Information Ethics A View from the Trenches Philosophy Club – Kutztown University March 1, 2012 Oskars J. Rieksts.

Slides:



Advertisements
Similar presentations
Business Ethics for Real Estate: A. Glean
Advertisements

German Philosophy: Kant and Hegel
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 16 Professionalism, Ethics, and Career Planning.
Family ISN’T Always Family BELIEFS AND VALUES can change Beliefs and values are very important in someone’s life. Throughout life situations these beliefs.
Lecture 2: What is Computer Ethics? Special Status of Computer Ethics It is not enough that you should understand about applied science in order that your.
Ethics for the Information Age
Ethics LL.B. STUDIES 2015 LECTURE 5. TELEOLOGY Teleology: basic idea Humans’ deeds are purposive by nature; they aim at something. An attempt to ground.
Kant Philosophy Through the Centuries BRENT SILBY Unlimited (UPT)
Human rights exploration
Phil 160 Kant.
What children think about having a thyroid disorder: a small scale study By Shannon Davidson Age 10.
IST346: Information Ethics. Ethics  Ethics are the principles of conduct that govern a group of people.  Ethics are not morals.  Morals are the proclamation.
Computer Ethics Overview Gordon College. Introduction  Computer ethics is growing and changing as computers are growing and changing growing and changinggrowing.
ETHICS BOWL CONSEQUENTIALism.
Fall 2014 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering What is Computer Ethics? Fall 2014 Marco Valtorta.
Department of Information System Faculty of Computing & Information Technology King Abdul Aziz University, Jeddah, KSA.
COMPUTER ETHICS & COMPUTER HACKING. Introduction Ethics is the branch of philosophy that involves systemizing, defending and recommending concepts of.
Human Rights The basic rights and freedoms to which all human beings are entitled.
Learning Objective Chapter 19 Values and Ethics Copyright © 2001 South-Western College Publishing Co. Objectives O U T L I N E Defining Business Ethics.
Year 11 R and S Ethics Great Ethical Thinkers. Codes of Ethics in Society.
Project Timothy Lesson Five. A few years back at a Men’s Camp final Sunday Morning Meeting a man stood up and confessed how he had not followed God and.
Natural Rights Philosophy
Ethics and the Information Revolution Terrell Ward Bynum
THE 8 TH COMMANDMENT: PROTECTING OUR NEIGHBOR’S NAME AND REPUTATION Lesson 25 Faith Foundations Course One.
SOCIAL WORK ETHICS Issue in Child Welfare. GOALS & OBJECTIVES 1. To discuss how we define ethics. 2. To examine personal values related to ethics. 3.
PHIL 2 Philosophy: Ethics in Contemporary Society
Copyright  2010 Pearson Education Canada / J A McLachlan Chapter Nine Making Ethical Decisions.
IIA Fraud Presentation (Press Space Bar to Continue)
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
Philosophy 111 What is Philosophy? What is Philosophy? Critical inquiry into the fundamental nature of “stuff”. Critical inquiry into the fundamental nature.
THE MENTAL CAPACITY ACT WHY THE ACT? No existing legal framework to protect incapacitated people Only safeguards relate to money & assets Incapacity.
MEM 604: Social, Legal and Ethical Considerations for Engineering Engineers and the Environmental Challenge.
 Ethics, also known as moral philosophy, is a branch of philosophy that addresses questions about morality—that is, concepts such as good and evil, right.
My Friend Brenden Authors: Diana V. Kimberly I. Sean M.
Parts taken from Human Behavior 2ed Chapter 22 Effort and Ethics.
Unit 3- Introduction to Computer Ethics
 Code of ethics: moral conduct; standards of moral judgment and behavior; system of principles, rules or values by which to live;  Philosophy: the principles.
AIT, Comp. Sci. & Info. Mgmt AT02.98 Ethical, Legal, and Social Issues in Computing September Term, Objectives of these slides: l What ethics is,
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
Ethics, Morals, Codes, and Laws COMU2020 Phil Graham Week 4.
The Sixth Period Reading & Listening. Questionnaire (3m) Step 1: In your group, think of four situations among friends. Design four questions accordingly.
Introduction to Ethics Lecture 12 Kant By David Kelsey.
Chapter 1 Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics Introduction Cybertechnology, Ethical Concepts,
HUMS 300 ePortfolio Truth, Liberty, Justice, And how They Relate to my Life By Dusko Lukic 7/23/2012.
Readings in Cyberethics Notes from book by Spinello.
Christian Principles What are principles? ideal values which are good in themselves basic ideals on which we should shape our moral decision making Christian.
Reason, Relativity, and Responsibility in Computer Ethics
Strengthening Your Interpersonal Relationships. 1. Don’t criticize, condemn, or complain about people.  There’s no faster way create resentment toward.
Easy Read Summary Mental Capacity Act Mental Capacity Act A Summary The Mental Capacity Act 2005 will help people to make their own decisions.
Lecture 8 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
Sight Words.
Do software developers have an ethical duty? KELLEN STUART.
Lawrence Kohlberg ( ) A genetic epistemologist (one who studies how people learn and believes that our coming to know something is also linked.
The Church of Christ (Ekklesia). “Silver and gold I do not have, but what I have I give to you. In the name of Jesus Christ of Nazareth, walk.” ~Apostle.
Philosophy An introduction. What is philosophy? Ancient Greek philosopher Aristotle said that philosophy is ‘the science which considers truth’
Definitions. Definitions to Know Morality: any major decisions that affect others becomes a moral decision. Immoral: refers to the way people ought not.
Assignments of Jeanette Vanderlip. My name is Jeanette. I was born and raised here in Arizona. I graduated from Mesa High School, and married my high.
Gospel Reading Luke 18:1-8.
Manner, character and proper behaviors morality means a code of conduct which is held to be authoritative in matters of right and wrong.
Philosophy 1050: Introduction to Philosophy Week 5: Plato and arguments.
The Universal Declaration of Human Rights DECEMBER 10 th 1948 Adapted from
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
ETHICS Shawnna Burchfield HU Table of Contents Analytical Skill Building  Critical Reading Skills  Writing Skills  Thinking Skills Knowledge.
KANTIANISM AND EUTHANASIA ATTITUDES TO KEY ISSUES.
1 Ethics of Computing MONT 113G, Spring 2012 Session 17 Sociotechnical Perspective Ethical reasoning.
Unit 3- Introduction to Computer Ethics
Fall 2018 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering What is Computer Ethics? Fall 2018 Marco Valtorta.
Special Status of Computer Ethics
COMPUTER ETHICS & COMPUTER HACKING
Presentation transcript:

