Computer Ethics(1) IT Engineering II Instructor: Ali B. Hashemi

Size: px
Start display at page:

Download "Computer Ethics(1) IT Engineering II Instructor: Ali B. Hashemi"

Transcription

1 Computer Ethics(1) IT Engineering II Instructor: Ali B. Hashemi 1 1

2 Main Points Computer Ethics Set of rules or standards of behavior for dealing with computer technology Academic field of study Examples of Issues in Computer Ethics How does computer ethics relate to your every day decisions? 2 2

3 What is Moral? mor al (môr¹el, mòr¹-) adjective 1. Of or concerned with the judgment of the goodness or badness of human action and character: moral scrutiny; a moral quandary. 2. Teaching or exhibiting goodness or correctness of character and behavior: a moral lesson. 3. Conforming to standards of what is right or just in behavior; virtuous: a moral life

4 What is Ethics? eth ic (èth¹îk) noun 1. a. A set of principles of right conduct. b. A theory or a system of moral values. 2. ethics (used with a sing. verb). The study of the general nature of morals and of the specific moral choices to be made by a person; moral philosophy. 3. ethics (used with a sing. or pl. verb). The rules or standards governing the conduct of a person or the members of a profession: medical ethics. 4 4

5 Controls on Human Behavior Courtesy Law Ethics 5 5

6 The Scope of Behavioral Rules Individuals Organizations / Groups Society / Government 6 6

7 Ethical Theories: Relativism Subjective Relativism what s right for you may not be right for me Problem: no moral distinction between the actions of different people Cultural Relativism right and wrong rests with society s actual moral guidelines Problem: Just because societies have different views of right and wrong doesn t imply that they should. Problem: No framework for conflict between societies. 7 7

8 Ethical Theories: Kantianism People should be guided by the universal moral laws, which are devised rationally The only unqualified good is good will It is wrong to use other people Problem: allows no exception to moral laws Kantianism: the system of critical philosophy created by the 18thcentury philosopher Immanuel Kant, or the philosophies that have arisen from the study of his writings and have drawn inspiration from his principles. 8 8

9 Ethical Theories: Utilitarianism An action is right (or wrong) to the extent that it increases (or decreases) total happiness of affected parties. Action should be decided on the weight of good and harm that will result. Rule utilitarianism: adopt rules that if adopted will lead to the greatest increase in happiness Utilitarianism (n.) سودمندگرايي belief that usefulness is the basis of virtue and that decisions should be made according to what will be good for the greatest number of people 9 9

10 Ethical Theories: Social Contract Theory Living in a civilized society forces: The establishment of a set of moral rules A government to enforce these rules Rational people decide on moral rules (rights and duties) Negative rights include freedom of expression and privacy Positive rights obligate others to act for you, such as free education

11 Applied Computer Ethics 11 11

12 How Does This Apply to Me? (Scott Adams, 1/19/06) 12 12

13 The Levels of Behavior Feelings Beliefs Reputation Ability 13 13

14 Information Ethics Applying this to: Direct interaction Personal correspondence Telephone Print media Radio and television What else? 14 14

15 Information Ethics How it might differ when using a computer: Scope Speed It seems different with a computer! 15 15

16 Areas of Ethical Problems Personal intrusion Privacy Morality Deception Security Resources Intellectual property Inappropriate use Technology and social responsibility 16 16

17 Computer Ethics Issues: Examples Computers in the Workplace Computer Crime Privacy and Anonymity Intellectual Property Professional Responsibility 17 17

18 General Comments on Ethics The world of ethics is gray Ethical conflict is characterized by Intense feelings Rapid development 18 18

19 Computer Ethics: Standards of Conduct 19 19

20 The Top Ten Rules of Computer Ethics 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid

21 The Top Ten Rules of Computer Ethics (cont.) 7. Thou shalt not use other people's computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans. (From the Computer Ethics Institute) 21 21

22 Commentary on the 10 Commandents 1.Thou shalt not use a computer to harm other people Is it just people that we should not harm? What about the environment and animals? The environment is clearly harmed by the production and use of computers, and by the disposal of waste computers

23 Commentary continued 2.Thou shalt not interfere with other people s computer work 3.Thou shalt not snoop around in other people s files What is the other people are using the computer to do harm? Should we still refrain from interfering? Should computer files be provate even if they are being used as part of a criminal conspiracy? 23 23

24 Commentary continued 4.Thou shalt not use a computer to steal 5.Thou shalt not use a computer to bear false witness What if stealing or bearing false witness is the only way to prevent someone from doing a much greater harm? 24 24

25 Commentary continued 6.Thou shalt not use or copy software for which you have not paid This is too simplistic. Many of us use software on university or business computer systems where somebody else has paid for us to use the software. Beyond this, though, what if the software house that produced the software has used immoral methods to gain an excessively large share of the software market? This prevents competition, and enables it to over-charge for software? Under these circumstances is it wrong to use or copy software without paying the software house? 25 25

26 Commentary continued 7.Thou shalt not use other people s computer resources without authorization What if it is an emergency, and the only way to stop a great harm is to use computer resources without authorization? 26 26

27 Commentary continued 8.Thou shalt not appropriate other people s intellectual output Even here, it is possible that somebody has a brilliant idea that can produce great social benefit, but which will not be taken seriously if the true author is known. By appropriating their intellectual output, society as a whole will gain substantially 27 27

28 Commentary continued 9.Thou shalt think about the social consequences of the program you write Thought, unaccompanied by action, is pointless. They must act upon those thoughts. Further, it is not just in writing of software that thought of social consequences and action should follow: although both are necessary in the writing of software 28 28

