SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Submitted by:-
Prakash Ata
M.pharm(Pharmaceutics)
1st year
PES Colleage Of Pharmacy
Facilitated By:
Dr. Manjula Talluri
Professor
Dept. Of Pharmaceutics
PES College Of Pharmacy,
Bangalore
1
CONTENT
 Introduction
 Ethical and unethical
 Philosophy and computer ethics
 Ethical issue
 Codes of conduct
 Summaries
 References
2
 Privacy
 liability
 Ownership
 power
INTRODUCTION
 Ethics is a set of moral principles that govern the behavior of a group
or individual.
 likewise, computer ethics is set of moral principles that regulate the
use of computers.
 In pharmaceutical research computers, computing technology, and
the consequent information systems have produced ethical challenges
and conflicts.
 The challenges and conflicts have been presented not only to
the practitioner facing new problems but also to the
professional philosopher dealing with computer use at a
conceptual level. 3
Cntd..
 The challenges and conflicts are not only individual, often arising from
practical experience, but also collective, involving judgments regarding
policy and procedure.
 If we propose to examine the ethics of computing in
pharmaceutical research and the challenges therein, then we
should begin the examination with an overview of how
philosophers regard computer ethics.
 After addressing the matter of how to regard computer ethics in
terms of its philosophical classification, we should identify the
issues and areas in which philosophers have shown the most
interest with regard to computer ethics, namely, the issues of
privacy, liability, ownership,and power.
4
Cntd..
 As we address these areas, we note problems more specific to the
computer user in pharmaceutical research and make suggestions about
the place of ethics in pharmaceutical research.
 Finally, we look at some codes of conduct relevant to the use of
computers.
5
ETHICAL AND UNETHICAL
 Basically Computer ethics are just knowing the difference between
ethical and unethical.
 For example,while it is easy to duplicate copyrighted electronic (or
digital)content, computer ethics would suggest that it is wrong to do so
without the author's approval.
 And while it may be possible to access someone's personal information
on a computer system, computer ethics would advise that such an action
is unethical.
6
Cntd..
 For example, according to one open source report, Chinese
hackers have taken as much as 6.5 terabytes of information from
a single company, although the name of the company was not
publicly disclosed. In 2015, Nordic countries pharmaceutical
companies were victimized by the cyber espionage efforts.
7
PHILOSOPHY AND COMPUTER ETHICS
 As a general observation, we can say that the philosophical community
was slow to understand the ethical and conceptual challenges posed by
the advent of computers.
 The issue of privacy, one of the most important and early issues to arise
with regard to computer use, was not a matter of debate on a national
level.
 Another reason philosophers were slow to provide ethical and
conceptual analysis regarding computer use is that, more often than
not, technology develops in a philosophical vacuum i.e. technology is
developed by people with little training, formal or informal, in
philosophy, including ethics.
8
Cntd..
 The ignorance of ethics on the part of technologists and computer gurus
mirrors the ignorance (and subsequent disinterest) of philosophers
about technology and technological development.
 Thus development occurs with unintended and unforeseen ethical
consequences.
 In making these observations, we may only be providing an echo of C. P.
Snow’s The Two Cultures, based on his Rede lecture for Cambridge
University.
 Snow’s main point was that the lack of communication between the
sciences and the humanities was a regrettable situation rife with
negative consequences.
9
Cntd..
 The Two Cultures was meant to be both an admonition to thinkers and
an invitation to have scientists and humanists work harder at
understanding each other.
 Snow followed that book with a modified version, The Two Cultures: A
Second Look. In this 1963 book, he suggested that a third culture would
soon be upon us.
 But if we have three cultures, those of the scientist, the humanist, and
the technologist, communication between the three could still improve
along the lines Snow suggested.
10
ETHICAL ISSUES: PRIVACY, LIABILITY, OWNERSHIP,
AND POWER
 The single best source for quick and reasonably thorough access to the
body of knowledge associated with computer ethics is Deborah
Johnson’s Computer Ethics (3rd edition, 2001).
 For one thing, the first part of the book presents a modest introduction
to the basic considerations that applied ethics most often employs,
namely,rights, justice, and utility.
 The concept of rights, which are an individual’s entitlements to those
liberties, choices, opportunities, and items having serious consequence
for human life, is precisely what privacy depends on for protection.
11
Cntd..
 The concept of justice, that is, the matter of giving each
person what is due that person, is necessarily connected to
the distribution of benefits and burdens, whatever they
might be and however they are conceived.
12
Privacy:
 There is a right to privacy that protects the sick individual’s medical
record from public release and thats the issue of privacy.
 The phrase “Big Brother is watching” meant that government officials
had control over information on citizens.
 The result is a demand to rethink privacy and rethink the framework of
applied ethics, especially because the scale of intrusion may change the
qualitative nature of the offense.
 More narrowly defined, the right to privacy is thought of as the right of
individuals to determine the nature, scope, and manner of information
revealed about themselves.
13
Cntd...
 The right to privacy is essentially a matter of an individual’s controlling
the information about himself or herself.
 Supplying information about an individual should be in the hands of
the individual.
 Philosophers have identified three general aspects with regard to the
right to privacy.
