SlideShare a Scribd company logo
Lecture 06
Cyberethics
Uniqueness Issue (Continued)
• Traditionalists and uniqueness proponents are
each partly correct.
• Traditionalists correctly point out that no new
ethical issues have been introduced by
computers.
• Uniqueness proponents are correct in that
cybertechnology has complicated our analysis
of traditional ethical issues.
Uniqueness Issue (Continued)
• So we must distinguish between: (a) unique
technological features, and (b) any (alleged)
unique ethical issues.
• Two scenarios from the text:
– (a) Computer professionals designing and coding a
controversial computer system
– (b) Software piracy
Case Illustration of a Policy Vacuum:
Duplicating Software
• In the early 1980s, there were no clear laws
regarding the duplication of software
programs, which was made easy because of
personal computers.
• A policy vacuum arose.
• Before the policy vacuum could be filled, we
had to clear up a conceptual muddle: What
exactly is software?
Cyberethics as a Branch of Applied
Ethics
• Applied ethics, unlike theoretical ethics, examines
"practical" ethical issues.
• It analyzes moral issues from the vantage-point of
one or more ethical theories.
• Ethicists working in fields of applied ethics are more
interested in applying ethical theories to the analysis
of specific moral problems than in debating the
ethical theories themselves.
Cyberethics as a Branch of Applied
Ethics (continued)
• Three distinct perspectives of applied ethics
(as applied to cyberethics):
• Professional Ethics
• Philosophical Ethics
• Descriptive Ethics
Perspective # 1: Professional Ethics
• According to this view, cyberethics is the field that
identifies and analyzes issues of ethical responsibility
for computer professionals.
• Consider a computer professional's role in designing,
developing, and maintaining computer hardware and
software systems.
– Suppose a programmer discovers that a software product
she has been working on is about to be released for sale to
the public, even though it is unreliable because it contains
"buggy" software.
– Should she "blow the whistle?"
Perspective # 2: Philosophical Ethics
 From this perspective, cyberethics is a field of
philosophical analysis and inquiry that goes beyond
professional ethics (Gotterbarn).
 Moor (1985), defines computer ethics as:
– ...the analysis of the nature and social impact of computer
technology and the corresponding formulation and
justification of policies for the ethical use of such
technology. [Italics Added.]
Perspective #3: Cyberethics as a Field of
Descriptive Ethics
• The professional and philosophical perspectives both
illustrate normative inquiries into applied ethics
issues.
• Normative inquiries or studies are contrasted with
descriptive studies.
• Descriptive investigations report about "what is the
case“; normative inquiries evaluate situations from
the vantage-point of the question: "what ought to be
the case."
Descriptive Ethics Perspective
(continued)
• Scenario: A community’s workforce and the
introduction of a new technology.
• Suppose a new technology displaces 8,000 workers
in a community.
• If we analyze the issues solely in terms of the
number of jobs that were gained or lost in that
community, our investigation is essentially
descriptive in nature.
• We are simply describing an impact that technology
X has for Community Y.
Descriptive Ethics Perspective
(continued)
• Descriptive vs. Normative Claims
• Consider three assertions:
– (1) "Bill Gates served as the Chief Executive Officer of Microsoft
Corporation for many years.”
– (2) "Bill Gates should expand Microsoft’s product offerings.“
– (3) “Bill Gates should not engage in business practices that are unfair
to competitors.”
 Claims (2) And (3) are normative, (1) is descriptive;
(2) is normative but nonmoral, while (3) is both
normative and moral.
Figure 1-1: Descriptive vs.
Normative Claims
Descriptive Normative
(Report or describe what is the case) (Prescribe what ought to be the case)
Non-moral Moral
Prescribe or evaluate
in matters involving
standards such as art and sports
(e.g., criteria for a good painting
or an outstanding athlete).
Prescribe or evaluate
in matters having to
do with fairness and
Obligation (e.g., criteria
for just and unjust
actions and policies).
Some Benefits of Using the
Descriptive Approach
• Huff & Finholt (1994) claim that when we understand
the descriptive aspect of social effects of technology,
the normative ethical issues become clearer.
• The descriptive perspective prepare us for our
subsequent analysis of ethical issues that affect our
system of policies and laws.
Table 1-2: Summary of
Cyberethics Perspectives
Type of Perspective Associated
Disciplines
Issues Examined
Professional Computer Science
Engineering
Library/Information
Science
Professional Responsibility
System Reliability/Safety
Codes of Conduct
Philosophical Philosophy
Law
Privacy & Anonymity
Intellectual Property
Free Speech
Descriptive Sociology
Behavioral Sciences
Impact of cybertechnology
on governmental/financial/
educational institutions and
socio-demographic groups
Is Cyber-technology Neutral?
• Technology seems neutral, at least initially.
• Consider the cliché: “Guns don’t kill people, people
kill people.”
• Corlann Gee Bush (19997) argues that gun
technology, like all technologies, is biased in certain
directions.
• She points out that certain features inherent in gun
technology itself cause guns to be biased in a
direction towards violence.

