Computer Ethics: a Slow Fade from Black and White to Shades of Gray
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Motivations Behind Software Piracy: from the Viewpoint of Computer Ethics Theories
Motivations behind Software Piracy: From the viewpoint of Computer Ethics Theories University of Oulu Department of Information Processing Science Master’s Thesis Bethelhem Tadele Oulu 2013 Abstract Computer Ethics is a study of ethical issues that are related mainly with computing machines and computing profession. The features of internet that, it is global and interactive, it allows users to stay anonymous, and it enables reproducibility of information possible unlike before makes the online behavior morally different. Computer ethics studies the nature and social influence of computing machines and ethical issues in formulating and justification of policies. Software Piracy, which is the unauthorized use or copying of software illegally, has become a major problem for businesses and it is widespread in many parts of the world which led to drain of economy. As the access to use computer grows, the percentage for using pirated software also grows. The Business Software Alliance (BSA) and the Software Publishers Association (SPA) made estimation (2010) that there are two-ten illegal copies of software are available for every legal copy of software sold. Software piracy is one of the most remarkable among computer ethics’ breaches. Unlike other activities like hacking and security breaches, which are outright illegal, software piracy technically covers a gray area of ethical principles, as they relate to computers and information technology. This is because people might inadvertently commit the act without realizing that they are ethically/morally/legally wrong. When one buys software, it means that they actually are buying the software license but not the software. This is similar to artistic copyrights, where a composer/artist holds the license to his work and gains monetary compensation on a licensing basis. -
Cloak and Swagger: Understanding Data Sensitivity Through the Lens of User Anonymity
Cloak and Swagger: Understanding Data Sensitivity Through the Lens of User Anonymity Sai Teja Peddinti∗, Aleksandra Korolova†, Elie Bursztein†, and Geetanjali Sampemane† ∗Polytechnic School of Engineering, New York University, Brooklyn, NY 11201 Email: [email protected] †Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043 Email: korolova, elieb, [email protected] Abstract—Most of what we understand about data sensitivity In this work we explore whether it is possible to perform is through user self-report (e.g., surveys); this paper is the first to a large-scale behavioral data analysis, rather than to rely on use behavioral data to determine content sensitivity, via the clues surveys and self-report, in order to understand what topics that users give as to what information they consider private or sensitive through their use of privacy enhancing product features. users consider sensitive. Our goal is to help online service We perform a large-scale analysis of user anonymity choices providers design policies and develop product features that during their activity on Quora, a popular question-and-answer promote user engagement and safer sharing and increase users’ site. We identify categories of questions for which users are more trust in online services’ privacy practices. likely to exercise anonymity and explore several machine learning Concretely, we perform analysis and data mining of the approaches towards predicting whether a particular answer will be written anonymously. Our findings validate the viability of usage of privacy features on one of the largest question-and- the proposed approach towards an automatic assessment of data answer sites, Quora [7], in order to identify topics potentially sensitivity, show that data sensitivity is a nuanced measure that considered sensitive by its users. -
Cloud Computing and Related Laws
Cloud Computing and Related Laws Law Offices of Salar Atrizadeh Online Privacy In general, privacy falls under two categories: 1. Corporate privacy 2. Personal privacy Corporate Privacy . It concerns the protection of corporate data from retrieval or interception by unauthorized parties . Security is important for protection of trade secrets, proprietary information, and privileged communications . The failure to maintain confidentiality can result in a loss of “trade secret” status . See Civil Code §§ 3426 et seq. Corporate Privacy . The recent trends in outsourcing have increased the risks associated with “economic espionage” . In fact, manufacturers should be cautious when transferring proprietary technology to overseas partners because foreign governments sponsor theft . See 18 U.S.C. §§ 1831 et seq. (e.g., economic espionage, theft of trade secrets) Helpful Policies . Identify and label confidential information . Restrict access to confidential information . Use encryption – e.g., truecrypt.org, axantum.com . Use firewall and secure username/password . Use software that detects trade secret theft – e.g., safe-corp.biz . Include warnings in privileged correspondence (e.g., “this email contains privileged communications”) Helpful Policies . Provide computers without hard drives + Prohibit use of removable storage (e.g., flash drives) . Audit employee computers . Prohibit and/or monitor external web-based email services . Execute Confidentiality and Non-disclosure Agreements . Execute Computer-Use Policies Personal Privacy . Constitution . Federal: Fourth Amendment protects against unreasonable searches and seizures . State: California Constitution, under Art. I, § 1 recognizes right to individual privacy . Federal computer crimes . Electronic Communications Privacy Act – 18 U.S.C. §§ 2510 et seq. Privacy Act – 5 U.S.C. § 552a . Computer Fraud and Abuse Act – 18 U.S.C. -
