GEE REVIEWER Subjective Relativism- Each person decides right and wrong for himself or
CHAPTER 1 CATALYST FOR CHANGE herself
Information age Relativism- No universal norms of right and wrong -Characterized by unprecedented access to information Cultural Relativism- What is “right” and “wrong” depends upon a society’s -Catalysts actual moral guidelines Low-cost computers Divine Command Theory High-speed communication networks -Good actions: those aligned with God’s will Examples of advances in past two decades -Bad actions: those contrary to God’s will -Cell phones -Email **Holy books reveal God’s will. -World Wide Web -MP3 players **We should consider holy books as moral decision-making guides. Technology and Values Kantianism- Focuses on the critical importance of Good will- the desire to -Dynamic between people, technology do the right thing (Immanuel Kant) -Different ways people are affected by technology Kantian Evaluation (1st Formulation) -You may claim credit for work **Physical changes (e.g., pains accompany the use of laptops) performed by someone else. **Psychological changes (e.g., cell phones make you feel safer) Utilitarianism -contrast to Kantianism. **An action is good if it benefits -Technologies can solve problems, create new problems someone. Focuses on the consequences. Control over New Technologies Act utilitarianism- Add up change in happiness of all affected beings -People can control whether to adopt new technology Rule Utilitarianism- Rule utilitarianism applies Principle of Utility to moral -People can influence rate at which technologies are developed rules 3 important aids to manual calculating are: Social Contract Theory tablet, the abacus, and mathematical tables Thomas Hobbes- “State of nature” (We implicitly accept a social contract) Mechanical Calculators -Gilded age and new larger corporations, calculator Jean-Jacques Rousseau -In ideal society, no one above rules adoptions (social change) Kinds of Rights Cash register- store owners and response to problem Negative right- Free Expression Tabulators- data processing systems **punched cards Positive right: A right obligating others to do something on your behalf Data processing system- received input data, perform, produces output Absolute right: A right guaranteed without exception First Commercial Computers Limited right: A right that may be restricted based on the circumstances -Precursors- both program and data stored in it memory CHAPTER 3 NETWORKING -Remington Rand – UNIVAC -IBM – dominated mainframe/ large base. Email-transferred between computers Programming Languages Email address: Uniquely identifies cyberspace mailbox -Assembly Language- symbolic (machine language prog) Spam: Unsolicited, bulk email -FORTRAN- higher level language/ scientific Spim: is an unsolicited, bulk instant message. -COBOL- business app Direct Censorship- Government monopolization, Prepublication review -Time-Sharing Systems – divide comp among multiple user ,Licensing and registration. -BASIC – teaching programming Self-censorship- Most common form of censorship -Transistor -vacuum tube Challenges Posed by the Internet -Semiconductor – Faster, Cheaper, More reliable Many-to-many communication (millions can post pages) -Integrated Circuit - containing transistors, capacitors, and resistors -Dynamic connections- Millions of PCs are connected to internet IBM System/360 yearly Before System/360- mainframe/ pc were incompatible -Huge numbers of Web sites- No way to monitor them all. System/360- pc are compatible -Extends beyond national borders, laws Microprocessor- single semiconductor chip -Can’t determine age of users Telegraph-to transmit messages in the form of electrical impulses that can Identity theft: person uses another person’s electronic identity be converted into data. Phishing: use of email or Web pages to attempt to deceive people into ARPANET- Advanced Research Projects Agency Network revealing personal information Internet- network of networks communicating using TCP/IP Chat room: supports real-time discussions among many people connected Broadband- High-speed Internet connection to network Information Technology- Devices used in creation, storage, manipulation, Instant messaging (IM) and chat rooms (which is similar to IM) replacing dissemination of data, sound, and/or images telephone for many people Email- Spam has become a real problem Contributing Factors to Computer Addiction Web- Free access to huge amounts of information Social factors -Peer groups CDs, MP3s, MP4s- CDs, MP3s, MP4s Situational factors Credit cards- Convenience over cash and checks -Stress -Lack of social support and intimacy CHAPTER 2 ETHICS -Limited opportunities for productive activity Two ways` to view world: Individual factors -Selfish point of view: consider only own self and its core values -Tendency to pursue activities to excess -Lack of achievement -Ethical point of view: respect other people and their core values -Fear of failure -Feeling of alienation Society- under a system of rules CHAPTER 4 INTELECTUAL PROPERTY Morality- A society’s rules of conduct (good or bad) Intellectual property: any