skip to main content
Skip header Section
Computer ethicsJanuary 1985
Publisher:
  • Prentice-Hall, Inc.
  • Division of Simon and Schuster One Lake Street Upper Saddle River, NJ
  • United States
ISBN:978-0-13-164005-4
Published:01 January 1985
Pages:
110
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Halme E, Jantunen M, Vakkuri V, Kemell K and Abrahamsson P (2024). Making ethics practical, Information and Software Technology, 167:C, Online publication date: 1-Mar-2024.
  2. Ahmad A, Whitworth B and Bertino E (2022). A framework for the application of socio-technical design methodology, Ethics and Information Technology, 24:4, Online publication date: 1-Dec-2022.
  3. ACM
    Lang C, Macfadyen L, Slade S, Prinsloo P and Sclater N The complexities of developing a personal code of ethics for learning analytics practitioners Proceedings of the 8th International Conference on Learning Analytics and Knowledge, (436-440)
  4. Bhatnagar V, Sinha S and Bansal A (2017). A Framework for Effective Data Analytics for Tourism Sector, International Journal of Grid and High Performance Computing, 9:4, (92-104), Online publication date: 1-Oct-2017.
  5. ACM
    Webb H, Burnap P, Procter R, Rana O, Stahl B, Williams M, Housley W, Edwards A and Jirotka M (2016). Digital Wildfires, ACM Transactions on Information Systems, 34:3, (1-23), Online publication date: 5-May-2016.
  6. ACM
    Stahl B, Timmermans J and Mittelstadt B (2016). The Ethics of Computing, ACM Computing Surveys, 48:4, (1-38), Online publication date: 2-May-2016.
  7. Lau W and Yuen A (2014). Internet ethics of adolescents, Computers & Education, 72:C, (378-385), Online publication date: 1-Mar-2014.
  8. ACM
    Dark M and Winstead J Using educational theory and moral psychology to inform the teaching of ethics in computing Proceedings of the 2nd annual conference on Information security curriculum development, (27-31)
  9. ACM
    Robbins R, Wallace W and Puka B Supporting ethical problem solving Proceedings of the 2004 SIGMIS conference on Computer personnel research: Careers, culture, and ethics in a networked environment, (134-143)
  10. Dubbeld L (2003). Observing bodies. Camera surveillance and the significance of the body, Ethics and Information Technology, 5:3, (151-162), Online publication date: 2-Dec-2003.
  11. Friedman B and Kahn P Human values, ethics, and design The human-computer interaction handbook, (1177-1201)
  12. Bynum T (2001). Computer ethics, Ethics and Information Technology, 3:2, (109-112), Online publication date: 11-Sep-2001.
  13. ACM
    Tavani H (2000). Defining the boundaries of computer crime, ACM SIGCAS Computers and Society, 30:3, (3-9), Online publication date: 1-Sep-2000.
  14. ACM
    Pearson J, Crosby L and Shim J (1997). Measuring the importance of ethical behavior criteria, Communications of the ACM, 40:9, (94-100), Online publication date: 1-Sep-1997.
  15. ACM
    Tavani H (1996). Selecting a computer ethics coursebook, ACM SIGCAS Computers and Society, 26:4, (15-21), Online publication date: 1-Dec-1996.
  16. ACM
    Pierce M and Henry J (1996). Computer ethics and social issues case analysis, ACM SIGCSE Bulletin, 28:4, (50-54), Online publication date: 1-Dec-1996.
  17. ACM
    Pierce M and Henry J (1995). Computer-related judgements of computer professionals and students, ACM SIGCSE Bulletin, 27:1, (106-110), Online publication date: 15-Mar-1995.
  18. ACM
    Pierce M and Henry J Computer-related judgements of computer professionals and students Proceedings of the twenty-sixth SIGCSE technical symposium on Computer science education, (106-110)
  19. ACM
    Wong E, Davison R and Wade P Computer ethics and tertiary level education in Hong Kong Proceedings of the conference on Ethics in the computer age, (127-132)
  20. ACM
    Oz E (1994). When professional standards are lax, Communications of the ACM, 37:10, (29-43), Online publication date: 1-Oct-1994.
  21. ACM
    Henry J and Pierce M (1994). Computer ethics, ACM SIGCPR Computer Personnel, 15:3, (21-27), Online publication date: 1-Oct-1994.
  22. ACM
    Crawford D (1994). Information for authors, Communications of the ACM, 37:7, (148-149), Online publication date: 1-Jul-1994.
  23. ACM
    Dahlbom B and Mathiassen L (1994). A Scandinavian view on the ACM's Code of Ethics, ACM SIGCAS Computers and Society, 24:2, (14-20), Online publication date: 1-Jun-1994.
  24. ACM
    Crawford D (1994). Information for authors, Communications of the ACM, 37:4, (11-12), Online publication date: 1-Apr-1994.
