Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
29 views
Why Computer Ethics
Fff
Uploaded by
Nikita Sabale
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Why Computer Ethics For Later
Download
Save
Save Why Computer Ethics For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
29 views
Why Computer Ethics
Fff
Uploaded by
Nikita Sabale
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Why Computer Ethics For Later
Carousel Previous
Carousel Next
Save
Save Why Computer Ethics For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 13
Search
Fullscreen
(CHAPTER yy Introduction: Why Computer Ethics? Should | copy proprietary software? Since John graduated from college, five years ago, he has been investing small amounts of money in the stock market. A year ago, he discovered an extremely useful software package that helps individual investors choose penny stocks. (Penny stocks are stocks of small companies that sell for a few dollars or less per share.) The software requires users to input information about their atti- tudes toward risk as well as the names of penny stock companies in which they are interested. The sofiware provides a wide range of information and allows the user to analyze stocks in many different ways. It also recommends strate- gies given the user's attitudes toward risk, age, size of investment, and so on. John has several friends who invest in stocks, and one of his friends, Mary, hhas been getting more and more interested in penny stocks. At a party, they begin talking about investing in penny stocks and John tells Mary about the software package he uses. Mary asks if she can borrow the package to see what itis like John gives his disks and documentation to Mary. Mary finds the software extremely useful. She copies the software and documentation onto her com- puter. Then she gives the package back to John. John and Mary were both vaguely aware that software is proprietary, but neither read the licensing agreement very carefully. Did John do anything wrong? If so, what? Why is it wrong? Did Mary do anything wrong? If so, what? Why is it wrong? Should my company make use of data mining technology? Inga has worked hard all her life. Ten years ago, she started her own business selling computer software and hardware. In any given year now, 100,000 to 200,000 customers purchase things in her store. These purchases range from $5 item to a $10,000 item. As part of doing business, the company gathers 1information on customers. Sometimes information is gathered intentionally (eg, when they distribute customer surveys to evaluate the service they are providing and find out their customer preferences). Other times, they gather information embedded it the purchase transaction (e.g., when they record nname, address, what it purchased, date purchased) Recently Inga has been reading about data mining tools. Data mining tools allow the user to input large quantities of information about individuals and then search for correlations and patterns, Inga realizes that she might he able to derive useful information about her customers. The records contain credit card numbers, checking account numbers, driver's license numbers, and s0 on, but to make se of this information, it would have to be “mined.” The zip code alone is extremely valuable in that data mining tools might reveal a correlation between purchasing habits and zip code, and would allow Inga to ‘arget advertising more effectively. The correlation between zip codes and pur. chasing pattern might then be correlated with public records on voting pat terns to identify what political sympathies customers in varions zip codes have and to see how political affiliation is correlated with size of purchase. This could also be useful in targeting advertising Inga is conflicted about using data mining tools. On the one hand, her customers have given information in order to make a purchase and data min- ing would be using this informacion in a way that the customers had not antie- ipated. On the other hand, for the most part, the information would not {dentfy individuals but rather groups of individuals with financial or atitudi- nal patterns. ‘Should Inga use data mining tools? FREER) &reesiom of expression In December 1994, Jake Baker, a sophomore at the University of Michigan, posted three sexual fantasies on an Internet newsgroup “altsex.tories.” The ‘ewsgroup was an electronic bulletin board whose contents were publicly avail able through the Internet. In one of these stories entitled “Pamela's Ordeal," Baker gave his fictional victim the name of a real student in one of his classes. ‘The story describes graphically the torture, rape, and murder of Pamela, and ends with the woman being doused in