Spring 2017 Course Schedule
SPRING 2017 PHI 1306 Introduction to Logic .01 Sandwisch MWF 9:05-9:55 MORRSN 105 .02 Cartagena MWF 10:10-11:00 MORRSN 105 .03 Guido MWF 11:15-12:05 MORRSN 105 .04 Cartagena MWF 1:25-2:15 MORRSN 105 .05 Brandt MWF 2:30-3:20 MORRSN 106 .06 Thornton TR 9:30-10:45 MORRSN 110 .07 Younger TR 11:00-12:15 MORRSN 108 .08 Thornton2 TR 12:30-1:45 MORRSN 110 .09 L. Rettler TR 2:00-3:15 MORRSN 110 .H1 Buras MWF 11:15-12:05 MORRSN 110 HNR PHI 1307 Critical Thinking .01 Marcum TR 11:00-12:15 MORRSN 110 Logic and Medicine PHI 1308 Introductory Topics in Ethics .01 Tweedt TR 9:30-10:45 MORRSN 107 Contemporary Ethical Issues .02 Beary MWF 11:15-12:05 MORRSN 108 Seven Deadly Sins .03 Wilson TR 2:00-3:15 MORRSN 106 Love and Sex PHI 1309 Introduction to Medical Ethics .01 Colgrove MWF 9:05-9:55 MORRSN 106 PHI 1310 Computer Ethics .01 Younger TR 9:30-10:45 MORRSN 108 PHI 1321 Introductory Topics in Philosophy .01 Anderson TR 9:30-10:45 MORRSN 106 Doubt, Questioning, The Search for Truth .02 Dougherty TR 11:00-12:15 MORRSN 106 C. S. Lewis and Philosophy PHI 2301 Existentialism .01 Sneed MWF 12:20-1:10 MORRSN 108 PHI 3301 Moral Philosophy .01 Beaty MWF 10:10-11:00 MORRSN 108 PHI 3310 History of Philosophy - Classical .01 Schultz 11/1/2016 SPRING 2017 TR 3:30-4:45 MORRSN 106 PHI 3312 History of Philosophy: Modern European .01 Evans TR 9:30-10:45 MORRSN 105 PHI 3320 Phil. -
Statement on Internet Search Engines by the Spanish Data
Statement on Internet Search Engines Spanish Data Protection Agency 1st December 2007 1. The importance of search engines in information society Technology developments have opened up new possibilities of creating and accessing information on the Internet, and this situation requires that we consider the repercussions of technology on the rights of individuals—in principle, such repercussions are neutral. The Spanish Data Protection Agency (AEPD) has taken the initiative of analysing the privacy policies of the largest global companies providing search engine services on the Internet. To this end it collected information from Google, Microsoft and Yahoo!, said information being completed via meetings with the global privacy controllers of these corporations in Europe and the United States. We must underscore the huge importance, owing to the volume of data that is processed and the characteristics of that processing, of search engine services on the Internet (hereinafter, search engines), the main function of which is to provide lists of results relating to a search, such as addresses and files stored on web serves, by entering key words, thus arranging all of the information available on the Internet and making it more accessible. In addition, search engines usually provide customised services, allowing people to register by giving an email address and a password.1 In Spain, the fact that these are sensitive issues was shown by the recent appearance of the Director of the AEPD before the Constitutional Commission of the Congress on 28th -
Computer Ethics: Basic Concepts and Historical Overview
Computer Ethics: Basic Concepts and Historical Overview http://plato.stanford.edu/archives/win2001/entries/ethics-computer/ This is a file in the archives of the Stanford Encyclopedia of Philosophy . Stanford Encyclopedia of Philosophy A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z Computer Ethics: Basic Concepts and Historical Overview Computer ethics is a new branch of ethics that is growing and changing rapidly as computer technology also grows and develops. The term "computer ethics" is open to interpretations both broad and narrow. On the one hand, for example, computer ethics might be understood very narrowly as the efforts of professional philosophers to apply traditional ethical theories like utilitarianism, Kantianism, or virtue ethics to issues regarding the use of computer technology. On the other hand, it is possible to construe computer ethics in a very broad way to include, as well, standards of professional practice, codes of conduct, aspects of computer law, public policy, corporate ethics--even certain topics in the sociology and psychology of computing. In the industrialized nations of the world, the "information revolution" already has significantly altered many aspects of life -- in banking and commerce, work and employment, medical care, national defense, transportation and entertainment. Consequently, information technology has begun to affect (in both good and bad ways) community life, family life, human relationships, education, freedom, democracy, and so on (to name a few examples). Computer ethics in the broadest sense can be understood as that branch of applied ethics which studies and analyzes such social and ethical impacts of information technology. -
