Computer Ethics(1) IT Engineering II Instructor: Ali B. Hashemi
|
|
- Wendy Wilson
- 6 years ago
- Views:
Transcription
1 Computer Ethics(1) IT Engineering II Instructor: Ali B. Hashemi 1 1
2 Main Points Computer Ethics Set of rules or standards of behavior for dealing with computer technology Academic field of study Examples of Issues in Computer Ethics How does computer ethics relate to your every day decisions? 2 2
3 What is Moral? mor al (môr¹el, mòr¹-) adjective 1. Of or concerned with the judgment of the goodness or badness of human action and character: moral scrutiny; a moral quandary. 2. Teaching or exhibiting goodness or correctness of character and behavior: a moral lesson. 3. Conforming to standards of what is right or just in behavior; virtuous: a moral life
4 What is Ethics? eth ic (èth¹îk) noun 1. a. A set of principles of right conduct. b. A theory or a system of moral values. 2. ethics (used with a sing. verb). The study of the general nature of morals and of the specific moral choices to be made by a person; moral philosophy. 3. ethics (used with a sing. or pl. verb). The rules or standards governing the conduct of a person or the members of a profession: medical ethics. 4 4
5 Controls on Human Behavior Courtesy Law Ethics 5 5
6 The Scope of Behavioral Rules Individuals Organizations / Groups Society / Government 6 6
7 Ethical Theories: Relativism Subjective Relativism what s right for you may not be right for me Problem: no moral distinction between the actions of different people Cultural Relativism right and wrong rests with society s actual moral guidelines Problem: Just because societies have different views of right and wrong doesn t imply that they should. Problem: No framework for conflict between societies. 7 7
8 Ethical Theories: Kantianism People should be guided by the universal moral laws, which are devised rationally The only unqualified good is good will It is wrong to use other people Problem: allows no exception to moral laws Kantianism: the system of critical philosophy created by the 18thcentury philosopher Immanuel Kant, or the philosophies that have arisen from the study of his writings and have drawn inspiration from his principles. 8 8
9 Ethical Theories: Utilitarianism An action is right (or wrong) to the extent that it increases (or decreases) total happiness of affected parties. Action should be decided on the weight of good and harm that will result. Rule utilitarianism: adopt rules that if adopted will lead to the greatest increase in happiness Utilitarianism (n.) سودمندگرايي belief that usefulness is the basis of virtue and that decisions should be made according to what will be good for the greatest number of people 9 9
10 Ethical Theories: Social Contract Theory Living in a civilized society forces: The establishment of a set of moral rules A government to enforce these rules Rational people decide on moral rules (rights and duties) Negative rights include freedom of expression and privacy Positive rights obligate others to act for you, such as free education
11 Applied Computer Ethics 11 11
12 How Does This Apply to Me? (Scott Adams, 1/19/06) 12 12
13 The Levels of Behavior Feelings Beliefs Reputation Ability 13 13
14 Information Ethics Applying this to: Direct interaction Personal correspondence Telephone Print media Radio and television What else? 14 14
15 Information Ethics How it might differ when using a computer: Scope Speed It seems different with a computer! 15 15
16 Areas of Ethical Problems Personal intrusion Privacy Morality Deception Security Resources Intellectual property Inappropriate use Technology and social responsibility 16 16
17 Computer Ethics Issues: Examples Computers in the Workplace Computer Crime Privacy and Anonymity Intellectual Property Professional Responsibility 17 17
18 General Comments on Ethics The world of ethics is gray Ethical conflict is characterized by Intense feelings Rapid development 18 18
19 Computer Ethics: Standards of Conduct 19 19
20 The Top Ten Rules of Computer Ethics 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid
21 The Top Ten Rules of Computer Ethics (cont.) 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans. (From the Computer Ethics Institute) 21 21
22 Commentary on the 10 Commandents 1.Thou shalt not use a computer to harm other people Is it just people that we should not harm? What about the environment and animals? The environment is clearly harmed by the production and use of computers, and by the disposal of waste computers
23 Commentary continued 2.Thou shalt not interfere with other people s computer work 3.Thou shalt not snoop around in other people s files What is the other people are using the computer to do harm? Should we still refrain from interfering? Should computer files be provate even if they are being used as part of a criminal conspiracy? 23 23
24 Commentary continued 4.Thou shalt not use a computer to steal 5.Thou shalt not use a computer to bear false witness What if stealing or bearing false witness is the only way to prevent someone from doing a much greater harm? 24 24
