Computing and Ethics
Computing and Ethics
Computing and Ethics
3 4
1
Credit card reader____ DNA testing system____ Surveillance system____ Body scanner ____
2. What is each item used for?
3. What benefit can the item deliver?
4. How might the item be harmful?
B. Look at the linking words below.
another point is as a result because finally firstly for example
in addition moreover one result of this is secondly since so
Task: Put them into two groups for:
Discussing reasons and results Building an argument
1
C. Defend vs. Oppose debates on the topics below:
1. DNA test results are not always accurate. 3. Security cameras invade people’s privacy
2. Credit cards are made to make people spend 4. Body scanners are a waste of time.
money easily.
D. Discuss the following questions in groups. Report to the class after your discussions
Topic 1: How has science contributed to the development of mankind?
Topic 2: In your opinion, what are the three most valuable scientific inventions humanity has known?
Topic 3: How has science contributed to making mankind ‘less human’?
Topic 4: To what extent is science without conscience nothing but ruin to the soul?
Useful debate expressions:
• l'd like to start by explaining... • As well as this issue we can also look at a very
• To carry on from this first point, … different issue.
• I want secondly to look at ... • So to sum up,we can say that ...
• Idon't think that is the main reason. • Does anybody have any opinions or anything
• That seems like a very good point X is making. they would like to add?
• l'm going to expand the topic by mentioning... • I think we need a different viewpoint.
• On the other hand, you might want to say that... • Following on from what X has said, ...
E. Look at the words in the box below. Say if they are nouns, verbs or adjectives
beneficial censorship conflict ethical faulty harmful impact
implication justify negligence obligation reputation responsible surveillance
F. Listen to a recording about computer ethics. Complete each space {ESAP ICT CD2 Track 12}
Computer Ethics
Computers play an increasingly important role in our society. ________________ is that decisions made by computer
professionals have an on a growing number of people. ________________, IT contractors need to balance their clients'
demands with their obligations to society. ________________ to ethical reasons for this, there are also practical reasons
why this is necessary.
________________, errors in the design or construction of IT systems can have profound economic or human
consequences. ________________, Bynum, 2004, refers to a chemical company, Chemco, where faulty computer system
design was ________________ for an explosion which resulted in significant loss of life and widespread environmental
contamination. Because the system design was flawed, the designer's professional _______________ was at risk.
________________, if found responsible for the death and destruction because of negligence, he faced a large fine or
imprisonment. This example of a failure in standards illustrates the importance of making decisions based on sound
principles which can be justified.
________________, a conflict of opinion can arise between a computer professional and his or her employer. The
employee may have a disagreement about whether his or her work is being put to beneficial or ________________ uses.
One ________________ of this could be the construction, maintenance or operation of systems for surveillance or
censorship. ________________ it is important that professionals understand the ethical issues before entering into
conuacts.
Source: Adapted from T.W.Bynum, Computer Ethics and Professional Responsibility. Blackwell, 2004, pp. 60-86.
2
G. Match the phrases below from the text with the phrases that refer back to them.
Webquest
Do some research on the internet and match the terms in A in the table to their meanings in B
A B
1. known software exploit a) a set of rules designed to enhance computer security by encouraging users to
2. technical legal breach employ strong passwords and use them properly
3. password protection b) the process of rendering data, whether it's paper or electronic, unreadable by
policy any means.
4. Internet safety c) a program that attackers can use to take advantage of vulnerabilities in
guidance applications, networks, operating systems, or hardware
Secure equipment d) minor contravention of a House Rule that was unintended.
disposal advice or information aimed at protecting data, personal information, etc.