 For any intrusion into the right to privacy, the elements of relevance,
consent, and method must be considered.
14
Cntd..
 For instance, in employer-employee relationships, the employer may, at
times, investigate work-related problems by encroaching upon the
employee’s private life.
 Such “encroachments” must be relevant to the job the employee does.
 For matters relating to pharmaceutical research,the most likely problem
with regard to privacy is the possibility of learning more about an
individual than the scope of the research permits.
 Now, however, a huge information industry has evolved and the biggest
threats derive from private parties.
15
Cntd..
 Pharmaceutical researchers need not and ought not contribute to the
supply of information available about an individual.
 Furthermore, given the advent and techniques of data mining,
researchers should take precautions and build prohibitors into
research that would prevent identification of any individual subject
of the research.
16
Liability :
 Among the topics related to liability and computer use in general are
legal liability, the duty of honesty, the nature of contracts,
misrepresentation, express and implied warranties, and negligence.
 In the case of software written specifically for a certain research purpose,
the liability may not fall exclusively on the software provider.
 In those situations, it behooves the researcher to be very clear in
knowing and stating his or her purposes to the programmer.
 The fact that software is sold and used as a prepackaged item means that
strict liability obtains.
17
Cntd..
 In addition to the increased precision in the communication between
the researcher and the programmer, there will be an increase in the
accuracy of the data involved in the research.
 With the increased importance of accuracy, though, comes an increase
in knowledge about an individual.
 If the right to privacy demands protection,then there may need to be
strict limits on who has access to programs, especially programs
involving research.
 So, not only is there a need for technological “blockers” to protect
against intrusions into programs, policy and procedure must strictly
limit access to programs. 18
Ownership :
 Various devices have been used to encapsulate and resolve the question
of ownership of software.
 And, of course, the question of ownership is circumscribed by the right
to property.
 Devices such as copyrights, patents, encryption, trade secrets, and oaths
of confidentiality and standard virtues like trustworthiness and loyalty
have been tried to protect ownership and the right to property.
 In short, not only is there a need to communicate between the
researcher and the programmer for the sake of accuracy and
liability, there is a need to resolve the issue of property rights, too.
19
Cntd..
 It is worth noting that questions pertaining to liability for
malfunctioning programs also depend on the resolution of
ownership.
20
Power :
 Johnson identified the issue of power as a crucial matter for the
development of computer ethics.
 After stating that “power” may broadly be construed as any capacity,
Johnson analyzes computer use in terms of several topics, including the
matter of centralization or decentralization of power, computer use as
favoring the status quo, the embedded values in computer use and
programming.
 For instance, the answer to the empirical question of how the
permeation of computers affects the status quo or whether
computers contribute to the centralization or decentralization of
power will not resolve the questions of whether the status quo
should be maintained and whether centralization or
decentralization of power is the better arrangement.
21
CODES OF CONDUCT RELEVANT TO THE USE OF COMPUTERS
 A professional code of conduct serves several purposes:
 A recent study identified the ten most important behaviors that are
sanctionable offences in scientific research, and subsequently used this
list to survey scientists about whether they committed any of these
offences.
 To allow a profession to regulate itself.
 To state the agreed-upon values of a profession.
 To make members aware of issues to which they
might not otherwise be sensitized.
 To provide guidelines for ethical behavior.
22
Top Ten Offenses in Scientific Research:
1. Falsifying or “cooking” research data.
2. Ignoring major aspects of human-subject requirements.
3. Not properly disclosing involvement in firms whose products are
based on one’s own research.
4. Relationships with students, research subjects, or clients that may be
interpreted as questionable.
5. Using another’s ideas without obtaining permission or giving due
credit.
23
Cntd..
6. Unauthorized use of confidential information in connection with
7. Failing to present data that contradict one’s own previous research.
8. Circumventing certain minor aspects of human-subject
9. Overlooking others’ use of flawed data or questionable
10. Changing the design, methodology, or results of a study in response
one’s own research.
requirements.
interpretation of data.
to pressure from a funding source. 24
Computing Organizations with Codes of Conduct:
25
SUMMARY
 The applications of computing technology have created new situations
involving ethical challenges and conflicts.
 However, there are four common issues in computer ethics:
privacy, liability, ownership, and power.
 One can consider three ethical frameworks in examining ethical
conflicts: rights (of individuals), justice (fairness), and
consequentialism (utility).
 Researchers who use computer technology in pharmaceutical
research must be aware of the issues of computer ethics in
addition to other issues of conducting pharmaceutical research.
26
Cntd..
 Codes of conduct such as the one developed by
ACM(Association For Computing Machinary) can help
provide guidelines for ethical computing in pharmaceutical
research.
27
REFERENCE
 Computer applications in pharmaceutical research and devolopment,
by SEAN EKINS, A JOHN WILEY & SONS, INC., PUBLICATION, Page
no. 715-726.
 https://www.csoonline.com/article/3084655/cyber-threats-and-
pharmaceuticals.html
28
29

