ics 5 computer ethics reviewer

Upload: sean-patrick-altea

Post on 04-Jun-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 ICS 5 Computer Ethics Reviewer

    1/10

    ICS 5 Computer Ethics

    Chapter 1

    Ethics in a Computing Culture

    No harm, no foul: principle that states it is wrong to punish someone for a simple mistake whenno actual harm has been done.

    Ethics: a set of morally permissible standards for a group Morality: the set of standards everyone wants everyone else to follow Standards of morality are similar to standards of language: Rules regarding human

    behavior are complex and have many exceptions.

    Moral Theory

    The basic equation for defining morality: How do I know that X is good? Why is X good?

    An action might be unethical, yet remain morally permissible.

    Religious ethics: doing the right thing usually is achieved by obeying the dictates of onesreligion

    Divine Command Theory: God, and only God, decrees what is right and what is wrong Can a person who is not religious act morally?

    Cultural Relativism: there is no valid, rational criterion for determining if the right thing to doexists

    members of one culture should not judge or be judged by a different culture Virtue Theory: concerns the nature of virtue and what it means to have virtue Ideal Man: one who possesses the characteristics of a good person (virtues), including courage,

    friendliness, and modesty

    represent s the half-way point between risk and generosity Righteous Indignation:the anger we feel at someones undeserved good or bad fortune

    Dolores deserves to get the ticket because she broke the law, and her behaviorendangered others

    Virtue Ethics: agent-centered as opposed to action-centeredUtilitarianism & Consequentialism

  • 8/13/2019 ICS 5 Computer Ethics Reviewer

    2/10

    Consequentialism: the consequence of an action, not the motivation behind the action, makesan action good or bad

    Utilitarianism:an action is good if it causes more happiness than a potential, alternativedecision

    Utilitarianism

    Act Utilitarianism: the concept of performing an action that maximizes happiness Rule Utilitarianism: the concept of adopting a set of rules, and only violating them in the case

    where compelling evidence indicates that utility is increased by such a violation

    Deontological Ethics

    Deontological ethics theoriesdiffer from consequentialist theories the intention behind the action is considered more important than the end result focuses on rights, duties, obligations, and rules assumes that the result will end badly if these rules are not met

    Contractarianism

    State of Nature:supports the idea that people are rational beings who seek to promote thecommon interests of society in order to promote their own self-interests

    Prisoners Dilemma: a scenario in which two people are offered a choicecooperate or defectEthics of Justice

    Impartiality: the quality that every person is treated equally and no one is given preferentialtreatment in the theory

    Rawlss Theory of Justice: explores the basic rules that are necessary to ensure fairness insociety as a whole

    argues that the principles of justice as fairness underlie all just societies According to Rawls Theory of Justice, in order for a society to be just:

    Everyone has as much freedom as possible. Everyone has an equal opportunity to reach desirable positions in society. All socio-economic differences are of the most benefit to the least advantaged.

    Difference Principle: social and economic inequalities are justified only if such inequalitiesprovide the greatest benefit to the least advantaged

    Explains why impartiality is not always desirable.Ethics of Caring

  • 8/13/2019 ICS 5 Computer Ethics Reviewer

    3/10

    Nel Noddings: morality boils down to a single virtue, which is caring for other individuals Ethics of Caring: defines goodness in terms of whether or not we take care of the people around

    us

    Noddings: the only inherent good is caring Kant: the only inherent good is good will Utilitarians: the only inherent good is happiness

    Because it is possible to care for everyone, impartialityis rejected. It is only necessary to care for those with whom one shares a relationship. There is no universal way to externally judge whether an action is morally right or

    wrong.

    The judgment varies on the relationship between the one-caring individual andthe person being cared for.

    Ethics of Reasoning

    Pure Reason: deductive reasoning on which Euclidean geometry is based; its purpose is toestablish the truth

    issues are straightforward Practical Reason: the reasoning used to make decisions issues are complex used to resolve ethical issues

    Deliberative Critical Discussion: a conversation in which the participants consider the partnersin the discussion are well-intended and informed; with this understanding, participants bring

    their knowledge to the discussion to share their own opinions and develop more refined

    perspectives.

    Avoid:

    - charged language

    - hyperbole

    - Ad hominem

    Chapter 2

    Ethics in a Computing Culture

    Technological Associations

    Association for Computing Machinery: The worlds first scientific and educational computingsociety

  • 8/13/2019 ICS 5 Computer Ethics Reviewer

    4/10

    Founded in 1947 Institute of Electrical and Electronics Engineers: a non-profit professional association dedicated

    to advancing technological innovation and excellence

    Why We Care about Professional Standards of Computing

    The privacy, safety, and well-being of the general public often depends on computer software Therac-25 radiation machine for breast cancer treatment Braking software in the 2010 Toyota Prius

    Defining Profession

    According to Michael Bayles, a professional: requires extensive training involves significant intellectual effort provides an important service to society often requires certification or licensing often has an organization of members often is autonomous in ones work

    No single definition of profession is accepted by everyone Does having a license turn you into a professional?