25 Commentary continued 6.Thou shalt not use or copy software for which you have not paid This is too simplistic. Many of us use software on university or business computer systems where somebody else has paid for us to use the software. Beyond this, though, what if the software house that produced the software has used immoral methods to gain an excessively large share of the software market? This prevents competition, and enables it to over-charge for software? Under these circumstances is it wrong to use or copy software without paying the software house? 25 25
26 Commentary continued 7.Thou shalt not use other people s computer resources without authorization What if it is an emergency, and the only way to stop a great harm is to use computer resources without authorization? 26 26
27 Commentary continued 8.Thou shalt not appropriate other people s intellectual output Even here, it is possible that somebody has a brilliant idea that can produce great social benefit, but which will not be taken seriously if the true author is known. By appropriating their intellectual output, society as a whole will gain substantially 27 27
28 Commentary continued 9.Thou shalt think about the social consequences of the program you write Thought, unaccompanied by action, is pointless. They must act upon those thoughts. Further, it is not just in writing of software that thought of social consequences and action should follow: although both are necessary in the writing of software 28 28
29 Commentary continued 10.Thou shalt use a computer in ways that show consideration and respect There may be situations in the world where more good can be done by not showing respect for all, and the possibility of doing such good should not be dismissed out of hand 29 29
30 Netiquette - Network etiquette The conventions of politeness recognized on Usenet, in mailing lists and . The most important rule of netiquette is "Think before you post". Re-read and edit your carefully before you send. Check the spelling and grammar. When responding to a newsgroup posting, quote the minimum necessary to give some context to your reply and be careful to attribute the quote to the right person. Only send to the necessary recipients. is permanent and can be saved forever! Will be discussed more 30 30
31 Food for Thought 31 31
32 Issues Can people (secretly) read your ? Who secretly reads your ? Doesn't my password protect me? Doesn t my vanish after I delete it? What motivates a snoop? Why do I need privacy? I've got nothing to hide. What can I do to have privacy? Where can I learn more about these privacy tools? Anything else I should know? 32 32
33 Computer Ethics: Academic Discipline 33 33
34 History of Computer Ethics as a Field of Study 1940s-1950s Norbert Wiener (MIT) Notes the social/ethical implications of computer technology Long before Nagasaki nd the public awareness of the atomic bomb, it had occurred to me that we were here in the presence of another social potentiality of unheard-of importance for good and for evil. (Cybernetics: or control and communication in the animal and the machine, pp , 1948) Published in 1950 computer ethics book The Human Use of Human Beings 34 34
35 History of Computer Ethics as a Field of Study 1960s Donn Parker(SRI International) Unethical and illegal uses of computers by computer professionals It seemed that when people entered the computer center they left their ethics at the door 1968: Led Code of Professional Conduct for the Association for Computing Machinery (ACM). Adopted by ACM in s Walter Maner (ODU) Coined computer ethics Created starter kit in Computer Ethics and gave workshops around country 35 35
36 History of Computer Ethics as a Field of Study 1970s Joseph Weizenbaum MIT CS created a program he called ELIZA imitation of psychotherapist engaged in initial interview with patient Outcry from psychotherapists computers would replace them Public began to see people as machines 36 36
37 History of Computer Ethics as a Field of Study 1980s Computer ethics becomes an academic discipline Public issues: Computer-enabled crime Disasters caused by computer failure Privacy invasion via databases Law suits over software ownership James Moor of Dartmouth College published article What is Computer Ethics Deborah Johnson published book Computer Ethics first textbook Terrell Ward Bynam & Maner created the first international disciplinary conference on computer ethics 37 37
38 History of Computer Ethics (some points of view) Any unique moral issues? Deborah Johnson: Ethics on-line. The scope of the Internet is global and interactive. The Internet enables users to interact with anonymity. Internet technology makes the reproducibility of information possible in ways not possible before. The above features make behavior on-line morally different than off-line
39 History of Computer Ethics (some points of view) James Moore: Computer technology is logically malleable[flexible] unlike previous technologies. It can create new possibilities for human action. Brey: disclosing non-obvious features embedded in computer systems that can have moral implications. Alison Adams: Take into account genderrelated biases. Combine feminist ethics with empirical studies
40 History of Computer Ethics as a Field of Study 1990s Lots of research Health HIPAA Wealth Opportunity Freedom Democracy Knowledge Privacy Security Notion of (computer) professional ethics Computer professional == anyone involved in the design and development of computer artifacts (Gotterbarn, 1991) 40 40