29 Commentary continued 10.Thou shalt use a computer in ways that show consideration and respect There may be situations in the world where more good can be done by not showing respect for all, and the possibility of doing such good should not be dismissed out of hand 29 29

30 Netiquette - Network etiquette The conventions of politeness recognized on Usenet, in mailing lists and . The most important rule of netiquette is "Think before you post". Re-read and edit your carefully before you send. Check the spelling and grammar. When responding to a newsgroup posting, quote the minimum necessary to give some context to your reply and be careful to attribute the quote to the right person. Only send to the necessary recipients. is permanent and can be saved forever! Will be discussed more 30 30

31 Food for Thought 31 31

32 Issues Can people (secretly) read your ? Who secretly reads your ? Doesn't my password protect me? Doesn t my vanish after I delete it? What motivates a snoop? Why do I need privacy? I've got nothing to hide. What can I do to have privacy? Where can I learn more about these privacy tools? Anything else I should know? 32 32

33 Computer Ethics: Academic Discipline 33 33

34 History of Computer Ethics as a Field of Study 1940s-1950s Norbert Wiener (MIT) Notes the social/ethical implications of computer technology Long before Nagasaki nd the public awareness of the atomic bomb, it had occurred to me that we were here in the presence of another social potentiality of unheard-of importance for good and for evil. (Cybernetics: or control and communication in the animal and the machine, pp , 1948) Published in 1950 computer ethics book The Human Use of Human Beings 34 34

35 History of Computer Ethics as a Field of Study 1960s Donn Parker(SRI International) Unethical and illegal uses of computers by computer professionals It seemed that when people entered the computer center they left their ethics at the door 1968: Led Code of Professional Conduct for the Association for Computing Machinery (ACM). Adopted by ACM in s Walter Maner (ODU) Coined computer ethics Created starter kit in Computer Ethics and gave workshops around country 35 35

36 History of Computer Ethics as a Field of Study 1970s Joseph Weizenbaum MIT CS created a program he called ELIZA imitation of psychotherapist engaged in initial interview with patient Outcry from psychotherapists computers would replace them Public began to see people as machines 36 36

37 History of Computer Ethics as a Field of Study 1980s Computer ethics becomes an academic discipline Public issues: Computer-enabled crime Disasters caused by computer failure Privacy invasion via databases Law suits over software ownership James Moor of Dartmouth College published article What is Computer Ethics Deborah Johnson published book Computer Ethics first textbook Terrell Ward Bynam & Maner created the first international disciplinary conference on computer ethics 37 37

38 History of Computer Ethics (some points of view) Any unique moral issues? Deborah Johnson: Ethics on-line. The scope of the Internet is global and interactive. The Internet enables users to interact with anonymity. Internet technology makes the reproducibility of information possible in ways not possible before. The above features make behavior on-line morally different than off-line

39 History of Computer Ethics (some points of view) James Moore: Computer technology is logically malleable[flexible] unlike previous technologies. It can create new possibilities for human action. Brey: disclosing non-obvious features embedded in computer systems that can have moral implications. Alison Adams: Take into account genderrelated biases. Combine feminist ethics with empirical studies

40 History of Computer Ethics as a Field of Study 1990s Lots of research Health HIPAA Wealth Opportunity Freedom Democracy Knowledge Privacy Security Notion of (computer) professional ethics Computer professional == anyone involved in the design and development of computer artifacts (Gotterbarn, 1991) 40 40

41 Sources and Other Information Bynum, Terrell, "Computer Ethics: Basic Concepts and Historical Overview", The Stanford Encyclopedia of Philosophy (Winter 2001 Edition), Edward N. Zalta (ed.) < Ethics in Computing: Computer Ethics Institute

42 Sources and Other Information (cont d) Netiquette: RFC 1855 (rfc1855) - Netiquette Guidelines Netiquette Home Page Netiquette (From Wikipedia, the free encyclopedia)

43 Summary Computer Ethics Field of study Set of rules or standards of behavior for dealing with computer technology Examples of Issues in Computer Ethics How does computer ethics relate to your every day decisions? 10 Rules of Computer Ethics Netiquette 43 43

44 Second Homework Assignment Write an essay for the subject you talked about. Define the most important issue. Additional points for strong, consistent logic that supports your argument. Submit 1 copy: Electronic copy File must be named <lastname.assignment#.section#>.doc E.g. hashemi.1.doc (no section) in case of multiple files, name them and zip them all

45 Sample topics in computer ethics Computers in the workplace: a threat to jobs? De-skilling? Health and safety? Computer security: Viruses. Spying by hackers. Logical security: Privacy, integrity, unimpaired service, consistency, controlling access to resources. Software ownership: Intellectual property vs. open source. Software development: quality, safety 45 45

46 Computers in the workplace Monitoring of employees: employer vs. employee point of view. Loyalty- Whistle blowing. Health issues. Use of contingent workers. A threat to jobs. De-skilling

47 Computer security Viruses: programming code disguised Worms: propagate w/o human intervention Trojan horses: gets secretly installed. Logic bombs: execute conditionally. Bacteria or rabbits: multiply rapidly. Computer crimes: embezzlement. Hackers: vandalism or exploration. Denial of service attack: flood a target site

48 Logical security Privacy invasion of , files, and own computer (cookies). Shared databases. Identity theft. Combating terrorism: Patriot act

49 Software ownership Knowledge: private greed, public good. Profit vs. affordability Freedom of expression and access to information Right to communicate: share and learn in a globalized world. Digital divide is immoral. Open source software: Linux. Open access. North-South information flow. Indigenous knowledge

