2009 PrenticeHall Inc 1 Technology in Action Technology
- Slides: 33
© 2009 Prentice-Hall, Inc. 1
Technology in Action Technology in Focus: Information Technology Ethics © 2009 Prentice-Hall, Inc. 2
Ethics Defined • • • Study of morals and moral choices Match established ideas of right and wrong Fairness Equity Guidelines for decision making © 2009 Prentice-Hall, Inc. 3
Ethics Defined • Systems of ethical conduct – Moral relativism – Situational ethics – Religious traditions © 2009 Prentice-Hall, Inc. 4
Ethics Defined • Unethical behavior – Not conforming to a set of approved standards – Social or professional © 2009 Prentice-Hall, Inc. 5
Personal Ethics • Checklist of personal decisions • May be well-defined • May be applied inconsistently © 2009 Prentice-Hall, Inc. 6
Personal Ethics • How do they develop? – Family and cultural bias – Religious affiliation – Life experiences © 2009 Prentice-Hall, Inc. 7
Define Your Personal Ethics • • • Describe yourself List your beliefs Identify external influences Consider “why” Prepare a statement of values © 2009 Prentice-Hall, Inc. 8
Personal Ethics • Benefits of ethical living – Obeying laws – Less stress and anger – Increased happiness © 2009 Prentice-Hall, Inc. 9
Personal Ethics in the World View • Do your ethics match the workplace? • Are you ethics away from work a concern for your employer? © 2009 Prentice-Hall, Inc. 10
Technology and Ethics • • • Technology is all around us Technology moves quickly Rules governing technology move more slowly • Use of technology left to personal ethics © 2009 Prentice-Hall, Inc. 11
6 areas of ethical concern • Social Justice – Can technology be used to benefit everyone? • • Intellectual Property - What is fair about ffair use? Privacy - Is personal privacy a casualty of the modern age? Commerce - Is online gambling a problem? Communication - When does big business limit free speech? • Computer Abuse - Does restricting online information protect children? © 2009 Prentice-Hall, Inc. 12
Social Justice: Can Technology Be Used to Benefit Everyone? • Can we use technology to achieve social justice? • Can we apply these technologies to poor areas? – Solar energy – Genetic engineering – Internet access © 2009 Prentice-Hall, Inc. 13
Social Justice: Can Technology Be Used to Benefit Everyone? • Point: Technology Provides Economic Opportunity for All – Could be used to eliminate poverty – Could improve quality of life in poor countries – Could be an ethical force © 2009 Prentice-Hall, Inc. 14
Social Justice: Can Technology Be Used to Benefit Everyone? • Counterpoint: Technology Doesn’t Provide Economic Opportunity for All • No one can solve the problem of poverty – Should not be addressed by technologists • Potential risks of new technologies • Threats to existing world economies © 2009 Prentice-Hall, Inc. 15
Intellectual Property: What Is Fair About Fair Use? • Copyright laws protect intellectual property • Fair use – Allows for exceptions to copyright laws • Fair use criteria – What is the purpose of the work? – What is the nature of the proposed work? – How much copyrighted material is being used? – What is the effect on the original material? © 2009 Prentice-Hall, Inc. 16
Intellectual Property: What Is Fair About Fair Use? • Point: Liberal Fair Use Standards Are Beneficial – Encourages wide dissemination of information – Allows the most democratic, free society – Existing laws not up-to-date with technology © 2009 Prentice-Hall, Inc. 17
Intellectual Property: What Is Fair About Fair Use? • Counterpoint: Strict Fair Use Standards Are Beneficial – Existing laws should not be changed because technology has changed – Copyright holders should control their own work © 2009 Prentice-Hall, Inc. 18
Privacy: Is Personal Privacy a Casualty of the Modern Age? • Privacy is a basic human right • Many of our transactions are recorded – Debit cards – Loyalty cards – Electronic toll passes © 2009 Prentice-Hall, Inc. 19
Privacy: Is Personal Privacy a Casualty of the Modern Age? • Point: Protect Personal Privacy – No reason to watch me – Government misuse of data – Government control of population – National ID cards remind people of Nazis – Privacy controls are expensive © 2009 Prentice-Hall, Inc. 20
Privacy: Is Personal Privacy a Casualty of the Modern Age? • Counterpoint: Reduced Privacy Is a Fact of Modern Life – Should have nothing to hide – Help enhance the detection of terrorists – Protect citizens from being abused – National ID card worth the cost © 2009 Prentice-Hall, Inc. 21