gasoline and set afire while tied to a chair. In addition to publishing the fantasies on the newsgroup, Baker also ex- changed e-mails with another man from Ontario, Arthur Gonda, discussing the sexual acts. In one of these e-mails, Baker said that "{jJust thinking about it anymore docsn’t do the trick... need to do it” It should be noted that Gonds's true identity and whereabouts are unknown, The e-mails were private, ‘and not available in any publicly accessible portion of the Internet, AA University of Michigan alumnus in Moscow spotted Baker's stories while browsing the newsgroup and alerted university officials. The campus pi and the Federal Bureau of Investigation were then brought into investigate the yeld in custody for 29 case. On February 9, 1995, Baker wat arested and was eld in custody £4 {R month Tater, he was charged in a superceding indict te sere aor transmitting interstate commanication of a threat to injure another. ‘ryan ven nal compa wo parle, wee srentioned in the superceding indictment, which refers nine ee Bakr Te charges wee droped in June 1995 cee Baker expressed no eae threat of eareyng out the 36 on yd Jake Baker do anything wrong? Should the police have arreste Tiras we ii State» ae, need onthe loving source: Cnied ‘his cane as win by Ma Qe Dini Cort or the East’ Dns of Michigan, Sou mia No NS es en op) (LEIS 677; #8 Medias Rep, one 2- ove pe i espn Dens st nt see Jom Poe emis eres hor of Sey kent iin ebay ib); p ter ore ice a M 7 pene IRENE toy rote respon on froughou he ge. The characters are primarily exaggerated sls nme cies fae er focne on various aspect of hs mate. On Paper discame stare deg are asked co design gues fr eile Aare dnc for boy (Hand Coope, 1987) Te games ae nt then, ‘Rinber of women and minorities who are majoring in computing im cas aa ag onl ia et ac eorage of technically tained a ei ens with pel dicuson abut what comptes Pa OEM eeng reed foe martetng ilo as never cog mh ae tion of the team before, but he now realizes (eat ca erie or ger anor rail bn, Wat shold he o? fame and avs wel shou diferent meseage Be sen with Ne4 ytaopuction: Why Computer Enis? “These scenarios pose a varety of types of ethical questions. The Fist rises a suction poral ec aig an ino eh oe morally permis for an nda to Beak a by aking a copy pro. Prictary software? Iso, when is lav beaing jusiea? When's» ad law? When the law i easy trek? The second secari ao vases & question ft individual decision making, but hee the decison sto do mith establishing + policy fora company. Inga has to decide what her company sould do and tht Iocan taking into acount wha is gd for the companys baton Tine it Crployees, a well at what her respnabilies are to her casters, The third scenario poses an ite that ould he addressed iter aan indual mater, (Shou censor myself when do things onthe Interne) or aa pic policy rater (should there be free expression online?) Final, the fourth sear Faises a question of profesional ethics What Nile should doin the saton Ascribed snot juts matter of his individual vlc ut has mich od wih the profession of computing. That computer professionals have a collective responsi tna tha computing serves humanity well Moreover Mite behavior wil impact the reputation of computer professionals 5 well a his corn and his employer's "ke ote the fr scenation tate the dere cuatro eth cal issues surrounding computer and information technology Among other thing, he etal sues nove property ight, privacy fee speceh, a pro. fesonal ethics. The development and continuing evolution of computer and information techeology based to an ents seqnence of ecieal question: Personal privacy being ered by the we of computer and information tec tology? Should comptes be wed todo ating they ean? What anpets of information technology shouldbe owned? Who's morally responsi for ee rors in software, especialy those that have catastrophic effect Will eneryp. tion technology make it imposible to detect criminal behavior? Wil viral realty echnngy ln to populace sed to famay wl? These quer tions ulmately ead vo deeper moral questions about wh pood for human being, what makes an action right and wrong, wha is «jn dsibuton of Benefit and burdens, and soon ‘While the scenarios athe begining ofthe chapter strate the divest of echicaissues surrounding computer ad information telnelogy shold be noted tha here fail a pore about hy comput an information tech sulogy ge rke wo ethical question, What abt eompute and informa on lg and ot let ight by ht eats ee issues and uncertainey abou right and wrong, good and bad? This question and a set of related questions are contentious among, computer etic, The Controversy has fotsedexpecily on wheter the etd ses suring Eompter and information