Ethics and Tech - NYU

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/132

flashcard set

Earn XP

Description and Tags

Finals Study Cards

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

133 Terms

1
New cards

Social Justice

A concept advocating for the fair distribution of resources, opportunities and privileges within a society, ensuring equity across all groups.

Reading: Interview with Donna M Riley in Public Books

2
New cards

Ethics

A branch of philosophy dealing with moral principles that govern an individual's or group’s behavior, guiding decisions about what is right and wrong.

Reading: Interview with Donna M Riley in Public Books

3
New cards

Democratized Engineering

An engineering practice that involves public participation and collaboration in decision-making processes, ensuring that broader societal needs are served.

Reading: Interview with Donna M Riley in Public Books

4
New cards

Activism

A policy or action to drive social, political, or environmental change through actions like advocacy, protests, or public engagement, aiming to challenge injustices and promote equity.

Reading: Interview with Donna M Riley in Public Books

5
New cards

Social Sciences

focus on how individuals behave within society, how society works and the relationship between them

Reading: Ethics Alone Can’t Fix Big Tech (Slate article)

6
New cards

Ethical Actions

an action that respects and protects the moral rights of those affected

Reading: Ethics Alone Can’t Fix Big Tech (Slate article)

7
New cards

Ethics Theater/ Ethics Washing

Where companies make vague checklists with claims about ethics and principles designed to feign ethical consideration, evade liability, and to improve how a person or organization is perceived.

Reading: Ethics Alone Can’t Fix Big Tech (Slate article)

8
New cards

AI Ethics

principles that guide how AI is developed and implemented to ensure it is beneficial to society, and that these systems reflect and respect human values, like privacy, autonomy, and fairness

Reading: Ethics Alone Can’t Fix Big Tech (Slate article)

9
New cards

Social Construction of Technology

The opposite of tech determinism, that is, technology is created as a by-product of societal influences, so society shapes the technology we innovate. E.g. through military, economy, cultural factors, etc

Reading: “Social Shaping of Tech” 1985, MacKenzie and Wajcmann

10
New cards

Tech Determinism

The idea that technology is the primary cause of social change.

Reading: “Social Shaping of Tech” 1985, MacKenzie and Wajcmann

11
New cards

Digital Millennium Copyright Act

The DMCA is an act passed during the turn of the 20th century due to societal pressures to ensure intellectual property rights in a digital age. Is best used as a result for arguing the social construction of tech

Reading: “Social Shaping of Tech” 1985, MacKenzie and Wajcmann

12
New cards

Sociology of Science

This argues that because science, a primarily empirical field, is a social construct, the truths argued by Science are merely ideas can be interpreted based on different contexts.

Reading: “Social Shaping of Tech” 1985, MacKenzie and Wajcmann

13
New cards

Moses’ Low Bridges

bridges built by Moses’ that were created to be low which deterred many public transportation from using it, therefore blocking many lower income individuals from traveling

Reading: Langdon Winner, “Do Artifacts Have Politics?”

14
New cards

McCirmick’s Molding Machines

machines built by Mccormick which made molding metal easier. This reduced the amount of skilled workers needed, who are replaced with unskilled workers, which broke an ongoing union

Reading: Langdon Winner, “Do Artifacts Have Politics?”

15
New cards

Technology

Entire body of methods and materials used in combining science and art to produce items and concepts to satisfy industrial commercial and social objectives 

Reading: Robert Whelchel, “Are Technologies Neutral?”

16
New cards

Science

a commitment to a systematic way of thinking, an allegiance to a way of building knowledge and  explaining the universe through testing and factual observation. The thing  is, that isn’t a normal way of thinking

Reading: Robert Whelchel, “Are Technologies Neutral?”

17
New cards

Neutrality (with respect to technology)

they are simply tools that can be used one way or another; the benefit or harm they bring depends on how men use them”

Reading: Robert Whelchel, “Are Technologies Neutral?”

18
New cards

Casual Neutrality

having no effect

Reading: Robert Whelchel, “Are Technologies Neutral?”

19
New cards

Moral Neutrality

morally innocent, the subject is neither inherently good or bad

Reading: Robert Whelchel, “Are Technologies Neutral?”

20
New cards

Value-free Neutrality

being free of intrinsic values or biases

Reading: Robert Whelchel, “Are Technologies Neutral?”

21
New cards

Technological Frame

Technology creates a “frame” through which the functioning technologist views his world” → by creating a frame it leaves out other possible considerations

Reading: Robert Whelchel, “Are Technologies Neutral?”

