710 likes | 859 Views
The Secret to Meaningful Discussions in Computer Ethics Classes. Michael J. Quinn Seattle University. Cameras are everywhere, and posting to the Web is easy. How much privacy should we expect?. What’s the point?. Goals. Keep students focused Air differences Sharpen arguments
E N D
The Secret toMeaningful Discussionsin Computer Ethics Classes Michael J. QuinnSeattle University
Cameras are everywhere, and posting to the Web is easy.How much privacy should we expect?
Goals • Keep students focused • Air differences • Sharpen arguments • Encourage creativity and imagination • Increase participation • Enliven discussions • Produce a tangible result • Demonstrate value • Rebut skeptics who say: “What’s the point?”
Solution: Case-based Analysis • “Bottom-up” approach • Start with a particular test case • Determine what’s the issue • Construct negative paradigm case, brainstorming morally relevant features • Construct positive paradigm case • For each feature, compare test case against paradigm cases
Example Ann is the bookkeeper at Acme Corporation, a medium-sized firm with about 50 employees. All of the employees work in the same building, and Ann distributes the paychecks every month. Ann’s daughter is a Girl Scout. During the annual Girl Scout cookie sale, Ann sends an email to all of the other Acme employees, inviting them to stop by her desk and order some cookies. Some of the employees order cookies, but many employees find the email annoying. Did Ann do anything wrong?
What’s the issue? Unsolicited bulk email; i.e., spam
Clearly Wrong Clearly Right 100 million recipients
Clearly Wrong Clearly Right 100 million recipients unsolicited
Clearly Wrong Clearly Right 100 million recipients unsolicited pornography
Clearly Wrong Clearly Right 100 million recipients unsolicited pornography fraudulent product
Clearly Wrong Clearly Right 100 million recipients unsolicited pornography fraudulent product sender unknown
Clearly Wrong Clearly Right 100 million recipients 1 recipient unsolicited pornography fraudulent product sender unknown
Clearly Wrong Clearly Right 100 million recipients 1 recipient unsolicited solicited pornography fraudulent product sender unknown
Clearly Wrong Clearly Right 100 million recipients 1 recipient unsolicited solicited pornography benign content fraudulent product sender unknown
Clearly Wrong Clearly Right 100 million recipients 1 recipient unsolicited solicited pornography benign content fraudulent product desired product sender unknown
Clearly Wrong Clearly Right 100 million recipients 1 recipient unsolicited solicited pornography benign content fraudulent product desired product sender unknown sender known
Clearly Wrong Clearly Right X 100 million recipients 1 recipient unsolicited solicited pornography benign content fraudulent product desired product sender unknown sender known
Clearly Wrong Clearly Right X 100 million recipients 1 recipient X unsolicited solicited pornography benign content fraudulent product desired product sender unknown sender known
Clearly Wrong Clearly Right X 100 million recipients 1 recipient X unsolicited solicited X pornography benign content fraudulent product desired product sender unknown sender known
Clearly Wrong Clearly Right X 100 million recipients 1 recipient X unsolicited solicited X pornography benign content X fraudulent product desired product sender unknown sender known
Clearly Wrong Clearly Right X 100 million recipients 1 recipient X unsolicited solicited X pornography benign content X fraudulent product desired product X sender unknown sender known
Clearly Wrong Which features are most important? Clearly Right X 100 million recipients 1 recipient X unsolicited solicited X pornography benign content X fraudulent product desired product X sender unknown sender known
Clearly Wrong Which features are most important? Clearly Right X 100 million recipients 1 recipient X unsolicited solicited X pornography benign content X fraudulent product desired product X sender unknown sender known
Clearly Wrong Was the action wrong? Clearly Right X 100 million recipients 1 recipient X unsolicited solicited X pornography benign content X fraudulent product desired product X sender unknown sender known
Clearly Wrong What could Ann have done differently? Clearly Right X 100 million recipients 1 recipient X unsolicited solicited X pornography benign content X fraudulent product desired product X sender unknown sender known
Ann could have asked people if they were interested in being on a Girls Scout cookie mailing list.
Clearly Wrong Clearly Right X 100 million recipients 1 recipient X unsolicited solicited X pornography benign content X fraudulent product desired product X sender unknown sender known
Privacy • “Zone of inaccessibility” (Edmund Byrne) • Privacy = control over zone • Physical • Mental • Informational
Global Village • Marshall McLuhan, The Gutenberg Galaxy (1962) • Electronic media collective identity • World takes on village-like mindset
But Wait! Web 2.0 • Web not simply a distribution medium • Applications allow users to contribute content • Blogs • Wikis • Social networks
Case Benjamin attends a private birthday party for his good friend Chris, a member of the Orange Party. Someone gives Chris a Yellow Party T-shirt as a gag gift, and Chris puts it on. Benjamin takes a picture of Chris wearing the T-shirt and posts it on his blog, identifying Chris and explaining the context of the photo. When Chris runs for governor, organizations supporting his opponent in the Orange Party primary post the photo out of context, along with stories claiming he used to belong to the Yellow Party. In the end, Chris wins the primary and is elected governor. Was Benjamin wrong to post the photo?
The issue: Posting photos without permission
Clearly Wrong Clearly Right bathroom
Clearly Wrong Clearly Right bathroom posted w/o permission
Clearly Wrong Clearly Right bathroom posted w/o permission photo secretly taken
Clearly Wrong Clearly Right bathroom posted w/o permission photo secretly taken illegal activity