CSCI 2070 Introduction to Ethics/Cyber Security. Amar Rasheed

Similar documents
A Model for Incorporating Ethics Instruction into the OEIS Curriculum

Computer Ethics: The Evolution of the Uniqueness Revolution

The Quest for the Perfect Search Engine: Values, Technical Design, and the Flow of Personal Information in Spheres of Mobility

Learning Goals and Related Course Outcomes Applied To 14 Core Requirements

Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology

Managing Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm

Computer and Information Ethics

University of Southern California Guidelines for Assigning Authorship and for Attributing Contributions to Research Products and Creative Works

The Method Toolbox of TA. PACITA Summer School 2014 Marie Louise Jørgensen, The Danish Board of Technology Foundation

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062

Privacy Policy Framework

AI & Law. What is AI?

Computer Ethics(1) IT Engineering II Instructor: Ali B. Hashemi

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

Web 2.0 in social science research

Ethics in Artificial Intelligence

Visual Arts What Every Child Should Know

Lumeng Jia. Northeastern University

Impact of Technology Learning Goal

As We May Remember. Introduction

ETHICS CASE SKIT SCRIPT AND TOPICS FOR CLASS DISCUSSION


in the New Zealand Curriculum

Information Communication Technology

The state of computer ethics as a philosophical field of inquiry: Some contemporary perspectives, future projections, and current resources

FACULTY SENATE ACTION TRANSMITTAL FORM TO THE CHANCELLOR

Draft for consideration

Indiana K-12 Computer Science Standards

Getting on the same page

Sustainability Science: It All Depends..

Ethics Guideline for the Intelligent Information Society

BHX Oil spill! Design Portfolio Assessment Rubric

CSI Professional Practice In Computer Science. Ethical, social, and professional aspects of the modern computing technology.

GDPR Implications for ediscovery from a legal and technical point of view

Alabama Course of Study Digital Literacy and Computer Science Grade 8

Tuning-CALOHEE Assessment Frameworks for the Subject Area of CIVIL ENGINEERING The Tuning-CALOHEE Assessment Frameworks for Civil Engineering offers

Professional Ethics in Software Engineering Curricula

Disclosive Computer Ethics

Maryland Technology Literacy Standards for Students

Big Data & Ethics some basic considerations

General Education Rubrics

Epilogue The Future of Knowledge Management

RecordDNA DEVELOPING AN R&D AGENDA TO SUSTAIN THE DIGITAL EVIDENCE BASE THROUGH TIME

Energy for society: The value and need for interdisciplinary research

The student will understand ethical behavior and be able to demonstrate sound understanding of technological concepts.

Trenton Public Schools. Fifth Grade Technological Literacy 2013

How do you teach AI the value of trust?

A Comprehensive Statewide Study of Gambling Impacts: Implications for Public Health

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION. Chapter 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS

CSTA K- 12 Computer Science Standards: Mapped to STEM, Common Core, and Partnership for the 21 st Century Standards

NHS Lanarkshire s Equal Pay Statement and Pay Information 2017

Ethical Technology Use, Policy, and Reactions in Educational Settings

Artificial Intelligence and Society: the Challenges Ahead Yuko Harayama Executive Member Council for Science, Technology and Innovation (CSTI)

Technology and Normativity

Challenges and opportunities of digital social research: Access and Anonymity

Book review: Group Privacy: New Challenges of Data Technologies

The Need To Reform The US Patent System. A Story of Unfair Invalidation for Patents Under Alice 101

Introduction to Computer Science - PLTW #9340

Thinking About Science in History Ideas, Suggestions, Warnings and Open Questions

Hackathons as a Source of Entrepreneurship in Corporations

By RE: June 2015 Exposure Draft, Nordic Federation Standard for Audits of Small Entities (SASE)

Correlation Guide. Wisconsin s Model Academic Standards Level II Text

Presented by PUPILAGE GROUP 5

Towards Trusted AI Impact on Language Technologies

Transparency and Accountability of Algorithmic Systems vs. GDPR?

Chapter 4 INFORMATION SYSTEMS

DIMACS/PORTIA Workshop on Privacy Preserving

OXNARD COLLEGE ACADEMIC SENATE

clarify the roles of the Department and minerals industry in consultation; and

Position Paper: Ethical, Legal and Socio-economic Issues in Robotics

CILIP Privacy Briefing 2017

IRIE International Review of Information Ethics Vol. 3 (06/2005)

Chapter 4. L&L 12ed Global Ed ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS. Information systems and ethics

Trenton Public Schools. Eighth Grade Technological Literacy 2013

EuroBlog European Perspectives on Social Software in Communication Management Results and Implications. March

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence

What Makes International Research Ethical (Or Unethical)? Eric M. Meslin, Ph.D Indiana University Center for Bioethics

Telecommunication Policy, 2060 (2004)

The University of Sheffield Research Ethics Policy Note no. 14 RESEARCH INVOLVING SOCIAL MEDIA DATA 1. BACKGROUND

