computer ethics helicopter viewcomputerscience.unicam.it/devivo/riservata/inform... · source:...
TRANSCRIPT
![Page 1: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/1.jpg)
Computer EthicsHelicopter View
Norberto Patrignani
![Page 2: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/2.jpg)
2 / 51
"Technology is the answer! (But what was the question?)"
Amory Lovins, Published as a guest essay, in G. Tyler Miller, "Environmental Science", 3rd ed. Belmont, CA, 1991
![Page 3: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/3.jpg)
3 / 51
Values Embedded in Design
![Page 4: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/4.jpg)
4 / 51
Values Embedded in Design
Source: "The Whale and the Reactor A search for Limits in an Age of High Technology", L.Winner, The University of Chicago Press, 1989
![Page 5: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/5.jpg)
5 / 51
Do artifacts have politics?Politeia vs Techne*
Supermarket Bazaar
Proprietary Software
centralized de-centralized
Nuclear Plant Solar Power
Free Software
Software as Service
PC Software
Boeing 747 Hang-Glider
Aircraft carrier Rowing Boat
Railway BicycleCarMetro
Mainframe ServerNetwork
Control CenterLAN Desktop Home PC
ShopShopping Malle-Commerce
LAN SoftwareServer Software
Submarine Ferry Boat
System Network Architecture Internet
Glider
Ship Container
Sailors must yield to their captain's commands
Plato, Republic
Source: "The Whale and the Reactor A search for Limits in an Age of High Technology", L.Winner, The University of Chicago Press, 1989
![Page 6: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/6.jpg)
Source: Taming complexity, AlbertLászló Barabási, Nature Physics 1, 68 70 (2005) BURCH/CHESWICK MAP COURTESY OF LUMETA CORP./WWW.LUMETA.COM
![Page 7: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/7.jpg)
7 / 51
CoShaping
![Page 8: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/8.jpg)
8 / 51Source: "Computer Ethics", Deborah G.Johnson, 1985 4th Edition, Pearson International Edition, Prentice Hall, January 2009
![Page 9: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/9.jpg)
9 / 51Source: "Iran stocks up on censorship tools", MinnPost.com, Photo REUTERS
![Page 10: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/10.jpg)
10 / 51
ValueSensitive Design
Source: Helen Nissenbaum, "Values in Technical Design", Encyclopedia of Science Technology and Ethics, MacMillan, New York, 2005
![Page 11: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/11.jpg)
11 / 51
Market
Education
Architecture Law
Source: Lawrence Lessig, "Code and other laws of cyberspace", Basic Books, New York, 1999
![Page 12: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/12.jpg)
12 / 51
Market
Education
Architecture Law
![Page 13: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/13.jpg)
13 / 51
Market
Education
Architecture Law
![Page 14: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/14.jpg)
14 / 51
Computers' Social & Ethical Issues
![Page 15: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/15.jpg)
15 / 51
Planet
BioSphere
People
InfoSphere
CyberSpace
Ideas (NooSphere)
War
Ecology&
Recycling
Hackers
Privacy
Content&
Education
Accessibility, Universal Access & Digital Divide
Dawn ofCyberSpace,e-Democracy
CopyRights
Computer(Un)Reliability
ComputerCrimes &
Virus
Workplace
ArtificialIntelligence
(A.I.) –Nano-
Technologies,Implants
Source: Patrignani N., "A Conceptual Framework for Computer Ethics", Proceedings of Conference ETHICOMP2008, Mantova
Computer Ethics
![Page 16: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/16.jpg)
16 / 51Source: “Modeling the Internet's LargeScale Topology”, SoonHyung Yook, Hawoong Jeong, AlbertLaszlo Barabasi, 19 July 2001
Accessibility, Universal Access & Digital Divide
![Page 17: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/17.jpg)
17 / 51Source: Photo by Alex Antener
Accessibility, Universal Access & Digital Divide
![Page 18: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/18.jpg)
18 / 51
Workplace
![Page 19: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/19.jpg)
19 / 51
Content & Education
![Page 20: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/20.jpg)
20 / 51
Copy Rigth / Left
Knowledge multiplies when you give it away ...
