CS 305: Social, Ethical and Legal Implications of Computing

Similar documents
Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

VALLIAMMAI ENGINEERING COLLEGE

Tip. Getting on the same page. More topics - my favorites. Basic CSC 300 Issue List. Readings - make sure you keep up General Ethical concepts

(a) Left Right (b) Left Right. Up Up 5-4. Row Down 0-5 Row Down 1 2. (c) B1 B2 (d) B1 B2 A1 4, 2-5, 6 A1 3, 2 0, 1

CSI Professional Practice In Computer Science. Ethical, social, and professional aspects of the modern computing technology.

Artificial Intelligence: Definition

Instructor: Brian Richardson. Time: Monday, Wednesday and Friday, 7:30 to 9:45 Course webpage:

Getting on the same page

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION. Chapter 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS

Chapter 4. L&L 12ed Global Ed ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS. Information systems and ethics

Architectural Drafting (DFTG 1317) Credit: 3 semester credit hours (2 hours lecture, 4 hours lab)

1 of 6. IT 1303 ENGINEERING DRAWING Fall Instructor. Phone:

Religion Studies Subject Outline Stage 1 and Stage 2

General Education Rubrics

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS

Indiana K-12 Computer Science Standards

Learning Goals and Related Course Outcomes Applied To 14 Core Requirements

PUBLIC RELATIONS PRCM EFFECTIVE FALL 2016

b. Who invented it? Quinn credits Jeremy Bentham and John Stuart Mill with inventing the theory of utilitarianism. (see p. 75, Quinn).

CSC384 Intro to Artificial Intelligence* *The following slides are based on Fahiem Bacchus course lecture notes.

WEST JEFFERSON HILLS SCHOOL DISTRICT TECHNOLOGY CURRICULUM GRADE 6. Materials/ Resources Textbooks, trade books, workbooks, software, hardware, etc.

Alabama Course of Study Digital Literacy and Computer Science Grade 8

Course Form for PKU Summer School International 2019

LPR Camera Installation and Configuration Manual

School of Computer Science. Course Title: Introduction to Human-Computer Interaction Date: 8/16/11

IM - Innovation Management

Diffusion of Virtual Innovation

Syllabus for TVF 318 Fundamentals of Scriptwriting 3 Credit Hours Fall 2014

PublicServicePrep Comprehensive Guide to Canadian Public Service Exams

The Rules Aggie Style!

Privacy, Ethics, & Accountability. Lenore D Zuck (UIC)


Science education at crossroads: Socio-scientific issues and education

Chapter 4 INFORMATION SYSTEMS

Executive summary. AI is the new electricity. I can hardly imagine an industry which is not going to be transformed by AI.

Photography

STAUNING Trade-In Internet Sales Process with /Voic Templates to Non-Responsive Prospects 2018 Edition

Spiritual, Moral, Social and Cultural Development

EARIN Jarosław Arabas Room #223, Electronics Bldg.

Safety and Security. Pieter van Gelder. KIVI Jaarccongres 30 November 2016

Introduction to Photojournalism Graduate Student course outline

FACULTY SENATE ACTION TRANSMITTAL FORM TO THE CHANCELLOR

TECHNOLOGY GUIDELINES

CS 309: Autonomous Intelligent Robotics FRI I. Instructor: Justin Hart.

CS 4001 Possible Term Paper Topics

Super Digital Citizen

Advertising & Marketing Law (Law 712) Eric Goldman Spring 2011

What is Artificial Intelligence? Alternate Definitions (Russell + Norvig) Human intelligence

A Day in the Life of the Jos Curriculum Connections. Prince Edward Island

COMPSCI 372 S2 C Computer Graphics

Interest Balancing Test Assessment on the processing of the copies of data subjects driving licences for the MOL Limo service

Lantern Independent Study

AIMICT.ORG AIMICT Newsletter

REQUIRED Luchadora! by Alvaro Saar Rios. Dramatic Publishing. ISBN:

What is Rideshare? Rideshare options: Lyft Uber

LECTURE 1: OVERVIEW. CS 4100: Foundations of AI. Instructor: Robert Platt. (some slides from Chris Amato, Magy Seif El-Nasr, and Stacy Marsella)

Information and Communication Technologies (ICT)

Week-1 [8/29, 31, 9/2]: Introduction, Discussion of Lab Platforms (Jetson)

5/17/2009. Digitizing Color. Place Value in a Binary Number. Place Value in a Decimal Number. Place Value in a Binary Number