Commerce: Should Online Gambling Be Banned or Regulated? • • • Multi-billion dollar industry Already illegal in U. S. Facilitates addictive gambling © 2009 Prentice-Hall, Inc. 22
Commerce: Should Online Gambling Be Banned or Regulated? • Point: Ban Online Gambling – Easy access for minors and compulsive gamblers – Could support criminal activities – No regulation: who keeps the house honest? – Allows gamblers to hide their addiction © 2009 Prentice-Hall, Inc. 23
Commerce: Should Online Gambling Be Banned or Regulated? • Counterpoint: Legalize Online Gambling – Protect consumers – Allow for scrutiny of all transactions – Standardize the industry – Generate tax revenues – Regulated in other countries – Easier to regulate than prohibit © 2009 Prentice-Hall, Inc. 24
Communication: When Does Big Business Limit Free Speech? • Google concedes to demands from Beijing to self-censor its search engine – Helps suppress dissent in return for access to the Chinese market – Cost of doing business in Chinese market – Potential Chinese market is huge © 2009 Prentice-Hall, Inc. 25
Communication: When Does Big Business Limit Free Speech? • Point: Google Acted Unethically – Sacrificed free speech for business – Violated human rights – No incentive for China to change – Other rights hang in the balance – How far is too far? © 2009 Prentice-Hall, Inc. 26
Communication: When Does Big Business Limit Free Speech? • Counterpoint: Google’s Actions Were Justified – Companies should pursue profits – Withdrawing from China would further restrict free speech – Advances the slow progress toward democracy © 2009 Prentice-Hall, Inc. 27
Computer Abuse: Does Restricting Online Information Protect Children? • Internet allows – Sexual predators to contact potential victims – Distribution of pornography – Cyberbullying – Phishing – Dissemination of hate speech © 2009 Prentice-Hall, Inc. 28
Computer Abuse: Does Restricting Online Information Protect Children? • Children are especially vulnerable – Use technology more than adults – More trusting than some adults – May not recognize malicious intent © 2009 Prentice-Hall, Inc. 29
Computer Abuse: Does Restricting Online Information Protect Children? • Point: Monitoring Software Protects Children – Laws have proved ineffective – Make sure libraries and schools are safe – Uphold moral standards of the public – Logical extension of the library screening process © 2009 Prentice-Hall, Inc. 30
Computer Abuse: Does Restricting Online Information Protect Children? • Counterpoint: Monitoring Software Restricts Access to Information – Blocks informational content – Amounts to censorship – Is not 100% reliable – Widens the “digital divide” – Education is a better alternative © 2009 Prentice-Hall, Inc. 31
The minute paper What is the most important thing you learned in today’s class? © 2009 Prentice-Hall, Inc. 32
Using Computers to Support Ethical Conduct • Charitable organizations use the Internet for fund raising • Companies must provide mechanisms to report unethical behavior anonymously • Intranets and e-mail are used to inform employees of ethics policies • Your personal ethics must guide your decisions concerning technology © 2009 Prentice-Hall, Inc. 33
- 2009 pearson education inc
- 2009 pearson education inc
- 2009 pearson education inc
- Copyright 2009
- 2009 pearson education inc
- 2009 pearson education inc
- Copyright 2009 pearson education inc
- 2009 pearson education inc
- Copyright 2009 pearson education inc
- Copyright 2009 pearson education inc
- Copyright 2009 pearson education inc
- Petro-tech heat technology inc
- Chrysos photon assay technology
- Posiflex india
- Input output technology inc
- "co-ax technology inc"
- Climax graphic organizer
- The lion and the mouse point of view elements
- Stages of plot development
- Exposition short story
- Suit the action to the word the word to the action meaning
- Technology in action
- Technology in action
- Technology in action
- 2008-2009 school year
- Virginia kindergarten standards
- Siss-2009. sistema integral de servicio social
- Saresp 2009 uma maquina fotografica
- Nmc record keeping guidance 2009
- Cmo 27-2009
- Plan nacional del buen vivir 2009 al 2013
- Pp 51 tahun 2009
- R.t.t. 2009
- January 25 2018 chemistry regents answers