Top Banner
Computer Ethics Helicopter View Norberto Patrignani
51

Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

Aug 08, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

Computer EthicsHelicopter View

Norberto Patrignani

Page 2: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

2 / 51

"Technology is the answer! (But what was the question?)"

Amory Lovins, Published as a guest essay, in G. Tyler Miller, "Environmental Science", 3rd ed.  Belmont, CA, 1991

Page 3: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

3 / 51

Values Embedded in Design

Page 4: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

4 / 51

Values Embedded in Design

Source:  "The Whale and the Reactor ­ A search for Limits in an Age of High Technology", L.Winner, The University of Chicago Press, 1989

Page 5: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

5 / 51

Do artifacts have politics?Politeia vs Techne*

Supermarket Bazaar

Proprietary Software

centralized de-centralized

Nuclear Plant Solar Power

Free Software

Software as Service

PC Software

Boeing 747 Hang-Glider

Aircraft carrier Rowing Boat

Railway BicycleCarMetro

Mainframe ServerNetwork

Control CenterLAN Desktop Home PC

ShopShopping Malle-Commerce

LAN SoftwareServer Software

Submarine Ferry Boat

System Network Architecture Internet

Glider

Ship Container

Sailors must yield to their captain's commands

Plato, Republic

Source:  "The Whale and the Reactor ­ A search for Limits in an Age of High Technology", L.Winner, The University of Chicago Press, 1989

Page 6: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

Source: Taming complexity, Albert­László Barabási, Nature Physics 1, 68 ­ 70 (2005) BURCH/CHESWICK MAP COURTESY OF LUMETA CORP./WWW.LUMETA.COM 

Page 7: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

7 / 51

Co­Shaping

Page 8: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

8 / 51Source: "Computer Ethics", Deborah G.Johnson, 1985 ­ 4th Edition, Pearson International Edition, Prentice Hall, January 2009

Page 9: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

9 / 51Source: "Iran stocks up on censorship tools", MinnPost.com, Photo REUTERS

Page 10: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

10 / 51

Value­Sensitive Design

Source: Helen Nissenbaum, "Values in Technical Design", Encyclopedia of Science Technology and Ethics, MacMillan, New York, 2005

Page 11: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

11 / 51

Market

Education

Architecture Law

Source: Lawrence Lessig, "Code and other laws of cyberspace", Basic Books, New York, 1999 

Page 12: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

12 / 51

Market

Education

Architecture Law

Page 13: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

13 / 51

Market

Education

Architecture Law

Page 14: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

14 / 51

Computers' Social & Ethical Issues

Page 15: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

15 / 51

Planet

BioSphere

People

InfoSphere

CyberSpace

Ideas (NooSphere)

War

Ecology&

Recycling

Hackers

Privacy

Content&

Education

Accessibility, Universal Access & Digital Divide

Dawn ofCyberSpace,e-Democracy

CopyRights

Computer(Un)Reliability

ComputerCrimes &

Virus

Workplace

ArtificialIntelligence

(A.I.) –Nano-

Technologies,Implants

Source: Patrignani N., "A Conceptual Framework for Computer Ethics", Proceedings of Conference ETHICOMP­2008, Mantova

Computer Ethics

Page 16: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

16 / 51Source: “Modeling the Internet's Large­Scale Topology”, Soon­Hyung Yook, Hawoong Jeong, Albert­Laszlo Barabasi, 19 July 2001

Accessibility, Universal Access & Digital Divide

Page 17: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

17 / 51Source: Photo by Alex Antener

Accessibility, Universal Access & Digital Divide

Page 18: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

18 / 51

Workplace

Page 19: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

19 / 51

Content & Education

Page 20: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

20 / 51

Copy Rigth / Left

Knowledge multiplies when you give it away ...

Page 21: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

21 / 51Source: Pekka Himanen, "The Hacker Ethic: and the Spirit of the Information Age", Random House, 2001

Work Ethic

Money Ethic

Network Ethic

­ Passion­ Freedom­ Social Values­ Openness­ Activity­ Responsibility­ Creativity

Hackers' Ethic

Robert MorrisInternet Worm

1988

Kevin MitnickCondor1979

Linus TorvaldLinux1991

Vladimir Levin10.7 M$ Citibank hack

1994

Page 22: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

22 / 51

hacker 

n [hack skillful repair of a computer program +er] (1976): an expert at programming and

solving problems with a computer(Webster's Dictionary)

Page 23: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

23 / 51

Source: "Barcelona clubbers get chipped", BBC News, September 2004

Privacy

Page 24: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

24 / 51Source: New York Times, 17 January 2003

Page 25: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

25 / 51

DNA DataBasesThe Next Frontier of Crime "Prevention"

Page 26: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

26 / 51

Ambient Intelligence

Page 27: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

27 / 51Source: Jack Stanfield (Harrison Ford) Security Manager at Landrock Pacific Bank, "Firewall" (scene 4), Richard Loncraine, USA 2006 

Computer Crimes

Page 28: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

28 / 51Source: 2006, MessageLabs, "Netsky­P" by Alex Dragulescu, the "most widely spread of the e­mail worms" in 2006, (it is still a threat through e­mail traffic)

Computer Virus

Page 29: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

29 / 51

THE TITANIC EFFECT

The severity with which a system fails is directly proportional 

to the intensity of the designer's belief that it cannot. 

