Immediate download Ethics and technology: controversies, questions, strategies for ethical ebooks 20

Page 1


https://ebookmass.com/product/ethics-and-technologycontroversies-questions-strategies-for-ethical/

Instant digital products (PDF, ePub, MOBI) ready for you

Download now and discover formats that fit your needs...

Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing, 5th Edition 5th Edition – Ebook PDF Version

https://ebookmass.com/product/ethics-and-technology-controversiesquestions-and-strategies-for-ethical-computing-5th-edition-5thedition-ebook-pdf-version/ ebookmass.com

Neurology: Neonatology Questions and Controversies (Neonatology: Questions & Controversies) 3rd Edition

Jeffrey Md Perlman Mbchb

https://ebookmass.com/product/neurology-neonatology-questions-andcontroversies-neonatology-questions-controversies-3rd-edition-jeffreymd-perlman-mbchb/

ebookmass.com

Business Ethics: Best Practices for Designing and Managing Ethical

https://ebookmass.com/product/business-ethics-best-practices-fordesigning-and-managing-ethical/

ebookmass.com

Practical Spring Cloud Function: Developing Cloud-Native Functions for Multi-Cloud and Hybrid-Cloud Environments

1st Edition Banu Parasuraman

https://ebookmass.com/product/practical-spring-cloud-functiondeveloping-cloud-native-functions-for-multi-cloud-and-hybrid-cloudenvironments-1st-edition-banu-parasuraman/ ebookmass.com

The Impact of Populism on European Institutions and Civil Society: Discourses, Practices, and Policies Carlo Ruzza (Editor)

https://ebookmass.com/product/the-impact-of-populism-on-europeaninstitutions-and-civil-society-discourses-practices-and-policiescarlo-ruzza-editor/

ebookmass.com

In Search of Truth Sharon Wray

https://ebookmass.com/product/in-search-of-truth-sharon-wray-3/

ebookmass.com

Gymnasia and Greek Identity in Ptolemaic Egypt 1st Edition Mario C. D. Paganini

https://ebookmass.com/product/gymnasia-and-greek-identity-inptolemaic-egypt-1st-edition-mario-c-d-paganini/

ebookmass.com

Natural Obsession (Au Naturel Nights Book 1) Anna Durand

https://ebookmass.com/product/natural-obsession-au-naturel-nightsbook-1-anna-durand/

ebookmass.com

Poisoning & Drug Overdose 7th Edition Kent R. Olson (Ed.)

https://ebookmass.com/product/poisoning-drug-overdose-7th-editionkent-r-olson-ed/

ebookmass.com

Shakespeare in the Theatre: Sarah Siddons and John Philip

Kemble Fiona Ritchie

https://ebookmass.com/product/shakespeare-in-the-theatre-sarahsiddons-and-john-philip-kemble-fiona-ritchie/

ebookmass.com

PREFACExvii

TABLEOFCONTENTS

Newtothe FourthEdition xviii

AudienceandScopexix

OrganizationandStructureoftheBookxxi

TheWebSitefor EthicsandTechnology xxiii

ANotetoStudentsxxiv

NotetoInstructors:ARoadmapforUsingThisBookxxiv

ANotetoComputerScienceInstructorsxxv

ACKNOWLEDGMENTSxxvii FOREWORDxxix

c CHAPTER1

INTRODUCTIONTOCYBERETHICS:CONCEPTS,PERSPECTIVES, ANDMETHODOLOGICALFRAMEWORKS1

Scenario1–1:AFatalCyberbullyingIncidentonMySpace1

Scenario1–2:ContestingtheOwnershipofaTwitterAccount2

Scenario1–3: “TheWashingtonienne” Blogger2

1.1DefiningKeyTerms:CyberethicsandCybertechnology3

1.1.1WhatIsCybertechnology?4

1.1.2WhytheTermCyberethics?5

1.2TheCyberethicsEvolution:FourDevelopmentalPhasesinCybertechnology6

1.3AreCyberethicsIssuesUniqueEthicalIssues?9

Scenario1–4:DevelopingtheCodeforaComputerizedWeaponSystem10

Scenario1–5:DigitalPiracy11

1.3.1DistinguishingbetweenUniqueTechnologicalFeaturesandUnique EthicalIssues11

1.3.2AnAlternativeStrategyforAnalyzingtheDebateabouttheUniqueness ofCyberethicsIssues12