41 Sources and Other Information Bynum, Terrell, "Computer Ethics: Basic Concepts and Historical Overview", The Stanford Encyclopedia of Philosophy (Winter 2001 Edition), Edward N. Zalta (ed.) < Ethics in Computing: Computer Ethics Institute
42 Sources and Other Information (cont d) Netiquette: RFC 1855 (rfc1855) - Netiquette Guidelines Netiquette Home Page Netiquette (From Wikipedia, the free encyclopedia)
43 Summary Computer Ethics Field of study Set of rules or standards of behavior for dealing with computer technology Examples of Issues in Computer Ethics How does computer ethics relate to your every day decisions? 10 Rules of Computer Ethics Netiquette 43 43
44 Second Homework Assignment Write an essay for the subject you talked about. Define the most important issue. Additional points for strong, consistent logic that supports your argument. Submit 1 copy: Electronic copy File must be named <lastname.assignment#.section#>.doc E.g. hashemi.1.doc (no section) in case of multiple files, name them and zip them all
45 Sample topics in computer ethics Computers in the workplace: a threat to jobs? De-skilling? Health and safety? Computer security: Viruses. Spying by hackers. Logical security: Privacy, integrity, unimpaired service, consistency, controlling access to resources. Software ownership: Intellectual property vs. open source. Software development: quality, safety 45 45
46 Computers in the workplace Monitoring of employees: employer vs. employee point of view. Loyalty- Whistle blowing. Health issues. Use of contingent workers. A threat to jobs. De-skilling
47 Computer security Viruses: programming code disguised Worms: propagate w/o human intervention Trojan horses: gets secretly installed. Logic bombs: execute conditionally. Bacteria or rabbits: multiply rapidly. Computer crimes: embezzlement. Hackers: vandalism or exploration. Denial of service attack: flood a target site
48 Logical security Privacy invasion of , files, and own computer (cookies). Shared databases. Identity theft. Combating terrorism: Patriot act
49 Software ownership Knowledge: private greed, public good. Profit vs. affordability Freedom of expression and access to information Right to communicate: share and learn in a globalized world. Digital divide is immoral. Open source software: Linux. Open access. North-South information flow. Indigenous knowledge
50 Professional responsibility Codes of ethics. Professional organizations: ACM. IEEE, CPSR Licensing Industry certifications Common ethical issues: Piracy, inappropriate sharing of information, inappropriate usage of computing resources
51 Codes of ethics Avoid harm to others Be honest and trustworthy Acquire and maintain professional competence Know and respect existing laws pertaining to professional work Avoid real or perceived conflicts of interest Be honest and realistic in stating claims or estimates based on available data 51 51
52 Global Information Ethics Freedom of speech in the USA Control of pornography Protection of intellectual property Invasion of privacy Global cyberbusiness Global education: free press Information rich and poor 52 52
Computer and Information Ethics
Computer and Information Ethics Instructor: Viola Schiaffonati May,4 th 2015 Ethics (dictionary definition) 2 Moral principles that govern a person's behavior or the conducting of an activity The branch
More informationComputer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062
Computer Ethics Dr. Aiman El-Maleh King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Outline What are ethics? Professional ethics Engineering ethics
More informationVALLIAMMAI ENGINEERING COLLEGE
VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur 603 203 DEPARTMENT OF COMPUTER APPLICATIONS QUESTION BANK III SEMESTER MC7304 PROFESSIONAL ETHICS Regulation 2013 Academic Year 2017 18 Prepared
More informationThe computer can outperform human beings in speed, memory, repetition and accuracy.
Lecture 10 Limitations of Computing & Ethical Issues The computer can outperform human beings in speed, memory, repetition and accuracy. A computer can process data faster than any other machine designed
More informationA PERSPECTIVE IN COMPUTER ETHICS. Pattarasinee Bhattarakosol 1. Abstract. Introduction. What is computer ethics?
A PERSPECTIVE IN COMPUTER ETHICS Pattarasinee Bhattarakosol 1 Abstract Since computers are counted as a part of life, the issue of computer-related ethics has been considered seriously. Although there
More informationChapter 4. L&L 12ed Global Ed ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS. Information systems and ethics
MANAGING THE DIGITAL FIRM, 12 TH EDITION, GLOBAL EDITION Chapter 4 ETHICAL AND SOCIAL ISSUES IN Learning Objectives What ethical, social, and political issues are raised by information systems? What specific
More informationManagement Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION. Chapter 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS
MANAGING THE DIGITAL FIRM, 12 TH EDITION Chapter 4 ETHICAL AND SOCIAL ISSUES IN Learning Objectives What ethical, social, and political issues are raised by information systems? What specific principles
More informationCSI Professional Practice In Computer Science. Ethical, social, and professional aspects of the modern computing technology.
