Beruflich Dokumente
Kultur Dokumente
5 March 2014
E-mail: jastein9@gmail.com
Overview
Ethical issues for ICT professionals
Definitions and basic concepts
Western moral tradition and evolution
What is the relevance of ethics to ICTs?
Cyber-ethics issues and dilemmas
Practical approaches to applying ethics
5.3.2014 JA Stein 2
Ethical issues for ICT professionals
5.3.2014 JA Stein 3
British Computer Society Code of Conduct
Public interest
– Awareness of legal environment
– Avoid discrimination
Duty to relevant authority
– Compliance and expert judgement
– Confidentiality and disclosure
– Manage task within time and budget
Duty to the profession
Professional competence and integrity
5.3.2014 JA Stein 4
Definitions: Ethics
5.3.2014 JA Stein 5
Why ‘Cyber-ethics’?
Computer ethics
– Customised or bespoke software (machines)
Internet ethics
– Netiquette (www, email) (content)
Cyber-ethics
– LAN Internet Cloud (environment)
5.3.2014 JA Stein 6
Definitions: Morality
the quality of being moral; that which renders an
action right or wrong; the practice of moral duties
apart from religion; virtue......ethics (Chambers
Dictionary 1998)
a set of shared rules, principles and duties
applicable to all members of a group or society
which we follow in our day-to-day living.....They
help us to distinguish between right and wrong (E
Turner)
5.3.2014 JA Stein 7
Moral philosophy and applied ethics
Moral Philosophy or “metaethics”: philosophical
reflection on the nature of moral judgement
– critical analysis, identifying moral principles
Applied ethics: practical approaches to under-
standing real-world moral issues, making explicit
beliefs and values based on philosophical principles:
– individual rights and autonomy
– ownership
– authority and relativism
– objectivity, trust, privacy
– social distribution of responsibility, damage and risk
5.3.2014 JA Stein 8
The nature of authority
Expertise and subjectivity
– validated knowledge and credentialed expertise
– scientific method, experience, opinion
who is qualified concerning moral judgement?
An authority or someone in authority?
– is doing the right thing about avoiding punishment?
– is authority conferred or earned?
– when and why does one reject authority?
From power-based to rule-based to
value-based morality
5.3.2014 JA Stein 9
Ethics in the Old Testament
Don’t lie
5.3.2014 JA Stein 10
Christian ethics
Incarnation: God as taking human form
taking personal responsibility for one’s actions
....but external divine authority still available to judge, offer
absolution from sin or punishment of the guilty
Teachings of Jesus Christ
loving all, including the outsider, the rejected, the enemy;
faith, hope and charity, settings norms of humane behaviour
defying local authoritarian power, leading to JC’s execution
Resurrection
vindication of JC’s embodied human/divine authority
Rise of the Church and the Bible as authoritative
closing the biblical canon in 405 AD, ‘Christendom’
5.3.2014 JA Stein 11
The rise of secular humanism
Reformation and Protestantism (16th century)
Martin Luther and the rebellion against corruption
Henry VIII and the Church of England
Enlightenment (18th century)
rise of rationality and human-centred philosophy
Modernism (early 20th century)
triumph of “progress” in delivering prosperity now
instead of promises in “eternity” or afterlife, based
on universal scientific principles
Postmodernism (mid-late 20th century)
rejection of the “grand narrative” in favour of
“constructed identity”, anti-realism and pluralism
5.3.2014 JA Stein 12
Systems of ethics:
From ancient Greece to the 21st Century
Deontology: rules, rights and duties
– Divine command ethics
– Kantian ethics
Contractualism
– Hobbes
– Social contract
Consequentialism
– Utilitarianism
Virtue ethics
5.3.2014 JA Stein 13
Deontology
5.3.2014 JA Stein 14
Categorical moral obligations:
Immanuel Kant (1724 - 1804)
Duties as fundamental
Morality a matter of objective, dispassionate rationality
Intent as the basis of moral judgement:
autonomy assumed
Hypothetical (non-moral) imperatives:
If you want to be healthier, stop overeating
If you want to be happier, make more & better friends
If you don’t want to be killed, hand over your money
Categorical (moral) imperatives:
“common sense” rules that apply to all (universality)
does not distinguish means from ends
absolute: exceptions as never justifiable
5.3.2014 JA Stein 15
Contractualism
Mutual advantage based on rational agreement
– explicit, codified (formal contract)
– implicit, understood (paying for a restaurant meal)
– intuitive expectation of social behaviour (psychological
contract)
5.3.2014 JA Stein 16
Consequentialism and utilitarianism
Consequentialism: the consequences of an action
alone determine its morality
the ends justify the means
Utilitarianism: not the same as usefulness....a goal
– classical: “the ultimate good is something that most people
actually desire”
– modern: “satisfaction, rather than happiness”
– ethical hedonism: pleasure the only ultimate good
the greatest happiness of the greatest number
In philosophy, pleasure, happiness and hedonism
are more sophisticated concepts than as everyday
terms, but....
