Week1: Chapter 10 – Professional Ethics and Responsibilities

advertisement
Session 2: Ethics Background
Ethics: The branch of philosophy dealing with values relating to human condue with respect to the rightness and
wrongness of actions (Webster)
Baase Ch. 10
Computer ethics includes ethical issues faced by a computer professional as part of the job. It includes relationships
with and responsibilities toward customers, clients, coworkers, employees. We also include issues faced by people
who are not computer professionals, but who manage, select, or use computers in a professional setting."
1) RULES: Deonological Theories: Emphasize duty and absolute rules, to be followed whether they lead to good or ill
consequences in particular cases. eg. "Do not lie". An act is ethical if it complies with ethical rules and is chosen for
that reason.
Immanuel Kant: Principle of Universality –
a)We should follow rules of behavior that we can universally apply to everyone.
b) Deontologists argue that logic or reason determines rules of ethical behavior, that actions are intrinsically good
because they follow from logic.
Kant's Categorial Imperative:
a)One must never treat people as merely means to ends, but rather as ends in themselves.
b) Took an extreme position: He argued if a person is looking for someone he intends to murder, it is wrong for you to
LIE to protect the victim.
2) CONSEQUENCES: Utilitarianism: a consequentialist theory, expressed by John Stuart Mill, to increase
happiness, or "utility".
"Act" Utilitarianism: Each action, we consider the impact on utility and judge the action by its net impact.
Problems: Impossible/difficult to determine all the consequences of an act.
Doesn't recognize or respect individual rights.
"Rule" Utilitarianism: applies the utility principle not to individual actions but to general ethical rules.
"Normative Ethics" Natural rights: Views ethical behavior as acting in such a way that respects a set of fundamental
rights of others, including the rights to life, liberty, and property.
"Descriptive Ethics" – Consequentialist theory/ Rules
1. What are two of Kant's important ideas about ethics?
- Principle of Universality (rules apply to everyone) - Categorial Imperative
2. What is the difference between act-utilitarianism and rule-utilitarianism?
- Based on outcome of action/ Based on outcome but to 'ethical rules'.
Session 3: Technology and Society
First step to understand TECHNOLOGY within society, not the ethics.
Creator of snowmobile Joseph-Armand Bombardier (1959) (Liss Jeffrey)
can have unintended consequences eg. Tools do not make the rules.
What is Technology:
Explicit knowledge or science, practices and skills of a community, artifacts and tools,
material economic forces, systems or environments.
Q: How have technologies mutually shaped humans and our societies?
- Ethics and values crucial, but dangers of premature moral judgments..... Question of Democracy.
Session 4: PRIVACY, FREEDOM OF INFORMATION, FREE SPEECH
Definitions associated with Privacy :
Confidentiality – personal information shall be protected
Data Security – Protection of data from accidental or intentional but unauthorized modification or disclosure.
Privacy - "The right to be left alone" (Warren and Brandeis)
Privacy Principles:
1. Accountability – whoever is collecting data that is correct/audit
2. Identify Purposes
3. Consent – Individual advised of the purpose for which the information will be used.
4. Limiting Collection
5. Limiting Use
5. Disclosure and Retention --- Shall not be used for purposes other than those for which it was collected.
6. Accuracy – up to date as necessary
7. Safeguards – personal information shall be protected by security safeguard
8. Openness – open about their practices with respect to management of personal information.
9. Individual Access – when required, individual should be informed of existence, use and disclosure of their personal
information. They shall also be able to correct information.
10, Challenging Compliance – should be able to address their concerns to a designated individual within the
organization.
11. Children and Personal Information.
Legislative Differences/Approaches
1. North America – common law, ephasis on persons, gov't data banks.
2. Europe – companies are seen as "person", emphasis on data security.
Privacy and Freedoms:
1. Privacy not an absolute right since it conflicts with free speech.
2. Freedom of access to information – protection of privacy implies right of an individual to access records
3. Free Speech – Electronic Frontier Foundation (ie. concerned about pornography, hate literature)
4. Freedom of the Press – openness in gov't considered crucial.
(Baase, Chapter 2)
Computer technology allows search and surveillance of huge numbers of people, often, without our knowledge.
Three Key aspects of Privacy ("The computer issue" that worries people most)
1. Freedom from intrusion – being left alone
2. Control of information about oneself
3. Freedom from surveillance (from being followed, watched).
Critics of privacy argue that it gives cover to deception, hypocrisy, and wrongdoing. It allows fraud. It protects the
guilty.