Weitere ähnliche Inhalte

Was ist angesagt?

Computational modelling of drug disposition
Computational modelling of drug disposition Computational modelling of drug disposition
Computational modelling of drug disposition lalitajoshi9
 
Gastric absorption simulation
Gastric absorption simulation Gastric absorption simulation
Gastric absorption simulation SagarBhor5
 
Ethics of computing in pharmaceutical research
Ethics of computing in pharmaceutical researchEthics of computing in pharmaceutical research
Ethics of computing in pharmaceutical researchSUJITHA MARY
 
Artificial intelligence robotics and computational fluid dynamics
Artificial intelligence robotics and computational fluid dynamics Artificial intelligence robotics and computational fluid dynamics
Artificial intelligence robotics and computational fluid dynamics Chandrakant Kharude
 
GIT Absorption Simulation
GIT Absorption SimulationGIT Absorption Simulation
GIT Absorption SimulationJaskiranKaur72
 
Computational modeling in drug disposition
Computational modeling in drug dispositionComputational modeling in drug disposition
Computational modeling in drug dispositionHimal Barakoti
 
Computers in Pharmaceutical formulation
Computers in Pharmaceutical formulationComputers in Pharmaceutical formulation
Computers in Pharmaceutical formulationsonalsuryawanshi2
 
Electrosomes preparation and application
Electrosomes preparation and applicationElectrosomes preparation and application
Electrosomes preparation and applicationmahesh745
 
computer in market analysis
computer in market analysiscomputer in market analysis
computer in market analysissuresh gautam
 
computer simulation in pharmacokinetics and pharmacodynamics
 computer simulation in pharmacokinetics and pharmacodynamics computer simulation in pharmacokinetics and pharmacodynamics
computer simulation in pharmacokinetics and pharmacodynamicsSUJITHA MARY
 
