasi001
OfferCue is a community marketplace for people to list, discover, and buy used or new items locally or nationwide. OfferCue facilitates the process of buying and selling among community members and oversees the entire transaction from start to finish.
Frundraise is the fundraising website for athletes to raise money for charity as part of their training. Athletes can choose any charity and train for any event. Frundraise helps to motivate, encourage, and reward athletes for all of their hard work training by incorporating fundraising for their favorite charity.
The Mill+ design and animation team created a charming short film for children’s eco-fashion brand The Fableists. The film tells the story of a young girl taken on a whimsical journey by the loose thread on her t-shirt in the quest to discover its origins. Find out more about the film: http://bit.ly/EpcThr
Strategies for Answering Discussion and Essay Questions .docxjohniemcm5zt
Strategies for Answering Discussion and Essay Questions
Chapter 1
I: Strategies for selected Discussion and Essay Questions in Chapter 1 (See pages 30-31
in the textbook)
A. Strategies for Selected Discussion Questions in Chapter 1
4. Gotterbarn’s arguments are well constructed, and Gotterbarn makes a plausible case for
why computer ethics should be conceived of as field of professional ethics. In defense of
Gotterbarn’s position, we must concede that an understanding of professional-responsibility
issues is critical to an adequate understanding and analysis of computer ethics issues. In the
period of computing preceding the World Wide Web, Gotterbarn’s argument for why the field
of computer ethics should be conceived of as an area of professional ethics (whose primary
concern was for computer professionals) was plausible. At that time, many (if not most) of the
ethical issues involving computers directly affected the computing profession. Since then,
however, two important factors have influenced the field. First, a new (and broader) wave of
computer-related ethical issues emerged when the Internet became accessible to ordinary
people. Second, most people who currently use computers, either for work or for recreational
purposes, are not computer professionals. So, it would seem that we need a much broader
conception of the field than the one proposed by Gotterbarn. However, we also saw that
Gotterbarn’s view may ultimately turn out to be correct as more and more traditional
computer-ethics issues, such as those involving privacy, property, speech, and so forth,
become folded into “ordinary ethics.”
6. If we apply the first two-steps of the methodology described in Sec. 1.6 (entitled “A
Comprehensive Strategy for Approaching Cyberethics Issues”), we must first identify what
the ethical issues are in this case. Here, issues involving the personal privacy of Internet users
would seem to be apparent; so we have identified at least one ethical issue. Next, we need to
see whether there are any “policy vacuums” associated with this particular issue. There would
indeed seem to be a policy vacuum in the sense that neither ISPs nor ordinary users have a
clear understanding of a law or a policy for determining whether personal information about a
user’s online activities can be given to a non-law-enforcement organization merely because
some organization suspects one or more subscribers to an ISP of having violated copyright
laws. Consider that the RIAA is not a law enforcement agency. So, a policy vacuum
regarding cybertechnology once again emerges, and this vacuum or void needs to be filled
with a clear and explicit policy.
B. Strategies for Selected Essay Questions in Chapter 1
1. As we saw in this chapter of the textbook, a relatively recent practice that has generated
considerably controversy involved the way that the Recording Industry Association of
America (RIAA) .
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...Karlos Svoboda
Pathways towards responsible ICT Innovation
Policy Brief Abstract ICT has an immediate and broad impact on the lives of most individuals. Ethical scrutiny is not well established. Existing ethics review mechanisms are not suited for many of the ethical issues that ICT is likely to cause in the future. Europe has the unique opportunity to show international leadership by pointing the way to how human rights, ethical values and moral norms can be explicitly considered in technology development. The ETICA project (Ethical Issues of Emerging ICT Applications, GA 230318) provides the basis for a new enlightened approach to the development, governance and use of emerging ICT. MAY 2011 PE 460.346 EN
Objective There are two high-level objectives in this project ass.docxjuliennehar
Objective
: There are two high-level objectives in this project assignment that you must address:
1.
Matrix
: Produce a matrix mapping a key organizational ethical issue and how this issue is affected by laws, regulations and policies
2.