Information Ethics A View from the Trenches Philosophy Club – Kutztown University March 1, 2012 Oskars J. Rieksts

March 1, 2012 Kutztown University Go Ogle – A Parable The Saga of Ed Dougward

March 1, 2012 Kutztown University The Saga of Ed Dougward Ed was in a pique that morning on his way to work having just confronted and canned his trusty butler. He had never been in favor of hiring a butler in the first place, but at his wife’s insistence he had relented.

March 1, 2012 Kutztown University The Saga of Ed Dougward “Ed, what else are you going to do with all that money?” his wife had insisted. “And all our neighbors have butlers!” Ever since the Silicon Valley startup had taken off dollars flowed like a Pennsylvania creek following a rainstorm.

March 1, 2012 Kutztown University The Saga of Ed Dougward As vice president he had certain “entertainment obligations” which fell on his wife, Patty. And so began their storybook life – Ed and Candy and Scooby Doo in Palo Alto, CA.

March 1, 2012 Kutztown University The Saga of Ed Dougward And then along came Jake and Mandy and vacations in Big Sur and skiing at Big Bear. Until they began to get calls from telemarketers – touting exotic homeopathic remedies and New Age spiritual retreats.

March 1, 2012 Kutztown University The Saga of Ed Dougward “Ed, do you think someone knows Jake is HIV-positive and Mandy has mood swings following her abortions?” Patty finally asked. “How could they? We’ve never even told our best friends. And besides, that is protected information.”