Biopharmaceutical system , methods of permeability , generic biologics, gener...
Biopharmaceutical system , methods of permeability , generic biologics, gener...Biopharmaceutical system , methods of permeability , generic biologics, gener...
Biopharmaceutical system , methods of permeability , generic biologics, gener...Siddhapura Pratik
 
LEGAL PROTECTION OF INNOVATIVE USES OF COMPUTERS IN R & D.pptx
LEGAL PROTECTION OF INNOVATIVE USES OF COMPUTERS IN R & D.pptxLEGAL PROTECTION OF INNOVATIVE USES OF COMPUTERS IN R & D.pptx
LEGAL PROTECTION OF INNOVATIVE USES OF COMPUTERS IN R & D.pptxTanvi Mhashakhetri
 
Statistical modeling in pharmaceutical research and development
Statistical modeling in pharmaceutical research and developmentStatistical modeling in pharmaceutical research and development
Statistical modeling in pharmaceutical research and developmentPV. Viji
 
COMPUTER SIMULATIONS IN PHARMACOKINETICS & PHARMACODYNAMICS
COMPUTER SIMULATIONS  IN  PHARMACOKINETICS & PHARMACODYNAMICSCOMPUTER SIMULATIONS  IN  PHARMACOKINETICS & PHARMACODYNAMICS
COMPUTER SIMULATIONS IN PHARMACOKINETICS & PHARMACODYNAMICSsagartrivedi14
 
REGULATORY AND INDUSTRY VIEWS ON QbD, SCIENTIFICALLY BASED QbD- EXAMPLES OF A...
REGULATORY AND INDUSTRY VIEWS ON QbD, SCIENTIFICALLY BASED QbD- EXAMPLES OF A...REGULATORY AND INDUSTRY VIEWS ON QbD, SCIENTIFICALLY BASED QbD- EXAMPLES OF A...
REGULATORY AND INDUSTRY VIEWS ON QbD, SCIENTIFICALLY BASED QbD- EXAMPLES OF A...Ardra Krishna
 
Computational modeling of drug disposition
Computational modeling of drug dispositionComputational modeling of drug disposition
Computational modeling of drug dispositionSupriya hiremath
 
Tumour targeting and Brain specific drug delivery
Tumour targeting and Brain specific drug deliveryTumour targeting and Brain specific drug delivery
Tumour targeting and Brain specific drug deliverySHUBHAMGWAGH
 

Was ist angesagt? (20)

Computational modelling of drug disposition
Computational modelling of drug disposition Computational modelling of drug disposition
Computational modelling of drug disposition
 
Gastric absorption simulation
Gastric absorption simulation Gastric absorption simulation
Gastric absorption simulation
 
Ethics of computing in pharmaceutical research
Ethics of computing in pharmaceutical researchEthics of computing in pharmaceutical research
Ethics of computing in pharmaceutical research
 
Artificial intelligence robotics and computational fluid dynamics
Artificial intelligence robotics and computational fluid dynamics Artificial intelligence robotics and computational fluid dynamics
Artificial intelligence robotics and computational fluid dynamics
 
GIT Absorption Simulation
GIT Absorption SimulationGIT Absorption Simulation
GIT Absorption Simulation
 
Computational modeling in drug disposition
Computational modeling in drug dispositionComputational modeling in drug disposition
Computational modeling in drug disposition
 
Computers in Pharmaceutical formulation
Computers in Pharmaceutical formulationComputers in Pharmaceutical formulation
Computers in Pharmaceutical formulation
 
Electrosomes preparation and application
Electrosomes preparation and applicationElectrosomes preparation and application
Electrosomes preparation and application
 
computer in market analysis
computer in market analysiscomputer in market analysis
computer in market analysis
 
computer simulation in pharmacokinetics and pharmacodynamics
 computer simulation in pharmacokinetics and pharmacodynamics computer simulation in pharmacokinetics and pharmacodynamics
computer simulation in pharmacokinetics and pharmacodynamics
 
Biopharmaceutical system , methods of permeability , generic biologics, gener...
Biopharmaceutical system , methods of permeability , generic biologics, gener...Biopharmaceutical system , methods of permeability , generic biologics, gener...
Biopharmaceutical system , methods of permeability , generic biologics, gener...
 
