SlideShare a Scribd company logo
1 of 20
Download to read offline
Applying the Method of
 Philosophical Ethics



ICT Ethics, First bigger task

        Petr Viktorin
The Situation
●   Greg designs security software for internal use
    in a multinational company
●   Later, he finds out that the laws of his country
    (USA) forbid distributing of the algorithms he
    used to foreign countries
●   Greg explains the problem to his boss, who
    doesn't see it as a problem
●   Afterwards Greg even finds out that his
    software is distributed outside the company
The question




What should Greg do?
The problems, in detail
●   Should an individual always abide by laws,
    even if it means losing one's job, paying fines,
    going to jail? Even if he doesn't agree with
    them?


                          and...

●   Is it right to control export of algorithms?
The Stakeholders
●   Greg the programmer
●   Greg's boss
●   The Government of USA
●   The foreign users of the software
Problem #1
         Should one always abide by rules?
                         Yes!
●   Rules are here to protect us, they exist for the
    common good.

●   There are consequences to not following laws
Problem #1
         Should one always abide by rules?
                        No!
●   People break rules every day – crossing at the
    red light, being late to class
●   Consequences to not following laws only apply
    if you're caught

●   Maybe common sense is better than blindly
    following rules?
Problem #1
         Should one always abide by rules?
●   This is a general ethical question, not limited to
    ICT.
Problem #2
     Is it right to control export of algorithms?
                        Yes!
●   In the hands of an enemy, code-breaking
    algorithms are very dangerous. Wars have been
    fought on the „cryptography front“.
●   Algorithms/data are property – intellectual
    property – and they should be treated like any
    other property.
Problem #2
     Is it right to control export of algorithms?
                              No!
●   Algorithms – like any data – can be converted
    to, say, numbers. Making it illegal to export
    numbers is obviously wrong...
          09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

●   Data should be free.
Illegal numbers
●   This is a Blu-Ray disc encryption key:
          09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

●   In 2006, this number appeared on the Internet.
    The AACS LA (a content licensing company)
    threatened everyone who would spread it with
    lawsuits
●   Here is another form of the number:
●   You could also play it as a song, etc.
●   Interpretation!
A notable prime number
49310 83597 02850 19002 75777 67239 07649 57284 90777 21502 08632 08075 01840 97926 27885 09765
88645 57802 01366 00732 86795 44734 11283 17353 67831 20155 75359 81978 54505 48115 71939 34587
73300 38009 93261 95058 76452 50238 20408 11018 98850 42615 17657 99417 04250 88903 70291 19015
87003 04794 32826 07382 14695 41570 33022 79875 57681 89560 16240 30064 11151 69008 72879 83819
42582 71674 56477 48166 84347 92846 45809 29131 53186 00700 10043 35318 93631 93439 12948 60445
03709 91980 04770 94629 21558 18071 11691 53031 87628 84778 78354 15759 32891 09329 54473 50881
88246 54950 60005 01900 62747 05305 38116 42782 94267 47485 34965 25745 36815 11706 55028 19055
52656 22135 31463 10421 00866 28679 71144 46706 36692 19825 86158 11125 15556 50481 34207 68673
23407 65505 48591 08269 56266 69306 62367 99702 10481 23965 62518 00681 83236 53959 34839 56753
57557 53246 19023 48106 47009 87753 02795 61868 92925 38069 33052 04238 14996 99454 56945 77413
83356 89906 00587 08321 81270 48611 33682 02651 59051 66351 87402 90181 97693 93767 78529 28722
10955 04129 25792 57381 86605 84501 50552 50274 99477 18831 29310 45769 80909 15304 61335 94190
30258 81320 59322 77444 38525 50466 77902 45186 97062 62778 88919 79580 42306 57506 15669 83469
56177 97879 65920 16440 51939 96071 69811 12615 19561 02762 83233 98257 91423 32172 69614 43744
38105 64855 29348 87634 92103 09887 02878 74532 33132 53212 26786 33283 70279 25099 74996 94887
75936 91591 76445 88032 71838 47402 35933 02037 48885 06755 70658 79194 61134 19323 07814 85443
64543 75113 20709 86063 90746 41756 41216 35042 38800 29678 08558 67037 03875 09410 76982 11837
65499 20520 43682 55854 64228 85024 29963 32268 53691 24648 55000 75591 66402 47292 40716 45072
53196 74499 95294 48434 74190 21077 29606 82055 81309 23626 83798 79519 66199 79828 55258 87161
09613 65617 80745 66159 24886 60889 81645 68541 72136 29208 46656 27913 14784 66791 55096 51543
10113 53858 62081 96875 83688 35955 77893 91454 53935 68199 60988 08540 47659 07358 97289 89834
25047 12891 84162 65878 96821 85380 87956 27903 99786 29449 39760 54675 34821 25675 01215 17082
                 73710 76462 70712 46753 21024 83678 15940 00875 05452 54353 7
Illegal numbers
●   So, sharing data (especially small amounts of it
    like encryption keys and algorithms) cannot be
    practically controlled and punished, but the
    question remains...
               Is it ethical to do this?
    Does a government have the right to control
              where data is copied?