Report
: Prepare a text-only report (with a total minimum of 1,000 words) describing your thought process as you developed the matrix
This assignment gives you an opportunity to analyze a key IT-related organizational ethical issue subject to relevant laws, regulations, and policies. This includes sub-topics discussing information privacy, privacy laws, applications and court rulings (case law is usually an extension of the basic law), and key privacy and anonymity issues.
More specifically, consider a privacy topic like workplace monitoring,Web site user privacy policy, data mining, etc that has an organizational perspective as that will make your matrix easier to construct.
Note: You must produce an original ethical analysis in your original expression. Do not quote any source text and do not include any graphics of any kind in your project papers. Only use text and original expression - only that will be counted in addressing the minimum word count and addressing the topic criteria.
If you have problems creating a bordered table matrix or copy/pasting the table from the project description example, you can approximate the tabular format in your paper using an outline format, but make sure you identify the ethical dilemma, three chosen ethical principles, the stakeholders, and the specific responses of each stakeholder to the dilemma using each of the ethical principles you have identified.
Matrix
:
Using the template provided in the project assignment description and the list of suggested topics, produce a matrix mapping a key organizational ethical issue and how this issue is affected by laws, regulations and policies.
Step 1: Identify the ethical dilemma based on one of the broad categories identified.
Step 2: Identify the stakeholders involved.
Step 3: Choose any three of the principles that might apply.
Step 4: Identify how the dilemma affect each stakeholder based on the principles you identified. Place this brief statement in the matrix next to the stakeholder.
Using the chosen dilemma and the three principles of normative ethics you selected from the following list, complete the ethical matrix.
To use the matrix you must choose any three (only three) of the following list of twelve (12) principles of normative ethics:
Autonomy: the duty to maximize the individual's right to make his or her own decisions.
Beneficence: the duty to do good both individually and for all.
Confidentiality: the duty to respect privacy of information and action.
Equality: the duty to view all people as moral equals.
Finality: the duty to take action that may override the demands of law, religion, and social customs.
Justice: the duty to treat all fairly, distributing the risks and benefits equally.
Non-maleficence: the du.
Picture 1Picture 2InstructionsPaper B1 a matri.docxmattjtoni51554
Picture 1 Picture 2
Instructions
Paper B1: a matrix mapping of a key IT-related organizational (or personal) ethical issue concerning privacy.
This assignment gives you an opportunity to analyze a key IT-related organizational (or personal, if not in the job force) ethical issue, related to privacysubject to relevant laws, regulations, and policies. Both of the following sites provide sources, and an excellent backdrop for issues relating to privacy protection and the law.
See EPIC Privacy Issues at: http://epic.org/privacy/ See List on left and/or: EFF Privacy at https://www.eff.org/issues/privacy [see list in center on this page].
This includes sub-topics discussing information privacy, privacy laws, applications and court rulings (case law is usually an extension of the basic law based on the facts from specific cases and real-world court decisions), and key privacy and anonymity issues. While the sites provide many interesting topics, be sure to focus on our class IT topics.
1. Use the template below and the list of suggested workforce privacy topics from one of the sites above to produce a matrix to map a key organizational ethical (or personal, if not in the job force) issue and how this issue is affected by laws, regulations, and policies. Use the list of normative ethics principles below to help you complete the matrix. Choose any three (only three) of the following list of twelve (12) principles of normative ethics described below.
2. Prepare the Ethical Issue matrix and include the following explanation (200 words) —double-space your narrative—below the matrix:
1. Why I chose the dilemma;
2. Why I chose the three principles; and
3. An analysis of the research used to identify the actions in the matrix.
The completed matrix allows you to weigh the different issues involved and assign a rank as to the importance of the actions based on the effect on the stakeholders.
1. Submit the matrix for grading to the LEO Assignments Module.
2. Indicate appropriate APA in-text and source citations for all sources. In addition to critical thinking and analysis skills, your assignment should reflect appropriate grammar and spelling, good organization, and proper business-writing style.
This assignment is directly related to Paper-B2. The ethical issue identified in this assignment will be used in your Paper B2 Assignment. Paper B2 asks you to write a policy that corrects the ethical issue described in Paper B1.