1.3.3APolicyVacuuminDuplicatingComputerSoftware13

1.4CyberethicsasaBranchofAppliedEthics:ThreeDistinctPerspectives14

1.4.1Perspective#1:CyberethicsasaFieldofProfessionalEthics15

1.4.2Perspective#2:CyberethicsasaFieldofPhilosophicalEthics18

1.4.3Perspective#3:CyberethicsasaFieldofSociological/DescriptiveEthics21

Scenario1–6:TheImpactofTechnologyXonthePleasantvilleCommunity21

1.5AComprehensiveCyberethicsMethodology24

1.5.1A “Disclosive” MethodforCyberethics25

1.5.2AnInterdisciplinaryandMultilevelMethodforAnalyzing CyberethicsIssues26

1.6AComprehensiveStrategyforApproachingCyberethicsIssues27

1.7ChapterSummary28

ReviewQuestions28

DiscussionQuestions29

Essay/PresentationQuestions29

ScenariosforAnalysis29

Endnotes30

References31

FurtherReadings32

OnlineResources32

c CHAPTER2

ETHICALCONCEPTSANDETHICALTHEORIES:ESTABLISHING ANDJUSTIFYINGAMORALSYSTEM33

2.1EthicsandMorality33

Scenario2–1:The “RunawayTrolley”:AClassicMoralDilemma34

2.1.1WhatIsMorality?35

2.1.2DerivingandJustifyingtheRulesandPrinciplesofaMoralSystem38

2.2DiscussionStoppersasRoadblockstoMoralDiscourse42

2.2.1DiscussionStopper#1:PeopleDisagreeonSolutionsto MoralIssues43

2.2.2DiscussionStopper#2:WhoAmItoJudgeOthers?45

2.2.3DiscussionStopper#3:MoralityIsSimplyaPrivateMatter47

2.2.4DiscussionStopper#4:MoralityIsSimplyaMatterforIndividual CulturestoDecide48

Scenario2–2:ThePerilsofMoralRelativism49

2.3WhyDoWeNeedEthicalTheories?52

2.4Consequence-BasedEthicalTheories53

2.4.1ActUtilitarianism55

Scenario2–3:AControversialPolicyinNewmerica55

2.4.2RuleUtilitarianism55

2.5Duty-BasedEthicalTheories56

2.5.1RuleDeontology57

Scenario2–4:MakinganExceptionforOneself58

2.5.2ActDeontology59

Scenario2–5:ADilemmaInvolvingConflictingDuties60

2.6Contract-BasedEthicalTheories61

2.6.1SomeCriticismsofContract-BasedTheories62

2.6.2Rights-BasedContractTheories63

2.7Character-BasedEthicalTheories64

2.7.1BeingaMoralPersonvs.FollowingMoralRules64

2.7.2Acquiringthe “Correct” Habits65

2.8IntegratingAspectsofClassicalEthicalTheoriesintoaSingle ComprehensiveTheory66

2.8.1Moor’sJust-ConsequentialistTheoryandItsApplicationto Cybertechnology67

2.8.2KeyElementsinMoor’sJust-ConsequentialistFramework69

2.9ChapterSummary70 ReviewQuestions70

DiscussionQuestions71 Essay/PresentationQuestions71 ScenariosforAnalysis72 Endnotes72

