Computer ethics is a part of
practical philosophy The modern division of philosophy into theoretical philosophy and practical philosophyImmanuel Kant, ''Lectures on Ethics'', Cambridge University Press, 2001, p. 41 ("On Universal Practical Philosophy"). Original text: Immanuel Kant, ''Kant’s Gesa ...
concerned with how computing professionals should make decisions regarding professional and social conduct.
Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into three primary influences:
[ ]
# The individual's own personal
/nowiki> code">thical/nowiki> code.
# Any informal code of ethical conduct that exists in the work place.
# Exposure to formal codes of ethics.
Foundation
Computer ethics was first coined by Walter Maner,
[ a professor at ]Bowling Green State University
Bowling Green State University (BGSU) is a public research university in Bowling Green, Ohio. The main academic and residential campus is south of Toledo, Ohio. The university has nationally recognized programs and research facilities in the ...
. Maner noticed ethical concerns that were brought up during his Medical Ethics course at Old Dominion University
Old Dominion University (Old Dominion or ODU) is a public research university in Norfolk, Virginia. It was established in 1930 as the Norfolk Division of the College of William & Mary and is now one of the largest universities in Virginia with ...
became more complex and difficult when the use of technology and computers became involved. The conceptual foundations of computer ethics are investigated by information ethics Information ethics has been defined as "the branch of ethics that focuses on the relationship between the creation, organization, dissemination, and use of information, and the ethical standards and moral codes governing human conduct in society". I ...
, a branch of philosophical ethics
Ethics or moral philosophy is a branch of philosophy that "involves systematizing, defending, and recommending concepts of right and wrong behavior".''Internet Encyclopedia of Philosophy'' The field of ethics, along with aesthetics, concerns m ...
promoted, among others, by Luciano Floridi
Luciano Floridi (; born 16 November 1964) is an Italian people, Italian and British people, British philosopher. He holds a double appointment as professor of philosophy and ethics of information at the University of Oxford, Oxford Internet In ...
.[
]
History
The concept of computer ethics originated in the 1940s with MIT professor Norbert Wiener
Norbert Wiener (November 26, 1894 – March 18, 1964) was an American mathematician and philosopher. He was a professor of mathematics at the Massachusetts Institute of Technology (MIT). A child prodigy, Wiener later became an early researcher i ...
, the American mathematician and philosopher. While working on anti-aircraft artillery during World War II
World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the vast majority of the world's countries—including all of the great powers—forming two opposin ...
, Wiener and his fellow engineers developed a system of communication between the part of a cannon that tracked a warplane, the part that performed calculations to estimate a trajectory, and the part responsible for firing.[ Wiener termed the science of such information feedback systems, "]cybernetics
Cybernetics is a wide-ranging field concerned with circular causality, such as feedback, in regulatory and purposive systems. Cybernetics is named after an example of circular causal feedback, that of steering a ship, where the helmsperson m ...
," and he discussed this new field with its related ethical concerns in his 1948 book, ''Cybernetics''. In 1950, Wiener's second book, '' The Human Use of Human Beings'', delved deeper into the ethical issues surrounding information technology and laid out the basic foundations of computer ethics.[
A bit later during the same year, the world's first ]computer crime
A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing th ...
was committed. A programmer was able to use a bit of computer code to stop his banking account from being flagged as overdrawn. However, there were no laws in place at that time to stop him, and as a result he was not charged. To make sure another person did not follow suit, an ethics code for computers was needed.
In 1973, the Association for Computing Machinery
The Association for Computing Machinery (ACM) is a US-based international learned society for computing. It was founded in 1947 and is the world's largest scientific and educational computing society. The ACM is a non-profit professional member ...
(ACM) adopted its first code of ethics.[ ]SRI International
SRI International (SRI) is an American nonprofit scientific research institute and organization headquartered in Menlo Park, California. The trustees of Stanford University established SRI in 1946 as a center of innovation to support economic d ...