5.3.2014 JA Stein 17
Virtue ethics
Augustine, Aquinas
– Specification of virtue in terms of health,
aesthetics, knowledge, authenticity,
integrity, justice, friendship, holiness
5.3.2014 JA Stein 18
Computer ethics
Postwar period:
the rise of ‘artificial intelligence’ and fears of social
domination by computers
large-scale computation enabling greater lethality of military
weaponry
large-scale data manipulation enabling the centralisation of
social control (especially government): privacy and dignity
Microcomputers, networking and personal computers
software and IPRs
hacking
Internet and bandwidth
privacy and protection from malicious individuals
dependency in the age of informational capitalism
Cloud computing
5.3.2014 JA Stein 19
Conceptualising computers and ethics
Software
Hacking
the Internet
the Cloud
5.3.2014 JA Stein 20
Computers and society: the case of software
Software (Johnson)
– A series of mental processes that cannot be owned, an
internal structuring of a computer that forms a part of the
machine, or a standalone product with commercial value?
– Traditionalist view: adapt existing tools such as patents
and copyright? But can this approach capture the novel
features and their (sometimes unintended) applications?
Social context: moral, cultural, political ideas
“the study of computer ethics turns out [to] be the study of
human beings and society -- our goals and values, our
norms of behavior, the way we organize ourselves and
assign rights and responsibilities”
5.3.2014 JA Stein 21
Are computer ethical issues unique?
New entities: programmes, software, microchips,
Websites, video games (MMORPGs), the Cloud
Scale of organised activity: data collection, calculation,
statistical analysis
Scale of calculations: new types of knowledge in fields
such as meteorology, economics, military technology
Inherent unreliability of computer systems: new ways
of thinking about risk, accountability and liability
Power and pervasiveness: dependency on computers
for all aspects of modern living, sometimes life itself
5.3.2014 JA Stein 22
Practical applications of ICT ethics
Personal choices: careers, ownership of consumer goods
Protection of children and vulnerable people in our care
Policy, regulation and law
– both public and corporate policies
– gender, race, disability, equality and dignity issues
– regulation of service provision and content
– intellectual property rights
– rights to privacy
Conduct of democracy
Codes of professional conduct
5.3.2014 JA Stein 23
Data Protection Act (1984)
Eight principles
Fairness, specification of purpose,
appropriateness, adequacy, accuracy,
timeliness, accessibility and security
5.3.2014 JA Stein 24
Data Protection Act (1998)
Implementing European standards as per the
Legal protection of databases Directive (1996)
Registration
Enlargement of jurisdiction to cover more types
of data systems
– Manual data
– Videotapes, CDs, etc.
Information Commissioner empowered to issue
fines from 6 April 2010
5.3.2014 JA Stein 25
Implications of the Data Protection Act
for ICT professionals
Awareness of requirements for
registration; exemptions
Treatment of personal data
Use and disclosure of data
Adequate but not excessive
Accuracy and timeliness
5.3.2014 JA Stein 26
Data protection and the Internet (I)
5.3.2014 JA Stein 27
Data protection and the Internet (II)
5.3.2014 JA Stein 28
Computer Misuse Act (1990)
5.3.2014 JA Stein 30
Digital Economy Act (2010)
Copyright/anti-piracy
– Compels ISPs to report persistent offenders
– Powers to restrict or cut off Internet access granted to
the Secretary of State to instruct ISPs
– Ofcom enforces ISPs obligations
– Control of content:
Video game classification
Copyright material on websites
The controversy continues
– Implementation wrt piracy delayed until 2015
5.3.2014 JA Stein 31
Professional responsibility v.