22
New cards

Value Laden

The influence of personal opinion (relates back to the technological frame)

Reading: Robert Whelchel, “Are Technologies Neutral?”

23
New cards

Standing Reserve

Heidegger uses a standing reserve as a metaphor to show how items (technology?) are ready to be used

Reading: Robert Whelchel, “Are Technologies Neutral?”

24
New cards

Solipsists

someone who is focused only on their own needs and wants not considering other people → egocentric

Reading: “Small Change,” Malcolm Gladwell, The New Yorker (2011)

25
New cards

Insubordination

Defiance of authority; refusal to obey others 

Reading: “Small Change,” Malcolm Gladwell, The New Yorker (2011)

26
New cards

Contagion

The spreading of a harmful idea or practice 

Reading: “Small Change,” Malcolm Gladwell, The New Yorker (2011)

27
New cards

The Dictator’s Dilemma / The Conservative Dilemma

When new media that increase public access to speech or assembly, a state accustomed to having a monopoly on public speech finds itself called to account for anomalies between its view of events and the public's.

Reading: The Political Power of Social Media,” Clay Shirky. Foreign Affairs. (2011)

28
New cards

Slacktivism

casual participants, low cost activities

Reading: The Political Power of Social Media,” Clay Shirky. Foreign Affairs. (2011)

29
New cards

Virtue Ethics

acts that uphold moral virtue and development of the actor

Reading: Making Choices: A Framework for Ethical Decisions

30
New cards

Utilitarianism

This ethical framework attempts to maximize the overall benefit for most people even if it results in the suffering of the minority.

Reading: Making Choices: A Framework for Ethical Decisions

31
New cards

Deontology

Ethical framework that emphasizes always doing moral actions.

Reading: Making Choices: A Framework for Ethical Decisions

32
New cards

Computer Ethics

the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of technology.

Reading: Moor, James. 1985. “What is Computer Ethics?” Metaphilosophy 16 (4): 266–75.

33
New cards

Intellectual property

an expression of an idea that is owned (copyright) or a process that is owned (patent)

Reading: Moor, James. 1985. “What is Computer Ethics?” Metaphilosophy 16 (4): 266–75.

34
New cards

Logical Malleability

Computers are logically malleable in that they can be shaped and molded to do any activity that can be characterized in terms of inputs, outputs, and connecting logical operations

Reading: Moor, James. 1985. “What is Computer Ethics?” Metaphilosophy 16 (4): 266–75.

35
New cards

Convergence

the merging of existing separate technologies into a single technology or system

Reading: Moor, James. 1985. “What is Computer Ethics?” Metaphilosophy 16 (4): 266–75.

36
New cards

Combinatorial Innovation

the practice of using existing technologies to develop newer, improved technologies


Reading: Moor, James. 1985. “What is Computer Ethics?” Metaphilosophy 16 (4): 266–75.

37
New cards

Invisibility Factor

Most of the time and under most conditions computer operations are invisible

Reading: Moor, James. 1985. “What is Computer Ethics?” Metaphilosophy 16 (4): 266–75.

38
New cards

Invisible Abuse

the intentional use of the invisible operations of a computer to engage in unethical conduct

Reading: Moor, James. 1985. “What is Computer Ethics?” Metaphilosophy 16 (4): 266–75

39
New cards

Invisible programming values

values embedded, intentionally or unintentionally, in a computer program

Reading: Moor, James. 1985. “What is Computer Ethics?” Metaphilosophy 16 (4): 266–75

40
New cards

Invisible complex calculation

Computers today are capable of enormous calculations beyond human comprehension. Even if a program is understood it does not follow that the calculations based on that program are understood.

Reading: Moor, James. 1985. “What is Computer Ethics?” Metaphilosophy 16 (4): 266–75

41
New cards

Stages of a (computer) revolution

Introduction - The new technology is first unveiled, typically at high cost with few users and marginal social impact.

Permeation - The new technology starts to spread. Devices utilizing the technology become standardized, the cost lowers, and the social impact becomes noticeable.

Power - The new technology becomes widespread and pervasive. The device is most useful in this phase, and the social impact becomes significant.