  25. ACM
    Friedman B and Kahn P (1994). Educating computer scientists, Communications of the ACM, 37:1, (64-70), Online publication date: 2-Jan-1994.
  26. ACM
    Crawford D (1993). Information for authors, Communications of the ACM, 36:8, (102), Online publication date: 1-Aug-1993.
  27. ACM
    Crawford D (1993). Information for authors, Communications of the ACM, 36:4, (134), Online publication date: 1-Apr-1993.
  28. ACM
    Weis R and Gersting J A course on professionalism in the undergraduate CS curriculum Proceedings of the twenty-fourth SIGCSE technical symposium on Computer science education, (170-174)
  29. ACM
    Weis R and Gersting J (1993). A course on professionalism in the undergraduate CS curriculum, ACM SIGCSE Bulletin, 25:1, (170-174), Online publication date: 1-Mar-1993.
  30. ACM
    Crawford D (1992). Information for authors, Communications of the ACM, 35:10, (114), Online publication date: 1-Oct-1992.
  31. ACM
    Crawford D (1992). Information for authors, Communications of the ACM, 35:9, (15), Online publication date: 1-Sep-1992.
  32. ACM
    Crawford D (1992). Information for authors, Communications of the ACM, 35:1, (11), Online publication date: 2-Jan-1992.
  33. ACM
    Bergin T (1991). Teaching ethics, teaching ethically, ACM SIGCAS Computers and Society, 21:2-4, (33-39), Online publication date: 1-Nov-1991.
  34. ACM
    Weiss E (1990). The XXII self-assessment: the ethics of computing, Communications of the ACM, 33:11, (110-132), Online publication date: 1-Nov-1990.
  35. ACM
    Friedman B (1990). A course in professional responsibility for computer scientists, ACM SIGCAS Computers and Society, 20:3, (174-179), Online publication date: 1-Aug-1990.
  36. ACM
    Friedman B A course in professional responsibility for computer scientists Proceedings of the conference on Computers and the quality of life, (174-179)
  37. ACM
    BloomBecker J (1987). Computer ethics: an antidote to despair, ACM SIGCAS Computers and Society, 16-17:4-1, (3-11), Online publication date: 1-Oct-1987.
  38. ACM
    Jones J Participatory teaching methods in computer science Proceedings of the eighteenth SIGCSE technical symposium on Computer science education, (155-160)
  39. ACM
    Jones J (1987). Participatory teaching methods in computer science, ACM SIGCSE Bulletin, 19:1, (155-160), Online publication date: 1-Feb-1987.
Contributors
  • University of Virginia

Recommendations

Thomas J. Bergin

Ethics is a topic that is slowly gaining importance in computing circles. A few short years ago, little literature existed to support the teaching of ethics in computing courses. Indeed, some argued that such teaching was unnecessary. Unfortunately, the recent discovery of a number of illegal or unethical activities is causing educators to reexamine the need for ethics education. Moreover, managers are realizing that their employees require ethics training. The six books reviewed differ in focus, scope, sources, and content. While some of the differences can be attributed to the date of publication, most of the variation results from the authors different perspectives, intended audiences, and stated purposes. The books present the reader with a wide range of ideas and materials to assist in the process of ethics education and training. Dejoie, Fowler, and Paradice This anthology was compiled “to assist the MIS professor…to provide a more structured approach to covering ethical issues in the information systems field.” Chapter 1, “Ethical Issues in Business,” contains three articles on general ethical issues in business from the Journal of Business Ethics . The second chapter looks at information systems issues. The articles by Mason, Forcht, and Couger are among the better treatments of these issues in the recent literature. A second set of readings looks at traditional issues such as privacy, accuracy, property, and access. In chapter 3, Arthur Miller discusses “Computers and Privacy” and Kenneth Laudon examines issues of data quality, a topic of growing importance. The main focus of chapter 4 is software piracy. Both these chapters end with sets of ethical scenarios. The final part of the book focuses on artificial intelligence. Two essays by Steven Frank examine “What AI Practitioners Should Know About the Law.” To add currency, the book contains a number of articles from the CPSR Newsletter , produced by Computer Professionals for Social Responsibility. Ermann, Williams, and Gutierrez All of the authors are professors at the University of Delaware, in the departments of sociology, philosophy, and computer science, respectively. This book was written for third- and fourth-year students taking computer-related courses. The selections are a subset of the readings the authors used in interdisciplinary courses in computers, ethics, and society. The first part of this text focuses on developing “ethical frameworks for discussing computer-related issues.” The first three essays examine general ethical theory: utilitarian theory, the concept of justice, and the ethical theories of Emmanuel Kant. Additional essays examine the ethical contexts for three present-day problems: personal privacy, the relationship between the law and moral behavior, and the morality of whistle-blowing. A final set of essays examines the nature of the “good life” through selections from Aristotle and Augustine. The second part is entitled “Computers and the Ideal Life.” Essays deal with privacy, the quality of personal life, the quality of work life, and justice in the nature and distribution of work. The discussion on personal life focuses on artificial intelligence, with essays by Minsky and by Dreyfus and Dreyfus. The discussion of work life looks at the mechanization of