View this PageEdit this PageAttachments to this PageHistory of this PageHomeRecent ChangesSearch the SwikiHelp Guide

Ethics resources

Here are some resources from Dr. Jody Paul the new Chief Reader for the CS AP exam

IT Ethics Handbook by Stephen Northcutt (includes case studies)
http://tinyurl.com/5nm3kd (Amazon.com link)

Readings in CyberEthics (2nd Ed), ed. by Spinello & Tavani
http://tinyurl.com/55g4db (Amazon.com link)

IEEE Code of Ethics
http://tinyurl.com/2dvdn3 (IEEE portal link)

ACM Code of Ethics
http://www.acm.org/about/code-of-ethics

ACM XXII Self-Assessment: The Ethics of Computing
Communications of the ACM
Volume 33, Issue 11; November 1990; Pages: 110-132
http://portal.acm.org/citation.cfm?id=92780

The following is from Matt Brenner

Sara Baase's (San Diego State
University) book called: "A Gift of Fire: Social, Legal, and Ethical
Issues for Computing and the Internet." It's filled with possibilities
for you. Here's a link:

http://www-rohan.sdsu.edu/faculty/giftfire/

The following are from Rodney Hoffman

If you have access (through a library or through ACM's Digital Library),
you might want to track down these two CACM articles:

1. "Self-Assessment Procedure IX: A self-assessment procedure dealing
with ethics in computing" edited by Eric A. Weiss from a book by Donn B.
Parker, "Communications of the ACM", March 1982, Vol. 25, No. 3, pages
181-195.

2. "Self-Assessment" Procedure XXII edited by Eric Weiss from a report
by Donn Parker and others, "Communications of the ACM" November 1990,
Vol. 33, No. 11, pages 110-132.

Both contain a number of short scenarios presenting ethics issues,
followed by questions, and then opinions from panels of computer
scientists.

I like to read selected scenarios, ask the questions, have my students
discuss these, then read the panel opinions.

Some of the scenarios are dated, but not all. Examples:
- Using government-owned personal data for business purposes
- Installing an inadequate system
- Disregarding impact of computerization on employees
- Selecting favorable computer output in a feasibility study
- Hacker accessing computer services
- Using students as subject of a computer-assisted instruction
experiment
- Student offering limited access to a pornographic questionnaire
- Marketing a software product known to have bugs
- IT Security manager monitoring e-mail

etc.


Link to this Page