March 1, 2012 Kutztown University The Saga of Ed Dougward These conversations went on for weeks, until one day Patty blurted out, “The butler! He is privy to all our family secrets.” “Edwards?!” Ed exclaimed. “Never! He is always so reliable and helpful and ‘British proper.’”

March 1, 2012 Kutztown University The Saga of Ed Dougward “I can’t believe he would be anything but discreet. He knows what great pains we take to keep our private information private.”

March 1, 2012 Kutztown University The Saga of Ed Dougward But Patty was like a dog with a bone. Once the idea found root in her mind she was not to be dissuaded. And at every opportunity she brought up the subject. Until finally Ed confronted him.

March 1, 2012 Kutztown University The Saga of Ed Dougward Edwards was horrified that they would consider such a thing. And bringing himself up to the most proper aristocratic bearing he soon had Ed ashamed for even thinking it.

March 1, 2012 Kutztown University The Saga of Ed Dougward But Patty, in her uncanny way, espied the telling micro hints and went after him with guns blazing. Until finally he broke down and confessed. He’d been in debt and the offers to sell information had been so lucrative.

March 1, 2012 Kutztown University The Saga of Ed Dougward And, besides, who would be hurt? Ed felt sorry for him and was about to forgive. But Patty was like a mama bear protecting her cubs. And soon Edwards was history!

March 1, 2012 Kutztown University The Saga of Ed Dougward And so, as he pulled into the parking lot at work, as he saw the blinking sign he was struck by the irony of the timing. The 1 st letter “o” was flickering on and off, so the sign seemed to be saying, “Go ogle” over and over again.

March 1, 2012 Kutztown University The Saga of Ed Dougward Yes, “go ogle” indeed. He felt violated by his butler, by his betrayal of the trust they had put in him. How many now knew his family secrets? And who were they? And where would the information wind up?

March 1, 2012 Kutztown University The Saga of Ed Dougward Later that evening, he was confronted by the irony again, reading his favorite snarky blogger. The posting was about the blinking sign. After various musings and ramblings..

March 1, 2012 Kutztown University The Saga of Ed Dougward.. the blogger pointed out that, according to the Merriam Webster dictionary, the 2 nd definition of ogle is: “to look at especially with greedy or interested attention.”

March 1, 2012 Kutztown University The Saga of Ed Dougward How appropriate, Ed thought. All this time, though they had trusted him implicitly, their butler had been ogling his family for personal gain!

March 1, 2012 Kutztown University Ethics The field of ethics (or moral philosophy) involves systematizing, defending, and recommending concepts of right and wrong behavior.  James Fieser, Martin  Internet Enc. of Philosophy

March 1, 2012 Kutztown University Ethics {Fieser} Metaethics  investigates where our ethical principles come from, and what they mean. Normative ethics  arrive at moral standards that regulate right and wrong conduct.

March 1, 2012 Kutztown University Ethics {Fieser} Applied ethics  involves examining specific controversial issues, such as abortion, infanticide, animal rights, environmental concerns, homosexuality, capital punishment, or nuclear war.

March 1, 2012 Kutztown University C & I Ethics {Bynum} Computer and Information Ethics  Terrell Bynum, S. Connecticut State University  Stanford Encyclopedia of Philosophy ICT  Information and communication technology

March 1, 2012 Kutztown University C & I Ethics {Bynum} “Computer and information ethics”, in the broadest sense of this phrase, can be understood as that branch of applied ethics which studies and analyzes such social and ethical impacts of ICT.

March 1, 2012 Kutztown University C & I Ethics {Bynum} Founder Norbert Weiner  Cybernetics  The Human Use of Human Beings  God and Golem

March 1, 2012 Kutztown University Weiner Great principles of justice The Principle of Freedom  Liberty of each human being to develop in his freedom the full measure of the human possibilities embodied in him.

