Social and Ethical Implications CMSC 101 November 21, 2013 Bhuvana Bellala and Marie desJardins.

Slides:



Advertisements
Similar presentations
Professional Ethics Social Implications of Computers.
Advertisements

Computer Literacy and ICT Engineers 橋本 義平 Hashimoto Yoshihei (情報工学)
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
COMP427 Business Ethics. Objectives 1.To understand ethics and why its important in ways that are consistent with a code of principles. 2.Understand why.
ICT Ethics 2 ICT 139.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
CyberEthics Essay Outline
“Female Teachers Transfer Fear of Math” Quentin McCall April 21, 2011 CSCE
Ethics in Business. What is ethical? Personally? Organizationally? Is there a difference? Is ethics situational?
Day 2 Discuss Ethics Learning Module –What makes a decision unethical? –Use notes in film.
D: Chapter 5 Ethics and Social Responsibility. Ethics The code of moral principles and values that govern the behaviors of a person or group with respect.
Computer Ethics Overview Gordon College. Introduction  Computer ethics is growing and changing as computers are growing and changing growing and changinggrowing.
COMPUTER ETHICS & COMPUTER HACKING. Introduction Ethics is the branch of philosophy that involves systemizing, defending and recommending concepts of.
Professional Codes of Ethics Professionalism and Codes of Ethics.
Computer Ethics in Information Technology
UNIT 2: CONTEXT. Chapter 3: Ethics & Social Responsibility.
What is Ethics? Ethics is concerned with: n The values and guidelines by which we live, and how they are justified n Standards of right and wrong n Identification.
Volunteer Risk Management March What’s the Plan.
Values and Ethics EDU 131 Constitution Day 15 Sept 2006.
Why computer ethics Based on “Computer Ethics” by Johnson, Prentice Hall 2001 & “A Gift of Fire by Baase”, Prentice Hall 2003 CS480 Computer Science Seminar.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 4 Business Ethics and Social Responsibility.
Humanities 375, September 8, Why are we reading this book? u 1. To raise your sensitivity to circumstances involving information technology that.
ETHICS and COMPUTERS An Overview 23/04/2017.
1 Business Ethics and Social Responsibility l an oxymoron?!?! l What is GOOD vs. What is Bad! l behaviour of business and the treatment of stakeholders.
Lesson 1. A neighbor offered you $15 for picking up her mail. Afterward, she gives you $20 and refuses change. She actually gave you two twenties that.
Public Health Ethics. 2 of 18 Ethics Principles and rules for behavior and duty Basic guide for deciding right and wrong.
Ethics Business Ethics  Unit Essential Question: How does ethical behavior affect my business decisions?  EQ: How does a business monitor itself to ensure.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
Schermerhorn - Chapter 41 Chapter 4 Ethical Behavior and Social Responsibility 4 Planning Ahead –What is ethical behavior? –How do ethical dilemmas complicate.
1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2004 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CD5590.
C OMPUTER E THICS : A G LOBAL PERSPECTIVE BY G IANNIS S TAMATELLOS Chapter 1 – Ranette Halverson.
Ethics.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Note set 1 Introduction to Computer Ethics Course webpage:
1 Ethics of Computing MONT 113G, Spring 2012 Session 16 Introduction to Computer Ethics.
Reason, Relativity, and Responsibility in Computer Ethics
Professionalism/Customer Service in the Health Environment Unit 8 Ethical and Cultural Issues Related to Communication and Customer Service Lecture 8a.
©2001 Southern Illinois University, Edwardsville All rights reserved. Today Finish Ethics Next Week Research Topics in HCI CS 321 Human-Computer Interaction.
Professional Ethics and Responsibilities
Business Ethics Morals – Beliefs about what constitutes right or wrong behaviors Values – Desired ends or goals of society Ethics – The application of.
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
Developed by Cool Pictures & MultiMedia PresentationsCopyright © 2003 by South-Western, a division of Thomson Learning. All rights reserved.Developed by.
IT depends on several codes of ethics 1. PUBLIC - IT engineers shall act consistently with the public interest. 2. CLIENT AND EMPLOYER - IT engineers shall.
1 Business ethics and social responsibility (chapt. 10) an oxymoron?!?! What is GOOD vs. What is Bad! behaviour of business and the treatment of stakeholders.
Ch 3 Ethical Behaviour & Social Responsibility. Ethics Code of moral principles sets standards for right or wrong Guide behaviour Help make moral choices.
Who is this Person and Why Do We Care? More Unintended Consequences.
Chapter 4 Ethical Standards. Introduction Limits to what law, regulations, and accrediting standards and requirements can govern In the absence of law,
CSCI 392 Review of Computing and Society
Solutions of Case Study 4 & 6
CS 2315 review.
CSCI 392: Seminar in Computing and Society
Ethical Theories.
MAJOR ETHICAL ISSUES IN ENTREPRENEUR SHIP. Ethical issue – is problem or situation that requires a situation to choose between alternatives that must.
Professional Codes of Ethics
CASE STUDY ANALYSIS ENGLISH
The Psychology of Security
Integrity Achala Dahal.
Developed by Cool Pictures & MultiMedia Presentations
Beyond Personal & Professional Decision Making
Integrity and Ethics Achala Dahal.
COMPUTER ETHICS & COMPUTER HACKING
Health 10/29/18.
CHAPTER 3: ETHICS AND CORPORATE SOCIAL RESPONSIBILITY
Introduction to Computer Ethics
Business Ethics Lesson 1.
ACM Code of Ethics CSCI 362: Data Structures.
CS-480b Network Security Dick Steflik
Presentation transcript:

