Jump to content

Computer ethics: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Monkbot (talk | contribs)
m Task 18 (cosmetic): eval 42 templates: del empty params (4×); del |url-status= (1×);
new key for Category:Computing and society: "" using HotCat
 
(33 intermediate revisions by 27 users not shown)
Line 1: Line 1:
{{Short description|Philosophy concept in computing}}
'''Computer ethics''' is a part of [[practical philosophy]] concerned with how computing professionals should make decisions regarding professional and social conduct.<ref name=BynumVeryShort>{{cite web |url=http://www.southernct.edu/organizations/rccs/resources/research/introduction/bynum_shrt_hist.html#maner|title=A Very Short History of Computer Ethics |last= Bynum |first=Terrell Ward |publisher=Southern Connecticut Wein University|access-date=2011-01-05|archive-url=https://web.archive.org/web/20080418122849/http://www.southernct.edu/organizations/rccs/resources/research/introduction/bynum_shrt_hist.html|archive-date=2008-04-18}}</ref>
{{Not to be confused with|Cyberethics}}'''Computer ethics''' is a part of [[practical philosophy]] concerned with how computing professionals should make decisions regarding professional and social conduct.<ref name=BynumVeryShort>{{cite web |url=http://www.southernct.edu/organizations/rccs/resources/research/introduction/bynum_shrt_hist.html#maner|title=A Very Short History of Computer Ethics |last= Bynum |first=Terrell Ward |publisher=Southern Connecticut Wein University|access-date=2011-01-05|archive-url=https://web.archive.org/web/20080418122849/http://www.southernct.edu/organizations/rccs/resources/research/introduction/bynum_shrt_hist.html|archive-date=2008-04-18}}</ref>
Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into three primary influences:<ref name="Pierce_1996">{{cite journal |last1=Pierce |first1=Margaret Anne |last2=Henry |first2=John W. |title=Computer ethics: The role of personal, informal, and formal codes |journal=Journal of Business Ethics |date=April 1996 |volume=15 |issue=4 |pages=425–437 |doi=10.1007/BF00380363 }} {{Subscription required}}</ref>
Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into three primary influences:<ref name="Pierce_1996">{{cite journal |last1=Pierce |first1=Margaret Anne |last2=Henry |first2=John W. |title=Computer ethics: The role of personal, informal, and formal codes |journal=Journal of Business Ethics |date=April 1996 |volume=15 |issue=4 |pages=425–437 |doi=10.1007/BF00380363 }} {{Subscription required}}</ref>
# The individual's own personal code.
# The individual's own personal [[Ethical code|<nowiki>[ethical]</nowiki> code]].
# Any informal code of ethical conduct that exists in the work place.
# Any informal code of ethical conduct that exists in the work place.
# Exposure to formal codes of ethics.
# Exposure to formal codes of ethics.


==Foundation==
==Foundation==
The term computer ethics was first coined by Walter Maner,<ref name=BynumVeryShort/> a professor at [[Bowling Green State University]]. Maner noticed ethical concerns that were brought up during his Medical Ethics course at [[Old Dominion University]] became more complex and difficult when the use of technology and computers became involved.<ref>{{Citation|last=Bynum|first=Terrell|title=Computer and Information Ethics|date=2018|url=https://plato.stanford.edu/archives/sum2018/entries/ethics-computer/|encyclopedia=The Stanford Encyclopedia of Philosophy|editor-last=Zalta|editor-first=Edward N.|edition=Summer 2018|publisher=Metaphysics Research Lab, Stanford University|access-date=2019-12-14}}</ref> The conceptual foundations of computer ethics are investigated by [[information ethics]], a branch of philosophical [[ethics]] promoted, among others, by [[Luciano Floridi]].<ref name=InformationEthics>
Computer ethics was first coined by Walter Maner,<ref name=BynumVeryShort/> a professor at [[Bowling Green State University]]. Maner noticed ethical concerns that were brought up during his Medical Ethics course at [[Old Dominion University]] became more complex and difficult when the use of technology and computers became involved.<ref>{{Citation|last=Bynum|first=Terrell|title=Computer and Information Ethics|date=2018|url=https://plato.stanford.edu/archives/sum2018/entries/ethics-computer/|encyclopedia=The Stanford Encyclopedia of Philosophy|editor-last=Zalta|editor-first=Edward N.|edition=Summer 2018|publisher=Metaphysics Research Lab, Stanford University|access-date=2019-12-14}}</ref> The conceptual foundations of computer ethics are investigated by [[information ethics]], a branch of philosophical [[ethics]] promoted, among others, by [[Luciano Floridi]].<ref name=InformationEthics>
{{Citation
{{Citation
| last = Floridi
| first = Luciano
| author-link = Luciano Floridi
| chapter = Information Ethics
| chapter = Information Ethics
| date = 2010
| date = 2010
| editor-last = Floridi
| editor-last = Floridi
| editor-first = Luciano
| editor-first = Luciano
| editor-link = Luciano Floridi
| title = The Cambridge Handbook of Information and Computer Ethics
| title = The Cambridge Handbook of Information and Computer Ethics
| publisher = Cambridge University Press
| publisher = Cambridge University Press
| publication-date = 2010
| publication-date = 2010
Line 25: Line 24:
The concept of computer ethics originated in the 1940s with MIT professor [[Norbert Wiener]], the American mathematician and philosopher. While working on anti-aircraft artillery during [[World War II]], Wiener and his fellow engineers developed a system of communication between the part of a cannon that tracked a warplane, the part that performed calculations to estimate a trajectory, and the part responsible for firing.<ref name=BynumVeryShort/> Wiener termed the science of such information feedback systems, "[[cybernetics]]," and he discussed this new field with its related ethical concerns in his 1948 book, ''Cybernetics''.<ref name=BynumVeryShort/><ref name=BynumSEP>{{cite web |last1=Bynum |first1=Terrell |title=Computer Ethics: Basic Concepts and Historical Overview |url=http://plato.stanford.edu/archives/win2014/entries/ethics-computer/ |date=21 December 2014 |website=Stanford Encyclopedia of Philosophy |publisher=Center for the Study of Language and Information, Stanford University}}</ref> In 1950, Wiener's second book, ''[[The Human Use of Human Beings]]'', delved deeper into the ethical issues surrounding information technology and laid out the basic foundations of computer ethics.<ref name=BynumSEP/>
The concept of computer ethics originated in the 1940s with MIT professor [[Norbert Wiener]], the American mathematician and philosopher. While working on anti-aircraft artillery during [[World War II]], Wiener and his fellow engineers developed a system of communication between the part of a cannon that tracked a warplane, the part that performed calculations to estimate a trajectory, and the part responsible for firing.<ref name=BynumVeryShort/> Wiener termed the science of such information feedback systems, "[[cybernetics]]," and he discussed this new field with its related ethical concerns in his 1948 book, ''Cybernetics''.<ref name=BynumVeryShort/><ref name=BynumSEP>{{cite web |last1=Bynum |first1=Terrell |title=Computer Ethics: Basic Concepts and Historical Overview |url=http://plato.stanford.edu/archives/win2014/entries/ethics-computer/ |date=21 December 2014 |website=Stanford Encyclopedia of Philosophy |publisher=Center for the Study of Language and Information, Stanford University}}</ref> In 1950, Wiener's second book, ''[[The Human Use of Human Beings]]'', delved deeper into the ethical issues surrounding information technology and laid out the basic foundations of computer ethics.<ref name=BynumSEP/>


A bit later during the same year, the world's first [[computer crime]] was committed. A programmer was able to use a bit of computer code to stop his banking account from being flagged as overdrawn. However, there were no laws in place at that time to stop him, and as a result he was not charged.<ref name=BriefHistory>{{cite web |title=A Brief History of Computer Ethics |url=http://www.comphist.org/computing_history/new_page_5.htm |website=Learning Computing History |date=5 December 2004 }}</ref>{{Unreliable source?|reason=Many grammatical errors. No references.|date=April 2015}} To make sure another person did not follow suit, an ethics code for computers was needed.
A bit later during the same year, the world's first [[computer crime]] was committed. A programmer was able to use a bit of computer code to stop his banking account from being flagged as overdrawn. However, there were no laws in place at that time to stop him, and as a result he was not charged.<ref name=BriefHistory>{{cite web |title=A Brief History of Computer Ethics |url=http://www.comphist.org/computing_history/new_page_5.htm |website=Learning Computing History |date=5 December 2004 |access-date=16 February 2011 |archive-date=22 July 2011 |archive-url=https://web.archive.org/web/20110722091502/http://www.comphist.org/computing_history/new_page_5.htm |url-status=live }}</ref>{{Unreliable source?|reason=Many grammatical errors. No references.|date=April 2015}} To make sure another person did not follow suit, an ethics code for computers was needed.