References73 FurtherReadings73

c CHAPTER3

CRITICALREASONINGSKILLSFOREVALUATINGDISPUTESINCYBERETHICS74

3.1GettingStarted74

Scenario3–1:ReasoningAboutWhethertoDownloadaFilefrom “Sharester” 75

3.1.1DefiningTwoKeyTermsinCriticalReasoning:ClaimsandArguments75

3.1.2TheRoleofArgumentsinDefendingClaims76

3.1.3TheBasicStructureofanArgument76

3.2ConstructinganArgument78

3.3ValidArguments80

3.4SoundArguments83

3.5InvalidArguments85

3.6InductiveArguments86

3.7FallaciousArguments87

3.8ASeven-StepStrategyforEvaluatingArguments89

3.9IdentifyingSomeCommonFallacies91

3.9.1 AdHominem Argument92

3.9.2SlipperySlopeArgument92

3.9.3FallacyofAppealtoAuthority93

3.9.4FalseCauseFallacy93

3.9.5BeggingtheQuestion94

3.9.6FallacyofComposition/FallacyofDivision94

3.9.7FallacyofAmbiguity/Equivocation95

3.9.8AppealtothePeople(ArgumentumadPopulum)95

3.9.9TheMany/AnyFallacy96

3.9.10TheVirtualityFallacy97

3.10ChapterSummary98

ReviewQuestions98

DiscussionQuestions98

Essay/PresentationQuestions99 ScenariosforAnalysis99

Endnotes99 References100

FurtherReadings100

c CHAPTER4 PROFESSIONALETHICS,CODESOFCONDUCT,ANDMORALRESPONSIBILITY101

4.1ProfessionalEthics102

4.1.1WhatIsaProfession?103

4.1.2WhoIsaProfessional?103

4.1.3WhoIsaComputer/ITProfessional?104

4.2DoComputer/ITProfessionalsHaveAnySpecialMoralResponsibilities?105

4.2.1Safety-CriticalSoftware105

4.3ProfessionalCodesofEthicsandCodesofConduct106

4.3.1ThePurposeofProfessionalCodes107

4.3.2SomeCriticismsofProfessionalCodes108

4.3.3DefendingProfessionalCodes109

4.3.4TheIEEE-CS/ACMSoftwareEngineeringCodeofEthicsandProfessional Practice110

4.4ConflictsofProfessionalResponsibility:EmployeeLoyaltyandWhistle-Blowing112

4.4.1DoEmployeesHaveanObligationofLoyaltytoEmployers?112

4.4.2Whistle-BlowingIssues114

Scenario4–1:Whistle-Blowingandthe “StarWars” Controversy115

4.4.3AnAlternativeStrategyforUnderstandingProfessionalResponsibility117

4.5MoralResponsibility,LegalLiability,andAccountability117

4.5.1DistinguishingResponsibilityfromLiabilityandAccountability118

4.5.2AccountabilityandtheProblemof “ManyHands” 119

Scenario4–2:TheTherac-25Machine120

4.5.3LegalLiabilityandMoralAccountability120

4.6RiskAssessmentintheSoftwareDevelopmentProcess121

Scenario4–3:TheAegisRadarSystem121

4.7DoSomeComputerCorporationsHaveSpecialMoralObligations?122

4.7.1SpecialResponsibilitiesforSearchEngineCompanies123

4.7.2SpecialResponsibilitiesforCompaniesthatDevelopAutonomousSystems124

4.8ChapterSummary125

ReviewQuestions126

DiscussionQuestions126

Essay/PresentationQuestions126

ScenariosforAnalysis127

Endnotes128 References128 FurtherReadings130

c CHAPTER5 PRIVACYANDCYBERSPACE131

5.1ArePrivacyConcernsAssociatedwithCybertechnologyUniqueorSpecial?132

5.2WhatisPersonalPrivacy?134

5.2.1AccessibilityPrivacy:FreedomfromUnwarrantedIntrusion135

5.2.2DecisionalPrivacy:FreedomfromInterferenceinOne’s PersonalAffairs135

5.2.3InformationalPrivacy:ControlovertheFlowofPersonal Information136

5.2.4AComprehensiveAccountofPrivacy136

Scenario5–1:DescriptivePrivacy137