50 Professional responsibility Codes of ethics. Professional organizations: ACM. IEEE, CPSR Licensing Industry certifications Common ethical issues: Piracy, inappropriate sharing of information, inappropriate usage of computing resources

51 Codes of ethics Avoid harm to others Be honest and trustworthy Acquire and maintain professional competence Know and respect existing laws pertaining to professional work Avoid real or perceived conflicts of interest Be honest and realistic in stating claims or estimates based on available data 51 51

52 Global Information Ethics Freedom of speech in the USA Control of pornography Protection of intellectual property Invasion of privacy Global cyberbusiness Global education: free press Information rich and poor 52 52

Computer and Information Ethics

Computer and Information Ethics Computer and Information Ethics Instructor: Viola Schiaffonati May,4 th 2015 Ethics (dictionary definition) 2 Moral principles that govern a person's behavior or the conducting of an activity The branch

More information

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Computer Ethics Dr. Aiman El-Maleh King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Outline What are ethics? Professional ethics Engineering ethics

More information

VALLIAMMAI ENGINEERING COLLEGE

VALLIAMMAI ENGINEERING COLLEGE VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur 603 203 DEPARTMENT OF COMPUTER APPLICATIONS QUESTION BANK III SEMESTER MC7304 PROFESSIONAL ETHICS Regulation 2013 Academic Year 2017 18 Prepared

More information

The computer can outperform human beings in speed, memory, repetition and accuracy.

The computer can outperform human beings in speed, memory, repetition and accuracy. Lecture 10 Limitations of Computing & Ethical Issues The computer can outperform human beings in speed, memory, repetition and accuracy. A computer can process data faster than any other machine designed

More information

A PERSPECTIVE IN COMPUTER ETHICS. Pattarasinee Bhattarakosol 1. Abstract. Introduction. What is computer ethics?

A PERSPECTIVE IN COMPUTER ETHICS. Pattarasinee Bhattarakosol 1. Abstract. Introduction. What is computer ethics? A PERSPECTIVE IN COMPUTER ETHICS Pattarasinee Bhattarakosol 1 Abstract Since computers are counted as a part of life, the issue of computer-related ethics has been considered seriously. Although there

More information

Chapter 4. L&L 12ed Global Ed ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS. Information systems and ethics

Chapter 4. L&L 12ed Global Ed ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS. Information systems and ethics MANAGING THE DIGITAL FIRM, 12 TH EDITION, GLOBAL EDITION Chapter 4 ETHICAL AND SOCIAL ISSUES IN Learning Objectives What ethical, social, and political issues are raised by information systems? What specific

More information

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION. Chapter 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION. Chapter 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS MANAGING THE DIGITAL FIRM, 12 TH EDITION Chapter 4 ETHICAL AND SOCIAL ISSUES IN Learning Objectives What ethical, social, and political issues are raised by information systems? What specific principles

More information

CSI Professional Practice In Computer Science. Ethical, social, and professional aspects of the modern computing technology.

CSI Professional Practice In Computer Science. Ethical, social, and professional aspects of the modern computing technology. CSI 2911 Professional Practice In Computer Science Ethical, social, and professional aspects of the modern computing technology Stan Matwin Jan. Apr. 2012 1 Introduction Why this class? Textbook, other

More information

Ethical and social aspects of management information systems

Ethical and social aspects of management information systems Ethical and social aspects of management Marcos Sanches Commerce Électronique The challenge Why are contemporary and the Internet a challenge for the protection of privacy and intellectual property? How

More information

Trade Secret Protection of Inventions

Trade Secret Protection of Inventions Trade Secret Protection of Inventions Phil Marcoux & Kevin Roe Inventions - Trade Secret or Patent? Theft by employees, executives, partners Theft by contract Note - this class does not create an attorney-client

More information

Chapter 4 INFORMATION SYSTEMS

Chapter 4 INFORMATION SYSTEMS Chapter 4 MANAGING THE DIGITAL FIRM, 12 TH EDITION ETHICAL AND SOCIAL ISSUES IN VIDEO CASES Case 1: Big Brother is Copying Everything on the Internet Case 2: Delete: The Virtue of Forgetting in a Digital

More information

Tip. Getting on the same page. More topics - my favorites. Basic CSC 300 Issue List. Readings - make sure you keep up General Ethical concepts

Tip. Getting on the same page. More topics - my favorites. Basic CSC 300 Issue List. Readings - make sure you keep up General Ethical concepts Getting on the same page Readings - make sure you keep up General Ethical concepts do a little research, read Johnson chapter SE Code of Ethics reading (pop quiz) Paper proposal coming up! What is the

More information

Getting on the same page

Getting on the same page Getting on the same page Readings - make sure you keep up General Ethical concepts do a little research, read Johnson chapter SE Code of Ethics reading (pop quiz) Paper proposal coming up! What is the

More information

Additional Arduino Control & Ethics

Additional Arduino Control & Ethics Additional Arduino Control & Ethics 1 Objectives Outline engineering ethics Emphasize importance of project documentation Discuss Servo Function calls and uses Questions Ethics & Practicing Engineering

More information

ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP

ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2007 Proceedings Midwest (MWAIS) December 2007 ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION

More information

Behaviors That Revolve Around Working Effectively with Others Behaviors That Revolve Around Work Quality

Behaviors That Revolve Around Working Effectively with Others Behaviors That Revolve Around Work Quality Behaviors That Revolve Around Working Effectively with Others 1. Give me an example that would show that you ve been able to develop and maintain productive relations with others, thought there were differing