March 1, 2012 Kutztown University Weiner The Principle of Equality  The equality by which what is just for A and B remains just when the positions of A and B are interchanged.

March 1, 2012 Kutztown University Weiner The Principle of Benevolence  a good will between man and man that knows no limits short of those of humanity itself.

March 1, 2012 Kutztown University Weiner The Principle of Minimum Infringement of Freedom  What compulsion the very existence of the community and the state may demand must be exercised in such a way as to produce no unnecessary infringement of freedom

March 1, 2012 Kutztown University C & I Ethics {Bynum} Walter ODU  Medical ethics course  addition of computers generated wholly new ethics problems  concluded that there should be a new branch of applied ethics  “computer ethics”

March 1, 2012 Kutztown University C & I Ethics {Bynum} Deborah Johnson Rensselaer  Book – Computer Ethics  new versions of standard moral problems and dilemmas

March 1, 2012 Kutztown University Johnson computers pose new versions of standard moral problems and moral dilemmas, exacerbating the old problems, and forcing us to apply ordinary moral norms in uncharted realms. old ethical problems “given a new twist” by computer technology.

March 1, 2012 Kutztown University C & I Ethics {Bynum} James Moor  why computing technology raises so many ethical questions compared to other kinds of technology.  revolutionary power of computer technology was that computers are “logically malleable”

March 1, 2012 Kutztown University Moor  Logically malleable  Can be shaped and molded to do any activity that can be characterized in terms.. connecting logical operations  Logic applies everywhere  Potential applications of computer technology limitless

March 1, 2012 Kutztown University Moor  Possible for people to do a vast number of things that they were not able to do before.  Since no one could do them before, the question never arose as to whether one ought to do them.

March 1, 2012 Kutztown University Moor No laws or standards of good practice or specific ethical rules were established to govern them. policy vacuums conceptual muddles conceptual vacuum.

March 1, 2012 Kutztown University Enter Google The success of Google, to a great extent, was their ability to do things no one had done before.

March 1, 2012 Kutztown University Scott Cleland Search & Destroy: Why You Can’t Trust Google Inc.

March 1, 2012 Kutztown University Moor Although a problem in computer ethics may seem clear initially, a little reflection reveals a conceptual muddle. What is needed in such cases is an analysis that provides a coherent conceptual framework within which to formulate a policy for action.

March 1, 2012 Kutztown University Moor (1) Identify a policy vacuum generated by computing technology. (2) Eliminate any conceptual muddles.

March 1, 2012 Kutztown University Moor (3) Use the core values and the ethical resources of just consequentialism to revise existing – but inadequate – policies, or else to create new policies that justly eliminate the vacuum and resolve the original ethical issue.

March 1, 2012 Kutztown University Moor If the blindfold of justice is applied to computing policies, some regarded as  unjust by all rational, impartial people  just by all rational, impartial people,  some will be in dispute.

March 1, 2012 Kutztown University Moor We first require that all computing policies pass the impartiality test. Clearly, our computing policies should not be among those that every rational, impartial person would regard as unjust.

March 1, 2012 Kutztown University C & I Ethics {Bynum} Donald Gotterbarn  computer ethics should be seen as a professional ethics devoted to the development and advancement of standards of good practice and codes of conduct for computing professionals.

March 1, 2012 Kutztown University Gotterbarn Professional ethics  values that guide the day-to-day activities of computing professionals.  anyone involved in the design and development of computer artifacts.

March 1, 2012 Kutztown University Gotterbarn The ethical decisions made during the development of these artifacts have a direct relationship to many of the issues discussed under the broader concept of computer ethics.