LEGAL PROTECTION OF INNOVATIVE USES OF COMPUTERS IN R & D.pptx
LEGAL PROTECTION OF INNOVATIVE USES OF COMPUTERS IN R & D.pptxLEGAL PROTECTION OF INNOVATIVE USES OF COMPUTERS IN R & D.pptx
LEGAL PROTECTION OF INNOVATIVE USES OF COMPUTERS IN R & D.pptx
 
Statistical modeling in pharmaceutical research and development
Statistical modeling in pharmaceutical research and developmentStatistical modeling in pharmaceutical research and development
Statistical modeling in pharmaceutical research and development
 
Active transport
Active transportActive transport
Active transport
 
Cosmetic regulatory
Cosmetic regulatoryCosmetic regulatory
Cosmetic regulatory
 
COMPUTER SIMULATIONS IN PHARMACOKINETICS & PHARMACODYNAMICS
COMPUTER SIMULATIONS  IN  PHARMACOKINETICS & PHARMACODYNAMICSCOMPUTER SIMULATIONS  IN  PHARMACOKINETICS & PHARMACODYNAMICS
COMPUTER SIMULATIONS IN PHARMACOKINETICS & PHARMACODYNAMICS
 
REGULATORY AND INDUSTRY VIEWS ON QbD, SCIENTIFICALLY BASED QbD- EXAMPLES OF A...
REGULATORY AND INDUSTRY VIEWS ON QbD, SCIENTIFICALLY BASED QbD- EXAMPLES OF A...REGULATORY AND INDUSTRY VIEWS ON QbD, SCIENTIFICALLY BASED QbD- EXAMPLES OF A...
REGULATORY AND INDUSTRY VIEWS ON QbD, SCIENTIFICALLY BASED QbD- EXAMPLES OF A...
 
Computational modeling of drug disposition
Computational modeling of drug dispositionComputational modeling of drug disposition
Computational modeling of drug disposition
 
Tumour targeting and Brain specific drug delivery
Tumour targeting and Brain specific drug deliveryTumour targeting and Brain specific drug delivery
Tumour targeting and Brain specific drug delivery
 
History of computers in pharmaceutical research & development
History of computers in pharmaceutical research & developmentHistory of computers in pharmaceutical research & development
History of computers in pharmaceutical research & development
 

Ähnlich wie Ethics of computer

Computers in Pharmaceutical Formulations - Final.pptx
Computers in Pharmaceutical Formulations - Final.pptxComputers in Pharmaceutical Formulations - Final.pptx
Computers in Pharmaceutical Formulations - Final.pptxMittalGandhi
 
Ethics of computing in pharmaceutical research
Ethics of computing in pharmaceutical researchEthics of computing in pharmaceutical research
Ethics of computing in pharmaceutical researchsuresh gautam
 
The ethics of computing in pharmaceutical research.pptx
The ethics of computing in pharmaceutical research.pptxThe ethics of computing in pharmaceutical research.pptx
The ethics of computing in pharmaceutical research.pptxThirumaniPoovalingam
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networksHarshitha Reddy
 
INTRODUCTION This chapter will focus on the causes o.docx
     INTRODUCTION  This chapter will focus on the causes o.docx     INTRODUCTION  This chapter will focus on the causes o.docx
INTRODUCTION This chapter will focus on the causes o.docxhallettfaustina
 
Are computer hacker break ins ethical
Are computer hacker break ins ethicalAre computer hacker break ins ethical
Are computer hacker break ins ethicalUltraUploader
 
Project DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxProject DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxbriancrawford30935
 
Strategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxStrategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxjohniemcm5zt
 
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...UKSG: connecting the knowledge community
 
Privacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengePrivacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengedmcmenemy
 
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCEHUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCEeraser Juan José Calderón
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin itRushana Bandara
 
Childhood Essay. Essay About My Childhood
Childhood Essay. Essay About My ChildhoodChildhood Essay. Essay About My Childhood
Childhood Essay. Essay About My ChildhoodOlga Valentin
 