More information

Proposal to Add Course

Proposal to Add Course Proposal to Add Course Course Number and Title: PHIL151 Ethical Theory & Practice Description: This course introduces the basic concepts and principles of ethical reasoning as applied to the widest variety

More information

A Model for Incorporating Ethics Instruction into the OEIS Curriculum

A Model for Incorporating Ethics Instruction into the OEIS Curriculum A Model for Incorporating Ethics Instruction into the OEIS Curriculum Herman T. Tavani This article proposes a framework for incorporating ethics instruction into the OEIS Model Curriculum by drawing upon

More information

CSCI 2070 Introduction to Ethics/Cyber Security. Amar Rasheed

CSCI 2070 Introduction to Ethics/Cyber Security. Amar Rasheed CSCI 2070 Introduction to Ethics/Cyber Security Amar Rasheed Professional Ethics: Don Gotterbarn Don Gotterbarn (1991) argued that all genuine computer ethics issues are professional ethics issues. Computer

More information

Learning Goals and Related Course Outcomes Applied To 14 Core Requirements

Learning Goals and Related Course Outcomes Applied To 14 Core Requirements Learning Goals and Related Course Outcomes Applied To 14 Core Requirements Fundamentals (Normally to be taken during the first year of college study) 1. Towson Seminar (3 credit hours) Applicable Learning

More information

Catalysts for Change p. 1 Introduction p. 2 Milestones in Computing p. 6 Mechanical Adding Machines p. 6 The Analytical Engine p.

Catalysts for Change p. 1 Introduction p. 2 Milestones in Computing p. 6 Mechanical Adding Machines p. 6 The Analytical Engine p. Preface p. xix Catalysts for Change p. 1 Introduction p. 2 Milestones in Computing p. 6 Mechanical Adding Machines p. 6 The Analytical Engine p. 9 Boolean Algebra p. 10 Zuse's Z Series p. 11 Harvard Mark

More information

CS 305: Social, Ethical and Legal Implications of Computing

CS 305: Social, Ethical and Legal Implications of Computing CS 305: Social, Ethical and Legal Implications of Computing Prof. Andrew P. Black black@cs.pdx.edu 1 We will be right back, after these messages Do you know about PCEP? PCEP is the PSU/PDX Cooperative

More information

Slide 15 The "social contract" implicit in the patent system

Slide 15 The social contract implicit in the patent system Slide 15 The "social contract" implicit in the patent system Patents are sometimes considered as a contract between the inventor and society. The inventor is interested in benefiting (personally) from

More information

PROFESSIONAL ETHICS A LIFE-LONG PURSUIT BY AN ENGINEER

PROFESSIONAL ETHICS A LIFE-LONG PURSUIT BY AN ENGINEER PROFESSIONAL ETHICS A LIFE-LONG PURSUIT BY AN ENGINEER Ir Dr. C.K. Leung Department of Electronic and Information Engineering The Hong Kong Polytechnic University Ir Jolly Wong Information Engineering

More information

The Job Interview: Here are some popular questions asked in job interviews:

The Job Interview: Here are some popular questions asked in job interviews: The Job Interview: Helpful Hints to Prepare for your interview: In preparing for a job interview, learn a little about your potential employer. You can do this by calling the business and asking, or research

More information

Five Steps to Becoming an Information Security Expert! Information Security Basics for Students

Five Steps to Becoming an Information Security Expert! Information Security Basics for Students The Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University presents: Five Steps to Becoming an Information Security Expert! Information Security Basics for

More information

Ethics in Artificial Intelligence

Ethics in Artificial Intelligence Ethics in Artificial Intelligence By Jugal Kalita, PhD Professor of Computer Science Daniels Fund Ethics Initiative Ethics Fellow Sponsored by: This material was developed by Jugal Kalita, MPA, and is

More information

integrity, honor and dignity knowledge and skill honest and impartial increase the competence professional and technical societies

integrity, honor and dignity knowledge and skill honest and impartial increase the competence professional and technical societies Engineering Ethics Code of Ethics Engineering Professional Engineering Organizations American Society of Civil Engineers (http://www.asce.org/inside/codeofethics.cfm) Fundamental Principles Engineers uphold

More information

Lecture 3. Lecture Outline. 1. Turn in Homework 2. Sampling Quiz 3. Essay Writing Lecture. Assignments

Lecture 3. Lecture Outline. 1. Turn in Homework 2. Sampling Quiz 3. Essay Writing Lecture. Assignments Lecture 3 Lecture Outline 1. Turn in Homework 2. Sampling Quiz 3. Essay Writing Lecture Assignments 1. Thesis Activity 2. Review Essay 3. Improving the Paper Preparation for Next Class 1. Read Chapter

More information

All graduates of the engineering programs must demonstrate: an understanding of professional and ethical responsibility

All graduates of the engineering programs must demonstrate: an understanding of professional and ethical responsibility All graduates of the engineering programs must demonstrate: an understanding of professional and ethical responsibility Ethics moral principles that govern a person's or group's behavior Moral concerned

More information

DEPARTMENT OF PUBLIC SAFETY DIVISION OF FIRE COLUMBUS, OHIO. SOP Revision Social Media Digital Imagery

DEPARTMENT OF PUBLIC SAFETY DIVISION OF FIRE COLUMBUS, OHIO. SOP Revision Social Media Digital Imagery DEPARTMENT OF PUBLIC SAFETY DIVISION OF FIRE COLUMBUS, OHIO 17-007 SUBJECT: TITLE: Administration SOP Revision-04-05-07 Social Media 04-05-08 Digital Imagery Implementation Office of the Chief PURPOSE:

More information

Computer Ethics from Obscure to Ubiquitous

Computer Ethics from Obscure to Ubiquitous Volume 8, No. 3, March April 2017 International Journal of Advanced Research in Computer Science REVIEW ARTICLE Available Online at www.ijarcs.info Computer Ethics from Obscure to Ubiquitous ISSN No. 0976-5697

More information

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase Term Paper Sample Topics Your topic does not have to come from this list. These are suggestions.