office work, using computers to work at home, and the impact of computing technology on women. The section on justice and the nature of work contains an essay on “Information Technology and the Third World.” The final part of the book contains 11 chapters on the distribution of rewards, legal issues, and moral responsibility. The first essays examine the “look and feel” issue with respect to copyright and innovation. The second section examines liability for software malfunctions, the IBMHitachi sting, and computer crime. The final section contains the ACM code of conduct and two essays on the Strategic Defense Initiative, by David Parnas and Walter Morrow. Table 1: Descriptive data Dejoie, Fowler, and Paradice Ermann, Williams, and Gutierrez Forrester and Morrison Johnson Johnson and Snapper Parker, Swope, and Baker Length in pages 320 376 193 110 363 214 Number of chapters 5 10 8 6 5 7 Number of essays 25 34 0 0 33 0 Number of scenarios 20 0 7 0 0 54 Intended as text Yes Yes Yes Yes Yes Yes Style Essays Essays Narrative Narrative Essays Scenarios Forester and Morrison The authors principal argument is “that computer systems by their very nature are insecure, unreliable, and unpredictable—and that society has yet to come to terms with the consequences.” This book evolved out of their experiences in teaching two courses on the human and social contexts of computing to computer science students. Accordingly, it reflects their focus on undergraduate computer science students and the goal of developing their ethical consciousness. The authors style is to discuss societal issues, with numerous references to actual problems appearing in the literature. Forester and Morrison acknowledge a special debt in this regard to Peter G. Neumanns efforts to document risks to the public in ACM SIGSOFTs Software Engineering Notes . After a short introduction to “Our Computerized Society,” the remaining chapters discuss “Computer Crime,” “Software Theft,” “Hacking and Viruses,” “Unreliable Computers,” “The Invasion of Privacy,” “AI and Expert Systems,” and “Computerizing the Workplace.” An appendix covers “Autonomous Systems: the Case of Star Wars.” Although the authors present the basic facts of the stories they are telling, their tone defeats their objective. If these stories are to be “cautionary tales” (such as the tale of Pinocchio: if you tell a lie, your nose will grow), then much of the narrative has the wrong tone and gives the wrong message. For example, the section on “Some Great Hacks” lauds convicted criminals. Indeed, what can the authors be thinking when they tell computer science students, “For those who are interested in further details of the techniques that hackers use, a particularly clear and comprehensive guide can be found… ” How is this going to deter undergraduates from hacking Later on, Forester and Morrison rationalize this by opining that “we might therefore ask ourselves whether, for the sake of balance, a truly democratic society should possess a core of technically gifted but recalcitrant people. Given that more and more information about individuals is now being stored on computers…is it not reassuring that some citizens are able to penetrate these databases and find out what is going on ” This tone permeates most of the discussion and defeats the purpose of the book, judging from the title. Johnson Johnson believes that most ethical dilemmas occur at work and that employees are sometimes called upon to act in ways that conflict with their personal values. Her purpose is thus to provide a foundation for ethical thinking in the context of specific computer-related issues. She believes that “new technologies often call upon us to extend ordinary moral and legal rules to novel situations created by use of the new technology.” The author is a professor of philosophy. Her book, one of the first on the subject, is divided into six chapters, each of which contains suggested readings. Chapter 1, “Ethical Theory,” is an overview of the philosophical foundations for two types of ethical theories: consequentialism and deontological theory. The author discusses utilitarian philosophy as an example of consequentialism and Kants categorical imperative as a deontological theory. While the discussion may prove difficult for some readers, the material is important to developing a framework for examining ethical problems and making ethical decisions. Chapter 2, “Professional Ethics,” states that since professionals acquire power by virtue of their expertise, they also have additional responsibilities. These responsibilities may be to their clients, their peers, their employers, or society in general. Johnson briefly discusses the ACM Code of Professional Conduct in this context. Chapter 3, “Liability for Malfunctions in Computer Programs,” looks at the legal liabilities for software as a product and as a service. Aspects of contracts, warranties, torts, and negligence are discussed in sufficient detail to give the reader some insight into these complex issues. Although everyone believes that they know something about computers and privacy, in chapter 4 Johnson focuses on balancing the need for information with the right to have some control over the information about us. If information is power, then those who control the machinery of information acquire power. Chapter 5 focuses on the locus of power in organizations, the problems of the haves and have nots, and the responsibilities of computer professionals. The final chapter looks at “The Ownership of Computer Programs.” The large number of lawsuits on “look and feel” have made this subject increasingly interesting to both students and practitioners. Table 2: Topics covered Dejoie, Fowler, and Paradice