Trenton Public Schools. Eighth Grade Technological Literacy 2013

University of Asia Pacific (UAP) Department of Law and Human Rights

Lecture #3: Networks. Kyumars Sheykh Esmaili

GLOSSARY for National Core Arts: Media Arts STANDARDS

2014 Transportation Technology Egg Crash Vehicle. Developed By: Mr. Scott E. Mitchell

Saint Patrick High School

Syllabus: Advanced Camera Techniques

Principles of Sociology

the narrative power of the still image

2009 New Jersey Core Curriculum Content Standards - Technology

Technology Trust for Government and Private Sector: Approach Technologies Acceptance Model (TAM)

Fall Semester 2017 JTC 335 Digital Photography Section 2 Department of Journalism and Media Communication Colorado State University

SM 4117 Virtual Reality Assignment 2 By Li Yiu Chong ( )

HIST 101 History of World Civilizations Sections 5 & 6

PHIL 183: Philosophy of Technology

Edgewood College General Education Curriculum Goals

STRANDS AND STANDARDS

PHOT 296 Outdoor Photography Study Abroad Three (3) Credits

Arpita Biswas. Speaker. PhD Student (Google Fellow) Game Theory Lab, Dept. of CSA, Indian Institute of Science, Bangalore

Design and Technology Subject Outline Stage 1 and Stage 2

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE

Northfleet Technology College Course Outline: Information Technology in a Global Society

Learning Macromedia Fireworks Essentials and Digital Image Editing

2/28/2018 POWER CONFERENCE ETHICS SESSION FORMAT OF SESSION LEARNING OBJECTIVES. Part 1: Changes to the Code of Ethics Break

STAUNING /Voic Templates to Non-Responsive Trade-In Prospects 2017 Edition

Department of Art Fall ARTH 1306, Section 001 HISTORY OF WORLD ART II Seamon Hall, Room 210, TR 1:30 2:50 pm

Research in Advanced Performance Technology and Educational Readiness

Course Syllabus. P age 1 5

ENH 110: Introduction to Literature

The mobile device should be open to something neutral, like the device s Home screen

Developments in Electronic Gaming Product Standards. Bev Mehmel Manitoba Lotteries

Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK

Geometric Dimensioning & Tolerancing

How Can Robots Be Trustworthy? The Robot Problem

Upper-division Writing Requirement Review Form (12/1/08) I. General Education Review Upper-division Writing Requirement Dept/Program RTV

Unit 23. QCF Level 3 Extended Certificate Unit 23 Human Computer Interaction

Additional Arduino Control & Ethics

OFFICE OF CURRICULUM, INSTRUCTION & PROFESSIONAL DEVELOPMENT HIGH SCHOOL COURSE OUTLINE

Book review: Profit and gift in the digital economy

Yearbook Staff Application

Transcription:

CS 305: Social, Ethical and Legal Implications of Computing Prof. Andrew P. Black black@cs.pdx.edu 1

We will be right back, after these messages

Do you know about PCEP? PCEP is the PSU/PDX Cooperative Education Program a 2-year internship program in which CS students work 20 hrs / week while taking 8 credits on campus. PCEP gives you real-life work experience, money, professional contacts, and more See http://web.cecs.pdx.edu/~pcep/. There will be Mandatory Orientation Session on 9 April 2014 (FAB 086-01 at 18:30). 3

Looking for a Job? Check out the departmental Job List at: http://www.cs.pdx.edu/resources/jobs The password is psujobs. New jobs are added daily, so check back frequently! 4

Course Goals 1. Identify the ethical issues that relate to computing in real situations you may encounter. 2. Decide whether a given action is ethical within the context of professional computing ethics, and justify that decision. 3. Look up relevant ethical standards developed by the ACM. 4. Prepare and deliver a short professional-quality talk on a topic relating to ethical, legal, and social implications of computing. 5. Research and write a professional-quality paper about a topic relating to social, legal, and ethical implications of computing. 6. Recognize situations in which there may be computing-related legal issues and know some legal principles to apply. 7. State several important impacts of computing on society. 8. State several examples of important ethical principles as they apply to computing related situations. 5

Course Information Time and Location. Tuesday & Thursday, 16:40-18:30 in FAB 150. No class on 29 th April. Web site: http://www.cs.pdx.edu/~black/ethics Text. A Gift of Fire (4th ed) Sara Baase. Pearson, 2013. ISBN-13: 978013249267-6. Grading Policies. Grades will be based on homework (25%), attendance/participation (20%), preliminary slides & abstract (5%), your presentation (20%), your evaluation of others presentations (10%), and your paper (20%). In order to pass this class, you must receive at least 50% of the points in each category. Academic Integrity. You are expected to behave with integrity at all times. Cheating will result in a grade of zero on the assignment or exam on which the student cheats and the initiation of disciplinary action at the university level. Allowing another student to use your work as his/her own is also academic misconduct. 6

Calvin and Hobbes by Bill Watterson 7

Computing and Society How has computing and digital technology affected society? 8

Computing and Society How has computing and digital technology affected society? Digital technology allows us to store, organize and retrieve massive amounts of data 9