In 1973, the [[Association for Computing Machinery]] (ACM) adopted its first code of ethics.<ref name=BynumVeryShort/> [[SRI International]]'s [[Donn B. Parker|Donn Parker]],<ref>{{cite web|url=http://www.sri.com/about/alumni/alumni-hall-fame-2002#Parker|title=Alumni Hall of Fame: Donn Parker|publisher=SRI International|access-date=2013-06-13|archive-url=https://web.archive.org/web/20130704050030/http://www.sri.com/about/alumni/alumni-hall-fame-2002#Parker|archive-date=2013-07-04|url-status=dead}}</ref> an author on computer crimes, led the committee that developed the code.<ref name=BynumVeryShort/>
In 1973, the [[Association for Computing Machinery]] (ACM) adopted its first code of ethics.<ref name=BynumVeryShort/> [[SRI International]]'s [[Donn B. Parker|Donn Parker]],<ref>{{cite web|url=http://www.sri.com/about/alumni/alumni-hall-fame-2002#Parker|title=Alumni Hall of Fame: Donn Parker|publisher=SRI International|access-date=2013-06-13|archive-url=https://web.archive.org/web/20130704050030/http://www.sri.com/about/alumni/alumni-hall-fame-2002#Parker|archive-date=2013-07-04|url-status=dead}}</ref> an author on computer crimes, led the committee that developed the code.<ref name=BynumVeryShort/>
Line 31: Line 30:
In 1976, medical teacher and researcher Walter Maner noticed that ethical decisions are much harder to make when computers are added. He noticed a need for a different branch of ethics for when it came to dealing with computers. The term "computer ethics" was thus invented.<ref name=BynumVeryShort/><ref name=BynumSEP/>
In 1976, medical teacher and researcher Walter Maner noticed that ethical decisions are much harder to make when computers are added. He noticed a need for a different branch of ethics for when it came to dealing with computers. The term "computer ethics" was thus invented.<ref name=BynumVeryShort/><ref name=BynumSEP/>


In 1976 [[Joseph Weizenbaum]] made his second significant addition to the field of computer ethics. He published a book titled ''[[Computer Power and Human Reason]]'',<ref name=ObituaryWeizenbaum>{{cite news |title=Obituary: Joseph Weizenbaum |url=http://tech.mit.edu/V128/N12/weizenbaum.html |newspaper=The Tech |edition=Online |volume=128 |issue=12 |date=14 March 2008 |publisher=MIT News office |location=Cambridge, MA |access-date=29 April 2015 }}</ref> which talked about how [[artificial intelligence]] is good for the world; however it should never be allowed to make the most important decisions as it does not have human qualities such as wisdom. By far the most important point he makes in the book is the distinction between choosing and deciding. He argued that deciding is a computational activity while making choices is not and thus the ability to make choices is what makes us humans.
In 1976 [[Joseph Weizenbaum]] made his second significant addition to the field of computer ethics. He published a book titled ''[[Computer Power and Human Reason]]'',<ref name=ObituaryWeizenbaum>{{cite news |title=Obituary: Joseph Weizenbaum |url=http://tech.mit.edu/V128/N12/weizenbaum.html |newspaper=The Tech |edition=Online |volume=128 |issue=12 |date=14 March 2008 |publisher=MIT News office |location=Cambridge, MA |access-date=29 April 2015 |archive-date=9 February 2015 |archive-url=https://web.archive.org/web/20150209130151/http://tech.mit.edu/V128/N12/weizenbaum.html |url-status=dead }}</ref> which talked about how [[artificial intelligence]] is good for the world; however it should never be allowed to make the most important decisions as it does not have human qualities such as wisdom. By far the most important point he makes in the book is the distinction between choosing and deciding. He argued that deciding is a computational activity while making choices is not and thus the ability to make choices is what makes us humans.


At a later time during the same year [[Abbe Mowshowitz]], a professor of Computer Science at the City College of New York, published an article titled "On approaches to the study of social issues in computing." This article identified and analyzed technical and non-technical biases in research on social issues present in computing.
At a later time during the same year [[Abbe Mowshowitz]], a professor of Computer Science at the City College of New York, published an article titled "On approaches to the study of social issues in computing." This article identified and analyzed technical and non-technical biases in research on social issues present in computing.


During 1978, the [[Right to Financial Privacy Act]] was adopted by the United States Congress, drastically limiting the government's ability to search bank records.<ref>{{cite web |title=The Right to Financial Privacy Act |website=Electronic Privacy Information Center |url=https://epic.org/privacy/rfpa/ |access-date=29 April 2015 }}</ref>
During 1978, the [[Right to Financial Privacy Act]] was adopted by the United States Congress, drastically limiting the government's ability to search bank records.<ref>{{cite web |title=The Right to Financial Privacy Act |website=Electronic Privacy Information Center |url=https://epic.org/privacy/rfpa/ |access-date=29 April 2015 |archive-date=18 April 2015 |archive-url=https://web.archive.org/web/20150418225108/https://epic.org/privacy/rfpa/ |url-status=live }}</ref>


During the next year [[Terrell Ward Bynum]], the professor of Philosophy at Southern Connecticut State University as well as Director of the Research Center on Computing and Society there, developed curriculum for a university course on computer ethics.<ref>{{Cite web|url=https://www.cs.utexas.edu/~ear/cs349/Bynum_Short_History.html|title=A Very Short History of Computer Ethics ( Text Only) - The Research Center on Computing & Society|website=www.cs.utexas.edu|access-date=2020-02-26}}</ref> Bynum was also editor of the journal ''[[Metaphilosophy (journal)|Metaphilosophy]].''<ref name=BynumVeryShort/> In 1983 the journal held an essay contest on the topic of computer ethics and published the winning essays in its best-selling 1985 special issue, “Computers and Ethics.”<ref name=BynumVeryShort/>
During the next year [[Terrell Ward Bynum]], the professor of philosophy at Southern Connecticut State University as well as Director of the Research Center on Computing and Society there, developed curriculum for a university course on computer ethics.<ref>{{Cite web|url=https://www.cs.utexas.edu/~ear/cs349/Bynum_Short_History.html|title=A Very Short History of Computer Ethics ( Text Only) - The Research Center on Computing & Society|website=www.cs.utexas.edu|access-date=2020-02-26|archive-date=2020-01-28|archive-url=https://web.archive.org/web/20200128182408/http://www.cs.utexas.edu/~ear/cs349/Bynum_Short_History.html|url-status=live}}</ref> Bynum was also editor of the journal ''[[Metaphilosophy (journal)|Metaphilosophy]].''<ref name=BynumVeryShort/> In 1983 the journal held an essay contest on the topic of computer ethics and published the winning essays in its best-selling 1985 special issue, “Computers and Ethics.”<ref name=BynumVeryShort/>


In 1984, the United States Congress passed the Small Business Computer Security and Education Act, which created a [[Small Business Administration]] advisory council to focus on computer security related to small businesses.<ref>{{USBill|98|HR|3075|pipe=Small Business Computer Security and Education Act of 1984|site=yes}}</ref>
In 1984, the United States Congress passed the Small Business Computer Security and Education Act, which created a [[Small Business Administration]] advisory council to focus on computer security related to small businesses.<ref>{{USBill|98|HR|3075|pipe=Small Business Computer Security and Education Act of 1984|site=yes}}</ref>
In 1985, [[James Moor]], Professor of Philosophy at Dartmouth College in New Hampshire, published an essay called "What is Computer Ethics?"<ref name=BynumSEP/> In this essay Moor states the computer ethics includes the following: "(1) identification of computer-generated policy vacuums, (2) clarification of conceptual muddles, (3) formulation of policies for the use of computer technology, and (4) ethical justification of such policies."<ref name=BynumVeryShort/>