COROLLARY 

The quantity and quality of built­in redundancy is directly proportional to the degree of concern 

about failure. 

Source: newsgroup "comp.risks" (Peter G. Neumann) 1985

Computers' (Un)Reliability

Page 30: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

30 / 51

ICT main actor in BINN:the "structure that connects", collect INPUTSPROCESS and DECIDE then drive OUTPUTS

ICT main actor in BINN:the "structure that connects", collect INPUTSPROCESS and DECIDE then drive OUTPUTS

Converging Technologies

InfoBio

NanoNeuro

source: sr.burnham.org

source: mri.radiology.uiowa.edu

source: biogridcomputing

source: techwall.org

"Titanic" EffectModels = Reality?

"Pandora Box" EffectNano­Systems = Complex Systems?

"Golem" EffectSynBio = Life?

"Blade Runner" EffectBrain = Mind?

BRAIN

BODY

PLANET

Page 31: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

31 / 51

Source: Mavroidis, C., and Dubey, A., 2003, "From Pulses to Motors", Nature Materials, September 2(9):573­574. 

Bio­NanoBotsThe Next Frontier of "Medicine"

Page 32: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

32 / 51

Unmanned Aerial Vehicles (UAV)Drones

Environmental Monitoring / Surveillance / Attack ?

Source: "Google Earth Shows U.S. Drones at Pakistani Base?", Wired, February 2009

Page 33: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

33 / 51 Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State University, December 20, 2008

Unmanned Ground Vehicles (UGV)Autonomous Weapons with Sensors

Page 34: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

34 / 51

The Precautionary Principle

The Precautionary Principle"When an activity raises threats of harm to human health or the environment, precautionary measures should be taken even if some cause and effect relationships are not fully established scientifically.In this context the proponent of an activity, rather than the public, should bear the burden of proof.The process of applying the Precautionary Principle must be open, informed and democratic and must include potentially affected parties. It must also involve an examination of the full range of alternatives, including no action."

The "Wingspread Statement on the Precautionary Principle", Wingspread Center, Racine, Wisconsin, USA, January, 1998

Source: Environmental Research Foundation, January 21, 2008

Page 35: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

35 / 51

Challenging Moore's Law

Page 36: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

Source: "The Consumption Conundrum: Driving the Destruction Abroad", Oswald J. Schmitz, Thomas E. Graedel, April 2010, Yale University

Computer chips made use of 11 major elements in the 1980s but now use about 60 (two­thirds of the Periodic Table)

4004

8080

286

386

486

Pentium

PIII

Dual Core Itanium 2

Page 37: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

Tantalum

Niobium (Columbium) COLumbite

TANtalite

COLTAN

Source: Alberto Vazquez­Figueroa, "Coltan", Ediciones B, 2010)

Page 38: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

38 / 51

Rare Earth Elements Critical Resources for ICT 

Source: "Rare Earth Elements ­ Critical Resources for High Technology", U.S. Geological Survey Fact Sheet 087­02

Page 39: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

39 / 51

Source: NASA, 2008

ICT = 3% CO2

EU Commission ­ Information SocietyEnergy efficient ICT: Toward Zero­Power Devices for a Greener Planet

Page 40: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

40 / 51

Source: Silicon Valley Toxics Coalition, 2007,Wall Street Journal, September 23, 2004 

e­Waste: where do they go?

 The health burden of e­waste falls on the world’s poorest workers, who labor long hours without basic protections from toxic exposure

• US consumers replace roughly 133,000 PC/day ! • Only 20% recycled• Wall Street Journal: "the world's fastest growing and potentially most dangerous waste problem": plastic, lead, cadmium, chromium, mercury

Page 41: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

41 / 51source: http://www.greenpeace.org/international/en/campaigns/climate­change/cool­it/Campaign­analysis/Guide­to­Greener­Electronics/

Page 42: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

42 / 51

A Methodologyfor Introducing Computer Ethics

(Scuola di Dottorato, Politecnico di Torino, 2008)

Page 43: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

43 / 51

Case StudyGroup exercise and feedback

•Is there something that could be right / wrong with ICT?

