DOC PREVIEW
UI CS 270 - Computer and Information Ethics

This preview shows page 1-2-3-4-24-25-26-50-51-52-53 out of 53 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

© Axel Krings, 2010Axel KringsComputer Science DepartmentUniversity of [email protected] cannot talk about the Internetwithout addressing:Computer and Information Ethics1© Axel Krings, 2010This sequence is mainly based on:Bynum, Terrell, "Computer and Information Ethics", The Stanford Encyclopedia of Philosophy (Winter 2008 Edition), Edward N. Zalta (ed.), URL = <http://plato.stanford.edu/archives/win2008/entries/ethics-computer/>To avoid visual clutter in the presentation specific references are only included when citations besides Terrell Bynum are used.Computer and Information Ethics2© Axel Krings, 2010Mid 1940s: New branch of ethics: Computer Ethics or Information Ethics At the center: Norbert Wiener, professor of mathematics and engineering at MITWiener was a pioneer in the study of stochastic and noise processes, contributing work relevant to electronic engineering, electronic communication, and control systems.Historical Milestone3source: wikipedia© Axel Krings, 2010Wiener equationIn the mathematical field of probability the Wiener sausage is a neighborhood of the trace of a Brownian motion up to a time t, given by taking all points within a fixed distance of Brownian motionBrownian motion is a seemingly random movement of particles (mathematical model do describe such random movement)Historical Milestone4source: wikipedia© Axel Krings, 2010New branch of applied science Wiener called cyberneticsbook: Cybernetics (1948)describes new branch of applied science and identifies social and ethical implications of computersinterdisciplinary study of structure of regulatory systemsbook: The Human Use of Human Beings (1950)explores ethical issues computers & information technology would likely generateFoundation of C&I Ethics5© Axel Krings, 2010Computers at that timeCybernetics (1948), The Human Use of Human Beings (1950)ENIAC 1946Foundation of C&I Ethics6© Axel Krings, 2010Wiener foresaw enormous social and ethical implications of cybernetics combined with electronic computersWiener’s predictions:after war world would undergo a second industrial revolutionautomatic age with enormous potential for good and evilstaggering number of new ethical challenges & opportunitieseffects on information technology on key human values life, health, happiness, abilities, knowledge, freedom, security, and opportunitiesFoundation of C&I Ethics7© Axel Krings, 2010Term: Computer Ethics (1976 Walter Maner)ethical questions in his field (medical ethics) got more complicated when computers go involvedstudies ethical problems “aggravated, transformed or created by computer technology”computer ethics “starter kit” monogram published in 1980contained curriculum materials and pedagogical advice for university teachersdiscussions of topics like privacy and confidentiality, computer crime, computer decisions, technological dependence and professional codes of ethicsComputer Ethics8© Axel Krings, 2010The “uniqueness debate”are these really wholly new ethical problems?Maner’s view and Debora Johnson’s uniqueness challengeComputer Ethics9© Axel Krings, 2010Computer Ethics textbook, by Johnson, 1985On page 1, she noted that computers “pose new versions of standard moral problems and moral dilemmas, exacerbating the old problems, and forcing us to apply ordinary moral norms in uncharted realms.”later versions of Johnson’s book included: hackingcomputer technology for persons with disabilitiesimpact of Internet on democracyComputer Ethics10© Axel Krings, 2010Maner - Johnson topic examplesShould ownership of software be protected by law?Do huge databases of personal information threaten privacy?”Computer Ethics11© Axel Krings, 2010“What is Computer Ethics”, classic paper by Moor, 1985broader and more ambitions than definitions by Maner or Johnsonwent beyond descriptions and examples of computer ethics problemsoffered explanation of why computing technology raises so many ethical questions compared to other kinds of technologyComputer Ethics12© Axel Krings, 2010“What is Computer Ethics”, Moor, 1985The computer is the nearest thing we have to a universal tool. Indeed, the limits of computers are largely the limits of our own creativity. (Moor, 1985, 269)with computers people can do many things that could not be done beforequestion is whether one ought to do them?implies the likely lack of laws, standards of good practices, specific ethical rolesMoor’s term for this: policy vacuumComputer Ethics13© Axel Krings, 2010Beyond “What is Computer Ethics”, Moor, 1985notion of core human values: some human values — such as life, health, happiness, security, resources, opportunities, and knowledge — are so important to the continued survival of any community that essentially all communities do value them. Moor, 1990.core values used to examine privacy and security (Moor,1999)Computer Ethics14© Axel Krings, 2010Moor’s problem-solving method1. Identify a policy vacuum generated by computing technology.2. Eliminate any conceptual muddles.3. Use the core values and the ethical resources of just consequentialism to revise existing — but inadequate — policies, or else to create new policies that justly eliminate the vacuum and resolve the original ethical issue.Computer Ethics15© Axel Krings, 2010Computing and Human Valuescommon thread: concern for protecting and advancing central human values, e.g.life, health, security, happiness, freedom, knowledge, resources, power and opportunity. “Value-sensitive Computer Design” introduced in late 90savoid potential computer ethics problems by anticipating possible harm to human values and designing new technology from the very beginning in ways that prevent such harmnote: this is done while new technology is under developmentComputer Ethics16© Axel Krings, 2010Author (Terrell Bynum) expands on:Professional Ethics and Computer EthicsUniqueness and Global Information EthicsInformation EthicsExponential GrowthComputer Ethics17© Axel Krings, 2010Best way to understand the nature of the field is though representative examplesTopics in Computer Ethics18© Axel Krings, 2010Where the rubber hits the roadComputers in the Workplace19© Axel Krings, 2010Computers are a universal toolreplace humans => threat to jobsincentives to replace humans with computersperform task faster, more accurate, does not make mistakes...no sleep, does not get tired, does not get sick, no vacationComputers in the Workplace20©


View Full Document

UI CS 270 - Computer and Information Ethics

Download Computer and Information Ethics
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Computer and Information Ethics and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Computer and Information Ethics 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?