SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Lecture 06
Cyberethics
Uniqueness Issue (Continued)
• Traditionalists and uniqueness proponents are
each partly correct.
• Traditionalists correctly point out that no new
ethical issues have been introduced by
computers.
• Uniqueness proponents are correct in that
cybertechnology has complicated our analysis
of traditional ethical issues.
Uniqueness Issue (Continued)
• So we must distinguish between: (a) unique
technological features, and (b) any (alleged)
unique ethical issues.
• Two scenarios from the text:
– (a) Computer professionals designing and coding a
controversial computer system
– (b) Software piracy
Case Illustration of a Policy Vacuum:
Duplicating Software
• In the early 1980s, there were no clear laws
regarding the duplication of software
programs, which was made easy because of
personal computers.
• A policy vacuum arose.
• Before the policy vacuum could be filled, we
had to clear up a conceptual muddle: What
exactly is software?
Cyberethics as a Branch of Applied
Ethics
• Applied ethics, unlike theoretical ethics, examines
"practical" ethical issues.
• It analyzes moral issues from the vantage-point of
one or more ethical theories.
• Ethicists working in fields of applied ethics are more
interested in applying ethical theories to the analysis
of specific moral problems than in debating the
ethical theories themselves.
Cyberethics as a Branch of Applied
Ethics (continued)
• Three distinct perspectives of applied ethics
(as applied to cyberethics):
• Professional Ethics
• Philosophical Ethics
• Descriptive Ethics
Perspective # 1: Professional Ethics
• According to this view, cyberethics is the field that
identifies and analyzes issues of ethical responsibility
for computer professionals.
• Consider a computer professional's role in designing,
developing, and maintaining computer hardware and
software systems.
– Suppose a programmer discovers that a software product
she has been working on is about to be released for sale to
the public, even though it is unreliable because it contains
"buggy" software.
– Should she "blow the whistle?"
Perspective # 2: Philosophical Ethics
 From this perspective, cyberethics is a field of
philosophical analysis and inquiry that goes beyond
professional ethics (Gotterbarn).
 Moor (1985), defines computer ethics as:
– ...the analysis of the nature and social impact of computer
technology and the corresponding formulation and
justification of policies for the ethical use of such
technology. [Italics Added.]
Perspective #3: Cyberethics as a Field of
Descriptive Ethics
• The professional and philosophical perspectives both
illustrate normative inquiries into applied ethics
issues.
• Normative inquiries or studies are contrasted with
descriptive studies.
• Descriptive investigations report about "what is the
case“; normative inquiries evaluate situations from
the vantage-point of the question: "what ought to be
the case."
Descriptive Ethics Perspective
(continued)
• Scenario: A community’s workforce and the
introduction of a new technology.
• Suppose a new technology displaces 8,000 workers
in a community.
• If we analyze the issues solely in terms of the
number of jobs that were gained or lost in that
community, our investigation is essentially
descriptive in nature.
• We are simply describing an impact that technology
X has for Community Y.
Descriptive Ethics Perspective
(continued)
• Descriptive vs. Normative Claims
• Consider three assertions:
– (1) "Bill Gates served as the Chief Executive Officer of Microsoft
Corporation for many years.”
– (2) "Bill Gates should expand Microsoft’s product offerings.“
– (3) “Bill Gates should not engage in business practices that are unfair
to competitors.”
 Claims (2) And (3) are normative, (1) is descriptive;
(2) is normative but nonmoral, while (3) is both
normative and moral.
Figure 1-1: Descriptive vs.
Normative Claims
Descriptive Normative
(Report or describe what is the case) (Prescribe what ought to be the case)
Non-moral Moral
Prescribe or evaluate
in matters involving
standards such as art and sports
(e.g., criteria for a good painting
or an outstanding athlete).
Prescribe or evaluate
in matters having to
do with fairness and
Obligation (e.g., criteria
for just and unjust
actions and policies).
Some Benefits of Using the
Descriptive Approach
• Huff & Finholt (1994) claim that when we understand
the descriptive aspect of social effects of technology,
the normative ethical issues become clearer.
• The descriptive perspective prepare us for our
subsequent analysis of ethical issues that affect our
system of policies and laws.
Table 1-2: Summary of
Cyberethics Perspectives
Type of Perspective Associated
Disciplines
Issues Examined
Professional Computer Science
Engineering
Library/Information
Science
Professional Responsibility
System Reliability/Safety
Codes of Conduct
Philosophical Philosophy
Law
Privacy & Anonymity
Intellectual Property
Free Speech
Descriptive Sociology
Behavioral Sciences
Impact of cybertechnology
on governmental/financial/
educational institutions and
socio-demographic groups
Is Cyber-technology Neutral?
• Technology seems neutral, at least initially.
• Consider the cliché: “Guns don’t kill people, people
kill people.”
• Corlann Gee Bush (19997) argues that gun
technology, like all technologies, is biased in certain
directions.
• She points out that certain features inherent in gun
technology itself cause guns to be biased in a
direction towards violence.

