SlideShare a Scribd company logo
1 of 19
QUESTIONS

WELCOME
: I N C O M P U T E R A N D I N F O R M AT I O N E T H I C S
What is
Compute
r Ethics?

http://plato.stanford.edu/entries/ethics-computer/#DefComEth

Computer Ethics
: refer to a kind of professional ethics in
which computer professionals apply codes of
ethics and standards of good practice within
their profession.
In most countries of the world, the ―information revolution‖ has altered many aspects of
life
significantly:
commerce, employment, medicine, security, transportation, entertainment, and so on.
Consequently, information and communication technology (ICT) has affected —
1940

1950

1960

21st
An
innovative
developments in science
and philosophy led to the
creation of a new branch
of ethics that would later
be
called
―computer
ethics‖ or ―information
ethics‖.

Norbert Wiener
a
professor
of
mathematics
and
engineering at MIT.
Together
with
colleagues
in

The world would undergo
―a second industrial revolution‖
— an ―automatic age‖ with
―enormous potential for good
and for evil‖ that would
generate a staggering number
of new ethical challenges and
opportunities.

While engaged in
this war effort, Wiener
and colleagues created
a new branch of applied
science that Wiener
named ―cybernetics‖
(from the Greek word
for the pilot of a ship).
Even while the War
was raging, Wiener
foresaw
enormous
social
and
ethical
implications
of
cybernetics combined
with
electronic
computers.
Cybernetics (1948)
In
which
he
described his new branch
of applied science and
identified some social
and ethical implications
of electronic computers.

―It has long been clear to me that the
modern ultra rapid computing machine was
in principle an ideal central nervous system
to an apparatus for automatic control; and
that its input and output need not be in the
form of numbers or diagrams. It might very
well be, respectively, the readings of
artificial‖
Wiener‘s book included, for example:

The Human Use of
Human Beings (1950)

A book in which he
explored a number of
ethical issues that computer
and information technology
would likely generate.

1. An account of the purpose of a
human life
2. Four principles of justice
3. A powerful method for doing applied
ethics
4. Discussions of the fundamental
questions of computer ethics
5. Examples of key computer ethics
topics
―It seemed,‖
Parker said, ―that
when people entered
the
computer
center, they left their
ethics at the door‖.

Donn Parker
- Computer scientist

In 1968 he published
―Rules of Ethics in
Information Processing‖

Headed the development of
the first Code of Professional
Conduct of the Association
for Computing Machinery
(eventually adopted by the
ACM in 1973).
Joseph Weizenbaum
created a computer
program that he called
‗ELIZA‘.

As
an
experiment, Weizenbaum used
ELIZA to provide “a crude
imitation
of
a
Rogerian
psychotherapist engaged in an
initial
interview
with
a
Some
practicing
psychiatrists saw ELIZA as
evidence that computers soon
would
be
performing
automated psychotherapy.

Joseph Weizenbaum
created a computer
program that he called
‗ELIZA‘.

Wrote the book Computer
Power
and
Human
Reason,
which
forcefully
expressed his ethical concerns.
The book, together with his
courses at MIT and the many
speeches he gave in the
1970s, inspired a number of
thinkers and projects in
computer ethics
He began to use the
term ‗computer ethics‘ to
refer to ―ethical problems
aggravated, transformed or
created
by
computer
technology‖.

Walter Maner
Teacher in a university
course in medical ethics

These
efforts
spurred
the
study
of
computer ethics
at a number of
colleges
and
universities
in
the
United
States.

He
developed
a
university computer ethics
course and offered a
variety of workshops and
lectures at conferences
across America.
Parker, Weizenbaum and Maner
had raised the computer ethics
consciousness of a number of American
scholars.
In
addition,
several
computing-related social and ethical
problems had become public issues in
America and Europe: computer-enabled
crime, disasters from computer
failures, invasions of privacy via
computer databases, and major law
suits regarding software ownership. The
time was right for exponential growth
in computer ethics.
Parker, Weizenbaum and Maner
had raised the computer ethics
consciousness of a number of American
scholars.
In
addition,
several
computing-related social and ethical
problems had become public issues in
America and Europe: computer-enabled
crime, disasters from computer
failures, invasions of privacy via
computer databases, and major law
suits regarding software ownership. The
time was right for exponential growth
in computer ethics.
•
•
•
•
•
•

New University Courses
Research centers
Conferences
Journals
Articles
Text Books

DIANE MARTIN

DONALD GOTTERBARN

SIMON ROGERSON KEITH MILLER
Have recently argued that
computer
ethics
will
disappear as a branch of
applied ethics?

Deborah Johnson perspective is
that fundamental ethical theories will
remain unaffected – that computer
ethics issues are simply the same old
ethics questions with a new twist – and
consequently computer ethics as a
distinct branch of applied philosophy
will ultimately disappear.