More information

Circle Link 1 Online Rules of the Road

Circle Link 1   Online Rules of the Road 4 th Grade Scavenger Hunt Links Content Circle Link 1 http://www.commonsensemedia.org/get-cybersmart-phineas-and-ferb Online Rules of the Road 1. Guard your privacy. What people know about you is up to

More information

Notice of Privacy Practices

Notice of Privacy Practices Notice of Privacy Practices THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. Privacy is a very

More information

Professional Ethics in Software Engineering Curricula

Professional Ethics in Software Engineering Curricula Cross-disciplinarity in Engineering Education 3rd CeTUSS Workshop CEMUS and IEEE Nordic Education Society Chapter Professional Ethics in Software Engineering Curricula Gordana DODIG-CRNKOVIC Ivica CRNKOVIC

More information

TECHNICAL EDUCATION SUBJECT BOOKLET

TECHNICAL EDUCATION SUBJECT BOOKLET TECHNICAL EDUCATION 2017 18 6 12 SUBJECT BOOKLET Gwinnett s curriculum for grades K 12 is called the Academic Knowledge and Skills (AKS). The AKS for each grade level spells out the essential things students

More information

Ethical and Legal Issues of Design ELEC 421

Ethical and Legal Issues of Design ELEC 421 Ethical and Legal Issues of Design ELEC 421 What is a Profession? Profession A calling requiring special knowledge and often long and intense academic preparation. (source: Webster s Collegiate Dictionary)

More information

Paola Bailey, PsyD Licensed Clinical Psychologist PSY# 25263

Paola Bailey, PsyD Licensed Clinical Psychologist PSY# 25263 NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. Privacy is a very

More information

b. Who invented it? Quinn credits Jeremy Bentham and John Stuart Mill with inventing the theory of utilitarianism. (see p. 75, Quinn).

b. Who invented it? Quinn credits Jeremy Bentham and John Stuart Mill with inventing the theory of utilitarianism. (see p. 75, Quinn). CS285L Practice Midterm Exam, F12 NAME: Holly Student Closed book. Show all work on these pages, using backs of pages if needed. Total points = 100, equally divided among numbered problems. 1. Consider

More information

General Education Rubrics

General Education Rubrics General Education Rubrics Rubrics represent guides for course designers/instructors, students, and evaluators. Course designers and instructors can use the rubrics as a basis for creating activities for

More information

The Digital Persona: Ethics of Social Media in Personal and Professional Capacities Samantha Cristol University of California, Berkeley

The Digital Persona: Ethics of Social Media in Personal and Professional Capacities Samantha Cristol University of California, Berkeley The Digital Persona: Ethics of Social Media in Personal and Professional Capacities Samantha Cristol University of California, Berkeley Introduction Social media is composed of networks of online communication

More information

System Design basics IB Computer Science. Content developed by Dartford Grammar School Computer Science Department

System Design basics IB Computer Science. Content developed by Dartford Grammar School Computer Science Department System Design basics IB Computer Science Content developed by Dartford Grammar School Computer Science Department HL Topics 1-7, D1-4 1: System design 2: Computer Organisation 3: Networks 4: Computational

More information

CS 4001 Possible Term Paper Topics

CS 4001 Possible Term Paper Topics CS 4001 Possible Term Paper Topics Your topic does not have to come from this list. These are suggestions. The brief comments and questions for each topic are just a few ideas to spark your imagination

More information

Managing Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm

Managing Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm Managing Information Systems Seventh Canadian Edition Laudon, Laudon and Brabston CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm 4-1 Online activity is tracked and ads are displayed depending

More information

Invention SUBMISSION BROCHURE PLEASE READ THE FOLLOWING BEFORE SUBMITTING YOUR INVENTION

Invention SUBMISSION BROCHURE PLEASE READ THE FOLLOWING BEFORE SUBMITTING YOUR INVENTION Invention SUBMISSION BROCHURE PLEASE READ THE FOLLOWING BEFORE SUBMITTING YOUR INVENTION The patentability of any invention is subject to legal requirements. Among these legal requirements is the timely

More information

Ethical Issues for Engineers

Ethical Issues for Engineers Ethical Issues for Engineers Prepared & Presented by Roxanne L. Pillar, P.E. Vice President Huitt-Zollars, Inc. October 2014 Today we will discuss..... Definition of Ethics Codes of Ethics History of Engineer

More information

Personal Data Protection Competency Framework for School Students. Intended to help Educators

Personal Data Protection Competency Framework for School Students. Intended to help Educators Conférence INTERNATIONAL internationale CONFERENCE des OF PRIVACY commissaires AND DATA à la protection PROTECTION des données COMMISSIONERS et à la vie privée Personal Data Protection Competency Framework

More information

The University of Sheffield Research Ethics Policy Note no. 14 RESEARCH INVOLVING SOCIAL MEDIA DATA 1. BACKGROUND

The University of Sheffield Research Ethics Policy Note no. 14 RESEARCH INVOLVING SOCIAL MEDIA DATA 1. BACKGROUND The University of Sheffield Research Ethics Policy te no. 14 RESEARCH INVOLVING SOCIAL MEDIA DATA 1. BACKGROUND Social media are communication tools that allow users to share information and communicate