Ermann, Williams, and Gutierrez Forrester and Morrison Johnson Johnson and Snapper Parker, Swope, and Baker Ethical theory No Yes No Yes No No Professional ethics Yes Yes No Yes Yes Yes ACM Code of Ethics No Yes No Yes Yes No Business ethics Yes No No No No Yes Software liability No Yes No Yes Yes No Software ownership Yes Yes No Yes Yes Yes Computers and privacy Yes Yes Yes Yes Yes Yes Computers and power No No No Yes Yes No Computers and the workplace No Yes Yes No No No AI and expert systems Yes Yes Yes No No No Legal issues No Yes No Yes Yes No Computer crime Yes No Yes No No Yes Software piracy Yes No Yes No No No Johnson and Snapper This volume was the first anthology of readings that attempted to explore ethical issues resulting from the wide spread use of, and dependence on, computers. While it is unfortunately out of print, it makes an important contribution to the literature and should be available in most libraries. Although it is not a companion to Johnsons text, it follows similar lines. The first part, “Codes of Conduct for the Computer Professions,” contains five codes of ethics, promulgated by the British Computer Society, the Data Processing Management Association, the ACM, the IEEE, and the Institute for the Certification of Computer Professionals. This section also contains two essays on the problems inherent in creating codes of professional ethics. Part 2 examines issues of responsibility. Brannigan looks at “Liability for Personal Injury Caused by Defective Medical Computer Programs,” Nycum discusses liability from a general legal perspective, and Prince discusses “Negligence: Liability for Defective Software.” Part 3, on “Privacy and Security,” contains contributions by Turn, Ware, Burnham, and Westin, all of whom are well-known for their privacy research. It concludes with the introduction to a report to the Privacy Protection Study Commission. Part 4, “Computers and Power,” looks at how computers affect the distribution of power. It begins with excerpts from Weizenbaums Computer power and human reason [1] and Mowshowitzs Conquest of the will: information processing in human affairs [2]. Essays by Simon, Kling, Faflick, and Schiller round out the discussion. The final section, “Software as Property,” looks at the notion of intellectual property as it applies to software. Three chapters taken from law reviews consider different aspects of software protection, and two court cases examine software patents and software copyrights. Parker, Swope, and Baker Donn Parker has been studying intentionally caused losses associated with computers since 1958. In 1977 he served as principal investigator on a National Science Foundation project to develop ethics and computing scenarios that could be used to help raise the ethical consciousness of students and practitioners. The research proceeded in two stages: the creation of ethical scenarios was followed by the discussion of those scenarios at an extended workshop. Scenarios are short stories in which individuals are presented as acting in certain ways; the actors and their actions can then be judged, discussed, and related to ethical guidelines. The results of that research were published as Ethical conflicts in computer science and technology [3]. The information industry has changed in the past decade. The explosive growth of microcomputers and networking has presented new ethical problems to a wider range of individuals and organizations. This book is the result of a second workshop held in 1987. The process was repeated, using both scenarios from the 1977 workshop and material reflecting new problems based on current technology and practice. The book contains 54 scenarios grouped into five categories: Professional Standards, Obligations, and Accountability Property Ownership, Attribution, Piracy, Plagiarism, Copyrights, and Trade Secrets Confidentiality of Information and Personal Privacy Business Practices Including Contracts, Agreements, and Conflict of Interest EmployerEmployee Relationships A final chapter summarizes the ethical principles developed during the workshop, and the appendix contains additional comments on specific scenarios by workshop participants. Comparison Johnsons book is very good for introducing ethical theory in the classroom. Unfortunately, due to constant identification of new legal and ethical questions over the past few years, Johnson needs to expand and update her material. The Johnson and Snapper reader contains excellent source material for instructors. The Ermann and Dejoie books are newer and spring from related goals: to provide material for students taking computer-related courses (Ermann) and for business students majoring in management information systems (Dejoie). While both contain interesting readings on a wide range of issues, they lack the ethical theory and philosophy of Johnsons text and the Johnson and Snapper book. Ermann may be better suited for general audiences, while instructors in business schools may prefer Dejoie. The first edition of the Parker book was used to support a wide range of teaching and training. The addition of newer scenarios to the latest edition makes it a valuable resource for educators. The Forrester and Morrison book, as the authors state, is not about computer ethics. Its focus is on insecure and unreliable computers and on people who acted irresponsibly or illegally. I have used Johnson, Johnson and Snapper, and both editions of Parker to teach ethics at the graduate and undergraduate levels. Many of the papers in the Ermann and Dejoie texts are excellent and should prove useful to those seeking to increase students sensitivity to ethical issues in computing.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.