CSI 2911 Professional Practice In Computer Science Ethical, social, and professional aspects of the modern computing technology Stan Matwin Jan. Apr. 2012 1 Introduction Why this class? Textbook, other
More informationEthical and social aspects of management information systems
Ethical and social aspects of management Marcos Sanches Commerce Électronique The challenge Why are contemporary and the Internet a challenge for the protection of privacy and intellectual property? How
More informationTrade Secret Protection of Inventions
Trade Secret Protection of Inventions Phil Marcoux & Kevin Roe Inventions - Trade Secret or Patent? Theft by employees, executives, partners Theft by contract Note - this class does not create an attorney-client
More informationChapter 4 INFORMATION SYSTEMS
Chapter 4 MANAGING THE DIGITAL FIRM, 12 TH EDITION ETHICAL AND SOCIAL ISSUES IN VIDEO CASES Case 1: Big Brother is Copying Everything on the Internet Case 2: Delete: The Virtue of Forgetting in a Digital
More informationTip. Getting on the same page. More topics - my favorites. Basic CSC 300 Issue List. Readings - make sure you keep up General Ethical concepts
Getting on the same page Readings - make sure you keep up General Ethical concepts do a little research, read Johnson chapter SE Code of Ethics reading (pop quiz) Paper proposal coming up! What is the
More informationGetting on the same page
Getting on the same page Readings - make sure you keep up General Ethical concepts do a little research, read Johnson chapter SE Code of Ethics reading (pop quiz) Paper proposal coming up! What is the
More informationAdditional Arduino Control & Ethics
Additional Arduino Control & Ethics 1 Objectives Outline engineering ethics Emphasize importance of project documentation Discuss Servo Function calls and uses Questions Ethics & Practicing Engineering
More informationETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP
Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2007 Proceedings Midwest (MWAIS) December 2007 ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION
More informationBehaviors That Revolve Around Working Effectively with Others Behaviors That Revolve Around Work Quality
Behaviors That Revolve Around Working Effectively with Others 1. Give me an example that would show that you ve been able to develop and maintain productive relations with others, thought there were differing
More informationProposal to Add Course
Proposal to Add Course Course Number and Title: PHIL151 Ethical Theory & Practice Description: This course introduces the basic concepts and principles of ethical reasoning as applied to the widest variety
More informationA Model for Incorporating Ethics Instruction into the OEIS Curriculum
A Model for Incorporating Ethics Instruction into the OEIS Curriculum Herman T. Tavani This article proposes a framework for incorporating ethics instruction into the OEIS Model Curriculum by drawing upon
More informationCSCI 2070 Introduction to Ethics/Cyber Security. Amar Rasheed
CSCI 2070 Introduction to Ethics/Cyber Security Amar Rasheed Professional Ethics: Don Gotterbarn Don Gotterbarn (1991) argued that all genuine computer ethics issues are professional ethics issues. Computer
More informationLearning Goals and Related Course Outcomes Applied To 14 Core Requirements
Learning Goals and Related Course Outcomes Applied To 14 Core Requirements Fundamentals (Normally to be taken during the first year of college study) 1. Towson Seminar (3 credit hours) Applicable Learning
More informationCatalysts for Change p. 1 Introduction p. 2 Milestones in Computing p. 6 Mechanical Adding Machines p. 6 The Analytical Engine p.
Preface p. xix Catalysts for Change p. 1 Introduction p. 2 Milestones in Computing p. 6 Mechanical Adding Machines p. 6 The Analytical Engine p. 9 Boolean Algebra p. 10 Zuse's Z Series p. 11 Harvard Mark
More informationCS 305: Social, Ethical and Legal Implications of Computing
CS 305: Social, Ethical and Legal Implications of Computing Prof. Andrew P. Black black@cs.pdx.edu 1 We will be right back, after these messages Do you know about PCEP? PCEP is the PSU/PDX Cooperative
More informationSlide 15 The "social contract" implicit in the patent system
Slide 15 The "social contract" implicit in the patent system Patents are sometimes considered as a contract between the inventor and society. The inventor is interested in benefiting (personally) from
More informationPROFESSIONAL ETHICS A LIFE-LONG PURSUIT BY AN ENGINEER
PROFESSIONAL ETHICS A LIFE-LONG PURSUIT BY AN ENGINEER Ir Dr. C.K. Leung Department of Electronic and Information Engineering The Hong Kong Polytechnic University Ir Jolly Wong Information Engineering
More informationThe Job Interview: Here are some popular questions asked in job interviews:
The Job Interview: Helpful Hints to Prepare for your interview: In preparing for a job interview, learn a little about your potential employer. You can do this by calling the business and asking, or research
More informationFive Steps to Becoming an Information Security Expert! Information Security Basics for Students
The Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University presents: Five Steps to Becoming an Information Security Expert! Information Security Basics for
More informationEthics in Artificial Intelligence
Ethics in Artificial Intelligence By Jugal Kalita, PhD Professor of Computer Science Daniels Fund Ethics Initiative Ethics Fellow Sponsored by: This material was developed by Jugal Kalita, MPA, and is
More informationintegrity, honor and dignity knowledge and skill honest and impartial increase the competence professional and technical societies
Engineering Ethics Code of Ethics Engineering Professional Engineering Organizations American Society of Civil Engineers (http://www.asce.org/inside/codeofethics.cfm) Fundamental Principles Engineers uphold
More informationLecture 3. Lecture Outline. 1. Turn in Homework 2. Sampling Quiz 3. Essay Writing Lecture. Assignments
Lecture 3 Lecture Outline 1. Turn in Homework 2. Sampling Quiz 3. Essay Writing Lecture Assignments 1. Thesis Activity 2. Review Essay 3. Improving the Paper Preparation for Next Class 1. Read Chapter
More informationAll graduates of the engineering programs must demonstrate: an understanding of professional and ethical responsibility
All graduates of the engineering programs must demonstrate: an understanding of professional and ethical responsibility Ethics moral principles that govern a person's or group's behavior Moral concerned
More informationDEPARTMENT OF PUBLIC SAFETY DIVISION OF FIRE COLUMBUS, OHIO. SOP Revision Social Media Digital Imagery
DEPARTMENT OF PUBLIC SAFETY DIVISION OF FIRE COLUMBUS, OHIO 17-007 SUBJECT: TITLE: Administration SOP Revision-04-05-07 Social Media 04-05-08 Digital Imagery Implementation Office of the Chief PURPOSE:
More informationComputer Ethics from Obscure to Ubiquitous
Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science REVIEW ARTICLE Available Online at www.ijarcs.info Computer Ethics from Obscure to Ubiquitous ISSN No. 0976-5697
More informationA Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics
A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase Term Paper Sample Topics Your topic does not have to come from this list. These are suggestions.