![Page 21: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/21.jpg)
21 / 51Source: Pekka Himanen, "The Hacker Ethic: and the Spirit of the Information Age", Random House, 2001
Work Ethic
Money Ethic
Network Ethic
Passion Freedom Social Values Openness Activity Responsibility Creativity
Hackers' Ethic
Robert MorrisInternet Worm
1988
Kevin MitnickCondor1979
Linus TorvaldLinux1991
Vladimir Levin10.7 M$ Citibank hack
1994
![Page 22: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/22.jpg)
22 / 51
hacker
n [hack skillful repair of a computer program +er] (1976): an expert at programming and
solving problems with a computer(Webster's Dictionary)
![Page 23: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/23.jpg)
23 / 51
Source: "Barcelona clubbers get chipped", BBC News, September 2004
Privacy
![Page 24: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/24.jpg)
24 / 51Source: New York Times, 17 January 2003
![Page 25: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/25.jpg)
25 / 51
DNA DataBasesThe Next Frontier of Crime "Prevention"
![Page 26: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/26.jpg)
26 / 51
Ambient Intelligence
![Page 27: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/27.jpg)
27 / 51Source: Jack Stanfield (Harrison Ford) Security Manager at Landrock Pacific Bank, "Firewall" (scene 4), Richard Loncraine, USA 2006
Computer Crimes
![Page 28: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/28.jpg)
28 / 51Source: 2006, MessageLabs, "NetskyP" by Alex Dragulescu, the "most widely spread of the email worms" in 2006, (it is still a threat through email traffic)
Computer Virus
![Page 29: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/29.jpg)
29 / 51
THE TITANIC EFFECT
The severity with which a system fails is directly proportional
to the intensity of the designer's belief that it cannot.
COROLLARY
The quantity and quality of builtin redundancy is directly proportional to the degree of concern
about failure.
Source: newsgroup "comp.risks" (Peter G. Neumann) 1985
Computers' (Un)Reliability
![Page 30: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/30.jpg)
30 / 51
ICT main actor in BINN:the "structure that connects", collect INPUTSPROCESS and DECIDE then drive OUTPUTS
ICT main actor in BINN:the "structure that connects", collect INPUTSPROCESS and DECIDE then drive OUTPUTS
Converging Technologies
InfoBio
NanoNeuro
source: sr.burnham.org
source: mri.radiology.uiowa.edu
source: biogridcomputing
source: techwall.org
"Titanic" EffectModels = Reality?
"Pandora Box" EffectNanoSystems = Complex Systems?
"Golem" EffectSynBio = Life?
"Blade Runner" EffectBrain = Mind?
BRAIN
BODY
PLANET
![Page 31: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/31.jpg)
31 / 51
Source: Mavroidis, C., and Dubey, A., 2003, "From Pulses to Motors", Nature Materials, September 2(9):573574.
BioNanoBotsThe Next Frontier of "Medicine"
![Page 32: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/32.jpg)
32 / 51
Unmanned Aerial Vehicles (UAV)Drones
Environmental Monitoring / Surveillance / Attack ?
Source: "Google Earth Shows U.S. Drones at Pakistani Base?", Wired, February 2009
![Page 33: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/33.jpg)
33 / 51 Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State University, December 20, 2008
Unmanned Ground Vehicles (UGV)Autonomous Weapons with Sensors
![Page 34: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/34.jpg)
34 / 51
The Precautionary Principle
The Precautionary Principle"When an activity raises threats of harm to human health or the environment, precautionary measures should be taken even if some cause and effect relationships are not fully established scientifically.In this context the proponent of an activity, rather than the public, should bear the burden of proof.The process of applying the Precautionary Principle must be open, informed and democratic and must include potentially affected parties. It must also involve an examination of the full range of alternatives, including no action."
