Ethical Aspects - L’éthique informatique Flashcards
What is the main focus of computer ethics?
Analyzing the social impact of computing technology and creating policies for ethical technology use.
Fill in the blank: The Computer Ethics Institute’s guidelines for responsible computing are known as the 10 _____.
Commandments.
What is one key principle in the 10 Commandments of computer ethics?
Do not harm others using a computer.
Who created the Holberton-Turing oath, and what does it focus on?
Inspired by the Hippocratic Oath, it focuses on ethical practices in AI development, such as privacy, transparency, and human welfare.
Define ‘ethics by design.’
An approach ensuring ethical use considerations are integrated from the start of technology development.
What does IEEE emphasize in its ethical code for cybersecurity?
Public safety, privacy, and adherence to ethical design practices.
Fill in the blank: James H. Moor defines computer ethics as the study of the social ____ of computing technology.
impact.
According to Moor, what does designing technology reveal?
Design choices reveal societal values and biases, whether intentional or not.
What does the concept of ‘dual-use’ in technology imply?
That technology can be used both beneficially and harmfully, depending on intent.
How does algorithmic decision-making risk ethical issues?
It can obscure accountability, as outcomes appear ‘objective’ without clear responsibility.
Explain the ethical significance of ‘transparency’ in AI according to the Holberton-Turing oath.
Transparency ensures that AI decisions are understandable and accountable, protecting user rights.
Fill in the blank: Surveillance studies explore the social and ethical impacts of _____.
monitoring technologies.
Name an ethical concern related to surveillance.
Surveillance can negatively impact psychological well-being and social relationships if perceived as intrusive.
What is a primary difference between legitimate and illegitimate uses of surveillance?
Legitimate uses aim to protect public safety, while illegitimate uses may be discriminatory or oppressive.
Fill in the blank: James H. Moor states that technology is neither inherently good nor bad; it depends on its _____.
design and use.