Next: Lent Term 2002: Part
Up: Michaelmas Term 2001: Part
Previous: Learning Day
  Contents
Lecturer: Dr R.C. Jennings (rcj11@cam.ac.uk)
No. of lectures: 8
Aims
This course will develop the ethical foundations of good professional
practice in computing. It will provide a basic survey of ethical theories
and discuss the role of professional organisations in maintaining good
practice, both in general and then specifically in the computing industry.
It will then consider three major areas of ethical concern in computing:
computer cracking, data privacy and software ownership.
Lectures
- Introduction.
The central and growing importance of computers in society.
Examples of ethical problems in the use of computers. Use and
misuse of computing facilities. [0.5 lecture]
- Ethical theory.
Basic questions in ethics. Survey of ethical theories: authoritarian,
intuitionist, egoist, utilitarian, deontologist. Advantages and
disadvantages of the two main theories: utilitarian and deontological.
[1.5 lectures]
- Professions and professional ethics.
Origin and purpose of professions. Internal regulation versus
external regulation. Dimensions of professional responsibility.
Professional organisations: ethics and codes of conduct. [1.5 lectures]
- Computer misuse.
Computer hacking, computer cracking: when does the fun
become crime? Computer Misuse Act 1990. Difficulties with
traditional legal concepts. [1.5 lectures]
- Privacy and data protection.
What is Privacy? Computer data and human dignity. The
problematic status of information stored on computers.
The Data Protection Act 1998. [1.5 lectures]
- Property ownership.
Theories of property and ownership: Patent, Copyright, and trade
secrets. Ownership of computer software: a new problem in
intellectual property rights. [1.5 lectures]
Objectives
At the end of the course students should
- be able to recognise and distinguish different kinds of ethical
arguments
- know why professions have codes of conduct, and what is included in
the British Computer Society code of conduct
- appreciate the dangers in computer cracking and know the contents of
the Computer Misuse Act of 1990
- be able to explain the nature of privacy and how it is protected
by the Data Protection Act of 1998
- be able to justify the existence of property laws and explain the
legal mechanisms which protect software as property
- know the disadvantages of private ownership of software and the
legal mechanisms by which private ownership can be blocked
Recommended books
Brown, G. (1990). The Information Game: Ethical Issues in a
Microchip
World. Atlantic Highlands, NJ: Humanities Press.
Forester, T. & Morrison, P. (1990). Computer Ethics: Cautionary
Tales and Ethical Dilemmas in Computing. Cambridge, MA: MIT Press.
Gould, C. (ed.) (1989). The Information Web: Ethical and Social
Implications of Computer Networking. Boulder, CO: Westview.
Johnson, D.G. (1985). Computer Ethics. Englewood, NJ:
Prentice-Hall.
Johnson, D.G. & Snapper, J.W. (1985). Ethical Issues in the Use of
Computers. Belmont, CA: Wadsworth.
Kling, R. (1991). Computerization and Controversy: Value Conflicts
and Social Choices. London: Academic Press (2nd ed.).
Langford, D. Practical Computer Ethics. Maidenhead,
Berkshire: McGraw-Hill.
Traber, M. (1986). The Myth of the Information Revolution: Social
and Ethical Implications of Communication Technology.
Beverly Hills, CA: Sage.
WWW pages:
Centre for Computing and Social Responsibility (CCSR):
http://www.ccsr.cms.dmu.ac.uk/
Computer Professionals for Social Responsibility (CPSR):
http://www.cpsr.org/
Next: Lent Term 2002: Part
Up: Michaelmas Term 2001: Part
Previous: Learning Day
  Contents
Christine Northeast
Tue Sep 4 09:34:31 BST 2001