Scenario5–2:NormativePrivacy137

5.2.5Privacyas “ContextualIntegrity” 137

Scenario5–3:PreservingContextualIntegrityinaUniversitySeminar138

5.3WhyisPrivacyImportant?139

5.3.1IsPrivacyanIntrinsicValue?140

5.3.2PrivacyasaSocialValue141

5.4GatheringPersonalData:Monitoring,Recording,andTrackingTechniques141

5.4.1 “Dataveillance” Techniques141

5.4.2InternetCookies142

5.4.3RFIDTechnology143

5.4.4CybertechnologyandGovernmentSurveillance145

5.5ExchangingPersonalData:MergingandMatchingElectronicRecords146

5.5.1MergingComputerizedRecords146

Scenario5–4:MergingPersonalInformationinUnrelatedComputerDatabases147

5.5.2MatchingComputerizedRecords148

Scenario5–5:UsingBiometricTechnologyatSuperBowlXXXV149

5.6MiningPersonalData150

5.6.1HowDoesDataMiningThreatenPersonalPrivacy?150

Scenario5–6:DataMiningattheXYZBank151

5.6.2WebMining154

Scenario5–7:TheFacebookBeaconControversy154

5.7ProtectingPersonalPrivacyinPublicSpace156

Scenario5–8:ShoppingatSuperMart157

Scenario5–9:ShoppingatNile.com157

5.7.1SearchEnginesandtheDisclosureofPersonalInformation158

Scenario5–10:TrackingYourSearchRequestsonGoogle159

5.7.2AccessingOnlinePublicRecords160

Scenario5–11:AccessingOnlinePublicRecordsinPleasantville161

Scenario5–12:AccessingaState’sMotorVehicleRecordsOnline162

5.8Privacy-EnhancingTechnologies162

5.8.1EducatingUsersaboutPETs163

5.8.2PETsandthePrincipleofInformedConsent163

5.9PrivacyLegislationandIndustrySelf-Regulation164

5.9.1IndustrySelf-RegulationInitiativesRegardingPrivacy164

Scenario5–13:ControversiesInvolvingGoogle’sPrivacyPolicy166

5.9.2PrivacyLawsandDataProtectionPrinciples166

5.10ChapterSummary168

ReviewQuestions169 DiscussionQuestions169

Essay/PresentationQuestions170 ScenariosforAnalysis170 Endnotes171 References171 FurtherReadings173

c CHAPTER6 SECURITYINCYBERSPACE174

6.1SecurityintheContextofCybertechnology174

6.1.1CybersecurityasRelatedtoCybercrime175

6.1.2SecurityandPrivacy:SomeSimilaritiesandSomeDifferences175

6.2ThreeCategoriesofCybersecurity176

6.2.1DataSecurity:Confidentiality,Integrity,andAvailability ofInformation177

6.2.2SystemSecurity:Viruses,Worms,andMalware178

Scenario6–1:TheConfickerWorm178

6.2.3NetworkSecurity:ProtectingourInfrastructure179

Scenario6–2:TheGhostNetControversy179

6.3 “CloudComputing” andSecurity180

6.3.1DeploymentandService/DeliveryModelsfortheCloud181

6.3.2SecuringUserDataResidingintheCloud182

6.4Hackingand “TheHackerEthic” 183

6.4.1WhatIs “TheHackerEthic”?184

6.4.2AreComputerBreak-insEverEthicallyJustifiable?186

6.5Cyberterrorism187

6.5.1Cyberterrorismvs.Hacktivism188

Scenario6–3: Anonymous andthe “OperationPayback” Attack189

6.5.2CybertechnologyandTerroristOrganizations190

6.6InformationWarfare(IW)191

6.6.1InformationWarfarevs.ConventionalWarfare191

Scenario6–4:TheStuxnetWormandthe “OlympicGames” Operation192

6.6.2PotentialConsequencesforNationsthatEngageinIW192

6.7CybersecurityandRiskAnalysis194

6.7.1TheRiskAnalysisMethodology194

6.7.2TheProblemof “De-Perimeterization” ofInformationSecurityfor AnalyzingRisk195