Privacy scholar Alan Westin describes the factors to be balanced as follows:
a)Safeguarding personal and group privacy, in order to protect individuality and freedom against unjustified intrusions
by authorities.
b)Collecting relevant personal information essential for rational decision making in social, commercial and government
life.
c)Conducting the constitutionally limited government surveillance of people and activities necessary to protect public
order and safety.
Personal information: includes any information relating to or traceable to an individual person.
2.1.2 Risks of the Technology
Invisible information gathering – describes collection of personal information about someone without the person's
knowledge.
-Person has no opportunity to consent or withhold consent for its collection and use.
- examples: satellite surveillance, automatic identification of a person's telephone number when they call 1-800.
Websites can collect information, we are not aware of just what information a particular site is collecting.
An ISP (Internet Service Provider) manages the connection between a user and the site he/she is visiting, thus the ISP
"Knows " every site we visit.
Cookies are files a Web site stores on each visitor's computer that gathers information about the visitor's activity. At
first, cookies were controversial because the very idea that web sites were storing files on the user's hard drive without
the user's knowledge was startling. Websites often don't inform visitors when they are being used.
Secondary Use of Personal Information. The use of information for a purpose other than the one for which it was
supplied. It is difficult for individuals to control their personal information if it is collected by on business,
organization, or government agency and shared with or sold to others.
Examples of Secondary Use:
1. Computer Matching means combining and comparing information from different databases.
2. Computer Profiling means using data in computer files to determine characteristics of people most likely to engage
in certain behavior.
Global Positioning System (GPS) Technology, satellites, and computer chips make it possible to track our
movements and determine a person's current location. "Big Brother is Watching You".
The Privacy Act of 1974 and the Computer Matching and Privacy Protection Act of 1988 are the main laws that
regulate the federal government's use of personal data.
Privacy Act of 1974:
1) Restricts the data in federal government records to what is "relevant and necessary" to the legal purpose fo which it
is collected.
2) Requires federal agencies to publish a notice of their record systems in the Federal Register so that the public may
learn about what databases exist.
3) Allows people to access their records and correct inaccurate information.
4) Requires procedures to protect the security of the info in the database.
5) Prohibits disclosure of information about a person without his or her consent.
Computer Matching and Privacy Protection Act of 1988- requires government agencies to follow a review process
before doing computer matching for various purposes.
The Internal Revenue Service (IRS) uses computers to match tax data on individuals and small businesses with a
variety of federal and state government records. It scans vehicle registration records for people who own expensive
cars and boats.
Government Agencies, (IRS, FBI, INS) buy personal information from private information service companies. Thus
they "outsource" collection of information it would be controversial and possibly illegal for them to collect themselves.
Several studies found that government agencies don't adequately protect personal information often in violation of laws
passed to protect privacy and reduce government abuse of data. The General Accounting Office (GAO) is Congress'
"watchdog agency.". One of its task is to monitor the government's privacy policies.
Using face-recognition system
Should international events such as Olympics, which are sometimes terrorist targets use such systems? Should
technologies be used only to catch terrorists and suspects in serious crimes, or should they be used in public places to
screen people with unpaid parking tickets. Should people be informed about when cameras are in use?
2.3 Consumer Information.
If you enter a contest, warranty questionnaire, info about you will be entered into a database made available to direct
marketers. Children on the Web – safety issues.
Principles for data collection and use
1) Informed consent: Business must inform consumers about what information they are collecting and how they will
use it.
Opt-Out policy : One must check a box on a contract, to request removal from distribution lists.
Opt-In policy: Personal information is NOT distributed to other businesses unless the consumer has explicitly checked
a box permitting disclosure.
Privacy Principles for Personal Data:
1. Collect only the data needed.
2. Inform people when data about them being collected, what is collected, and how it will be used.
3. Offer a way for people to opt out from mailing lists and from transfer of their data to other parties.
4. Provide strong protection for sensitive data. eg. Use an opt-in policy for disclosure of medical data.
5. Keep data only as long as needed.
6. Maintain accuracy and security of data.
7. Provide a way for people to access and correct data stored about them.
Designers of databases with personal information should not use the Social Security Number as the record identifier
unless there is a compelling reason to do so. Proposed National ID cards would contain a(on a magnetic strip), a
person's name, photo, SSN, etc.
Samuel Warren and Louis Brandeis – argued that privacy was distinct from other rights and needed more protection.
The Inviolate Personality: Take the position that people have the right to prohibit publication of facts about themselves
and photographs of themselves.
