ICT 095 - Unit 1 - Cont (Week 2) - S version.pdf
Document Details
Uploaded by SuitableSard204
432 Radiation Protection and Radiobiology
2023
Tags
Full Transcript
ICT095: Information Technology Basics Fall 2023/2024 Week 2 Reference: Technology In Action, 17th edition, published by Pearson © 2022 Unit 1: Introduction to IT - Cont. • • Ethical considerations and responsibilities in IT ❑ Ethics ❑ Ethical Challenges in IT Societal impact of Information Tech...
ICT095: Information Technology Basics Fall 2023/2024 Week 2 Reference: Technology In Action, 17th edition, published by Pearson © 2022 Unit 1: Introduction to IT - Cont. • • Ethical considerations and responsibilities in IT ❑ Ethics ❑ Ethical Challenges in IT Societal impact of Information Technology 2 Ethical Considerations and Responsibilities in IT Ethical Computing Technology has brought a new set of ethical challenges. • Technology often moves faster than rules can be formulated to govern it. • How technology is used is often left up to the individual and the guidance of their personal ethics. • Ethical considerations are complex, and reasonable people can have different, yet valid, views. 3 Ethics (What?) The study of the general nature of morals and of the specific moral choices individuals make. • Ethics provide a general set of unwritten guidelines for people to follow. • Morals involve conforming to established or accepted ideas of right and wrong. ▪ Usually viewed as being black or white • Unethical behaviour is not conforming to a set of approved standards of behaviour. Example of an unethical behaviour: Cheating on an exam. There is no universal agreement on which system of ethics is the best. Ethics. (2021, August 16). https://www.computerhope.com/jargon/e/ethics.htm 4 Exercise True or false • Ethics can be defined as the rules of conduct presented in a religion (FALSE) • Ethics can be defined as the study of the general nature of morals and of the specific moral choices individuals make (TRUE) • Ethics are defined as accepted ideas of right and wrong (FALSE) 5 Ethical Challenges in IT 1. Intellectual Property (What?) Work that is the result of someone’s creativity and knowledge that is protected by copyright law and documented by copyrights, patents, and trademarks. (Why?) With increased use of electronic media, challenges to enforcing copyright laws have increased. • Businesses and individuals that use such illegal software potentially gain an advantage in the international marketplace (Piracy). • Piracy challenges have also placed significant pressures on existing business models for creative arts industries such as film and music. Jotwani, D. (2019, May 9). Why Intellectual Property protection is crucial for startups. YourStory.com. https://yourstory.com/2019/05/intellectual -property-protection-crucial-startups 6 Ethical Challenges in IT 2. Privacy • Intelligent personal agents are constantly listening to their users and combing through your data to help determine your needs. • Social media sites: User’s privacy settings will allow these sites to have information they are not legally allowed to have. • Facebook and Twitter generate information about you based on your behaviour on their sites. 7 Ethical Challenges in IT 3. Social Justice (Example 1) Predictive policing • Gathering data from different sources, analysing it, and then using the results to prevent future crime. (Example 2) Military and government secrets • With Web 2.0 tools, everyone can now create and publish content on the Internet. • WikiLeaks (wikileaks.org) makes private and secret documents available for viewing on its site. 8 Ethical Challenges in IT 4. Liability • Traditional manufacturing makes it relatively easy to enforce safety laws. (Example ) A person uses 3D scanner to scan an existing object. Then, the person uses design software to create their own plan for how to print the object. ▪ If the object is patented, this would be a violation of the law. • Products are subjected to safety testing prior to being sold to the public and must conform to legal safety guidelines. 9 Ethical Challenges in IT Liability Challenge Scenario: Consider the ethics of printing a helmet from a file you downloaded from a public website. You give it to a friend as a gift. While riding his/her bicycle, your friend is injured because the design of the helmet was flawed and the materials you used to make it were substandard. Who is responsible for the injuries? You? The manufacturer of the printer? The owner of the printer? The manufacturer of the raw materials used to make the helmet? The creator of the flawed design plans? The person who decided to use an untested product (i.e., your friend)? What if the design you used was created from a patented product? 