|
AL AIN UNIVERSITY College of Engineering (CoE) |
Computer Ethics (0102453)
Project and Presentation
|
Student Name |
|||||||||||
|
Student ID |
|||||||||||
|
Due Date |
19th April 2025 @ 23:59 pm on Moodle |
||||||||||
|
Problem # |
Course Learning |
Total |
Student |
|
1 |
1,2,3 |
10 |
|
|
|
10 |
Project Assignment: Ethical Dilemmas in Modern Computing
This assignment will consist of a written report and an accompanying presentation. The students will address the following Course Learning Outcomes (CLOs):
- Describe general concepts related to computer ethics.
- Evaluate contemporary ethical problems using major ethical theories.
- Evaluate issues related to cyberspace intellectual property.
Part 1: Written Report
Topic:
Choose a contemporary issue related to computer ethics, specifically one involving Artificial Intelligence, cyberspace and intellectual property rights. The selected topic should be specific in scope. For example, facial recognition would not be an appropriate focus because it has a broad scope. Instead, you could select one aspect of facial recognition technology such as automated gender recognition [ Alternatively, you might investigate the use of facial recognition in a specific social context such as in public housing.
Below is list of a number of areas from which to choose that subject:
Artificial Intelligence:
oEthical Issues in AIGenerated Content: Studying how tools that create text or images may affect honesty, creativity, and academic integrity.
oEthical Use of Predictive Policing Tools: Analyze harms, fairness, and accountability when police use AI to predict crime.
oAutonomous Vehicles and Moral Decisions: Exploring how selfdriving cars should make choices in dangerous situations
Software Development
oDark Patterns in User Interface Design: Studying how some apps use design tricks to influence user behavior in unethical ways.
oResponsible Disclosure of Security Flaws: Describing ethical duties of developers, compare disclosure policies, and evaluate a disclosure case using major ethical theories
Data Privacy
oData Breaches and Responsibility: Exploring who is ethically responsible when personal data is leaked.
oLocation Tracking and Consent: Describe privacy concepts, evaluate a companys location policy using rightsbased and consequentialist views, and assess data ownership questions.
Communication Technologies
oMisinformation in Digital Communication: Exploring how false information spreads and what ethical duties platforms have to stop it.
Intellectual property
oRight to Repair: The Ethical Conflict between Intellectual Property and Hardware Longevity.
Copyright violations in cyberspace
oFair Use vs. Copyright: Explore the tension between fair use doctrines and copyright protections, especially in the digital age where content can be easily shared and reused. When does the sharing of copyrighted material cross ethical boundaries?
Open-source vs. proprietary software models
oSecurity and Trust in Open-Source Software: Explore the ethics of security in open-source vs. proprietary software. Open-source advocates argue that transparency leads to better security, while proprietary models rely on secrecy. Which approach better protects users?
Large language models (LLMs) as Islamic muftis
oAccuracy and Reliability in Religious Rulings: LLMs are trained on large datasets, but their responses are based on statistical patterns rather than deep understanding or lived religious experience. When asked for fatwas or religious guidance, an LLM might provide inaccurate or oversimplified answers, which could mislead people seeking authentic Islamic advice. A key question is: Can a machine learning model reliably provide religious rulings, and what are the risks of misinformation?
Building an Islamic Ethical Framework for LLM-Based Religious Guidance
oInvestigates whether an Islamic ethical framework can be developed to evaluate bias, hallucination, trust, and intellectual-property concerns in large language models used to generate Islamic religious guidance online.
Report Outline:
- Introduction to Computer Ethics (CLO 1):
Define and explain what computer ethics is and why it is important.
Introduce the chosen issue and its relevance in today’s technological landscape.
- Ethical Analysis Using Theories (CLO 2):
Apply major ethical theories (such as Utilitarianism, Kantianism, Social Contract Theory) to evaluate the ethical dilemma.
Analyze the perspectives of different stakeholders involved, such as the public, developers, companies, and governments.
- Cyberspace Intellectual Property (CLO 3):
Evaluate how intellectual property laws apply in cyberspace regarding the issue.
Discuss the challenges and potential solutions for managing intellectual property in a digital environment.
Address ethical concerns about the balance between open-source models and intellectual property protections.
- Conclusion:
Summarize your findings, stating which ethical theory best applies to the issue.
Reflect on the potential future implications for computer ethics as technology evolves.
- References
Part 2: Presentation (10-15 minutes)
Presentation Structure:
The presentation should follow the structure of the report but be concise and visual, summarizing key points.
- Introduction to Computer Ethics (CLO 1):
Provide a brief definition and explanation of computer ethics.
Present an overview of the ethical issue chosen.
- Evaluation Using Ethical Theories (CLO 2):
Use examples from the report to show how different ethical theories (Utilitarianism, Kantianism, etc.) apply to the issue.
- Cyberspace and Intellectual Property (CLO 3):
Visually show how intellectual property rights are violated or upheld in cyberspace.
Discuss the ethical implications of protecting intellectual property online.
- Conclusion:
End with a summary of your findings and reflections on how the ethical issue could be addressed in the future.
Visual Aids:
Use slides to show data, case studies, and examples of intellectual property issues.
Include diagrams or flowcharts to explain complex ethical theories.
Add videos or images to make your points more engaging.
Submission Guidelines:
- Written Report: Submit the written report in PDF or Word format (5-7 pages).
- Presentation: Create the presentation using PowerPoint or Google Slides (10-15 slides).
- Team Works: You can work in a group of up to 5 students.
Leave a Reply
You must be logged in to post a comment.