Normative Ethics List
Autonomy: is the duty to maximize the individual's right to make his or her own decisions.
Beneficence: is the duty to do good both individually and for all.
Confidentiality: is the duty to respect privacy of information and action.
Equality: is the duty to view all people as moral equals.
Finality: is the duty to take action that may override the demands of law, religion, and social customs.
Justice: is the duty to treat all fairly, distributing the risks and benefits equally.
Non-maleficence: is the duty .
Professional Practice
Introduction to
– Ethics
– Islamic Ethics
– Professional Ethic
– Computer Ethics
What is Ethics?
Importance of Ethics
Ethics in Islam
What is Professional Ethics
Why professional ethics?
Professional Ethics
Problems with Professional Ethics
Computer Ethics
Aspects of computer ethics
History of Computer Ethics
Categories of Computer Issues
-Privacy
-Property
-Access
-Accuracy
Moral and Ethical Problems
-Hacking, cracking and virus creation
-Software piracy
-Ethical Scenarios
Context, Causality, and Information Flow: Implications for Privacy Engineerin...Sebastian Benthall
The creators of technical infrastructure are under social and legal pressure to comply with expectations that can be difficult to translate into computational and business logics. The dissertation presented in this talk bridges this gap through three projects that focus on privacy engineering, information security, and data economics, respectively. These projects culminate in a new formal method for evaluating the strategic and tactical value of data. This method relies on a core theoretical contribution building on the work of Shannon, Dretske, Pearl, Koller, and Nissenbaum: a definition of information flow as a channel situated in a context of causal relations.
Ethical dilemma: Identity Theft
Stakeholders
Confidentiality
Respect for Persons
Veracity
1. You
You have the duty to respect privacy of information and action
You have the duty to honor others, their rights, and their responsibilities. Showing respect others implies that we do not treat them as a mere means to our end
You have the duty to tell the truth
2. Businesses storing and utilizing personal information
They have the duty to employ appropriate safeguards to protect customer data
They have the data to respect the privacy and rights of their customers and ensure the protection of their data and treat it as critical as they do their own.
They have the duty to notify customers immediately upon possible or confirmed data breech.
3. Identity Theft Monitoring Services
They have the duty to ensure that while monitoring personal data, it remains secure and individuals are notified immediately upon suspected breech
They have the data to respect the privacy and rights of their customers and ensure the protection of their data and treat it as critical as they do their own.
They have the duty to notify customers immediately upon possible or confirmed unauthorized change to customer identity data.
4. Anti-Malware Software Vendors
They have the duty to ensure personal data is not included when transmitting diagnostic information from cusomter computers back to vendor
They have the data to respect the privacy and rights of their customers and ensure the protection of their data and treat it as critical as they do their own.
They have the duty to notify customers immediately upon possible or confirmed malicious activity and remain aware of current malicious methodologies.
Creating/Using a Template Matrix for Project B1
For your convenience, here is the Template matrix attached for use in Project B1 (as described in the Project Description post in this conference and in the Learning Portfolio Assignment Descriptions document in the course syllabus).
You can also copy/paste the template from the Learning Portfolio Assignment Descriptions document in the course syllabus or you can use the Table Tool in MS Word to create one like the following example.
Ethical dilemma:
Stakeholders
1
2
3
4
Week Three Assignment Project B1
Here is a description of the project assignment for which you must address all of the following criteria as that is the basis for grading.
Objective: There are two high-level objectives in this project assignment that you must address:
1. Matrix: Produce a matrix mapping a key organizational ethical issue and how this issue is affected by laws, regulations and policies
2. Report: Prepare a text-only report (with a total minimum of 1,000 words) describing your thought process as you developed the matrix
This assignment gives you an opportunity to analyze a key IT-related organizational ethical issue subject to relevant laws, regulations, and policies. This includes sub-topics discussing information privacy, privac.