Judith Jarvis Thomson: Is there a right to privacy?
Our rights to our person include the right to decide who may listen to us. If someone uses binoculars to see your
magazine from a building, that person is violating your right to exclude others from seeing it.
Warren focus on how information is used (publication). Thomson focuses on how it is obtained.
Four Levels of control incorporated into low (Requiring Specific consent Policies)
1. Businesses and organizations must clearly state their policy for use of personal information.
2. Businesses must provide an opt-out option.
3. Businesses must provide an opt-in policy.
4. Businesses must obtain consumer consent for each individual secondary use, disclosure, or transfer of their personal
information.
Session 5: Legislation about Privacy and Freedom of Information.
USA:
1970 Fair Credit Reporting Act
1974 Privacy Act Ammendments to the 1966 Freedom of Information Act
1978 Right to Financial Privacy Act
1984 Cable Communication Act, 1988, Video Privacy Protection Act.
1991 Telephone Consumer Protection Act.
Canada Federal Gov't.
Session 6:
Session 7:
Session 8:
Session 9:
Session 10:
Session 11:
Session 12:
Session 25: What Computers Can't Might, Shouldn't Do:
History of AI
1) John McCarthy's most famous contributions to Artificial Intelligence is the organization of the Dartmouth
Conference (1956), at which the name "Artificial Intelligence" was coined. The Dartmouth Conference, titled the
"Dartmouth Summer Research Project on Artificial Intelligence" was a two-month long summer conference.
McCarthy's goal was to bring together all of the people he knew of who had shown interest in computer intelligence
(with Minsky, Shannon, Newall) . Although McCarthy initially saw the conference as a failure (no one really liked the
idea of spending two whole months at a the conference, so people came and went as they pleased, making it hard for
McCarthy to schedule regular meetings), in the years after the conference, artificial intelligence laboratories were
established across the country at schools like Stanford, MIT, and Carnegie Mellon. 1 Another of McCarthy's great
accomplishments is the creation of the LISP (List Processing) language. LISP soon became the language of choice for
many AI programmers and various versions of LISP are still being used today, forty years later.
The following are some aspects of the artificial intelligence problem discussed in the Dartmout Conference:
1 Automatic Computers
If a machine can do a job, then an automatic calculator can be programmed to simulate the machine. The speeds and
memory capacities of present computers may be insufficient to simulate many of the higher functions of the human
brain, but the major obstacle is not lack of machine capacity, but our inability to write programs taking full advantage
of what we have.
2. How Can a Computer be Programmed to Use a Language
It may be speculated that a large part of human thought consists of manipulating words according to rules of reasoning
and rules of conjecture. From this point of view, forming a generalization consists of admitting a new word and some
rules whereby sentences containing it imply and are implied by others. This idea has never been very precisely
formulated nor have examples been worked out.
3. Neuron Nets
How can a set of (hypothetical) neurons be arranged so as to form concepts. Considerable theoretical and experimental
work has been done on this problem by Uttley, Rashevsky and his group, Farley and Clark, Pitts and McCulloch,
Minsky, Rochester and Holland, and others. Partial results have been obtained but the problem needs more theoretical
work.
4. Theory of the Size of a Calculation
If we are given a well-defined problem (one for which it is possible to test mechanically whether or not a proposed
answer is a valid answer) one way of solving it is to try all possible answers in order. This method is inefficient, and to
exclude it one must have some criterion for efficiency of calculation. Some consideration will show that to get a
measure of the efficiency of a calculation it is necessary to have on hand a method of measuring the complexity of
calculating devices which in turn can be done if one has a theory of the complexity of functions. Some partial results on
this problem have been obtained by Shannon, and also by McCarthy.
5. Self-lmprovement
Probably a truly intelligent machine will carry out activities which may best be described as self-improvement. Some
schemes for doing this have been proposed and are worth further study. It seems likely that this question can be studied
abstractly as well.
6. Abstractions
A number of types of ``abstraction'' can be distinctly defined and several others less distinctly. A direct attempt to
classify these and to describe machine methods of forming abstractions from sensory and other data would seem
worthwhile.
7. Randomness and Creativity
A fairly attractive and yet clearly incomplete conjecture is that the difference between creative thinking and
unimaginative competent thinking lies in the injection of a some randomness. The randomness must be guided by
intuition to be efficient. In other words, the educated guess or the hunch include controlled randomness in otherwise
orderly thinking.