Reading: Moor, James. 1985. “What is Computer Ethics?” Metaphilosophy 16 (4): 266–75

42
New cards

Formal Ethics Framework

Formal models that allow us to analyze ethical decisions by separating factual from ethical disputes and providing resources for accountability over time

Reading: Moor, James. 1985. “What is Computer Ethics?” Metaphilosophy 16 (4): 266–75

43
New cards

Best practices

a term often used in contexts where it is very important that the thing be done well, and where there are significant costs or risks to doing it in a less than optimal way

Reading: Markkula Center for Applied Ethics, Santa Clara University, “Best Ethical Practices in Technology”

44
New cards

8-Fold Path

Focus on self cultivation, caring for oneself and for others

Reading: The Dalai Lama at MIT, Anne Harrington

45
New cards

Dogmatism

the tendency to lay down principles as incontrovertibly true, without consideration of evidence or the opinions of others

Reading: The Dalai Lama at MIT, Anne Harrington

46
New cards

Epistemology

the study of the nature, origin, and limits of human knowledge

Reading: The Dalai Lama at MIT, Anne Harrington

47
New cards

Methodology

the system of methods used in a particular area of study or activity

Reading: The Dalai Lama at MIT, Anne Harrington

48
New cards

Autopoiesis

the idea that living systems are self-organizing entities

Reading: The Dalai Lama at MIT, Anne Harrington

49
New cards

Rational/logical knowledge

a philosophical concept that involves the use of reason to understand the world, seem as supreme in the sciences

Reading: Cathy O'Neil, Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy. Chapter 1: “Bomb Parts: What is a Model?”

50
New cards

Standpoint epistemology

a feminist theory that examines how a person's social and political experiences shape their understanding of the world; emphasizes marginalized groups’ perspectives

Reading: Cathy O'Neil, Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy. Chapter 1: “Bomb Parts: What is a Model?”

51
New cards

Model

abstract representation of a process

Reading: Cathy O'Neil, Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy. Chapter 1: “Bomb Parts: What is a Model?”

52
New cards

Dynamic Model

model that integrates updates and adjustments

Reading: Cathy O'Neil, Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy. Chapter 1: “Bomb Parts: What is a Model?”

53
New cards

Formal external model

codified model outside of one’s own head

Reading: Cathy O'Neil, Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy. Chapter 1: “Bomb Parts: What is a Model?”

54
New cards

Proxy

stand - in data, statistically- correlated data (zip code, language patterns)

Reading: Cathy O'Neil, Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy. Chapter 1: “Bomb Parts: What is a Model?”

55
New cards

Predictive Data

Past data used to forecast future outcomes

Reading: Cathy O'Neil, Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy. Chapter 1: “Bomb Parts: What is a Model?”

56
New cards

Inequality Problem

“The rich get richer and the poor get poorer” describes economic inequality, where wealth concentrates among the rich while systemic barriers hinder the poor, widening social and economic divides.

Reading: Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. Selections, Virginia Eubanks

57
New cards

Social Inequality

Social inequality is the unequal distribution of resources, opportunities, and privileges, influenced by systemic factors like race, gender, class, and education. It raises ethical concerns about fairness, justice, and human rights.

Reading: Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. Selections, Virginia Eubanks

58
New cards

Politics of Reform

The politics of reform addresses systemic issues by implementing changes in technology, society, or economics. It raises ethical concerns about equity, accountability, and societal impacts, aiming to balance innovation with fairness.


Reading: Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. Selections, Virginia Eubanks

59
New cards

Politics of Refusal

The politics of refusal involves rejecting technologies, systems, or norms seen as unjust, such as surveillance or data exploitation. It raises ethical questions about autonomy, collective action, and the societal impacts of resistance or opting out.

Reading: Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. Selections, Virginia Eubanks

60
New cards

Digital Divide

The digital divide is the gap between those with access to digital technologies and those without. It raises ethical concerns about equity, as it can deepen social, economic, and educational disparities.

Reading: Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. Selections, Virginia Eubanks

61
New cards

Geographic Inequality (In relation to technology)

refers to disparities in access to technology and opportunities based on location. Rural or underdeveloped areas often lack internet access and tech education, deepening economic and social divides.

Reading: Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. Selections, Virginia Eubanks

62
New cards

Destruction/Deskilling of Jobs

The destruction or deskilling of jobs occurs when technology replaces or simplifies roles, reducing the need for specialized skills. This raises ethical concerns about unemployment, displacement, and the need for worker retraining.

Reading: Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. Selections, Virginia Eubanks

63
New cards

Wealth Generation vs. Wealth Distribution

Wealth generation vs. wealth distribution highlights the tension between creating wealth through innovation and ensuring it is shared equitably. In technology, this raises ethical concerns about profit concentration and the need for fair redistribution to address inequality.