More information

Position Paper: Ethical, Legal and Socio-economic Issues in Robotics

Position Paper: Ethical, Legal and Socio-economic Issues in Robotics Position Paper: Ethical, Legal and Socio-economic Issues in Robotics eurobotics topics group on ethical, legal and socioeconomic issues (ELS) http://www.pt-ai.org/tg-els/ 23.03.2017 (vs. 1: 20.03.17) Version

More information

Loyola University Maryland Provisional Policies and Procedures for Intellectual Property, Copyrights, and Patents

Loyola University Maryland Provisional Policies and Procedures for Intellectual Property, Copyrights, and Patents Loyola University Maryland Provisional Policies and Procedures for Intellectual Property, Copyrights, and Patents Approved by Loyola Conference on May 2, 2006 Introduction In the course of fulfilling the

More information

Draft for consideration

Draft for consideration WHO OWNS SCIENCE? A DRAFT STATEMENT OF THE PROBLEM Draft for consideration Prepared by Professor John Sulston, Chair of isei Professor John Harris, Director of isei and Lord Alliance Professor of Bioethics

More information

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE COURSE TITLE: Technology and Society CODE NO. : SEMESTER: ANY PROGRAM: AUTHOR: General Education Course (any program)

More information

Christina Narensky, Psy.D.

Christina Narensky, Psy.D. Christina Narensky, Psy.D. License # PSY 25930 2515 Santa Clara Ave., Ste. 207 Alameda, CA 94501 Phone: Fax: 510.229.4018 E-Mail: Dr.ChristinaNarensky@gmail.com Web: www.drchristinanarensky.com Notice

More information

DIMACS/PORTIA Workshop on Privacy Preserving

DIMACS/PORTIA Workshop on Privacy Preserving DIMACS/PORTIA Workshop on Privacy Preserving Data Mining Data Mining & Information Privacy: New Problems and the Search for Solutions March 15 th, 2004 Tal Zarsky The Information Society Project, Yale

More information

Session 6: Ethical Dimension of the Information Society?

Session 6: Ethical Dimension of the Information Society? PERSIDANGAN KEBANGSAAN MENGENAI MASYARAKAT BERMAKLUMAT NATIONAL SUMMIT ON INFORMATION SOCIETY (NASIS) 7 8 SEPTEMBER 2005 INTERNATIONAL CONVENTION CENTER, BRUNEI DARUSSALAM Date of issue: 8 th September

More information

Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology

Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology Edited by Mireille Hildebrandt and Katja de Vries New York, New York, Routledge, 2013, ISBN 978-0-415-64481-5

More information

Question Bank UNIT - II 1. Define Ethics? * Study of right or wrong. * Good and evil. * Obligations & rights. * Justice. * Social & Political deals. 2. Define Engineering Ethics? * Study of the moral issues

More information

Web 2.0 in social science research

Web 2.0 in social science research Web 2.0 in social science research A Case Study in Blog Analysis Helene Snee, Sociology, University of Manchester Overview Two projects: Student placement at the British Library May-August 2008: How are

More information

Required Course Numbers. Test Content Categories. Computer Science 8 12 Curriculum Crosswalk Page 2 of 14

Required Course Numbers. Test Content Categories. Computer Science 8 12 Curriculum Crosswalk Page 2 of 14 TExES Computer Science 8 12 Curriculum Crosswalk Test Content Categories Domain I Technology Applications Core Competency 001: The computer science teacher knows technology terminology and concepts; the

More information

Teaching a Course on Social Implications of Computing in Undergraduate Curriculum

Teaching a Course on Social Implications of Computing in Undergraduate Curriculum Teaching a Course on Social Implications of Computing in Undergraduate Curriculum Narayan Debnath, Eugene Lundak, Paul Schumacher Computer Science Department Winona State University Winona, MN 55987 e-mail:

More information

Intellectual Property Ownership and Disposition Policy

Intellectual Property Ownership and Disposition Policy Intellectual Property Ownership and Disposition Policy PURPOSE: To provide a policy governing the ownership of intellectual property and associated University employee responsibilities. I. INTRODUCTION

More information

Information Communication Technology

Information Communication Technology # 115 COMMUNICATION IN THE DIGITAL AGE. (3) Communication for the Digital Age focuses on improving students oral, written, and visual communication skills so they can effectively form and translate technical

More information

Australian Census 2016 and Privacy Impact Assessment (PIA)

Australian Census 2016 and Privacy Impact Assessment (PIA) http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 12 February 2016 Mr David Kalisch Australian Statistician Australian Bureau of Statistics Locked Bag 10,

More information

Syllabus for TVF 318 Fundamentals of Scriptwriting 3 Credit Hours Fall 2014

Syllabus for TVF 318 Fundamentals of Scriptwriting 3 Credit Hours Fall 2014 I. COURSE DESCRIPTION Syllabus for TVF 318 Fundamentals of Scriptwriting 3 Credit Hours Fall 2014 Teaches the basics of dramatic scriptwriting for television and film and analyzes script from a Christian

More information

Stanford CS Commencement Alex Aiken 6/17/18

Stanford CS Commencement Alex Aiken 6/17/18 Stanford CS Commencement Alex Aiken 6/17/18 I would like to welcome our graduates, families and guests, members of the faculty, and especially Jennifer Widom, a former chair of the Computer Science Department

More information

Computer Ethics: The Evolution of the Uniqueness Revolution

Computer Ethics: The Evolution of the Uniqueness Revolution Computer Ethics: The Evolution of the Uniqueness Revolution http://www.ccsr.cse.dmu.ac.uk/resources/general/discipline/cepe97.html Computer Ethics: The Evolution of the Uniqueness Revolution by Donald

