CS 3043 Social Implications Of Computing 9/18/2015© 2004 Keith A. Pray 1 Class 5 Professional Ethics Keith A. Pray Instructor socialimps.keithpray.net
Embed Size (px)
Citation preview
CS 3043 Social Implications Of Computing*
Here’s the title slide. Excited already, aren’t you?
CS 3043 Social Implications Of Computing
© 2007 Keith A. Pray
© 2007 Keith A. Pray
The Point:
“The ability to share files was one the reasons the internet was
first used; scientists wanted to share research information. As the
internet evolved and more people joined; filesharing systems sprung
up. Users used these systems to share both legal and illegal
(copyrighted) files.
Sharing copyright material is unethical because it is
stealing.
© 2007 Keith A. Pray
*
*
This is a good way to make a point, simply state it. Some may find
it easier to begin with the point, but as long as it occurs fairly
quickly all is good.
CS 3043 Social Implications Of Computing
© 2007 Keith A. Pray
Justify Point:
“Some people argue that it is not stealing because you are not
taking anything tangible. Stealing is defined as taking or
appropriating (another’s property or idea) without permission. The
pro-filesharing argument seems to have forgotten about intellectual
property. The makers of copyrighted material took time, effort and
money to develop it. Think about a movie. Hundreds of people worked
on it, from the person who wrote the script, to the props person
who searched high and low to find the perfect apple pie for some
scene. These people need to make a living and when file-sharers
steal the movie without paying for it the film industry loses money
because their intellectual property was stolen. The cost of the
physical CD or DVD is only a small part of the cost of developing
material.
© 2007 Keith A. Pray
The point was clearly the result of a thought process.
CS 3043 Social Implications Of Computing
© 2007 Keith A. Pray
Defend Against Counterpoint:
“There are arguments from filesharers who try to justify their
action by saying that filesharing is not bad because they would
have never bought the CD anyway. That is analogous to someone
saying that it is okay to steal a plasma screen television because
they would have never bought it anyway. Others argue that
filesharing helped them discover a new artist. This argument is
also incredibly flawed. If the recoding company wants to market an
artist by allowing certain songs to be released and free to
download, that is their prerogative . It’s not up to the users to
determine when it’s okay to download files that are not theirs even
if they believe that it is beneficial to the artist. It’s up to the
owner of the material.”
© 2007 Keith A. Pray
*
*
Here is a clearly stated counterpoint and a defense against
it.
CS 3043 Social Implications Of Computing
© 2007 Keith A. Pray
© 2007 Keith A. Pray
Ethics: No definition provided.
Give a shot at providing one for the purposes of this class.
© 2007 Keith A. Pray
© 2007 Keith A. Pray
© 2007 Keith A. Pray
Prostitution as a Profession
In The Netherlands Prostitution is regulated as extensively as
pharmacies are here. Prostituted are required to have a clean bill
of health to work and are required to have a government
certification to practice Prostitution. Prostitution is also
unionized in the Netherlands and standard for the various forms of
prostitution are regulated by the unions.
In Nevada the state government regulated Prostitution to a much
higher degree and restricts when and where it can be conducted and
what forms can be practiced. Due to the small nature of the
business (apx 300 Prostitutes in all in 2004) no unionization has
occurred but from brothel to brothel the procedure for receiving a
client and conducting services has been standardized.
© 2007 Keith A. Pray
*
*
Where male prostitutes treated differently than female prostitutes
as far as this material is concerned?
CS 3043 Social Implications Of Computing
© 2007 Keith A. Pray
*
*
Has Craig made a good case for prostitution being categorized as a
profession? I do not see a formal education or required skill set.
Standards of performance seem to be missing as well. Do they have a
code of ethics?
CS 3043 Social Implications Of Computing
© 2007 Keith A. Pray
Licensing vs. Certification - Bob Darneille
Licensing is performed by governmental entities and professional
associations to whom the government has delegated, and is done with
the purpose of ensuring breadth and depth of knowledge in a
field.
Texas has begun licensing software engineers
Licensing criteria for software engineers is currently under debate
within IEEE.
Certification is performed by technology vendors and third-party
organizations, and is done with regards to an individual’s level of
skill with particular pieces of software or technology.
Sample technology vendors sponsoring certifications for users of
their technologies:
Microsoft Corporation, Apple Inc., Cisco Systems, Hewlett-Packard,
IBM, MySQL, Novell, Oracle Corporation, Red Hat, and Sun
Microsystems
Sample third-party organizations sponsoring certifications:
Linux Professional Institute, SANS Institute, Storage Networking
Industry Association (SNIA), and XML Master
© 2007 Keith A. Pray
associations to whom the government has delegated. Certification
is
performed by technology vendors, professional organizations, and
other
third-party organizations.