More Related Content

What's hot

Port Scanning
Port ScanningPort Scanning
Port Scanning
amiable_indian
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
mtvvvv
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya
 
Web Security
Web SecurityWeb Security
Web Security
Bharath Manoharan
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
AmbikaMalgatti
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
Rushana Bandara
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Siemplify
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Faraz Ahmed
 
Ethical Hacking and Network Defense
Ethical Hacking and Network Defense Ethical Hacking and Network Defense
Ethical Hacking and Network Defense
Rishab garg
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
divyanshigarg4
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
Laguna State Polytechnic University
 
PACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATIONPACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATIONGoutham Royal
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Roberto Ellis
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Mediajrfields
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Wireshark Basic Presentation
Wireshark Basic PresentationWireshark Basic Presentation
Wireshark Basic Presentation
MD. SHORIFUL ISLAM
 

What's hot (20)

Port Scanning
Port ScanningPort Scanning
Port Scanning
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Web Security
Web SecurityWeb Security
Web Security
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethical Hacking and Network Defense
Ethical Hacking and Network Defense Ethical Hacking and Network Defense
Ethical Hacking and Network Defense
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
PACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATIONPACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATION
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Media
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Wireshark Basic Presentation
Wireshark Basic PresentationWireshark Basic Presentation
Wireshark Basic Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
Kashif Sohail
 
PPIT Lecture 10
PPIT Lecture 10PPIT Lecture 10
PPIT Lecture 10
Kashif Sohail
 
PPIT Lecture 1
PPIT Lecture 1PPIT Lecture 1
PPIT Lecture 1
Kashif Sohail
 
PPIT Lecture 2
PPIT Lecture 2PPIT Lecture 2
PPIT Lecture 2
Kashif Sohail
 
PPIT Lecture 18
PPIT Lecture 18PPIT Lecture 18
PPIT Lecture 18
Kashif Sohail
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
Kashif Sohail
 
PPIT Lecture 4
PPIT Lecture 4PPIT Lecture 4
PPIT Lecture 4
Kashif Sohail
 
The calendar of events october 6 - october 12
The calendar of events october 6 - october 12The calendar of events october 6 - october 12
The calendar of events october 6 - october 12
TheHubEindhovenForExpats
 
Metal
MetalMetal
Metal
lolaso16
 
Sigmund freud
Sigmund freudSigmund freud
Sigmund freud
Zhan Lee
 
Data Driven Product Design
Data Driven Product DesignData Driven Product Design
Data Driven Product Design
Jose Arturo Mora Soto
 
Offer cue The marketplace that changes everything
Offer cue The marketplace that changes everythingOffer cue The marketplace that changes everything
Offer cue The marketplace that changes everything
sabbasi001
 
Appraisal method
Appraisal  methodAppraisal  method
Appraisal method
Charles Nzekwue
 
Frundraise: Run for it
Frundraise: Run for itFrundraise: Run for it
Frundraise: Run for it
Nick Morrison
 