Innovation and Technology Law Curriculum

Social: The Ethics of Pervasive Games

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE

Ethics, privacy and legal issues concerning GIS. This is lecture 12

Information Sociology

ARTICLE 29 Data Protection Working Party

On the Internet, No One Knows You re A Researcher

Tip. Getting on the same page. More topics - my favorites. Basic CSC 300 Issue List. Readings - make sure you keep up General Ethical concepts

DESIGN AND ANALYSIS OF METALLIC KANBAN CLIP AT TOYOTA KIRLOSKAR MOTORS

RBI Working Group report on FinTech: Key themes

Public Consultation: Science 2.0 : science in transition

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:

International IP. Prof. Eric E. Johnson. General Principles

TECHNOLOGY BACHELOR DEGREE (HEALTH SCIENCES OR ENGINEERING AND APPLIED SCIENCE OPTIONS) Prepare for a career as a technology leader.

Ethics of Data Science

Iowa Core Technology Literacy: A Closer Look

INTERNATIONAL. Building and Implementing an Information Governance Program in a Changing Legal Landscape

Northfleet Technology College Course Outline: Information Technology in a Global Society

Investigating LIS Curriculum in both Structure and Content: the PILISSE Model

BEST 100 RESEARCH THESIS TOPICS

Translational scientist competency profile

Transcription:

CSCI 2070 Introduction to Ethics/Cyber Security Amar Rasheed

Professional Ethics: Don Gotterbarn Don Gotterbarn (1991) argued that all genuine computer ethics issues are professional ethics issues. Computer ethics, for Gotterbarn is like medical ethics and legal ethics, which are tied to issues involving specific professions. He notes that computer ethics issues aren t about technology e.g., we don t have automobile ethics, airplane ethics, etc.

Criticism of Professional Ethics Perspective Gotterbarn s model for computer ethics seems too narrow for cyberethics. Cyberethics issues affect not only computer professionals; they effect everyone. Before the widespread use of the Internet, Gotterbarn s professional-ethics model may have been adequate.

Applying Professional Ethics model The Washingtonienne scenario: Should ISP hire programmers to design feature that support anonymity features for individual who post personal information Design program features that enable bloggers to delete permanently The Verizon scenario: Should computer programmer design and develop system that allow commercial organizations such as RIAA to engage in the surveillance of online activities for users Should programmers be prohibited from developing P2P applications

Perspective # 2: philosophical ethics Professional ethics involve concerns of responsibility and obligation affecting individual as members of a certain profession Philosophical ethics issues include border concerns-social policies as well as individual behavior- that affect virtually everyone in society

Perspective # 2: philosophical ethics From this perspective, cyberethics is a field of philosophical analysis and inquiry that goes beyond professional ethics (Gotterbarn). Moor (1985), defines computer ethics as:...the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology.

Philosophical Ethics Perspective (continued) Moor argues that automobile and airplane technologies did not affect our social policies and norms Automobile and airplane technologies have revolutionized transportation They did not have the same impact on our legal and moral systems as cybertechnology

Philosophical Ethics: Standard Model of Applied Ethics Philip Brey (2000) describes the standard methodology used by philosophers in applied ethics research as having three stages: (1) Identify a particular controversial practice as a moral problem. (2) Describe and analyze the problem by clarifying concepts and examining the factual data associated with that problem. (3)Apply moral theories and principles to reach a position about the particular moral issue. Identify a particular controversial practice Clarifying concepts Apply moral theories and principles

Applying the method of philosophical The Washingtonienne scenario: Identify ethical problems: free speech, privacy,.., etc. Clarify conceptual muddle and policy vacuum: The nature of a blog and the practices surrounding blogging The Verizon scenario: Identify ethical problems: privacy, surveillance, IP Clarify conceptual muddle and policy vacuum: The sharing of proprietary MP3 file online

Perspective #3: Cyberethics as a Field of Descriptive Ethics The professional and philosophical perspectives both illustrate normative inquiries into applied ethics issues. Normative inquiries or studies are contrasted with descriptive studies. Descriptive investigations report about "what is the case ; normative inquiries evaluate situations from the vantage-point of the question: "what ought to be the case."

The Impact of technology X on Community Y ABC Corporation, a company that employs 8000 workers in Community Y, has decided to purchase and implement a new kind of computer/information technology, Technology X. The implementation of Technology X will likely have significant impact for ABC s employees in particular, as well as for community Y in general. It is estimated that 3000 jobs at ABC will be eliminated when the new technology is implemented during the next six months

Descriptive Ethics Perspective (continued) Scenario: A community s workforce and the introduction of a new technology. Suppose a new technology displaces 8,000 workers in a community. If we analyze the issues solely in terms of the number of jobs that were gained or lost in that community, our investigation is essentially descriptive in nature. We are simply describing an impact that technology X has for Community Y.

