1 / 21

Lecture 28

Lecture 28. Social & Legal Issues (S&G, ch. 14). Simulation & Models. Recall our discussion of models: a model is intended to address a certain class of questions or issues models make simplifying assumptions

Download Presentation

Lecture 28

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lecture 28 Social & Legal Issues (S&G, ch. 14) CS 100 - Lecture 28

  2. Simulation & Models • Recall our discussion of models: • a model is intended to address a certain class of questions or issues • models make simplifying assumptions • Recall the omission of aerodynamic stability from bridge models before the Tacoma Narrows Bridge disaster • Nevertheless, computer models & simulations are essential CS 100 - Lecture 28

  3. Evaluating Models • How well is the underlying science understood? • What sorts of simplifying assumptions are made? • How well does the model agree with experimental results? CS 100 - Lecture 28

  4. Computer Crime • Often just a new or “better” way to commit traditional crimes • Ampliative aspects of computer technology • may allow committing crimes on a larger scale • Reductive aspects of computer technology • may make it harder to detect crimes, identify criminals, etc. CS 100 - Lecture 28

  5. Some Kinds of Computer Crime • Fraud, embezzlement & theft • Stealing (data) • “Hacking” (system cracking) • individual systems • the information infrastructure • benign hacking? • Viruses & worms: reproduce selves • virus: hides in another program • worm: an independent program CS 100 - Lecture 28

  6. Constitutional & Civil Liberties Issues • 1st Amendment protects freedom of speech & press • 4th Amendment protects against unreasonable search & seizure • Do they apply to electronic & other new media? • So far, the courts generally have held them to apply, but there is much uncertainty CS 100 - Lecture 28

  7. Communication Media • Is the operator of a communication medium responsible for the information it carries? • analogy: telephone companies & post office • analogy: a privately-owned meeting room • Can the operator restrict this information? • analogy: telephone companies & post office • analogy: private presses CS 100 - Lecture 28

  8. Encryption & Wiretapping • Encryption can be used to ensure privacy & authenticity • may be used for legal/illegal purposes • May be subject to export restrictions • What provisions should be made for government interception & recording of communications? • What limits should be imposed on the government? CS 100 - Lecture 28

  9. These questions are especially relevant to issues such as the“USA PATRIOT” Act CS 100 - Lecture 28

  10. How do we address these issues? • Engineering issues (efficiency, economy, elegance) • addressed by engineering analysis & other kinds of technical expertise • Legal issues • addressed by lawyers, courts, etc. • Ethical issues • addressed by ethicists & ethical analysis CS 100 - Lecture 28

  11. New Ethical Issues • Consider a relatively well-defined ethical problem: • Is it ethical to “hack” into someone else’s computer system (and do no damage)? • Traditional moral codes do not address this issue! • So we must apply ethical analysis CS 100 - Lecture 28

  12. Ethical Analysis • Only touching on a few basic ideas • Ethics = “the study of how to decide if something is morally right or wrong” • What criteria are used for judging the rightness or wrongness of an action? • There are several well-established approaches to defining criteria CS 100 - Lecture 28

  13. Consequentialism • If the consequences of an act are on the whole good, then the act is good • If the consequences of an act are on the whole bad, then the act is bad • Good or bad for whom? • Utilitarian criterion: the greatest total happiness • Also, may be difficult to predict consequences CS 100 - Lecture 28

  14. Deontological Criterion • Deontology = the study of moral obligation • Rather than focusing on the consequences of an act, deontological arguments focus on the inherent nature of the act • Two important questions: • What is the intent of the act? • Is it a defensible, responsible act? CS 100 - Lecture 28

  15. Two Important Toolsof Ethical Analysis • Dialectic • Analogy CS 100 - Lecture 28

  16. Dialectical Method • Root meaning of dialectic is conversation • Philosophical dialectic: a method of approaching the truth by moving critically among two or more viewpoints • The strengths & weaknesses of each viewpoint are revealed, especially from the perspective of the others • Ideal outcome: a synthesis that combines the strengths & eliminate the weaknesses • More commonly, leads to better understanding of improved viewpoints CS 100 - Lecture 28

  17. Analogical Method • Identify analogous situations that are more familiar or better understood • Identify similarities & differences between the analogy and the issue of concern • Consider their relevance to the issue • Explore competing analogies dialectically CS 100 - Lecture 28

  18. A Method of Ethical Analysis • Identify stakeholders • Identify what is at stake(utilitarian step) • Identify duties & responsibilities(deontological step) • Think of & evaluate analogies • Make a decisionor repeat the steps CS 100 - Lecture 28

  19. Three Case Studies • Sharing music files • Zimmerman & PGP encryption • “Hacking” computer systems CS 100 - Lecture 28

  20. Reminder:Final ExamMonday, May 32:45 – 4:45 CS 100 - Lecture 28

  21. Next Time:a movie on the history of computing&a short quiz (to ensure you pay attention!) CS 100 - Lecture 28

More Related