In 1985, [[James Moor]], professor of philosophy at Dartmouth College in New Hampshire, published an essay called "What is Computer Ethics?"<ref name=BynumSEP/> In this essay Moor states the computer ethics includes the following: "(1) identification of computer-generated policy vacuums, (2) clarification of conceptual muddles, (3) formulation of policies for the use of computer technology, and (4) ethical justification of such policies."<ref name=BynumVeryShort/>
During the same year, Deborah Johnson, Professor of Applied Ethics and Chair of the Department of Science, Technology, and Society in the School of Engineering and Applied Sciences of the University of Virginia, got the first major computer ethics textbook published.<ref name=BynumSEP/> Johnson's textbook identified major issues for research in computer ethics for more than 10 years after publication of the first edition.<ref name=BynumSEP/>


During the same year, Deborah Johnson, professor of Applied Ethics and chair of the Department of Science, Technology, and Society in the School of Engineering and Applied Sciences of the University of Virginia, got the first major computer ethics textbook published.<ref name=BynumSEP/> Johnson's textbook identified major issues for research in computer ethics for more than 10 years after publication of the first edition.<ref name=BynumSEP/>
In 1988, Robert Hauptman, a librarian at St. Cloud University, came up with "[[information ethics]]", a term that was used to describe the storage, production, access and dissemination of information.<ref name=":1">{{Cite web|title=The Handbook of Information and Computer Ethics {{!}} Wiley|url=https://www.wiley.com/en-us/The+Handbook+of+Information+and+Computer+Ethics-p-9780471799597|access-date=2020-12-06|website=Wiley.com|language=en-us}}</ref> Near the same time, the [[Privacy Act of 1974#Computer Matching and Privacy Protection Act|Computer Matching and Privacy Act]] was adopted and this act restricted United States government programs identifying debtors.<ref>{{USBill|100|S|496|pipe=Computer Matching and Privacy Protection Act of 1988|site=yes}}</ref>


In 1988, Robert Hauptman, a librarian at St. Cloud University, came up with "[[information ethics]]", a term that was used to describe the storage, production, access and dissemination of information.<ref name=":1">{{Cite web|title=The Handbook of Information and Computer Ethics {{!}} Wiley|url=https://www.wiley.com/en-us/The+Handbook+of+Information+and+Computer+Ethics-p-9780471799597|access-date=2020-12-06|website=Wiley.com|language=en-us|archive-date=2022-12-06|archive-url=https://web.archive.org/web/20221206113051/https://www.wiley.com/en-us/The+Handbook+of+Information+and+Computer+Ethics-p-9780471799597|url-status=live}}</ref> Near the same time, the [[Privacy Act of 1974#Computer Matching and Privacy Protection Act|Computer Matching and Privacy Act]] was adopted and this act restricted United States government programs identifying debtors.<ref>{{USBill|100|S|496|pipe=Computer Matching and Privacy Protection Act of 1988|site=yes}}</ref>
In the year 1992, ACM adopted a new set of ethical rules called "ACM code of Ethics and Professional Conduct"<ref name=ACMethics>{{cite web|url=http://www.acm.org/about/code-of-ethics|title=ACM Code of Ethics and Professional Conduct|publisher=[[Association for Computing Machinery|ACM]] |date=16 October 1992 |access-date=2014-08-09}}</ref> which consisted of 24 statements of personal responsibility.


In the year 1992, ACM adopted a new set of ethical rules called "ACM code of Ethics and Professional Conduct"<ref name=ACMethics>{{cite web|url=http://www.acm.org/about/code-of-ethics|title=ACM Code of Ethics and Professional Conduct|publisher=[[Association for Computing Machinery|ACM]]|date=16 October 1992|access-date=2014-08-09|archive-date=2014-08-05|archive-url=https://web.archive.org/web/20140805235706/http://www.acm.org/about/code-of-ethics|url-status=live}}</ref> which consisted of 24 statements of personal responsibility.
Three years later, in 1995, Krystyna Górniak-Kocikowska, a Professor of Philosophy at Southern Connecticut State University, Coordinator of the Religious Studies Program, as well as a Senior Research Associate in the Research Center on Computing and Society, came up with the idea that computer ethics will eventually become a global ethical system and soon after, computer ethics would replace ethics altogether as it would become the standard ethics of the information age.<ref name=BynumSEP/>

Three years later, in 1995, Krystyna Górniak-Kocikowska, a professor of philosophy at Southern Connecticut State University, Coordinator of the Religious Studies Program, as well as a senior research associate in the Research Center on Computing and Society, came up with the idea that computer ethics will eventually become a global ethical system and soon after, computer ethics would replace ethics altogether as it would become the standard ethics of the information age.<ref name=BynumSEP/>


In 1999, Deborah Johnson revealed her view, which was quite contrary to Górniak-Kocikowska's belief, and stated that computer ethics will not evolve but rather be our old ethics with a slight twist.<ref name=":1" />
In 1999, Deborah Johnson revealed her view, which was quite contrary to Górniak-Kocikowska's belief, and stated that computer ethics will not evolve but rather be our old ethics with a slight twist.<ref name=":1" />


Post 20th century, as a result to much debate of ethical guidelines, many organizations such as ABET<ref>{{Cite web|url=http://www.abet.org/about-abet/|title=About ABET {{!}} ABET|website=www.abet.org|language=en-US|access-date=2018-10-03}}</ref> offer ethical accreditation to University or College applications such as "Applied and Natural Science, Computing, Engineering and Engineering Technology at the associate, bachelor, and master levels" to try and promote quality works that follow sound ethical and moral guidelines.
Post 20th century, as a result to much debate of ethical guidelines, many organizations such as ABET<ref>{{Cite web|url=http://www.abet.org/about-abet/|title=About ABET {{!}} ABET|website=www.abet.org|language=en-US|access-date=2018-10-03|archive-date=2018-06-12|archive-url=https://web.archive.org/web/20180612222730/http://www.abet.org/about-abet/|url-status=live}}</ref> offer ethical accreditation to University or College applications such as "Applied and Natural Science, Computing, Engineering and Engineering Technology at the associate, bachelor, and master levels" to try and promote quality works that follow sound ethical and moral guidelines.


In 2018 [[The Guardian]] and [[The New York Times]] reported that [[Facebook]] took data from 87 million Facebook users to sell to [[Cambridge Analytica]].<ref>{{Cite web|url=https://www.cnbc.com/2018/04/10/facebook-cambridge-analytica-a-timeline-of-the-data-hijacking-scandal.html|title=Facebook-Cambridge Analytica: A timeline of the data hijacking scandal|last=Meredith|first=Sam|date=2018-04-10|website=CNBC|language=en|access-date=2019-12-14}}</ref>  
In 2018 [[The Guardian]] and [[The New York Times]] reported that [[Facebook]] took data from 87 million Facebook users to sell to [[Cambridge Analytica]].<ref>{{Cite web|url=https://www.cnbc.com/2018/04/10/facebook-cambridge-analytica-a-timeline-of-the-data-hijacking-scandal.html|title=Facebook-Cambridge Analytica: A timeline of the data hijacking scandal|last=Meredith|first=Sam|date=2018-04-10|website=CNBC|language=en|access-date=2019-12-14|archive-date=2018-10-19|archive-url=https://web.archive.org/web/20181019111240/https://www.cnbc.com/2018/04/10/facebook-cambridge-analytica-a-timeline-of-the-data-hijacking-scandal.html|url-status=live}}</ref>


In 2019 [[Facebook]] started a fund to build an ethics center at the [[Technical University of Munich]], located in Germany. This was the first time that Facebook funded an academic institute for matters regarding computer ethics.<ref>{{Cite web|url=https://www.digitalcommerce360.com/2019/01/22/facebook-is-said-to-face-record-u-s-fine-on-privacy-violations/|title=Facebook is reportedly facing a record US fine for privacy violations|last=Jan 22|first=Bloomberg News {{!}}|last2=2019|date=2019-01-22|website=Digital Commerce 360|language=en-US|access-date=2019-12-14}}</ref>
In 2019 [[Facebook]] started a fund to build an ethics center at the [[Technical University of Munich]], located in Germany. This was the first time that Facebook funded an academic institute for matters regarding computer ethics.<ref>{{Cite web|url=https://www.digitalcommerce360.com/2019/01/22/facebook-is-said-to-face-record-u-s-fine-on-privacy-violations/|title=Facebook is reportedly facing a record US fine for privacy violations|date=2019-01-22|website=Digital Commerce 360|language=en-US|access-date=2019-12-14|archive-date=2019-12-14|archive-url=https://web.archive.org/web/20191214022550/https://www.digitalcommerce360.com/2019/01/22/facebook-is-said-to-face-record-u-s-fine-on-privacy-violations/|url-status=live}}</ref>


