Tippett has written extensively on computer ethics.

Philosophers have identified duties of welfare promotion, care,dignity and fairness to support the case for privacy andconfidentiality (Schoeman 1984). Virtue ethics suggests its own set ofgrounds for informational privacy in health care. Jennifer Radden hasargued that the special vulnerability of mental health patients andthe stigma attached to their problems turns confidentiality into aparticular brand of excellence for mental health care practitioners(Radden 2004). She has argued that the demand for confidentiality inpsychiatric medicine is inadequately accounted for on theories thatfail to take into account the virtues of trust and reserve that arehallmarks of mental health care.

Computer Security Ethics and Privacy | WebReference

His book, MIT courses, and many speeches inspired many computer ethics thoughts and projects.

Ten Commandments of Computer Ethics - Wikipedia

Computer Crime. With the proliferation of computer viruses, spyware, phishing and fraud schemes, and hacking activity from every location in the world, computer crime and security are certainly topics of concern when discussing computer ethics.

Privacy and Ethics Policy | Pri-Med

When establishing a computer ethics program and accompanying training and awareness programs, it is important to consider the topics that have been addressed and researched.

Such ideas are in conflict with a wide range of computer professionals' various codes of ethics.

These links are provided for additional information only

If computer users in the , for example, wish toprotect their freedom of speech on the internet, whose laws apply? Nearly twohundred countries are already interconnected by the internet, so the UnitedStates Constitution (with its First Amendment protection for freedom of speech)is just a "local law" on the internet -- it does not apply to therest of the world. How can issues like freedom of speech, control of"pornography", protection of intellectual property, invasions ofprivacy, and many others to be governed by law when so many countries areinvolved? If a citizen in a European country, for example, has internetdealings with someone in a far-away land, and the government of that landconsiders those dealings to be illegal, can the European be tried by the courtsin the far-away country?

Networking & Cloud Computing

Questions of anonymity on the internet are sometimes discussed in the samecontext with questions of privacy and the internet, because anonymity canprovide many of the same benefits as privacy. For example, if someone is usingthe internet to obtain medical or psychological counseling, or to discusssensitive topics (for example, AIDS, abortion, gay rights, venereal disease, dissent), anonymity can afford protection similarto that of privacy. Similarly, both anonymity and privacy on the internet canbe helpful in preserving human values such as security, mental health,self-fulfillment and peace of mind. Unfortunately, privacy and anonymity alsocan be exploited to facilitate unwanted and undesirable computer-aidedactivities in cyberspace, such as money laundering, drug trading, terrorism, orpreying upon the vulnerable (see [Marx, 2001] and [,1999]).

The goal of NCERC is to foster computer ethics awareness and education.

Computer Ethics- Online Privacy - YouTube

The links between Computer Science and Philosophy are broad and deep, extending well beyond the obvious overlaps in logic, artificial intelligence, ethics and robotics. They share a broad focus on the representation of information and rational inference, embracing common interests in algorithms, cognition, intelligence, language, proof, verification, etc. Some of the greatest philosophers of the past — from Aristotle to Turing — dreamed of automated reasoning and what this might achieve. This taster day provides an opportunity to find out more about how computers have now made this a reality:

Ch. 9 Privacy, Security, and Ethics Flashcards | Quizlet

A very controversial issue today a patent on a computer algorithm. A patent provides an exclusive monopoly onthe use of the patented item, so the owner of an algorithm can deny others useof the mathematical formulas that are part of the algorithm. Mathematicians andscientists are outraged, claiming that algorithm patents effectively removeparts of mathematics from the public domain, and thereby threaten to cripplescience. In addition, running a preliminary "patent search" to makesure that your "new" program does not violate anyone's softwarepatent is a costly and time-consuming process. As a result, only very largecompanies with big budgets can afford to run such a search. This effectivelyeliminates many small software companies, stifling competition and decreasingthe variety of programs available to the society [The League for ProgrammingFreedom, 1992].

Moor: What is Computer Ethics - Computer Science- …

Professional organizations in the ,like the Association for Computing Machinery (ACM) and the and Electronic Engineers (IEEE), have established codes of ethics, curriculumguidelines and accreditation requirements to help computer professionalsunderstand and manage ethical responsibilities. The most recent ACM Code(1992), for example, includes "general moral imperatives", such as"avoid harm to others" and "be honest and trustworthy". Andalso included are "more specific professional responsibilities" like"acquire and maintain professional competence" and "know andrespect existing laws pertaining to professional work." The IEEE Code ofEthics (1990) includes such principles as "avoid real or perceivedconflicts of interest whenever possible" and "be honest and realisticin stating claims or estimates based on available data."