10 Ethical Challenges in IT 5. Censorship Various countries have different answers to the question of what information their people should be allowed to see. India: Ranked as first country whose government most often cuts off access to the Internet for its citizens. ▪ The government has argued at times that it is needed to stop cheating on exams or because there is political upheaval China: Chinese government has demanded search engine providers like Google self-censor their search engines, restricting access to foreign websites that express different views than the Chinese government and limiting information on sensitive topic. 11 Ethical Challenges in IT 6. Social Activism (Example) Hacktivism • Using computers and computer networks in a subversive (troublemaking) way to promote an agenda. • Using computer hacking to affect some sort of social change. • Computer security has grown more sophisticated. ▪ Nowadays, attacks are usually carried out by groups of hackers or computer scientists funded by nation states. Hacktivism Special Lineal icon. (n.d.). Freepik. https://www.freepik.com/icon/hacktivism_3292602 12 Ethical Challenges in IT 6. Social Activism (Cont. ) Forms of Hacktivism • Denial-of-service attack ▪ Websites are bombarded with requests for information until they are overwhelmed, and legitimate users can’t access the site • Cyberterrorism ▪ Objective: To embarrass or harass a company by penetrating its computer networks and stealing (and often publishing) sensitive information. 13 Ethical Challenges in IT 7. Automated Robotic Machinery Automobiles now contain sophisticated AI systems to exercise control over the vehicle and respond faster than humans can. (Example) self-driving cars by Google Who controls the ethical constraints by which automated robotic machinery like this operates? • Consider a selection between a set of bad choices: You suddenly find that you have to brake, knowing you will still hit the school bus ahead of you, swerve into oncoming traffic, or swerve to the other side into a tree. Which choice would you make? Which choice would you want your automated car to make? Hoffman, S. (n.d.). Google Car Archives — Law Office of Stephen L. Hoffman LLC. Law Office of Stephen L. Hoffman LLC. https://www.hofflawyer.com/tag/google-car/ 14 Societal Impact of Information Technology 1. Technology connects us with others A. Collaborating for the Benefit of Others Web 2.0: Allows users to contribute content and connect with one another easily. • Web 2.0 has fostered a dramatic shift for technology users across the world, from simply consuming to having the ability to volunteer and collaborate on projects. Cognitive surplus: Combination of leisure time and the tools to be creative. Kadlaskar, A. (2022, September 29). Let’s Discuss the Web 2.0 and Web 3.0. Analytics Vidhya. https://www.analyticsvidhya.com/blog/2022/09/lets -discuss-the-web-2-0-and-web-3-0/ 15 Societal Impact of information technology 1. Technology connects us with others (Cont.) B. Connecting Through Business Crowdfunding: Asking for small donation from a large number of people, often using the internet (Starting business via social media). (Example) • Someone with an idea can build a first attempt at an area makerspace. • Then, by posting a launch video on a site that person can reach people who believe in the idea. • Donors agree to put money forward, knowing the product may not come to fruition, in exchange for special rewards such as a discounts. Scanlon, H. (2016, November 28). CEOs See More Value In Technology Than People. Hunt Scanlon Media. https://huntscanlon.com/ceos -see-value-technology-people/ 16 Technology on Connecting and Collaborating 2. Technology impacts how we consume A. Marketing • There are billions of views of videos each month on YouTube, and marketers are taking note. Influencers: Social media personalities with huge followings and high levels of interaction with their followers. Crowdsourcing: Obtaining information for a project from the opinion of many different people. 17 Technology on Connecting and Collaborating 2. Technology impacts how we consume (Cont. ) B. Sharing Economy Items like cars and bikes can now be subscriptions instead of purchases. Collaborative consumption: Implies that we are joining together as a group to use a specific product more efficiently. 18 Thank You 19