== Concerns ==
== Concerns ==
[[Cybercrime|Computer crime]], [[privacy]], [[anonymity]], [[freedom]], and [[intellectual property]] fall under topics that will be present in the future of computer ethics.<ref name=":0">{{Cite journal|last=Vacura|first=Miroslav|title=The History of Computer Ethics and its Future Challenges|url=https://www.academia.edu/40054133|journal=Information Technology and Society Interaction and Interdependence. Proceedings of 23rd Interdisciplinary Information Management Talks (IDIMT 2015)|language=en}}</ref>
[[Cybercrime|Computer crime]], [[privacy]], [[anonymity]], [[freedom]], and [[intellectual property]] fall under topics that will be present in the future of computer ethics.<ref name=":0">{{Cite journal|last=Vacura|first=Miroslav|title=The History of Computer Ethics and its Future Challenges|url=https://www.academia.edu/40054133|journal=Information Technology and Society Interaction and Interdependence. Proceedings of 23rd Interdisciplinary Information Management Talks (IDIMT 2015)|language=en|access-date=2019-12-14|archive-date=2023-04-09|archive-url=https://web.archive.org/web/20230409161222/https://www.academia.edu/40054133|url-status=live}}</ref>


Ethical considerations have been linked to the [[Internet of things|Internet of Things (IoT)]] with many physical devices being connected to the internet.<ref name=":0" />
Ethical considerations have been linked to the [[Internet of things|Internet of Things (IoT)]] with many physical devices being connected to the internet.<ref name=":0" />
Line 68: Line 67:
Autonomous technology such as self-driving cars forced to make human decisions. There is also concern over how autonomous vehicles would behave in different countries with different culture values.<ref>{{Cite journal|last=Maxmen|first=Amy|date=2018-10-24|title=Self-driving car dilemmas reveal that moral choices are not universal|journal=Nature|language=en|volume=562|issue=7728|pages=469–470|doi=10.1038/d41586-018-07135-0|pmid=30356197|bibcode=2018Natur.562..469M|doi-access=free}}</ref>
Autonomous technology such as self-driving cars forced to make human decisions. There is also concern over how autonomous vehicles would behave in different countries with different culture values.<ref>{{Cite journal|last=Maxmen|first=Amy|date=2018-10-24|title=Self-driving car dilemmas reveal that moral choices are not universal|journal=Nature|language=en|volume=562|issue=7728|pages=469–470|doi=10.1038/d41586-018-07135-0|pmid=30356197|bibcode=2018Natur.562..469M|doi-access=free}}</ref>


Security risks have been identified with [[Cloud computing|cloud-based technology]] with every user interaction being sent and analyzed to central computing hubs.<ref>{{Cite journal|last=Hashizume|first=Keiko|last2=Rosado|first2=David G.|last3=Fernández-Medina|first3=Eduardo|last4=Fernandez|first4=Eduardo B.|date=2013-02-27|title=An analysis of security issues for cloud computing|journal=Journal of Internet Services and Applications|volume=4|issue=1|pages=5|doi=10.1186/1869-0238-4-5|issn=1869-0238|doi-access=free}}</ref>  Artificial intelligence devices like the [[Amazon Alexa]] and [[Google Home]] are collecting personal data from users while at home and uploading it to the cloud. Apple’s [[Siri]] and Microsoft’s [[Cortana]] smartphone assistants are collecting user information, analyzing the information, and then sending the information back to the user.
Security risks have been identified with [[Cloud computing|cloud-based technology]] with every user interaction being sent and analyzed to central computing hubs.<ref>{{Cite journal|last1=Hashizume|first1=Keiko|last2=Rosado|first2=David G.|last3=Fernández-Medina|first3=Eduardo|last4=Fernandez|first4=Eduardo B.|date=2013-02-27|title=An analysis of security issues for cloud computing|journal=Journal of Internet Services and Applications|volume=4|issue=1|pages=5|doi=10.1186/1869-0238-4-5|issn=1869-0238|doi-access=free}}</ref> Artificial intelligence devices like the [[Amazon Alexa]] and [[Google Home]] are collecting personal data from users while at home and uploading it to the cloud. Apple's [[Siri]] and Microsoft's [[Cortana (virtual assistant)|Cortana]] smartphone assistants are collecting user information, analyzing the information, and then sending the information back to the user.

[[Information technology|IT]] pros are people that know a lot about [[Computer|computers]] and how to work around anything that's on the computer. Even though these professionals are here to help there is also a little concern about the power they might hold. Computers hold so much data about people like who they are and what they do, this is a huge concern as the society we live in today is democratic. There is a struggle between the government and the citizens as everyone sees how much power the government holds as it grows more and more, making people afraid that they will have less control of their privacy.<ref>{{Cite web|last=Berzai|first=Lou|date=February 12, 2019|title=Ethical Problems in Computing|url=https://www.comptia.org/blog/ethical-problems-in-computing|website=CompTIA}}</ref>

In the future we have today, children don't really have any right to privacy because of their parents. But a big concern is how hackers take full advantage of this. As the child is being born, parents have live updates from the delivery room that they put out on social media which means children now have digital footprints before they're even born. Which could lead hackers to get to the kids so parents could pay them ransom. The FBI had to warn everyone that the data schools collect such as behavioral data and academic data have been hacked into and stolen from thousands of schools.<ref>{{Cite web|last=Baron|first=Jessica|title=Tech Ethics Issues We Should All Be Thinking About In 2019|url=https://www.forbes.com/sites/jessicabaron/2018/12/27/tech-ethics-issues-we-should-all-be-thinking-about-in-2019/?sh=7a1ef9c24b21|website=Forbes}}</ref>


=== Internet privacy ===
=== Internet privacy ===
{{main|Internet privacy}}
{{main|Internet privacy}}
Computers and information technology have caused privacy concerns surrounding collection and use of personal data.<ref>{{Citation|last=van den Hoven|first=Jeroen|title=Privacy and Information Technology|date=2020|url=https://plato.stanford.edu/archives/sum2020/entries/it-privacy/|work=The Stanford Encyclopedia of Philosophy|editor-last=Zalta|editor-first=Edward N.|edition=Summer 2020|publisher=Metaphysics Research Lab, Stanford University|access-date=2020-10-31|last2=Blaauw|first2=Martijn|last3=Pieters|first3=Wolter|last4=Warnier|first4=Martijn}}</ref> For example, Google was sued in 2018 for tracking user location without permission.<ref>{{cite web|url=https://www.cnet.com/news/google-sued-over-keeping-location-data-amid-privacy-concerns/ |title= Google sued over tracking user location amid privacy concerns}}</ref>
Computers and information technology have caused privacy concerns surrounding collection and use of personal data.<ref>{{Citation|last1=van den Hoven|first1=Jeroen|title=Privacy and Information Technology|date=2020|url=https://plato.stanford.edu/archives/sum2020/entries/it-privacy/|encyclopedia=The Stanford Encyclopedia of Philosophy|editor-last=Zalta|editor-first=Edward N.|edition=Summer 2020|publisher=Metaphysics Research Lab, Stanford University|access-date=2020-10-31|last2=Blaauw|first2=Martijn|last3=Pieters|first3=Wolter|last4=Warnier|first4=Martijn}}</ref> For example, Google was sued in 2018 for tracking user location without permission.<ref>{{cite web |url=https://www.cnet.com/news/google-sued-over-keeping-location-data-amid-privacy-concerns/ |title=Google sued over tracking user location amid privacy concerns |access-date=2019-03-24 |archive-date=2019-12-10 |archive-url=https://web.archive.org/web/20191210071243/https://www.cnet.com/news/google-sued-over-keeping-location-data-amid-privacy-concerns/ |url-status=live }}</ref> also In July 2019, Facebook reached a $5 billion settlement with the U.S. Federal Trade Commission for violating an agreement with the agency to protect user privacy.<ref>{{Cite web |last=Emma |first=Bowman |date=9 April 2021 |title=Facebook reached a $5 billion settlement with the U.S. Federal Trade Commission |url=https://www.npr.org/2021/04/09/986005820/after-data-breach-exposes-530-million-facebook-says-it-will-not-notify-users |access-date=19 December 2023 |website=npr.org |archive-date=15 December 2023 |archive-url=https://web.archive.org/web/20231215232546/https://www.npr.org/2021/04/09/986005820/after-data-breach-exposes-530-million-facebook-says-it-will-not-notify-users |url-status=live }}</ref>


