[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Meta-informatics and ethical issues in computing

Published: 26 June 2006 Publication History

Abstract

This paper deals with aspects of teaching a course on ethical issues in computer science for third- and fourth-year computer science and computer engineering majors. In addition to engineering concerns - soft and hard - our recent discussions have increasingly centered on public policy issues involving surveillance, access to, use and interpretation of information, and on early access to appropriate instruction in computer and information technology indispensable for productive life and citizenship in the 21st century. In these discussions, students have revealed blind spots with respect to manipulation, misuse, misrepresentation, and distortion of information. Among the difficulties are those associated with reification, "reverse reification", saturation of the channel, especially through the use of so-called "talking points", and outright falsification, misrepresentation, and distortion. These seem to belong to a neglected aspect of our discipline that might be given the name "meta-informatics." My assertion is that "meta-informatics" is an area worthy of consideration, especially in courses or modules devoted to ethical issues in computer and information science.

References

[1]
ACLU of Colorado, "Denver Police Spy Files," at www.aclu-co.org/spyfiles/chronology.htm last accessed 16 January, 2006.
[2]
Etzioni, A., "Privacy and Safety in Electronic Communications," chapter 4 in The Common Good, Polity Press, Cambridge, 2004, pp. 95--123.
[3]
Fleischman, W., "The Role of Imagination in a Course on Ethical Issues in Computer Science," in Proceedings of ETHICOMP 2001: Systems of the Information Society, S. Rogerson, S. Sjeko, and T. Ward Bynum editors, Gdansk, Poland (2001), pp. 171--183.
[4]
Fleischman, W. "A Service Learning Component for a Course in Ethical Issues in Computing," in preparation.
[5]
Gotterbarn, D., "How the new Software Engineering Code of Ethics Affects You," IEEE Software, v. 16, no. 6, pp. 58--64.
[6]
Hall, S. Encoding/Decoding, in Culture, Media, Language: Working Papers in Cultural Studies 1972-79, Hutchinson, London, 1980, pp.128--138.
[7]
Kozol, J., Savage Inequalities: Children in America's Schools, Crown Publishers, New York, 1991.
[8]
Kozol, J., Shame of the Nation: The Restoration of Apartheid Schooling in America, Crown Publishers, New York, 2005.
[9]
Leveson, N., Safeware: System Safety and Computers, Addison-Wesley, Reading, Massachusetts (1995).
[10]
National Institute for Early Education Research, "The State of Preschool: 2004 State Preschool Yearbook," at http://nieer.org/yearbook/, last accessed 16 January, 2006.
[11]
North Central Regional Educational Laboratory, "Critical Issue: Ensuring Equitable Use of Education Technology," at www.ncrel.org/sdrs/areas/issues/methods/technlgy/te400.htm, last accessed 16 January, 2006.
[12]
Weizenbaum, J. "Information in the Information Society," abstract of the keynote address to the Tenth Annual Conference on Innovation and Technology in Computer Science Education, in Proceedings of ITiCSE 2005, p.1.

Cited By

View all
  • (2015)Does computing need to go beyond good and evil impacts?Journal of Information, Communication and Ethics in Society10.1108/JICES-10-2014-004513:3/4(190-204)Online publication date: 10-Aug-2015
  • (2023)Teaching Ethics in Computing: A Systematic Literature Review of ACM Computer Science Education PublicationsACM Transactions on Computing Education10.1145/363468524:1(1-36)Online publication date: 27-Nov-2023
  • (2017)A program optimization for automatic database result cachingACM SIGPLAN Notices10.1145/3093333.300989152:1(271-284)Online publication date: 1-Jan-2017
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGCSE Bulletin
ACM SIGCSE Bulletin  Volume 38, Issue 3
September 2006
367 pages
ISSN:0097-8418
DOI:10.1145/1140123
Issue’s Table of Contents
  • cover image ACM Conferences
    ITICSE '06: Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education
    June 2006
    390 pages
    ISBN:1595930558
    DOI:10.1145/1140124
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 June 2006
Published in SIGCSE Volume 38, Issue 3

Check for updates

Author Tags

  1. computing in public education
  2. digital divide
  3. surveillance

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2015)Does computing need to go beyond good and evil impacts?Journal of Information, Communication and Ethics in Society10.1108/JICES-10-2014-004513:3/4(190-204)Online publication date: 10-Aug-2015
  • (2023)Teaching Ethics in Computing: A Systematic Literature Review of ACM Computer Science Education PublicationsACM Transactions on Computing Education10.1145/363468524:1(1-36)Online publication date: 27-Nov-2023
  • (2017)A program optimization for automatic database result cachingACM SIGPLAN Notices10.1145/3093333.300989152:1(271-284)Online publication date: 1-Jan-2017
  • (2017)Coming to terms with quantified reasoningACM SIGPLAN Notices10.1145/3093333.300988752:1(260-270)Online publication date: 1-Jan-2017
  • (2017)Interactive proofs in higher-order concurrent separation logicACM SIGPLAN Notices10.1145/3093333.300985552:1(205-217)Online publication date: 1-Jan-2017
  • (2017)On the relationship between higher-order recursion schemes and higher-order fixpoint logicACM SIGPLAN Notices10.1145/3093333.300985452:1(246-259)Online publication date: 1-Jan-2017
  • (2012)Computing EducationProceedings of the 2012 African Conference for Sofware Engineering and Applied Computing10.1109/ACSEAC.2012.11(47-54)Online publication date: 24-Sep-2012
  • (2011)Beyond good and evil impactsProceedings of the 16th annual joint conference on Innovation and technology in computer science education10.1145/1999747.1999812(228-232)Online publication date: 27-Jun-2011
  • (2006)Google™ - "do no evil"Working group reports on ITiCSE on Innovation and technology in computer science education10.1145/1189215.1189142(8-10)Online publication date: 26-Jun-2006
  • (2006)Teaching database in an integrated oracle environmentACM SIGCSE Bulletin10.1145/1189136.118917438:4(71-74)Online publication date: 26-Jun-2006
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media