Introduction to Cyber-Ethics - baravalle.com

Introduction to Cyber-Ethics - baravalle.com

Introduction to Cyberethics Issues for ICT Professionals School of Architecture, Computing, and Engineering University of East London 5 March 2014 Dr Josephine Anne Stein Principal Research Fellow in Innovation Studies emerita Law and Social Sciences/LSS E-mail: [email protected] Overview Ethical issues for ICT professionals Definitions and basic concepts Western moral tradition and evolution

What is the relevance of ethics to ICTs? Cyber-ethics issues and dilemmas Practical approaches to applying ethics 5.3.2014 JA Stein 2 Ethical issues for ICT professionals Data protection and other legal matters Hacktivism

Business computer ethics Surveillance at work Ethics in the Cloud Online privacy 5.3.2014 JA Stein 3 British Computer Society Code of Conduct Public interest Awareness of legal environment Avoid discrimination

Duty to relevant authority Compliance and expert judgement Confidentiality and disclosure Manage task within time and budget Duty to the profession Professional competence and integrity 5.3.2014 JA Stein 4 Definitions: Ethics The study and philosophy of human conduct, with emphasis on the determination of right and wrong. The basic principles of right action especially

with reference to a particular profession (New International Websters Dictionary 1996) a code of behaviour, especially of a particular group, profession or individual. The moral fitness of a decision, course of action, etc. (Collins Dictionary 2002) 5.3.2014 JA Stein 5 Why Cyber-ethics? Computer ethics Customised or bespoke software (machines) Internet ethics Netiquette (www, email) (content)

Cyber-ethics LAN Internet Cloud (environment) 5.3.2014 JA Stein 6 Definitions: Morality the quality of being moral; that which renders an action right or wrong; the practice of moral duties apart from religion; virtue......ethics (Chambers Dictionary 1998) a set of shared rules, principles and duties applicable to all members of a group or society which we follow in our day-to-day living.....They help us to distinguish between right and wrong (E Turner)

5.3.2014 JA Stein 7 Moral philosophy and applied ethics Moral Philosophy or metaethics: philosophical reflection on the nature of moral judgement critical analysis, identifying moral principles Applied ethics: practical approaches to understanding real-world moral issues, making explicit beliefs and values based on philosophical principles: individual rights and autonomy ownership authority and relativism

objectivity, trust, privacy social distribution of responsibility, damage and risk 5.3.2014 JA Stein 8 The nature of authority Expertise and subjectivity validated knowledge and credentialed expertise scientific method, experience, opinion who is qualified concerning moral judgement? An authority or someone in authority? is doing the right thing about avoiding punishment? is authority conferred or earned? when and why does one reject authority?

From power-based to rule-based to value-based morality 5.3.2014 JA Stein 9 Ethics in the Old Testament Ten Commandments, abridged and paraphrased (Exodus 20) Honour your father and mother Dont commit murder or adultery Dont steal or covet what isnt yours Dont lie Other Old Testament examples

Dont accept bribes (Exodus 23) Do not mistreat an alien or oppress him (Exodus 22) 5.3.2014 JA Stein 10 Christian ethics Incarnation: God as taking human form Teachings of Jesus Christ loving all, including the outsider, the rejected, the enemy; faith, hope and charity, settings norms of

humane behaviour defying local authoritarian power, leading to JCs execution Resurrection taking personal responsibility for ones actions ....but external divine authority still available to judge, offer absolution from sin or punishment of the guilty vindication of JCs embodied human/divine authority Rise of the Church and the Bible as authoritative 5.3.2014 closing the biblical canon in 405 AD, Christendom JA Stein 11 The rise of secular humanism

Reformation and Protestantism (16th century) Enlightenment (18th century) rise of rationality and human-centred philosophy Modernism (early 20th century) Martin Luther and the rebellion against corruption Henry VIII and the Church of England triumph of progress in delivering prosperity now instead of promises in eternity or afterlife, based on universal scientific principles