The "Wingspread Statement on the Precautionary Principle", Wingspread Center, Racine, Wisconsin, USA, January, 1998
Source: Environmental Research Foundation, January 21, 2008
![Page 35: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/35.jpg)
35 / 51
Challenging Moore's Law
![Page 36: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/36.jpg)
Source: "The Consumption Conundrum: Driving the Destruction Abroad", Oswald J. Schmitz, Thomas E. Graedel, April 2010, Yale University
Computer chips made use of 11 major elements in the 1980s but now use about 60 (twothirds of the Periodic Table)
4004
8080
286
386
486
Pentium
PIII
Dual Core Itanium 2
![Page 37: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/37.jpg)
Tantalum
Niobium (Columbium) COLumbite
TANtalite
COLTAN
Source: Alberto VazquezFigueroa, "Coltan", Ediciones B, 2010)
![Page 38: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/38.jpg)
38 / 51
Rare Earth Elements Critical Resources for ICT
Source: "Rare Earth Elements Critical Resources for High Technology", U.S. Geological Survey Fact Sheet 08702
![Page 39: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/39.jpg)
39 / 51
Source: NASA, 2008
ICT = 3% CO2
EU Commission Information SocietyEnergy efficient ICT: Toward ZeroPower Devices for a Greener Planet
![Page 40: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/40.jpg)
40 / 51
Source: Silicon Valley Toxics Coalition, 2007,Wall Street Journal, September 23, 2004
eWaste: where do they go?
The health burden of ewaste falls on the world’s poorest workers, who labor long hours without basic protections from toxic exposure
• US consumers replace roughly 133,000 PC/day ! • Only 20% recycled• Wall Street Journal: "the world's fastest growing and potentially most dangerous waste problem": plastic, lead, cadmium, chromium, mercury
![Page 41: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/41.jpg)
41 / 51source: http://www.greenpeace.org/international/en/campaigns/climatechange/coolit/Campaignanalysis/GuidetoGreenerElectronics/
![Page 42: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/42.jpg)
42 / 51
A Methodologyfor Introducing Computer Ethics
(Scuola di Dottorato, Politecnico di Torino, 2008)
![Page 43: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/43.jpg)
43 / 51
Case StudyGroup exercise and feedback
•Is there something that could be right / wrong with ICT?
•Organize the group in several teams for "role playing":– Developers (the techies)– Users– Policy Makers
•Discuss a simple real case– 3 main levels of discussion
• Brainstorming• Code of Ethics ("soft" laws)• Laws ("hard" laws)
– 4 main drivers• Architecture• Education• Market• Law
![Page 44: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/44.jpg)
44 / 51
1. SCENARIODescribe and Analyze a Real Case
2. STAKEHOLDERS' NETWORKIdentify Stakeholders and their Relationships
3. ETHICAL ISSUESIdentify Social and Ethical Issues
4. ALTERNATIVE SCENARIO(s)Envisage and Evaluate Alternative Courses of Action
1. SCENARIODescribe and Analyze a Real Case
2. STAKEHOLDERS' NETWORKIdentify Stakeholders and their Relationships
3. ETHICAL ISSUESIdentify Social and Ethical Issues
4. ALTERNATIVE SCENARIO(s)Envisage and Evaluate Alternative Courses of Action
Steps for Case Analysis
![Page 45: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/45.jpg)
45 / 51
Soci
al A
naly
sis
Soci
al A
naly
sis
Individuals
Communities
Organizations
Cultures
Institutions
Nations
Global
Levels of Social AnalysisLevels of Social Analysis
Source: "Computing Curricula 1991", Communications of the ACM, Volume 34 , Issue 6, June 1991
1.SCENARIODescribe and Analyze a Real Case (From the many areas of concern related to Computing)
Propose to studentsdifferent levels of
Social Analysis
![Page 46: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/46.jpg)
46 / 51
2. STAKEHOLDERS' NETWORK
Stakeholders
Relationships
2. STAKEHOLDERS' NETWORKIdentify Stakeholders and their Relationships (Development of Social & Ethical Skills)
![Page 47: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/47.jpg)
47 / 51
2. STAKEHOLDERS' NETWORK
Stakeholders
Relationships 3. ETHICAL ISSUES
3. ETHICAL ISSUESIdentify Social and Ethical Issues(Development of Social & Ethical Skills)
![Page 48: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/48.jpg)
48 / 51
• What is right? What is wrong?• Can we propose something different?• What is the role of Computer Professionals involved into the case?• Moratorium?• Precautionary Principle• Ethical Reviews (FP7)
• Recommendations for– Project Teams (Writing a proposal)– Universities (Next Generations of Engineers, Computer Professionals, Designers,...)– Organizations ("softlaws", Guidelines, Code of Ethics, etc.)– Public Authorities ("hardlaws", Requirements, Policy Makers, etc.)