6.8ChapterSummary196

ReviewQuestions196

DiscussionQuestions197

Essay/PresentationQuestions197

ScenariosforAnalysis197

Endnotes198

References198

FurtherReadings200

c CHAPTER7 CYBERCRIMEANDCYBER-RELATEDCRIMES201

7.1CybercrimesandCybercriminals201

7.1.1BackgroundEvents:ABriefSketch202

7.1.2ATypicalCybercriminal203

7.2Hacking,Cracking,andCounterhacking203

7.2.1Hackingvs.Cracking204

7.2.2ActiveDefenseHacking:CanActsof “HackingBack” orCounter HackingEverBeMorallyJustified?204

7.3DefiningCybercrime205

7.3.1DeterminingtheCriteria206

7.3.2APreliminaryDefinitionofCybercrime207 Scenario7–1:UsingaComputertoFileaFraudulentTaxReturn207

7.3.3FramingaCoherentandComprehensiveDefinitionofCybercrime208

7.4ThreeCategoriesofCybercrime:Piracy,Trespass,andVandalisminCyberspace208

7.5Cyber-RelatedCrimes209

7.5.1SomeExamplesofCyber-Exacerbatedvs.Cyber-AssistedCrimes209

7.5.2IdentityTheft211

7.6TechnologiesandToolsforCombatingCybercrime213

Scenario7–2:InterceptingMailthatEntersandLeavesYourNeighborhood213

7.6.1BiometricTechnologies214

7.6.2Keystroke-MonitoringSoftwareandPacket-SniffingPrograms215

7.7ProgramsandTechniquesDesignedtoCombatCybercrimeintheUnitedStates216

7.7.1Entrapmentand “Sting” OperationstoCatchInternetPedophiles216

Scenario7–3:EntrapmentontheInternet216

7.7.2EnhancedGovernmentSurveillanceTechniquesandthePatriotAct217

7.8NationalandInternationalLawstoCombatCybercrime218

7.8.1TheProblemofJurisdictioninCyberspace218

Scenario7–4:AVirtualCasino218

Scenario7–5:ProsecutingaComputerCorporationinMultipleCountries219

7.8.2SomeInternationalLawsandConventionsAffectingCybercrime220

Scenario7–6:ThePirateBayWebSite221

7.9CybercrimeandtheFreePress:TheWikiLeaksControversy221

7.9.1AreWikiLeaks’ PracticesEthical?222

7.9.2AreWikiLeaks’ PracticesCriminal?222

7.9.3WikiLeaksandtheFreePress223

7.10ChapterSummary225

ReviewQuestions225

DiscussionQuestions226

Essay/PresentationQuestions226

ScenariosforAnalysis226

Endnotes227

References228

FurtherReadings229

c CHAPTER8 INTELLECTUALPROPERTYDISPUTESINCYBERSPACE230

8.1WhatisIntellectualProperty?230

8.1.1IntellectualObjects231

8.1.2WhyProtectIntellectualObjects?232

8.1.3SoftwareasIntellectualProperty232

8.1.4EvaluatinganArgumentforWhyItisWrongtoCopy ProprietarySoftware233

8.2CopyrightLawandDigitalMedia235

8.2.1TheEvolutionofCopyrightLawintheUnitedStates235

8.2.2TheFair-UseandFirst-SaleProvisionsofCopyrightLaw236

Scenario8–1:MakingClassicBooksAvailableOnline237

Scenario8–2:DecryptingSecurityonane-BookReader237

8.2.3SoftwarePiracyasCopyrightInfringement238

8.2.4NapsterandtheOngoingBattlesoverSharingDigitalMusic239

Scenario8–3:TheCaseof MGMv.Grokster 241

8.3Patents,Trademarks,andTradeSecrets242

8.3.1PatentProtections242

8.3.2Trademarks243

8.3.3TradeSecrets243

8.4JurisdictionalIssuesInvolvingIntellectualPropertyLaws244

8.5PhilosophicalFoundationsforIntellectualPropertyRights245

8.5.1TheLaborTheoryofProperty245

Scenario8–4:DEFCorporationvs.XYZInc.246

8.5.2TheUtilitarianTheoryofProperty247

Scenario8–5:Sam’se-BookReaderAdd-onDevice247

8.5.3ThePersonalityTheoryofProperty248

Scenario8–6:Angela’sBþþ ProgrammingTool249

8.6TheFreeSoftwareandtheOpenSourceMovements250

8.6.1GNUandtheFreeSoftwareFoundation250

8.6.2The “OpenSourceSoftware” Movement:OSSvs.FSF251

8.7The “Common-Good” Approach:AnAlternativeFrameworkforAnalyzingthe IntellectualPropertyDebate252