unique product of the human intellect that has Ethics- (philosophical study of morality- guidelines) commercial value **rational and systematic analysos Property Rights: -to property in their own person **A way to decide the best thing to do -to their own labor -to things which they remove from Nature through their labor Protecting Intellectual Property Data mining- Searching for patterns or relationships in one or more Trade Secret- gives company a competitive advantage (Identifies goods) databases Service mark: Identifies services Secondary use: information collected for one purpose used for another Patent- A public (not secret) document that provides detailed description of purpose invention -Information about customers is a valuable commodity Copyright- Provides owner of an original work five rights IRS Audits: matching and data mining to look for possible income tax fraud -Reproduction Syndromic Surveillance System: Looks for patterns that might indicate an -Distribution (copies of the work to public) epidemic, bioterrorism, or an environmental problem -Public display (copies of the work in public) Opt-in: give permission for the organization to share info with another -Public performance organization. -Production of derivative works Opt-out: explicitly forbid an organization from sharing info Fair Use Concept- Sometimes legal to reproduce a copyrighted work Encryption: Valuable tool for maintaining privacy without permission Digital Recording Technology- Copying from vinyl records to cassette CHAPTER 6 COMPUTER AND NETWORL SERCURITY tapes introduced hiss and distortions (bad quality) Virus: piece of self-replicating code embedded within another program (host) Peer-to-Peer Networks- Transient network How viruses spread Napster- Peer-to-peer music exchange network -Diskettes or CDs -Email -Files downloaded from Internet BitTorrent- Broadband connections: download much faster than upload. • Well-known viruses -Brain -Michelangelo -Melissa -Love Bug Violations of Software Copyrights • Viruses today Copying a program to give or sell to someone else -Commercial antivirus software -Few people keep up-to-date Preloading a program onto the hard disk of a computer being sold Worm Distributing a program over the Internet -Self-contained program -Spreads through a computer Open-Source Software: measures being taken to enforce copyrights network (infringe our liberties) -Exploits security holes in networked computers -No restrictions preventing others from selling or giving away software Famous worms Examples of Open-Source Software -WANK -Code Red -Sapphire (Slammer) -Blaster -Sasser BIND – give DNS for entire Internet The Internet Worm Apache – runs half of Web servers Robert Tappan Morris, Jr.- Released worm onto Internet from MIT computer Sendmail – moving e-mail via internet Trojan horse: program with benign capability that masks a sinister purpose Perl, Python, Ruby, TCL/TK, PHP, Zope, GNU (General Public License) Remote access Trojan: Trojan horse that gives attack access to victim’s compilers for C, C++, Objective-C, Fortran, Java, and Ada computer. (Back Orifice // SubSeven) CHAPTER 5 PRIVACY RAT servers often found within files downloaded from erotica/porn Usenet Defining Privacy- related to notion of access sites Access- Physical proximity to a person // Knowledge about a person Bot: A software program that responds to commands from a program on Edmund Byrne: Privacy is a “zone of inaccessibility” another computer Edward Bloustein: Privacy violations are an affront to human dignity Some bots support legitimate activities Benefits of Privacy -Internet Relay Chat -Multiplayer Internet games -Individual growth (maturity) Other bots support illegitimate activities -Individual responsibility -Distributing spam -Collecting person information for ID theft -Freedom to be yourself -Distributed denial-of-service attacks -Intellectual and spiritual growth- Authorization: determining that a user has permission to perform a -Development of loving, trusting, caring, intimate relationships particular action Morton Levine- Property rights (Home) →Privacy rights Authentication: determining that people are who they claim to be Privacy and Trust -emphasis on community Firewall: a computer monitoring packets entering and leaving a local area Disclosing Information network Public record: information for public access (birth certificates) Mon 29-11 Hackers- Meaning of “hacker” changed Public information: information revealed to an organization that has right to -Explorer -Risk-taker -Technical virtuoso share it (Telephone directory) -Make a system do something never done before Personal information: undisclosed information (religion, wealth) Phone phreak: someone who manipulates phone system to make free calls Types of disclosures Most popular methods -Voluntary, -Involuntary : body and luggage search at airport -Steal long-distance telephone access codes -Statutory : Record of arrests and convicted persons -Guess long-distance telephone access codes Census Records: required to ensure every state has fair representation -Use a “blue box” to get free access to long-distance