Introduction to ethics and computingethics

yahiaahmedzaher 21 views 18 slides Aug 29, 2025
Slide 1
Slide 1 of 18
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18

About This Presentation

cyberethics


Slide Content

CS E172c
Computer Ethics
Lecture 01
Instructor: Dr. hisham el-shishatawy

Introduction to Ethics
Quote from Aristotle:
“Man, when perfected, is the best of
the animals, but when separated
from law and justice, he is the
worst of all”
Computer Ethics

What is Ethics?
Each society forms a set of rules that establishes the
boundaries of generally accepted behavior.
These rules are often expressed in statements about how
people should behave, and they fit together to form the
moral code by which a society lives.
Ethics is the set of beliefs about right and wrong behavior.
Ethical behavior conforms to generally accepted social
norms, many of which are almost universal.
Virtues are habits that incline people to do what is
acceptable, and vices are habits of unacceptable behavior
People’s virtues and vices help define their value system –
the complex scheme of moral values by which they live
Computer Ethics

Two Points of View
There is nothing new or special about ethical issues
involving computer technology.
First Law of Philosophy
There are new, unique ethical issues that could not
have existed without computer technology.
Second Law of Philosophy
Computer Ethics

Policy Vacuums
Computers are logically malleable.
Typical problems arise in Computer Ethics because there is a policy
vacuum about how computer technology should be used.
Computer Ethics

What Do We Mean by Cyber Ethics?
Analysis of the nature and social impact of computer technology
Corresponding formulation and justification of policies for the ethical
use of such technology.
Computer Ethics

Information Gap
Example: Sub Saharan Africa
Any third world country
Computer Ethics

On Line Education
Cyber Degrees
Social Acceptance?
Take the Money, send the diploma, but provide weak or no
educational experience
Computer Ethics

Electronic Voting
Paper vs. machine vs. computer.
Convenience and speed.
Computer Ethics

On Line Pharmacies
Convenience and price.
Prescription needed?
Doctor’s role?
Computer Ethics

Athletic Recruiting
Numbers of phone calls vs. emails
Personal promotions both amateur and professional
Two_way investigations
Computer Ethics

RFID
Radio Frequency Identification RFID
May contain everything about a person
Saves Lives
Invades Privacy
Computer Ethics

Employee Monitoring
Email
Websites
Monitoring software
Computer Ethics

Virtual Life
Gaming
Create your own identity
Purchase virtual merchandise
Hone your skills
Computer Ethics

Who Are You? Who Am I?
Anonymity in the virtual world
How many hours do people spend online?
Confusion?
Computer Ethics

Natural World and Cyberspace
Physical World: DNA, RNA: A, T, G, C
Computer World: 0, 1
Natural Ethics
Cyber Ethics
Creation?
Natural World
Virtual World
Computer Ethics

Controlling Cyberspace
Relativism need not apply.
Cyberspace is beyond geographic and political boundaries.
Do we want to enforce ethical standards on cyberspace?
Can we?
We must depend on human integrity.
Computer Ethics
Tags