More information

ORDER OF THE PRESIDENT OF THE PEOPLE'S REPUBLIC OF CHINA

ORDER OF THE PRESIDENT OF THE PEOPLE'S REPUBLIC OF CHINA ORDER OF THE PRESIDENT OF THE PEOPLE'S REPUBLIC OF CHINA No. 68 The Law of the People's Republic of China on Promoting the Transformation of Scientific and Technological Achievements, adopted at the 19th

More information

CRITERIA FOR AREAS OF GENERAL EDUCATION. The areas of general education for the degree Associate in Arts are:

CRITERIA FOR AREAS OF GENERAL EDUCATION. The areas of general education for the degree Associate in Arts are: CRITERIA FOR AREAS OF GENERAL EDUCATION The areas of general education for the degree Associate in Arts are: Language and Rationality English Composition Writing and Critical Thinking Communications and

More information

2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework

2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework 2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework June 2016 Massachusetts Department of Elementary and Secondary Education 75 Pleasant Street, Malden, MA 02148-4906 Phone

More information

INTELLECTUAL PROPERTY POLICY

INTELLECTUAL PROPERTY POLICY INTELLECTUAL PROPERTY POLICY Overview The University of Texas System (UT System) Board of Regents (Board) and the University of Texas Health Science Center at San Antonio (Health Science Center) encourage

More information

WORK EXPERIENCE LOG Name:...

WORK EXPERIENCE LOG Name:... WORK EXPERIENCE LOG 2019 Name:... CONTENTS 3.Contact information 4... Introducing work experience 5... Work experience flow chart 6 My skills and interests 8...Finding your work placement 9..... Contacting

More information

Digital Citizenship Continuum

Digital Citizenship Continuum Digital Citizenship Continuum -curricular Competencies (Develop Thinking, Develop Identity and Interdependence, Develop Literacies, and Develop Social Responsibility) support student achievement and the

More information

Undergraduate Resource Series

Undergraduate Resource Series OCS DECIDING ON A JOB OFFER Undergraduate Resource Series Office of Career Services 54 Dunster Street Harvard University Faculty of Arts and Sciences 617.495.2595 www.ocs.fas.harvard.edu 2012 President

More information

PhD Student Mentoring Committee Department of Electrical and Computer Engineering Rutgers, The State University of New Jersey

PhD Student Mentoring Committee Department of Electrical and Computer Engineering Rutgers, The State University of New Jersey PhD Student Mentoring Committee Department of Electrical and Computer Engineering Rutgers, The State University of New Jersey Some Mentoring Advice for PhD Students In completing a PhD program, your most

More information

Harvard Guide to Using Sources: How to Avoid Plagiarism

Harvard Guide to Using Sources: How to Avoid Plagiarism Copied from: http://isites.harvard.edu/icb/icb.do?keyword=k70847&pageid=icb.page342057 Harvard Guide to Using Sources: How to Avoid Plagiarism It's not enough to know why plagiarism is taken so seriously

More information

Computer Ethical Challenges Facing Professionals in Zimbabwe

Computer Ethical Challenges Facing Professionals in Zimbabwe Juliet B.Msongelwa-Njini National University of Science and Technology julietmsongelwa@gmail.com Samkeliso Suku Dube National University Of Science andtechnology samkeliso.dube@nust.ac.zw ABSTRACT. Zimbabwe

More information

Injury/Disease Form 7 (Tab 2 of Exhibit 2) describes Mr. Youkhanna s occupation at the time of injury as a labourer. 4 Mr. Youkhanna had no managerial

Injury/Disease Form 7 (Tab 2 of Exhibit 2) describes Mr. Youkhanna s occupation at the time of injury as a labourer. 4 Mr. Youkhanna had no managerial Ontario Supreme Court Youkhanna v. Spina s Steel Workers Co. Date: 2001-11-06 Isaac Youkhanna, Plaintiff and Spina s Steel Workers Co. Ltd., Defendant Ontario Superior Court of Justice MacFarland J. Heard:

More information

Information and Communication Technology

Information and Communication Technology Information and Communication Technology Academic Standards Statement We've arranged a civilization in which most crucial elements profoundly depend on science and technology. Carl Sagan Members of Australian

More information

Candidate Interview Preparation

Candidate Interview Preparation Candidate Interview Preparation A little preparation before the interview will help take the edge off the event. Here are some simple ways to get ready for your meeting. 1. Research the company and learn

More information

SPONSORSHIP AND DONATION ACCEPTANCE POLICY

SPONSORSHIP AND DONATION ACCEPTANCE POLICY THE NATIONAL GALLERY SPONSORSHIP AND DONATION ACCEPTANCE POLICY Owner: Head of Development Approved by the National Gallery Board of Trustees on: September 2018 Date of next review by Board: September

More information

This research is supported by the TechPlan program funded by the ITS Institute at the University of Minnesota

This research is supported by the TechPlan program funded by the ITS Institute at the University of Minnesota Frank Douma, Assistant Director,! Sarah Aue, Research Assistant! State and Local Policy Program! Humphrey Institute of Public Affairs! University of Minnesota! This research is supported by the TechPlan

More information

Mt. San Antonio College ESL Department EL Civics Needs Survey for

Mt. San Antonio College ESL Department EL Civics Needs Survey for Mt. San Antonio College ESL Department EL Civics Needs Survey for 2010-2011 Civics Objective Question Pre-1 Level 1 Very Not Very Not 40 - History & Government 1 76 17 93 3 73 64 137 11 12 - DMV 2 94 5