A whole industry of privacy and ethical tools has grown over time, giving people the choice to not share their data online. These are often open source software, which allows the users to ensure that their data is not saved to be used without their consent.<ref>{{cite web|url=https://ethical.net/resources/ |title=Ethical Alternatives and Resources}}</ref>
A whole industry of privacy and ethical tools has grown over time, giving people the choice to not share their data online. These are often open source software, which allows the users to ensure that their data is not saved to be used without their consent.<ref>{{cite web |url=https://ethical.net/resources/ |title=Ethical Alternatives and Resources |access-date=2019-03-24 |archive-date=2019-03-24 |archive-url=https://web.archive.org/web/20190324175357/https://ethical.net/resources/ |url-status=live }}</ref>

=== Artificial intelligence ===
{{Excerpt|Ethics of artificial intelligence|templates=Cite}}

== The effects of Infringing copying ==
The effects of infringing copying in the digital realm, particularly studied in computer software and recorded music industries, have raised significant concerns among empirically-oriented economists. While the software industry manages to thrive despite digital copying, the recorded music sector witnesses a sharp decline in revenues, especially with the rise of file-sharing of MP3 files. Establishing the impact of unpaid consumption on paid consumption is challenging due to difficulties in obtaining data on unpaid consumption and drawing causal inferences. ''As simple as the question seems—the extent to which unpaid consumption of recorded music cannibalizes paid consumption—the answer is rather difficult to establish empirically, for two reasons.''<ref>{{Cite book |last1=Merrill |first1=Stephen A. |title=Copyright in the Digital Era: Building Evidence for Policy |last2=William J. |first2=Raduchel |date=2013-05-30 |publisher=National Academies Press |year=2013 |isbn=978-0309278959 |doi=10.17226/14686}}</ref> Empirical studies consistently suggest a depressing impact on paid music consumption, indicating a likely contribution to the downturn in recorded music sales. The emergence of cyberlockers and rapid technological changes further complicate the analysis of revenue impacts on content industries, highlighting the need for ongoing research and a nuanced approach to copyright policy that considers user welfare effects and rewards distribution to artists and creators.


==Ethical standards==
==Ethical standards==
Various national and international professional societies and organizations have produced code of ethics documents to give basic behavioral guidelines to computing professionals and users. They include:
Various national and international professional societies and organizations have produced code of ethics documents to give basic behavioral guidelines to computing professionals and users. They include:


; [[Association for Computing Machinery]]
; [[Association for Computing Machinery]]
Line 90: Line 91:
; [[British Computer Society]]
; [[British Computer Society]]
: BCS Code of Conduct<ref>{{citation |title=Code of Conduct for BCS Members |url=http://www.bcs.org/upload/pdf/conduct.pdf |date=8 June 2011 |publisher=BCS, The Chartered Institute for IT |access-date=10 October 2016 |archive-url=https://web.archive.org/web/20161012202833/http://www.bcs.org/upload/pdf/conduct.pdf |archive-date=12 October 2016 |url-status=dead }}</ref>
: BCS Code of Conduct<ref>{{citation |title=Code of Conduct for BCS Members |url=http://www.bcs.org/upload/pdf/conduct.pdf |date=8 June 2011 |publisher=BCS, The Chartered Institute for IT |access-date=10 October 2016 |archive-url=https://web.archive.org/web/20161012202833/http://www.bcs.org/upload/pdf/conduct.pdf |archive-date=12 October 2016 |url-status=dead }}</ref>
: Code of Good Practice (retired May 2011)<ref>{{cite web |title=BCS Trustee Board agrees revised Code of Conduct |date=3 May 2011 |url=http://www.bcs.org/content/conWebDoc/39989 |website=BCS, The Chartered Institute for IT }}</ref>
: Code of Good Practice (retired May 2011)<ref>{{cite web |title=BCS Trustee Board agrees revised Code of Conduct |date=3 May 2011 |url=http://www.bcs.org/content/conWebDoc/39989 |website=BCS, The Chartered Institute for IT |access-date=28 April 2015 |archive-date=3 March 2016 |archive-url=https://web.archive.org/web/20160303212357/http://www.bcs.org/content/conWebDoc/39989 |url-status=live }}</ref>
; [[German Informatics Society]]
: Ethical Guidelines of the German Informatics Society (revised June 29, 2018)<ref>{{cite web |title=Ethical Guidelines of the German Informatics Society |date=7 September 2022 |url=https://gi.de/ethicalguidelines |access-date=7 September 2022 |archive-date=7 September 2022 |archive-url=https://web.archive.org/web/20220907084709/https://gi.de/ethicalguidelines |url-status=live }}</ref>
; [[Computer Ethics Institute]]
; [[Computer Ethics Institute]]
: [[Ten Commandments of Computer Ethics]]
: [[Ten Commandments of Computer Ethics]]
; [[IEEE]]
; [[IEEE]]
: IEEE Code of Ethics<ref>{{citation |chapter=7.8 IEEE Code of Ethics |chapter-url=http://www.ieee.org/membership_services/membership/ethics_code.html |title=IEEE Policies, Section 7 - Professional Activities |publisher=IEEE }}</ref>
: IEEE Code of Ethics<ref>{{citation |chapter=7.8 IEEE Code of Ethics |chapter-url=https://www.ieee.org/about/corporate/governance/index.html |title=IEEE Policies, Section 7 - Professional Activities |publisher=IEEE |access-date=2010-10-13 |archive-date=2010-10-10 |archive-url=https://web.archive.org/web/20101010082948/http://www.ieee.org/membership_services/membership/ethics_code.html |url-status=live }}</ref>
: IEEE Code of Conduct<ref>{{citation |title=IEEE Code of Conduct |url=http://www.ieee.org/about/ieee_code_of_conduct.pdf |date=June 2014 |publisher=IEEE }}</ref>
: IEEE Code of Conduct<ref>{{citation |title=IEEE Code of Conduct |url=https://www.ieee.org/content/dam/ieee-org/ieee/web/org/about/ieee_code_of_conduct.pdf |date=June 2014 |publisher=IEEE |access-date=2015-04-28 |archive-date=2015-03-22 |archive-url=https://web.archive.org/web/20150322045219/http://www.ieee.org/about/ieee_code_of_conduct.pdf |url-status=live }}</ref>
; [[League of Professional System Administrators]]
; [[League of Professional System Administrators]]
: The System Administrators' Code of Ethics<ref>{{cite web |title=The System Administrators' Code of Ethics |url=https://lopsa.org/CodeofEthics |website=League of Professional System Administrators |publisher=USENIX Association |date=2006 }}</ref>
: The System Administrators' Code of Ethics<ref>{{cite web |title=The System Administrators' Code of Ethics |url=https://lopsa.org/CodeofEthics |website=League of Professional System Administrators |publisher=USENIX Association |date=2006 |access-date=2013-11-21 |archive-date=2013-10-30 |archive-url=https://web.archive.org/web/20131030134231/https://lopsa.org/CodeOfEthics |url-status=live }}</ref>


==See also==
==See also==
{{columns-list|colwidth=30em|
* [[Activism in the tech industry]]
* [[Copyright infringement]]
* [[Cyberethics]]
* [[Cyberethics]]
* [[Ethics of artificial intelligence]]
* [[Ethics of artificial intelligence]]
* [[Donald Gotterbarn]]
* [[Copyright infringement]]
* [[Morality]]
* [[Programming ethics]]
* [[Reliability (computer networking)]]
* [[Social informatics]]
* [[Social informatics]]
* [[Spam (electronic)]]
* [[Simon Rogerson]]
* [[Ten Commandments of Computer Ethics]]
* [[Ten Commandments of Computer Ethics]]
* [[Terrell Ward Bynum]]
* [[Who Controls the Internet?]]
* [[Who Controls the Internet?]]
}}