Media powerpoint q magazine
Media powerpoint q magazineMedia powerpoint q magazine
Media powerpoint q magazine
benrodol
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
Kashif Sohail
 
The calendar of events october 20 - 26
The calendar of events october 20 - 26The calendar of events october 20 - 26
The calendar of events october 20 - 26
TheHubEindhovenForExpats
 
The Fableists ‘Epic Thread’ Storyboards
The Fableists ‘Epic Thread’ StoryboardsThe Fableists ‘Epic Thread’ Storyboards
The Fableists ‘Epic Thread’ Storyboards
The Mill
 
Testing
TestingTesting
Testing
Dennis Wong
 

Viewers also liked (20)

PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
 
PPIT Lecture 10
PPIT Lecture 10PPIT Lecture 10
PPIT Lecture 10
 
PPIT Lecture 1
PPIT Lecture 1PPIT Lecture 1
PPIT Lecture 1
 
PPIT Lecture 2
PPIT Lecture 2PPIT Lecture 2
PPIT Lecture 2
 
PPIT Lecture 18
PPIT Lecture 18PPIT Lecture 18
PPIT Lecture 18
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
PPIT Lecture 4
PPIT Lecture 4PPIT Lecture 4
PPIT Lecture 4
 
The calendar of events october 6 - october 12
The calendar of events october 6 - october 12The calendar of events october 6 - october 12
The calendar of events october 6 - october 12
 
Metal
MetalMetal
Metal
 
Sigmund freud
Sigmund freudSigmund freud
Sigmund freud
 
5 ALWAN
5 ALWAN5 ALWAN
5 ALWAN
 
Data Driven Product Design
Data Driven Product DesignData Driven Product Design
Data Driven Product Design
 
Offer cue The marketplace that changes everything
Offer cue The marketplace that changes everythingOffer cue The marketplace that changes everything
Offer cue The marketplace that changes everything
 
Appraisal method
Appraisal  methodAppraisal  method
Appraisal method
 
Frundraise: Run for it
Frundraise: Run for itFrundraise: Run for it
Frundraise: Run for it
 
Media powerpoint q magazine
Media powerpoint q magazineMedia powerpoint q magazine
Media powerpoint q magazine
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
The calendar of events october 20 - 26
The calendar of events october 20 - 26The calendar of events october 20 - 26
The calendar of events october 20 - 26
 
The Fableists ‘Epic Thread’ Storyboards
The Fableists ‘Epic Thread’ StoryboardsThe Fableists ‘Epic Thread’ Storyboards
The Fableists ‘Epic Thread’ Storyboards
 
Testing
TestingTesting
Testing
 

Similar to PPIT Lecture 06

Strategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxStrategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docx
johniemcm5zt
 
SIP report.pptx
SIP report.pptxSIP report.pptx
SIP report.pptx
CharenReposposa
 
CSC_402_Social_and_Professional_Issues_i.ppt
CSC_402_Social_and_Professional_Issues_i.pptCSC_402_Social_and_Professional_Issues_i.ppt
CSC_402_Social_and_Professional_Issues_i.ppt
NonSy1
 
An ABC of cyberethics
An ABC of cyberethicsAn ABC of cyberethics
An ABC of cyberethics
Yamith José Fandiño Parra
 
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...
Karlos Svoboda
 
Objective There are two high-level objectives in this project ass.docx
Objective There are two high-level objectives in this project ass.docxObjective There are two high-level objectives in this project ass.docx
Objective There are two high-level objectives in this project ass.docx
juliennehar
 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
Kashif Sohail
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docx
patricke8
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docx
mccormicknadine86
 
Computer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information TechnologyComputer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information Technology
LinaCovington707
 
Picture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docxPicture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docx
mattjtoni51554
 
ethics.ppt
ethics.pptethics.ppt
ethics.ppt
john273550
 
Introduction to modern computerethics.ppt
Introduction to modern  computerethics.pptIntroduction to modern  computerethics.ppt
Introduction to modern computerethics.ppt
eastitech
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
Faraz Ahmed
 