lines --- OneDOJ Database: Gives state and local police officers access to mimic the actual frequency information provided by five federal law enforcement agencies **Access codes posted on “pirate boards” by phreaks to share codes and Wiretaps: relates to interception of telephone conversations credit card No. Bugs are hidden microphones used for surveillance **Maximum penalty: 20 years in prison + $250,000 fine **Wiretapping and bugs are not legal // FBI continues secret wiretapping Denial-of-service attack: an intentional action designed to prevent Operation Shamrock- was a covert, domestic intelligence gathering legitimate users from making use of a computer service operation that monitored telegraph communications. Goal of attack: disrupt a server’s ability to respond to its clients Kennedy- Organized crime figures “watch list” **About 4,000 Web sites attacked each week Johnson and Nixon -Vietnam war protesters Asymmetrical attack: a single person can harm huge organization Nixon- War on drugs, Monitoring phone calls (multinational organization) **may prove popular with terrorists SATAN- Security Administrator Tool for Analyzing Networks -Software engineers have opportunities to do good or do harm -Allows administrators (especially novices) to test their systems -Software engineers ought to be committed to doing good -Eight principles identify key ethical relationships and obligations Benefits of Online Voting: within these relationship -More people would vote -Code should be seen as a whole, not a collection of parts -Votes would be counted more quickly -Concern for the public interest is paramount -No ambiguity with electronic votes Software Engineering Code: Principles -Cost less money -Public -Eliminate ballot box tampering -Client and employer -Software can prevent accidental over-voting -Product -Software can prevent under-voting -Judgment -Management CHAPTER 7 COMPUTER RELIABILITY -Profession Data-Entry or Data-Retrieval Errors: A computerized system may fail -Colleagues because wrong data entered into it. -Self -A computerized system may fail because people incorrectly interpret data Origin of Virtue Ethics they retrieve. Aristotle- Happiness results from living a life of virtue Issues with DRE Voting Machines Intellectual virtue: developed through education -Voting irregularities Moral virtue: developed by repeating appropriate acts -Failure to record votes -Overcounting votes ***Deriving pleasure from a virtuous act is a sign that the virtue has been -Misrecording votes acquired -Lack of a paper audit trail Some virtues: Benevolence, courage, fairness, generosity, honesty, loyalty, -Vulnerability to tampering patience, tolerance -Source code a trade secret, can’t be examined Strengths of Virtue Ethics: Provides a motivation for good behavior -Possibility of widespread fraud through malicious programming -Provides a solution to the problem of impartiality Uses of Computer Simulations Weakness of Virtue Ethics: No methodology for answering moral problems -Model past events (Evolution of the universe) Alternative List of Fundamental Principles --Understand world around us (Search for Oil) -Be impartial. Predict the future (weather predictions) -Disclose information that others ought to know. Software Engineering (4 STEPS PROCESS) -Respect the rights of others. • Specs: determine the functions to be performed -Treat others justly. -Determine system requirements -Take responsibility for your actions and inactions. -Understand constraints -Take responsibility for the actions of those you supervise. -Determine feasibility (Budget and schedule) -Maintain your integrity. End products: -Continually improve your abilities. -High-level statement of requirements (Summary) -Share your knowledge, expertise, and values -Mock-up of user interface Whistleblower: Tries to report harmful situation through authorized channels -Low-level requirements statement (Detailed) -Rebuffed by organization • Development: produce SW that meet specs. -Makes disclosure through unauthorized channels -Create high-level design Whistleblowing harms organization -Discover and resolve mistakes, omissions in specification -Bad publicity -Ruined careers -Erodes team spirit -CASE tools to support design process Whistleblowing harms whistleblower -Object-oriented systems have advantages -Retaliation -Estrangement -After detailed design, actual programs written -Result: working software system CHAPTER 9 WORK AND WEALTH • Validation: testing the SW Telework: Arrangement in which employees work away from traditional -Ensure software satisfies specification place of work -Ensure software meets user’s needs Advantages of Telework -Challenges to testing software -Increases productivity -Reduces absenteeism -Test modules, then subsystems, then system -Improves morale -Saves overhead (offices, …) -Helps environment -Saves employees money • Evolution: Modify SW to meet change requirements Disadvantages of Telework Shrinkwrap Warranties: Some say you accept software “as is” -Threatens managers’ control and authority Some offer 90-day replacement or money-back guarantee -Makes face-to-face