Professional Documents
Culture Documents
Declaration:
This learning module is an exclusive property of Dr. Yanga’s Colleges, Inc., as an essential part of the
REIMAGINED Learning Program for the Academic Year 2020-2021, and shall only be used by and for
DYCIans. No part of this learning module shall be reproduced, distributed, transmitted, and/or sold, without the
consent of DYCI.
<<Week No. 1>>
<< <<INTRODUCTION TO ETHICS >>
In this module, some general background discussion about ethics and morals will be
presented and the foundations for the preceding modules. This will show how discussion of
ethics and major ethical theories that are relevant to debates surrounding the use of
computer technology, and to the increasingly complex decisions that face today’s
computing professionals.
At the end of the course, students must be able to:
Be aware of professional responsibilities in the development, deployment and
interconnection of computer-based technologies in order to ensure that it bring positive
benefits to the society and the environment.
Develop students’ problem solving, ethical and critical thinking skills.
Behave and act ethically and professionally.
1
Ethics
Is a set of beliefs about right and wrong behavior
Ethics seeks to resolve questions dealing with human morality—concepts such as
good and evil, right and wrong, virtue and vice, justice and crime.
The way in which we act.
Influences : Family, life experiences, education, religious beliefs, personal values, and
peer
Virtues-are habits that incline people to do what is acceptable
Vices – are habits of unacceptable behavior
Value System – the complex scheme of moral values by which they live
Computer Ethics
Computer systems perform tasks and the way they perform tasks has moral consequences
that affect human interests (Johnson and Powers, 2004).
Unique Issues/ Makes a computer a special case (James Moor)
Logical Malleability
Impact on Society
Invisibility factor
Computers Are special Case?
Invisibility Factor
Invisible abuse -The intentional use of invisible operations to engage in unethical conduct
Invisible Programming-Embedded into a computer program and maybe invisible to
someone who runs the program
Invisible Complex Calculation-Perform calculations which are too complex for human
inspection and understanding
2
Logical Malleability
Computers can be shaped and moulded to perform any activity that can be characterized in
terms of inputs, outputs and connecting logical operations.
“ Just as the power of a steam engine was the raw resource of the Industrial Revolution so
the logic of a computer is a raw resource of the information Revolution. Because the logic
applies everywhere, the potential applications of computer technology appear limitless.
The computer is the nearest thing we have to a universal tool. Indeed, the limits of
computers are largely limits of our own creativity.” - James Moor
Invisibility Factor
Computers is that most of the time, and under most conditions, computer operations are
invisible. Moor identifies 3 kinds of invisibility that can have ethical significance:
Invisible abuse
Ex: programmer could steal interest in a bank, invasion of the property and privacy of
others- remove or alter confidential information
Invisible programming (embedded to computer program)
Ex: embedded in the final product and maybe invisible to someone who runs the program
Invisible complex calculation
Ex: too complex for human inspection and understanding
Computers today are capable of enormous calculations beyond human comprehension.
Identifying an Ethical Issues
Distinguish what is “ethical” and what is “not ethical”
Based our judgment to different criteria : common sense, instinct and wisdom (based on
experience).
Morality in practical terms – representing ‘ethics ‘ in action
3
Issues in Computer Ethics
Stealing
Intellectual property
The right of privacy
The right of equality
Keeping promises
Not lying
Ethical Theories
Theories are commonly used to explain natural phenomena and so provide us with
understanding of the world in which we live.
Kantianism – Immanuel Kant
“How we behave ethically comes from within us, and the things that we decide are ‘good’
or ‘bad’ are based on whether we could imagine everyone doing them.
Assumes equality
Example: Telling Lies , breaking of promises, Killing, stealing
It does not take into account conflicting priorities or special circumstances
Things that we view as wrong are essentially wrong- that is, they are always wrong and
there is never any circumstance where they would be right.
4
“Do unto others as you would have done unto yourself”
Figure 1.1 Kant’s model is inflexible – Alice must either break her promise to Bob (by
Framework fortoEthical
telling the truth Decision
Bob’s wife), Making
or keep her promise to Bob and lie to Bob’s wife. Neither
Law-is
of theseapossibilities
system of rules and the
fir with guidelines which
objectives are enforced
of Kant’s through
categorical social institutions to
imperative.
govern behavior, wherever possible. It shapes politics, economics and society in numerous
ways and serves as a(utilitarianism)
Consequentialism social mediator of relations
– “greatest between
benefits people.
to the greatest number of people”
Codes
provided of that
Conduct
outcome– setis of
forrules
goodoutlining the responsibilities of or proper practices for an
individual, party or organization.
Accommodate conflicting priorities
Ethical
Deals withTheories
consequences of actions rather than the action itself
Social Normscould
Ex: Stealing and beother arguments
sometimes – these
be the right are formed
action by the society in which we live
to take,
and work, and
Utilitarian may–be
Theory heavily
says that ainfluenced
good outcome by culture
is thatand religion.
which bringsIt“the
is important to bear in
greatest benefit to
mind that what is normal
the greatest number of people” and acceptable to one society may be very different in another.
View consequentialism not in terms of single decision but rather as it applies to series or
set of decisions.
Figure 1.3. Illustrated within a simple 2-by-2 array; by way of example, in your everyday
conversations we may describe something being ‘not quite ethical ‘ or ‘totally illegal’-thereby
indicating
Figure 1.2that we perceive a sliding scale of legality and ethically.
Robinhood
5
Start here:
In your day to day life, think of actions that you think will fall on the 2 x 2 array.
6
Name: _____________________________________________ Rating: ________________
Year and Section:_____________ Professor / Instructor: __________________________
Due of Submission: _____________________________
Start here:
7
Start here:
Duquenoy, P., Jones, S.Blundell, B. (2008). Ethical, Legal and Professional Issues in
Computing.
Lavina, C., Erise, M., Rebong, C., et.al. (2012). Ethics for I.T. Professionals with Legal
Aspects in Computing.
Reynolds, G. (2011). Principles of Ethics in Information Technology
Reynolds, G. (2007). Ethics in Information Technology