's Donn Parker, an author on computer crimes, led the committee that developed the code.[
In 1976, medical teacher and researcher Walter Maner noticed that ethical decisions are much harder to make when computers are added. He noticed a need for a different branch of ethics for when it came to dealing with computers. The term "computer ethics" was thus invented.][
In 1976 ]Joseph Weizenbaum
Joseph Weizenbaum (8 January 1923 – 5 March 2008) was a German American computer scientist and a professor at MIT. The Weizenbaum Award is named after him. He is considered one of the fathers of modern artificial intelligence.
Life and caree ...
made his second significant addition to the field of computer ethics. He published a book titled ''Computer Power and Human Reason
''Computer Power and Human Reason: From Judgment to Calculation'' (1976) by Joseph Weizenbaum displays the author's ambivalence towards computer technology and lays out the case that while artificial intelligence may be possible, we should never ...
'', which talked about how artificial intelligence
Artificial intelligence (AI) is intelligence—perceiving, synthesizing, and inferring information—demonstrated by machines, as opposed to intelligence displayed by animals and humans. Example tasks in which this is done include speech re ...
is good for the world; however it should never be allowed to make the most important decisions as it does not have human qualities such as wisdom. By far the most important point he makes in the book is the distinction between choosing and deciding. He argued that deciding is a computational activity while making choices is not and thus the ability to make choices is what makes us humans.
At a later time during the same year , a professor of Computer Science at the City College of New York, published an article titled "On approaches to the study of social issues in computing." This article identified and analyzed technical and non-technical biases in research on social issues present in computing.
During 1978, the Right to Financial Privacy Act
The Right to Financial Privacy Act of 1978 (RFPA; codified at , ''et seq.'') is a United States federal law, Title XI of the Financial Institutions Regulatory and Interest Rate Control Act of 1978, that gives the customers of financial institutio ...
was adopted by the United States Congress, drastically limiting the government's ability to search bank records.
During the next year Terrell Ward Bynum
Terrell Ward Bynum (born 1941) is an American philosopher, writer and editor. Bynum is currently director of the Research Center on Computing and Society at Southern Connecticut State University, where he is also a professor of philosophy, and vi ...
, the professor of philosophy at Southern Connecticut State University as well as Director of the Research Center on Computing and Society there, developed curriculum for a university course on computer ethics. Bynum was also editor of the journal ''Metaphilosophy
Metaphilosophy, sometimes called the philosophy of philosophy, is "the investigation of the nature of philosophy". Its subject matter includes the aims of philosophy, the boundaries of philosophy, and its methods. Thus, while philosophy character ...
.''[ In 1983 the journal held an essay contest on the topic of computer ethics and published the winning essays in its best-selling 1985 special issue, “Computers and Ethics.”][
In 1984, the United States Congress passed the Small Business Computer Security and Education Act, which created a ]Small Business Administration
The United States Small Business Administration (SBA) is an independent agency of the United States government that provides support to entrepreneurs and small businesses. The mission of the Small Business Administration is "to maintain and stren ...
advisory council to focus on computer security related to small businesses.
In 1985, James Moor
James H. Moor is the Daniel P. Stone Professor of Intellectual and Moral Philosophy at Dartmouth College. He earned his Ph.D. in 1972 from Indiana University. Moor's 1985 paper entitled "What is Computer Ethics?" established him as one of the pi ...
, professor of philosophy at Dartmouth College in New Hampshire, published an essay called "What is Computer Ethics?"[ In this essay Moor states the computer ethics includes the following: "(1) identification of computer-generated policy vacuums, (2) clarification of conceptual muddles, (3) formulation of policies for the use of computer technology, and (4) ethical justification of such policies."][
During the same year, Deborah Johnson, professor of Applied Ethics and chair of the Department of Science, Technology, and Society in the School of Engineering and Applied Sciences of the University of Virginia, got the first major computer ethics textbook published.][ Johnson's textbook identified major issues for research in computer ethics for more than 10 years after publication of the first edition.][
In 1988, Robert Hauptman, a librarian at St. Cloud University, came up with "]information ethics Information ethics has been defined as "the branch of ethics that focuses on the relationship between the creation, organization, dissemination, and use of information, and the ethical standards and moral codes governing human conduct in society". I ...