•Organize the group in several teams for "role playing":– Developers (the techies)– Users– Policy Makers

•Discuss a simple real case– 3 main levels of discussion

• Brainstorming• Code of Ethics ("soft" laws)• Laws ("hard" laws) 

– 4 main drivers• Architecture• Education• Market• Law

Page 44: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

44 / 51

1. SCENARIODescribe and Analyze a Real Case 

2. STAKEHOLDERS' NETWORKIdentify Stakeholders and their Relationships

3. ETHICAL ISSUESIdentify Social and Ethical Issues

4. ALTERNATIVE SCENARIO(s)Envisage and Evaluate Alternative Courses of Action

1. SCENARIODescribe and Analyze a Real Case 

2. STAKEHOLDERS' NETWORKIdentify Stakeholders and their Relationships

3. ETHICAL ISSUESIdentify Social and Ethical Issues

4. ALTERNATIVE SCENARIO(s)Envisage and Evaluate Alternative Courses of Action

Steps for Case Analysis

Page 45: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

45 / 51

Soci

al A

naly

sis

Soci

al A

naly

sis

Individuals

Communities

Organizations

Cultures

Institutions

Nations

Global

Levels of Social AnalysisLevels of Social Analysis

Source: "Computing Curricula 1991", Communications of the ACM, Volume 34 , Issue 6, June 1991

1.SCENARIODescribe and Analyze a Real Case (From the many areas of concern related to Computing)

Propose to studentsdifferent levels of

Social Analysis

Page 46: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

46 / 51

2. STAKEHOLDERS' NETWORK

Stakeholders

Relationships

2. STAKEHOLDERS' NETWORKIdentify Stakeholders and their Relationships (Development of Social & Ethical Skills)

Page 47: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

47 / 51

2. STAKEHOLDERS' NETWORK

Stakeholders

Relationships 3. ETHICAL ISSUES

3. ETHICAL ISSUESIdentify Social and Ethical Issues(Development of Social & Ethical Skills)

Page 48: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

48 / 51

• What is right? What is wrong?• Can we propose something different?• What is the role of Computer Professionals involved into the case?• Moratorium?• Precautionary Principle• Ethical Reviews (FP7)

• Recommendations for– Project Teams (Writing a proposal)– Universities (Next Generations of Engineers, Computer Professionals, Designers,...)– Organizations ("soft­laws", Guidelines, Code of Ethics, etc.)– Public Authorities ("hard­laws", Requirements, Policy Makers, etc.)

4. ALTERNATIVE SCENARIO(s)Envisage and Evaluate Alternative Courses of ActionThe most challenging step

Page 49: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

49 / 51

"Technology is driving the future, the steering is up to us"

Computer Professionals for Social Responsibilitywww.cpsr.org

CPSR’s Mission:the Public Interest 

in Information Technology

Page 50: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

50 / 51

Why Computer Ethics ?Levels of justification for the study of Computer Ethics

Level 1: "... will make us behave like responsible professionals"

Level 2: "... will teach us how to avoid computer abuse and catastrophes"

Level 3: "... the advance of computing technology will continue to create temporary policy vacuums"

Level 4: "... the use of computing permanently transforms certain ethical issues to the degree that their alterations require independent study"

Level 5: "... the use of computing technology creates, and will continue to create, novel ethical issues that require special study"

Level 6: "We should study computer ethics because the set of novel and transformed issues is large enough and coherent enough to 

define a new field"Source: (adapted from) Walter Maner, "Unique Ethical Problems in Information Technology", ETHICOMP95, Leicester, UK.

Page 51: Computer Ethics Helicopter View · Source: "Autonomous Military Robotics: Risk, Ethics, and Design", US Department of Navy, Office of Naval Research, California Polytechnic State

51 / 51

Why Computer Ethics ? (why not typewriter ethics?)Level 5: Issues and problems unique to Information Technology (Would NOT have arisen WITHOUT computers; no­satisfactory non­computer analog) 

• Uniquely STORED20 Nov 1985, BoNY ­32B$ due to an overflow (65535+1=65536 1 0000 0000 0000 0000 = 0!), 21 Nov BoNY ­23.4B$ x 1 day. Total interest = 5M$. Y2K!

• Uniquely MALLEABLEGeneral Purpose Machine, Universally adaptable, Universal Access is a Must. Computers can do anything we can describe in terms of Input, Process, Output

• Uniquely COMPLEXProgramming = creation of discrete functions of arbitrary (super­human) complexity. Total behavior cannot be described in any compact function. Testing?

• Uniquely FASTBuy / Sell commands by the same algorithms at the same time: destabilized market of futures (contract to buy a stock at a set time and price)

• Uniquely CHEAPCrazy scheme of "salami": 0,001€, 10­3€ x 105 accounts (cheap!)= 100€/day x 200days = 20.000€/year. Spamming: 1p/106x10Mp=10p/day x 10€ = 100€/day ... 

• Uniquely CLONED•1st time in history: exact copy. No transfer of possession. (copy + remix!)

• Uniquely DISCRETEContinuous systems = tolerance (small changes, small effects); Discrete systems = no tolerance. Continuity does NOT hold for computers. 1 bit changes ...

• Uniquely CODEDDegradable nature of media. Obsolescence of I/O devices. Evolution of media formats (& encryption?!). No documentation: computers accelerate the tx of information BUT also reverse effect: computers will impede the generational flow of information: will any stored records be readable in the future? Data archeologists?

• Uniquely INTERNETWORKEDDawn of cyberspace!

Source: (adapted from) Walter Maner, "Unique Ethical Problems in Information Technology", ETHICOMP95, Leicester, UK.