SlideShare a Scribd company logo
Lecture 06
Cyberethics
Uniqueness Issue (Continued)
• Traditionalists and uniqueness proponents are
each partly correct.
• Traditionalists correctly point out that no new
ethical issues have been introduced by
computers.
• Uniqueness proponents are correct in that
cybertechnology has complicated our analysis
of traditional ethical issues.
Uniqueness Issue (Continued)
• So we must distinguish between: (a) unique
technological features, and (b) any (alleged)
unique ethical issues.
• Two scenarios from the text:
– (a) Computer professionals designing and coding a
controversial computer system
– (b) Software piracy
Case Illustration of a Policy Vacuum:
Duplicating Software
• In the early 1980s, there were no clear laws
regarding the duplication of software
programs, which was made easy because of
personal computers.
• A policy vacuum arose.
• Before the policy vacuum could be filled, we
had to clear up a conceptual muddle: What
exactly is software?
Cyberethics as a Branch of Applied
Ethics
• Applied ethics, unlike theoretical ethics, examines
"practical" ethical issues.
• It analyzes moral issues from the vantage-point of
one or more ethical theories.
• Ethicists working in fields of applied ethics are more
interested in applying ethical theories to the analysis
of specific moral problems than in debating the
ethical theories themselves.
Cyberethics as a Branch of Applied
Ethics (continued)
• Three distinct perspectives of applied ethics
(as applied to cyberethics):
• Professional Ethics
• Philosophical Ethics
• Descriptive Ethics
Perspective # 1: Professional Ethics
• According to this view, cyberethics is the field that
identifies and analyzes issues of ethical responsibility
for computer professionals.
• Consider a computer professional's role in designing,
developing, and maintaining computer hardware and
software systems.
– Suppose a programmer discovers that a software product
she has been working on is about to be released for sale to
the public, even though it is unreliable because it contains
"buggy" software.
– Should she "blow the whistle?"
Perspective # 2: Philosophical Ethics
 From this perspective, cyberethics is a field of
philosophical analysis and inquiry that goes beyond
professional ethics (Gotterbarn).
 Moor (1985), defines computer ethics as:
– ...the analysis of the nature and social impact of computer
technology and the corresponding formulation and
justification of policies for the ethical use of such
technology. [Italics Added.]
Perspective #3: Cyberethics as a Field of
Descriptive Ethics
• The professional and philosophical perspectives both
illustrate normative inquiries into applied ethics
issues.
• Normative inquiries or studies are contrasted with
descriptive studies.
• Descriptive investigations report about "what is the
case“; normative inquiries evaluate situations from
the vantage-point of the question: "what ought to be
the case."
Descriptive Ethics Perspective
(continued)
• Scenario: A community’s workforce and the
introduction of a new technology.
• Suppose a new technology displaces 8,000 workers
in a community.
• If we analyze the issues solely in terms of the
number of jobs that were gained or lost in that
community, our investigation is essentially
descriptive in nature.
• We are simply describing an impact that technology
X has for Community Y.
Descriptive Ethics Perspective
(continued)
• Descriptive vs. Normative Claims
• Consider three assertions:
– (1) "Bill Gates served as the Chief Executive Officer of Microsoft
Corporation for many years.”
– (2) "Bill Gates should expand Microsoft’s product offerings.“
– (3) “Bill Gates should not engage in business practices that are unfair
to competitors.”
 Claims (2) And (3) are normative, (1) is descriptive;
(2) is normative but nonmoral, while (3) is both
normative and moral.
Figure 1-1: Descriptive vs.
Normative Claims
Descriptive Normative
(Report or describe what is the case) (Prescribe what ought to be the case)
Non-moral Moral
Prescribe or evaluate
in matters involving
standards such as art and sports
(e.g., criteria for a good painting
or an outstanding athlete).
Prescribe or evaluate
in matters having to
do with fairness and
Obligation (e.g., criteria
for just and unjust
actions and policies).
Some Benefits of Using the
Descriptive Approach
• Huff & Finholt (1994) claim that when we understand
the descriptive aspect of social effects of technology,
the normative ethical issues become clearer.
• The descriptive perspective prepare us for our
subsequent analysis of ethical issues that affect our
system of policies and laws.
Table 1-2: Summary of
Cyberethics Perspectives
Type of Perspective Associated
Disciplines
Issues Examined
Professional Computer Science
Engineering
Library/Information
Science
Professional Responsibility
System Reliability/Safety
Codes of Conduct
Philosophical Philosophy
Law
Privacy & Anonymity
Intellectual Property
Free Speech
Descriptive Sociology
Behavioral Sciences
Impact of cybertechnology
on governmental/financial/
educational institutions and
socio-demographic groups
Is Cyber-technology Neutral?
• Technology seems neutral, at least initially.
• Consider the cliché: “Guns don’t kill people, people
kill people.”
• Corlann Gee Bush (19997) argues that gun
technology, like all technologies, is biased in certain
directions.
• She points out that certain features inherent in gun
technology itself cause guns to be biased in a
direction towards violence.