8.7.1InformationWantstobeSharedvs.InformationWantstobeFree254

8.7.2PreservingtheInformationCommons256

8.7.3TheFateoftheInformationCommons:CouldthePublicDomainof IdeasEventuallyDisappear?257

8.7.4TheCreativeCommons259

8.8PIPA,SOPA,andRWALegislation:CurrentBattlegroundsintheIntellectual PropertyWar260

8.8.1ThePIPAandSOPABattles261

8.8.2RWAandPublicAccesstoHealth-RelatedInformation261

Scenario8–7:ElsevierPressand “TheCostofKnowledge” Boycott262

8.8.3IntellectualPropertyBattlesintheNearFuture263

8.9ChapterSummary264

ReviewQuestions264

DiscussionQuestions265

Essay/PresentationQuestions265

ScenariosforAnalysis265 Endnotes266 References267

FurtherReadings268

c CHAPTER9 REGULATINGCOMMERCEANDSPEECHINCYBERSPACE269

9.1BackgroundIssuesandSomePreliminaryDistinctions270

9.1.1TheOntologyofCyberspace:IstheInternetaMediumoraPlace?270

9.1.2TwoCategoriesofCyberspaceRegulation271

9.2FourModesofRegulation:TheLessigModel273

9.3DigitalRightsManagementandthePrivatizationofInformationPolicy274

9.3.1DRMTechnology:ImplicationsforPublicDebateonCopyrightIssues274

Scenario9–1:TheSonyRootkitControversy275

9.3.2PrivatizingInformationPolicy:ImplicationsfortheInternet276

9.4TheUseandMisuseof(HTML)MetatagsandWebHyperlinks278

9.4.1IssuesSurroundingtheUse/AbuseofHTMLMetatags278

Scenario9–2:ADeceptiveUseofHTMLMetatags279

9.4.2HyperlinkingandDeepLinking279

Scenario9–3:DeepLinkingontheTicketmasterWebSite280

9.5E-MailSpam281

9.5.1DefiningSpam281

9.5.2WhyIsSpamMorallyObjectionable?282

9.6FreeSpeechvs.CensorshipandContentControlinCyberspace284

9.6.1ProtectingFreeSpeech284

9.6.2DefiningCensorship285

9.7PornographyinCyberspace286

9.7.1Interpreting “CommunityStandards” inCyberspace286

9.7.2InternetPornographyLawsandProtectingChildrenOnline287

9.7.3VirtualChildPornography288 Scenario9–4:ASextingIncidentInvolvingGreensburgSalemHighSchool290

9.8HateSpeechandSpeechthatcanCausePhysicalHarmtoOthers292

9.8.1HateSpeechontheWeb292

9.8.2Online “Speech” thatCanCausePhysicalHarmtoOthers294

9.9 “NetworkNeutrality” andtheFutureofInternetRegulation294

9.9.1DefiningNetworkNeutrality295

9.9.2SomeArgumentsAdvancedbyNetNeutrality’sProponentsandOpponents296

9.9.3FutureImplicationsfortheNetNeutralityDebate296

9.10ChapterSummary297

ReviewQuestions298

DiscussionQuestions298 Essay/PresentationQuestions299 ScenariosforAnalysis299 Endnotes300

References300 FurtherReadings301

c CHAPTER10

THEDIGITALDIVIDE,DEMOCRACY,ANDWORK303

10.1TheDigitalDivide304

10.1.1TheGlobalDigitalDivide304

10.1.2TheDigitalDividewithinNations305 Scenario10–1:ProvidingIn-HomeInternetServiceforPublicSchoolStudents306