Wiener-Maner-Górniak
point of view sees computer
technology
as
ethically
revolutionary, requiring human
beings to reexamine the
foundations of ethics and the
very definition of a human life.
X

Thank You For
Listening…
By: Romeo T. Navarro Jr.
Jonnalyn Barrientos

II-BSICTE

More Related Content

What's hot

Public policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie questionPublic policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie questionChris Marsden
 
Quotes that inspire us at ITinvolve
Quotes that inspire us at ITinvolveQuotes that inspire us at ITinvolve
Quotes that inspire us at ITinvolveITinvolve, Inc.
 
The Domestication of the Internet in Germany (1997-2007). Online Access and I...
The Domestication of the Internet in Germany (1997-2007). Online Access and I...The Domestication of the Internet in Germany (1997-2007). Online Access and I...
The Domestication of the Internet in Germany (1997-2007). Online Access and I...Cocoloris
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsSammer Qader
 
GPA 1035: introduction
GPA 1035: introductionGPA 1035: introduction
GPA 1035: introductionoiwan
 
Teaching with technology
Teaching with technologyTeaching with technology
Teaching with technologygibbs753
 
Teaching with technology
Teaching with technologyTeaching with technology
Teaching with technologygibbs753
 
Cyberpolitics 2009 W3
Cyberpolitics 2009 W3Cyberpolitics 2009 W3
Cyberpolitics 2009 W3oiwan
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Social Implications and Ethics
Social Implications and EthicsSocial Implications and Ethics
Social Implications and Ethicskelseybee316
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipsekuhn0
 
New media and the practice of journalism
New media and the practice of journalismNew media and the practice of journalism
New media and the practice of journalismLami Attah
 
An Introduction: Technology, Ethics, and the Workplace
An Introduction:  Technology, Ethics, and the WorkplaceAn Introduction:  Technology, Ethics, and the Workplace
An Introduction: Technology, Ethics, and the WorkplaceTawny Brown
 

What's hot (17)

Public policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie questionPublic policy and online social networks: The trillion dollar zombie question
Public policy and online social networks: The trillion dollar zombie question
 
Quotes that inspire us at ITinvolve
Quotes that inspire us at ITinvolveQuotes that inspire us at ITinvolve
Quotes that inspire us at ITinvolve
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
PPIT Lecture 1
PPIT Lecture 1PPIT Lecture 1
PPIT Lecture 1
 
The Domestication of the Internet in Germany (1997-2007). Online Access and I...
The Domestication of the Internet in Germany (1997-2007). Online Access and I...The Domestication of the Internet in Germany (1997-2007). Online Access and I...
The Domestication of the Internet in Germany (1997-2007). Online Access and I...
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
 
GPA 1035: introduction
GPA 1035: introductionGPA 1035: introduction
GPA 1035: introduction
 
Teaching with technology
Teaching with technologyTeaching with technology
Teaching with technology
 
Teaching with technology
Teaching with technologyTeaching with technology
Teaching with technology
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyberpolitics 2009 W3
Cyberpolitics 2009 W3Cyberpolitics 2009 W3
Cyberpolitics 2009 W3
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Social Implications and Ethics
Social Implications and EthicsSocial Implications and Ethics
Social Implications and Ethics
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
New media and the practice of journalism
New media and the practice of journalismNew media and the practice of journalism
New media and the practice of journalism
 
An Introduction: Technology, Ethics, and the Workplace
An Introduction:  Technology, Ethics, and the WorkplaceAn Introduction:  Technology, Ethics, and the Workplace
An Introduction: Technology, Ethics, and the Workplace
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 

Similar to Some Historical Milestone

Introduction to modern computerethics.ppt
Introduction to modern  computerethics.pptIntroduction to modern  computerethics.ppt
Introduction to modern computerethics.ppteastitech
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsScøtt Lıgøckı
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxOxfordRiNorth
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethicsSaqib Raza
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Strategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxStrategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxjohniemcm5zt
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxpatricke8
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxmccormicknadine86
 
Computer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information TechnologyComputer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information TechnologyLinaCovington707
 
Technoanthropology 1.0
Technoanthropology 1.0Technoanthropology 1.0
Technoanthropology 1.0Artur Serra
 
Ch12.global culture
Ch12.global cultureCh12.global culture
Ch12.global cultureBill Kovarik
 

Similar to Some Historical Milestone (20)

Introduction to modern computerethics.ppt
Introduction to modern  computerethics.pptIntroduction to modern  computerethics.ppt
Introduction to modern computerethics.ppt
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
a.pptx
a.pptxa.pptx
a.pptx
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer Ethics
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Introduction to ethics 1
Introduction to ethics 1Introduction to ethics 1
Introduction to ethics 1
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Strategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxStrategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docx
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docx
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docx
 
Computer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information TechnologyComputer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information Technology
 
SMP textfile
SMP textfileSMP textfile
SMP textfile
 
Technoanthropology 1.0
Technoanthropology 1.0Technoanthropology 1.0
Technoanthropology 1.0
 