More Related Content

PDF
Introduction to intelligent systems
PPT
Etical and professional issues of computer
PPT
Professional ethics in_computing
PDF
Building Digital Trust
PPT
Chapter 6
PPTX
Digital law powerpoint
PPT
Computer Ethics
Introduction to intelligent systems
Etical and professional issues of computer
Professional ethics in_computing
Building Digital Trust
Chapter 6
Digital law powerpoint
Computer Ethics

What's hot (20)

PPTX
Ethics and computing profession
PPTX
State space search and Problem Solving techniques
PPTX
Learning rule of first order rules
PPTX
Cyber Space
PPT
Freedom of speech
PPT
Computer +forensics
PDF
20CS024 Ethics in Information Technology
PPTX
Artificial Intelligence and Law
PPTX
Social and Professional Issues in Computing - Ethics
PPTX
Swarm intelligence
PPTX
Language models
PPT
Hash mac algorithms
PPTX
Role of Artificial intelligence in our life
PPTX
Digital Security
PPTX
Social and professional issuesin it
PPTX
Living in the IT Era - Lesson 9.pptx
PPTX
Computer crimes and forensics
PPTX
Presentation on Software Piracy
PDF
Computer ethics
PDF
Chapter 3_dp-pertemuan 4&5
Ethics and computing profession
State space search and Problem Solving techniques
Learning rule of first order rules
Cyber Space
Freedom of speech
Computer +forensics
20CS024 Ethics in Information Technology
Artificial Intelligence and Law
Social and Professional Issues in Computing - Ethics
Swarm intelligence
Language models
Hash mac algorithms
Role of Artificial intelligence in our life
Digital Security
Social and professional issuesin it
Living in the IT Era - Lesson 9.pptx
Computer crimes and forensics
Presentation on Software Piracy
Computer ethics
Chapter 3_dp-pertemuan 4&5
Ad

Viewers also liked (20)

PPT
PPIT Lecture 8
PPT
PPIT Lecture 10
PPTX
PPIT Lecture 1
PPT
PPIT Lecture 2
PPTX
PPIT Lecture 18
PPT
PPIT Lecture 7
PPT
PPIT Lecture 4
PDF
The calendar of events october 6 - october 12
PPTX
Metal
PPTX
Sigmund freud
PDF
5 ALWAN
PDF
Data Driven Product Design
PPTX
Offer cue The marketplace that changes everything
DOCX
Appraisal method
PDF
Frundraise: Run for it
PPTX
Media powerpoint q magazine
PPT
PPIT Lecture 9
PDF
The calendar of events october 20 - 26
PDF
The Fableists ‘Epic Thread’ Storyboards
PPTX
Testing
PPIT Lecture 8
PPIT Lecture 10
PPIT Lecture 1
PPIT Lecture 2
PPIT Lecture 18
PPIT Lecture 7
PPIT Lecture 4
The calendar of events october 6 - october 12
Metal
Sigmund freud
5 ALWAN
Data Driven Product Design
Offer cue The marketplace that changes everything
Appraisal method
Frundraise: Run for it
Media powerpoint q magazine
PPIT Lecture 9
The calendar of events october 20 - 26
The Fableists ‘Epic Thread’ Storyboards
Testing
Ad