The answer will come in a few slides...
Ethical Theory Application
●   We go back to our first problem: Should Greg
    follow the law and notify the authorities?
●   The Social Contract Theory is based on the
    works of Socrates, Plato, etc.
●   You accept the laws of the society you are
    living in, just by living in it. Therefore Greg
    should notify the authorities and accept his
    punishment, whatever it might be.
Consequentialism
●   Another theory, Consequentialism, says that the
    best action is the one with the best
    consequences. There are different versions of
    this theory – the final decision will be affected
    by what version you choose.
●   Plain Consequentialism: Of all the things a
    person might do at any given moment, the
    morally right action is the one with the best
    overall consequences.
●   Traditionally: happiness ≡ good consequence
Evaluation
●   Greg will be happy when if he doesn't go to
    prison
●   The boss will be happy if the company isn't
    sued
●   The foreign users will be happy if they can
    continue using the program
●   The decision won't really affect the government
    – terrorists can easily get the algorithm anyway
●   Answer: keep quiet!
Second problem
●   Should algorithm export be controlled?
●   Consequentialist view: No. More people will be
    happy if they can use algorithms. And the bad
    guys, who could do bad things with algorithms,
    could get them anyway.
●   Social Contract theory doesn't really apply
    here, since, we are talking about laws
    themselves...
Kantian ethics
●   Formulated by Immanuel Kant, this ethical
    theory has three fairly clear maxims that can be
    summarized as: Follow those rules that you'd
    like to see followed by everybody.
Kantian ethics
●   So, we can say that data should be always
    freely exportable, and laws preventing the
    export are bad.
●   Data should not be allowed to be exported
    freely – this would undermine the concept of
    Internet. If I assume that Internet is good, this
    option must be bad.
●   There should be restrictions on specific types of
    data – but classifying data is not possible.
Thanks for your attention!

More Related Content

Viewers also liked

Digital revolution 2
Digital revolution 2Digital revolution 2
Digital revolution 2Chris Moon
 
Ways To Optimize Our Environmental Levy Scheme
Ways To Optimize Our Environmental Levy SchemeWays To Optimize Our Environmental Levy Scheme
Ways To Optimize Our Environmental Levy Schemegueste1a32de7
 
Presentazione Ipim
Presentazione IpimPresentazione Ipim
Presentazione Ipimguestc9b4e3
 
Gevanim
GevanimGevanim
Gevanimrel10
 
Steelers Basic Plays
Steelers Basic PlaysSteelers Basic Plays
Steelers Basic Playscmcmillion803
 
llegenda sant medir
llegenda sant medirllegenda sant medir
llegenda sant medirarubiovalls
 
