Giter Club home page Giter Club logo

computer_ethics's Introduction

Ethics in computing

Ethics


Issues in computing

Basics

  • Since no one owns, some interest groups's policies conflict.
  • The Internet forces information overload. We do not know what to believe.

Commerce

  • Businesses monitor our shopping behavior on their website and use that data for advertising products to us, which are often annoying to users.
  • On top of that, some businesses may misuse our personal information for different purposes, which I think is unethical.

Privacy

  • Surveillance system.
  • Personal data leaking.

Risks

  • One person leaking top-secret information, can damage the nation's diplomacy and national security.
  • If someone steals my UDC student ID, the thief will be able to misuse my identity for purchasing UDC services.

Intellectual Property

  • A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004 (2001)
  • People do not honor intellectual property laws seriously, copying and sharing from the Internet and disregard the existence of copyright.

Computer Abuse

  • Hacking to harm or threaten others.
  • Spreading malware.

Social

  • Offshoring. Remotely hiring workers from overseas for cheaper wages.
  • Workers surfing the Internet during their work time.

Speech Issues

  • Lack of netiquette may cause misunderstanding.
  • Some people make hate speech taking advantage of anonymity.

Controversies

  • privacy vs. access to information
  • privacy vs. law enforcement
  • freedom of speech vs. control of content on the Net
  • pros and cons of offshoring jobs
  • market-based vs. regulatory solutions
  • Increasing security vs. reducing convenience
  • Perfection is a direction, not an option.
  • There is a difference between personal choices, business policies, and law.

What is ethics

  • Study of what it means to “do the right thing”.
  • Assumes people are rational and make free choices.
  • Rules to follow in our interactions and our actions that affect others.

A variety of ethical views

Human behavior and real human situations are complex. There are often trade-offs to consider. Ethical theories help to identify important principles or guidelines.

Deontological theories

  • the normative ethical position that judges the morality of an action based on the action's adherence to a rule or rules.

Utilitarianism

  • the doctrine that actions are right if they are useful or for the benefit of a majority.

natural rights

  • natural rights definition. Rights that people supposedly have under natural law. The Declaration of Independence of the United States lists life, liberty, and the pursuit of happiness as natural rights.

Negative rights (liberties)

  • The right to act without interference

Positive rights (claim-rights)

  • An obligation of some people to provide certain things for others

Golden rules

  • Treat others as you would want them to treat you.

Contributing to society

  • Doing one’s work honestly, responsibly, ethically, creatively, and well is virtuous.

Social contracts and a theory of political justice

  • People willingly submit to a common law in order to live in a civil society.

How to decide what is ethical?

  • Not all thoughtful people, or even all trained philosophers, will always come to the same conclusion as a result of an ethical analysis.
  • Technological change in hardware and software proceeds at a very rapid pace, but theprinciples for deciding about the morality of what humans do have not changed over time
  • Law - reactive rather than proactive

Three approaches to ethical reasoning

  • Rights and duties

    • Observing right of others and following duties imposed by rights
  • Utilitarianism

    • Whether an act produces the greatest happiness for the greatest number
  • Fairness and justice

    • Whether a society distributes benefits and burdens in a just manner

Ethical analysis

  • Useful for individuals or groups concerned about doing the right thing
  • Usually, but not always, agree with the results of legal analysis

Software Piracy

  • Producer has a right to get reimbursed.

Some other topics to consider...

  • Telemedicine
  • Artificial intelligence
  • Digital divide
    • The gap between demographics and regions that have access to modern information and communications technology, and those that don't or have restricted access.
    • Include the telephone, television, personal computers and the Internet.

  • Defending your rights in the digital world

  • The Association for Computing Machinery (ACM) is an international learned society for computing. It was founded in 1947 and is the world's largest[2] scientific and educational computing society.

There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.

  • Chemical Sector
  • Commercial Facilities Sector
  • Communications Sector
  • Critical Manufacturing Sector
  • Dams Sector
  • Defense Industrial Base Sector
  • Emergency Services Sector
  • Energy Sector
  • Financial Services Sector
  • Food and Agriculture Sector
  • Government Facilities Sector
  • Healthcare and Public Health Sector
  • Information Technology Sector
  • Nuclear Reactors, Materials, and Waste Sector
  • Transportation Systems Sector
  • Water and Wastewater Systems Sector

https://en.wikipedia.org/wiki/Critical_infrastructure


Cyber terrorism

  1. Politically motivated hacking operations intended to cause grave harm—that is, resulting in either loss of life or severe economic loss, or both is called ________________

  2. Actions intended to protect, exploit, corrupt, deny, or destroy information or information resources in order to achieve a significant advantage, objective, or victory over an adversary is called __________

  3. A method used by phishers to deceive users into believing that they are communicating with a legitimate Web site is called _________ Ans. Pharming

  4. An attack in which one user takes up so much of a shared resource that none of the resource is left for other users is called _____________ Ans. Denial of service attack

  5. Sending unsolicited commercial e-mail advertising for products, services, and Web sites is called __________ Ans. Spam

  6. A high-tech scam that frequently uses spam or pop-up messages to deceive people into disclosing their credit card numbers, bank account information, Social Security numbers, passwords, or other sensitive information is called ______________ Ans. Phishing

  7. Creating a fraudulent Web site to mimic an actual, well-known Web site run by another party is called ____________ Ans. Spoofing

computer_ethics's People

Contributors

mnishiguchi avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.