Weitere ähnliche Inhalte

Was ist angesagt?

Intellectual property rights (IPR) and digital
Intellectual property rights (IPR) and digitalIntellectual property rights (IPR) and digital
Intellectual property rights (IPR) and digital
Dheeraj Negi
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer Ethics
Scøtt Lıgøckı
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 

Was ist angesagt? (20)

Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Intellectual property rights (IPR) and digital
Intellectual property rights (IPR) and digitalIntellectual property rights (IPR) and digital
Intellectual property rights (IPR) and digital
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Are Computer Ethical Issues Unique ?
Are Computer Ethical Issues Unique ?Are Computer Ethical Issues Unique ?
Are Computer Ethical Issues Unique ?
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer Ethics
 
Chapter 8 securing information systems
Chapter 8 securing information systemsChapter 8 securing information systems
Chapter 8 securing information systems
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
The Future of the Internet
The Future of the Internet The Future of the Internet
The Future of the Internet
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 

Andere mochten auch

Andere mochten auch (20)

PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
 
PPIT Lecture 10
PPIT Lecture 10PPIT Lecture 10
PPIT Lecture 10
 
PPIT Lecture 1
PPIT Lecture 1PPIT Lecture 1
PPIT Lecture 1
 
PPIT Lecture 2
PPIT Lecture 2PPIT Lecture 2
PPIT Lecture 2
 
PPIT Lecture 18
PPIT Lecture 18PPIT Lecture 18
PPIT Lecture 18
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
PPIT Lecture 4
PPIT Lecture 4PPIT Lecture 4
PPIT Lecture 4
 
The calendar of events october 6 - october 12
The calendar of events october 6 - october 12The calendar of events october 6 - october 12
The calendar of events october 6 - october 12
 
Metal
MetalMetal
Metal
 
Sigmund freud
Sigmund freudSigmund freud
Sigmund freud
 
5 ALWAN
5 ALWAN5 ALWAN
5 ALWAN
 
Data Driven Product Design
Data Driven Product DesignData Driven Product Design
Data Driven Product Design
 
Offer cue The marketplace that changes everything
Offer cue The marketplace that changes everythingOffer cue The marketplace that changes everything
Offer cue The marketplace that changes everything
 
Appraisal method
Appraisal  methodAppraisal  method
Appraisal method
 
Frundraise: Run for it
Frundraise: Run for itFrundraise: Run for it
Frundraise: Run for it
 
Media powerpoint q magazine
Media powerpoint q magazineMedia powerpoint q magazine
Media powerpoint q magazine
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
The calendar of events october 20 - 26
The calendar of events october 20 - 26The calendar of events october 20 - 26
The calendar of events october 20 - 26
 
The Fableists ‘Epic Thread’ Storyboards
The Fableists ‘Epic Thread’ StoryboardsThe Fableists ‘Epic Thread’ Storyboards
The Fableists ‘Epic Thread’ Storyboards
 
