MASON CDS 130 - Computing for Scientists

Unformatted text preview:

Slide 1Where We Are?Impact of Computing TechnologyComputing EthicsSlide 5Slide 6Slide 7Ethic IssuesCase StudySlide 10The Ten Commandments For Computer EthicsThe EndCDS 130 - 003Fall, 2010Computing for ScientistsEthics(Nov. 30, 2010)Jie ZhangCopyright ©Where We Are?1. Introduction2. Computer Fundamentals3. Measurements4. Scientific Simulation –Project 15. Visualization6. Data Analysis7. Ethics8. Communication9. Project 2 due and in-class presentation (Dec. 7)Impact of Computing Technologyhttp://www.neiu.edu/~ncaftori/ethics-course.htmComputing EthicsEthics: also known as moral philosophy, is a branch of philosophy that addresses questions about morality – that is, concepts such as goof and evil, right and wrong, etc.-----http://en.wikipedia.org/wiki/EthicsComputer Ethics is a branch of philosophy which deals with how computing professionals should make decisions regarding professional and social conduct-----http://en.wikipedia.org/wiki/EthicsComputing Ethics•Issues are new, and yet new issues are emerging•~ 60 years of computer•~ 30 years of internet•12 years of Google.com•6 years of Facebook.com•6 months of Ipad•It means that there is no standard solution yet.Impact of Computing TechnologyComputing Ethics•Computing ethics are different from other professional ethics.•Internet is promoting information sharing•Internet is global•Internet is interactive•Internet is anonymous•Internet is fast and reproductive.Ethic Issues1. Storage of personal information, e.g, in social networking websites such as Facebook2. Software piracy3. File sharing: share music, movies using programs such as Napster, Kazaa, BitTorrent4. Monitoring of employee5. Computer security: virus, worms, Trojan horses, cookies.Case Study Similar Programs from Two StudentsIn a computer class, students are asked to do an independent project involving a sizable programming in JAVA. The teacher noticed remarkable similarity among the programs turned in by student A and B. The algorithms are identical. The orderings of the lines of the source code are identical. There are only a few changes on the names of the variables. The teacher determined that one of the students must have copied the code from the other student. Question: (1) What is wrong? Why?(2) How should the teacher respond to the issue? Why?(3) When the teacher informed the two students about the “copying”, how should the students respond to it? Why?Case Study Copying music/movie from internetThere are websites providing free music and movies. Many people download them and share with friends, especially among young peopleQuestion: (1) What is wrong with the web host? Why? And why do they do this? (2) What is wrong with the users? Why? (3) What penalty should be given? By who?(4) Legal issue versus ethical issue?The Ten Commandments For Computer Ethics1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not use or copy software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization. 8. Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you write. 10. Thou shalt use a computer in ways that show consideration and respect. By the Computer Ethics Institute http://www.brookings.edu/ITS/CEI/CEI_HP.HTMThe


View Full Document

MASON CDS 130 - Computing for Scientists

Download Computing for Scientists
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Computing for Scientists and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Computing for Scientists 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?