Privacy Seminar 2
14-2-2014 Dan Perjovschi Privacy Seminar 2. Privacy: an overview Jaap-Henk Hoepman Digital Security (DS) Radboud University Nijmegen, the Netherlands @xotoxot // [email protected] // www.cs.ru.nl/~jhh Dan Perjovschi, 2007 Jaap-Henk Hoepman // Radboud University Nijmegen // 14-2-2014 // Privacy: an overview 2 Privacy Dimensions the right to be let alone relational privacy informational privacy / what is privacy self determination according to you? corporeal privacy locational/spatial privacy privacy spheres Jaap-Henk Hoepman // Radboud University Nijmegen // 14-2-2014 // Privacy: an overview 3 Jaap-Henk Hoepman // Radboud University Nijmegen // 14-2-2014 // Privacy: an overview 4 Don’t confuse these concepts! 7 types of privacy privacy of ● the person, security privacy ● behaviour and action, ● personal communication, ● data and image, ● thoughts and feelings, ● location and space, and data protection ● association (including group privacy). Finn, R.L., Wright, D., and Friedewald, M.: Seven types of privacy. CPDP 2012 Clarke, R.: Introduction to Dataveillance and Information Privacy, and Definitions of Terms, 1997 Jaap-Henk Hoepman // Radboud University Nijmegen // 14-2-2014 // Privacy: an overview 5 Jaap-Henk Hoepman // Radboud University Nijmegen // 14-2-2014 // Privacy: an overview 6 1 14-2-2014 Different definitons Contextual integrity The right to be let alone ● [Warren & Brandeis, 1890] Informational self-determination: The right to determine for yourself when, how and to what extend information about you is communicated to others -
Computer Ethics: Job of Computer Scientist
International Journals of Advanced Research in Research Article June Computer Science and Software Engineering 2017 ISSN: 2277-128X (Volume-7, Issue-6) Computer Ethics: Job of Computer Scientist Juneed Iqbal Bilal Maqbool Beigh Department of Computer science Department of Computer Science Mewar University cluster university of Kashmir Srinagar, India Srinagar, India DOI: 10.23956/ijarcsse/V7I6/0135 Abstract: This paper reiterates the fact that computer ethics is a job of computer scientist and not philosophers. This paper is divided into three sections. First section provides with a brief explanation and discussion on the weaknesses and shortcomings of classical ethical theories like Divine command theories, Ethical Egoism, Kantianism, Utilitarianism, Social Contract Theory and Virtue Ethics, which makes them unfit for the application of computer ethics. Second section discusses the ambiguity in theories proposed for foundation of computer ethics. Third section deals with professional ethics and discusses that Computer ethics is a domain of computer scientist. This article gives a clear picture of shortcoming of traditional ethical theories and need of new theory to deal with computer ethics. This article points out flaws in theories trying to give foundation for computer ethics. We suggest professional ethics as practical and preventive measure for computer ethics that caters to its requirements. We also explores the role of computer scientist for the application of computer ethics as a profession. Keywords: Computer ethics; computer scientist; professional ethics; foundational ambiguity; code of ethics. I. INTRODUCTION Modern day societies are driven by computing technologies and are critically dependent on it. Every aspect of society like health, finance, defense, education, transportation and an unending list of other systems which drive our society are dealing with computing technology and artefacts. -
Ethics Assessment in Different Fields Information Technologies
Ethics Assessment in Different Fields Information Technologies Johnny Hartz Søraker University of Twente Philip Brey University of Twente June 2015 Annex 2.b.1 Ethical Assessment of Research and Innovation: A Comparative Analysis of Practices and Institutions in the EU and selected other countries Deliverable 1.1 This deliverable and the work described in it is part of the project Stakeholders Acting Together on the Ethical Impact Assessment of Research and Innovation - SATORI - which received funding from the European Commission’s Seventh Framework Programme (FP7/2007-2013) under grant agreement n° 612231 Information Technology report Contents 1 Basic description of the field ............................................................................................. 3 2 Values and Principles ........................................................................................................ 3 3 Ethical issues ...................................................................................................................... 5 3.1 Privacy ............................................................................................................................ 5 3.2 Security and crime .......................................................................................................... 6 3.3 Free expression and content control ............................................................................... 6 3.4 Equity and access ........................................................................................................... -
