Professional Documents
Culture Documents
Computer ethics
Outline Basics Intellectual property Social issues Privacy Free speech Ethics in Cyberwar Employment Conclusion: It is vital that technologists are trained in computer ethics.
Computer ethics
Basics
Outline Basics Intellectual property Social issues Privacy Free speech Ethics in Cyberwar Employment Conclusion: It is vital that technologists are trained in computer ethics.
Intellectual property: Should software be owned? Social issues: Is access to the Internet a basic right that everyone should have? Privacy: Is it OK to display personal information on the Internet (such as their
online status or their present location via GPS)? Free speech: How much control must threre be regarding gambling / oence / pornography? Cyber war: Will war happen more often? Employment: Will surveillance happen more often?
Computer ethics
Basics 1
There is a dierence in speed of technology, national law and conceptual understanding.
Outline Basics Intellectual property Social issues Privacy Free speech Ethics in Cyberwar Employment Conclusion: It is vital that technologists are trained in computer ethics.
Figure: Technology is far in front of law and understanding Figure: Motto of developers at Facebook
Question: What is the role of software architects in Computer (and information) ethics?
Computer ethics
Outline Basics Intellectual property Social issues Privacy Free speech Ethics in Cyberwar Employment Conclusion: It is vital that technologists are trained in computer ethics.
Computer ethics
Outline Basics Intellectual property Social issues Privacy Free speech Ethics in Cyberwar Employment Conclusion: It is vital that technologists are trained in computer ethics.
outer things.
Liberalist (Locke): Natural ownership is ones labor. Idealist (Hegel): Creation is expression of ones personality.
Intellectual property has dierent characteristics than physical property. Two facts that distinguish PP from IP:
IP can be copied, without loosing quality. If a physical thing is stolen, the owner cant use it anymore. Stealing an IP deprive the
Utilitarian: Intellectual creations are costly and resource intensive, people will engage in this, if they know, they will be rewarded. Economic: Implementation of incentives (through IP laws) leads to a richer society.
Computer ethics
Outline Basics Intellectual property Social issues Privacy Free speech Ethics in Cyberwar Employment Conclusion: It is vital that technologists are trained in computer ethics.
restriction).
Copyleft movement: GNU General Public License, written by Richard Stallman,
IP laws were made for physical property. Means to make software physical: Licences as means to control IP. DRM: Making data articially into something physical, limiting how many times it can be copied / viewed. Cryptography researcher stated that he will not release research: Dmitry Sklyarov, a PhD student, was arrested during a visit to the US. Anti-Counterfeiting Trade Agreement (ACTA) for intellectual property rights enforcement: Make internet providers responsible for what their users do online.
Computer ethics
Outline Basics Intellectual property Social issues Privacy Free speech Ethics in Cyberwar Employment Conclusion: It is vital that technologists are trained in computer ethics.
Figure: Map showing the amount of computers per person (Source: ethics.csc.edu).
Computer ethics
Outline Basics Intellectual property Social issues Privacy Free speech Ethics in Cyberwar Employment Conclusion: It is vital that technologists are trained in computer ethics.
Computer ethics
Hacker ethics
Does ICT help against discrimination on the ground of identity ( gender, race ...), or can it mitigate discrimination?
Sharing: Write code and share it. Openness: Access to computers and anything which might teach you something
Outline Basics Intellectual property Social issues Privacy Free speech Ethics in Cyberwar Employment Conclusion: It is vital that technologists are trained in computer ethics.
such freedoms.
Initially the internet was build in a way, that it cannot be controlled very well. Rumor: Low bridges intentionally designed so Long Beach in New York stayed a
Computer ethics
Privacy
Outline Basics Intellectual property Social issues Privacy Free speech Ethics in Cyberwar Employment Conclusion: It is vital that technologists are trained in computer ethics.
Alarm clock rings at 7:00:00 Tossing the covers at 7:05:02 Placing feet in slippers at 7:05:31. Making breakfast... Protocolling every place, every thought etc. is what god or an angel does in the abrahamic religions. Benets: Better shopping at e.g. Amazon etc. But: Can we control, who has access to that data? Facebook only recently introduced acceptable privacy controls. Anti-Counterfeiting Trade Agreement(ACTA) for intellectual property rights enforcement enforces privacy breaches.