Similar to PPIT Lecture 06 (20)

PPTX
An ABC of cyberethics
DOCX
Strategies for Answering Discussion and Essay Questions .docx
PPTX
Introduction to ethics 1
PPT
PPIT Lecture 5
DOCX
Computer Ethics Analyzing Information Technology
DOCX
Computer Ethics Analyzing Information Technology.docx
DOCX
Computer Ethics Analyzing Information Technology.docx
PPT
CSC_402_Social_and_Professional_Issues_i.ppt
PPT
ethics.ppt
PPT
PPT
DOCX
snETeirESpacecheckAPAEElo o ou.docx
PPT
computerethics3333333333333333333333333333333333333333333.ppt
PDF
IntroToCybersecurityEthics.pdf
PPTX
SIP report.pptx
PDF
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
DOCX
57268File AttachmentCover.jpgFFIRS3GXML 102020.docx
DOCX
57268File AttachmentCover.jpgFFIRS3GXML 102020.docx
PPTX
604847734-CYBER-ETHICS-pptjln;-slides.pptx
An ABC of cyberethics
Strategies for Answering Discussion and Essay Questions .docx
Introduction to ethics 1
PPIT Lecture 5
Computer Ethics Analyzing Information Technology
Computer Ethics Analyzing Information Technology.docx
Computer Ethics Analyzing Information Technology.docx
CSC_402_Social_and_Professional_Issues_i.ppt
ethics.ppt
snETeirESpacecheckAPAEElo o ou.docx
computerethics3333333333333333333333333333333333333333333.ppt
IntroToCybersecurityEthics.pdf
SIP report.pptx
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
57268File AttachmentCover.jpgFFIRS3GXML 102020.docx
57268File AttachmentCover.jpgFFIRS3GXML 102020.docx
604847734-CYBER-ETHICS-pptjln;-slides.pptx

Recently uploaded (20)

PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PPTX
history of c programming in notes for students .pptx
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PPTX
Essential Infomation Tech presentation.pptx
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
How Creative Agencies Leverage Project Management Software.pdf
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PPTX
Introduction to Artificial Intelligence
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
Reimagine Home Health with the Power of Agentic AI​
PPTX
L1 - Introduction to python Backend.pptx
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Navsoft: AI-Powered Business Solutions & Custom Software Development
Design an Analysis of Algorithms II-SECS-1021-03
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
history of c programming in notes for students .pptx
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Operating system designcfffgfgggggggvggggggggg
How to Migrate SBCGlobal Email to Yahoo Easily
How to Choose the Right IT Partner for Your Business in Malaysia
wealthsignaloriginal-com-DS-text-... (1).pdf
Essential Infomation Tech presentation.pptx
Odoo Companies in India – Driving Business Transformation.pdf
How Creative Agencies Leverage Project Management Software.pdf
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Introduction to Artificial Intelligence
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Reimagine Home Health with the Power of Agentic AI​
L1 - Introduction to python Backend.pptx
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus

PPIT Lecture 06

  • 2. Uniqueness Issue (Continued) • Traditionalists and uniqueness proponents are each partly correct. • Traditionalists correctly point out that no new ethical issues have been introduced by computers. • Uniqueness proponents are correct in that cybertechnology has complicated our analysis of traditional ethical issues.
  • 3. Uniqueness Issue (Continued) • So we must distinguish between: (a) unique technological features, and (b) any (alleged) unique ethical issues. • Two scenarios from the text: – (a) Computer professionals designing and coding a controversial computer system – (b) Software piracy
  • 4. Case Illustration of a Policy Vacuum: Duplicating Software • In the early 1980s, there were no clear laws regarding the duplication of software programs, which was made easy because of personal computers. • A policy vacuum arose. • Before the policy vacuum could be filled, we had to clear up a conceptual muddle: What exactly is software?
  • 5. Cyberethics as a Branch of Applied Ethics • Applied ethics, unlike theoretical ethics, examines "practical" ethical issues. • It analyzes moral issues from the vantage-point of one or more ethical theories. • Ethicists working in fields of applied ethics are more interested in applying ethical theories to the analysis of specific moral problems than in debating the ethical theories themselves.
  • 6. Cyberethics as a Branch of Applied Ethics (continued) • Three distinct perspectives of applied ethics (as applied to cyberethics): • Professional Ethics • Philosophical Ethics • Descriptive Ethics
  • 7. Perspective # 1: Professional Ethics • According to this view, cyberethics is the field that identifies and analyzes issues of ethical responsibility for computer professionals. • Consider a computer professional's role in designing, developing, and maintaining computer hardware and software systems. – Suppose a programmer discovers that a software product she has been working on is about to be released for sale to the public, even though it is unreliable because it contains "buggy" software. – Should she "blow the whistle?"
  • 8. Perspective # 2: Philosophical Ethics  From this perspective, cyberethics is a field of philosophical analysis and inquiry that goes beyond professional ethics (Gotterbarn).  Moor (1985), defines computer ethics as: – ...the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology. [Italics Added.]
  • 9. Perspective #3: Cyberethics as a Field of Descriptive Ethics • The professional and philosophical perspectives both illustrate normative inquiries into applied ethics issues. • Normative inquiries or studies are contrasted with descriptive studies. • Descriptive investigations report about "what is the case“; normative inquiries evaluate situations from the vantage-point of the question: "what ought to be the case."
  • 10. Descriptive Ethics Perspective (continued) • Scenario: A community’s workforce and the introduction of a new technology. • Suppose a new technology displaces 8,000 workers in a community. • If we analyze the issues solely in terms of the number of jobs that were gained or lost in that community, our investigation is essentially descriptive in nature. • We are simply describing an impact that technology X has for Community Y.
  • 11. Descriptive Ethics Perspective (continued) • Descriptive vs. Normative Claims • Consider three assertions: – (1) "Bill Gates served as the Chief Executive Officer of Microsoft Corporation for many years.” – (2) "Bill Gates should expand Microsoft’s product offerings.“ – (3) “Bill Gates should not engage in business practices that are unfair to competitors.”  Claims (2) And (3) are normative, (1) is descriptive; (2) is normative but nonmoral, while (3) is both normative and moral.
  • 12. Figure 1-1: Descriptive vs. Normative Claims Descriptive Normative (Report or describe what is the case) (Prescribe what ought to be the case) Non-moral Moral Prescribe or evaluate in matters involving standards such as art and sports (e.g., criteria for a good painting or an outstanding athlete). Prescribe or evaluate in matters having to do with fairness and Obligation (e.g., criteria for just and unjust actions and policies).
  • 13. Some Benefits of Using the Descriptive Approach • Huff & Finholt (1994) claim that when we understand the descriptive aspect of social effects of technology, the normative ethical issues become clearer. • The descriptive perspective prepare us for our subsequent analysis of ethical issues that affect our system of policies and laws.
  • 14. Table 1-2: Summary of Cyberethics Perspectives Type of Perspective Associated Disciplines Issues Examined Professional Computer Science Engineering Library/Information Science Professional Responsibility System Reliability/Safety Codes of Conduct Philosophical Philosophy Law Privacy & Anonymity Intellectual Property Free Speech Descriptive Sociology Behavioral Sciences Impact of cybertechnology on governmental/financial/ educational institutions and socio-demographic groups
  • 15. Is Cyber-technology Neutral? • Technology seems neutral, at least initially. • Consider the cliché: “Guns don’t kill people, people kill people.” • Corlann Gee Bush (19997) argues that gun technology, like all technologies, is biased in certain directions. • She points out that certain features inherent in gun technology itself cause guns to be biased in a direction towards violence.