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
A Comprehensive Look at Generative AI in Retail App Testing.pdfkalichargn70th171
Traditional software testing methods are being challenged in retail, where customer expectations and technological advancements continually shape the landscape. Enter generative AI—a transformative subset of artificial intelligence technologies poised to revolutionize software testing.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
How to Position Your Globus Data Portal for Success Ten Good PracticesGlobus
Science gateways allow science and engineering communities to access shared data, software, computing services, and instruments. Science gateways have gained a lot of traction in the last twenty years, as evidenced by projects such as the Science Gateways Community Institute (SGCI) and the Center of Excellence on Science Gateways (SGX3) in the US, The Australian Research Data Commons (ARDC) and its platforms in Australia, and the projects around Virtual Research Environments in Europe. A few mature frameworks have evolved with their different strengths and foci and have been taken up by a larger community such as the Globus Data Portal, Hubzero, Tapis, and Galaxy. However, even when gateways are built on successful frameworks, they continue to face the challenges of ongoing maintenance costs and how to meet the ever-expanding needs of the community they serve with enhanced features. It is not uncommon that gateways with compelling use cases are nonetheless unable to get past the prototype phase and become a full production service, or if they do, they don't survive more than a couple of years. While there is no guaranteed pathway to success, it seems likely that for any gateway there is a need for a strong community and/or solid funding streams to create and sustain its success. With over twenty years of examples to draw from, this presentation goes into detail for ten factors common to successful and enduring gateways that effectively serve as best practices for any new or developing gateway.
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
Games are powerful teaching tools, fostering hands-on engagement and fun. But they require careful consideration to succeed. Join me to explore factors in running and selecting games, ensuring they serve as effective teaching tools. Learn to maintain focus on learning objectives while playing, and how to measure the ROI of gaming in education. Discover strategies for pitching gaming to leadership. This session offers insights, tips, and examples for coaches, team leads, and enterprise leaders seeking to teach from simple to complex concepts.
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
We describe the deployment and use of Globus Compute for remote computation. This content is aimed at researchers who wish to compute on remote resources using a unified programming interface, as well as system administrators who will deploy and operate Globus Compute services on their research computing infrastructure.
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
Into the Box Keynote Day 2: Unveiling amazing updates and announcements for modern CFML developers! Get ready for exciting releases and updates on Ortus tools and products. Stay tuned for cutting-edge innovations designed to boost your productivity.
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
Les Buildpacks existent depuis plus de 10 ans ! D’abord, ils étaient utilisés pour détecter et construire une application avant de la déployer sur certains PaaS. Ensuite, nous avons pu créer des images Docker (OCI) avec leur dernière génération, les Cloud Native Buildpacks (CNCF en incubation). Sont-ils une bonne alternative au Dockerfile ? Que sont les buildpacks Paketo ? Quelles communautés les soutiennent et comment ?
Venez le découvrir lors de cette session ignite
Experience our free, in-depth three-part Tendenci Platform Corporate Membership Management workshop series! In Session 1 on May 14th, 2024, we began with an Introduction and Setup, mastering the configuration of your Corporate Membership Module settings to establish membership types, applications, and more. Then, on May 16th, 2024, in Session 2, we focused on binding individual members to a Corporate Membership and Corporate Reps, teaching you how to add individual members and assign Corporate Representatives to manage dues, renewals, and associated members. Finally, on May 28th, 2024, in Session 3, we covered questions and concerns, addressing any queries or issues you may have.
For more Tendenci AMS events, check out www.tendenci.com/events
2. Uniqueness Issue (Continued)
• Traditionalists and uniqueness proponents are
each partly correct.
• Traditionalists correctly point out that no new
ethical issues have been introduced by
computers.
• Uniqueness proponents are correct in that
cybertechnology has complicated our analysis
of traditional ethical issues.
3. Uniqueness Issue (Continued)
• So we must distinguish between: (a) unique
technological features, and (b) any (alleged)
unique ethical issues.
• Two scenarios from the text:
– (a) Computer professionals designing and coding a
controversial computer system
– (b) Software piracy
4. Case Illustration of a Policy Vacuum:
Duplicating Software
• In the early 1980s, there were no clear laws
regarding the duplication of software
programs, which was made easy because of
personal computers.
• A policy vacuum arose.
• Before the policy vacuum could be filled, we
had to clear up a conceptual muddle: What
exactly is software?