More informationCircle Link 1 Online Rules of the Road
4 th Grade Scavenger Hunt Links Content Circle Link 1 http://www.commonsensemedia.org/get-cybersmart-phineas-and-ferb Online Rules of the Road 1. Guard your privacy. What people know about you is up to
More informationNotice of Privacy Practices
Notice of Privacy Practices THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. Privacy is a very
More informationProfessional Ethics in Software Engineering Curricula
Cross-disciplinarity in Engineering Education 3rd CeTUSS Workshop CEMUS and IEEE Nordic Education Society Chapter Professional Ethics in Software Engineering Curricula Gordana DODIG-CRNKOVIC Ivica CRNKOVIC
More informationTECHNICAL EDUCATION SUBJECT BOOKLET
TECHNICAL EDUCATION 2017 18 6 12 SUBJECT BOOKLET Gwinnett s curriculum for grades K 12 is called the Academic Knowledge and Skills (AKS). The AKS for each grade level spells out the essential things students
More informationEthical and Legal Issues of Design ELEC 421
Ethical and Legal Issues of Design ELEC 421 What is a Profession? Profession A calling requiring special knowledge and often long and intense academic preparation. (source: Webster s Collegiate Dictionary)
More informationPaola Bailey, PsyD Licensed Clinical Psychologist PSY# 25263
NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. Privacy is a very
More informationb. Who invented it? Quinn credits Jeremy Bentham and John Stuart Mill with inventing the theory of utilitarianism. (see p. 75, Quinn).
CS285L Practice Midterm Exam, F12 NAME: Holly Student Closed book. Show all work on these pages, using backs of pages if needed. Total points = 100, equally divided among numbered problems. 1. Consider
More informationGeneral Education Rubrics
General Education Rubrics Rubrics represent guides for course designers/instructors, students, and evaluators. Course designers and instructors can use the rubrics as a basis for creating activities for
More informationThe Digital Persona: Ethics of Social Media in Personal and Professional Capacities Samantha Cristol University of California, Berkeley
The Digital Persona: Ethics of Social Media in Personal and Professional Capacities Samantha Cristol University of California, Berkeley Introduction Social media is composed of networks of online communication
More informationSystem Design basics IB Computer Science. Content developed by Dartford Grammar School Computer Science Department
System Design basics IB Computer Science Content developed by Dartford Grammar School Computer Science Department HL Topics 1-7, D1-4 1: System design 2: Computer Organisation 3: Networks 4: Computational
More informationCS 4001 Possible Term Paper Topics
CS 4001 Possible Term Paper Topics Your topic does not have to come from this list. These are suggestions. The brief comments and questions for each topic are just a few ideas to spark your imagination
More informationManaging Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm
Managing Information Systems Seventh Canadian Edition Laudon, Laudon and Brabston CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm 4-1 Online activity is tracked and ads are displayed depending
More informationInvention SUBMISSION BROCHURE PLEASE READ THE FOLLOWING BEFORE SUBMITTING YOUR INVENTION
Invention SUBMISSION BROCHURE PLEASE READ THE FOLLOWING BEFORE SUBMITTING YOUR INVENTION The patentability of any invention is subject to legal requirements. Among these legal requirements is the timely
More informationEthical Issues for Engineers
Ethical Issues for Engineers Prepared & Presented by Roxanne L. Pillar, P.E. Vice President Huitt-Zollars, Inc. October 2014 Today we will discuss..... Definition of Ethics Codes of Ethics History of Engineer
More informationPersonal Data Protection Competency Framework for School Students. Intended to help Educators
Conférence INTERNATIONAL internationale CONFERENCE des OF PRIVACY commissaires AND DATA à la protection PROTECTION des données COMMISSIONERS et à la vie privée Personal Data Protection Competency Framework
More informationThe University of Sheffield Research Ethics Policy Note no. 14 RESEARCH INVOLVING SOCIAL MEDIA DATA 1. BACKGROUND
The University of Sheffield Research Ethics Policy te no. 14 RESEARCH INVOLVING SOCIAL MEDIA DATA 1. BACKGROUND Social media are communication tools that allow users to share information and communicate
More informationPosition Paper: Ethical, Legal and Socio-economic Issues in Robotics
Position Paper: Ethical, Legal and Socio-economic Issues in Robotics eurobotics topics group on ethical, legal and socioeconomic issues (ELS) http://www.pt-ai.org/tg-els/ 23.03.2017 (vs. 1: 20.03.17) Version