Legal responsibility
5.3.2014 JA Stein 32
Business computer ethics
Ethical behaviour as essential to maintaining trust
that is the basis for doing business:
– clients, customers and suppliers
– competitors, especially when collaborating
– employees, shareholders and stakeholders
empirical observation: “ethical behaviour works” (Langford)
5.3.2014 JA Stein 33
Regulation of Investigatory Powers Act
(2000)
5.3.2014 JA Stein 34
Cloud computing and cyber-ethics
Control and responsibility
– Users relinquish control over both
computation and data
– Dispersed responsibility for data and
computational integrity
– Disappearance of geographical and
functional boundaries
– Multi-purpose, multi-use
– Accountability?
5.3.2014 JA Stein 35
Online Privacy : Why is it
important?
Personal autonomy, security and dignity
Freedom of association
Political freedom and democracy
Intellectual property
Commerce and employment
Protection from cyber-crime
5.3.2014 JA Stein 36
What does secrecy mean in a
virtual social environment?
Privacy
Anonymity
Identity
Security
Confidentiality
5.3.2014 JA Stein 37
Privacy
Theories of privacy:
– Non-intrusion privacy: being free from
interruption and interference
– Seclusion privacy: personal privacy and
being alone
– Control/access privacy: having control over
information about oneself
– Limitation privacy: context-dependent
limits to access to one’s personal information
5.3.2014 JA Stein 38
Internet privacy
Datagathering and cyberstalking
Dataveillance
Merging electronic records
Personal data mining
Search engines
Social networking online
What is properly personal and private, and
what is in the public domain?
5.3.2014 JA Stein 39
Anonymity online
5.3.2014 JA Stein 40
Identity in the virtual world
Aliases
Constructed identities
Digital effigies
5.3.2014 JA Stein 41
Security: a highly emotive topic
5.3.2014 JA Stein 43
Evolution of virtual society
Communities
– Personal / family / diaspora
– Occupational / professional
– Interest group
5.3.2014 JA Stein 45
Secrecy and governance in the virtual
world
Technological approaches are insufficient
Formal and informal approaches to the
governance of the www
Social norms differ according to national,
religious, ethnic and other distinctive
features of various societies – including
online societies
5.3.2014 JA Stein 46
Promoting an ethical approach and
the problem of moral philosophy
Internet ethics is derived from Western moral
philosophy, thus based on Judeao-Christian and
European cultural heritage
5.3.2014 JA Stein 47
Universal ethics
Values? (worth, esteem, etc.)
– Is privacy an intrinsic social value or is it
instrumental ?
5.3.2014 JA Stein 48
Virtual and virtuous ?
Honesty and trustworthiness: Wikipedia
Benevolence and generosity: on-
line petitions and appeals
Excellence: peer-reviewed journals
Courage: resistance to political oppression
Honour and respect: netiquette
Justice: ?
5.3.2014 JA Stein 49
Virtual secrecy?
No technological solutions to social problems,
but no legal solutions either
Tailoring secrecy to purpose
– Protection of legitimate confidentiality in
professional and business/financial world
– Protection of personal privacy and dignity
– Social scepticism wrt identity – education
5.3.2014 JA Stein 52
Moral Heuristics
Is it honourable? Is there anyone from whom we would like
to hide the action?
Is it honest? Does it violate any agreement, actual or implied,
or otherwise betray a trust?
Does it avoid the possibility of conflict of interest? Are there
other considerations that might bias your judgement?
Is it within your area of competence? Is it possible that your
best effort will not be adequate?
Is it fair? Is it detrimental to the legitimate interests of others?
Is it considerate? Will it violate confidentiality or privacy,
or otherwise harm anyone or anything?
Is it conservative? Does it unnecessarily squander time
or otherwise valuable resources?
5.3.2014 JA Stein 53
Example: Ethical analysis of plagiarism