Ch12.global culture
Ch12.global cultureCh12.global culture
Ch12.global culture
 
Timeline of Media Memes
Timeline of Media MemesTimeline of Media Memes
Timeline of Media Memes
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Recently uploaded (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Some Historical Milestone

  • 2.
  • 3. : I N C O M P U T E R A N D I N F O R M AT I O N E T H I C S
  • 4. What is Compute r Ethics? http://plato.stanford.edu/entries/ethics-computer/#DefComEth Computer Ethics : refer to a kind of professional ethics in which computer professionals apply codes of ethics and standards of good practice within their profession.
  • 5. In most countries of the world, the ―information revolution‖ has altered many aspects of life significantly: commerce, employment, medicine, security, transportation, entertainment, and so on. Consequently, information and communication technology (ICT) has affected —
  • 7. An innovative developments in science and philosophy led to the creation of a new branch of ethics that would later be called ―computer ethics‖ or ―information ethics‖. Norbert Wiener a professor of mathematics and engineering at MIT.
  • 8. Together with colleagues in The world would undergo ―a second industrial revolution‖ — an ―automatic age‖ with ―enormous potential for good and for evil‖ that would generate a staggering number of new ethical challenges and opportunities. While engaged in this war effort, Wiener and colleagues created a new branch of applied science that Wiener named ―cybernetics‖ (from the Greek word for the pilot of a ship). Even while the War was raging, Wiener foresaw enormous social and ethical implications of cybernetics combined with electronic computers.
  • 9. Cybernetics (1948) In which he described his new branch of applied science and identified some social and ethical implications of electronic computers. ―It has long been clear to me that the modern ultra rapid computing machine was in principle an ideal central nervous system to an apparatus for automatic control; and that its input and output need not be in the form of numbers or diagrams. It might very well be, respectively, the readings of artificial‖
  • 10. Wiener‘s book included, for example: The Human Use of Human Beings (1950) A book in which he explored a number of ethical issues that computer and information technology would likely generate. 1. An account of the purpose of a human life 2. Four principles of justice 3. A powerful method for doing applied ethics 4. Discussions of the fundamental questions of computer ethics 5. Examples of key computer ethics topics
  • 11. ―It seemed,‖ Parker said, ―that when people entered the computer center, they left their ethics at the door‖. Donn Parker - Computer scientist In 1968 he published ―Rules of Ethics in Information Processing‖ Headed the development of the first Code of Professional Conduct of the Association for Computing Machinery (eventually adopted by the ACM in 1973).
  • 12. Joseph Weizenbaum created a computer program that he called ‗ELIZA‘. As an experiment, Weizenbaum used ELIZA to provide “a crude imitation of a Rogerian psychotherapist engaged in an initial interview with a
  • 13. Some practicing psychiatrists saw ELIZA as evidence that computers soon would be performing automated psychotherapy. Joseph Weizenbaum created a computer program that he called ‗ELIZA‘. Wrote the book Computer Power and Human Reason, which forcefully expressed his ethical concerns. The book, together with his courses at MIT and the many speeches he gave in the 1970s, inspired a number of thinkers and projects in computer ethics
  • 14. He began to use the term ‗computer ethics‘ to refer to ―ethical problems aggravated, transformed or created by computer technology‖. Walter Maner Teacher in a university course in medical ethics These efforts spurred the study of computer ethics at a number of colleges and universities in the United States. He developed a university computer ethics course and offered a variety of workshops and lectures at conferences across America.
  • 15. Parker, Weizenbaum and Maner had raised the computer ethics consciousness of a number of American scholars. In addition, several computing-related social and ethical problems had become public issues in America and Europe: computer-enabled crime, disasters from computer failures, invasions of privacy via computer databases, and major law suits regarding software ownership. The time was right for exponential growth in computer ethics.
  • 16. Parker, Weizenbaum and Maner had raised the computer ethics consciousness of a number of American scholars. In addition, several computing-related social and ethical problems had become public issues in America and Europe: computer-enabled crime, disasters from computer failures, invasions of privacy via computer databases, and major law suits regarding software ownership. The time was right for exponential growth in computer ethics.
  • 17. • • • • • • New University Courses Research centers Conferences Journals Articles Text Books DIANE MARTIN DONALD GOTTERBARN SIMON ROGERSON KEITH MILLER
  • 18. Have recently argued that computer ethics will disappear as a branch of applied ethics? Deborah Johnson perspective is that fundamental ethical theories will remain unaffected – that computer ethics issues are simply the same old ethics questions with a new twist – and consequently computer ethics as a distinct branch of applied philosophy will ultimately disappear. Wiener-Maner-Górniak point of view sees computer technology as ethically revolutionary, requiring human beings to reexamine the foundations of ethics and the very definition of a human life.
  • 19. X Thank You For Listening… By: Romeo T. Navarro Jr. Jonnalyn Barrientos II-BSICTE