technslogy are unique. Are the ses 3 diferent from other ehia nue that they reir acre chi are the thea sues ssociated with compute al information technology simply ol ete lice na ew guise? Insxoouction: Wey LoMmuTER Imo Te uniqueness sue is intertwined with several other important and per~ sistent questions. Why oF how does computer and information technology give Tine wo ethical issues? Isa new field of study aud/or separate academic courses needed to adress the ethical issues surrounding computer and information technology? What does one “lo” when one docs computer ethies? That is is there a special methodology required? The uniqueness isue seems tobe a the core oat these questions, enicaton of something unique dont com ter technology holds the promise of explaining Why computer technology: Seen cea erriete cal ier and hy» seca Say and/a # special methodology Way be weeded OT TOUTRe, TcoMpATE ful formation technology Tra wigue, TRETETIHE wil have to be resolved in some other way. I begin with the question why computer and information technology gives ise to ethical isues and proceed from there to a more d= tailed account ofthe uniqueness issue NEW POSSIBILITIES AND A VACUUM OF POLICIES Computer and information technology i nt the First (nor wilt be the lst) fechnology to raise moral concerns. Think of nulelear power and the atom bomb, Rew technologies seem to pose ethical issues when they create new fonbilities for human action, beth individual ation and collective or iste futlonal acion}Should | donate my organs for transplantation? Should em ployers be alowed to use utine or blood tests to deteruine ifemployces are Sng cruge? Should we bail intelligent highway chat record automobite li Corse plates and document when cats enter and leave the highway and how fave sey go? ‘hve questions suggest. the new possibititiesereated by technology are notatiaye gual Ofer ey havea mincl yelve. New echnologies bring he fsa well ue new problems, a in the cave of miclear power sid clear wast, utomobiles and ar pollution, aerosol cans and glob warming. Because new technological possibilities are not always good or purely oor, they need to he evaluated-—morally a8 well a in other ways (© €€0" omically, eavitonmentally). Evaluation can and should take place at each Sage ofa technology's development, and can and should result in shaping the technology 10 thats potential for good i better realized and negative effects tre elimated of minimized. echnical porsbilities are sometimes rejected tes evaluation, ain the case of biologieal weapons, nuclear power (no new siclear powerplant has been builtin the United States for several decades), nd warious chemieals that deplete the amount of ozone in the atmosphere or ause other environmental problems Soi uith computer and information techwetogy. Enormous possibilities forintiigual and initational behavior have been created We could not have rehehed the moon without computers, nor could we have the Kind of global
You might also like
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life
From Everand
The Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life
Mark Manson
4/5 (6135)
Principles: Life and Work
From Everand
Principles: Life and Work
Ray Dalio
4/5 (627)
The Gifts of Imperfection: Let Go of Who You Think You're Supposed to Be and Embrace Who You Are
From Everand
The Gifts of Imperfection: Let Go of Who You Think You're Supposed to Be and Embrace Who You Are
Brene Brown
4/5 (1148)
Never Split the Difference: Negotiating As If Your Life Depended On It
From Everand
Never Split the Difference: Negotiating As If Your Life Depended On It
Chris Voss
4.5/5 (935)
The Glass Castle: A Memoir
From Everand
The Glass Castle: A Memoir
Jeannette Walls
4/5 (8215)
Grit: The Power of Passion and Perseverance
From Everand
Grit: The Power of Passion and Perseverance
Angela Duckworth
4/5 (631)
Sing, Unburied, Sing: A Novel
From Everand
Sing, Unburied, Sing: A Novel
Jesmyn Ward
4/5 (1253)
The Perks of Being a Wallflower
From Everand
The Perks of Being a Wallflower
Stephen Chbosky
4/5 (8365)
Shoe Dog: A Memoir by the Creator of Nike
From Everand
Shoe Dog: A Memoir by the Creator of Nike
Phil Knight
4.5/5 (860)
Her Body and Other Parties: Stories
From Everand
Her Body and Other Parties: Stories
Carmen Maria Machado
4/5 (877)
The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers
From Everand
The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers
Ben Horowitz
4.5/5 (361)
Hidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space Race
From Everand
Hidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space Race
Margot Lee Shetterly
4/5 (954)
Steve Jobs
From Everand
Steve Jobs
Walter Isaacson
4/5 (2923)
Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future