Postmodernism (mid-late 20th century) 5.3.2014 rejection of the grand narrative in favour of constructed identity, anti-realism and pluralism JA Stein 12 Systems of ethics: From ancient Greece to the 21st Century Deontology: rules, rights and duties Divine command ethics Kantian ethics Contractualism Hobbes Social contract

Consequentialism Utilitarianism 5.3.2014 Virtue ethics JA Stein 13 Deontology Rules, rights and duties Divine command ethics: Claims made about obedience to God Son of Sam murders George W. Bush and the invasion of Iraq Acceptability in academia 5.3.2014 JA Stein 14

Categorical moral obligations: Immanuel Kant (1724 - 1804) Duties as fundamental Hypothetical (non-moral) imperatives: Morality a matter of objective, dispassionate rationality Intent as the basis of moral judgement: autonomy assumed If you want to be healthier, stop overeating If you want to be happier, make more & better friends If you dont want to be killed, hand over your money

Categorical (moral) imperatives: 5.3.2014 common sense rules that apply to all (universality) does not distinguish means from ends absolute: exceptions as never justifiable JA Stein 15 Contractualism Mutual advantage based on rational agreement explicit, codified (formal contract) implicit, understood (paying for a restaurant meal) intuitive expectation of social behaviour (psychological contract)

Thomas Hobbes (1588 - 1679) limits of altruism and sympathy inequalities in power amongst people need for absolute ruler social contract, authority and governance 5.3.2014 JA Stein 16 Consequentialism and utilitarianism Consequentialism: the consequences of an action alone determine its morality the ends justify the means Utilitarianism: not the same as usefulness....a goal classical: the ultimate good is something that most people actually desire modern: satisfaction, rather than happiness ethical hedonism: pleasure the only ultimate good

the greatest happiness of the greatest number In philosophy, pleasure, happiness and hedonism are more sophisticated concepts than as everyday terms, but.... 5.3.2014 JA Stein 17 Virtue ethics Aristotle and purpose in life Excellence, flourishing as source of happiness Augustine, Aquinas Specification of virtue in terms of health, aesthetics, knowledge, authenticity, integrity, justice, friendship, holiness

5.3.2014 JA Stein 18 Computer ethics Postwar period: Microcomputers, networking and personal computers the rise of artificial intelligence and fears of social domination by computers large-scale computation enabling greater lethality of military weaponry large-scale data manipulation enabling the

centralisation of social control (especially government): privacy and dignity software and IPRs hacking Internet and bandwidth privacy and protection from malicious individuals dependency in the age of informational capitalism 5.3.2014 Cloud computing JA Stein 19 Conceptualising computers and ethics Software

Hacking the Internet the Cloud Computer and information technology creates new possibilities; it instruments human action in new ways. The ethical issues that are thereby created are not out of the realm of human under-standing, but they have unique features with which we must come to grips. (Johnson) 5.3.2014 JA Stein 20 Computers and society: the case of software

Software (Johnson) A series of mental processes that cannot be owned, an internal structuring of a computer that forms a part of the machine, or a standalone product with commercial value? Traditionalist view: adapt existing tools such as patents and copyright? But can this approach capture the novel features and their (sometimes unintended) applications? Social context: moral, cultural, political ideas the study of computer ethics turns out [to] be the study of human beings and society -- our goals and values, our norms of behavior, the way we organize ourselves and assign rights and responsibilities 5.3.2014 JA Stein 21 Are computer ethical issues unique? New entities: programmes, software, microchips,

Websites, video games (MMORPGs), the Cloud Scale of organised activity: data collection, calculation, statistical analysis Scale of calculations: new types of knowledge in fields such as meteorology, economics, military technology Inherent unreliability of computer systems: new ways of thinking about risk, accountability and liability Power and pervasiveness: dependency on computers for all aspects of modern living, sometimes life itself 5.3.2014

