...Ethical Concerns in Computing: Robot Ethics Ashley Ramos INF 103: Computer Literacy Cathy Johnson November 26, 2013 From a cash register to driverless cars, technology is all around us whether we like it or not, and it is only going to continue to grow. The more technology advances, the more we can do or use it for, and the more concerns it raises. When a computer was first introduced, we weren't thinking about if it could tell right from wrong, we were thrilled that we had a machine that could do somewhat complex calculations. As technology advanced these issues of morals came into play. The first person to look into ethics and the issues that go along with it was James Moor (Bowles, 2013). Since then it has been a highly debated topic that continues to grow. There are many different ethical issues involving information technology, some of which are mentioned in our textbook. Just like with any personal data (Social Security Numbers, bank account information, etc), we expect this information to be kept private and only give it out to who we believe to be trusted people. "Privacy of that data and the importance of ensuring that only authorized people know certain things about other people's lives." (Bowles, 2013). Another issue mentioned in the textbook is the accuracy of our personal information that is entered into the various systems. This information is only as accurate as the human typing it in makes it. Because digital information is so much easier...
Words: 1777 - Pages: 8
...Undergraduates in Discussions about Ethics in Computing Brian R. von Konsky Jim Ivins Susan J. Gribble Curtin University of Technology Department of Computing Software Engineering Education Research Group GPO Box U1987, PERTH WA Australia bvk@cs.curtin.edu.au Abstract o Third-year computing students enrolled in a software engineering subject were introduced to the Australian Computer Society (ACS) Code of Ethics in the context of a computing professional’s obligation to manage quality, safety and reliability. Following an introductory lecture, case study scenarios were interactively discussed during class. Immediately afterwards, students were surveyed to assess their self-perceived and actual ability to apply the ACS Code to another similar scenario. Of the 68 students who gave their informed consent to participate in the study, 34% reported being fully comfortable with applying the ACS Code of Ethics, while 63% were somewhat comfortable. In justifying multiple-choice options for dealing with a new case study scenario, 37% provided a good justification for their choice, 48% provided a poor justification, and 15% provided no justification. A further qualitative analysis of the responses suggests the need for formal assessment of ethics in computing education, and highlights the importance of improving the perceived relevance of ethics to students and the need for in-depth treatment of ethical issues. Keywords: Ethics, Teaching and Learning, Engagement ...
Words: 4918 - Pages: 20
...Computer ethics Computer ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. The term "computer ethics" was first coined by Walter Maner in the mid-1970s, but only since the 1990s has it started being integrated into professional development programs in academic settings. The conceptual foundations of computer ethics are investigated by information ethics, a branch of philosophical ethics established by Luciano Floridi. Computer ethics is a very important topic in computer applications. The importance of computer ethics increased through the 1990s. With the growth of the Internet, privacy issues as well as concerns regarding computing technologies such as spyware and web browser cookies have called into question ethical behavior in technology. Identifying issues Identifying ethical issues as they arise, as well as defining how to deal with them, has traditionally been problematic in computer ethics. Some have argued against the idea of computer ethics as a whole. However, Collins and Miller proposed a method of identifying issues in computer ethics in their Paramedic Ethics model. The model is a data-centered view of judging ethical issues, involving the gathering, analysis, negotiation, and judging of data about the issue. In solving problems relating to ethical issues, Davis proposed a unique problem-solving method. In Davis's model, the ethical problem is stated, facts...
Words: 6774 - Pages: 28
...permiso pues era el ofrecido por la editorial) Professional Codes of Ethics Commitment to ethical professional conduct is expected of every voting, ssociate, and student member of the ACM. — preamble to the ACM Code of Ethics. We, the members of the IEEE, in recognition of the importance of our technologies in affecting the quality of life throughout the world, and in ccepting a personal obligation to our profession, its members and the communities we serve, do hereby commit ourselves to conduct of the highest ethical and rofessional manner... — preamble to the IEEE Code of Ethics 3.1 Introduction Some students react with surprise when told that there is even one published code of ethics for the computing disciplines. In fact, almost every professional organization dealing with the field of computing has published its own code of ethics. For this text, I selected the codes published by the two most influential organizations for computer professionals: the Institute of Electrical and Electronics Engineers and the Association for Computing Machinery. I also selected a third code, from the National Society of Professional Engineers. A variety of other professional organizations have published computing codes, such as the Data Processing Management Association and the Institute for Certification of Computer Professionals [6], but I selected the NSPE code because it is still relevant to computing and contains some useful points of contrast to the IEEE and ACM codes...