Information ethics
Information ethicsInformation ethics
Information ethicsomercomail
 

Ähnlich wie Ethics of computer (20)

Computers in Pharmaceutical Formulations - Final.pptx
Computers in Pharmaceutical Formulations - Final.pptxComputers in Pharmaceutical Formulations - Final.pptx
Computers in Pharmaceutical Formulations - Final.pptx
 
Ethics of computing in pharmaceutical research
Ethics of computing in pharmaceutical researchEthics of computing in pharmaceutical research
Ethics of computing in pharmaceutical research
 
The ethics of computing in pharmaceutical research.pptx
The ethics of computing in pharmaceutical research.pptxThe ethics of computing in pharmaceutical research.pptx
The ethics of computing in pharmaceutical research.pptx
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
INTRODUCTION This chapter will focus on the causes o.docx
     INTRODUCTION  This chapter will focus on the causes o.docx     INTRODUCTION  This chapter will focus on the causes o.docx
INTRODUCTION This chapter will focus on the causes o.docx
 
Are computer hacker break ins ethical
Are computer hacker break ins ethicalAre computer hacker break ins ethical
Are computer hacker break ins ethical
 
Review questions
Review questionsReview questions
Review questions
 
Project DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxProject DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docx
 
Strategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxStrategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docx
 
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
 
Privacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengePrivacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challenge
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCEHUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
 
computer ethics
computer ethicscomputer ethics
computer ethics
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
Childhood Essay. Essay About My Childhood
Childhood Essay. Essay About My ChildhoodChildhood Essay. Essay About My Childhood
Childhood Essay. Essay About My Childhood
 
code of etchics
code of etchicscode of etchics
code of etchics
 
Information ethics
Information ethicsInformation ethics
Information ethics
 
9th
9th9th
9th
 
CBSE Open Textbook English
CBSE Open Textbook EnglishCBSE Open Textbook English
CBSE Open Textbook English
 