Sociale media en opsporing
Sociale media en opsporingSociale media en opsporing
Sociale media en opsporingTNO
 
Gekko 2014 brochure
Gekko 2014 brochureGekko 2014 brochure
Gekko 2014 brochuremarkoverbye
 
16 Digital Trends for 2016
16 Digital Trends for 201616 Digital Trends for 2016
16 Digital Trends for 2016Tom Edwards
 
Scholastic photojournalists and the publication of graphic, spot news images
Scholastic photojournalists and the publication of graphic, spot news imagesScholastic photojournalists and the publication of graphic, spot news images
Scholastic photojournalists and the publication of graphic, spot news imagesBradley Wilson
 
Organizing photo staff
Organizing photo staffOrganizing photo staff
Organizing photo staffBradley Wilson
 
Τιτάνες και Γίγαντες
Τιτάνες και ΓίγαντεςΤιτάνες και Γίγαντες
Τιτάνες και ΓίγαντεςPetros Michailidis
 

Viewers also liked (16)

Digital revolution 2
Digital revolution 2Digital revolution 2
Digital revolution 2
 
Ways To Optimize Our Environmental Levy Scheme
Ways To Optimize Our Environmental Levy SchemeWays To Optimize Our Environmental Levy Scheme
Ways To Optimize Our Environmental Levy Scheme
 
Presentazione Ipim
Presentazione IpimPresentazione Ipim
Presentazione Ipim
 
11
1111
11
 
Gevanim
GevanimGevanim
Gevanim
 
Steelers Basic Plays
Steelers Basic PlaysSteelers Basic Plays
Steelers Basic Plays
 
llegenda sant medir
llegenda sant medirllegenda sant medir
llegenda sant medir
 
Sociale media en opsporing
Sociale media en opsporingSociale media en opsporing
Sociale media en opsporing
 
Gekko 2014 brochure
Gekko 2014 brochureGekko 2014 brochure
Gekko 2014 brochure
 
Made in america terrorist
Made in america terroristMade in america terrorist
Made in america terrorist
 
16 Digital Trends for 2016
16 Digital Trends for 201616 Digital Trends for 2016
16 Digital Trends for 2016
 
Scholastic photojournalists and the publication of graphic, spot news images
Scholastic photojournalists and the publication of graphic, spot news imagesScholastic photojournalists and the publication of graphic, spot news images
Scholastic photojournalists and the publication of graphic, spot news images
 
Organizing photo staff
Organizing photo staffOrganizing photo staff
Organizing photo staff
 
History of meaning
History of meaningHistory of meaning
History of meaning
 
Τιτάνες και Γίγαντες
Τιτάνες και ΓίγαντεςΤιτάνες και Γίγαντες
Τιτάνες και Γίγαντες
 
Key to success
Key to successKey to success
Key to success
 

Similar to ICT Ethics: First bigger task

AI in Law Enforcement - Applications and Implications of Machine Vision and M...
AI in Law Enforcement - Applications and Implications of Machine Vision and M...AI in Law Enforcement - Applications and Implications of Machine Vision and M...
AI in Law Enforcement - Applications and Implications of Machine Vision and M...Daniel Faggella
 
I've combined four advances in tech that will revolutionise our lives like we...
I've combined four advances in tech that will revolutionise our lives like we...I've combined four advances in tech that will revolutionise our lives like we...
I've combined four advances in tech that will revolutionise our lives like we...Steve Randall
 
European Search Conference, Liverpool, 2018
European Search Conference, Liverpool, 2018European Search Conference, Liverpool, 2018
European Search Conference, Liverpool, 2018Pierre Far
 
„GDPR and kittens“ by Kirill Linnik from MOVE Guides/DevClub Estonia at Secu...
 „GDPR and kittens“ by Kirill Linnik from MOVE Guides/DevClub Estonia at Secu... „GDPR and kittens“ by Kirill Linnik from MOVE Guides/DevClub Estonia at Secu...
„GDPR and kittens“ by Kirill Linnik from MOVE Guides/DevClub Estonia at Secu...DevClub_lv
 