4. ALTERNATIVE SCENARIO(s)Envisage and Evaluate Alternative Courses of ActionThe most challenging step
![Page 49: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/49.jpg)
49 / 51
"Technology is driving the future, the steering is up to us"
Computer Professionals for Social Responsibilitywww.cpsr.org
CPSR’s Mission:the Public Interest
in Information Technology
![Page 50: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/50.jpg)
50 / 51
Why Computer Ethics ?Levels of justification for the study of Computer Ethics
Level 1: "... will make us behave like responsible professionals"
Level 2: "... will teach us how to avoid computer abuse and catastrophes"
Level 3: "... the advance of computing technology will continue to create temporary policy vacuums"
Level 4: "... the use of computing permanently transforms certain ethical issues to the degree that their alterations require independent study"
Level 5: "... the use of computing technology creates, and will continue to create, novel ethical issues that require special study"
Level 6: "We should study computer ethics because the set of novel and transformed issues is large enough and coherent enough to
define a new field"Source: (adapted from) Walter Maner, "Unique Ethical Problems in Information Technology", ETHICOMP95, Leicester, UK.
![Page 51: Computer Ethics Helicopter Viewcomputerscience.unicam.it/devivo/riservata/inform... · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office](https://reader034.vdocument.in/reader034/viewer/2022043009/5f9e21b8f53076431645c5a6/html5/thumbnails/51.jpg)
51 / 51
Why Computer Ethics ? (why not typewriter ethics?)Level 5: Issues and problems unique to Information Technology (Would NOT have arisen WITHOUT computers; nosatisfactory noncomputer analog)
• Uniquely STORED20 Nov 1985, BoNY 32B$ due to an overflow (65535+1=65536 1 0000 0000 0000 0000 = 0!), 21 Nov BoNY 23.4B$ x 1 day. Total interest = 5M$. Y2K!
• Uniquely MALLEABLEGeneral Purpose Machine, Universally adaptable, Universal Access is a Must. Computers can do anything we can describe in terms of Input, Process, Output
• Uniquely COMPLEXProgramming = creation of discrete functions of arbitrary (superhuman) complexity. Total behavior cannot be described in any compact function. Testing?
• Uniquely FASTBuy / Sell commands by the same algorithms at the same time: destabilized market of futures (contract to buy a stock at a set time and price)
• Uniquely CHEAPCrazy scheme of "salami": 0,001€, 103€ x 105 accounts (cheap!)= 100€/day x 200days = 20.000€/year. Spamming: 1p/106x10Mp=10p/day x 10€ = 100€/day ...
• Uniquely CLONED•1st time in history: exact copy. No transfer of possession. (copy + remix!)
• Uniquely DISCRETEContinuous systems = tolerance (small changes, small effects); Discrete systems = no tolerance. Continuity does NOT hold for computers. 1 bit changes ...
• Uniquely CODEDDegradable nature of media. Obsolescence of I/O devices. Evolution of media formats (& encryption?!). No documentation: computers accelerate the tx of information BUT also reverse effect: computers will impede the generational flow of information: will any stored records be readable in the future? Data archeologists?
• Uniquely INTERNETWORKEDDawn of cyberspace!
Source: (adapted from) Walter Maner, "Unique Ethical Problems in Information Technology", ETHICOMP95, Leicester, UK.