Extreme example: A Chinese journalist was arrested because Yahoo revealed his
identity.
Did Yahoo in breach the rights of Shi Tao?
Computer ethics
Free speech
Unrestricted speech occurred in places like ancient Greece. Mill If all mankind minus one were of one opinion, and only one person were of the contrary opinion, mankind would be no more justied in silencing that one person than he, if he had the power, would be justied in silencing mankind. [mil] [Fis94] opposes free speech because every individual expresses himself, being part of a society. [Wit53] calls it language-game, complete free speech would be a game with no rules.
Outline Basics Intellectual property Social issues Privacy Free speech Ethics in Cyberwar Employment Conclusion: It is vital that technologists are trained in computer ethics.
Computer ethics
Free speech
Outline Basics Intellectual property Social issues Privacy Free speech Ethics in Cyberwar Employment Conclusion: It is vital that technologists are trained in computer ethics.
Figure: Piss Chris, Jesus on a cross in a jar of urine oends Christians. The art led to petitions, outcries, prayers and angry letters.
Computer ethics
Free speech
Outline Basics Intellectual property Social issues Privacy Free speech Ethics in Cyberwar Employment Conclusion: It is vital that technologists are trained in computer ethics.
Figure: Piss Chriss, Jesus on a cross in a jar of urine oends Christians. The art led to petitiosn, outcries, prayers and angry letters.
Figure: Jyllands-Posten Muhammad cartoons oending muslims. The cartoons resulted into violence against the West, killing people, burning embassies etc.
Computer ethics
Free speech
Unrestricted speech occurred in places like ancient Greece. Mill If all mankind minus one were of one opinion, and only one person were of the contrary opinion, mankind would be no more justied in silencing that one person than he, if he had the power, would be justied in silencing mankind. [mil] [Fis94] opposes free speech because every individual expresses himself, being part of a society. [Wit53] calls it language-game, complete free speech would be a game with no rules.
Activity must be tolerated as long as no harm is done (harm principle by Mill). How to talk online? Free speech may insult (unprogressive) countries. Freedom of speech is a modern notion, many unprogressive do not favor this
Outline Basics Intellectual property Social issues Privacy Free speech Ethics in Cyberwar Employment Conclusion: It is vital that technologists are trained in computer ethics.
right.
US an EU dier on issues in the control of e.g. pornography and hate speech. ICT bring these traditions into conict.
We have a dilemma...
Electronic Frontier Foundation (EFF) claimed that if internet is limited, then its
such as piracy, hacking, child pornography, drug dealing and terrorism, therefore it must be regulated.
Computer ethics
Anonymous speech
Anonymous speech = Combination of right of privacy and right of free speech
Outline Basics Intellectual property Social issues Privacy Free speech Ethics in Cyberwar Employment Conclusion: It is vital that technologists are trained in computer ethics.
[Bel95].
Young computer scientists, who build the internet, were inuenced by libertarian
culture.
Anonymous speech was a cardinal part of it.
Computer ethics
Outline Basics Intellectual property Social issues Privacy Free speech Ethics in Cyberwar Employment Conclusion: It is vital that technologists are trained in computer ethics.
Computer ethics
Outline Basics Intellectual property Social issues Privacy Free speech Ethics in Cyberwar Employment Conclusion: It is vital that technologists are trained in computer ethics.
type of work technology can do, others claim that there is no structural relationship between ICT and employment levels in general [Flo10]. Netgain? ICT causes exibility: Work from everywhere at any time.
Downside: Surveillance of employees also becomes possible. Telework in general is build on trust, however it enhances the monitoring of
Computer ethics
Conclusion
Question: What is the role of software architects in Computer (and information) ethics?
Software architects are the real power, because law and understanding will
Outline Basics Intellectual property Social issues Privacy Free speech Ethics in Cyberwar Employment Conclusion: It is vital that technologists are trained in computer ethics.
recently implemented a warning you share this information with the public, do you really want to do this?. Technologists and technological watchdog groups, like the Electronic Frontier Foundation (EFF), have to work together.
Old New
Old New
Computer ethics
Outline Basics Intellectual property Social issues Privacy Free speech Ethics in Cyberwar Employment Conclusion: It is vital that technologists are trained in computer ethics.