Reading: Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. Selections, Virginia Eubanks

64
New cards

Information Systems

Information systems are frameworks for collecting, processing, storing, and sharing data through technology. They raise ethical concerns about privacy, security, and the societal impacts of data use in decision-making and power dynamics.

Reading: Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. Selections, Virginia Eubanks

65
New cards

Contextual Integrity

privacy expectations vary depending on the purpose and public understanding of the context surrounding the collection of data

Reading: Privacy in Context (Nissenbaum)

66
New cards

Information Flow

the exchange of information between people, processes, and systems

Reading: Privacy in Context (Nissenbaum)

67
New cards

Privacy Policy

legal document that explains how a party gathers and handles customer, client, or employee data

Reading: Privacy in Context (Nissenbaum)

68
New cards

HIPAA

American law that establishes medical privacy rights and personally identifiable information guidelines/restrictions.

Reading: Privacy in Context (Nissenbaum)

69
New cards

GDPR

European Union law with the most extensive privacy policy yet developed in the world, companies are bound to protect personal data if collected, and users have the right to be informed about what data is being collected, how it is being used, and how long it will be retained for

Reading: Privacy in Context (Nissenbaum)

70
New cards

Intersectionality

Sociological paradigm where multiple overlapping categorizations and experiences influence identity

Reading: Privacy in Context (Nissenbaum)

71
New cards

Spheres of trust

trust serves as the basis of interaction, certain types of information flow is voluntary

Reading: Privacy in Context (Nissenbaum)

72
New cards

Panopticon

An idea suggested by Jeremy Betham of a circular prison with a central watchtower, creating unobstructed views of all prison cells while prisoners cannot observe the guards. Proposed to reduce # guards needed to watch over prisoners but were too inhumane due to lack of privacy and ability to have a private space. George Orwell's 1984 extension included the middle class. In his novel, he “the Panopticon became electrical [...] to discuss, among other things, both the reasons of the state for wanting ubiquitous surveillance and the impact that this has on the individual and the nature of a society under ubiquitous surveillance.”

Reading: Maconish, Kevin, “Surveillance Ethics.” Internet Encyclopedia of Philosophy. - Panopticon

73
New cards

Biometrics

Data that personally identifies a person via a feature found in their body, I.e DNA, Retina Scans, Fingerprints, etc

Reading: Latonero, Mark. “Stop Surveillance Humanitarianism

74
New cards

Function Creep

Utilizing a tool or infrastructure for a different purpose than it was originally intended for. Example; Yemen data center as per World Food Programme, could be abused to track dissidents when a new government takes power, not the original purpose for ensuring equal distribution of food.

Reading: Latonero, Mark. “Stop Surveillance Humanitarianism

75
New cards

Modes of Resistance

(specific to surveillance) Can include; hide their faces in real life and online (catfishing, a mask), deny them taking a picture at an airport, giving a fake name, class action lawsuit – remove our names, multiple email addresses, using alternative platforms, encrypted platforms, or covering a laptop camera.

Reading: Latonero, Mark. “Stop Surveillance Humanitarianism

76
New cards

Bias

Prejudice towards certain groups in an unfair way. Example, the jim crow laws were a biased set of legislation meant to harm the african american community 

Reading: Latonero, Mark. “Stop Surveillance Humanitarianism

77
New cards

Tech Justice

Approach to technological advancements that challenges structural inequalities.

Reading: Latonero, Mark. “Stop Surveillance Humanitarianism

78
New cards

Transparency

In the surveillance sense is regarding how much the surveilling party confirms and clarifies their surveillance practices to the public.

Reading: Latonero, Mark. “Stop Surveillance Humanitarianism

79
New cards

Automation

Balancing efficiency and human oversight in law enforcement tasks

Reading: Case Study: Law Enforcement Chatbots

80
New cards

Research Ethics

Addressing the ethical implications of using AI systems to interact with human subjects

Reading: Case Study: Law Enforcement Chatbots

81
New cards

Sovereignty

Navigating conflicts between national interests and international cooperation in combating cybercrime

Reading: Case Study: Law Enforcement Chatbots

82
New cards

Computing

Any activity that involves requiring, benefiting from, or creating computing machinery

Reading: Todd Frankel, “The Cobalt Pipeline: Tracing the Path from Deadly Hand-Dug Mines in Congo to Consumers Phones and Laptops,” Washington Post

83
New cards

Planned Obsolescence

Business strategy where the process of a product becoming obsolete is intentionally planned and built into it from the beginning by the manufacturer.