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...Peter Waher
 
Artificial intelligence - An Overview
Artificial intelligence - An OverviewArtificial intelligence - An Overview
Artificial intelligence - An OverviewMANISH T I
 
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionCyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionIsaiah Edem
 
Killing the golden calf of coding - We are Developers keynote
Killing the golden calf of coding - We are Developers keynoteKilling the golden calf of coding - We are Developers keynote
Killing the golden calf of coding - We are Developers keynoteChristian Heilmann
 
Blazing your own Maths trail
Blazing your own Maths trailBlazing your own Maths trail
Blazing your own Maths trailMichael Gill
 
Big Data and algorithms
Big Data and algorithmsBig Data and algorithms
Big Data and algorithmsmichele minno
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?SahilRao25
 
Ch 19. social and economic effects of it
Ch 19. social and economic effects of itCh 19. social and economic effects of it
Ch 19. social and economic effects of itKhan Yousafzai
 
On Problems, Products and IoT by Tej | CuTech Talks
On Problems, Products and IoT by Tej | CuTech TalksOn Problems, Products and IoT by Tej | CuTech Talks
On Problems, Products and IoT by Tej | CuTech TalksCumulations Technologies
 
Deep Learning Overview
Deep Learning OverviewDeep Learning Overview
Deep Learning OverviewCloudxLab
 
Cats and mice ever evolving attackers and other game changers
Cats and mice   ever evolving attackers and other game changersCats and mice   ever evolving attackers and other game changers
Cats and mice ever evolving attackers and other game changersEric Kmetz
 
Algorithmic and technological transparency
Algorithmic and technological transparencyAlgorithmic and technological transparency
Algorithmic and technological transparencyBozhidar Bozhanov
 

Similar to ICT Ethics: First bigger task (20)

AI in Law Enforcement - Applications and Implications of Machine Vision and M...
AI in Law Enforcement - Applications and Implications of Machine Vision and M...AI in Law Enforcement - Applications and Implications of Machine Vision and M...
AI in Law Enforcement - Applications and Implications of Machine Vision and M...
 
I've combined four advances in tech that will revolutionise our lives like we...
I've combined four advances in tech that will revolutionise our lives like we...I've combined four advances in tech that will revolutionise our lives like we...
I've combined four advances in tech that will revolutionise our lives like we...
 
European Search Conference, Liverpool, 2018
European Search Conference, Liverpool, 2018European Search Conference, Liverpool, 2018
European Search Conference, Liverpool, 2018
 
„GDPR and kittens“ by Kirill Linnik from MOVE Guides/DevClub Estonia at Secu...
 „GDPR and kittens“ by Kirill Linnik from MOVE Guides/DevClub Estonia at Secu... „GDPR and kittens“ by Kirill Linnik from MOVE Guides/DevClub Estonia at Secu...
„GDPR and kittens“ by Kirill Linnik from MOVE Guides/DevClub Estonia at Secu...
 
Bob Gourley
Bob GourleyBob Gourley
Bob Gourley
 
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
 
Artificial intelligence - An Overview
Artificial intelligence - An OverviewArtificial intelligence - An Overview
Artificial intelligence - An Overview
 
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionCyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
 
Killing the golden calf of coding - We are Developers keynote
Killing the golden calf of coding - We are Developers keynoteKilling the golden calf of coding - We are Developers keynote
Killing the golden calf of coding - We are Developers keynote
 
Gdpr For Nerds
Gdpr For NerdsGdpr For Nerds
Gdpr For Nerds
 
Blazing your own Maths trail
Blazing your own Maths trailBlazing your own Maths trail
Blazing your own Maths trail
 
