skip to main content
Skip header Section
Ethical conflicts: in information and computer science, technology, and businessJanuary 1990
Publisher:
  • QED Information Sciences, Inc.
  • 170 Linden St. Wellesley, MA
  • United States
ISBN:978-0-89435-313-0
Published:03 January 1990
Pages:
214
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Parker D (2007). The Dark Side of Computing, IEEE Annals of the History of Computing, 29:1, (3-15), Online publication date: 1-Jan-2007.
  2. Charlesworth M and Sewry D Ethical issues in enabling information technologies Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology, (163-171)
  3. Floridi L and Sanders J (2019). Mapping the foundationalist debate in computer ethics, Ethics and Information Technology, 4:1, (1-9), Online publication date: 25-Apr-2002.
  4. Friedman B and Kahn P Human values, ethics, and design The human-computer interaction handbook, (1177-1201)
  5. Smith H and Hasnas J (2018). Ethics and information systems, MIS Quarterly, 23:1, (109-127), Online publication date: 1-Mar-1999.
  6. ACM
    Benbunan-Fich R (1998). Guidelines for using case scenarios to teach computer ethics, ACM SIGCAS Computers and Society, 28:3, (20-24), Online publication date: 1-Sep-1998.
  7. Thong J and Yap C (1998). Testing an ethical decision-making theory, Journal of Management Information Systems, 15:1, (213-237), Online publication date: 1-Jun-1998.
  8. ACM
    Cappel J and Windsor J (1998). A comparative investigation of ethical decision making, ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 29:2, (20-32), Online publication date: 1-Apr-1998.
  9. ACM
    Tavani H (1996). Selecting a computer ethics coursebook, ACM SIGCAS Computers and Society, 26:4, (15-21), Online publication date: 1-Dec-1996.
  10. ACM
    Pierce M and Henry J (2019). Computer ethics and social issues case analysis, ACM SIGCSE Bulletin, 28:4, (50-54), Online publication date: 1-Dec-1996.
  11. Westland C (1996). A rational choice model of computer and network crime, International Journal of Electronic Commerce, 1:2, (109-126), Online publication date: 1-Dec-1996.
  12. ACM
    Roth R A comparison of recent textbooks for teaching computer ethics to undergraduates Proceedings of the symposium on Computers and the quality of life, (10-14)
  13. ACM
    Laudon K (1995). Ethical concepts and information technology, Communications of the ACM, 38:12, (33-39), Online publication date: 1-Dec-1995.
  14. ACM
    Wong E, Davison R and Wade P Computer ethics and tertiary level education in Hong Kong Proceedings of the conference on Ethics in the computer age, (127-132)
  15. ACM
    Artz J Virtue vs. utility Proceedings of the conference on Ethics in the computer age, (16-21)
  16. ACM
    Hanchey C and Kingsbury J A survey of students' ethical attitudes using computer-related scenarios Proceedings of the conference on Ethics in the computer age, (2-6)
  17. ACM
    Dahlbom B and Mathiassen L (1994). A Scandinavian view on the ACM's Code of Ethics, ACM SIGCAS Computers and Society, 24:2, (14-20), Online publication date: 1-Jun-1994.
  18. ACM
    Johnson D (1994). Who should teach computer ethics and computers & society?, ACM SIGCAS Computers and Society, 24:2, (6-13), Online publication date: 1-Jun-1994.
  19. ACM
    Harrington S The impact of codes of ethics on information systems personnel Proceedings of the 1994 computer personnel research conference on Reinventing IS : managing information technology in changing organizations: managing information technology in changing organizations, (199-207)
  20. ACM
    Friedman B and Kahn P (1994). Educating computer scientists, Communications of the ACM, 37:1, (64-70), Online publication date: 2-Jan-1994.
  21. ACM
    Johnson D (1993). Book Excerpt: Computer Ethics, Second Edition by Deborah G. Johnson (Prentice Hall, 1994), ACM SIGCAS Computers and Society, 23:3-4, (10-14), Online publication date: 1-Dec-1993.
  22. ACM
    Morris A, Jones G and Rubinsztein J Entry-level information systems personnel Proceedings of the 1993 conference on Computer personnel research, (8-17)
  23. ACM
    Anderson R, Johnson D, Gotterbarn D and Perrolle J (1993). Using the new ACM code of ethics in decision making, Communications of the ACM, 36:2, (98-107), Online publication date: 1-Feb-1993.
  24. ACM
    Bergin T (1991). Teaching ethics, teaching ethically, ACM SIGCAS Computers and Society, 21:2-4, (33-39), Online publication date: 1-Nov-1991.
  25. ACM
    Weiss E (1990). The XXII self-assessment: the ethics of computing, Communications of the ACM, 33:11, (110-132), Online publication date: 1-Nov-1990.
  26. ACM
    Martin C and Martin D (1990). Professional codes of conduct and computer ethics education, ACM SIGSAC Review, 8:3, (1-12), Online publication date: 1-Sep-1990.
  27. ACM
    Friedman B (1990). A course in professional responsibility for computer scientists, ACM SIGCAS Computers and Society, 20:3, (174-179), Online publication date: 1-Aug-1990.
  28. ACM
    Friedman B A course in professional responsibility for computer scientists Proceedings of the conference on Computers and the quality of life, (174-179)
  29. ACM
    Martin D and Martin D (1990). Professional codes of conduct and computer ethics education, ACM SIGCAS Computers and Society, 20:2, (18-29), Online publication date: 1-Jul-1990.
  30. ACM
    BloomBecker J (1987). Computer ethics: an antidote to despair, ACM SIGCAS Computers and Society, 16-17:4-1, (3-11), Online publication date: 1-Oct-1987.
  31. ACM
    Mowshowitz A Computers and ethical judgment in organizations Proceedings of the 1978 annual conference - Volume 2, (675-683)
Contributors
  • SRI International