==References==
==References==
Line 121: Line 116:
==Further reading==
==Further reading==
{{refbegin|}}
{{refbegin|}}
*{{cite journal|last1=Bynum|first1=Terrell Ward|date=June 2000|title=The foundation of computer ethics|journal=ACM SIGCAS Computers and Society|volume=30|issue=2|pages=6–13|doi=10.1145/572230.572231}} {{Subscription required}}
*{{cite journal|last1=Bynum|first1=Terrell Ward|date=June 2000|title=The foundation of computer ethics|journal=ACM SIGCAS Computers and Society|volume=30|issue=2|pages=6–13|doi=10.1145/572230.572231|doi-access=free}} {{Subscription required}}
* {{cite journal|last1=Floridi|first1=Luciano|date=1999|title=Information Ethics: On the Theoretical Foundations of Computer Ethics|url=http://www.wolfson.ox.ac.uk/~floridi/pdf/ieotfce.pdf|journal=Ethics and Information Technology|volume=1|issue=1|pages=37–56|archive-url=https://web.archive.org/web/20051109054139/http://www.wolfson.ox.ac.uk/~floridi/pdf/ieotfce.pdf|archive-date=9 November 2005|author1-link=Luciano Floridi}}
* {{cite journal|last1=Floridi|first1=Luciano|date=1999|title=Information Ethics: On the Theoretical Foundations of Computer Ethics|url=http://www.wolfson.ox.ac.uk/~floridi/pdf/ieotfce.pdf|journal=Ethics and Information Technology|volume=1|issue=1|pages=37–56|doi=10.1023/A:1010018611096 |archive-url=https://web.archive.org/web/20051109054139/http://www.wolfson.ox.ac.uk/~floridi/pdf/ieotfce.pdf|archive-date=9 November 2005|author1-link=Luciano Floridi}}
* {{cite journal|last1=Floridi|first=Luciano|last2=Sanders|first2=J.W.|date=2002|title=Computer Ethics: Mapping the Foundationalist Debate|url=http://www.philosophyofinformation.net/publications/pdf/cemfd.pdf|journal=Ethics and Information Technology|volume=4|issue=1|pages=1–9|author1-link=Luciano Floridi|access-date=2011-04-18|archive-url=https://web.archive.org/web/20110428013900/http://www.philosophyofinformation.net/publications/pdf/cemfd.pdf|archive-date=2011-04-28|url-status=dead|doi=10.1023/A:1015209807065}}
* {{cite journal|last1=Floridi|first1=Luciano|last2=Sanders|first2=J.W.|date=2002|title=Computer Ethics: Mapping the Foundationalist Debate|url=http://www.philosophyofinformation.net/publications/pdf/cemfd.pdf|journal=Ethics and Information Technology|volume=4|issue=1|pages=1–9|author1-link=Luciano Floridi|access-date=2011-04-18|archive-url=https://web.archive.org/web/20110428013900/http://www.philosophyofinformation.net/publications/pdf/cemfd.pdf|archive-date=2011-04-28|url-status=dead|doi=10.1023/A:1015209807065}}
* {{cite book|title=Management Information Systems: For the Information Age|last1=Haag|first1=Stephen|last2=Cummings|first2=Maeve|last3=McCubbrey|first3=Donald J.|date=2003|publisher=McGraw-Hill|isbn=978-0-07-281947-2|edition=4th|location=New York}}
* {{cite book|title=Management Information Systems: For the Information Age|last1=Haag|first1=Stephen|last2=Cummings|first2=Maeve|last3=McCubbrey|first3=Donald J.|date=2003|publisher=McGraw-Hill|isbn=978-0-07-281947-2|edition=4th|location=New York}}
* {{cite book|title=Computer Ethics|last1=Johnson|first1=Deborah G.|date=2001|publisher=Prentice Hall|isbn=978-0-13-083699-1|edition=3rd|location=Upper Saddle River, NJ|url-access=registration|url=https://archive.org/details/computerethics3r00debo}}
* {{cite book|title=Computer Ethics|last1=Johnson|first1=Deborah G.|date=2001|publisher=Prentice Hall|isbn=978-0-13-083699-1|edition=3rd|location=Upper Saddle River, NJ|url-access=registration|url=https://archive.org/details/computerethics3r00debo}}
Line 129: Line 124:
* {{cite book|title=Ethics: Theory and Contemporary Issues|last1=MacKinnon|first1=Barbara|date=2011|publisher=Wadsworth|isbn=978-0-538-45283-0|edition=7th|location=Belmont, CA}}
* {{cite book|title=Ethics: Theory and Contemporary Issues|last1=MacKinnon|first1=Barbara|date=2011|publisher=Wadsworth|isbn=978-0-538-45283-0|edition=7th|location=Belmont, CA}}
* {{cite book|title=Ethics for the Information Age|last1=Quinn|first1=Michael J.|date=2011|publisher=Addison-Wesley|isbn=978-0-13-213387-6|edition=4th|location=Boston, MA}}
* {{cite book|title=Ethics for the Information Age|last1=Quinn|first1=Michael J.|date=2011|publisher=Addison-Wesley|isbn=978-0-13-213387-6|edition=4th|location=Boston, MA}}
* {{cite book|title=Computers & Ethics|journal=Metaphilosophy - Oxford|last1=Moor|first1=James H.|date=1985|publisher=Blackwell|editor1-last=Bynum|editor1-first=Terrell Ward|location=http://rccs.southernct.edu/what-is-computer-ethics/#what-is-computer-ethics|pages=266–75|chapter=What is Computer Ethics?|issn=0026-1068|author1-link=James H. Moor|chapter-url=http://rccs.southernct.edu/what-is-computer-ethics/|archive-url=https://web.archive.org/web/20170404044307/http://rccs.southernct.edu/what-is-computer-ethics/|archive-date=2017-04-04}}
* {{cite book|title=Computers & Ethics|journal=Metaphilosophy - Oxford|last1=Moor|first1=James H.|date=1985|publisher=Blackwell|editor1-last=Bynum|editor1-first=Terrell Ward|url=http://rccs.southernct.edu/what-is-computer-ethics/#what-is-computer-ethics|pages=266–75|chapter=What is Computer Ethics?|volume=16 |issue=4 |doi=10.1111/j.1467-9973.1985.tb00173.x |issn=0026-1068|author1-link=James H. Moor|chapter-url=http://rccs.southernct.edu/what-is-computer-ethics/|archive-url=https://web.archive.org/web/20170404044307/http://rccs.southernct.edu/what-is-computer-ethics/|archive-date=2017-04-04}}
* {{cite journal|last1=Mowshowitz|first1=Abbe|date=March 1981|title=On approaches to the study of social issues in computing|journal=Communications of the ACM|volume=24|issue=3|pages=146–155|doi=10.1145/358568.358592|author1-link=Abbe Mowshowitz}} {{Subscription required}}
* {{cite journal|last1=Mowshowitz|first1=Abbe|date=March 1981|title=On approaches to the study of social issues in computing|journal=Communications of the ACM|volume=24|issue=3|pages=146–155|doi=10.1145/358568.358592|author1-link=Abbe Mowshowitz}} {{Subscription required}}
* {{cite book|title=Computer Ethics: A Global Perspective|last1=Stamatellos|first1=Giannis|date=2007|publisher=Jones and Bartlett|isbn=978-0-7637-4084-9}}
* {{cite book|title=Computer Ethics: A Global Perspective|last1=Stamatellos|first1=Giannis|date=2007|publisher=Jones and Bartlett|isbn=978-0-7637-4084-9}}
Line 136: Line 131:


==External links==
==External links==
{{Commons category|Computer ethics}}
* [[American Philosophical Association]]'s [http://www.apaonline.org/?computers_newsletter ''Newsletter on Philosophy and Computers''].
*[[American Philosophical Association]]'s [http://www.apaonline.org/?computers_newsletter ''Newsletter on Philosophy and Computers''].
*[http://ethics.csc.ncsu.edu/ Ethics in Computing] - a list of links to ethical discussions in Computer Science courtesy of [[North Carolina State University]] Undergraduates with guidance from Dr. Edward F. Gehringer
*[http://ethics.csc.ncsu.edu/ Ethics in Computing] - a list of links to ethical discussions in Computer Science courtesy of [[North Carolina State University]] Undergraduates with guidance from Dr. Edward F. Gehringer
*[http://web.comlab.ox.ac.uk/oucl/research/areas/ieg/ IEG, the Information Ethics research Group] at [[Oxford University]]
*[http://web.comlab.ox.ac.uk/oucl/research/areas/ieg/ IEG, the Information Ethics research Group] at [[Oxford University]]
Line 142: Line 138:
*{{cite SEP |url-id=computing-responsibility |title=Computing and Moral Responsibility |last=Coleman |first=Kari Gwen}}
*{{cite SEP |url-id=computing-responsibility |title=Computing and Moral Responsibility |last=Coleman |first=Kari Gwen}}
*[https://web.archive.org/web/20130119010506/http://southernct.edu/organizations/rccs/ The Research Center on Computing & Society]
*[https://web.archive.org/web/20130119010506/http://southernct.edu/organizations/rccs/ The Research Center on Computing & Society]
* [http://www.igi-global.com/ijcee ''The International Journal of Cyber Ethics in Education (IJCEE)'']
*[http://www.igi-global.com/ijcee ''The International Journal of Cyber Ethics in Education (IJCEE)'']
* [http://www.manifestation.com/neurotoys/eliza.php3 An ELIZA emulator]
*[http://www.manifestation.com/neurotoys/eliza.php3 An ELIZA emulator]


{{Ethics}}
{{Ethics}}
Line 149: Line 145:
{{DEFAULTSORT:Computer Ethics}}
{{DEFAULTSORT:Computer Ethics}}
[[Category:Computer ethics| ]]
[[Category:Computer ethics| ]]
[[Category:Computing and society|Ethics]]
[[Category:Computing and society]]
[[Category:Professional ethics]]
[[Category:Professional ethics]]
[[Category:Ethics of science and technology]]
[[Category:Ethics of science and technology]]

Latest revision as of 01:00, 6 August 2024

Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct.[1]

Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into three primary influences:[2]

  1. The individual's own personal [ethical] code.
  2. Any informal code of ethical conduct that exists in the work place.
  3. Exposure to formal codes of ethics.