    In the US, you need a license to practice medicine or law.

    You also need a license to be an airline pilot, a plumber, or a liquor vendor. Unless you practice in Texas, you do not need a license to be a software engineer.

    Good Works Project

    Good Works Project: A research project conducted at Harvard Graduate School of Education toexamine how young people deal with ethical problems in their professions

    defines a professionas any career in which the worker is awarded a degree ofautonomy in return for services to the public that are performed at a high level

    Kultgens Attributes of Professions

    John Kultgen: professor at the University of Missouri, Columbia, who presents twenty attributescompiled by sociologist Geoffrey Millerson from twenty-one scholars of sociology as necessary

    for

    a vocation to be considered a profession

  • 8/13/2019 ICS 5 Computer Ethics Reviewer

    5/10

    A profession: involves a skill based on a theoretical foundation requires extensive education requires passing an exam is organized and represented by one or more professional organizations adheres to a code of conduct provides altruistic service requires members to assume responsibility for the affairs of others

    Core characteristics of a profession: is indispensable for the public good members are licensed so their work is sanctioned by the community Members are independent practitioners, serving individual clients Members do their best to serve their clients impartially without regard to any special

    relationship

    Members are compensated by fees of fixed charges Additional characteristics of a profession:

    Members are highly loyal to their colleagues

    Members regularly contribute to professional development

    Members prestige is based on guaranteed service Members use individual judgment in applying their profession The work is not manual Profits do not depend on capital Professional status is widely recognized

    A Moral Basis for Professions

    According to Michael Davis, a profession: is a number of individuals in the same occupation voluntarily organized to earn a living

    by openly serving a certain moral ideal in a morally permissible way beyond what law,

    market, and morality would otherwise require.

    According to Davis, a professional puts profession first

  • 8/13/2019 ICS 5 Computer Ethics Reviewer

    6/10

    Chapter 3

    Privacy

    Theories and Conceptions of Privacy

    right to be let alone:a conception of privacy that focuses on the grievance felt by the harmedparty and on actions that directly make them feel harassed, embarrassed, or exposed

    Soloves Taxonomy of Privacy Problems

    top-down:starting with a single clear definition, and then discovering that not all privacyproblems are covered by the definition

    bottom-up:starting with a list of the common kinds of privacy problems and building adefinition up

    PleaseRobMe: a Web site that allowed users to find houses where the owners were away fromhome

    Aggregated social networking status updates (such as Twitter, Foursquare, Flickr, andFacebook) and home address information

    The information PleaseRobMe gathered was already freely available on the InternetMulticultural Perspectives

    Libel:publishing or broadcasting false statements about another person, usually with the intentof harming the other persons reputation

    Interdisciplinary Topic: Panopticism

    Michel Foucault:Essay Panopticism, (1979) explores the influence of persistent surveillanceon society, comparing modern society to the modern prison

    Chapter 4

    Intellectual and Intangible Property

    Copyright

    Copyright: the main mechanism for protecting creative works such as art, music, and writing inthe US

    protects original works of authorship fixed in any tangible medium of expression inthe areas of literature, music, drama, pantomime, graphic art, sculpture, motion

    pictures, sound recordings, and architecture

    Does NOT protect ideas, facts, or common knowledge Does NOT protect creative works until they appear in a tangible fixed form

    Author: term used for all creators (including artists, choreographers, architects, etc.) in the US

  • 8/13/2019 ICS 5 Computer Ethics Reviewer

    7/10

    Authors works are automatically protected by copyright as soon as they take on atangible form

    Under U.S. law, the default length of a copyright is the lifetime of the author plus 70years after the authors death

    US copyright gives authors the right to: reproduce the copyrighted work prepare derivative works based upon the copyrighted work distribute copies of the copyrighted work to the public by sale or other transfer of

    ownership, or by rental, lease, or lending

    perform or display the copyrighted work publiclyFair Use

    According to US Code, the fair use of a copyrighted workfor purposes such as criticism,comment, news reporting, teaching (including multiple copies for classroom use), scholarship, orresearch, is not an infringement of copyright.

    Law specifies four factors that should be considered when a court or other arbitrator evaluatesif something is fair use:

    the purpose and character of the use, including whether such use is of a commercialnature or is for nonprofit educational purposes

    the nature of the copyrighted work the amount and substantiality of the portion used in relation to the copyrighted work as

    a whole

    the effect of the use upon the potential market for or value of the copyrighted workDoctrine of First Sale

    Doctrine of first sale: states authors are not entitled to a second royaltyEroding Fair Use and First Sale

    Digital rights management (DRM): a collection of technologies that work together to ensurethat copyrighted content can be only viewed by the person who purchased it

    Digital Millennium Copyright Act (DMCA): law passed by US Congress in 1998 to deal withmodern copyright issues

    Anticircumvention clause: No person shall circumvent a technological measure thateffectively controls access to a work protected under this title.