10.1.3IstheDigitalDivideanEthicalIssue?307

10.2CybertechnologyandtheDisabled309

10.2.1DisabledPersonsandRemoteWork310

10.2.2ArgumentsforContinuedWAISupport311

10.3CybertechnologyandRace312

10.3.1InternetUsagePatterns312

10.3.2RacismandtheInternet313

10.4CybertechnologyandGender314

10.4.1AccesstoHigh-TechnologyJobs315

10.4.2GenderBiasinSoftwareDesignandVideoGames317

10.5Cybertechnology,Democracy,andDemocraticIdeals317

10.5.1HasCybertechnologyEnhancedorThreatenedDemocracy?318

10.5.2HowhasCybertechnologyAffectedPoliticalElectionsin DemocraticNations?322

10.6TheTransformationandtheQualityofWork324

10.6.1JobDisplacementandtheTransformedWorkplace324

10.6.2TheQualityofWorkLifeintheDigitalEra328

Scenario10–2:EmployeeMonitoringandtheCaseof Ontariov.Quon329

10.7ChapterSummary331

ReviewQuestions332 DiscussionQuestions332

Essay/PresentationQuestions333

ScenariosforAnalysis333 Endnotes334 References335 FurtherReadings336

c CHAPTER11 ONLINECOMMUNITIES,CYBERIDENTITIES,ANDSOCIALNETWORKS337

11.1OnlineCommunitiesandSocialNetworkingServices337

11.1.1OnlineCommunitiesvs.TraditionalCommunities337

11.1.2BlogsintheContextofOnlineCommunities339

11.1.3AssessingProsandConsofOnlineCommunities339

Scenario11–1:AVirtualRapeinCyberspace342

11.2VirtualEnvironmentsandVirtualReality343

11.2.1WhatisVirtualReality(VR)?344

11.2.2EthicalControversiesInvolvingBehaviorinVRApplicationsandGames345

11.2.3Misrepresentation,Bias,andIndecentRepresentationsinVRApplications349

11.3CyberIdentitiesandCyberSelves:PersonalIdentityandOurSenseofSelf intheCyberEra351

11.3.1Cybertechnologyasa “MediumofSelf-Expression” 352

11.3.2 “MUDSelves” andDistributedPersonalIdentities352

11.3.3TheImpactofCybertechnologyonOurSenseofSelf353

11.4AIanditsImplicationsforWhatitMeanstobeHuman355

11.4.1WhatisAI?ABriefOverview355

11.4.2TheTuringTestandJohnSearle’ s “ChineseRoom” Argument357

11.4.3CyborgsandHuman-MachineRelationships358 Scenario11–2:ArtificialChildren361

11.4.4Do(AtLeastSome)AIEntitiesWarrantMoralConsideration?361 11.5ChapterSummary363

ReviewQuestions363 DiscussionQuestions364

Essay/PresentationQuestions364 ScenariosforAnalysis365

Endnotes365 References366

FurtherReadings367

c CHAPTER12

ETHICALASPECTSOFEMERGINGANDCONVERGINGTECHNOLOGIES368

12.1ConvergingTechnologiesandTechnologicalConvergence368

12.2AmbientIntelligence(AmI)andUbiquitousComputing369

12.2.1PervasiveComputing371

12.2.2UbiquitousCommunication371

12.2.3IntelligentUserInterfaces371

12.2.4EthicalandSocialIssuesinAmI372 Scenario12–1:E.M.Forster’sPrecautionaryTale373 Scenario12–2:JeremyBentham’sPanopticon375

12.3BioinformaticsandComputationalGenomics376

12.3.1ComputingandGenetic “Machinery”:SomeConceptualConnections376

12.3.2EthicalIssuesandControversies376 Scenario12–3:deCODEGeneticsInc.377

12.3.3ELSIGuidelinesandGenetic-Speci ficLegislation380 12.4NanotechnologyandNanocomputing381

12.4.1Nanotechnology:ABriefOverview382

12.4.2Optimistic vs. PessimisticViewsofNanotechnology383

12.4.3EthicalIssuesinNanotechnologyandNanocomputing386

12.5AutonomousMachinesandMachineEthics389

12.5.1WhatisanAutonomousMachine(AM)?390

12.5.2SomeEthicalandPhilosophicalQuestionsInvolvingAMs393

12.5.3MachineEthicsandMoralMachines398

12.6A “Dynamic” EthicalFrameworkforGuidingResearchinNewandEmerging Technologies402

