http://youtu.be/b4W0wVaYsPg
Ergonomics
Alternative Input Features and Devices
http://www.youtube.com/watch?v=taL-XSlws8E&feature=youtu.be
Alternative Input Features and Devices
Devices for Students with Learning Disabilities
http://youtu.be/NkUymedx5fM
Devices for Students with Learning Disabilities
Conclusion
http://youtu.be/653x8JdLEqQ
Conclusion
What is Computer Ethics?
How can we work to make computing technology advance human values? One way is to teach “computer ethics” to the public at large and to our students enrolled in courses in computing and information sciences. But what is computer ethics?
The term “computer ethics” was coined in the mid 1970s by Walter Maner to refer to that field of applied professional ethics dealing with ethical problems aggravated, transformed or created by computer technology. By analogy with the more developed field of medical ethics, Maner focussed attention upon applications of ethical theories and decision procedures used by philosophers doing applied ethics. He distinguished “computer ethics” from sociology of computing and from technology assessment.
For nearly two decades, the term “computer ethics” kept this focussed meaning. Recently, however, the term “computer ethics” has acquired a broader sense that includes applied ethics, sociology of computing, technology assessment, computer law, and related fields. This broader kind of computer ethics examines the impact of computing and information technology upon human values, using concepts, theories and procedures from philosophy, sociology, law, psychology, and so on. Practitioners of the broader computer ethics – whether they are philosophers, computer scientists, social scientists, public policy makers, or whatever – all have the same goal:
To integrate computing technology and human values in such a way that the technology advances and protects human values, rather than doing damage to them.
Donn Parker pursues this goal by gathering example cases and presenting scenarios for discussion. Judith Perrolle does it by applying sociological theories and tools to data about computing; Sherry Turkle does it by applying psychological theories and tools; James Moor, Deborah Johnson and others do it by applying philosophical theories and tools; and so on.
All of these thinkers and many others address problems about computing technology and human values, seeking to
- Understand the impact of computing technology upon human values
- Minimize the damage that such technology can do to human values, and
- Identify ways to use computer technology to advance human values.
Computer Security
Computer Security Table of Contents
- Editor’s Introduction
- Computer Security and Human Values
- On Computer Security and Public Trust
- The End of the (Ab)User Friendly Era
- Responsibility and Blame in Computer Security
- Computer Crime, Computer Security, and Human Values
- Hacker Ethics
- The Social Impact of Computer-Mediated Voting
Editor’s Introduction
The National Conference on Computing and Values (NCCV) was held on the campus of Southern Connecticut State University in August 1991. The Conference included six “tracks”: Teaching Computing and Human Values, Computer Privacy and Confidentiality, Computer Security and Crime, Ownership of Software and Intellectual Property, Equity and Access to Computing Resources, and Policy Issues in the Campus Computing Environment. Each track included a major address, three to five commentaries, some small “working groups,” and a packet of relevant readings (the “Track Pack”). A variety of supplemental “enrichment events” were also included. Continue reading “Computer Security”