1 / 11

The Ethics of Privacy and Security

The Ethics of Privacy and Security. Michael C. Loui Professor of Electrical and Computer Engineering University Distinguished Teacher/Scholar University of Illinois at Urbana-Champaign October 5, 2005. What will we do today?. Short interactive lecture on ethics of privacy and security

xanti
Download Presentation

The Ethics of Privacy and Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Ethics of Privacy and Security Michael C. Loui Professor of Electrical and Computer Engineering University Distinguished Teacher/Scholar University of Illinois at Urbana-Champaign October 5, 2005

  2. What will we do today? • Short interactive lecture on ethics of privacy and security • Discussion of five cases in small groups • Reporting from each group

  3. Why is privacy important? • Personal information as property (Warren & Brandies) • To create and maintain different social relationships (Rachels) • To respect other persons (Benn) • To prevent abuse of power (Parent)

  4. What is the boundary between private and public? • Natural privacy versus normative privacy (Moor) • Meditating in the Grand Canyon • Reading a book at home • Loss vs. violation of privacy • Privacy in public places (Nissenbaum) • Aggregation and accumulation of public information (e.g., Lotus MarketPlace)

  5. When are breaches of privacy morally permissible? • Importance of purpose • Lack of alternatives • Limits on data collected • Protection of data during collection and afterward • (Criteria due to Parent)

  6. Is it ever impermissible to collect relevant information? Suppose behavioral scientists have conclusively demonstrated a strong correlation between sexual preference and likelihood of loan repayment (either way). Should a bank collect that information?

  7. Can security breaches be morally acceptable if they are not illegal? • Distinction between moral and legal • Example: spam

  8. How can we approach moral problems? • Identify • Affected parties • Rights and responsibilities • Additional information needed • Consider alternative actions • Imagine possible consequences

  9. How can we evaluate morality of actions? • Basic ethical values—honesty, fairness, civility, respect, kindness, etc. • Moral tests: • Harms test: Do the benefits outweigh the harms, short term and long term? • Reversibility test: Would I think this choice is good if I traded places? • Common practice test: What if everyone behaved in this way?

  10. How can we evaluate morality of actions? • Legality test: Would this choice violate a law or a policy of my employer? • Colleague test: What would professional colleagues say? • Wise relative test: What would my wise old aunt or uncle do? • Mirror test: Would I feel proud of myself when I look into the mirror? • Publicity test: How would this choice look on the front page of a newspaper?

  11. You will discuss five cases • Choose playing card, break into groups • Group 1 (Ace): start by discussing Case #1; then if time permits, consider Case #2, … • Group 2: start with Case #2, then Case #3, … • Group 3: start with Case #3, then Case #4, … • Group 4: start with Case #4, then Case #5, … • Group 5: start with Case #5, then Case #1, … • After 20 minutes, randomly chosen student in each group will report

More Related