Testing
TestingTesting
Testing
 

Ähnlich wie PPIT Lecture 06

Strategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxStrategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docx
johniemcm5zt
 
CSC_402_Social_and_Professional_Issues_i.ppt
CSC_402_Social_and_Professional_Issues_i.pptCSC_402_Social_and_Professional_Issues_i.ppt
CSC_402_Social_and_Professional_Issues_i.ppt
NonSy1
 
Objective There are two high-level objectives in this project ass.docx
Objective There are two high-level objectives in this project ass.docxObjective There are two high-level objectives in this project ass.docx
Objective There are two high-level objectives in this project ass.docx
juliennehar
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docx
patricke8
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docx
mccormicknadine86
 
Computer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information TechnologyComputer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information Technology
LinaCovington707
 
Picture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docxPicture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docx
mattjtoni51554
 
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma  Identity TheftStakeholdersConfidentiality.docxEthical dilemma  Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
humphrieskalyn
 

Ähnlich wie PPIT Lecture 06 (20)

Strategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxStrategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docx
 
SIP report.pptx
SIP report.pptxSIP report.pptx
SIP report.pptx
 
CSC_402_Social_and_Professional_Issues_i.ppt
CSC_402_Social_and_Professional_Issues_i.pptCSC_402_Social_and_Professional_Issues_i.ppt
CSC_402_Social_and_Professional_Issues_i.ppt
 
An ABC of cyberethics
An ABC of cyberethicsAn ABC of cyberethics
An ABC of cyberethics
 
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...
LEGISLATIVE COORDINATION AND CONCILIATIONS SCIENCE AND TECHNOLOGY OPTIONS ASS...
 
Objective There are two high-level objectives in this project ass.docx
Objective There are two high-level objectives in this project ass.docxObjective There are two high-level objectives in this project ass.docx
Objective There are two high-level objectives in this project ass.docx
 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docx
 
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docxComputer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docx
 
Computer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information TechnologyComputer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information Technology
 
Picture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docxPicture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docx
 
ethics.ppt
ethics.pptethics.ppt
ethics.ppt
 
P.p lect1-
P.p lect1-P.p lect1-
P.p lect1-
 
Introduction to modern computerethics.ppt
Introduction to modern  computerethics.pptIntroduction to modern  computerethics.ppt
Introduction to modern computerethics.ppt
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
 
Lecture 1 introduction to course
Lecture 1 introduction to courseLecture 1 introduction to course
Lecture 1 introduction to course
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Context, Causality, and Information Flow: Implications for Privacy Engineerin...
Context, Causality, and Information Flow: Implications for Privacy Engineerin...Context, Causality, and Information Flow: Implications for Privacy Engineerin...
Context, Causality, and Information Flow: Implications for Privacy Engineerin...
 
General studies with Integration of ethics with ICT.pptx
General studies with Integration of ethics with ICT.pptxGeneral studies with Integration of ethics with ICT.pptx
General studies with Integration of ethics with ICT.pptx
 
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma  Identity TheftStakeholdersConfidentiality.docxEthical dilemma  Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
 

Kürzlich hochgeladen

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 

Kürzlich hochgeladen (20)