Social and Ethical Implications CMSC 101 November 21, 2013 Bhuvana Bellala and Marie desJardins

Getting Started…

Ethics  Ethics: moral principles that help us differentiate between right and wrong behavior  Ethical Dilemma: arises in a situation concerning right or wrong when values are in conflict  “Should I let my friend copy my answers on an exam?”  “Should I keep the excessive change that the cashier gave to me?”

Ethics in Computing  Wiener: Cybernetics and The Human Use of Human Beings  Published in 1950 – overview of ethical issues in computing  Computers and security  Computers and unemployment  Responsibilities of computer professionals  Computers and religion  Robot ethics  James Moor:  We can do a lot with computers but should we do them?  “Policy Vacuums” and “Conceptual Muddles”

Framework  Stakeholders  Utilitarianism Approach  Individualism Approach  Moral – Rights Approach  Justice Approach  ACM Code of Ethics  Other professional codes of ethics  Laws and Policies

ACM Code of Ethics  1.1 Contribute to society and human well-being  1.7 Respect the privacy of others  2.1 Strive to achieve the highest quality, effectiveness, and dignity in both the process and products of professional work  2.6 Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks

Example: Vulnerabilities

Vulnerabilities  What is a virus?  Who is affected?  Zero-day vulnerabilities  The big picture: goes beyond individual

Privacy and Stalking  You’ve each been assigned someone on your team to “cyberstalk” (10 minutes)  Instructions:  You can use any of the information you already know about the person to narrow down your search  Their name, the school they attended, their high school, the clubs they are part of, their gamer name, and so on  General Search  Bing and Google  footprinting-cyberstalking  This website gives you some good websites that you can use to stalk someone  Share what you learned: If you have time, stalk other people

Discussion  How do you feel about privacy?  Is there anything you are going to do to protect yourself?  Whose responsibility is it to protect your private information?  Yourself, website developers, government,…

Readings  Each team has been assigned a special topic related to ethics  Read over the article and discuss among your group the main points and ethical implications:  Identify the main topic of the article  Identify the main points of the article  Identify the ethical issues (what is to be decided?)  Identify the stakeholders (affected groups)  Identify the tradeoffs (costs and benefits to various groups)  After 10 minutes, share with the rest of the class a 1-2 minute summary of the questions above (main topic/points, ethical issues, stakeholders, major tradeoffs)