Words: 5527 - Pages: 23
...Cloud Computing: The Benefits and the Downside Air, energy, the environment are intangible to the human eye, but yet all three play an integral part in our survival. Cloud computing relates to these three things because all of these could be adversely affected by cloud computing. Technology is an ever evolving and growing market dominated by the consumerism of Apple products and a world where instant gratification is gloried as information is processed in the matter of seconds. The evolution of technology has not only changed the way that we communicate with one another, but also the way in which businesses must conduct their daily transactions. A person in the United States can keep in touch with a friend thousands of miles of way in Brazil or England using Facebook or Twitter. World events spread in the same manner as wildfire, uniting citizens around the world with such topics as war and human rights. We live in a society in which technology has shaped the people that we are today. Most students in middle or high school have had access to a cellular phone since their birth. Beyond the surface of technology being used as a device to interact with one another, technology is used as a device to store information. Our society has transformed from storing information on a hard drive or a flash drive to the information being stored on the Internet via the concept of cloud computing. Cloud computing is the act in which information can be stored and reviewed over the Internet rather...
Words: 3023 - Pages: 13
...THE DIFFERENCES BETWEEN ETHICS AND LAW DEFINITION OF ETHICS In general, ethics is a moral philosophy where a person makes a specific moral choice and sticks to it. On the other hand, ethics in computing means moral guidelines to refer to when using the computer and computer networks. This includes the Internet. DEFINITION OF LAW Law is a legal system comprising of rules and principles that govern the affairs of a community and controlled by a political authority. Law differs from one country to another. In the era of technology, computer law is needed to clarify goods or actions that fall under the computer law. Computer law refers to all areas in law that requires an understanding of computer technology such as hardware, software and Internet. Examples of laws of computing in Malaysia include the Malaysian Communication and Multimedia Act, the Computer Crime Act 1997 and the Telemedicine Act 1997. WHY DO WE NEED ETHICS & LAW IN COMPUTING? Ethics and law are needed i computing to: • • • Respect Ownership Respect Privacy & Confidentiality Respect Property Respect Ownership We must respect ownership by not stealing other people’s work either by duplicating or distributing it. Duplicating and distributing copies of audio tapes, video tapes and computer programs without permission and authorisation from the individual or company that created the program are immoral and illegal. Respect Privacy & Confidentiality We should respect other people's privacy and confidentiality by...
Words: 552 - Pages: 3
...------------------------------------------------- Computer Ethics Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society. For example, while it is easy to duplicate copyrighted electronic (or digital) content, computer ethics would suggest that it is wrong to do so without the author's approval. And while it may be possible to access someone's personal information on a computer system, computer ethics would advise that such an action is unethical. As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as artificial intelligence and human communication. As the world of computers evolves, computer ethics continues to create ethical standards that address new issues raised by new technologies. Computer Ethics is a part of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.[1] Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into 3 primary influences: ...
Words: 3631 - Pages: 15
...Reference Material on Ethics Books and Book Chapters Baase, S. (1997) A Gift of Fire: Social, Legal and Ethical Issues in Computing, Prentice Hall. Berleur, J. and Bruunstein, K. (Eds.) (1996) Ethics of Computing: Codes, Spaces for Discussion and Law, Chapman & Hall: London. Berleur, J. and Whitehouse, D. (Eds.) (1997) An Ethical Global Information Society: Cuture and Democracy Revisited (Proceedings of the IFIP WG 9.2/9.5 Corfu International Conference) Chapman & Hall: London. Berleur, J., Duquenoy, P. and Whitehouse, D. (Eds) (1999) Ethics and the Governance of the Internet, IFIP-SIG 9.2.2 (IFIP Framework for the Ethics of Computing), IFIP Press: Laxenburg, Austria Bowman, J.S. and Menzel, D.C. (1998) Teaching Ethics and Values in Public Administration Programs: Innovations, Strategies and Issues, SUNY Press: Albany. Cappel, J.J. and Kappelman, L. (1997) The Year 2000 Problem: An Ethical Perspective, in: Kappelman, L., (Ed.), Year 2000 Problem: Strategies and Solutions from the Fortune 100, International Thomson Computer Press, Boston, 158-163. Floridi, L. (1999) Philosophy and Computing, London: Routledge. Johnson, D.G. and Nissenbaum, H. (1995) Computers, Ethics and Social Values, Prentice Hall. Kallman, E.A. and Grillo, J.P. (1996) Ethical Decision Making and Information Technology: An Introduction with Cases, McGraw Hill. Kaplan, B., Farzanfar, R. and Friedman R.H. (1999) Research and Ethical Issues Arising from Ethnographic Interviews of Patients’...