JA Stein 22 Practical applications of ICT ethics Personal choices: careers, ownership of consumer goods Protection of children and vulnerable people in our care Policy, regulation and law both public and corporate policies gender, race, disability, equality and dignity issues regulation of service provision and content intellectual property rights

rights to privacy Conduct of democracy Codes of professional conduct 5.3.2014 JA Stein 23 Data Protection Act (1984) DPA requirements include Registration of personal data Description of purpose of use Person responsible for subject access requests Eight principles Fairness, specification of purpose,

appropriateness, adequacy, accuracy, timeliness, accessibility and security 5.3.2014 JA Stein 24 Data Protection Act (1998) Implementing European standards as per the Legal protection of databases Directive (1996) Registration Enlargement of jurisdiction to cover more types of data systems Manual data Videotapes, CDs, etc.

Information Commissioner empowered to issue fines from 6 April 2010 5.3.2014 JA Stein 25 Implications of the Data Protection Act for ICT professionals Awareness of requirements for registration; exemptions Treatment of personal data Use and disclosure of data Adequate but not excessive

Accuracy and timeliness 5.3.2014 JA Stein 26 Data protection and the Internet (I) Exemptions for personal use of data DPA Section 55 at work Pornographic websites Sexually explicit e-mails Disclosure of data to third parties 5.3.2014

JA Stein 27 Data protection and the Internet (II) Web site cookies, application forms and transparency Confidentiality and public services Use of personal data for secondary purposes Authorisation Public interest disclosure Informed consent 5.3.2014 JA Stein 28 Computer Misuse Act (1990)

Unauthorised access to a computer Unauthorised modification of data held on a computer Hacking Infecting computers with viruses Attempt to control international computer crime 5.3.2014 JA Stein 29 File-sharing, IPRs and

Democracy Napster mp3 file sharing started in 1999 and was shut down in 2001 by judicial order More than 60% of Internet traffic p2p sharing music, movies, books and games (June 2010) Encryption and IP address migration Piratbyrn - The Pirate Bay: 25 million visitors/month (2008) only hosts bit-torrents and not files so cannot be shut down but conspiracy case Market economy vs. capitalism (concentrated power)

Democracy and Human Rights: Piratpartiet and privacy 5.3.2014 JA Stein 30 Digital Economy Act (2010) Copyright/anti-piracy Compels ISPs to report persistent offenders Powers to restrict or cut off Internet access granted to the Secretary of State to instruct ISPs Ofcom enforces ISPs obligations Control of content: Video game classification Copyright material on websites The controversy continues Implementation wrt piracy delayed until 2015

5.3.2014 JA Stein 31 Professional responsibility v. Legal responsibility Compliance with the law Contribution to the formulation of law and professional practice Technological expertise Ethical/professional judgement Disclosure (whistleblowing) What if the law itself is ethically wrong?

5.3.2014 JA Stein 32 Business computer ethics Ethical behaviour as essential to maintaining trust that is the basis for doing business: clients, customers and suppliers competitors, especially when collaborating employees, shareholders and stakeholders empirical observation: ethical behaviour works (Langford) Computers pervasive in all aspects of business, and businesses of all sizes are highly dependent upon them Computers allow very complex processes to take place which are not transparent to consumers or regulators

5.3.2014 JA Stein 33 Regulation of Investigatory Powers Act (2000) allows monitoring of email by employers legalises interception of email by the security services 5.3.2014 JA Stein 34 Cloud computing and cyberethics Control and responsibility Users relinquish control over both computation and data

Dispersed responsibility for data and computational integrity Disappearance of geographical and functional boundaries Multi-purpose, multi-use Accountability? 5.3.2014 JA Stein 35 Online Privacy : Why is it important? Personal autonomy, security and dignity Freedom of association Political freedom and democracy

Intellectual property Commerce and employment Protection from cyber-crime 5.3.2014 JA Stein 36 What does secrecy mean in a virtual social environment? Privacy Anonymity