Descriptive Ethics Perspective (continued) Descriptive vs. Normative Claims Consider three assertions: (1) "Bill Gates served as the Chief Executive Officer of Microsoft Corporation for many years. (2) "Bill Gates should expand Microsoft s product offerings. (3) Bill Gates should not engage in business practices that are unfair to competitors. Claims (2) And (3) are normative, (1) is descriptive; (2) is normative but nonmoral, while (3) is both normative and moral.

Figure 1-1: Descriptive vs. Normative Claims Descriptive Normative (Report or describe what is the case) (Prescribe what ought to be the case) Non-moral Moral Prescribe or evaluate in matters involving standards such as art and sports (e.g., criteria for a good painting or an outstanding athlete). Prescribe or evaluate in matters having to do with fairness and Obligation (e.g., criteria for just and unjust actions and policies).

Some benefits of using the descriptive approach Huff & Finholt (1994) claim that when we understand the descriptive aspect of social effects of technology, the normative ethical issues become clearer. The descriptive perspective prepare us for our subsequent analysis of ethical issues that affect our system of policies and laws.

Applying the method of descriptive ethics The Washingtonienne scenario: The gathering of sociodemographic socioeconomic data pertaining to the kind of peoples who are likely to view and interact in blog The Verizon scenario: Studying if the there is a change in user s behavior when they participate in the P2P networks

Table 1-2: Summary of Cyberethics Perspectives Type of Perspective Associated Disciplines Issues Examined Professional Computer Science Engineering Library/Information Science Professional Responsibility System Reliability/Safety Codes of Conduct Philosophical Descriptive Philosophy Law Sociology Behavioral Sciences Privacy & Anonymity Intellectual Property Free Speech Impact of cybertechnology on governmental/financial/ educational institutions and socio-demographic groups

Is Technology Neutral? Technology seems neutral, at least initially. Consider the cliché: Guns don t kill people, people kill people. Corlann Gee Bush (19997) argues that gun technology, like all technologies, is biased in certain directions. She points out that certain features inherent in gun technology itself cause guns to be biased in a direction towards violence.

Is Technology Neutral (continued)? Bush uses an analogy from physics to illustrate the bias inherent in technology. An atom that either loses or gains electrons through the ionization process becomes charged or valenced in a certain direction. Bush notes that all technologies, including guns, are similarly valenced in that they tend to "favor" certain directions rather than others. Thus technology is biased and is not neutral.

A "Disclosive" Method for Cyberethics The standard applied-ethics methodology is not adequate for identifying cyberethics issues because of embedded biases in cybertechnology We might fail to notice certain features embedded in the design of cybertechnology. Using the standard model, we might also fail to recognize that certain practices involving cybertechnology can have moral implications.

Disclosive Method (Continued) Brey notes that one weakness of the standard method of applied ethics is that it tends to focus on known moral controversies So that model fails to identify those practices involving cybertechnology which have moral implications but that are not yet known. Brey refers to these practices as having morally opaque (or morally non-transparent) features, which he contrasts with "morally transparent features.

Figure 1-2 Embedded Technological Features Having Moral Implications Transparent Features Morally Opaque Features Known Features Unknown Features Users are aware of these features but do not realize they have moral implications. Users are not even aware of the technological features that have moral implications Examples can include:web Forms and searchengine tools. Examples can include:data mining and Internet cookies.

A Multi-Disciplinary & Multi-Level Method for Cyberethics Brey s disclosive method is multidisciplinary because it requires the collaboration of computer scientists, philosophers, and social scientists. It also is multi-level because the method for conducting computer ethics research requires the following three levels of analysis: disclosure level theoretical level application level.

Table 1-3: Three Levels in Brey s Disclosive Model Level Disciplines Involved Task/Function Disclosive Computer Science Social Science (optional) Disclose embedded features in computer technology that have moral import Theoretical Philosophy Test newly disclosed features against standard ethical theories Application Computer Science Philosophy Social Science Apply standard or newly revised/ formulated ethical theories to the issues

Three-step Strategy for Approaching Cyberethics Issues Step 1. Identify a practice involving cyber-technology, or a feature in that technology, that is controversial from a moral perspective. 1a. Disclose any hidden (or opaque) features or issues that have moral implications 1b. If the issue is descriptive, assess the sociological implications for relevant social institutions and socio-demographic and populations. 1c. If there are no ethical/normative issues, then stop. 1d. If the ethical issue is professional in nature, assess it in terms of existing codes of conduct/ethics for relevant professional associations (see Chapter 4). 1e. If one or more ethical issues remain, then go to Step 2. Step 2. Analyze the ethical issue by clarifying concepts and situating it in a context. 2a. If a policy vacuums exists, go to Step 2b; otherwise go to Step 3. 2b. Clear up any conceptual muddles involving the policy vacuum and go to Step 3. Step 3. Deliberate on the ethical issue. The deliberation process requires two stages: 3a. Apply one or more ethical theories (see Chapter 2) to the analysis of the moral issue, and then go to step 3b. 3b. Justify the position you reached by evaluating it against the rules for logic/critical thinking (see Chapter 3).