How did we get here? A short history of computing 10

Storing, Organizing and Retrieving Massive Amounts of Data Storing Data Wax Tablets [2000BC] auxiliary storage Codex [200s] from scrolls to books The Printing Press [1450s] write once, produce many 11

Paper Tape [1870s] Punched Cards [1890s] Herman Hollarith Magnetic Storage [1920s] - audio 12

Magnetic Data Tape [1951] - ~10M on a 2400 ft reel Hard Disk [1956] 5M @ $35K/ year RANDOM ACCESS! 13

Acquiring Data Keyboarding [1920s] IBM card punch Optical Character Recognition [1950s] Speech Recognition [1961] Barcodes [1974] 14

Radio-frequency identification (RFID) [1980s] Video Recognition [1990s] 15

Processing Data Tabular summaries Computations Models Predictions 16

Computing and Society How has computing and digital technology affected society? Digital technology allows us to store, organize and retrieve massive amounts of data Digital technology allows anybody to communicate with thousands or millions of people at a time 17

Ethical Behavior Society Association of people organized under a system of rules designed to advance the good of its members over time Cooperation promotes the common good People in society compete with each other to divide limited benefits amongst themselves 18

Ethical Behavior Morality Rules of conduct describing how people should behave in various situations Moral dilemma when a person belongs to multiple societies with conflicting rules A pacifist living by the rules of his/her religion living in a country with a mandatory military service What are some moral dilemmas you have encountered? 19

Ethical Behavior Ethics Philosophical study of morality Examination of moral beliefs and behavior Rational, systematic analysis of conduct that can cause benefit or harm to other people Focused on voluntary, moral choices people make Not focused on choices that do not affect others Not focused on involuntary choices Technology forces us to update our moral guidelines constantly! We must decide if problems are morally bad, good, or neutral based on our current (possibly out-of-date) moral guidelines 20

Ethical Problems An ethical problem: a situation in which reasonable people may differ as to whether certain behavior is morally justifiable Ethics requires rational, systematic analysis Doing ethics : creating explanations for why certain actions are right or wrong Explanations: facts, shared values, logic 21

Ethical Theories Provide a framework for moral decisionmaking Applied consistently to determine whether an action is right or wrong Allow a person to present a persuasive, logical argument as to why certain actions should or should not be allowed The argument should be persuasive to a skeptical, yet open-minded audience 22

Ethical Theories Theories covered in book Kantianism (Deontological Ethics) Utilitarianism (Rule & Act) Natural Rights Ethical egoism Social contract theory 23

Class Discussion Read Handout on Toyota s firmware Discussion Questions: Is software-controlled throttle an inherently bad idea? What are the responsibilities of a software engineer working for Toyota when they hear a company PR Rep say: There are no real-world scenarios in which Toyota electronics can cause unintended acceleration. [http://tinyurl.com/qy5cncd] 24

Discussion Scenario 1 An organization dedicated to reducing spam tries to get Internet service providers (ISPs) in an East Asian country to stop the spammers by protecting their mail servers. When this effort is unsuccessful, the antispam organization puts the addresses of these ISPs on its black list. Many ISPs in the United states consult the black list and refuse to accept email from the black-listed ISPs. 1- Copyright 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 25

This action has two results. 1. The amount of spam received by the typical email user in the United States drops by 25 per cent. 2. Tens of thousands of innocent computer users in the East Asian country are unable to send email to friends and business associates in the United States. 1- Copyright 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 26

Discussion Questions Did the anti-spam organization do anything wrong? Did the ISPs that refused to accept email from the blacklisted ISPs do anything wrong? Who benefited from the organization s action? Who was hurt by the organization s action? Could the organization have achieved its goals through a better course of action? What additional information, if any, would help you answer the previous question? 1- Copyright 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 27

Discussion Scenario The East Dakota State Police (EDSP) installs video cameras on all of that state s freeway overpasses. The cameras are connected to computers that can reliably detect cars traveling more than 5 mph above the speed limit. They also have image recognition software that enables them to read license plates and capture high-resolution pictures of the vehicle drivers. If the picture of the driver matches the driver s license photo of one of the registered owners of the vehicle, the system issues a speeding ticket to the driver. 1- Copyright 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 28

After six months, the number of people speeding on East Dakota s freeways is reduced by 90 per cent. The FBI asks the EDSP for real-time access to the information collected by the video cameras. The EDSP complies with this request. Three months later, the FBI uses this information to arrest five members of a terrorist organization. 1- Copyright 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 29

Scenario 3 Did the East Dakota State Police do anything wrong? Who benefited from the actions of the EDSP? Who was harmed by the actions of the EDSP? What other courses of action could the EDSP have taken to achieve its objectives? What additional information, if any, would help you answer the previous question? 1- Copyright 2013 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 30