Identity Security Confidentiality 5.3.2014 JA Stein 37 Privacy Theories of privacy: Non-intrusion privacy: being free from interruption and interference Seclusion privacy: personal privacy and being alone Control/access privacy: having control over information about oneself Limitation privacy: contextdependent limits to access to ones personal information 5.3.2014

JA Stein 38 Internet privacy Datagathering and cyberstalking Dataveillance Merging electronic records Personal data mining Search engines Social networking online

What is properly personal and private, and what is in the public domain? 5.3.2014 JA Stein 39 Anonymity online Liberation (Cyborg Manifesto) or deception? On the Internet, nobody knows you're a dog Trust and accountability (e.g. misrepresentation and hacking) 5.3.2014 JA Stein 40 Identity in the virtual world Personal, social and legal identity

Aliases Constructed identities Digital effigies 5.3.2014 JA Stein 41 Security: a highly emotive topic Technological security (PETs) Identity theft, impersonation and fraud

Surveillance and counter-terrorism Psychological and sociological origins (existential insecurity; risk society) Security through cooperation 5.3.2014 JA Stein 42 Confidentiality and trust Friendship, kinship Caring professions Medical Social

Educational Religious Employment Social contracts, social capital 5.3.2014 JA Stein 43 Evolution of virtual society Communities Personal / family / diaspora Occupational / professional Interest group Organisations and institutions

e-government e-commerce 5.3.2014 JA Stein 44 The social regulation of the virtual world Regulating human behaviour Individual Institutional Social Social values of the Internet Development of expectations of identity in a postmodern medium Confidence in secure transactions (financial, personal) Anarchy, communism (Linux, open source software, freeware) 5.3.2014

JA Stein 45 Secrecy and governance in the virtual world Technological approaches are insufficient Formal and informal approaches to the governance of the www Social norms differ according to national, religious, ethnic and other distinctive features of various societies including online societies 5.3.2014 JA Stein 46

Promoting an ethical approach and the problem of moral philosophy Internet ethics is derived from Western moral philosophy, thus based on JudeaoChristian and European cultural heritage The foundations of different ethical frameworks cannot be fully rationalised and therefore, conceptualisations of ethical standards and approaches to governance (e.g. deontology, utilitarianism, notions of human rights etc.) dont lend themselves to multicultural rationalisation 5.3.2014 JA Stein 47 Universal ethics Values? (worth, esteem, etc.) Is privacy an intrinsic social value or is it

instrumental ? Truly universal ethics are based on virtues: Honesty and trustworthiness Benevolence and generosity Excellence Courage Honour and respect Justice 5.3.2014 JA Stein 48 Virtual and virtuous ?

Honesty and trustworthiness: Wikipedia Benevolence and generosity: on-line petitions and appeals Excellence: peer-reviewed journals Courage: resistance to political oppression Honour and respect: netiquette Justice: ? 5.3.2014 JA Stein 49

Virtual secrecy? No technological solutions to social problems, but no legal solutions either Tailoring secrecy to purpose Protection of legitimate confidentiality in professional and business/financial world Protection of personal privacy and dignity Social scepticism wrt identity education Informal and informed cooperative social promotion of on-line virtue 5.3.2014 JA Stein 50 Psychology of moral autonomy (Lawrence Kohlberg)

Preconventional level: self-benefit and the avoidance of punishment Conventional level: family, group or social norms uncritically accepted as standards of morality Postconventional level: individual recognition that right and wrong is not reducible to self-interest or social convention autonomous individuals who think for themselves and do not assumes that customs are always right seek to live by general, universal principles such as moral integrity, respect, and the Golden Rule 5.3.2014 JA Stein 51 Limits to rationalism Feminist critique: ethics of care (Carol Gilligan)

context-dependent on maintaining personal relationships: masculine ethics based on abstract rights and rules contrasted with feminine context-oriented reasoning Persistence of religious morality in contemporary society empirical observation that religious experience (including conversion) is attributed to God impossible to acquire religious belief through reasoning fundamentalism mainly in text-based religions: no moral ambiguity -- also balanced scripture, tradition and reason Computer Power and Human Reason (Joseph Weizenbaum) Decision vs. choice Judgement, compassion and wisdom 5.3.2014 JA Stein 52 Moral Heuristics