Kürzlich hochgeladen

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 

Kürzlich hochgeladen (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

Ethics of computer

  • 1. Submitted by:- Prakash Ata M.pharm(Pharmaceutics) 1st year PES Colleage Of Pharmacy Facilitated By: Dr. Manjula Talluri Professor Dept. Of Pharmaceutics PES College Of Pharmacy, Bangalore 1
  • 2. CONTENT  Introduction  Ethical and unethical  Philosophy and computer ethics  Ethical issue  Codes of conduct  Summaries  References 2  Privacy  liability  Ownership  power
  • 3. INTRODUCTION  Ethics is a set of moral principles that govern the behavior of a group or individual.  likewise, computer ethics is set of moral principles that regulate the use of computers.  In pharmaceutical research computers, computing technology, and the consequent information systems have produced ethical challenges and conflicts.  The challenges and conflicts have been presented not only to the practitioner facing new problems but also to the professional philosopher dealing with computer use at a conceptual level. 3
  • 4. Cntd..  The challenges and conflicts are not only individual, often arising from practical experience, but also collective, involving judgments regarding policy and procedure.  If we propose to examine the ethics of computing in pharmaceutical research and the challenges therein, then we should begin the examination with an overview of how philosophers regard computer ethics.  After addressing the matter of how to regard computer ethics in terms of its philosophical classification, we should identify the issues and areas in which philosophers have shown the most interest with regard to computer ethics, namely, the issues of privacy, liability, ownership,and power. 4
  • 5. Cntd..  As we address these areas, we note problems more specific to the computer user in pharmaceutical research and make suggestions about the place of ethics in pharmaceutical research.  Finally, we look at some codes of conduct relevant to the use of computers. 5
  • 6. ETHICAL AND UNETHICAL  Basically Computer ethics are just knowing the difference between ethical and unethical.  For example,while it is easy to duplicate copyrighted electronic (or digital)content, computer ethics would suggest that it is wrong to do so without the author's approval.  And while it may be possible to access someone's personal information on a computer system, computer ethics would advise that such an action is unethical. 6
  • 7. Cntd..  For example, according to one open source report, Chinese hackers have taken as much as 6.5 terabytes of information from a single company, although the name of the company was not publicly disclosed. In 2015, Nordic countries pharmaceutical companies were victimized by the cyber espionage efforts. 7
  • 8. PHILOSOPHY AND COMPUTER ETHICS  As a general observation, we can say that the philosophical community was slow to understand the ethical and conceptual challenges posed by the advent of computers.  The issue of privacy, one of the most important and early issues to arise with regard to computer use, was not a matter of debate on a national level.  Another reason philosophers were slow to provide ethical and conceptual analysis regarding computer use is that, more often than not, technology develops in a philosophical vacuum i.e. technology is developed by people with little training, formal or informal, in philosophy, including ethics. 8
  • 9. Cntd..  The ignorance of ethics on the part of technologists and computer gurus mirrors the ignorance (and subsequent disinterest) of philosophers about technology and technological development.  Thus development occurs with unintended and unforeseen ethical consequences.  In making these observations, we may only be providing an echo of C. P. Snow’s The Two Cultures, based on his Rede lecture for Cambridge University.  Snow’s main point was that the lack of communication between the sciences and the humanities was a regrettable situation rife with negative consequences. 9
  • 10. Cntd..  The Two Cultures was meant to be both an admonition to thinkers and an invitation to have scientists and humanists work harder at understanding each other.  Snow followed that book with a modified version, The Two Cultures: A Second Look. In this 1963 book, he suggested that a third culture would soon be upon us.  But if we have three cultures, those of the scientist, the humanist, and the technologist, communication between the three could still improve along the lines Snow suggested. 10
  • 11. ETHICAL ISSUES: PRIVACY, LIABILITY, OWNERSHIP, AND POWER  The single best source for quick and reasonably thorough access to the body of knowledge associated with computer ethics is Deborah Johnson’s Computer Ethics (3rd edition, 2001).  For one thing, the first part of the book presents a modest introduction to the basic considerations that applied ethics most often employs, namely,rights, justice, and utility.  The concept of rights, which are an individual’s entitlements to those liberties, choices, opportunities, and items having serious consequence for human life, is precisely what privacy depends on for protection. 11
  • 12. Cntd..  The concept of justice, that is, the matter of giving each person what is due that person, is necessarily connected to the distribution of benefits and burdens, whatever they might be and however they are conceived. 12
  • 13. Privacy:  There is a right to privacy that protects the sick individual’s medical record from public release and thats the issue of privacy.  The phrase “Big Brother is watching” meant that government officials had control over information on citizens.  The result is a demand to rethink privacy and rethink the framework of applied ethics, especially because the scale of intrusion may change the qualitative nature of the offense.  More narrowly defined, the right to privacy is thought of as the right of individuals to determine the nature, scope, and manner of information revealed about themselves. 13
  • 14. Cntd...  The right to privacy is essentially a matter of an individual’s controlling the information about himself or herself.  Supplying information about an individual should be in the hands of the individual.  Philosophers have identified three general aspects with regard to the right to privacy.  For any intrusion into the right to privacy, the elements of relevance, consent, and method must be considered. 14