More information

Engineering Ethics. Professional Responsibilities or Doing the Right Thing

Engineering Ethics. Professional Responsibilities or Doing the Right Thing Engineering Ethics Professional Responsibilities or Doing the Right Thing Important Attributes of an Engineer Character: Honesty & Integrity (virtues) Responsibility (reliability) Skills & Knowledge: Technical

More information

Preliminary Syllabus Spring I Preparatory Topics: Preliminary Considerations, Prerequisite to Approaching the Bizarre Topic of Machine Ethics

Preliminary Syllabus Spring I Preparatory Topics: Preliminary Considerations, Prerequisite to Approaching the Bizarre Topic of Machine Ethics Course Title: Ethics for Artificially Intelligent Robots: A Practical Philosophy for Our Technological Future Course Code: PHI 114 Instructor: Forrest Hartman Course Summary: The rise of intelligent robots,

More information

Course Form for PKU Summer School International 2019

Course Form for PKU Summer School International 2019 Course Form for PKU Summer School International 2019 Course Title The Social Implications of Computing Teacher Josh Hug First day of classes July 15, 2019 Last day of classes July 26, 2019 Course Credit

More information

Terms and Conditions

Terms and Conditions 1 Terms and Conditions LEGAL NOTICE The Publisher has strived to be as accurate and complete as possible in the creation of this report, notwithstanding the fact that he does not warrant or represent at

More information

Tough Questions and Answers

Tough Questions and Answers Ready Reference G-5 Tough Questions and Answers In reviewing these responses, remember that these are sample answers. Please do not rehearse them verbatim or adopt them as your own. They are meant to get

More information

Ethics, Professionalism, and Social Impact of Engineering Projects. ELEC 3040/3050 V. P. Nelson & J. Y. Hung

Ethics, Professionalism, and Social Impact of Engineering Projects. ELEC 3040/3050 V. P. Nelson & J. Y. Hung Ethics, Professionalism, and Social Impact of Engineering Projects ELEC 3040/3050 V. P. Nelson & J. Y. Hung ABET Engineering Accreditation Commission Criteria for Accrediting Engineering Programs 3. Engineering

More information

DISPOSITION POLICY. This Policy was approved by the Board of Trustees on March 14, 2017.

DISPOSITION POLICY. This Policy was approved by the Board of Trustees on March 14, 2017. DISPOSITION POLICY This Policy was approved by the Board of Trustees on March 14, 2017. Table of Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. POLICY STATEMENT... 3 5. CRITERIA...

More information

Robin Mansell and Brian S. Collins Introduction: Trust and crime in information societies

Robin Mansell and Brian S. Collins Introduction: Trust and crime in information societies Robin Mansell and Brian S. Collins Introduction: Trust and crime in information societies Book section Original citation: Mansell, Robin and Collins, Brian S. (2005) Introduction: Trust and crime in information

More information

Typical Interview Questions (and how to answer them when they are intended to screen you out)

Typical Interview Questions (and how to answer them when they are intended to screen you out) Typical Interview Questions (and how to answer them when they are intended to screen you out) Review the questions below and make sure you have a strategy for answering in a manner that addresses in a

More information

Ethics in University Curricula

Ethics in University Curricula Ethics in University Curricula CEPIS Professional Ethics Micro Conference Brussels, Belgium, 13 March 02014 Norberto Patrignani 1 / 26 "Ethics forms a fundamental pillar of any profession, and ICT is no

More information

Women's Capabilities and Social Justice

Women's Capabilities and Social Justice University Press Scholarship Online You are looking at 1-10 of 57 items for: keywords : capability approach Women's Capabilities and Social Justice Martha Nussbaum in Gender Justice, Development, and Rights

More information

Student Guidance Notes 2019

Student Guidance Notes 2019 Student Guidance Notes 2019 This guidance is here to help you complete our application form. Please read through this guidance carefully before you apply for our programmes. If you have any questions,

More information

Privacy Policy SOP-031

Privacy Policy SOP-031 SOP-031 Version: 2.0 Effective Date: 18-Nov-2013 Table of Contents 1. DOCUMENT HISTORY...3 2. APPROVAL STATEMENT...3 3. PURPOSE...4 4. SCOPE...4 5. ABBREVIATIONS...5 6. PROCEDURES...5 6.1 COLLECTION OF

More information

AN OVERVIEW OF THE UNITED STATES PATENT SYSTEM

AN OVERVIEW OF THE UNITED STATES PATENT SYSTEM AN OVERVIEW OF THE UNITED STATES PATENT SYSTEM (Note: Significant changes in United States patent law were brought about by legislation signed into law by the President on December 8, 1994. The purpose

More information

Submitted August 30, 2017 Decided. Before Judges Rothstadt and Vernoia.

Submitted August 30, 2017 Decided. Before Judges Rothstadt and Vernoia. NOT FOR PUBLICATION WITHOUT THE APPROVAL OF THE APPELLATE DIVISION This opinion shall not "constitute precedent or be binding upon any court." Although it is posted on the internet, this opinion is binding

More information

Digital Forensics Lecture 11. Evidence, Reporting, and Action

Digital Forensics Lecture 11. Evidence, Reporting, and Action Digital Forensics Lecture 11 Evidence, Reporting, and Action This Week s Presentations Certifications Risk Analysis Normal (non-it) Parents Keeping Their Children Safe and Happy Encase Sleuth Kit Next

More information

Making Identity Use Predictable. UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016

Making Identity Use Predictable. UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016 Making Identity Use Predictable UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016 Why Am I Here CertiPath High Assurance Identity Trust Framework Supports Aerospace and Defense

More information