Is it honourable? Is there anyone from whom we would like to hide the action? Is it honest? Does it violate any agreement, actual or implied, or otherwise betray a trust? Does it avoid the possibility of conflict of interest? Are there other considerations that might bias your judgement? Is it within your area of competence? Is it possible that your best effort will not be adequate? Is it fair? Is it detrimental to the legitimate interests of others?

Is it considerate? Will it violate confidentiality or privacy, or otherwise harm anyone or anything? Is it conservative? Does it unnecessarily squander time or otherwise valuable resources? 5.3.2014 JA Stein 53 Example: Ethical analysis of plagiarism Identify and list as many different forms of plagiarism as possible Select four of the most egregious forms of plagiarism

What are the main ethical issues? Identify the stakeholders What ethical principles apply? What formal guidelines apply? What are the long-term implications, including prevention strategies? 5.3.2014 JA Stein 54 Plagiarism..dont..

When to reference Lifting material Padding Over-reliance on sources Other hazards: Self plagiarism Collusion Commercial (dis-)services UEL guidelines, policies and strategies 5.3.2014 JA Stein 55

Recently Viewed Presentations

  • Planning and Assessing Student Learning Outcomes for Statistics

    Planning and Assessing Student Learning Outcomes for Statistics

    Planning and Assessing Student Learning Outcomes for Statistics Carl Lee Central Michigan University Mt. Pleasant, MI 48849 [email protected] Phone: (989) 774-3555
  • When the going gets tough: Developing Emotional Resilience

    When the going gets tough: Developing Emotional Resilience

    When the going gets tough:Developing Emotional Resilience in First Year Students. Sue Morgan. Senior Lecturer and Clinical Placement Coordinator in Diagnostic Radiography
  • DDD Services: Supporting a Vision for a Good Life

    DDD Services: Supporting a Vision for a Good Life

    Core Belief: All people and their families have the right to live, love, work, play . and pursue their life aspirations in their community. SD has been part of the community of practive for support families (4 years) - a...
  • Education Reform Act 1988

    Education Reform Act 1988

    Education Reform Act 1988 The most important piece of education legislation since 1944 There are 6 main features A National Curriculum National Tests at 7, 11 and 14 Local Management of school budgets (LMS) Opting Out (Grant Maintained schools) City...
  • Insecurity in Information Technology - DeepSec

    Insecurity in Information Technology - DeepSec

    The security team is NEVER allowed to respond to requests for help by sending links to extremely long documents (ITSG-33 or NIST, for example) that are essentially unreadable to non-security-people and leave them more confused than before. Give specific and...
  • Data Science - University at Buffalo

    Data Science - University at Buffalo

    To share my experience with teaching data science: what worked and what did not. To discuss approaches for teaching date science. To share curriculum, course material and tools to introduce data science into undergraduate curriculum. Target audience: teachers and administrators...
  • PABXSoft Call Management Software

    PABXSoft Call Management Software

    PABXSoft takes 5 minutes to install, and 10 minutes to show the client. Anyone can do it. It's so simple and easy to understand, our clients love it. It gives us a price and feature advantage over our competitors. We...
  • U.S.C.G.Auxiliary Flotilla 18-06

    U.S.C.G.Auxiliary Flotilla 18-06

    U.S.C.G.Auxiliary Flotilla 18-06 Orientation Meeting for Prespective,New and Old members Prepared by Ed Wanamaker-Flotilla Commander What does the Auxiliary offer you A chance to give something back to your country, and recreational boaters Free training in several different programs -all...