    Peer to Peer Sharing and Searching

  • 8/13/2019 ICS 5 Computer Ethics Reviewer

    8/10

    Contributory infringement: occurs when an infringement committed by another person wouldnot have happened without your help

    Vicarious infringement: involves an infringement that occurs in an area under your supervision,and when you should have been policing and preventing such acts

    Patent Law

    Invention: any new and useful process, machine, [article of] manufacture, or composition ofmatter, or any new and useful improvement thereof

    Distinct from an artistic or creative work Protected by patents

    United States Patent and Trademark Office (USPTO): verify inventions are patentable and meettwo criteria:

    Novelty: An invention is novel only if it has not previously been invented by someoneelse

    Nonobviousness: A solution to a problem that is obvious to another specialist in theappropriate area cannot be patented

    Trademark

    Trademark: a legally registered word, phrase, symbol, or other item that identifies a particularproduct, service, or corporation

    to register a trademark, you must already be using it to represent a product or service,and and your mark must not be easily confused with a competing products trademark

    trademark lasts ten years but can be renewed indefinitely Trade dress: involves the look and feel of a product or its packaging The Nintendo Wii has a recognizable design and trade dress. Immediately after its release, a

    variety of companies started releasing knock-off game systems that looked like the Wii and had

    a similar price.

    Virtual Goods

    Virtual goods: items that rely on some online system for their existence

    Must be rivalrous, nontangible, and not services

    Terms of service (TOS): a set of terms and conditoins you must agree to in order to join a virtualworld

    DeCSS: a program that removes the copy protection from DVDs Eric Corley: went to prison for trafficking in circumvention devices for sharing DeCSS

    through his Web site

  • 8/13/2019 ICS 5 Computer Ethics Reviewer

    9/10

    Internet activists came up with innovative ways to spread the DeCSS programwithout directly placing it on the Web, including selling the code on T-shirts,

    embedding it into paintings, or using it as the lyrics for a song

    One argument against Corleys conviction was that the DRM that DeCSS was designed tocounteract is too simple to count as a true DRM system

    Chapter 5

    Trust, Safety, and Reliability

    Causes of Computer Failure

    A computer might fail to meet expectations by: Hardware errors (malfunction) Software errors (bugs) Being programmed to solve the wrong problem (programmers fail to deliver clientexpectations) Misuse (a computer is provided erroneous data) Communication failure (human misunderstands a computer prompt) Malice (hackers)

    Bugs and Public Safety

    Safety-critical software: software that may affect someones safety if it fails to work properly Decision point: a place in computer code where the next instruction executed depends on input

    data

    Control programs: programs that control some sort of machinery Real time: a program must do something within a specific amount of time Multiprocess: programs that execute at the same time as one or more other programs Brookss Law: Adding people to a late project makes it later.

    Adding new people adds new lines of communication, which increase the chances ofmiscommunication or missed communication

    Case: Therac-25

    Therac-25: machine designed for cancer treatments radiation overdose occurred at the Kennestone Oncology Center in Marietta, Georgia in

    1985

    Less than 2 months later, a woman received a severe radiation burn to her hip from aTherac-25 machine

  • 8/13/2019 ICS 5 Computer Ethics Reviewer

    10/10

    Douglas Birsch: applied ethicist who argues that both the programmer who designedTheracs software and the companys quality assurance officer bear significant moral

    responsibility for the accidents

    Malware

    Malware: short for malicious software Hackers: people who write and deploy malware Worm:program that makes copies of itself and propagates those copies through a network to

    infect other computers

    Virus:similar to a worm, but resides in another program program that must execute in order forthe virus to propagate

    Spyware: program that is secretly installed for the purpose of collecting information about thecomputers user or users

    Trojan horse: software that masquerades as an innocent or useful program, but that is actuallydesigned for a malicious purpose

    Rootkit: program that embeds itself into a computers operating system and acquires specialprivileges that would normally be available to the operating system

    Stuxnet Worm

    Stuxnet: a computer worm that has significantly set back the Iranian nuclear developmentprogram

    extremely sophisticated software, speculated to have been created by the CIA and theIsraeli government

    Nuclear Shutdown System

    Darlington Nuclear Generating Station: the first Canadian nuclear station to use computers torun the emergency shutdown systems for its reactors

    written by nuclear engineers who knew how to program, that is, written by experts inthe domain of the application for which the program was intended