From Everand
Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future
Ashlee Vance
4.5/5 (484)
The Emperor of All Maladies: A Biography of Cancer
From Everand
The Emperor of All Maladies: A Biography of Cancer
Siddhartha Mukherjee
4.5/5 (277)
A Man Called Ove: A Novel
From Everand
A Man Called Ove: A Novel
Fredrik Backman
4.5/5 (4973)
Angela's Ashes: A Memoir
From Everand
Angela's Ashes: A Memoir
Frank McCourt
4.5/5 (444)
Brooklyn: A Novel
From Everand
Brooklyn: A Novel
Colm Toibin
3.5/5 (2061)
The Art of Racing in the Rain: A Novel
From Everand
The Art of Racing in the Rain: A Novel
Garth Stein
4/5 (4281)
The Yellow House: A Memoir (2019 National Book Award Winner)
From Everand
The Yellow House: A Memoir (2019 National Book Award Winner)
Sarah M. Broom
4/5 (100)
The Little Book of Hygge: Danish Secrets to Happy Living
From Everand
The Little Book of Hygge: Danish Secrets to Happy Living
Meik Wiking
3.5/5 (447)
Yes Please
From Everand
Yes Please
Amy Poehler
4/5 (1988)
Devil in the Grove: Thurgood Marshall, the Groveland Boys, and the Dawn of a New America
From Everand
Devil in the Grove: Thurgood Marshall, the Groveland Boys, and the Dawn of a New America
Gilbert King
4.5/5 (278)
The World Is Flat 3.0: A Brief History of the Twenty-first Century
From Everand
The World Is Flat 3.0: A Brief History of the Twenty-first Century
Thomas L. Friedman
3.5/5 (2283)
Bad Feminist: Essays
From Everand
Bad Feminist: Essays
Roxane Gay
4/5 (1068)
The Woman in Cabin 10
From Everand
The Woman in Cabin 10
Ruth Ware
3.5/5 (2641)
A Tree Grows in Brooklyn
From Everand
A Tree Grows in Brooklyn
Betty Smith
4.5/5 (1936)
The Outsider: A Novel
From Everand
The Outsider: A Novel
Stephen King
4/5 (1994)
The Sympathizer: A Novel (Pulitzer Prize for Fiction)
From Everand
The Sympathizer: A Novel (Pulitzer Prize for Fiction)
Viet Thanh Nguyen
4.5/5 (125)
Team of Rivals: The Political Genius of Abraham Lincoln
From Everand
Team of Rivals: The Political Genius of Abraham Lincoln
Doris Kearns Goodwin
4.5/5 (1912)
A Heartbreaking Work Of Staggering Genius: A Memoir Based on a True Story
From Everand
A Heartbreaking Work Of Staggering Genius: A Memoir Based on a True Story
Dave Eggers
3.5/5 (692)
Wolf Hall: A Novel
From Everand
Wolf Hall: A Novel
Hilary Mantel
4/5 (4074)
On Fire: The (Burning) Case for a Green New Deal
From Everand
On Fire: The (Burning) Case for a Green New Deal
Naomi Klein
4/5 (75)
Fear: Trump in the White House
From Everand
Fear: Trump in the White House
Bob Woodward
3.5/5 (830)
Manhattan Beach: A Novel
From Everand
Manhattan Beach: A Novel
Jennifer Egan
3.5/5 (901)
Rise of ISIS: A Threat We Can't Ignore
From Everand
Rise of ISIS: A Threat We Can't Ignore
Jay Sekulow
3.5/5 (143)
John Adams
From Everand
John Adams
David McCullough
4.5/5 (2544)
The Light Between Oceans: A Novel
From Everand
The Light Between Oceans: A Novel
M L Stedman
4.5/5 (790)
Phrasal Verbs PDF
PDF
No ratings yet
Phrasal Verbs PDF
6 pages
Time & Distance Short Tricks & Questions With Solutions: Join Us: Telegram - Me/Govtadda
PDF
No ratings yet
Time & Distance Short Tricks & Questions With Solutions: Join Us: Telegram - Me/Govtadda
36 pages
20 Practice Sets For IBPS Bank (WWW - Sarkaripost.in) PDF
PDF
No ratings yet
20 Practice Sets For IBPS Bank (WWW - Sarkaripost.in) PDF
208 pages
DWDM Lecture Notes III-II
PDF
No ratings yet
DWDM Lecture Notes III-II
86 pages
Fillers-Fill-In-The-Blanks-Pdf-By-Governmentadda.com_
PDF
No ratings yet
Fillers-Fill-In-The-Blanks-Pdf-By-Governmentadda.com_
145 pages
Unit 5 Random Variables: Structure
PDF
No ratings yet
Unit 5 Random Variables: Structure
20 pages
Cse303 Elements of The Theory of Computation: Professor Anita Wasilewska
PDF
No ratings yet
Cse303 Elements of The Theory of Computation: Professor Anita Wasilewska
40 pages
Design and Analysis of Algorithms - C1
PDF
No ratings yet
Design and Analysis of Algorithms - C1
15 pages
Lok Sabha: Ds/Rk/Online Courses
PDF
No ratings yet
Lok Sabha: Ds/Rk/Online Courses
1 page
100 Syllogism Practice Questions
PDF
No ratings yet
100 Syllogism Practice Questions
20 pages
Software Engineering
PDF
No ratings yet
Software Engineering
41 pages
Ratio Proportion PDF by Governmentadda PDF
PDF
No ratings yet
Ratio Proportion PDF by Governmentadda PDF
81 pages
Human Occupations Explanation The Rearing All The Above Pictures Are
PDF
No ratings yet
Human Occupations Explanation The Rearing All The Above Pictures Are
34 pages
The Unwinding: An Inner History of the New America
From Everand
The Unwinding: An Inner History of the New America
George Packer
4/5 (45)
Little Women
From Everand
Little Women
Louisa May Alcott
4/5 (105)
The Constant Gardener: A Novel
From Everand
The Constant Gardener: A Novel
John le Carré
3.5/5 (109)