March 1, 2012 Kutztown University C & I Ethics {Bynum} Luciano Floridi  Information ethics  treats everything that exists as “informational” objects or processes”

March 1, 2012 Kutztown University Information Ethics Yes – need broader than  computer  Communication Need consider  Information in all its forms  What is & what is not an ethical use of information

March 1, 2012 Kutztown University Information Ethics Already have bits & pieces Concepts of  Protected information  Privileged communication  Sealed records  Disposal of records

March 1, 2012 Kutztown University Information Ethics MIA Over-arching principles

March 1, 2012 Kutztown University The Schmidt Dichotomy What happens when you have  Conceptual vacuums  Conceptual muddles  A policy vacuum

March 1, 2012 Kutztown University The Schmidt Dichotomy Abu Dubai – 3/11/10  Q: All this information that you have about us: where does it go? Who has access to that?  A: Google servers and Google employees, under careful rules  Q: Does that scare everyone in this room? {applause}

March 1, 2012 Kutztown University The Schmidt Dichotomy Abu Dubai – 3/11/10  A: Would you prefer someone else? {laughter; even greater applause}  A: Is there a government that you would prefer to be in charge of this?”  eric-schmidts-talk-in-abu-dhabi/ eric-schmidts-talk-in-abu-dhabi/

March 1, 2012 Kutztown University The Schmidt Dichotomy Classic disjunctive syllogism  p  q   p   q Or classic false dichotomy?

March 1, 2012 Kutztown University Targeted Father’s angry interchange with Target  “My daughter got this in the mail!” he said. “She’s still in high school, and you’re sending her coupons for baby clothes and cribs? Are you trying to encourage her to get pregnant?”

March 1, 2012 Kutztown University Targeted  Target manager calls to apologize  Father: I had a talk with my daughter. She is due in August.  habits.html?_r=2&pagewanted=1&hp habits.html?_r=2&pagewanted=1&hp  target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/ target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/

March 1, 2012 Kutztown University Privacy Lawrence Snyder’s definition The right of people to choose freely under what circumstances and to what extent they will reveal themselves to others.

March 1, 2012 Kutztown University Snyder’s Definition Right Choose  Freely  Circumstances  Extent Reveal  Self

March 1, 2012 Kutztown University FIP Principles Fair Information Practices 1980 – OECD Adopted by EU US – hodgepodge of various laws

March 1, 2012 Kutztown University FIP Principles Limited Collection Principle  Limits  Fair & lawful means Quality Principle  Relevant  Accurate & complete  Up to date

March 1, 2012 Kutztown University FIP Principles Purpose Principle  Purpose stated  Use limited to purpose Use Limitation Principle  Not disclosed  No other purpose

March 1, 2012 Kutztown University FIP Principles Security Principle  reasonable security measures by data controller Openness Principle  Public knowledge of  existence  kind & purpose  identify of data controller

March 1, 2012 Kutztown University FIP Principles Participation Principle  Individual  Knows Whether information What information  Can challenge Denial of access Information itself

March 1, 2012 Kutztown University FIP Principles Accountability Principle  data controller to be accountable for complying with FIP Principles

March 1, 2012 Kutztown University Google vs. EU 872e-00144feabdc0.html#axzz1njZ4p0Tuhttp:// 872e-00144feabdc0.html#axzz1njZ4p0Tu a855da9e6c393c07dda475a &show _article=1http:// a855da9e6c393c07dda475a &show _article=1

March 1, 2012 Kutztown University Philosophy of Information New & uncharted territory  Claude Shannon  Not for public consumption

March 1, 2012 Kutztown University What Is Information Seat of the pants definition: That of which one can say “I know”

March 1, 2012 Kutztown University What Is Information Information Disinformation Misinformation

March 1, 2012 Kutztown University Value of Information Corporate secrets Sale of information  Sale of personal information Ownership  Personal information  Intellectual property

March 1, 2012 Kutztown University Ethical Dilemmas When is it wrong?  To disclose  To not disclose Examples  Warning of disasters  E.g., tsunami  Unabomber’s brother

March 1, 2012 Kutztown University Ownership & Sale Pilfering  When cents rounded off – place lost value into own account When bits & pieces are collected  Who owns?  Compensation?

March 1, 2012 Kutztown University Information Life Cycle Creation Maintenance  Protection  Integrity Dissolution Disposal

March 1, 2012 Kutztown University The Policy Vacuum What is and what is not an ethical use of information?

March 1, 2012 Kutztown University END