UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 390 Professional Issues in Computer Science and Engineering Three Simple.

Slides:



Advertisements
Similar presentations
University of Colorado at Colorado Springs
Advertisements

Online Course Module 6 Guidelines for Contacting Patients START Click to begin…
Letters of Recommendation A Practical Guide for Obtaining Effective References.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 390 Professional Issues in Computer Science and Engineering Ch.3: Philosophic.
Explorator y Program The Key To Success! Director: Dr. Ralph G. Anttonen Presentation By: Charles Garber Student Computer Consultant for the Exploratory.
Safety On The Internet Illinois Attorney General’s Office Naperville Police Department.
e-safety and cyber bullying
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 390 Professional Issues in Computer Science and Engineering Ch.3: Philosophic.
Confidentiality Clue Board Game Edition Roy Mays August 1, 2012.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Introduction to Your Name Goes Here
IST346: Information Ethics. Ethics  Ethics are the principles of conduct that govern a group of people.  Ethics are not morals.  Morals are the proclamation.
FERPA The Buckley Amendment. What is FERPA? Family Educational Rights and Privacy Act.
Introduction to Hypothesis Testing
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 580 Artificial Intelligence Program 1 Fall 2008 Marco Valtorta
© 2002 University of South Carolina CSCE 491 Computer Engineering Senior Design Project Proposal for Spring 2002 Dr. James P. Davis, Associate Professor.
Introduction to Hypothesis Testing
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 390 Professional Issues in Computer Science and Engineering Ch.3: Philosophic.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 390 Professional Issues in Computer Science and Engineering Ch.6: The.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 190 Computing in the Modern World Two Example Bayesian Networks March.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 330 Programming Language Structures Literate Programming in Haskell Fall.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Monkey and Bananas Exercise Notes on Exercise 3.10 of Bratko For CSCE 580 Sp03.
The Family Educational Rights and Privacy Act (FERPA) A Presentation to the Directors of Undergraduate Studies September 25, 2012 Kara E. Simmons, Associate.
Deputy Registrar 035 Grant And Title System For Financial institutions.
FERPA Training. What is FERPA? FERPA (the Family Educational Rights and Privacy Act of 1974), also known as the Buckley Amendment, is a Federal law that.
Internet Safety Guidelines
Improving productivity using IT
Safety On The Internet  Usage time  Locations that may be accessed  Parental controls  What information may be shared with others Online rules should.
Welcome to the wonderful world of……. . A Quick & Easy Guide.  What IS ?  A quick, easy and convenient way to send a letter to friends, family.
Rock Hill Schools Science and Safety: It’s Elementary! Inquiry opens their minds….guide their journey safely. (Dana Center-Safety Standards)
Teaching Assistants & Professional Ethics Lori Mann Bruce, Ph.D. Giles Distinguished Professor of Electrical & Computer Engineering Associate Vice President.
COMPUTER ETHICS Do you know the difference between right and wrong?
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
ADVISING NOTES AND PRIVACY AdvisingAugust ON FERPA The Family Educational Rights and Privacy Act (FERPA) is a federal law designed to protect the.
Safety Rules for the Internet Christy Vaughn EDU 384.
XHS Students Web Tools 2.0 Class. Personal Information Passwords Make it hard for others to figure out Never give it to your friends Don’t use the same.
Building a Privacy Foundation. Setting the Standard for Privacy Health Insurance Portability and Accountability Act (HIPAA) Patient Bill of Rights Federal.
Online Safety 6th grade. Rules to know Protect your privacy Protect your password Protect the privacy of others Beware of contests, clubs, prizes, & gifts.
FERPA Family Educational Rights and Privacy Act A Tutorial.
On-line Safety and Student . I understand there are certain rules I need to follow when I am online.
How is going on the Internet like going out on Halloween?
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Testing External Survey Automatic Credit Granting Shepherd University Department of Psychology.
Cyberbullying Activity 4: Advice Quiz. Ask an Internet Expert These people need help from someone who knows how to be safe online... YOU! What advice.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Introduction to Probability (CSCE 317) January 21, 2016 Marco Valtorta SWRG.
Engineering Design Process Created by The North Carolina School of Science and Math.The North Carolina School of Science and Math Copyright North.
© 2015 albert-learning.com How to talk to your boss How to talk to your boss!!
Student Responsibilities. Advising  To consult their advisors on all matters pertaining to their academic careers, including changes in their programs.
My Digital Footprint. How Might Your Digital Foot Print Effect Your Future Opportunities Your Digital Foot Print is an interesting trail that you could.
Pitfalls of your first paper Shu Cai Institute of Computing Technology, Chinese Academy of Sciences
FERPA Family Educational Rights and Privacy Act of 1974 (also known as the Buckley Amendment)
FERPA Fundamentals The Family Educational Rights and Privacy Act (FERPA) sets out the rights and responsibilities associated with student education records.
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Keeping safe and private on the internet
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Fall 2016 Four Cases by Robert N. Barger
Fall 2014 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering Three Simple Cases by Robert Barger: Absolutist.
CSCE 390 Professional Issues in Computer Science and Engineering Ch
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Fall 2017 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering Three Simple Cases by Robert Barger: Absolutist.
Why study ethics?.
The University of Adelaide, School of Computer Science
Spring 2011 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering Three Simple Cases by Robert Barger: Absolutist.
Fall 2016 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering Three Simple Cases by Robert Barger: Absolutist.
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Registration Overview 2019 UCF Orientation Program
CSCE 390 Professional Issues in Computer Science and Engineering Ch
Presentation transcript:

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 390 Professional Issues in Computer Science and Engineering Three Simple Cases by Robert Barger: Absolutist and Relativist Positions Spring 2012 Marco Valtorta Reference: written in 1993, accessed

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering The Piracy Dilemma Here is the piracy dilemma (i.e., a dilemma concerning wrongful appropriation of computing resources). Suppose I use my account on one of my university's mainframe computers for something that has no direct relation to University business. This use could be anything from sending an e- mail message to a friend, to conducting a full-blown private business on the computer (billing, payroll, inventory, etc.). The absolutist [idealist or realist] solution to this dilemma would probably be that the above-described activities are unethical -- whether only the message is involved, or the larger-scale business activities (although the absolutist would recognize a difference between the two in the amount of wrong being done). On the other hand, a relativist [pragmatist or existentialist] might say that the latter activities were wrong because they tied up too much memory and slowed down the machine's operation, but the message wasn't wrong because it had no significant effect on operations.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Student Privacy Dilemma Next consider a dilemma having to do with privacy. I use my account to acquire the cumulative grade point average of a student who is in a class which I instruct. I obtained the password for this restricted information from someone in the Records Office who erroneously thought that I was the student's advisor. The absolutist [idealist] solution to this dilemma would probably be that I acted wrongly, since the only person who is entitled to this information is the student and his or her advisor. The relativist [pragmatist] would probably ask why I wanted the information. If I said that I wanted it to be sure that my grading of the student was consistent with the student's overall academic performance record, the relativist might agree that such use was acceptable. [Note that laws are now in place that govern this type of situation]

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Power and Computer Accounts [L]et us look at a dilemma concerning power. While I was a Professor at another university, if I wanted a computer account all I had to do was request one. But if I was a student at that university, I must obtain faculty sponsorship in order to receive an account. An absolutist (possibly because of a proclivity for hierarchical thinking) might not have a problem with this dual standard. A relativist, on the other hand, might question what makes these two cases essentially different (e.g., Are faculty assumed to have more need for computers than students? Are students more likely to cause problems on the system than faculty? Is this a hold-over from the days of "in loco parentis?").