More informationLoyola University Maryland Provisional Policies and Procedures for Intellectual Property, Copyrights, and Patents
Loyola University Maryland Provisional Policies and Procedures for Intellectual Property, Copyrights, and Patents Approved by Loyola Conference on May 2, 2006 Introduction In the course of fulfilling the
More informationDraft for consideration
WHO OWNS SCIENCE? A DRAFT STATEMENT OF THE PROBLEM Draft for consideration Prepared by Professor John Sulston, Chair of isei Professor John Harris, Director of isei and Lord Alliance Professor of Bioethics
More informationSAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE
SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE COURSE TITLE: Technology and Society CODE NO. : SEMESTER: ANY PROGRAM: AUTHOR: General Education Course (any program)
More informationChristina Narensky, Psy.D.
Christina Narensky, Psy.D. License # PSY 25930 2515 Santa Clara Ave., Ste. 207 Alameda, CA 94501 Phone: Fax: 510.229.4018 E-Mail: Dr.ChristinaNarensky@gmail.com Web: www.drchristinanarensky.com Notice
More informationDIMACS/PORTIA Workshop on Privacy Preserving
DIMACS/PORTIA Workshop on Privacy Preserving Data Mining Data Mining & Information Privacy: New Problems and the Search for Solutions March 15 th, 2004 Tal Zarsky The Information Society Project, Yale
More informationSession 6: Ethical Dimension of the Information Society?
PERSIDANGAN KEBANGSAAN MENGENAI MASYARAKAT BERMAKLUMAT NATIONAL SUMMIT ON INFORMATION SOCIETY (NASIS) 7 8 SEPTEMBER 2005 INTERNATIONAL CONVENTION CENTER, BRUNEI DARUSSALAM Date of issue: 8 th September
More informationPrivacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology
Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology Edited by Mireille Hildebrandt and Katja de Vries New York, New York, Routledge, 2013, ISBN 978-0-415-64481-5
More informationQuestion Bank UNIT - II 1. Define Ethics? * Study of right or wrong. * Good and evil. * Obligations & rights. * Justice. * Social & Political deals. 2. Define Engineering Ethics? * Study of the moral issues
More informationWeb 2.0 in social science research
Web 2.0 in social science research A Case Study in Blog Analysis Helene Snee, Sociology, University of Manchester Overview Two projects: Student placement at the British Library May-August 2008: How are
More informationRequired Course Numbers. Test Content Categories. Computer Science 8 12 Curriculum Crosswalk Page 2 of 14
TExES Computer Science 8 12 Curriculum Crosswalk Test Content Categories Domain I Technology Applications Core Competency 001: The computer science teacher knows technology terminology and concepts; the
More informationTeaching a Course on Social Implications of Computing in Undergraduate Curriculum
Teaching a Course on Social Implications of Computing in Undergraduate Curriculum Narayan Debnath, Eugene Lundak, Paul Schumacher Computer Science Department Winona State University Winona, MN 55987 e-mail:
More informationIntellectual Property Ownership and Disposition Policy
Intellectual Property Ownership and Disposition Policy PURPOSE: To provide a policy governing the ownership of intellectual property and associated University employee responsibilities. I. INTRODUCTION
More informationInformation Communication Technology
# 115 COMMUNICATION IN THE DIGITAL AGE. (3) Communication for the Digital Age focuses on improving students oral, written, and visual communication skills so they can effectively form and translate technical
More informationAustralian Census 2016 and Privacy Impact Assessment (PIA)
http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 12 February 2016 Mr David Kalisch Australian Statistician Australian Bureau of Statistics Locked Bag 10,
More informationSyllabus for TVF 318 Fundamentals of Scriptwriting 3 Credit Hours Fall 2014
I. COURSE DESCRIPTION Syllabus for TVF 318 Fundamentals of Scriptwriting 3 Credit Hours Fall 2014 Teaches the basics of dramatic scriptwriting for television and film and analyzes script from a Christian
More informationStanford CS Commencement Alex Aiken 6/17/18
Stanford CS Commencement Alex Aiken 6/17/18 I would like to welcome our graduates, families and guests, members of the faculty, and especially Jennifer Widom, a former chair of the Computer Science Department
More informationComputer Ethics: The Evolution of the Uniqueness Revolution
Computer Ethics: The Evolution of the Uniqueness Revolution http://www.ccsr.cse.dmu.ac.uk/resources/general/discipline/cepe97.html Computer Ethics: The Evolution of the Uniqueness Revolution by Donald
More informationORDER OF THE PRESIDENT OF THE PEOPLE'S REPUBLIC OF CHINA