Lecture 1 introduction to course
Lecture 1 introduction to courseLecture 1 introduction to course
Lecture 1 introduction to course
GC University Fsd
 
Context, Causality, and Information Flow: Implications for Privacy Engineerin...
Context, Causality, and Information Flow: Implications for Privacy Engineerin...Context, Causality, and Information Flow: Implications for Privacy Engineerin...
Context, Causality, and Information Flow: Implications for Privacy Engineerin...
Sebastian Benthall
 
General studies with Integration of ethics with ICT.pptx
General studies with Integration of ethics with ICT.pptxGeneral studies with Integration of ethics with ICT.pptx
General studies with Integration of ethics with ICT.pptx
HusseinKabaleke
 
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma  Identity TheftStakeholdersConfidentiality.docxEthical dilemma  Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
humphrieskalyn
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.ppt
ClaudeDex
 

Similar to PPIT Lecture 06 (20)

Strategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxStrategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docx
 
SIP report.pptx
SIP report.pptxSIP report.pptx
SIP report.pptx
 
CSC_402_Social_and_Professional_Issues_i.ppt
CSC_402_Social_and_Professional_Issues_i.pptCSC_402_Social_and_Professional_Issues_i.ppt
CSC_402_Social_and_Professional_Issues_i.ppt
 
An ABC of cyberethics
An ABC of cyberethicsAn ABC of cyberethics
An ABC of cyberethics
 
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...
 
Objective There are two high-level objectives in this project ass.docx
Objective There are two high-level objectives in this project ass.docxObjective There are two high-level objectives in this project ass.docx
Objective There are two high-level objectives in this project ass.docx
 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docx
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docx
 
Computer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information TechnologyComputer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information Technology
 
Picture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docxPicture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docx
 
ethics.ppt
ethics.pptethics.ppt
ethics.ppt
 
P.p lect1-
P.p lect1-P.p lect1-
P.p lect1-
 
Introduction to modern computerethics.ppt
Introduction to modern  computerethics.pptIntroduction to modern  computerethics.ppt
Introduction to modern computerethics.ppt
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
 
Lecture 1 introduction to course
Lecture 1 introduction to courseLecture 1 introduction to course
Lecture 1 introduction to course
 
Context, Causality, and Information Flow: Implications for Privacy Engineerin...
Context, Causality, and Information Flow: Implications for Privacy Engineerin...Context, Causality, and Information Flow: Implications for Privacy Engineerin...
Context, Causality, and Information Flow: Implications for Privacy Engineerin...
 
General studies with Integration of ethics with ICT.pptx
General studies with Integration of ethics with ICT.pptxGeneral studies with Integration of ethics with ICT.pptx
General studies with Integration of ethics with ICT.pptx
 
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma  Identity TheftStakeholdersConfidentiality.docxEthical dilemma  Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
 
Ethics.ppt
Ethics.pptEthics.ppt
Ethics.ppt
 

Recently uploaded

Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
Srikant77
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
e20449
 

Recently uploaded (20)

Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Graphic Design Crash Course for beginners
Graphic Design Crash Course for beginnersGraphic Design Crash Course for beginners
Graphic Design Crash Course for beginners
 