Index Terms

  1. Ethical conflicts: in information and computer science, technology, and business

      Recommendations

      Reviews

      Thomas J. Bergin

      Ethics is a topic that is slowly gaining importance in computing circles. A few short years ago, little literature existed to support the teaching of ethics in computing courses. Indeed, some argued that such teaching was unnecessary. Unfortunately, the recent discovery of a number of illegal or unethical activities is causing educators to reexamine the need for ethics education. Moreover, managers are realizing that their employees require ethics training. The six books reviewed differ in focus, scope, sources, and content. While some of the differences can be attributed to the date of publication, most of the variation results from the authors different perspectives, intended audiences, and stated purposes. The books present the reader with a wide range of ideas and materials to assist in the process of ethics education and training. Dejoie, Fowler, and Paradice This anthology was compiled “to assist the MIS professor…to provide a more structured approach to covering ethical issues in the information systems field.” Chapter 1, “Ethical Issues in Business,” contains three articles on general ethical issues in business from the Journal of Business Ethics . The second chapter looks at information systems issues. The articles by Mason, Forcht, and Couger are among the better treatments of these issues in the recent literature. A second set of readings looks at traditional issues such as privacy, accuracy, property, and access. In chapter 3, Arthur Miller discusses “Computers and Privacy” and Kenneth Laudon examines issues of data quality, a topic of growing importance. The main focus of chapter 4 is software piracy. Both these chapters end with sets of ethical scenarios. The final part of the book focuses on artificial intelligence. Two essays by Steven Frank examine “What AI Practitioners Should Know About the Law.” To add currency, the book contains a number of articles from the CPSR Newsletter , produced by Computer Professionals for Social Responsibility. Ermann, Williams, and Gutierrez All of the authors are professors at the University of Delaware, in the departments of sociology, philosophy, and computer science, respectively. This book was written for third- and fourth-year students taking computer-related courses. The selections are a subset of the readings the authors used in interdisciplinary courses in computers, ethics, and society. The first part of this text focuses on developing “ethical frameworks for discussing computer-related issues.” The first three essays examine general ethical theory: utilitarian theory, the concept of justice, and the ethical theories of Emmanuel Kant. Additional essays examine the ethical contexts for three present-day problems: personal privacy, the relationship between the law and moral behavior, and the morality of whistle-blowing. A final set of essays examines the nature of the “good life” through selections from Aristotle and Augustine. The second part is entitled “Computers and the Ideal Life.” Essays deal with privacy, the quality of personal life, the quality of work life, and justice in the nature and distribution of work. The discussion on personal life focuses on artificial intelligence, with essays by Minsky and by Dreyfus and Dreyfus. The discussion of work life looks at the mechanization of office work, using computers to work at home, and the impact of computing technology on women. The section on justice and the nature of work contains an essay on “Information Technology and the Third World.” The final part of the book contains 11 chapters on the distribution of rewards, legal issues, and moral responsibility. The first essays examine the “look and feel” issue with respect to copyright and innovation. The second section examines liability for software malfunctions, the IBMHitachi sting, and computer crime. The final section contains the ACM code of conduct and two essays on the Strategic Defense Initiative, by David Parnas and Walter Morrow. Table 1: Descriptive data Dejoie, Fowler, and Paradice Ermann, Williams, and Gutierrez Forrester and Morrison Johnson Johnson and Snapper Parker, Swope, and Baker Length in pages 320 376 193 110 363 214 Number of chapters 5 10 8 6 5 7 Number of essays 25 34 0 0 33 0 Number of scenarios 20 0 7 0 0 54 Intended as text Yes Yes Yes Yes Yes Yes Style Essays Essays Narrative Narrative Essays Scenarios Forester and Morrison The authors principal argument is “that computer systems by their very nature are insecure, unreliable, and unpredictable—and that society has yet to come to terms with the consequences.” This book evolved out of their experiences in teaching two courses on the human and social contexts of computing to computer science students. Accordingly, it reflects their focus on undergraduate computer science students and the goal of developing