This document contains a lecture on professional ethics in technology and engineering. It discusses various ethical theories and frameworks, including deontological ethics, utilitarianism, and information ethics. It also presents several scenarios involving ethical dilemmas in areas like software licensing, public safety, privacy, conflicts of interest, and more. Students are encouraged to discuss the ethical issues raised in each scenario.
This document contains a lecture on professional ethics in technology and engineering. It discusses various ethical theories and frameworks, including deontological ethics, utilitarianism, and information ethics. It also presents several scenarios involving ethical dilemmas in areas like software licensing, public safety, privacy, conflicts of interest, and more. Students are encouraged to discuss the ethical issues raised in each scenario.
This document contains a lecture on professional ethics in technology and engineering. It discusses various ethical theories and frameworks, including deontological ethics, utilitarianism, and information ethics. It also presents several scenarios involving ethical dilemmas in areas like software licensing, public safety, privacy, conflicts of interest, and more. Students are encouraged to discuss the ethical issues raised in each scenario.
This document contains a lecture on professional ethics in technology and engineering. It discusses various ethical theories and frameworks, including deontological ethics, utilitarianism, and information ethics. It also presents several scenarios involving ethical dilemmas in areas like software licensing, public safety, privacy, conflicts of interest, and more. Students are encouraged to discuss the ethical issues raised in each scenario.
AIST2601 Technology, Society and Engineering Practice
Professional Ethics
By Dr. King Tin Lam
Department of Computer Science and Engineering 2 Image source: i.imgur.com Ethics § Study of what it means to “do the right thing”. § Assumes people are rational and make free choices. § Rules to follow in our interactions and our actions that affect others. Ethics § New technology → new risks § Something may be “legal” but unethical! ◦ The legal institution is still catching up. ◦ e.g., is cyberbullying illegal in Hong Kong? Some references: • https://www.hkreform.gov.hk/en/docs/essay21_2015.pdf • https://www.pcpd.org.hk/english/publications/files/cyberbullying_e.pdf
AIST2601 — Engineering Design and Innovation 4
Theories and Views § A variety of ethical views: ◦ Deontological theories ◦ Utilitarianism ◦ Natural rights ◦ Negative rights (liberties) ◦ The right to act without interference ◦ Positive rights (claim-rights) ◦ An obligation of some people to provide certain things for others Theories and Views § A variety of ethical views: § Golden rules ◦ Treat others as you would want them to treat you. § Contributing to society ◦ Doing one’s work honestly, responsibly, ethically, creatively, and well is virtuous. § Social contracts and a theory of political justice ◦ People willingly submit to a common law in order to live in a civil society. Theories and Views § A variety of ethical views: § No simple answers ◦ Human behavior and real human situations are complex. There are often trade-offs to consider. ◦ Ethical theories help to identify important principles or guidelines. Theories and Views § A variety of ethical views: § Do organizations have ethics? ◦ Ultimately, it is individuals who are making decisions and taking actions. ◦ We can hold both the individuals and the organization responsible for their acts. Theories and Views § Some important distinctions: ◦ Right, wrong, and okay ◦ Distinguishing wrong and harm ◦ Separating goals from constraints ◦ Personal preference and ethics ◦ Law and ethics Information Ethics § The PAPA model — Richard Mason “Four Ethical Issues of the Information Age” (1986) ◦ Privacy ◦ What information must people reveal about themselves to others? To whom? ◦ Accuracy ◦ Who is to check the information's accuracy and fidelity? Who's accountable for errors? ◦ Property ◦ Who owns the information? By how? ◦ Accessibility ◦ What can one access? Who has access?
AIST2601 — Engineering Design and Innovation 10
Professional Ethics § Professional ethics—responsibilities toward customers, clients, coworkers, employees, employers, product/service users, or people affected by a product
AIST2601 — Engineering Design and Innovation 11
Ethical Acceptable Questionable Unethical Computer • Proper and well • Not too bad, • Grey area of • Not up to crime agreed yet there may human ethical • Unethical and behavior be doubts behavior standards illegal
AIST2601 — Engineering Design and Innovation 12
Scenarios for Discussion § Scenario: Software License Violation ◦ Your company has 25 licenses for a computer program, but you discover that it has been copied onto 80 computers. Scenarios for Discussion § Scenario: Going Public ◦ Suppose you are a member of a team working on a computer-controlled crash avoidance system for automobiles. ◦ You think the system has a flaw that could endanger people. The project manager does not seem concerned and expects to announce completion of the project soon. ◦ Do you have an ethical obligation to do something? Scenarios for Discussion § Scenario: Release of Personal Information ◦ You work for the Internal Revenue Service (IRS), the Social Security Administration, a movie-rental company, or an Internet service provider. ◦ Someone asks you to get a copy of records about a particular person and will pay you $500. ◦ You know another employee sells records with people’s personal information. ◦ What would you do? Scenarios for Discussion § Scenario: Conflict of Interest ◦ You have a small consulting business. The CyberStuff company plans to buy software to run a cloud data-storage business. CyberStuff wants to hire you to evaluate bids from vendors. ◦ Your spouse works for NetWorkx and did most of the work in writing the bid that NetWorkx plans to submit. You read the bid while your spouse was working on it and you think it is excellent. ◦ Do you tell CyberStuff about your spouse’s connection with NetWorkx? Scenarios for Discussion § Scenario: Kickbacks and Disclosure ◦ You are an administrator at a major university. Your department selects a few brands of security software to recommend to students for their desktop computers, laptops, tablets, and other devices. ◦ One of the companies whose software you will evaluate takes you out to dinner, gives you free software (in addition to the security software), offers to pay your expenses to attend a professional conference on computer security, and offers to give the university a percentage of the price for every student who buys its security package. Scenarios for Discussion § Scenario: A Test Plan ◦ A team of programmers is developing a communications system for firefighters to use when fighting a fire. Firefighters will be able to communicate with each other, with supervisors near the scene, and with other emergency personnel. The programmers will test the system in a field near the company office. ◦ As one of the programmers, what questions you may ask the team. ◦ Is the test plan sufficient? Scenarios for Discussion § Scenario: A Gracious Host ◦ You are the computer system administrator for a mid-sized company. You can monitor the company network from home, and you frequently work from home. Your niece, a college student, is visiting for a week. She asks to use your computer to check her email. Sure, you say. ◦ What is the ethical issue?
Practical Digital Forensics: Forensic Lab Setup, Evidence Analysis, and Structured Investigation Across Windows, Mobile, Browser, HDD, and Memory (English Edition)