Download Module 5.2 Crime, Security and the Boyer Case

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

History of the social sciences wikipedia , lookup

Contemporary history wikipedia , lookup

Criminology wikipedia , lookup

Transcript
Objectives:

Gain Knowledge about Security Issues with
Computers

Investigate ethical considerations with crime
and security
List of Activities:
 Please view this presentation in slide show to see
the animations.
 There are Blue Questions throughout the
presentation that you will need to answer.
 Please submit your Blue Question answers in
class.
Module 5.2 Crime, Security, and the
Boyer Case
1
Ethics is the study of



moral,
legal, and
social issues
PP1. Give your FIRST ethical values and
who/how did you learn them –
Remember if 3 students share then we
don’t have to write it down.
Module 5.2 Crime, Security, and the
Boyer Case
2
Phase Time Period
Technological Features
Ethical
Challenges
1
1950s-1960s
Stand-alone machines (large mainframe
computers)
?
2
1970s-1980s
Minicomputers and PCs interconnected via
privately owned networks
?
3
1990s-Present
Internet and World Wide Web
?
4
Present to
Near Future
Convergence of information and
communication technologies with
nanotechnology research and genetic and
genomic research, etc.
?
PP2. Give one ethical challenges associated
to each phase.
Module 5.2 Crime, Security, and the
Boyer Case
3
Three distinct perspectives of applied ethics (as
applied to computing):
1.
2.
3.
Professional Ethics
Philosophical Ethics
Descriptive Ethics
PP3. Let’s find examples of each:
Professional Ethics; Philosophical
Ethics; and Descriptive Ethics in
your own words. Read the next
slides to help you.
Module 5.2 Crime, Security, and the
Boyer Case
4
 This
is the field that identifies and analyzes
issues of ethical responsibility for computer
professionals.
Consider a computer professional's role in
designing, developing, and maintaining computer
hardware and software systems.
Suppose a programmer discovers that a software
product she has been working on is about to be
released for sale to the public, even though it is
unreliable because it contains "buggy" software.
Should she "blow the whistle?"
Module 5.2 Crime, Security, and the
Boyer Case
5
 This is the field of philosophical analysis and
inquiry that goes beyond professional ethics.
...the analysis of the nature and social impact of
computer technology and the corresponding
formulation and justification of policies for the
ethical use of such technology.
Module 5.2 Crime, Security, and the
Boyer Case
6
1) Identify a particular controversial practice
as a moral problem.
2) Describe and analyze the problem by
clarifying concepts and examining the
factual data associated with that problem.
3)Apply moral theories and principles to
reach a position about the particular moral
issue.
Module 5.2 Crime, Security, and the
Boyer Case
7



The professional and philosophical
perspectives both illustrate normative inquiries
into applied ethics issues.
Normative inquiries or studies are contrasted
with descriptive studies.
Descriptive investigations report about "what is
the case“; normative inquiries evaluate
situations from the vantage-point of the
question: "what ought to be the case."
Module 5.2 Crime, Security, and the
Boyer Case
8




Scenario: A community’s workforce and the
introduction of a new technology.
Suppose a new technology displaces 8,000
workers in a community.
If we analyze the issues solely in terms of the
number of jobs that were gained or lost in that
community, our investigation is essentially
descriptive in nature.
We are simply describing an impact that
technology X has for Community Y.
Module 5.2 Crime, Security, and the
Boyer Case
9
Amy Boyer case of cyberstaking raised ethical and social issues
In Oct. 1999, twenty-year-old Amy Boyer was murdered by a young man
who had stalked her via the Internet. The stalker, Youens, was able to
carry out mort of the stalking activities that eventually let to Boyer’s
death by using a variety of tools available on the Internet. Using
standard online search facilities available to any Internet user, Youens
was able to gather personal information about Boyer. And by paying a
small fee to docusearch.com, an online information company, Youens
was able to find where she worked, lived, and so forth. Youens was
also able to use another kind of online tool that was available to
Internet users to construct two Web sites, both dedicated to his
intended victim. On one site he posted personal information about
Amy Boyer as well as a photograph of her. And on the other Web site
Youens described, in explicit detail, his plans to murder Boyer.

A.
B.
C.
D.
Give your thoughts on the four issues below:
What were the Privacy and Security rights of Boyer?
Did Youens have a right to Free speech? Should there be a
censorship in the Web sites?
What is the Moral responsibility of the viewers of the Web sites?
What are the Legal liability for docusearch.com?
Module 5.2 Crime, Security, and the
Boyer Case
1
0


Descriptive vs. Normative Claims
Consider three assertions:
◦ (1) "Bill Gates served as the Chief Executive Officer of
Microsoft Corporation for many years.”
◦ (2) "Bill Gates should expand Microsoft’s product
offerings.“
◦ (3) “Bill Gates should not engage in business practices that
are unfair to competitors.”
 Claims (2) And (3) are normative, (1) is
descriptive; (2) is normative but nonmoral,
while (3) is both normative and moral.
Module 5.2 Crime, Security, and the
Boyer Case
1
1
Descriptive
Normative
(Report or describe what is the case)
PP5. Give examples:
a. Descriptive claim,
b. Normative claim (nonmoral)
c. Normative claim (moral)
using Amy Boyer’s Case
(Prescribe what ought to be the case)
Non-moral
Moral
Prescribe or evaluate
in matters involving
standards such as art and sports
(e.g., criteria for a good painting
or an outstanding athlete).
Module 5.2 Crime, Security, and the
Boyer Case
Prescribe or evaluate
in matters having to
do with fairness and
Obligation (e.g., criteria
for just and unjust
actions and policies).
1
2
Type of Perspective
Associated Disciplines
Issues Examined
Professional
Computer Science
Engineering
Library/Information Science
Professional Responsibility
System Reliability/Safety
Codes of Conduct
Philosophical
Philosophy
Law
Privacy & Anonymity
Intellectual Property
Free Speech
Descriptive
Sociology
Behavioral Sciences
Impact of cybertechnology
on governmental/financial/
educational institutions and
socio-demographic groups
Module 5.2 Crime, Security, and the
Boyer Case
1
3
Transparent Features
Morally Opaque Features
Known Features
Unknown Features
Users are aware of
these features but do
not realize they have
moral implications.
Users are not even
aware of the
technological features
that have moral
implications
Examples can
include:Web Forms
and searchengine tools.
Examples can
include:Data mining
and Internet cookies.
Module 5.2 Crime, Security, and the
Boyer Case
1
4
1. disclosure
level,
2. theoretical level,
3. application level.
Module 5.2 Crime, Security, and the
Boyer Case
1
5
Level
Disciplines Involved
Task/Function
Disclosive
Computer Science
Social Science (optional)
Disclose embedded
features in computer
technology that have
moral import
Theoretical
Philosophy
Test newly disclosed
features against
standard ethical
theories
Application
Computer Science
Philosophy
Social Science
Apply standard or newly
revised/ formulated
ethical theories to the
issues
Module 5.2 Crime, Security, and the
Boyer Case
1
6