Intro to Ethics CSCI 327 Social Implications of Computing.

11
Intro to Ethics Intro to Ethics CSCI 327 Social Implications of CSCI 327 Social Implications of Computing Computing

Transcript of Intro to Ethics CSCI 327 Social Implications of Computing.

Page 1: Intro to Ethics CSCI 327 Social Implications of Computing.

Intro to EthicsIntro to Ethics

CSCI 327 Social Implications of ComputingCSCI 327 Social Implications of Computing

Page 2: Intro to Ethics CSCI 327 Social Implications of Computing.

ScenariosScenarios1. Jenny using the campus computers

2. Frank releasing medical software with bugs in order to be first-to-market

3. Retaliatory cyber attack

4. Bob the student and the Wingspan security hole

5. Joe and Acme Insurance

Page 3: Intro to Ethics CSCI 327 Social Implications of Computing.

Definitions

Ethics - the study of morality.

Morality - system of rules for guiding conduct and principles for evaluating those rules.

Page 4: Intro to Ethics CSCI 327 Social Implications of Computing.

Moral Systems Moral systems are based on core values.

Values may be intrinsic (life, happiness) or instrumental (money) or both (privacy)

Basis for Moral Systems: religion

Stealing is wrong because God doesn't like it. philosophical system

Stealing is wrong because it is not reasonable. legal system

Stealing is wrong because it is against the law.

Page 5: Intro to Ethics CSCI 327 Social Implications of Computing.

RelativismRelativismBecause there is no universal moral system, there is no universal right or wrong.

we can have opposite opinions and both be right

Subjective Relativism - each individual decides right and wrong based on their own values.

Cultural Relativism - different cultures have different values. Only members of that group can decide right and wrong.

Page 6: Intro to Ethics CSCI 327 Social Implications of Computing.

UtilitarianismUtilitarianism (consequence based)An individual act is morally permissible if the consequences that result from the act produce the greatest amount of good for the greatest number of people.Act Utilitarianism - base decisions on total outcomes of the act

Rule Utilitarianism - base decisions by following some general rules (rules apply to everyone)

Example - enslave 1% of population to make cheap computer chips

act util - okay because total good increasesrule util - not okay because it would then be okay to exploit everyone

Page 7: Intro to Ethics CSCI 327 Social Implications of Computing.

Kantianism (duty based)

Moral system must be based in our obligations to each other.

1.act only if the rule can be applied universally to all humans (what if everyone did that?)

2.act only if the rule ensures that all humans will be treated as ends-in-themselves

not moral because rule can not be applied to everyone

Example - student turns in paper late to save professor from being swamped.

Page 8: Intro to Ethics CSCI 327 Social Implications of Computing.

Social Contract (contract based)Because it is in our best interest to band together, we establish a society with a legal code.

Example One - copying a CDsocial contract - wrong because against intellectual property law

Example Two - child drowning in 3 feet of watersocial contract - there is no law stating that you must jump in and save the child

"In a state of nature human life would be solitary, poor, nasty, brutish, and short".

Thomas Hobbes (1588-1679)

Page 9: Intro to Ethics CSCI 327 Social Implications of Computing.

Just ConsequentialismCombines consideration of consequences with considerations of duty, rights, and justice.Basis:

1. "do no harm" - everyone wants to be protected2. "do your duty" - everyone wants justice, promises to be kept,

fulfill their roles, etc

How to apply:1. Deliberate over the choices

1. does not cause unnecessary harm2. supports rights, fulfills duties, …2. Rank choices in terms of benefits and harms

1. weigh the good and bad2. distinguish between disagreements about facts and values

Page 10: Intro to Ethics CSCI 327 Social Implications of Computing.

Scenarios Scenarios (again)

1. Jenny using the campus computers

2. Frank releasing medical software with bugs in order to be first-to-market

3. Retaliatory cyber attack

4. Bob the student and the Wingspan security hole

5. Joe and Acme Insurance

Page 11: Intro to Ethics CSCI 327 Social Implications of Computing.

Next Class…

Critical Thinking How to form and evaluate arguments

In-Class Writing Assignment