5. Cyberethics as a Branch of Applied
Ethics
• Applied ethics, unlike theoretical ethics, examines
"practical" ethical issues.
• It analyzes moral issues from the vantage-point of
one or more ethical theories.
• Ethicists working in fields of applied ethics are more
interested in applying ethical theories to the analysis
of specific moral problems than in debating the
ethical theories themselves.
6. Cyberethics as a Branch of Applied
Ethics (continued)
• Three distinct perspectives of applied ethics
(as applied to cyberethics):
• Professional Ethics
• Philosophical Ethics
• Descriptive Ethics
7. Perspective # 1: Professional Ethics
• According to this view, cyberethics is the field that
identifies and analyzes issues of ethical responsibility
for computer professionals.
• Consider a computer professional's role in designing,
developing, and maintaining computer hardware and
software systems.
– Suppose a programmer discovers that a software product
she has been working on is about to be released for sale to
the public, even though it is unreliable because it contains
"buggy" software.
– Should she "blow the whistle?"
8. Perspective # 2: Philosophical Ethics
From this perspective, cyberethics is a field of
philosophical analysis and inquiry that goes beyond
professional ethics (Gotterbarn).
Moor (1985), defines computer ethics as:
– ...the analysis of the nature and social impact of computer
technology and the corresponding formulation and
justification of policies for the ethical use of such
technology. [Italics Added.]
9. Perspective #3: Cyberethics as a Field of
Descriptive Ethics
• The professional and philosophical perspectives both
illustrate normative inquiries into applied ethics
issues.
• Normative inquiries or studies are contrasted with
descriptive studies.
• Descriptive investigations report about "what is the
case“; normative inquiries evaluate situations from
the vantage-point of the question: "what ought to be
the case."
10. Descriptive Ethics Perspective
(continued)
• Scenario: A community’s workforce and the
introduction of a new technology.
• Suppose a new technology displaces 8,000 workers
in a community.
• If we analyze the issues solely in terms of the
number of jobs that were gained or lost in that
community, our investigation is essentially
descriptive in nature.
• We are simply describing an impact that technology
X has for Community Y.
11. Descriptive Ethics Perspective
(continued)
• Descriptive vs. Normative Claims
• Consider three assertions:
– (1) "Bill Gates served as the Chief Executive Officer of Microsoft
Corporation for many years.”
– (2) "Bill Gates should expand Microsoft’s product offerings.“
– (3) “Bill Gates should not engage in business practices that are unfair
to competitors.”
Claims (2) And (3) are normative, (1) is descriptive;
(2) is normative but nonmoral, while (3) is both
normative and moral.
12. Figure 1-1: Descriptive vs.
Normative Claims
Descriptive Normative
(Report or describe what is the case) (Prescribe what ought to be the case)
Non-moral Moral
Prescribe or evaluate
in matters involving
standards such as art and sports
(e.g., criteria for a good painting
or an outstanding athlete).
Prescribe or evaluate
in matters having to
do with fairness and
Obligation (e.g., criteria
for just and unjust
actions and policies).
13. Some Benefits of Using the
Descriptive Approach
• Huff & Finholt (1994) claim that when we understand
the descriptive aspect of social effects of technology,
the normative ethical issues become clearer.
• The descriptive perspective prepare us for our
subsequent analysis of ethical issues that affect our
system of policies and laws.
14. Table 1-2: Summary of
Cyberethics Perspectives
Type of Perspective Associated
Disciplines
Issues Examined
Professional Computer Science
Engineering
Library/Information
Science
Professional Responsibility
System Reliability/Safety
Codes of Conduct
Philosophical Philosophy
Law
Privacy & Anonymity
Intellectual Property
Free Speech
Descriptive Sociology
Behavioral Sciences
Impact of cybertechnology
on governmental/financial/
educational institutions and
socio-demographic groups
15. Is Cyber-technology Neutral?
• Technology seems neutral, at least initially.
• Consider the cliché: “Guns don’t kill people, people
kill people.”
• Corlann Gee Bush (19997) argues that gun
technology, like all technologies, is biased in certain
directions.
• She points out that certain features inherent in gun
technology itself cause guns to be biased in a
direction towards violence.