Licensing is a legal, mandatory process done with the purpose of
ensuring
breadth and depth of knowledge in a field. Certification is a
voluntary
process done with the purpose of ensuring an individual's level of
skill
with respect to particular pieces of software or technology.
When it comes to software engineering and computer technology in
general,
there are numerous certifications available from many
organizations. For
example, Microsoft Corporation provides certifications for
Technology
Specialists, IT Professionals, Professional Developers, Desktop
Support
Technicians, Learning Consultants, Systems Administrators,
Systems
Engineers, Database Administrators, Trainers, Application
Developers,
Solution Developers, Microsoft Office Specialists, and (solutions
and
infrastructure) Architects. Apple Inc., Cisco Systems,
Hewlett-Packard,
IBM, MySQL, Novell, Oracle Corporation, Red Hat, and Sun
Microsystems are
among other technology vendors sponsoring certifications for users
of
their technologies. There are also a variety of third-party
organizations
sponsoring user certifications. Among these are Linux
Professional
Institute, SANS Institute, Storage Networking Industry Association
(SNIA),
and XML Master.
Examples of licensing:
engineers in 1998.
engineering program).
While certifications and licensing both exist with regards to
software
engineering, it must be noted that the use of certifications
vastly
surpasses the use of licensing.
-----
© 2007 Keith A. Pray
© 2007 Keith A. Pray
*
*
We have material prepared by students for the topics in bold.
CS 3043 Social Implications Of Computing
© 2007 Keith A. Pray
Client and Employer
“Software engineers shall act in a manner that is in the best
interests of their client and employer, consistent with the public
interest (Baase, pg. 441).”
Being open about your capabilities/limitations
Keeping things confidential that you were asked to
Don't keep concerns about project to yourself
In August of 2006, AOL's research department released a file
containing twenty million search keywords for over 650,000 users
for research purposes. They said that there was no way to tie any
user to a specific person, but within days the media at large had
done so.
© 2007 Keith A. Pray
© 2007 Keith A. Pray
Profession
In 2005, some of the CDs that Sony BMG released contained a rootkit
that secretly installed itself on computers that it was run on. It
ran and installed itself on the user's computer without the
knowledge or consent of the user. Trying to remove the software
caused the operating system …
Just last month, schools in the UK started taking the fingerprints
of children claiming that . A lot of conscious people raised hell,
sites like http://www.leavethemkidsalone.com/ were created and
experts like Bruce Schneier were called upon to discuss the issue.
One of the associated risks was …
© 2007 Keith A. Pray
*
*
In 2005, some of the CDs that Sony BMG released contained a rootkit
that secretly installed itself on computers that it was run on. It
ran and installed itself on the user's computer without the
knowledge or consent of the user. Trying to remove the software
caused the operating system to be damaged. The software company
that developed the rootkit for Sony BMG, First4Internet, violated
rules 6.01 and 6.05, because they did not try to develop an
environment that acted ethically and they promoted their own
interest in the expense of damaging the reputation of the
profession.
Just last month, schools in the UK started taking the fingerprints
of children claiming that . A lot of conscious people raised hell,
sites like http://www.leavethemkidsalone.com/ were created and
experts like Bruce Schneier were called upon to discuss the issue.
One of the associated risks was identity theft, and that the
schools were in no way protected enough to be trusted with the
valuable data. One of the counter-claims the schools /
manufacturers made was that the system did not store an actual
fingerprint, so reverting to the fingerprint image was nearly
impossible. This was the truth, but not the entire truth. What was
not said that instead of the fingerprint itself, a fingerprint
template is stored, which is a standardized form of descriptive
data just as valuable as the fingerprint itself – the police and
the government use exactly these all the time. Thus, they violated
6.07, because they made misleading and deceptive claims.
CS 3043 Social Implications Of Computing
© 2007 Keith A. Pray
Colleagues
“Software engineers shall be fair to and supportive of their
colleagues (Baase, pg. 445).”
Help your colleagues
Be fair when asked to review something for a colleague
Do not take credit for what is not yours
Example: ???
© 2007 Keith A. Pray
Avoid harm to others
Be honest and trustworthy
Honor property rights including copyrights and patent
Give proper credit for intellectual property
Respect the privacy of others
Honor Confidentiality
*
*
We have material prepared by students for the topics in bold.
CS 3043 Social Implications Of Computing
© 2007 Keith A. Pray
Be fair and take action not to discriminate
Included in most professional codes of ethics, as well as many
personal ones
Incorporated into federal laws prohibiting discrimination by
employers
Discrimination lawsuits filed all the time
Computer industry prone to age discrimination, assumed older people
cant keep up with technology
Marshall Tanick, employment lawyer, says larger groups of
plaintiffs have greater chance of success
Does something become more unethical if you do it to more
people?
© 2007 Keith A. Pray
Be fair and take action not to discriminate.
This is one of the “General Moral Imperatives” in the ACM Code of
Ethics. What does it mean? Just what it says: Do not discriminate,
namely on the basis of race, sex, religion, age, disability, etc.
