Topic 1 Introduction PDF
Document Details
Uploaded by Deleted User
Tags
Summary
This document provides an introduction to computer ethics, highlighting historical developments in computing, cell phone technology, and social media. It covers key concepts, such as the pace of change, social networking, and e-commerce, while touching on topics like privacy, collaboration, and artificial intelligence
Full Transcript
TOPIC 1: INTRODUCTION ✿ E-commerce ↬ Amazon.com started in 1994 selling books on the Web. It has grown to...
TOPIC 1: INTRODUCTION ✿ E-commerce ↬ Amazon.com started in 1994 selling books on the Web. It has grown to be one of the most popular, reliable, and user-friendly commercial sites. Historical Overview of Computer Ethics ↬ eBay.com facilitates online auctions. ↬ Shopee, Lazada, zalora ✿ The Pace of Change ↬ Traditional brick-and-mortar businesses have also established web ↬ 1940s: First computer was built. sites for their company. ↬ 1956: First hard-drive disk weighed a ton and stored five megabytes. ↬ E-commerce and trust concerns ↬ 1991: Space shuttle had a one-megahertz computer. Ten years later, ~ When people sell stuffs on social media, how do you decide that this some automobiles had 100-megahertz computers. Speeds of several seller is trustworthy? gigahertz are now common. Profile picture? Testimonials ✿ Cell Phones Language? Bagi salam, etc? Review ↬ Relatively few in 1990s. Approximately five billion worldwide in 2011. ✿ Collaboration ↬ What smartphone apps do we have for: ↬ Wikipedia: The online, collaborative encyclopedia written by ~ Muslims? volunteers. ~ Students? Edit war ↬ Issues with cell phones: ↬ Informal communities of programmers create and maintain free ~ PRIVACY: location tracking, camera software. ~ Cell phones can interfere with solitude, quiet and concentration. ↬ Watch-dogs on the Web: Informal, decentralized groups of people ~ Talking on cell phones while driving is dangerous. help investigate crimes. ~ Other unanticipated negative applications: terrorists detonating Controversial: emotionally involved bombs, rioters organizing looting parties. ✿ Free stuff ✿ Kill switches ↬ Examples: ↬ Allow a remote entity to disable applications and delete files. ~ Email accounts, browsers, software for viewing documents, software to ↬ Are in operating systems for smartphones, tablets and some edit photos and videos etc. computers. ~ Phone services using VOIP such as Skype, Whatsapp ↬ Used mainly for security, but raise concerns about user autonomy. ~ University lectures ✿ Social Media or Social Networking ↬ In order for companies to earn ad revenue, many free sites collect ↬ First online social networking site was classmates.com in 1995. information about our online activities and sell it to advertisers. ↬ Founded in 2003, Myspace had roughly 100 million member profiles ~ Free games, free apps. What do they get from it? by 2006. ↬ Advertising pays for many free sites and services, but not all. ↬ Facebook was started at Harvard as an online version of student ↬ Wikipedia funded through donations. directories ↬ Businesses provide some services for good public relations and as a ↬ Twitter was founded in 2006: microblogging and social networking marketing tool. service ↬ Generosity and public service flourish on the Web. Many people share ↬ Instagram was launched in October 2010: photo and video-sharing their expertise just because they want to. owned by Facebook, Inc. ✿ Artificial Intelligence ↬ Businesses connect with customers. ↬ A branch of computer science that makes computers perform tasks ↬ Organizations seek donations. normally requiring human intelligence. ↬ Groups organize volunteers. ↬ Researchers realized that narrow, specialized skills were easier for ↬ Protesters organize demonstrations and revolutions. computers than what a five-year-old does: recognize people, carry on a ↬ Individuals pool resources through “crowd funding”. conversation, respond intelligently to the environment. ↬ Social Media issues: ↬ Many AI applications involve pattern recognition. ~ Stalkers ↬ Speech and face recognition is now a common tool ~ Cyber-bully ✿ Robots ~ Jurors tweet about court cases during trials. ↬ Mechanical devices that perform physical tasks traditionally done by ~ Socialbots simulate humans. humans. ~ Fake info / fake news ↬ Can operate in environments that are hazardous for people. ~ Fake accounts ↬ Robots could: ✿ Communication and the Web ~ inspect undersea structures and communication cables ↬ In the 1980s, email messages were short and contained only text. ~ search for survivors in buildings collapsed by bombs or earthquakes ↬ People worldwide still use email, but texting, tweeting , and other ~ explore volcanoes and other planets social media are now preferred. ✿ Smart sensors, motion, and control ↬ Blogs (“Web log”) began as outlets for amateurs wanting to express ↬ Motion sensing devices are used to give robots the ability to walk, ideas, but they have become significant source of news and trigger airbags in a crash, and protect laptops when dropped. entertainment. ↬ Sensors can detect leaks, acceleration, position, temperature, and ↬ Inexpensive video cameras and video-manipulation tools have moisture. resulted in a burst of amateur videos. ✿ Tools for disabled people ↬ Many videos on the Web can infringe copyrights owned by ↬ Assistive technology devices help restore productivity and entertainment companies. independence to people with disabilities. ✿ Telemedicine ↬ Researchers are experimenting with chips that convert brain signals to ↬ the practice of caring for patients remotely when the provider and controls for leg and arm muscles. patient are not physically present with each other. ✿ Old problems in a new context: crime, pornography, violent fiction ↬ performance of medical exams and procedures, including surgery. ✿ Adapting to new technology: what changes we need to implement ↬ Examples: because of new technologies ~ Patient consultations via video conferencing, ~ e-health (including patient portals), ✿ Global reach of Net: ease of communication with distant countries ~ remote monitoring of vital signs, ✿ Trade-offs and controversy: Increasing security means reducing ~ nursing call centers, convenience. ↬ Patriot Act – after 9/11 ✿ Perfection is a direction, not an option. ICT 652(1) Page 1 CONTINUE TOPIC 1 Historical Milestone in Computer Ethics ✿ 1940s and 1950s ↬ Computer ethics as a