ORDER OF THE PRESIDENT OF THE PEOPLE'S REPUBLIC OF CHINA No. 68 The Law of the People's Republic of China on Promoting the Transformation of Scientific and Technological Achievements, adopted at the 19th
More informationCRITERIA FOR AREAS OF GENERAL EDUCATION. The areas of general education for the degree Associate in Arts are:
CRITERIA FOR AREAS OF GENERAL EDUCATION The areas of general education for the degree Associate in Arts are: Language and Rationality English Composition Writing and Critical Thinking Communications and
More information2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework
2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework June 2016 Massachusetts Department of Elementary and Secondary Education 75 Pleasant Street, Malden, MA 02148-4906 Phone
More informationINTELLECTUAL PROPERTY POLICY
INTELLECTUAL PROPERTY POLICY Overview The University of Texas System (UT System) Board of Regents (Board) and the University of Texas Health Science Center at San Antonio (Health Science Center) encourage
More informationWORK EXPERIENCE LOG Name:...
WORK EXPERIENCE LOG 2019 Name:... CONTENTS 3.Contact information 4... Introducing work experience 5... Work experience flow chart 6 My skills and interests 8...Finding your work placement 9..... Contacting
More informationDigital Citizenship Continuum
Digital Citizenship Continuum -curricular Competencies (Develop Thinking, Develop Identity and Interdependence, Develop Literacies, and Develop Social Responsibility) support student achievement and the
More informationUndergraduate Resource Series
OCS DECIDING ON A JOB OFFER Undergraduate Resource Series Office of Career Services 54 Dunster Street Harvard University Faculty of Arts and Sciences 617.495.2595 www.ocs.fas.harvard.edu 2012 President
More informationPhD Student Mentoring Committee Department of Electrical and Computer Engineering Rutgers, The State University of New Jersey
PhD Student Mentoring Committee Department of Electrical and Computer Engineering Rutgers, The State University of New Jersey Some Mentoring Advice for PhD Students In completing a PhD program, your most
More informationHarvard Guide to Using Sources: How to Avoid Plagiarism
Copied from: http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page342057 Harvard Guide to Using Sources: How to Avoid Plagiarism It's not enough to know why plagiarism is taken so seriously
More informationComputer Ethical Challenges Facing Professionals in Zimbabwe
Juliet B.Msongelwa-Njini National University of Science and Technology julietmsongelwa@gmail.com Samkeliso Suku Dube National University Of Science andtechnology samkeliso.dube@nust.ac.zw ABSTRACT. Zimbabwe
More informationInjury/Disease Form 7 (Tab 2 of Exhibit 2) describes Mr. Youkhanna s occupation at the time of injury as a labourer. 4 Mr. Youkhanna had no managerial
Ontario Supreme Court Youkhanna v. Spina s Steel Workers Co. Date: 2001-11-06 Isaac Youkhanna, Plaintiff and Spina s Steel Workers Co. Ltd., Defendant Ontario Superior Court of Justice MacFarland J. Heard:
More informationInformation and Communication Technology
Information and Communication Technology Academic Standards Statement We've arranged a civilization in which most crucial elements profoundly depend on science and technology. Carl Sagan Members of Australian
More informationCandidate Interview Preparation
Candidate Interview Preparation A little preparation before the interview will help take the edge off the event. Here are some simple ways to get ready for your meeting. 1. Research the company and learn
More informationSPONSORSHIP AND DONATION ACCEPTANCE POLICY
THE NATIONAL GALLERY SPONSORSHIP AND DONATION ACCEPTANCE POLICY Owner: Head of Development Approved by the National Gallery Board of Trustees on: September 2018 Date of next review by Board: September
More informationThis research is supported by the TechPlan program funded by the ITS Institute at the University of Minnesota
Frank Douma, Assistant Director,! Sarah Aue, Research Assistant! State and Local Policy Program! Humphrey Institute of Public Affairs! University of Minnesota! This research is supported by the TechPlan
More informationMt. San Antonio College ESL Department EL Civics Needs Survey for
Mt. San Antonio College ESL Department EL Civics Needs Survey for 2010-2011 Civics Objective Question Pre-1 Level 1 Very Not Very Not 40 - History & Government 1 76 17 93 3 73 64 137 11 12 - DMV 2 94 5
More informationEngineering Ethics. Professional Responsibilities or Doing the Right Thing