Big Data and algorithms
Big Data and algorithmsBig Data and algorithms
Big Data and algorithms
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 
Ch 19. social and economic effects of it
Ch 19. social and economic effects of itCh 19. social and economic effects of it
Ch 19. social and economic effects of it
 
On Problems, Products and IoT by Tej | CuTech Talks
On Problems, Products and IoT by Tej | CuTech TalksOn Problems, Products and IoT by Tej | CuTech Talks
On Problems, Products and IoT by Tej | CuTech Talks
 
Deep Learning Overview
Deep Learning OverviewDeep Learning Overview
Deep Learning Overview
 
Cats and mice ever evolving attackers and other game changers
Cats and mice   ever evolving attackers and other game changersCats and mice   ever evolving attackers and other game changers
Cats and mice ever evolving attackers and other game changers
 
Robots
RobotsRobots
Robots
 
Algorithmic and technological transparency
Algorithmic and technological transparencyAlgorithmic and technological transparency
Algorithmic and technological transparency
 
Barbed Wire Network Security Policy 27 June 2005 7
Barbed Wire Network Security Policy 27 June 2005 7Barbed Wire Network Security Policy 27 June 2005 7
Barbed Wire Network Security Policy 27 June 2005 7
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

ICT Ethics: First bigger task

  • 1. Applying the Method of Philosophical Ethics ICT Ethics, First bigger task Petr Viktorin
  • 2. The Situation ● Greg designs security software for internal use in a multinational company ● Later, he finds out that the laws of his country (USA) forbid distributing of the algorithms he used to foreign countries ● Greg explains the problem to his boss, who doesn't see it as a problem ● Afterwards Greg even finds out that his software is distributed outside the company
  • 4. The problems, in detail ● Should an individual always abide by laws, even if it means losing one's job, paying fines, going to jail? Even if he doesn't agree with them? and... ● Is it right to control export of algorithms?
  • 5. The Stakeholders ● Greg the programmer ● Greg's boss ● The Government of USA ● The foreign users of the software
  • 6. Problem #1 Should one always abide by rules? Yes! ● Rules are here to protect us, they exist for the common good. ● There are consequences to not following laws
  • 7. Problem #1 Should one always abide by rules? No! ● People break rules every day – crossing at the red light, being late to class ● Consequences to not following laws only apply if you're caught ● Maybe common sense is better than blindly following rules?
  • 8. Problem #1 Should one always abide by rules? ● This is a general ethical question, not limited to ICT.
  • 9. Problem #2 Is it right to control export of algorithms? Yes! ● In the hands of an enemy, code-breaking algorithms are very dangerous. Wars have been fought on the „cryptography front“. ● Algorithms/data are property – intellectual property – and they should be treated like any other property.
  • 10. Problem #2 Is it right to control export of algorithms? No! ● Algorithms – like any data – can be converted to, say, numbers. Making it illegal to export numbers is obviously wrong... 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 ● Data should be free.
  • 11. Illegal numbers ● This is a Blu-Ray disc encryption key: 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0 ● In 2006, this number appeared on the Internet. The AACS LA (a content licensing company) threatened everyone who would spread it with lawsuits ● Here is another form of the number: ● You could also play it as a song, etc. ● Interpretation!