", a term that was used to describe the storage, production, access and dissemination of information. Near the same time, the Computer Matching and Privacy Act was adopted and this act restricted United States government programs identifying debtors.
In the year 1992, ACM adopted a new set of ethical rules called "ACM code of Ethics and Professional Conduct" which consisted of 24 statements of personal responsibility.
Three years later, in 1995, Krystyna Górniak-Kocikowska, a professor of philosophy at Southern Connecticut State University, Coordinator of the Religious Studies Program, as well as a senior research associate in the Research Center on Computing and Society, came up with the idea that computer ethics will eventually become a global ethical system and soon after, computer ethics would replace ethics altogether as it would become the standard ethics of the information age.[
In 1999, Deborah Johnson revealed her view, which was quite contrary to Górniak-Kocikowska's belief, and stated that computer ethics will not evolve but rather be our old ethics with a slight twist.]
Post 20th century, as a result to much debate of ethical guidelines, many organizations such as ABET offer ethical accreditation to University or College applications such as "Applied and Natural Science, Computing, Engineering and Engineering Technology at the associate, bachelor, and master levels" to try and promote quality works that follow sound ethical and moral guidelines.
In 2018 The Guardian
''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers ''The Observer'' and ''The Guardian Weekly'', ''The Guardian'' is part of the Gu ...
and The New York Times
''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
reported that Facebook
Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dustin M ...
took data from 87 million Facebook users to sell to Cambridge Analytica
Cambridge Analytica Ltd (CA), previously known as SCL USA, was a British political consulting firm that came to prominence through the Facebook–Cambridge Analytica data scandal. It was started in 2013, as a subsidiary of the private intelli ...
.
In 2019 Facebook
Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dustin M ...
started a fund to build an ethics center at the Technical University of Munich
The Technical University of Munich (TUM or TU Munich; german: Technische Universität München) is a public research university in Munich, Germany. It specializes in engineering, technology, medicine, and applied and natural sciences.
Establis ...
, located in Germany. This was the first time that Facebook funded an academic institute for matters regarding computer ethics.
Concerns
Computer crime
A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing th ...
, privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
, anonymity
Anonymity describes situations where the acting person's identity is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea he ...
, freedom
Freedom is understood as either having the ability to act or change without constraint or to possess the power and resources to fulfill one's purposes unhindered. Freedom is often associated with liberty and autonomy in the sense of "giving on ...
, and intellectual property
Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, cop ...
fall under topics that will be present in the future of computer ethics.
Ethical considerations have been linked to the Internet of Things (IoT) with many physical devices being connected to the internet.
Virtual Crypto-currencies in regards to the balance of the current purchasing relationship between the buyer and seller.
Autonomous technology such as self-driving cars forced to make human decisions. There is also concern over how autonomous vehicles would behave in different countries with different culture values.
Security risks have been identified with cloud-based technology with every user interaction being sent and analyzed to central computing hubs. Artificial intelligence devices like the Amazon Alexa
Amazon Alexa, also known simply as Alexa, is a virtual assistant technology largely based on a Polish speech synthesiser named Ivona, bought by Amazon in 2013. It was first used in the Amazon Echo smart speaker and the Echo Dot, Echo Studio and ...
and Google Home
Google Nest, previously named Google Home, is a line of smart speakers developed by Google under the Google Nest brand. The devices enable users to speak voice commands to interact with services through Google Assistant, the company's virtual ...
are collecting personal data from users while at home and uploading it to the cloud. Apple’s Siri
Siri ( ) is a virtual assistant that is part of Apple Inc.'s iOS, iPadOS, watchOS, macOS, tvOS, and audioOS operating systems. It uses voice queries, gesture based control, focus-tracking and a natural-language user interface to answer questio ...
and Microsoft’s Cortana smartphone assistants are collecting user information, analyzing the information, and then sending the information back to the user.
Internet privacy
Computers and information technology have caused privacy concerns surrounding collection and use of personal data. For example, Google was sued in 2018 for tracking user location without permission.
A whole industry of privacy and ethical tools has grown over time, giving people the choice to not share their data online. These are often open source software, which allows the users to ensure that their data is not saved to be used without their consent.