In addition to the above collectively formulated problems for study, we have asked the individuals taking part to
describe what they will work on. Statements by the four originators of the project are attached.
2) Bar Hillel (1960) : dealt with the way natural language communication can be made possible with computers ,
namely through used the concept of machine translation. Needed to find a way to make computer translation of
language possible. Dealt with semantics (meaning of words) and context used, "The pen is in the box" , "The box is in
the pen" mean two different things even though they have similar structure.
Can a machine think:
Turing Test: A person sites in a room, with a device that allows him to ask questions to two respondents in another
room, a Person, and a Machine. Both are asked questions by the interrogator, and both answer. The goal is to decide
whether the "thing" in the other room is a machine or a person.
Turing believes that a machine can "fool" a human
Dijkstra – says it doesn't matter, it depends what you mean by "think". Like asking if a submarine can swim.
This depends if you mean if you mean by swim "float" or "exercise movement in water".
Recent Forms:
Machine learning, intellgent agents known as "BOTS", voice recognition, facial recognition.
Thesis: Machines can equal or even out perform humans, but only when the subect of discourse is sufficently narrow.
(machine translation works well for weather forecasts).
Views of Self and World – Descartes " I think therefore I Am" , what is uniquely human, is consciousness necessary,
and what is it? Perhaps we need self awareness suggested by Edelman.
How to understand the CONTEXT that language is being used: Chomsky "Time flies like an arrow", PROBLEMS with
speech recognition – how to recognize homonyms ("They're there with their.... theories").
Ethical Imperatives: Limitations – legal, and moral judgements.
Azimov's laws for Robots.
First Law:
A robot may not injure a human being, or, through inaction, allow a human being to come to harm.
Second Law:
A robot must obey orders given it by human beings, except where such orders would conflict with the First Law.
Third Law:
A robot must protect its own existence as long as such protection does not conflict with the First or Second Law.
Billy Joy's concern in Why the future doesn't need us: Our most powerful 21st-century technologies - robotics,
genetic engineering, and nanotech - are threatening to make humans an endangered species.
Moore's Law (1965), Gordon Moore (one of 3 founders of Intel) made a prediction: the capacity of integrated
circuits (computer chips) over the next decade would double every 18 to 24 months.
Session 24: Computers and Weapon Systems
Session 23: Professionalism, Ethical Codes, Licensing.
ACM – Association for Computing Machinery : ACM is the world's oldest and largest educational and scientific
computing society. Since 1947 ACM has provided a vital forum for the exchange of information, ideas, and
discoveries. Today, ACM serves a membership of computing professionals and students in more than 100 countries in
all areas of industry, academia, and government.
Who Governs it? Membership is the vital component of the organization, out of which emerges a very special class of
ACMers called volunteers. Volunteers serve on the ACM Council, boards, committees, task forces and other subgroups
that comprise ACM's governing structure.
(IEEE –Computer Society) The Institute of Electrical and Electronics Engineers is a global technical professional
society serving the public interest and members in electrical, electronics, computer, information & other technologies.
The ACM and IEE Computer Society developed the Software Engineering Code of Ethics and Professional Practice,
and the ACM Code of Ethics and Professional Conduct.
CIPS(Canadian Information Processing Society) provides leadership in information systems and technologies by
developing and promoting quality standards and practices, research, certification, and professional development while
safeguarding the public interest.
CIPS Code of Ethics and Professional Practice.
1) To the public: I will endeavour at all times to protect the
public interest . I will strive to promote understanding of
information systems and their application. I will not represent
myself as an authority on topics in which I lack competence.
2) To myself and my profession: I will guard my
competence and effectiveness as a valuable possession. I
will work to maintain them despite changing circumstances
and requirements. I will demonstrate the highest personal
standards of moral responsibilities, character, and integrity
when acting in my professional capacity.
3) To my colleagues: I will treat my colleagues with integrity
and respect their right to success. I will contribute to the
information systems profession to the best of my ability.
4) To my employer and/or clients: I will give conscientious
service to further my employer's and/or client's legitimate
best interests through management's direction.
5) To my employees and contracted staff: I will observe
their obligation to uphold the Code of Ethics of the
professional societies to which they belong.
6) To my students: I will provide a scholarly education to
my students in a supportive and helpful manner.
- Subdivided into Standards of Conduct:
- Enforcement procedures for those who break the code of ethics, detailed appeal procedure.
- Appeal Procedure must meet conditions: Must be against a single individual, written on paper, and site which clause
of the standard of conduct, individual has broken... National President decides if there is a hearing etc...