  • 12. A notable prime number 49310 83597 02850 19002 75777 67239 07649 57284 90777 21502 08632 08075 01840 97926 27885 09765 88645 57802 01366 00732 86795 44734 11283 17353 67831 20155 75359 81978 54505 48115 71939 34587 73300 38009 93261 95058 76452 50238 20408 11018 98850 42615 17657 99417 04250 88903 70291 19015 87003 04794 32826 07382 14695 41570 33022 79875 57681 89560 16240 30064 11151 69008 72879 83819 42582 71674 56477 48166 84347 92846 45809 29131 53186 00700 10043 35318 93631 93439 12948 60445 03709 91980 04770 94629 21558 18071 11691 53031 87628 84778 78354 15759 32891 09329 54473 50881 88246 54950 60005 01900 62747 05305 38116 42782 94267 47485 34965 25745 36815 11706 55028 19055 52656 22135 31463 10421 00866 28679 71144 46706 36692 19825 86158 11125 15556 50481 34207 68673 23407 65505 48591 08269 56266 69306 62367 99702 10481 23965 62518 00681 83236 53959 34839 56753 57557 53246 19023 48106 47009 87753 02795 61868 92925 38069 33052 04238 14996 99454 56945 77413 83356 89906 00587 08321 81270 48611 33682 02651 59051 66351 87402 90181 97693 93767 78529 28722 10955 04129 25792 57381 86605 84501 50552 50274 99477 18831 29310 45769 80909 15304 61335 94190 30258 81320 59322 77444 38525 50466 77902 45186 97062 62778 88919 79580 42306 57506 15669 83469 56177 97879 65920 16440 51939 96071 69811 12615 19561 02762 83233 98257 91423 32172 69614 43744 38105 64855 29348 87634 92103 09887 02878 74532 33132 53212 26786 33283 70279 25099 74996 94887 75936 91591 76445 88032 71838 47402 35933 02037 48885 06755 70658 79194 61134 19323 07814 85443 64543 75113 20709 86063 90746 41756 41216 35042 38800 29678 08558 67037 03875 09410 76982 11837 65499 20520 43682 55854 64228 85024 29963 32268 53691 24648 55000 75591 66402 47292 40716 45072 53196 74499 95294 48434 74190 21077 29606 82055 81309 23626 83798 79519 66199 79828 55258 87161 09613 65617 80745 66159 24886 60889 81645 68541 72136 29208 46656 27913 14784 66791 55096 51543 10113 53858 62081 96875 83688 35955 77893 91454 53935 68199 60988 08540 47659 07358 97289 89834 25047 12891 84162 65878 96821 85380 87956 27903 99786 29449 39760 54675 34821 25675 01215 17082 73710 76462 70712 46753 21024 83678 15940 00875 05452 54353 7
  • 13. Illegal numbers ● So, sharing data (especially small amounts of it like encryption keys and algorithms) cannot be practically controlled and punished, but the question remains... Is it ethical to do this? Does a government have the right to control where data is copied? The answer will come in a few slides...
  • 14. Ethical Theory Application ● We go back to our first problem: Should Greg follow the law and notify the authorities? ● The Social Contract Theory is based on the works of Socrates, Plato, etc. ● You accept the laws of the society you are living in, just by living in it. Therefore Greg should notify the authorities and accept his punishment, whatever it might be.
  • 15. Consequentialism ● Another theory, Consequentialism, says that the best action is the one with the best consequences. There are different versions of this theory – the final decision will be affected by what version you choose. ● Plain Consequentialism: Of all the things a person might do at any given moment, the morally right action is the one with the best overall consequences. ● Traditionally: happiness ≡ good consequence
  • 16. Evaluation ● Greg will be happy when if he doesn't go to prison ● The boss will be happy if the company isn't sued ● The foreign users will be happy if they can continue using the program ● The decision won't really affect the government – terrorists can easily get the algorithm anyway ● Answer: keep quiet!
  • 17. Second problem ● Should algorithm export be controlled? ● Consequentialist view: No. More people will be happy if they can use algorithms. And the bad guys, who could do bad things with algorithms, could get them anyway. ● Social Contract theory doesn't really apply here, since, we are talking about laws themselves...
  • 18. Kantian ethics ● Formulated by Immanuel Kant, this ethical theory has three fairly clear maxims that can be summarized as: Follow those rules that you'd like to see followed by everybody.
  • 19. Kantian ethics ● So, we can say that data should be always freely exportable, and laws preventing the export are bad. ● Data should not be allowed to be exported freely – this would undermine the concept of Internet. If I assume that Internet is good, this option must be bad. ● There should be restrictions on specific types of data – but classifying data is not possible.
  • 20. Thanks for your attention!