meetings impossible -Sensitive information less secure -Team meetings more difficult CHAPTER 8 PROFESSIONAL ETHICS -Teleworkers less visible (forgotten for promotion) Software Engineers: Certification and licensing not needed -Teleworkers “out of the loop” -Isolation of teleworkers -Without these, other characteristics are irrelevant -Less likely to contact them from employees at offices -No college education needed -No apprenticeship needed -Teleworkers work longer hours for same pay -No membership in professional society needed Temporary Work: Long-term employment for one firm less common -No continuing education needed Monitoring: Identify inappropriate use of company resources -Most software engineers are part of teams Globalization: process of creating a worldwide network of businesses and -Software engineers have ability to harm public markets Software Engineering Code: Preamble Digital divide: some people have access to modern information technology Electronic Devices. These are devices which use only electrical switches while others do not and circuitry instead of mechanical relays. Underlying assumption: people with access to telephones, computers, ABC (Atanasoff – Berry Computer). The first special-purpose Internet have opportunities denied to those without access digital computer developed by John Atanasoff. COMPUTER CONCEPTS Electronic Numerical Integrator and Calculator (ENIAC). The Computer- electronic data processing device designed to accept and first fully electronic general-purpose digital computer by John Eckert and manipulate data and instructions. John Mauchly. Characteristics of a Computer Electronic Discrete Variable Computer(EDVAC). This is simply -It is a machine. -It is electronic. the enhancement of ENIAC to overcome its limitations. -It is automatic. -It can manipulate data. Electronic Delayed Storage Automatic Computer (EDSAC). -It has memory. -It has logical functions. Also known as Electronic Binary Digital computer that uses binary Capabilities of a Computer representation of data and internally stored program; developed by John -Speed -Accuracy -Repetitiveness. -Storage. -Programmable. Eckert and John Presper. Limitations of a Computer First Generation Computers ( 1951 – 1958 ) - Vacuum tubes and magnetic -Computers cannot operate without a set of instructions. drums. -Computers cannot derive a meaning from objects. Second Generation Computers ( 1959 – 1963 )- Transistors and magnetic -Computers cannot correct errors, it can only detect them. core. -Computers are subject to occasional breakdown. Third Generation Computers ( 1964 – 1971 )- Major Hardware Features: -Computers cannot run without electric power. Integrated circuits or “chips” Classifications of Computer Fourth Generation Computers ( 1971 – 1979 )- Microprocessors or Large – According to Purpose second IC -General – Purpose Computers. Capable of dealing with a Fifth Generation Computers ( 1980-present)- Circuitry based on gallium variety of problems. arsenide -Special – Purpose Computers. Designed to perform a specific Personal Computer (PC) – are Integrated Circuit that contains the task. Arithmetic Logic Unit (ALU) and Control Unit of computer Central Processing According to Data Handled Unit. Analog Computers. Deal with continuously changing physical data Microprocessor – a single Central Processing Unit (CPU). Digital Computers. Work with values that are in a discrete from (or Data that can be counted). Hybrid Computers. Incorporate in a single machine the capabilities of the analog and digital computers. According to Capacity Microcomputers: Small computers which are portable. Minicomputers: Machine which are in the middle of microcomputers and mainframes in terms of cost and capability. These act as “servers” Mainframe: are used mostly by banks, airlines, and insurance companies that handles millions of transactions. Supercomputers: The biggest and fastest computers. EVOLUTION OF COMPUTERS Pre-Modern Era Manual-Mechanical Device. These are devices powered by hand and requires physical effort from the user. Abacus. The first man-made computing device Napier’s bones. An arrangement of bones wherein numbers are printed; invented by John Napier. Oughtred’s Slide Rule. Consists of movable bars with a precise scale which uses approximations for solving problems; invented by William Oughtred. Pascaline. The first mechanical calculator ( adding machine ) that uses cogged wheels;invented by Blaise Pascal. Leibnitz Calculator. The improved Pascaline which could multiply and divide; invented by Gottfried Leibnitz. Babbage’s Difference and Analytical Engines. These engines embodied most of the design of modern computers by Charles Babbage. Electro-mechanical Devices. These are devices powered by an electronic motor and use switches and relays. Holllerith’s Punch Card Machine. The first use of punched cards to store data; developed by Herman Hollerith. Automatic Weaving Loom. Uses the concept of punched card to control his looms; by Joseph Marie Jacquard. Automatic Sequence Controlled Calculator (MARK I). The first genera-purpose computer; invented by Howard Aiken.