Ethical standards
Various national and international professional societies and organizations have produced code of ethics documents to give basic behavioral guidelines to computing professionals and users. They include:
; Association for Computing Machinery
The Association for Computing Machinery (ACM) is a US-based international learned society for computing. It was founded in 1947 and is the world's largest scientific and educational computing society. The ACM is a non-profit professional member ...
: ACM Code of Ethics and Professional Conduct[
; ]Australian Computer Society
The Australian Computer Society (ACS) is an association for information and communications technology professionals with over 48,000 members Australia-wide. According to its Constitution, its objectives are "to advance professional excellence ...
: ACS Code of Ethics
: ACS Code of Professional Conduct
; British Computer Society
Sir Maurice Wilkes served as the first President of BCS in 1957
BCS, The Chartered Institute for IT, known as the British Computer Society until 2009, is a professional body and a learned society that represents those working in infor ...
: BCS Code of Conduct
: Code of Good Practice (retired May 2011)
; German Informatics Society
The German Informatics Society (GI) (german: Gesellschaft für Informatik) is a German professional society for computer science, with around 20,000 personal and 250 corporate members. It is the biggest organized representation of its kind in the ...
: Ethical Guidelines of the German Informatics Society (revised June 29, 2018)
; Computer Ethics Institute
: Ten Commandments of Computer Ethics
; IEEE
The Institute of Electrical and Electronics Engineers (IEEE) is a 501(c)(3) professional association for electronic engineering and electrical engineering (and associated disciplines) with its corporate office in New York City and its operation ...
: IEEE Code of Ethics
: IEEE Code of Conduct
; League of Professional System Administrators
The League of Professional System Administrators (LOPSA), founded in 2004, is a professional association for IT Administrators.
History and formation
Originally, the corporation was created as "The System Administrators Guild, Inc" in July 2004 ...
: The System Administrators' Code of Ethics
See also
* Cyberethics
Cyber ethics is the philosophic study of ethics pertaining to computers, encompassing user behavior and what computers are programmed to do, and how this affects individuals and society. For years, various governments have enacted regulations ...
* Ethics of artificial intelligence
The ethics of artificial intelligence is the branch of the ethics of technology specific to artificially intelligent systems. It is sometimes divided into a concern with the moral behavior of ''humans'' as they design, make, use and treat artific ...
* Copyright infringement
Copyright infringement (at times referred to as piracy) is the use of works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, s ...
* Programming ethics
* Social informatics
* Ten Commandments of Computer Ethics
* Who Controls the Internet?
''Who Controls the Internet? Illusions of a Borderless World'' is a 2006 book by Jack Goldsmith and Tim Wu that offers an assessment of the struggle to control the Internet.[American Philosophical Association
The American Philosophical Association (APA) is the main professional organization for philosophers in the United States. Founded in 1900, its mission is to promote the exchange of ideas among philosophers, to encourage creative and scholarly ...]
'
''Newsletter on Philosophy and Computers''
Ethics in Computing
- a list of links to ethical discussions in Computer Science courtesy of North Carolina State University
North Carolina State University (NC State) is a public land-grant research university in Raleigh, North Carolina. Founded in 1887 and part of the University of North Carolina system, it is the largest university in the Carolinas. The universit ...
Undergraduates with guidance from Dr. Edward F. Gehringer
IEG, the Information Ethics research Group
at Oxford University
Oxford () is a city in England. It is the county town and only city of Oxfordshire. In 2020, its population was estimated at 151,584. It is north-west of London, south-east of Birmingham and north-east of Bristol. The city is home to the ...
*
*
The Research Center on Computing & Society
''The International Journal of Cyber Ethics in Education (IJCEE)''
An ELIZA emulator
{{DEFAULTSORT:Computer Ethics
Ethics
Ethics or moral philosophy is a branch of philosophy that "involves systematizing, defending, and recommending concepts of right and wrong behavior".''Internet Encyclopedia of Philosophy'' The field of ethics, along with aesthetics, concerns m ...
Professional ethics
Ethics of science and technology