Thesis.Pdf (2.311Mb)
Faculty of Humanities, Social Sciences and Education c Google or privacy, the inevitable trade-off Haydar Jasem Mohammad Master’s thesis in Media and documentation science … September 2019 Table of Contents 1 Introduction ........................................................................................................................ 1 1.1 The problem ............................................................................................................... 1 1.2 Research questions ..................................................................................................... 1 1.3 Keywords ................................................................................................................... 2 2 Theoretical background ...................................................................................................... 3 2.1 Google in brief ........................................................................................................... 3 2.2 Google through the lens of exploitation theory .......................................................... 4 2.2.1 Exploitation ................................................................................................ 4 2.2.2 The commodification Google’s prosumers ................................................ 5 2.2.3 Google’s surveillance economy ................................................................. 7 2.2.4 Behaviour prediction .................................................................................. 8 2.2.5 Google’s ‘playbor’ -
Thinging Ethics for Software Engineers
(IJCSIS) International Journal of Computer Science and Information Security, Vol. 16, No. 9, September 2018 Thinging Ethics for Software Engineers Sabah S. Al-Fedaghi Computer Engineering Department Kuwait University City, Kuwait [email protected] Abstract—Ethical systems are usually described as principles for The field of computer ethics is changing rapidly as distinguishing right from wrong and forming beliefs about concerns over the impact of information and communication proper conduct. Ethical topics are complex, with excessively technology on society mount. New problems of ethics emerge verbose accounts of mental models and intensely ingrained one after another, and old problems show themselves in new philosophical assumptions. From practical experience, in forms. Ethics is often tied to legal procedures and policies that, teaching ethics for software engineering students, an explanation if breached, can put an organization in the midst of trouble [6]. of ethics alone often cannot provide insights of behavior and In this context, we adopt the classical engineering method thought for students. Additionally, it seems that there has been of explaining a phenomenon through modeling. For example, no exploration into the development of a conceptual presentation in developing system requirements, a model-based approach is of ethics that appeals to computer engineers. This is particularly used to depict a system graphically at various levels of clear in the area of software engineering, which focuses on software and associated tools such as algorithms, diagramming, granularity and complexity. The resultant unified, conceptual documentation, modeling and design as applied to various types model facilitates communication among different stakeholders of data and conceptual artifacts. -
What Is Computer Ethics?
CEAC01 28/5/03 11:13 Page 15 PART I What is Computer Ethics? It is not enough that you should understand about applied science in order that your work may increase man’s blessings. Concern for man himself and his fate must always form the chief interest of all technical endeavors. Albert Einstein CEAC01 28/5/03 11:13 Page 16 CEAC01 28/5/03 11:13 Page 17 Editors’ Introduction In the 1940s and early 1950s, the field of study that is now called “computer ethics” was given a solid foundation by Professor Norbert Wiener of MIT. Unhappily, Professor Wiener’s works in computer ethics were essentially ignored for decades by other thinkers. In the 1970s and 1980s computer ethics was recreated and redefined by thinkers who did not realize that Wiener had already done so much work in the field. Today, more than 50 years after Wiener created computer ethics, some thinkers are still attempt- ing to define the nature and boundaries of the subject. Let us briefly consider five different definitions that have been developed since the 1970s. Maner’s Definition The name “computer ethics” was not commonly used until the mid-1970s when Walter Maner began to use it. He defined this field of study as one that examines “ethical problems aggravated, transformed or created by computer technology.” Some old ethical problems, he said, were made worse by computers, while others came into existence because of computer technology. He suggested that we should use traditional ethical theories of philosophers, such as the utilitarian ethics of the English philosophers Jeremy Bentham and John Stuart Mill, or the rationalist ethics of the German philosopher Immanuel Kant.