ethics in a computing culture chapter 8 computing and vulnerable groups

15
Ethics in a Computing Culture Chapter 8 Computing and Vulnerable Groups

Upload: arthur-davis

Post on 17-Dec-2015

340 views

Category:

Documents


7 download

TRANSCRIPT

Page 1: Ethics in a Computing Culture Chapter 8 Computing and Vulnerable Groups

Ethics in a Computing Culture

Chapter 8Computing and Vulnerable Groups

Page 2: Ethics in a Computing Culture Chapter 8 Computing and Vulnerable Groups

Objectives

• How can the work of computer professionals harm vulnerable members?

• How is paying attention to vulnerable populations beneficial?

• How are the arguments of theorists applied in order to protect vulnerable members of society?

2Ethics in a Computing Culture

Page 3: Ethics in a Computing Culture Chapter 8 Computing and Vulnerable Groups

Why Pay Special Attention to Vulnerable Groups?

• What types of assistance does your school provide to students from vulnerable groups?

3Ethics in a Computing Culture

Page 4: Ethics in a Computing Culture Chapter 8 Computing and Vulnerable Groups

The Threat Analysis Method

• Threat analysis: an attempt to systematically identify the ways that a technology might be vulnerable to a malicious attack– Who might want to abuse this system?– Why might they want to abuse a system?

• Vulnerabilities: potential avenues of attack

4Ethics in a Computing Culture

Page 5: Ethics in a Computing Culture Chapter 8 Computing and Vulnerable Groups

Case: Should Gun Camera Videos be Public?

• Does the existence of gun cameras make soldiers vulnerable to harm that they otherwise would not experience?

5Ethics in a Computing Culture

Page 6: Ethics in a Computing Culture Chapter 8 Computing and Vulnerable Groups

People with Impaired, or Legally Limited, Decision-Making Abilities

• Autonomy: freedom for an entity to make decisions without outside constraints or interference

• Chilling effect: a situation in which one feels pressure not to do something, even though it is legal to do so, because of fear of prosecution

6Ethics in a Computing Culture

Page 7: Ethics in a Computing Culture Chapter 8 Computing and Vulnerable Groups

Case: Cell Phones and Family Locator Services

• Locator: anyone who has permission to see the locations of others using a family locator service, such as via cell phones

• Locatee: anyone whose cellular phone is being tracked– Most families make all adults locators and all children locatees

• Consider the following claim: – “The most moral way to use this technology is for all members of

the family to be both locators and locatees. That is perfectly fair.”

7Ethics in a Computing Culture

Page 8: Ethics in a Computing Culture Chapter 8 Computing and Vulnerable Groups

Case: Cell Phones and Family Locator Services (continued)

• Do the benefits of using a family locator service to decrease the vulnerability of children outweigh the harms?– Should the phones of locatees display an icon or message, so

that the users knows they are being tracked?– Should it be possible for locatees to turn off the location feature

whenever they want? – Are the elderly more vulnerable, or less vulnerable, than college

students?

8Ethics in a Computing Culture

Page 9: Ethics in a Computing Culture Chapter 8 Computing and Vulnerable Groups

People with Physical Limitations or Frailties

• Accessibility: the degree to which people with disabilities can use a given technology

• Examples of technologies that promote accessibility include:– Screen-readers: Software that reads the text on the screen audibly – Predictive typing: Software that can tell which word you are trying to

type based on the first few letters– Subtitles: Software that displays the text of any audible dialog– High contrast displays: Software that changes the colors of the

screen to make text easier to read– Haptic feedback: User interfaces that make cell phones vibrate– Text alternatives for images: On a Web page, provides a text

description of an image so that a screen-reader can describe an image

9Ethics in a Computing Culture

Page 10: Ethics in a Computing Culture Chapter 8 Computing and Vulnerable Groups

People with Physical Limitations or Frailties (continued)

10Ethics in a Computing Culture

Page 11: Ethics in a Computing Culture Chapter 8 Computing and Vulnerable Groups

Case: Hackers and Implantable Medical Devices

• Given the security vulnerabilities of the ICDs studied by Halperin’s team, was it ethically permissible for the ICD manufacturer to create and sell the defibrillators?

• Suppose a software company is designing a spreadsheet program. The program designers are considering using red to indicate negative numbers (instead of a negative symbol) and do not plan to provide any other formatting options. – Is it morally permissible to create such software?

11Ethics in a Computing Culture

Page 12: Ethics in a Computing Culture Chapter 8 Computing and Vulnerable Groups

Case: A Right to Gaming?

• Suppose a software company is designing a video game. The game designers are considering using yellow and green puzzle pieces and do not plan to provide any accommodations for color-blind users. – Is it morally permissible to create such software? – Is this more or less permissible than the software proposed in

the previous question?

12Ethics in a Computing Culture

Page 13: Ethics in a Computing Culture Chapter 8 Computing and Vulnerable Groups

Case: Computer Donations and Recycling

• E-waste: discarded electronic devices– Can contain precious metals, as well as toxins– If people in developing countries understood the harm they were

doing to themselves and their children by participating in e-waste recycling, do you think they would stop?

13Ethics in a Computing Culture

Page 14: Ethics in a Computing Culture Chapter 8 Computing and Vulnerable Groups

Members of Minority Groups

• Is it possible to write a policy that would ban hate groups, while not banning other innocent groups?

• Blizzard’s anti-harassment policies go above and beyond what the law ordinarily requires. – Should private companies like Blizzard create and enforce

policies that are different from the law? – Or should the police handle all harassment complaints?

14Ethics in a Computing Culture

Page 15: Ethics in a Computing Culture Chapter 8 Computing and Vulnerable Groups

Case: Sex Selection in India

• Use a rule utilitarian analysis to explain why the Indian government might ban sex selection of babies. In particular, what are the consequences for a society if a serious imbalance arises between the number of boys and number of girls born each year?

• Indian officials could, if they wanted, ban ultrasound sonograms altogether. Should they? – Would this benefit female fetuses? – Whom would it harm?

15Ethics in a Computing Culture