Words: 1786 - Pages: 8
...Title: Ethics in Cyberspace Ethics in Cyberspace Chris Jones Strayer University CIS 324 Professor Luis ACEVEDO March 15, 2012 Ethics in Cyberspace What is Cyberspace? Cyberspace is a global community of people using computers in networks. For ensured functionality, virtual communities with Internet support depend on rules of conduct, likewise with any other society. Business people like librarians and information technologists must have matured knowledge about ethical issues for their companies’ welfare and to protect and mentor other users. What is ethics? Ethics is the art of determining what is good or right. It can also be defined as a way of life or general pattern, a set of rules of conduct or moral code. Ethical guidelines are based on values. The Association of Computing Machinery (ACM) is a national organization that has a developed statement of its values. ACM’s every member is expected to uphold the Code of Ethics and Professional Conduct which includes these morals: 1) contribute to society and human well-being 2) avoid harm to others 3) be honest and trustworthy 4) be fair and take action not to discriminate 5) honor property rights including copyrights and patents 6) give proper credit for intellectual property 7) respect the privacy of others 8) honor confidentiality. New moral issues occur due to the nature of electronic...
Words: 851 - Pages: 4
...Review the process of implementing cloud computing of SMEs in UK - an Exploratory Study 1. Introduction Information technology (IT) plays an important role in increasing innovation and competitiveness and performance for small and medium-sized enterprise (SMEs). Cloud computing or on-demand computing is IT infrastructures that empower SMEs with various capabilities to store, share and access information, data and resources in third-party data center. Cloud computing when implemented strategically will help enterprises to improve their performances, processes and efficiency. Despite the importance of cloud-based computing, limited research has done to study about the implementation and usage of cloud-based computing in the SMEs within the UK context (Shiels et al., 2003). The objective of the research reviewed in this proposal is to contribute to the valuable research on cloud solutions by studying the implementation of SMEs. UK was selected for this research as in UK, SMEs accounts for the vast mojarity of all companies and it is home of innovation companies that develop with the development of information and communication technologies. The relevant literature are referred and the theoretical framework is used in this research are discussed in the next part of the paper. 2. Literature Review According to Sultan, N. A. (2011) small- and medium-sized enterprises can take a lot of advantages from embracing cloud solutions. Because no matter of what type of business...
Words: 2789 - Pages: 12
...ON-THE-JOB TRAINING AT THE DEAN’S OFFICE, COLLEGE OF COMPUTING AND INFORMATION TECHNOLOGY, ISABELA STATE UNIVERSITY, CAUAYAN CITY, ISABELA JOHN DAVID C. CADIENTE ============================= NARRATIVE REPORT ============================= Republic of the Philippines ISABELA STATE UNIVERSITY College of Computing and Information Technology Cauayan City, Isabela March 2012 APPROVAL SHEET The narrative report entitled, “ON-THE-JOB TRAINING AT THE DEAN’S OFFICE, COLLEGE OF COMPUTING AND INFORMATION TECHNOLOGY, ISABELA STATE UNIVERSITY, CAUAYAN CITY, ISABELA”, prepared and submitted by JOHN DAVID C. CADIENTE, in partial fulfillment in the requirements for graduation with the course, BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY (BSIT), is hereby endorsed. GUIDANCE/ADVISORY COMMITTE DIONICIO D. GANTE OJT Coordinator/ Adviser CARMELO M. IBBARETA English Critic ________________________________________________________________________ Accepted as a partial fulfillment of the requirements for graduation with the course Bachelor of Science in Information Technology. MARY JANE S. BITANGA _________________ Dean, CCIT Date Recorded by: ADELA L. REYNO _________________ Campus Registrar Date ACKNOWLEDGEMENT DEDICATION TABLE OF...