field of study has its roots in the work of Professor Basic Concepts of Computer Ethics is no E-Business Norbert Wiener (early 1940s) in Massachusetts Institute of Technology (MIT) strategy? ↬ Wiener develop insightful ethical conclusions about the technology that ✿ Ethics we now call ICT (information and communication technology) ↬ What is Ethics: ↬ He perceptively foresaw revolutionary social and ethical consequences ~ Study of what it means to “do the right thing”. with the effect of artificial machines. ~ Assumes people are rational and make free choices. ↬ The presence of another social potentiality of unheard-of importance for ~ Rules to follow in our interactions and our actions that affect others. good and for evil. ~ Two different perspectives that ethics are: ↬ In 1950 Wiener published his monumental book, The Human Use of Fundamental like law of science Human Beings. Rules we make up like law of football ↬ Wiener's foundation of computer ethics was far ahead of its time, and it ↬ A variety of ethical views (cont.): was virtually ignored for decades. ~ Negative rights (liberties) ↬ On his view, the integration of computer technology into society will The right to act without interference eventually constitute the remaking of society -- the "second industrial Freedom of religion revolution“. Freedom of assembly ✿ 1960s Freedom of speech ↬ In the mid 1960s, Donn Parker of Stanford Research Institute (SRI) Freedom of association International in California began to examine unethical and illegal uses of ~ Positive rights (claim-rights) computers by computer professionals. An obligation of some people to provide certain things for others ↬ He published "Rules of Ethics in Information Processing" in E.g in Malaysia: Housing developers must provide bumiputera quotas even Communications of the ACM in 1968 if they don’t want to. ↬ Parker headed the development of the first Code of Professional ~ Golden rules Conduct for the Association for Computing Machinery Treat others as you would want them to treat you. ✿ 1970s ~ Contributing to society ↬ In late 1960s, Joseph Weizenbaum, a computer scientist from MIT in Boston, created a computer program that he called ELIZA Doing one’s work honestly, responsibly, ethically, creatively, and well is ↬ In his first experiment with ELIZA, he scripted it to provide a crude virtuous. imitation of "a Rogerian psychotherapist engaged in an initial interview ~ Social contracts and a theory of political justice with a patient“ People willingly submit to a common law in order to live in a civil society. ↬ The results showed that how deep people emotionally involved with the ~ No simple answers computer, sharing their intimate thoughts with it. Human behavior and real human situations are complex. There are often ↬ In mid 1970s, Walter Maner, from Bowling Green State University in trade-offs to consider. Ohio began to use the term "computer ethics" to refer to that field of Ethical theories help to identify important principles or guidelines. inquiry dealing with ethical problems aggravated, transformed or created ~ Do organizations have ethics? by computer technology. Ultimately, it is individuals who are making decisions and taking actions. We ↬ Maner generated much interest in university-level computer ethics can hold both the individuals and the organization responsible for their acts. courses. ↬ Some important distinctions: ↬ He offered a variety of workshops and lectures at conferences across ~ Right, wrong, and okay America Can’t divide all acts into right/wrong ↬ Many university courses were put in place because of him, and several ~ Distinguishing wrong and harm important scholars were attracted into the field. Harm: not necessarily mean unethical, E.g: Taxes ✿ 1980s ~ Separating goals from constraints ↬ By the 1980s, a number of social and ethical consequences of information technology were becoming public issues in America and Goal: make profit, but within constraints Europe ~ Personal preference and ethics ↬ In the mid-80s, James Moor of Dartmouth College published his Can’t force others to think the same way influential article "What Is Computer Ethics?" ~ Law and ethics ✿ 1990s What is lawful might not be ethical. Vice versa ↬ During the 1990s, new university courses, research centers, conferences, journals, articles and textbooks appeared, and a wide Computer Ethics diversity of additional scholars and topics became involved. ✿ Known as standard of professional practice, codes of conducts, aspects of ↬ Simon Rogerson of De Montfort University (UK), established the Centre computer law, public policy, corporate ethics even certain topics in sociology for Computing and Social Responsibility and psychology of computing. ↬ The mid-1990s has heralded the beginning of a second generation of ✿ The efforts of professional philosophers to apply traditional ethical Computer Ethics theories like utilitarianism, Kantianism, or virtue ethics to issues regarding the ↬ In 1991 Bynum and Maner convened the first international use of computer technology. multidisciplinary conference on computer ethics, which was seen by many ✿ Computer ethics in the broadest sense can be understood as that branch as a major milestone of the field. of applied ethics which studies and analyze such social and ethical impacts of It brought together, for the first time, philosophers, computer information technology professionals, sociologists, psychologists, lawyers, business leaders, news reporters and government officials. It generated a set of monographs, video programs and curriculum Defining the Field Of Computer Ethics (P1) materials ✿ The second stage is "technological permeation" ↬ Technology gets integrated into everyday human activities and into social institutions, Defining the Field Of Computer Ethics (P2) ↬ Technology changes the meaning of fundamental concepts, such as ✿ According to Moor, the computer revolution is occurring in two stages. "money", "education", "work", and "fair elections". ✿ The first stage was that of "technological introduction" ✿ Computer ethics identifies and analyzes the impacts of information ↬ Computer technology was developed and refined. technology upon human values ↬ This already occurred in America during the first forty years after the ↬ E.g.: health, wealth, opportunity, freedom, democracy, knowledge, Second World War. privacy, security, self-fulfillment, and so on. ICT 652(1) Page 2