Reading: Todd Frankel, “The Cobalt Pipeline: Tracing the Path from Deadly Hand-Dug Mines in Congo to Consumers Phones and Laptops,” Washington Post

84
New cards

Supply Chain

The network of all the individuals, organizations, resources, activities, and technology involved in the creation and sale of a product

Reading: Todd Frankel, “The Cobalt Pipeline: Tracing the Path from Deadly Hand-Dug Mines in Congo to Consumers Phones and Laptops,” Washington Post

85
New cards

Circular Economy

A model of production and consumption that aims to reduce waste and extend the life of products and materials (reuse/repair, recycling, production, distribution, consumption)

Reading: Todd Frankel, “The Cobalt Pipeline: Tracing the Path from Deadly Hand-Dug Mines in Congo to Consumers Phones and Laptops,” Washington Post

86
New cards

Barriers to Repair

Device lock-out (physical barriers like screws), Proprietary controls (control of schematics/firmware), Legal (warranty assertions, copyrighting of repair-relevant knowledge)

Reading: Todd Frankel, “The Cobalt Pipeline: Tracing the Path from Deadly Hand-Dug Mines in Congo to Consumers Phones and Laptops,” Washington Post

87
New cards

Right to Repair

The legal right of product owners to repair and modify their devices and equipment without restriction.

Reading: Todd Frankel, “The Cobalt Pipeline: Tracing the Path from Deadly Hand-Dug Mines in Congo to Consumers Phones and Laptops,” Washington Post

88
New cards

Bhangari

Technology recycle, repair, and sale workers in Bangladesh (experience significant health issues)

Reading: Todd Frankel, “The Cobalt Pipeline: Tracing the Path from Deadly Hand-Dug Mines in Congo to Consumers Phones and Laptops,” Washington Post

89
New cards

Networked Ecosystem

natural phenomena have been replaced by digital and artificial systems as forces that drive development

Reading: Todd Frankel, “The Cobalt Pipeline: Tracing the Path from Deadly Hand-Dug Mines in Congo to Consumers Phones and Laptops,” Washington Post

90
New cards

Cobalt Pipeline

Path from deadly hand-dug mines in Congo to consumers’ phones and laptops

Reading: Todd Frankel, “The Cobalt Pipeline: Tracing the Path from Deadly Hand-Dug Mines in Congo to Consumers Phones and Laptops,” Washington Post

91
New cards

Generative AI

A type of AI that can create new content based on the data it's trained on. Utilizes significant energy (ChatGPT uses “4-5 times that of a conventional web search”)

Reading: Kate Crawford, “Water and Generative AI” Nature

92
New cards

Environmental Sustainability

The practice of maintaining the balance of the natural environment while conserving resources for the benefit of current and future generations.

Reading: Kate Crawford, “Water and Generative AI” Nature

93
New cards

Container Principle

Shipping containers fundamentally changed the world with the amount of goods transferred and their speed. Containers find their way into not just shipping yards and airfields, but also rural areas and urban architecture.

Reading: Klose, Alexander, “Selections from The Container Principle: How a Box Changes the Way We Think

94
New cards

Containerization

he principle proposing the container as the “modern answer to the ancient question of cultivation and utilization that constitutes culture… play[ing] a decisive role in the organization of people, programs, and information as they do in that of goods.”

Reading: Klose, Alexander, “Selections from The Container Principle: How a Box Changes the Way We Think

95
New cards

Globalization

The increasing interaction of different world powers, cultures, economies, etc. This is caused by increasing the amount of goods and information shared between nations

Reading: Klose, Alexander, “Selections from The Container Principle: How a Box Changes the Way We Think

96
New cards

Logistics

The modern modularization and optimization of the distribution of goods. Logistic systems are designed to be efficient at pushing large amounts of products across the world

Reading: Klose, Alexander, “Selections from The Container Principle: How a Box Changes the Way We Think

97
New cards

Gig Work

short term, contract based work which usually takes place on platforms with independent contractors

Reading: “What’s a gig job?” David Well, Brandeis Now

98
New cards

Proposition 22

Allowed transport and delivery companies to classify drivers as “independent contractors” rather than employees

Reading: “What’s a gig job?” David Well, Brandeis Now

99
New cards

Algorithmic Mediation

algorithmic management to control workers (i.e. surge pricing for taxi drivers, which they can’t control)

Reading: “What’s a gig job?” David Well, Brandeis Now

100
New cards

Digital detox

distancing oneself from technology for a long period of time, typically for attention “reform”

Reading: Johann Hari, Stolen Focus