Foundation

[edit]

Computer ethics was first coined by Walter Maner,[1] a professor at Bowling Green State University. Maner noticed ethical concerns that were brought up during his Medical Ethics course at Old Dominion University became more complex and difficult when the use of technology and computers became involved.[3] The conceptual foundations of computer ethics are investigated by information ethics, a branch of philosophical ethics promoted, among others, by Luciano Floridi.[4]

History

[edit]

The concept of computer ethics originated in the 1940s with MIT professor Norbert Wiener, the American mathematician and philosopher. While working on anti-aircraft artillery during World War II, Wiener and his fellow engineers developed a system of communication between the part of a cannon that tracked a warplane, the part that performed calculations to estimate a trajectory, and the part responsible for firing.[1] Wiener termed the science of such information feedback systems, "cybernetics," and he discussed this new field with its related ethical concerns in his 1948 book, Cybernetics.[1][5] In 1950, Wiener's second book, The Human Use of Human Beings, delved deeper into the ethical issues surrounding information technology and laid out the basic foundations of computer ethics.[5]

A bit later during the same year, the world's first computer crime was committed. A programmer was able to use a bit of computer code to stop his banking account from being flagged as overdrawn. However, there were no laws in place at that time to stop him, and as a result he was not charged.[6][unreliable source?] To make sure another person did not follow suit, an ethics code for computers was needed.

In 1973, the Association for Computing Machinery (ACM) adopted its first code of ethics.[1] SRI International's Donn Parker,[7] an author on computer crimes, led the committee that developed the code.[1]

In 1976, medical teacher and researcher Walter Maner noticed that ethical decisions are much harder to make when computers are added. He noticed a need for a different branch of ethics for when it came to dealing with computers. The term "computer ethics" was thus invented.[1][5]

In 1976 Joseph Weizenbaum made his second significant addition to the field of computer ethics. He published a book titled Computer Power and Human Reason,[8] which talked about how artificial intelligence is good for the world; however it should never be allowed to make the most important decisions as it does not have human qualities such as wisdom. By far the most important point he makes in the book is the distinction between choosing and deciding. He argued that deciding is a computational activity while making choices is not and thus the ability to make choices is what makes us humans.

At a later time during the same year Abbe Mowshowitz, a professor of Computer Science at the City College of New York, published an article titled "On approaches to the study of social issues in computing." This article identified and analyzed technical and non-technical biases in research on social issues present in computing.

During 1978, the Right to Financial Privacy Act was adopted by the United States Congress, drastically limiting the government's ability to search bank records.[9]

During the next year Terrell Ward Bynum, the professor of philosophy at Southern Connecticut State University as well as Director of the Research Center on Computing and Society there, developed curriculum for a university course on computer ethics.[10] Bynum was also editor of the journal Metaphilosophy.[1] In 1983 the journal held an essay contest on the topic of computer ethics and published the winning essays in its best-selling 1985 special issue, “Computers and Ethics.”[1]

In 1984, the United States Congress passed the Small Business Computer Security and Education Act, which created a Small Business Administration advisory council to focus on computer security related to small businesses.[11]

In 1985, James Moor, professor of philosophy at Dartmouth College in New Hampshire, published an essay called "What is Computer Ethics?"[5] In this essay Moor states the computer ethics includes the following: "(1) identification of computer-generated policy vacuums, (2) clarification of conceptual muddles, (3) formulation of policies for the use of computer technology, and (4) ethical justification of such policies."[1]

During the same year, Deborah Johnson, professor of Applied Ethics and chair of the Department of Science, Technology, and Society in the School of Engineering and Applied Sciences of the University of Virginia, got the first major computer ethics textbook published.[5] Johnson's textbook identified major issues for research in computer ethics for more than 10 years after publication of the first edition.[5]

In 1988, Robert Hauptman, a librarian at St. Cloud University, came up with "information ethics", a term that was used to describe the storage, production, access and dissemination of information.[12] Near the same time, the Computer Matching and Privacy Act was adopted and this act restricted United States government programs identifying debtors.[13]

In the year 1992, ACM adopted a new set of ethical rules called "ACM code of Ethics and Professional Conduct"[14] which consisted of 24 statements of personal responsibility.

Three years later, in 1995, Krystyna Górniak-Kocikowska, a professor of philosophy at Southern Connecticut State University, Coordinator of the Religious Studies Program, as well as a senior research associate in the Research Center on Computing and Society, came up with the idea that computer ethics will eventually become a global ethical system and soon after, computer ethics would replace ethics altogether as it would become the standard ethics of the information age.[5]

In 1999, Deborah Johnson revealed her view, which was quite contrary to Górniak-Kocikowska's belief, and stated that computer ethics will not evolve but rather be our old ethics with a slight twist.[12]

Post 20th century, as a result to much debate of ethical guidelines, many organizations such as ABET[15] offer ethical accreditation to University or College applications such as "Applied and Natural Science, Computing, Engineering and Engineering Technology at the associate, bachelor, and master levels" to try and promote quality works that follow sound ethical and moral guidelines.

In 2018 The Guardian and The New York Times reported that Facebook took data from 87 million Facebook users to sell to Cambridge Analytica.[16]

In 2019 Facebook started a fund to build an ethics center at the Technical University of Munich, located in Germany. This was the first time that Facebook funded an academic institute for matters regarding computer ethics.[17]

Concerns

[edit]

Computer crime, privacy, anonymity, freedom, and intellectual property fall under topics that will be present in the future of computer ethics.[18]

Ethical considerations have been linked to the Internet of Things (IoT) with many physical devices being connected to the internet.[18]

Virtual Crypto-currencies in regards to the balance of the current purchasing relationship between the buyer and seller.[18]

Autonomous technology such as self-driving cars forced to make human decisions. There is also concern over how autonomous vehicles would behave in different countries with different culture values.[19]

Security risks have been identified with cloud-based technology with every user interaction being sent and analyzed to central computing hubs.[20] Artificial intelligence devices like the Amazon Alexa and Google Home are collecting personal data from users while at home and uploading it to the cloud. Apple's Siri and Microsoft's Cortana smartphone assistants are collecting user information, analyzing the information, and then sending the information back to the user.

Internet privacy

[edit]

Computers and information technology have caused privacy concerns surrounding collection and use of personal data.[21] For example, Google was sued in 2018 for tracking user location without permission.[22] also In July 2019, Facebook reached a $5 billion settlement with the U.S. Federal Trade Commission for violating an agreement with the agency to protect user privacy.[23]

A whole industry of privacy and ethical tools has grown over time, giving people the choice to not share their data online. These are often open source software, which allows the users to ensure that their data is not saved to be used without their consent.[24]

Artificial intelligence

[edit]

The ethics of artificial intelligence covers a broad range of topics within the field that are considered to have particular ethical stakes.[25] This includes algorithmic biases, fairness, automated decision-making, accountability, privacy, and regulation. It also covers various emerging or potential future challenges such as machine ethics (how to make machines that behave ethically), lethal autonomous weapon systems, arms race dynamics, AI safety and alignment, technological unemployment, AI-enabled misinformation, how to treat certain AI systems if they have a moral status (AI welfare and rights), artificial superintelligence and existential risks.[25]

Some application areas may also have particularly important ethical implications, like healthcare, education, criminal justice, or the military.