Engineering Ethics Professional Responsibilities or Doing the Right Thing Important Attributes of an Engineer Character: Honesty & Integrity (virtues) Responsibility (reliability) Skills & Knowledge: Technical
More informationPreliminary Syllabus Spring I Preparatory Topics: Preliminary Considerations, Prerequisite to Approaching the Bizarre Topic of Machine Ethics
Course Title: Ethics for Artificially Intelligent Robots: A Practical Philosophy for Our Technological Future Course Code: PHI 114 Instructor: Forrest Hartman Course Summary: The rise of intelligent robots,
More informationCourse Form for PKU Summer School International 2019
Course Form for PKU Summer School International 2019 Course Title The Social Implications of Computing Teacher Josh Hug First day of classes July 15, 2019 Last day of classes July 26, 2019 Course Credit
More informationTerms and Conditions
1 Terms and Conditions LEGAL NOTICE The Publisher has strived to be as accurate and complete as possible in the creation of this report, notwithstanding the fact that he does not warrant or represent at
More informationTough Questions and Answers
Ready Reference G-5 Tough Questions and Answers In reviewing these responses, remember that these are sample answers. Please do not rehearse them verbatim or adopt them as your own. They are meant to get
More informationEthics, Professionalism, and Social Impact of Engineering Projects. ELEC 3040/3050 V. P. Nelson & J. Y. Hung
Ethics, Professionalism, and Social Impact of Engineering Projects ELEC 3040/3050 V. P. Nelson & J. Y. Hung ABET Engineering Accreditation Commission Criteria for Accrediting Engineering Programs 3. Engineering
More informationDISPOSITION POLICY. This Policy was approved by the Board of Trustees on March 14, 2017.
DISPOSITION POLICY This Policy was approved by the Board of Trustees on March 14, 2017. Table of Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. POLICY STATEMENT... 3 5. CRITERIA...
More informationRobin Mansell and Brian S. Collins Introduction: Trust and crime in information societies
Robin Mansell and Brian S. Collins Introduction: Trust and crime in information societies Book section Original citation: Mansell, Robin and Collins, Brian S. (2005) Introduction: Trust and crime in information
More informationTypical Interview Questions (and how to answer them when they are intended to screen you out)
Typical Interview Questions (and how to answer them when they are intended to screen you out) Review the questions below and make sure you have a strategy for answering in a manner that addresses in a
More informationEthics in University Curricula
Ethics in University Curricula CEPIS Professional Ethics Micro Conference Brussels, Belgium, 13 March 02014 Norberto Patrignani 1 / 26 "Ethics forms a fundamental pillar of any profession, and ICT is no
More informationWomen's Capabilities and Social Justice
University Press Scholarship Online You are looking at 1-10 of 57 items for: keywords : capability approach Women's Capabilities and Social Justice Martha Nussbaum in Gender Justice, Development, and Rights
More informationStudent Guidance Notes 2019
Student Guidance Notes 2019 This guidance is here to help you complete our application form. Please read through this guidance carefully before you apply for our programmes. If you have any questions,
More informationPrivacy Policy SOP-031
SOP-031 Version: 2.0 Effective Date: 18-Nov-2013 Table of Contents 1. DOCUMENT HISTORY...3 2. APPROVAL STATEMENT...3 3. PURPOSE...4 4. SCOPE...4 5. ABBREVIATIONS...5 6. PROCEDURES...5 6.1 COLLECTION OF
More informationAN OVERVIEW OF THE UNITED STATES PATENT SYSTEM
AN OVERVIEW OF THE UNITED STATES PATENT SYSTEM (Note: Significant changes in United States patent law were brought about by legislation signed into law by the President on December 8, 1994. The purpose
More informationSubmitted August 30, 2017 Decided. Before Judges Rothstadt and Vernoia.
NOT FOR PUBLICATION WITHOUT THE APPROVAL OF THE APPELLATE DIVISION This opinion shall not "constitute precedent or be binding upon any court." Although it is posted on the internet, this opinion is binding
More informationDigital Forensics Lecture 11. Evidence, Reporting, and Action
Digital Forensics Lecture 11 Evidence, Reporting, and Action This Week s Presentations Certifications Risk Analysis Normal (non-it) Parents Keeping Their Children Safe and Happy Encase Sleuth Kit Next
More informationMaking Identity Use Predictable. UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016
Making Identity Use Predictable UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016 Why Am I Here CertiPath High Assurance Identity Trust Framework Supports Aerospace and Defense
More information