PPIT Lecture 06

  • 2. Uniqueness Issue (Continued) • Traditionalists and uniqueness proponents are each partly correct. • Traditionalists correctly point out that no new ethical issues have been introduced by computers. • Uniqueness proponents are correct in that cybertechnology has complicated our analysis of traditional ethical issues.
  • 3. Uniqueness Issue (Continued) • So we must distinguish between: (a) unique technological features, and (b) any (alleged) unique ethical issues. • Two scenarios from the text: – (a) Computer professionals designing and coding a controversial computer system – (b) Software piracy
  • 4. Case Illustration of a Policy Vacuum: Duplicating Software • In the early 1980s, there were no clear laws regarding the duplication of software programs, which was made easy because of personal computers. • A policy vacuum arose. • Before the policy vacuum could be filled, we had to clear up a conceptual muddle: What exactly is software?
  • 5. Cyberethics as a Branch of Applied Ethics • Applied ethics, unlike theoretical ethics, examines "practical" ethical issues. • It analyzes moral issues from the vantage-point of one or more ethical theories. • Ethicists working in fields of applied ethics are more interested in applying ethical theories to the analysis of specific moral problems than in debating the ethical theories themselves.
  • 6. Cyberethics as a Branch of Applied Ethics (continued) • Three distinct perspectives of applied ethics (as applied to cyberethics): • Professional Ethics • Philosophical Ethics • Descriptive Ethics
  • 7. Perspective # 1: Professional Ethics • According to this view, cyberethics is the field that identifies and analyzes issues of ethical responsibility for computer professionals. • Consider a computer professional's role in designing, developing, and maintaining computer hardware and software systems. – Suppose a programmer discovers that a software product she has been working on is about to be released for sale to the public, even though it is unreliable because it contains "buggy" software. – Should she "blow the whistle?"
  • 8. Perspective # 2: Philosophical Ethics  From this perspective, cyberethics is a field of philosophical analysis and inquiry that goes beyond professional ethics (Gotterbarn).  Moor (1985), defines computer ethics as: – ...the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology. [Italics Added.]
  • 9. Perspective #3: Cyberethics as a Field of Descriptive Ethics • The professional and philosophical perspectives both illustrate normative inquiries into applied ethics issues. • Normative inquiries or studies are contrasted with descriptive studies. • Descriptive investigations report about "what is the case“; normative inquiries evaluate situations from the vantage-point of the question: "what ought to be the case."
  • 10. Descriptive Ethics Perspective (continued) • Scenario: A community’s workforce and the introduction of a new technology. • Suppose a new technology displaces 8,000 workers in a community. • If we analyze the issues solely in terms of the number of jobs that were gained or lost in that community, our investigation is essentially descriptive in nature. • We are simply describing an impact that technology X has for Community Y.
  • 11. Descriptive Ethics Perspective (continued) • Descriptive vs. Normative Claims • Consider three assertions: – (1) "Bill Gates served as the Chief Executive Officer of Microsoft Corporation for many years.” – (2) "Bill Gates should expand Microsoft’s product offerings.“ – (3) “Bill Gates should not engage in business practices that are unfair to competitors.”  Claims (2) And (3) are normative, (1) is descriptive; (2) is normative but nonmoral, while (3) is both normative and moral.
  • 12. Figure 1-1: Descriptive vs. Normative Claims Descriptive Normative (Report or describe what is the case) (Prescribe what ought to be the case) Non-moral Moral Prescribe or evaluate in matters involving standards such as art and sports (e.g., criteria for a good painting or an outstanding athlete). Prescribe or evaluate in matters having to do with fairness and Obligation (e.g., criteria for just and unjust actions and policies).
  • 13. Some Benefits of Using the Descriptive Approach • Huff & Finholt (1994) claim that when we understand the descriptive aspect of social effects of technology, the normative ethical issues become clearer. • The descriptive perspective prepare us for our subsequent analysis of ethical issues that affect our system of policies and laws.
  • 14. Table 1-2: Summary of Cyberethics Perspectives Type of Perspective Associated Disciplines Issues Examined Professional Computer Science Engineering Library/Information Science Professional Responsibility System Reliability/Safety Codes of Conduct Philosophical Philosophy Law Privacy & Anonymity Intellectual Property Free Speech Descriptive Sociology Behavioral Sciences Impact of cybertechnology on governmental/financial/ educational institutions and socio-demographic groups
  • 15. Is Cyber-technology Neutral? • Technology seems neutral, at least initially. • Consider the cliché: “Guns don’t kill people, people kill people.” • Corlann Gee Bush (19997) argues that gun technology, like all technologies, is biased in certain directions. • She points out that certain features inherent in gun technology itself cause guns to be biased in a direction towards violence.