Ethics in a Computing Culture

Slides:



Advertisements
Similar presentations
Restaurant and Foodservice Operations Are Labor-Intensive
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
Technology: Unethical Behavior and Its Consequences Prepared by Tami Genry March 2004.
An introduction to Child Protection and Safeguarding
Ethics and Social Responsibility
INTERNET SAFETY FOR STUDENTS
Ethical and Moral Issues in Counseling
WHAT IS SAFE GUARDING Tutorials. During this lesson you will learn  What safe guarding means  How you can keep yourself and others safe.  The college.
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
Legislation in ICT.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Ethics in a Computing Culture
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
Written By KEVIN J. O’BRIEN Published: December 28, 2009 By The New York Times A Report by Michael Abdullah.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Ninth Edition Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 0.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
Unit 1, Chapter 3. Ethics – are the rules that help us tell the difference between right and wrong and encourage us to do the right thing. Ethical Behaviour.
Ethics Ethics is a branch of philosophy that deals with issues of morality —consideration of what human actions and reactions are morally right and wrong.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Quiz Review.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Social and Ethical Responsibility Back to Table of Contents.
The barriers to achievement
Introduction Our Topic: Mobile Security Why is mobile security important?
Staying Safe in Cyberspace Jessica Kohler ITC 525 Jessica Kohler ITC 525.
BULLYING ISEA FALL CONFERENCE BULLYING Occurs once every 7 minutes In schools, one in three students report being bullied weekly. In NEA survey.
Social Media Impact on Employment October 2, 2013 Human Resource Services.
Success in the Workplace
Power of the Pyramids LETS REFLECT. 1. Where are you represented on the tables and on the graphs?
Purchasing Ethics and Vendor Relations
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Keeping Kids Safe on the Internet John Minelli Educational Technology Specialist Hartford School District
Employee Guidelines for Acceptable Use of Technology Resources.
Digital Citizenship Project.  The etiquette guidelines that govern behavior when communicating on the internet have become known as netiquette.
COMPUTER ETHICS Do you know the difference between right and wrong?
The Jeopardy Review Game. Rules of the game: Work in groups of two Take turns picking a “Square” You are responsible for keeping your own scores If you.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Chapter 4 Business Ethics and Social Responsibility.
100 Internet Safety Jeopardy Social Network Sites Online Shopping Words & Pictures Cyber- bullying Internet Scams.
Digital Citizenship: Active Participants in a Digital World.
Acceptable Use Policy and Internet Safety Training Mr. Chalmers, Media Specialist Southwest Middle School Used with permission from Kristin Seeger.
Cyberbullying By Sharon Synan. Recognizing Cyberbullying Cyberbullying is using electronic means to bully, harass, and otherwise make life miserable for.
By Lauren Parks Technology and Young Children Effective Classroom Practice o Infants and Toddlers  Technology Tools and Interactive Media Children should.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
As a student in the NCCVT school district, you are privileged to have access to your own individual account on the District network. Your account.
Males Females Young Old Size of population 0. Males Females Young Old Size of population 0.
Information Systems Unit 3.
Ethical, Legal, and Social Obligations Of Using Technology in Education Kimberley Gaddis.
Professional Ethics and Responsibilities
Let’s Get Savvy about Technology Mrs. George Dondero School.
LEGAL AND MORAL ISSUES – CODE OF CONDUCT Year 13.
What is Harassment?? Harassment is when hurtful or upsetting things are repeatedly said or done to someone. Harassment CAN: Involve physical violence.
Click the mouse button or press the space bar to display information. 1.Identify guidelines for expressing physical affection. What You’ll Learn 2.Analyze.
COURSE DESCRIPTION: This course is designed to introduce the students to new and emerging technologies that are impacting the way we input information.
Our Club: SUPPORTS Kids Is SAFE for Kids Is FUN for Kids.
PROTECT YOURSELF Cyberbullying. Why do you think people cyberbully? How does your school deal with cyberbullying? Have you ever sent a mean message because.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Unit 5 Ethics. Set of moral principles that govern decisions and actions.
Digital Citizenship.
Systems Security Keywords Protecting Systems
Please read the entire presentation.
Ch. 5, Social Responsibility
B3- Olympic High School Science Camp
Principles of Health Care Ethics
Ethics and Social Responsibility
What Would You Do? Ethics in Travel and Tourism Management.
Classroom Management Kayla Nakano Education Manager
Presentation transcript:

Ethics in a Computing Culture Chapter 8 Computing and Vulnerable Groups

Objectives How can the work of computer professionals harm vulnerable members? How is paying attention to vulnerable populations beneficial? How are the arguments of theorists applied in order to protect vulnerable members of society? Ethics in a Computing Culture