Words: 728 - Pages: 3
...storage, communication of, and access to information, whether such information is encoded in bits and bytes in a computer memory or transcribed in genes and protein structures in a human cell.” Job growth significantly contributed to my decision on a major. According to the U.S. Bureau of Labor Statistics, careers requiring at least a B.S. in Computer Science are seeing the greatest amount of growth, and are expected to continue to do so through 2016. Also, people in this major tend to receive the greatest average starting salary at $65,000. However, the field is not without its problems. Because computing is so new and many laws have yet to form, the computer science environment faces ethical issues such as intellectual ownership, security, and what can be published to the Internet. Currently, the field of computer science is facing one of the greatest issues of the technological age: ethics. Ethical concerns seem to revolve around ownership of intellectual property and the copying and unauthorized use of software. Who owns a software program, the writer, creator, or the financer? The most notable problem is piracy and peer-to-peer sharing. Programs such as Limewire, Napster, and Frostwire...
Words: 1011 - Pages: 5
...Critical Components of a Successful Business University Maryland University College Professor Jerry Griffin BMGT 110 What Are Some Key and Critical Components of Running a Successful Business? Learning how to run and operate a business can be a big and daunting task. Many small businesses don’t even turn a profit for months or even years, and even if they do there is no guarantee that they will be around in a few years. Most of these small businesses, about 70 percent survive the first two years but after that the numbers decrease to “50 percent by the fifth year mark, and by the tenth year 82 percent have closed” (Boone & Kurtz p.152). If you want your company or business to succeed and grow you need to know a few important factors that will help it and they are: dynamic business environments, critical business functions, integration of individuals and systems, and ethical and social responsibilities that confront a business. To start a company you need a plan, capital, and a location to start the company, but once you get those you need to be able to have a dynamic business environment. A dynamic business environment is characterized by the ability to respond to changing trends. One of these changes could be the aging of the population and its shrinking labor pool. As stated by Boone and Kurtz, “that by the year 2030, the number of U.S. workers 65 or older will reach 72 million, taking their experience and expertise with them” (pg. 20). Which means...
Words: 1541 - Pages: 7
...Workplace deviance has long been a concept that was definable, quantifiable, and evaluatable. Representing an organization’s loss due theft of property, deliberate employee misconduct, or inadvertent employee waste, workplace deviance stemmed from generally overt practices that could be weighted for their significance and addressed accordingly. Although this valuation may often be subjective, it could still be made tangible to a manager in ways that suited their (and their organization’s) ethical norm. In today’s workplace, it is not easy to run a successful and profitable company and maintain ethical behavior at all times. There are too many variables involved in running a business that it can sometimes be tough to determine between right and wrong. We will discuss some of the most common and potentially troubling changes in technology that have resulted in electronic surveillance, email monitoring, restricting access to programs and or websites, and social media trafficking. Due to technological advances, workplace deviance is becoming more and more of a concern for today’s employers. In years past, employers did encounter workplace deviance, but it was of a lesser degree. Chuck Williams, author of our management book, describes workplace deviance as, “unethical behavior that violates organizational norms about right and wrong.” Workplace deviance can have both tangible and intangible effects on a company’s assets. With the dawn of the Information...
Words: 2353 - Pages: 10
...Operations Management(RM 2) * Media and Communications Ethics(RM 2) * Mobile Communications(RM 2) * Social Work Legal and practice(RM 33) * Employee Engagement (RM 33) | TUESDAY23/06/2015 | * Management Information Systems1(Gym & RM 36) * Java Programming(RM 33) * Mathematics for economics (RM 1) * Software Economics(RM 1) * Media and Society (RM 1) * Marketing(RM 2) * Human Resource Development (RM 2) * Human Rights and Development (RM 2) | * Business Communication/Communication Skills(Gym, RMs 36, 33, 2) * Project Planning and Management Software(Project) * Public Finance(RM 1) * Intermediate macroeconomics 2(RM 1) * Project Appraisal(RM 1) * Wood based Materials &Processes I(RM 1) * Financial Management(RM 1) | WEDNESDAY24/06/2015 | * Media Law(RM 1) * Introduction to Business( Gym) * Introduction to Public Administration(RM 36) * Intermediate microeconomics 1(RM 1) * Cyber Law(Gym) * Food security in Developing Countries(RM 33) * Risk Management(RM 2) * Project Design 1(RM 2) | * Sociology of Education(Gym) * Managerial Accounting (Gym) * Geographical Information Systems(RM 33) * Writing for Media (RM 2) * Ethics in Human Resources(RM 33) * NGOs and Development(RM 1) * Introduction to Social and Cultural Anthropology(RM 1) * Development psychology(RM 1) * Fundamentals of Information Security (RM 1) * Electronics For Computing 2(RM 36) * Project Portfolio Management (RM 2) * Wood...
Words: 924 - Pages: 4