CSC 110 - Intro. to Computing Lecture 19: Ethics & Computers.

Slides:



Advertisements
Similar presentations
Technology and Ethics Joel Price. Lenses The first lens is as a technology user. The second lens is as an educator. The third lens is as a writer.
Advertisements

Kant Are there absolute moral laws that we have to follow regardless of consequences? First we want to know what Kant has to say about what moral rule.
Moral Reasoning Making appropriate use of facts and opinions to decide the right thing to do Quotations from Jacob Needleman’s The American Soul A Crucial.
Introduction to Ethics
Chapter 1: The Context of SA&D Methods
Recap on Ethical Theory
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
 What are systems analysis and design?  Where do systems analysts work?  What modern business and technology trends are affecting information systems.
Ethics & Computers Sources: “The Right Thing to Do”, P. Aarne Vesilind, Lakeshore Press, 2004, (ISBN ) “Ethics for the Information Age”, Michael.
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
UTILITARIANISM: A comparison of Bentham and Mill’s versions
What Is Computer Ethics?
Ethics and Security ISSA International Ethics Committee V2.1 4/27/07.
Computer Ethics – The Ten Commandments
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
Computer ethics.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
Possible WebQuest type links  
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
 ETHICAL ABSOLUTISM  RIGHT and WRONG are static, absolute, universal concepts  Nothing changes their definition  NOT situational.
“A man without ethics is a wild beast loosed upon this world.”
Computer Ethics for Computer Users
© 2001 Business & Information Systems 2/e1 Chapter 3 Information System Fundamentals.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 3 Information System Fundamentals.
COMPUTER ETHICS Do you know the difference between right and wrong?
Beth Sanderson University of Washington Libraries, Bothell © Lawrence Snyder 2004 Computer / Information / Internet Ethics.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Unit 3- Introduction to Computer Ethics
Morality and the Modern World Area 1. Morality and the Modern World Area 1 The Relationship Between Religion and Moral Values.
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Cosc 4765 Ethics and security. Security Computer security crosses over legal and ethics lines in many places. –Hacking is pretty much always illegal.
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Computer Ethics CSCI 101 Kara kelly. Ethics Ethics can be defined as a discipline in which one attempts to identify, organize, analyze, and justify human.
Ethics Business Law Sunny Hills High School Mrs. Larsen.
ICS131 – Ethics 11/17/03. IEEE-CS and ACM 1.PUBLIC - Software engineers shall act consistently with the public.
Is Christian Ethics Absolute or Relative?
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
Intro to Ethics CSCI 327 Social Implications of Computing.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
Applied Ethics Introduction & Theories Computer Science.
Morality in the Modern World
Ethics Overview: Deontological and Teleological ( Consequentalist) Systems.
CSC Intro. to Computing Lecture 26: XML & Course Review.
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
 byte  short  int  long  float  double  boolean  char.
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
Religious Studies RELIGIOUS STUDIES OCR Specification 5. Religious ethics.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Term II Software Engineering I (CS 508) System Analysis and Design (IS 503) Instructor Dr. Tarek Elghazaly.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Computer Ethics IT Fundamentals Battlefield High School.
Chapter 16 – Careers in Information Technology
Note addresses of authors: Floridi – Faculty of Philosophy
The Legal System and Ethics in Information Security
Unit 3- Introduction to Computer Ethics
The Relationship Between Morality and Religion
Computer Ethics.
Presentation transcript:

CSC Intro. to Computing Lecture 19: Ethics & Computers

10 Commandments 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness.

10 Commandments 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.

Major Systems of Ethics Divine dicta - Divine states what is right  Which divine power and who interprets their words? Natural law - Human intuition and conscience guides us to do what is right  How do we mediate when two people disagree over the right thing to do?

Major Systems of Ethics Relativism – Local customs and standards decide what is right. All actions must be considered within the environment they are taken  Can relativistic system have single dicta?

Immanuel Kant Prussian living from Professor of logic and metaphysics at University of Königsburg Very religious man and devout Lutheran  Combined his piety with reason to argue in favor of dentology

Dentological Thought What is right is defined by law, religion, and society  Creator gives all humans knowledge of right and wrong  Institutions make rules reflecting this intuition Flows from Categorical Imperative  States it is impossible to disobey a rule, law, or standard on purely logical grounds

Dentological Thought Presumes everything is created for the good of the people  All people are deserving of respect and value Make decisions using principle of universality  Actions are moral or immoral regardless of the situation or environment they are in

Utilitarian System of Ethics Originally developed in 18 th c. England Also called “hedonic calculus”  Evaluate benefits that arise from an action and then subtract the costs of the action  If the net result is positive, an action is moral Summed up by Jeremy Bentham as “the greatest good for the greatest people”

Utilitarian Thought Important to consider all of the effects than an action will have Action that is moral at one time may be immortal in other instances Different people may value the positives and negatives differently

Modern Thought Few people consciously follow only a single system  Most people do not consciously follow any system  Usually follow own ideas of what is and is not acceptable In a public debate, good to have basis from which to argue your opinions