Why Pay Special Attention to Vulnerable Groups? What types of assistance does your school provide to students from vulnerable groups? Ethics in a Computing Culture

The Threat Analysis Method Threat analysis: an attempt to systematically identify the ways that a technology might be vulnerable to a malicious attack Who might want to abuse this system? Why might they want to abuse a system? Vulnerabilities: potential avenues of attack Ask students to explain why people might want to abuse Web cameras in laptop computers as discussed in Chapter 3. Ask them to list the vulnerabilities that make such abuse possible. Ethics in a Computing Culture

Case: Should Gun Camera Videos be Public? Does the existence of gun cameras make soldiers vulnerable to harm that they otherwise would not experience? Ask students to list some ways that leaking gun camera footage could harm soldiers. Could gun cameras also benefit soldiers? Ethics in a Computing Culture

People with Impaired, or Legally Limited, Decision-Making Abilities Autonomy: freedom for an entity to make decisions without outside constraints or interference Chilling effect: a situation in which one feels pressure not to do something, even though it is legal to do so, because of fear of prosecution Ask students to consider how the chilling effect might impact the behavior of teenagers. What are some things that teenagers might technically be allowed to do, but which they might choose not to do if they think parents are watching? Ethics in a Computing Culture

Case: Cell Phones and Family Locator Services Locator: anyone who has permission to see the locations of others using a family locator service, such as via cell phones Locatee: anyone whose cellular phone is being tracked Most families make all adults locators and all children locatees Consider the following claim: “The most moral way to use this technology is for all members of the family to be both locators and locatees. That is perfectly fair.” Ask students to consider some potential chilling effects on the adult members of the family if all family members are both locators and locatees? Ethics in a Computing Culture

Case: Cell Phones and Family Locator Services (continued) Do the benefits of using a family locator service to decrease the vulnerability of children outweigh the harms? Should the phones of locatees display an icon or message, so that the users knows they are being tracked? Should it be possible for locatees to turn off the location feature whenever they want? Are the elderly more vulnerable, or less vulnerable, than college students? Ethics in a Computing Culture

People with Physical Limitations or Frailties Accessibility: the degree to which people with disabilities can use a given technology Examples of technologies that promote accessibility include: Screen-readers: Software that reads the text on the screen audibly Predictive typing: Software that can tell which word you are trying to type based on the first few letters Subtitles: Software that displays the text of any audible dialog High contrast displays: Software that changes the colors of the screen to make text easier to read Haptic feedback: User interfaces that make cell phones vibrate Text alternatives for images: On a Web page, provides a text description of an image so that a screen-reader can describe an image Ethics in a Computing Culture

People with Physical Limitations or Frailties (continued) Ethics in a Computing Culture

Case: Hackers and Implantable Medical Devices Given the security vulnerabilities of the ICDs studied by Halperin’s team, was it ethically permissible for the ICD manufacturer to create and sell the defibrillators? Suppose a software company is designing a spreadsheet program. The program designers are considering using red to indicate negative numbers (instead of a negative symbol) and do not plan to provide any other formatting options. Is it morally permissible to create such software? Ethics in a Computing Culture

Case: A Right to Gaming? Suppose a software company is designing a video game. The game designers are considering using yellow and green puzzle pieces and do not plan to provide any accommodations for color-blind users. Is it morally permissible to create such software? Is this more or less permissible than the software proposed in the previous question? Ask students to consider if it is morally significant that roughly 5% of men in the U.S. suffer from red-green color blindness. Would students’ responses differ if it were only 0.5%? What if it were 50%? Ethics in a Computing Culture

Case: Computer Donations and Recycling E-waste: discarded electronic devices Can contain precious metals, as well as toxins If people in developing countries understood the harm they were doing to themselves and their children by participating in e-waste recycling, do you think they would stop? Ask students to use an ethical theory from Chapter 1 to support their reasoning. Ethics in a Computing Culture

Members of Minority Groups Is it possible to write a policy that would ban hate groups, while not banning other innocent groups? Blizzard’s anti-harassment policies go above and beyond what the law ordinarily requires. Should private companies like Blizzard create and enforce policies that are different from the law? Or should the police handle all harassment complaints? Note the key difficulty in banning hate groups: How can you tell which groups are hate groups and which are not? Ethics in a Computing Culture

Case: Sex Selection in India Use a rule utilitarian analysis to explain why the Indian government might ban sex selection of babies. In particular, what are the consequences for a society if a serious imbalance arises between the number of boys and number of girls born each year? Indian officials could, if they wanted, ban ultrasound sonograms altogether. Should they? Would this benefit female fetuses? Whom would it harm? Ethics in a Computing Culture