This moral guideline is found in many other places as well, such as
The Software Engineering Code of Ethics, the IEEE Code of Ethics,
and just about any ethical codes regarding a profession. It is also
a part of many people’s personal codes of ethics. This ethical
issue has been incorporated into numerous U.S. Federal laws
prohibiting discrimination by employers.
Being Federal law, examples of discrimination turn up all the time
in the form of lawsuits. In 2004 Best Buy was accused of laying off
IT workers over the age of 40 because they were too old. Also in
2004, two women filed suit against EMC on the grounds of sexual
discrimination. In 2003 an ex-employee of Sun Microsystems claimed
that the company laid off workers who were of older age or various
races in favor of young Indian workers. These kinds of
discrimination can be found everywhere, and can stem from racism,
religion, or monetary issues
ACM Code of Ethics, 1.4. Sara Baase, A Gift of Fire. Pearon
Education, 2003, p. 448.
Software Engineering Code of Ethics, 8.07. Sara Baase, A Gift of
Fire. Pearon Education, 2003, p. 445.
IEEE Code of Ethics. 2006. Accessed 11/6/07.
http://www.ieee.org/portal/pages/iportals/aboutus/ethics/code.html
Federal Laws Prohibiting Job Discrimination. 5/24/02. Accessed
11/6/07. http://www.eeoc.gov/facts/qanda.html
Being Federal law, examples of discrimination turn up all the time
in the form of lawsuits. In 2004 Best Buy was accused of laying off
IT workers over the age of 40 because they were too old. Also in
2004, two women filed suit against EMC on the grounds of sexual
discrimination. In 2003 an ex-employee of Sun Microsystems claimed
that the company laid off workers who were of older age or various
races in favor of young Indian workers. These kinds of
discrimination can be found everywhere, and can stem from racism,
religion, or monetary issues.
Carol Sliwa, Best Buy Hit With Lawsuit Over Layoffs of IT Workers.
11/22/04. Accessed 11/7/07.
http://www.computerworld.com/careertopics/careers/labor/story/0,10801,97691,00.html
Nancy Gohring, EMC could face class action discrimination lawsuit.
9/12/07. Accessed 11/7/07.
http://www.infoworld.com/article/07/09/12/EMC-could-face-class-action-discrimination-lawsuit_1.html
Lisa M. Bowman, Ex-Sun workers files discrimination suit. 3/18/03.
Accessed 11/7/07.
http://news.zdnet.co.uk/itmanagement/0,1000000308,2132173,00.htm?r=1
KAP: I don’t see specific example.
CS 3043 Social Implications Of Computing
© 2007 Keith A. Pray
Respect the privacy of others
AOL releases search information publicly for “research use” (Aug.
2006)
Data comprised 19 million Web searches performed by 658,000 users
from March through May
Google refused to submit similar information to the Department of
Justice (until compelled by court to comply)
HP private investigator got phone records of executives (Sep.
’06)
He posed as the people involved to access the information, without
their consent
Data submitted to the Attorney General of California
*
*
There have been two big issues regarding the respect for privacy
last
years. In one of them, AOL published the searches performed through
their
search engine, making them publicly available for research
purposes. Many
argued that this information must have been kept secret,and not
shared
with others. In another case, private investigators hired by HP to
look
into an internal information leakage suspicion unlawfully obtained
phone
records of HP's executives. They did this by impersonating them to
the
phone company, without having a warrant.
CS 3043 Social Implications Of Computing
© 2007 Keith A. Pray
Facebook's news feed privacy issue
Confidentiality breach
© 2007 Keith A. Pray
© 2007 Keith A. Pray
Why?
© 2007 Keith A. Pray
© 2007 Keith A. Pray
List stakeholders.
*
*
How do we formally reason about Ethics? Here’s a suggestion from
the book.
CS 3043 Social Implications Of Computing
© 2007 Keith A. Pray
Identify rights of stakeholders
Analyze each option.
*
*
How do we formally reason about Ethics? Here’s a suggestion from
the book.
CS 3043 Social Implications Of Computing
© 2007 Keith A. Pray
© 2007 Keith A. Pray
© 2007 Keith A. Pray
Answer short individual questions assigned during class.
© 2007 Keith A. Pray
© 2007 Keith A. Pray
Search online for information about yourself and post on
myWPI.
Create your own thread on the discussion board and list what you
found… or a brief description if you’d rather not share
details.
Can any of this data be used to cause harm?
Specify if you authorized use of the data?
If not, request its use be discontinued and post the
correspondence, minus any personal information you wish to
exclude.
Try digging deeper than a search engine’s (Google, etc.)
results.
Cite where Chapter 2 describes your experiences.
Try finding stuff out about your classmates and post what you find
and where to their threads.
© 2007 Keith A. Pray
*
*
*