ACM Code of Ethics and Pofessional Competence: General Moral Imperatives, Maintain competence, respect
laws, human rights, enviornment.
Organixational Imperatives: Being accountable, responsible fair. Compliance with the Code: Voluntary as a
condition of membership.
1.1 Contribute to society and human well-being. This principle concerning the quality of life of all people affirms an
obligation to protect fundamental human rights and to respect the diversity of all cultures
1.2 Avoid harm to others. principle prohibits use of computing technology in ways that result in harm to any of the
following: users, the general public, employees, employers. Harmful actions include intentional destruction or
modification of files and programs leading to serious loss of resources or unnecessary expenditure of human resources
such as the time and effort required to purge systems of "computer viruses."
1.3 Be honest and trustworthy. The honest computing professional will not make deliberately false or deceptive
claims about a system or system design, but will instead provide full disclosure of all pertinent system limitations and
problems.
1.4 Be fair and take action not to discriminate.
1.5 Honor property rights including copyrights and patent. Violation of copyrights, patents, trade secrets and the
terms of license agreements is prohibited by law in most circumstances. Even when software is not so protected, such
violations are contrary to professional behavior. Copies of software should be made only with proper authorization.
Unauthorized duplication of materials must not be condoned.
1.6 Give proper credit for intellectual property.
1.7 Respect the privacy of others.
there is increased potential for violating the privacy of individuals and groups. It is the responsibility of professionals to
maintain the privacy and integrity of data describing individuals. This includes taking precautions to ensure the
accuracy of data, as well as protecting it from unauthorized access or accidental disclosure to inappropriate individuals.
Furthermore, procedures must be established to allow individuals to review their records and correct inaccuracies.
1.8 Honor confidentiality.
Professional Organizations: Practioners work directly with public (protection of public a concern).
Licensing : Scientific societies may have associated licensing organizations with examinations.
Canada: ISP Institute for System Professionals, British Computer Society
USA: ICCP Institute for Computer Professionals
Software Engineering Code of Ethics and Standards of Conduct
-contain eight principles related to the behavior of and decisions made by professional software engineers, educators,
managers.
Principle 1: PUBLIC – software engineers shall act consistently with the public interest, accept full responsibility for
their own work.
Principle 2: CLIENT AND EMPLOYER –software engineers shall act in a manner that is in the best interest of their
client and employer, consistent with the public interest.
Principle 3: PRODUCT – ensure that their products meet the highest professional standards possible.
Principle 4: JUDGMENT: shall maintain integrity and independence in their professional judgment.
Principle 5: MANAGEMENT: shall subscribe to and promote an ethical approach to the management of software
development and maintenance: effective procedures for promotion of quality and reduction of risk.
Principle 6: PROFESSION: shall advance the integrity and reputation of the profession consistent with the public
interest: promote public knowledge of software engineering.
Principle 7: COLLEAGUES – shall be fair to and supportive of their colleagues.
Principle 8: SELF – participate in lifelong learning regarding the practice of their profession and shall promote an
ethical approach to the practice of the profession.: Improve their ability to create safe software, further their knowledge.
http://www.acm.org/serving/se_policy/selep_main.html#qa
Licensing (ACM is Against certification, and voluntary licensing) : One of the central purposes of licensing is to provide
assurances to the public that a licensed person is competent at their professional duties. In the case of software engineering, a license
would be interpreted as an authoritative statement that the licensed engineer would be capable of producing software systems of
consistent reliability, dependability, and usability. The ACM Council concluded that our state of knowledge and practice is too
immature to give such assurances
Finally, the PE licensing mechanism is inappropriate for software engineering because its exam structure would preclude many of the
most qualified software engineers from becoming licensed. ACM is opposed to any process that could prevent highly qualified
software engineers, including many ACM members, from professional practice for which they are qualified.. PE's take 8 hour exam
from Accreditation Board for Engineering and Technology. Requires knowledge of chemistry, and thermodynamics. Are in multiple
choice format: not suitable for software engineering.
Session 22: Cybercrime Countermeasures
Denial-of-service attack – 2000 , Yahoo,eBay,Amazon,CNN shut down their sites for few hours. In this attack , hackers,
overload the target site with hundreds of thousands of requests for web pages and other information. The requests generated
by programs planted on numerous other systems to disgusie their origin; it is also called a "distributed denial of service
attack". Attack traced to 15 year old Canadian (mafiaboy). "Script Kiddies" refers to kids who obtained scripts by more
knowledgable hackers.
Download