their ethical consciousness. The authors style is to discuss societal issues, with numerous references to actual problems appearing in the literature. Forester and Morrison acknowledge a special debt in this regard to Peter G. Neumanns efforts to document risks to the public in ACM SIGSOFTs Software Engineering Notes . After a short introduction to “Our Computerized Society,” the remaining chapters discuss “Computer Crime,” “Software Theft,” “Hacking and Viruses,” “Unreliable Computers,” “The Invasion of Privacy,” “AI and Expert Systems,” and “Computerizing the Workplace.” An appendix covers “Autonomous Systems: the Case of Star Wars.” Although the authors present the basic facts of the stories they are telling, their tone defeats their objective. If these stories are to be “cautionary tales” (such as the tale of Pinocchio: if you tell a lie, your nose will grow), then much of the narrative has the wrong tone and gives the wrong message. For example, the section on “Some Great Hacks” lauds convicted criminals. Indeed, what can the authors be thinking when they tell computer science students, “For those who are interested in further details of the techniques that hackers use, a particularly clear and comprehensive guide can be found… ” How is this going to deter undergraduates from hacking Later on, Forester and Morrison rationalize this by opining that “we might therefore ask ourselves whether, for the sake of balance, a truly democratic society should possess a core of technically gifted but recalcitrant people. Given that more and more information about individuals is now being stored on computers…is it not reassuring that some citizens are able to penetrate these databases and find out what is going on ” This tone permeates most of the discussion and defeats the purpose of the book, judging from the title. Johnson Johnson believes that most ethical dilemmas occur at work and that employees are sometimes called upon to act in ways that conflict with their personal values. Her purpose is thus to provide a foundation for ethical thinking in the context of specific computer-related issues. She believes that “new technologies often call upon us to extend ordinary moral and legal rules to novel situations created by use of the new technology.” The author is a professor of philosophy. Her book, one of the first on the subject, is divided into six chapters, each of which contains suggested readings. Chapter 1, “Ethical Theory,” is an overview of the philosophical foundations for two types of ethical theories: consequentialism and deontological theory. The author discusses utilitarian philosophy as an example of consequentialism and Kants categorical imperative as a deontological theory. While the discussion may prove difficult for some readers, the material is important to developing a framework for examining ethical problems and making ethical decisions. Chapter 2, “Professional Ethics,” states that since professionals acquire power by virtue of their expertise, they also have additional responsibilities. These responsibilities may be to their clients, their peers, their employers, or society in general. Johnson briefly discusses the ACM Code of Professional Conduct in this context. Chapter 3, “Liability for Malfunctions in Computer Programs,” looks at the legal liabilities for software as a product and as a service. Aspects of contracts, warranties, torts, and negligence are discussed in sufficient detail to give the reader some insight into these complex issues. Although everyone believes that they know something about computers and privacy, in chapter 4 Johnson focuses on balancing the need for information with the right to have some control over the information about us. If information is power, then those who control the machinery of information acquire power. Chapter 5 focuses on the locus of power in organizations, the problems of the haves and have nots, and the responsibilities of computer professionals. The final chapter looks at “The Ownership of Computer Programs.” The large number of lawsuits on “look and feel” have made this subject increasingly interesting to both students and practitioners. Table 2: Topics covered Dejoie, Fowler, and Paradice Ermann, Williams, and Gutierrez Forrester and Morrison Johnson Johnson and Snapper Parker, Swope, and Baker Ethical theory No Yes No Yes No No Professional ethics Yes Yes No Yes Yes Yes ACM Code of Ethics No Yes No Yes Yes No Business ethics Yes No No No No Yes Software liability No Yes No Yes Yes No Software ownership Yes Yes No Yes Yes Yes Computers and privacy Yes Yes Yes Yes Yes Yes Computers and power No No No Yes Yes No Computers and the workplace No Yes Yes No No No AI and expert systems Yes Yes Yes No No No Legal issues No Yes No Yes Yes No Computer crime Yes No Yes No No Yes Software piracy Yes No Yes No No No Johnson and Snapper This volume was the first anthology of readings that attempted to explore ethical issues resulting from the wide