INFO-I 101 Techno-Ethics Lecture
INFO-I 101 Techno-Ethics Lecture INFO-I101
Popular in Introduction to Informatics and Computing
Popular in Information technology
This 2 page Class Notes was uploaded by Mei Lin on Sunday March 6, 2016. The Class Notes belongs to INFO-I101 at Indiana University taught by Nina Onesti and Dan Richert in Spring 2016. Since its upload, it has received 39 views. For similar materials see Introduction to Informatics and Computing in Information technology at Indiana University.
Reviews for INFO-I 101 Techno-Ethics Lecture
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 03/06/16
Techno-Ethics Lecture Notes "A set of concepts and principles that guide us in determining what behavior helps or harms sentient creatures" - Tomas Paul and Linda Elder of the Foundation of Critical Thinking Techno-ethics: ethics surrounding technology (of any kind) o Creation of new technology Is the production of new technology harming others? EX: Siracha factory leading to pollution fumes Is a computer virus "evil"? o How technology affects people (how they act, what they do, etc.) Health care --cloning, stem cell research, etc. Privacy and sharing -- RFID, social media Techno-Ethics Topics Advertising/Marketing o Click Bait: sensational headline or photo that entices a person to click on it in order to generate internet advertising revenue or shares (social media) Curiosity gap: providing just enough to peak curiosity, but not enough information without actually clicking the link Links are often times not accurate or of low quality, or even completely irrelevant EXAMPLES: Upworthy (website that makes money specifically off clickbait), Clickhole (satire of clickbaits) Copyright/ownership o Something that is digital can be copied easily and exactly. Who owns something that is digital? Music and video Art Written works Cybercrime o Viruses and worms o Bots -- virus forces computer to send out more viruses and other things o Identity theft o Phishing -- sending out falsified emails pretending to be an authority figure to gain personal information Can also be done via web-links or phone Usually done with the intention of identity theft Free Speech/Personal Representation o Twitter, Facebook, blogs, other social media (user generated content) o Catfishing: claiming to be someone who you're not to gain something (relationship, money…) Public/private profiles How to vet people's profiles o Politics, religion, personal beliefs Teachers and Facebook issue Celebrities Duck Dynasty issue o Twitter Feeds and Facebook posts o Becoming a Meme Ehmergerd Girl photo was taken from her private account and shared without her permission. Was shocked to find out she became an internet meme o Internet Hoaxes Hidden Labor of Computing o Amazon: the truth behind the click Ways that info technology often conceals the underlying human labor that MUST happen to make "virtual" products a reality
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'