  • 15. Cntd..  For instance, in employer-employee relationships, the employer may, at times, investigate work-related problems by encroaching upon the employee’s private life.  Such “encroachments” must be relevant to the job the employee does.  For matters relating to pharmaceutical research,the most likely problem with regard to privacy is the possibility of learning more about an individual than the scope of the research permits.  Now, however, a huge information industry has evolved and the biggest threats derive from private parties. 15
  • 16. Cntd..  Pharmaceutical researchers need not and ought not contribute to the supply of information available about an individual.  Furthermore, given the advent and techniques of data mining, researchers should take precautions and build prohibitors into research that would prevent identification of any individual subject of the research. 16
  • 17. Liability :  Among the topics related to liability and computer use in general are legal liability, the duty of honesty, the nature of contracts, misrepresentation, express and implied warranties, and negligence.  In the case of software written specifically for a certain research purpose, the liability may not fall exclusively on the software provider.  In those situations, it behooves the researcher to be very clear in knowing and stating his or her purposes to the programmer.  The fact that software is sold and used as a prepackaged item means that strict liability obtains. 17
  • 18. Cntd..  In addition to the increased precision in the communication between the researcher and the programmer, there will be an increase in the accuracy of the data involved in the research.  With the increased importance of accuracy, though, comes an increase in knowledge about an individual.  If the right to privacy demands protection,then there may need to be strict limits on who has access to programs, especially programs involving research.  So, not only is there a need for technological “blockers” to protect against intrusions into programs, policy and procedure must strictly limit access to programs. 18
  • 19. Ownership :  Various devices have been used to encapsulate and resolve the question of ownership of software.  And, of course, the question of ownership is circumscribed by the right to property.  Devices such as copyrights, patents, encryption, trade secrets, and oaths of confidentiality and standard virtues like trustworthiness and loyalty have been tried to protect ownership and the right to property.  In short, not only is there a need to communicate between the researcher and the programmer for the sake of accuracy and liability, there is a need to resolve the issue of property rights, too. 19
  • 20. Cntd..  It is worth noting that questions pertaining to liability for malfunctioning programs also depend on the resolution of ownership. 20
  • 21. Power :  Johnson identified the issue of power as a crucial matter for the development of computer ethics.  After stating that “power” may broadly be construed as any capacity, Johnson analyzes computer use in terms of several topics, including the matter of centralization or decentralization of power, computer use as favoring the status quo, the embedded values in computer use and programming.  For instance, the answer to the empirical question of how the permeation of computers affects the status quo or whether computers contribute to the centralization or decentralization of power will not resolve the questions of whether the status quo should be maintained and whether centralization or decentralization of power is the better arrangement. 21
  • 22. CODES OF CONDUCT RELEVANT TO THE USE OF COMPUTERS  A professional code of conduct serves several purposes:  A recent study identified the ten most important behaviors that are sanctionable offences in scientific research, and subsequently used this list to survey scientists about whether they committed any of these offences.  To allow a profession to regulate itself.  To state the agreed-upon values of a profession.  To make members aware of issues to which they might not otherwise be sensitized.  To provide guidelines for ethical behavior. 22
  • 23. Top Ten Offenses in Scientific Research: 1. Falsifying or “cooking” research data. 2. Ignoring major aspects of human-subject requirements. 3. Not properly disclosing involvement in firms whose products are based on one’s own research. 4. Relationships with students, research subjects, or clients that may be interpreted as questionable. 5. Using another’s ideas without obtaining permission or giving due credit. 23
  • 24. Cntd.. 6. Unauthorized use of confidential information in connection with 7. Failing to present data that contradict one’s own previous research. 8. Circumventing certain minor aspects of human-subject 9. Overlooking others’ use of flawed data or questionable 10. Changing the design, methodology, or results of a study in response one’s own research. requirements. interpretation of data. to pressure from a funding source. 24
  • 25. Computing Organizations with Codes of Conduct: 25
  • 26. SUMMARY  The applications of computing technology have created new situations involving ethical challenges and conflicts.  However, there are four common issues in computer ethics: privacy, liability, ownership, and power.  One can consider three ethical frameworks in examining ethical conflicts: rights (of individuals), justice (fairness), and consequentialism (utility).  Researchers who use computer technology in pharmaceutical research must be aware of the issues of computer ethics in addition to other issues of conducting pharmaceutical research. 26
  • 27. Cntd..  Codes of conduct such as the one developed by ACM(Association For Computing Machinary) can help provide guidelines for ethical computing in pharmaceutical research. 27
  • 28. REFERENCE  Computer applications in pharmaceutical research and devolopment, by SEAN EKINS, A JOHN WILEY & SONS, INC., PUBLICATION, Page no. 715-726.  https://www.csoonline.com/article/3084655/cyber-threats-and- pharmaceuticals.html 28
  • 29. 29