spread use of, and dependence on, computers. While it is unfortunately out of print, it makes an important contribution to the literature and should be available in most libraries. Although it is not a companion to Johnsons text, it follows similar lines. The first part, “Codes of Conduct for the Computer Professions,” contains five codes of ethics, promulgated by the British Computer Society, the Data Processing Management Association, the ACM, the IEEE, and the Institute for the Certification of Computer Professionals. This section also contains two essays on the problems inherent in creating codes of professional ethics. Part 2 examines issues of responsibility. Brannigan looks at “Liability for Personal Injury Caused by Defective Medical Computer Programs,” Nycum discusses liability from a general legal perspective, and Prince discusses “Negligence: Liability for Defective Software.” Part 3, on “Privacy and Security,” contains contributions by Turn, Ware, Burnham, and Westin, all of whom are well-known for their privacy research. It concludes with the introduction to a report to the Privacy Protection Study Commission. Part 4, “Computers and Power,” looks at how computers affect the distribution of power. It begins with excerpts from Weizenbaums Computer power and human reason [1] and Mowshowitzs Conquest of the will: information processing in human affairs [2]. Essays by Simon, Kling, Faflick, and Schiller round out the discussion. The final section, “Software as Property,” looks at the notion of intellectual property as it applies to software. Three chapters taken from law reviews consider different aspects of software protection, and two court cases examine software patents and software copyrights. Parker, Swope, and Baker Donn Parker has been studying intentionally caused losses associated with computers since 1958. In 1977 he served as principal investigator on a National Science Foundation project to develop ethics and computing scenarios that could be used to help raise the ethical consciousness of students and practitioners. The research proceeded in two stages: the creation of ethical scenarios was followed by the discussion of those scenarios at an extended workshop. Scenarios are short stories in which individuals are presented as acting in certain ways; the actors and their actions can then be judged, discussed, and related to ethical guidelines. The results of that research were published as Ethical conflicts in computer science and technology [3]. The information industry has changed in the past decade. The explosive growth of microcomputers and networking has presented new ethical problems to a wider range of individuals and organizations. This book is the result of a second workshop held in 1987. The process was repeated, using both scenarios from the 1977 workshop and material reflecting new problems based on current technology and practice. The book contains 54 scenarios grouped into five categories: Professional Standards, Obligations, and Accountability Property Ownership, Attribution, Piracy, Plagiarism, Copyrights, and Trade Secrets Confidentiality of Information and Personal Privacy Business Practices Including Contracts, Agreements, and Conflict of Interest EmployerEmployee Relationships A final chapter summarizes the ethical principles developed during the workshop, and the appendix contains additional comments on specific scenarios by workshop participants. Comparison Johnsons book is very good for introducing ethical theory in the classroom. Unfortunately, due to constant identification of new legal and ethical questions over the past few years, Johnson needs to expand and update her material. The Johnson and Snapper reader contains excellent source material for instructors. The Ermann and Dejoie books are newer and spring from related goals: to provide material for students taking computer-related courses (Ermann) and for business students majoring in management information systems (Dejoie). While both contain interesting readings on a wide range of issues, they lack the ethical theory and philosophy of Johnsons text and the Johnson and Snapper book. Ermann may be better suited for general audiences, while instructors in business schools may prefer Dejoie. The first edition of the Parker book was used to support a wide range of teaching and training. The addition of newer scenarios to the latest edition makes it a valuable resource for educators. The Forrester and Morrison book, as the authors state, is not about computer ethics. Its focus is on insecure and unreliable computers and on people who acted irresponsibly or illegally. I have used Johnson, Johnson and Snapper, and both editions of Parker to teach ethics at the graduate and undergraduate levels. Many of the papers in the Ermann and Dejoie texts are excellent and should prove useful to those seeking to increase students sensitivity to ethical issues in computing.

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.