The effects of Infringing copying

[edit]

The effects of infringing copying in the digital realm, particularly studied in computer software and recorded music industries, have raised significant concerns among empirically-oriented economists. While the software industry manages to thrive despite digital copying, the recorded music sector witnesses a sharp decline in revenues, especially with the rise of file-sharing of MP3 files. Establishing the impact of unpaid consumption on paid consumption is challenging due to difficulties in obtaining data on unpaid consumption and drawing causal inferences. As simple as the question seems—the extent to which unpaid consumption of recorded music cannibalizes paid consumption—the answer is rather difficult to establish empirically, for two reasons.[26] Empirical studies consistently suggest a depressing impact on paid music consumption, indicating a likely contribution to the downturn in recorded music sales. The emergence of cyberlockers and rapid technological changes further complicate the analysis of revenue impacts on content industries, highlighting the need for ongoing research and a nuanced approach to copyright policy that considers user welfare effects and rewards distribution to artists and creators.

Ethical standards

[edit]

Various national and international professional societies and organizations have produced code of ethics documents to give basic behavioral guidelines to computing professionals and users. They include:

Association for Computing Machinery
ACM Code of Ethics and Professional Conduct[14]
Australian Computer Society
ACS Code of Ethics[27]
ACS Code of Professional Conduct[28]
British Computer Society
BCS Code of Conduct[29]
Code of Good Practice (retired May 2011)[30]
German Informatics Society
Ethical Guidelines of the German Informatics Society (revised June 29, 2018)[31]
Computer Ethics Institute
Ten Commandments of Computer Ethics
IEEE
IEEE Code of Ethics[32]
IEEE Code of Conduct[33]
League of Professional System Administrators
The System Administrators' Code of Ethics[34]

See also

[edit]

References

[edit]
  1. ^ a b c d e f g h i j Bynum, Terrell Ward. "A Very Short History of Computer Ethics". Southern Connecticut Wein University. Archived from the original on 2008-04-18. Retrieved 2011-01-05.
  2. ^ Pierce, Margaret Anne; Henry, John W. (April 1996). "Computer ethics: The role of personal, informal, and formal codes". Journal of Business Ethics. 15 (4): 425–437. doi:10.1007/BF00380363. (subscription required)
  3. ^ Bynum, Terrell (2018), "Computer and Information Ethics", in Zalta, Edward N. (ed.), The Stanford Encyclopedia of Philosophy (Summer 2018 ed.), Metaphysics Research Lab, Stanford University, retrieved 2019-12-14
  4. ^ Floridi, Luciano, ed. (2010), "Information Ethics", The Cambridge Handbook of Information and Computer Ethics, Cambridge University Press, pp. 77–100, ISBN 9780521717724
  5. ^ a b c d e f g Bynum, Terrell (21 December 2014). "Computer Ethics: Basic Concepts and Historical Overview". Stanford Encyclopedia of Philosophy. Center for the Study of Language and Information, Stanford University.
  6. ^ "A Brief History of Computer Ethics". Learning Computing History. 5 December 2004. Archived from the original on 22 July 2011. Retrieved 16 February 2011.
  7. ^ "Alumni Hall of Fame: Donn Parker". SRI International. Archived from the original on 2013-07-04. Retrieved 2013-06-13.
  8. ^ "Obituary: Joseph Weizenbaum". The Tech. Vol. 128, no. 12 (Online ed.). Cambridge, MA: MIT News office. 14 March 2008. Archived from the original on 9 February 2015. Retrieved 29 April 2015.
  9. ^ "The Right to Financial Privacy Act". Electronic Privacy Information Center. Archived from the original on 18 April 2015. Retrieved 29 April 2015.
  10. ^ "A Very Short History of Computer Ethics ( Text Only) - The Research Center on Computing & Society". www.cs.utexas.edu. Archived from the original on 2020-01-28. Retrieved 2020-02-26.
  11. ^ Small Business Computer Security and Education Act of 1984 at Congress.gov
  12. ^ a b "The Handbook of Information and Computer Ethics | Wiley". Wiley.com. Archived from the original on 2022-12-06. Retrieved 2020-12-06.
  13. ^ Computer Matching and Privacy Protection Act of 1988 at Congress.gov
  14. ^ a b "ACM Code of Ethics and Professional Conduct". ACM. 16 October 1992. Archived from the original on 2014-08-05. Retrieved 2014-08-09.
  15. ^ "About ABET | ABET". www.abet.org. Archived from the original on 2018-06-12. Retrieved 2018-10-03.
  16. ^ Meredith, Sam (2018-04-10). "Facebook-Cambridge Analytica: A timeline of the data hijacking scandal". CNBC. Archived from the original on 2018-10-19. Retrieved 2019-12-14.
  17. ^ "Facebook is reportedly facing a record US fine for privacy violations". Digital Commerce 360. 2019-01-22. Archived from the original on 2019-12-14. Retrieved 2019-12-14.
  18. ^ a b c Vacura, Miroslav. "The History of Computer Ethics and its Future Challenges". Information Technology and Society Interaction and Interdependence. Proceedings of 23rd Interdisciplinary Information Management Talks (IDIMT 2015). Archived from the original on 2023-04-09. Retrieved 2019-12-14.
  19. ^ Maxmen, Amy (2018-10-24). "Self-driving car dilemmas reveal that moral choices are not universal". Nature. 562 (7728): 469–470. Bibcode:2018Natur.562..469M. doi:10.1038/d41586-018-07135-0. PMID 30356197.
  20. ^ Hashizume, Keiko; Rosado, David G.; Fernández-Medina, Eduardo; Fernandez, Eduardo B. (2013-02-27). "An analysis of security issues for cloud computing". Journal of Internet Services and Applications. 4 (1): 5. doi:10.1186/1869-0238-4-5. ISSN 1869-0238.
  21. ^ van den Hoven, Jeroen; Blaauw, Martijn; Pieters, Wolter; Warnier, Martijn (2020), "Privacy and Information Technology", in Zalta, Edward N. (ed.), The Stanford Encyclopedia of Philosophy (Summer 2020 ed.), Metaphysics Research Lab, Stanford University, retrieved 2020-10-31
  22. ^ "Google sued over tracking user location amid privacy concerns". Archived from the original on 2019-12-10. Retrieved 2019-03-24.
  23. ^ Emma, Bowman (9 April 2021). "Facebook reached a $5 billion settlement with the U.S. Federal Trade Commission". npr.org. Archived from the original on 15 December 2023. Retrieved 19 December 2023.
  24. ^ "Ethical Alternatives and Resources". Archived from the original on 2019-03-24. Retrieved 2019-03-24.
  25. ^ a b Müller, Vincent C. (April 30, 2020). "Ethics of Artificial Intelligence and Robotics". Stanford Encyclopedia of Philosophy. Archived from the original on 10 October 2020.
  26. ^ Merrill, Stephen A.; William J., Raduchel (2013-05-30). Copyright in the Digital Era: Building Evidence for Policy. National Academies Press. doi:10.17226/14686. ISBN 978-0309278959.{{cite book}}: CS1 maint: date and year (link)
  27. ^ ACS Code of Ethics (PDF), Australian Computer Society, 12 June 2012, archived from the original (PDF) on 14 May 2013
  28. ^ Graham, Ruth, ed. (July 2012), ACS Code of Professional Conduct (PDF), Australian Computer Society, archived from the original (PDF) on 6 April 2014
  29. ^ Code of Conduct for BCS Members (PDF), BCS, The Chartered Institute for IT, 8 June 2011, archived from the original (PDF) on 12 October 2016, retrieved 10 October 2016
  30. ^ "BCS Trustee Board agrees revised Code of Conduct". BCS, The Chartered Institute for IT. 3 May 2011. Archived from the original on 3 March 2016. Retrieved 28 April 2015.
  31. ^ "Ethical Guidelines of the German Informatics Society". 7 September 2022. Archived from the original on 7 September 2022. Retrieved 7 September 2022.
  32. ^ "7.8 IEEE Code of Ethics", IEEE Policies, Section 7 - Professional Activities, IEEE, archived from the original on 2010-10-10, retrieved 2010-10-13
  33. ^ IEEE Code of Conduct (PDF), IEEE, June 2014, archived (PDF) from the original on 2015-03-22, retrieved 2015-04-28
  34. ^ "The System Administrators' Code of Ethics". League of Professional System Administrators. USENIX Association. 2006. Archived from the original on 2013-10-30. Retrieved 2013-11-21.

Further reading

[edit]
[edit]