Computer and Information Ethics
Historical Milestone
Mid 1940s is the new branch of ethics: Computer Ethics
or Information Ethics. At the center, Norbert Wiener, professor of
mathematics and engineering at MIT. He was a pioneer in the study of stochastic
and noise processes, contributing work relevant to electronic engineering,
electronic communication, and control systems. In the mathematical field
of probability the Wiener sausage is a neighborhood of the trace of a
Brownian motion up to a time t, given by taking all points within a fixed distance
of Brownian motion. Brownian motion is a seemingly random movement of
particles (mathematical model do describe such random movement).
Foundation of C&I Ethics.
Wiener foresaw enormous social and ethical implications
of cybernetics combined with electronic computers. His predictions is, after
war world would undergo a second industrial revolution automatic age with
enormous potential for good and evil staggering number of new ethical
challenges & opportunities effects on information technology on key human
values; life, health, happiness, abilities, knowledge, freedom, security, and
opportunities.
Computer ethics.
- Term: Computer Ethics (1976 Walter Maner). Ethical
questions in his field (medical ethics) got more complicated when
computers go involved. Studies ethical problems “aggravated, transformed or
created by computer technology”. Computer ethics “starter kit” monogram
published in 1980 contained curriculum materials and pedagogical advice for
university teachers. Discussions of topics like privacy and confidentiality,
computer crime, computer decisions, technological dependence and
professional codes of ethics.
- What is Computer Ethics”, classic paper by Moor, 1985.
Broader and more ambitions than definitions by Maner or Johnson. Went
beyond descriptions and examples of computer ethics problems. Offered
explanation of why computing technology raises so many ethical questions
compared to other kinds of technology . The computer is the nearest thing we
have to a universal tool. Indeed, the limits of computers are largely the
limits of our own creativity. With computers people can do many things that
could not be done before. The question is whether one ought to do them? Implies
the likely lack of laws, standards of good practices, specific ethical roles.
Moor’s term for this: policy vacuum.
Moor’s problem-solving method:
1. Identify a policy vacuum generated by computing
technology.
2. Eliminate any conceptual muddles.
3. Use the core values and the ethical resources of
just consequentialism to revise existing — but inadequate — policies, or
else to create new policies that justly eliminate the vacuum and resolve the
original ethical issue.
Computers in the workplace.
Computers are a universal tool, it replace humans like
threat to jobs. Incentives to replace humans with computers like perform task
faster, more accurate, does not make mistakes, no sleep, does not get tired,
does not get sick, no vacation. Many jobs have already been replaced like auto
workers, for example, a modern car manufacturing plant. Also a bank tellers
(ATM), graphic artist - who draws, sits at the drawing board? Not limited to
the obvious jobs like professionals can be replaced as well; doctors, teachers,
accountants, etc. As we know, computer industry creates many new jobs. HW/SW
engineer, sys, admin, web programmer/master computer service sector, computer
sales force, etc. But it also has a health & safety concerns. Introduce
computers: consider likely impacts on health and job satisfaction, stress of
trying to keep up with technology, injuries resulting from repeating same
physical movement, radiation from computer monitors, etc.
Computer Crime
Malicious software, from viruses to who-knows-what. Trusted
computer users, many crimes originate from trusted users, the insider ans hacker.
Privacy and Anonymity
Privacy is one of the earliest computer ethic topics. Who is
collecting data? governments, organizations, even individuals.
1960s US government created large DB about citizens. US
congress passed bill to issue personal identification number and start
collecting information. Public outcry: “big-brother government”, consequence:
Congress scrapped plan US president appoints committees to recommend privacy
legislation.
1970s - present major computer privacy laws passed in USA
process of collecting ease and efficiency of collecting is it getting out of
control? dealing with sensitive information e.g. medical record, what is
sensitive and what is public? data-mining, data matching, etc.
Intellectual Property
One can own the following aspects of a program
1. The “source code” which is written by the programmer(s)
in
a high-level computer language like Java or C++.
2. The “object code”, which is a machine-language
translation
of the source code.
3. The “algorithm”, which is the sequence of machine
commands that the source code and object code represent.
4. The “look and feel” of a program, which is the way
the
program appears on the screen and interfaces with users.
Professional responsibility
Computer professionals specialized knowledge position with
authority and respect in community. With power comes responsibility they are
able to have a significant impact upon the world, including many of the things
that people value. Along with such power to change the world comes the duty to
exercise that power responsibly [Gotterbarn, 2001]. ACM and IEEE have
established codes of ethics, curriculum guidelines, accreditation requirements
to help computer professionals understand and manage ethical responsibilities.
Globalitazion
For the first time in history, efforts to develop mutually
agreed standards of conduct, and efforts to advance and defend human values,
are being made in a truly global context, ethics and values are debated and
transformed with no limit to geographic regions, or constrained by specific
religion or culture, may be one of the most important social developments in
history.
- Global Laws
Assume computer user in US wants to protect his freedom of
speech on the internet -- Whose laws apply? over 200 countries connected to the
Internet the First Amendment protection for freedom of speech is just a “local
law” on the Internet. How about controversial topics like pornography, intellectual
property, invasion of privacy. Can I be tried in some country where certain
dealings are illegal?
- Global Cyberbusiness
It is up and running, e.g. eBay, Amazon, etc What will be
the political and economic fallout from rapid global cyberbusiness? Will
accepted business practices in one part of the world be perceived as “cheating”
or “fraud” in other parts of the world? Will this contribute to “the winner
takes all” and widen the gap between rich and poor?
- Global Education
World-wide student growth is by far surpassing availability
o universities. Largest impact in parts of the world with high population
growth. Impact of global education on political dictatorships, isolated
communities, coherent cultures, religious practices.
Conclusions
I encourage you take a look at the article Computer and
Information Ethics and wealth of resources.

Komentar
Posting Komentar