The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 

PPIT Lecture 06

  • 2. Uniqueness Issue (Continued) • Traditionalists and uniqueness proponents are each partly correct. • Traditionalists correctly point out that no new ethical issues have been introduced by computers. • Uniqueness proponents are correct in that cybertechnology has complicated our analysis of traditional ethical issues.
  • 3. Uniqueness Issue (Continued) • So we must distinguish between: (a) unique technological features, and (b) any (alleged) unique ethical issues. • Two scenarios from the text: – (a) Computer professionals designing and coding a controversial computer system – (b) Software piracy
  • 4. Case Illustration of a Policy Vacuum: Duplicating Software • In the early 1980s, there were no clear laws regarding the duplication of software programs, which was made easy because of personal computers. • A policy vacuum arose. • Before the policy vacuum could be filled, we had to clear up a conceptual muddle: What exactly is software?
  • 5. Cyberethics as a Branch of Applied Ethics • Applied ethics, unlike theoretical ethics, examines "practical" ethical issues. • It analyzes moral issues from the vantage-point of one or more ethical theories. • Ethicists working in fields of applied ethics are more interested in applying ethical theories to the analysis of specific moral problems than in debating the ethical theories themselves.
  • 6. Cyberethics as a Branch of Applied Ethics (continued) • Three distinct perspectives of applied ethics (as applied to cyberethics): • Professional Ethics • Philosophical Ethics • Descriptive Ethics
  • 7. Perspective # 1: Professional Ethics • According to this view, cyberethics is the field that identifies and analyzes issues of ethical responsibility for computer professionals. • Consider a computer professional's role in designing, developing, and maintaining computer hardware and software systems. – Suppose a programmer discovers that a software product she has been working on is about to be released for sale to the public, even though it is unreliable because it contains "buggy" software. – Should she "blow the whistle?"
  • 8. Perspective # 2: Philosophical Ethics  From this perspective, cyberethics is a field of philosophical analysis and inquiry that goes beyond professional ethics (Gotterbarn).  Moor (1985), defines computer ethics as: – ...the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology. [Italics Added.]
  • 9. Perspective #3: Cyberethics as a Field of Descriptive Ethics • The professional and philosophical perspectives both illustrate normative inquiries into applied ethics issues. • Normative inquiries or studies are contrasted with descriptive studies. • Descriptive investigations report about "what is the case“; normative inquiries evaluate situations from the vantage-point of the question: "what ought to be the case."
  • 10. Descriptive Ethics Perspective (continued) • Scenario: A community’s workforce and the introduction of a new technology. • Suppose a new technology displaces 8,000 workers in a community. • If we analyze the issues solely in terms of the number of jobs that were gained or lost in that community, our investigation is essentially descriptive in nature. • We are simply describing an impact that technology X has for Community Y.
  • 11. Descriptive Ethics Perspective (continued) • Descriptive vs. Normative Claims • Consider three assertions: – (1) "Bill Gates served as the Chief Executive Officer of Microsoft Corporation for many years.” – (2) "Bill Gates should expand Microsoft’s product offerings.“ – (3) “Bill Gates should not engage in business practices that are unfair to competitors.”  Claims (2) And (3) are normative, (1) is descriptive; (2) is normative but nonmoral, while (3) is both normative and moral.
  • 12. Figure 1-1: Descriptive vs. Normative Claims Descriptive Normative (Report or describe what is the case) (Prescribe what ought to be the case) Non-moral Moral Prescribe or evaluate in matters involving standards such as art and sports (e.g., criteria for a good painting or an outstanding athlete). Prescribe or evaluate in matters having to do with fairness and Obligation (e.g., criteria for just and unjust actions and policies).
  • 13. Some Benefits of Using the Descriptive Approach • Huff & Finholt (1994) claim that when we understand the descriptive aspect of social effects of technology, the normative ethical issues become clearer. • The descriptive perspective prepare us for our subsequent analysis of ethical issues that affect our system of policies and laws.
  • 14. Table 1-2: Summary of Cyberethics Perspectives Type of Perspective Associated Disciplines Issues Examined Professional Computer Science Engineering Library/Information Science Professional Responsibility System Reliability/Safety Codes of Conduct Philosophical Philosophy Law Privacy & Anonymity Intellectual Property Free Speech Descriptive Sociology Behavioral Sciences Impact of cybertechnology on governmental/financial/ educational institutions and socio-demographic groups
  • 15. Is Cyber-technology Neutral? • Technology seems neutral, at least initially. • Consider the cliché: “Guns don’t kill people, people kill people.” • Corlann Gee Bush (19997) argues that gun technology, like all technologies, is biased in certain directions. • She points out that certain features inherent in gun technology itself cause guns to be biased in a direction towards violence.