12.6.1IsanELSI-LikeModelAdequateforNew/EmergingTechnologies?402

12.6.2A “DynamicEthics” Model403

12.7ChapterSummary404

ReviewQuestions404

DiscussionQuestions405 Essay/PresentationQuestions405 ScenariosforAnalysis405 Endnotes406 References407 FurtherReadings409 GLOSSARY411

c PREFACE

Asthedigitallandscapecontinuestoevolveatarapidpace,newvariationsofmoral, legal,andsocialconcernsarisealongwithit.Notsurprisingly,then,anadditionalcluster ofcyberethicsissueshasemergedsincethepublicationofthepreviouseditionof EthicsandTechnology inlate2009.Consider,forexample,thewaysinwhichCloudbasedstoragethreatenstheprivacyandsecurityofourpersonaldata.Alsoconsiderthe increasingamountofpersonaldatathatsocialnetworkingsitessuchasFacebookand majorsearchenginecompaniessuchasGooglenowcollect.Shouldweworryabouthow thatinformationcanbesubsequentlyused?Shouldwealsoworryaboutthe fi ltering techniquesthatleadingsearchenginesnowusetotailoror “personalize” theresultsof oursearchqueriesbasedonprofilesderivedfrominformationaboutourprevioussearch requests?Someanalystsnotethatthecurrentinformation-gathering/pro filingpractices andtechniquesusedinthecommercialsectorcanalsobeadoptedbygovernments,and theypointoutthatthesepracticescouldnotonlysupportthesurveillanceinitiativesof totalitariangovernmentsbutcouldalsothreatentheprivacyofcitizensindemocratic countriesaswell.

Alsoconsidertheimpactthatrecentcyberwarfareactivities,includingtheclandestinecyberattacksallegedlylaunche dbysomenationsates,couldhaveforour nationalinfrastructure.Additionally,consid erthenational-security-relatedconcerns raisedbytheWikiLeakscontroversy,which hasalsoexacerbatedanongoingtension betweenfreespeechontheInternetvs.standardsfor “ responsiblereporting ” onthe partofinvestigativejournalists.Andtherecentdebateabout “ networkneutrality ” causesustorevisitquestionsabouttheextenttowhichtheserviceprovidersresponsiblefordeliveringonlinecontentshouldalsobeabletocontrolthecontentthatthey deliver.

Otherkindsofconcernsnowarisebecauseofdevelopmentsinarelativelynew subfieldofcyberethicscalled “machineethics” (sometimesreferredtoas “robo-ethics”). Forexample,shouldwedevelopautonomousmachinesthatarecapableofmaking decisionsthathavemoralimplications?Somesemiautonomousrobots,whichserveas companionsandcaregiversfortheelderlyandas “babysitters” foryoungchildren,are alreadyavailable.Recentandcontinueddevelopmentsinroboticsandautonomous machinesmayprovidemanyconveniencesandservices,buttheycanalsocauseusto questionourconventionalnotionsofautonomy,moralagency,andtrust.Forexample, can/shouldthesemachinesbefullyautonomous?Cantheyqualifyas(arti ficial)moral agents?Also,willhumansbeabletotrustmachinesthattheywillincreasinglyrelyonto carryoutcriticaltasks?Ifwedonotyetknowtheanswerstothesequestions,andif noclearandexplicitpoliciesareinplacetoguideresearchinthisarea,shouldwe continuetodevelopautonomousmachines?Theseandrelatedquestionsintheemerging

fieldofmachineethicsarebutafewofthemanynewquestionsweexamineinthefourth editionof EthicsandTechnology.

Althoughnewtechnologiesemerge,andexistingtechnologiescontinuetomature andevolve,manyoftheethicalissuesassociatedwiththemarebasicallyvariationsof existingethicalproblems.Atbottom,theseissuesreducetotraditionalethicalconcerns havingtodowithdignity,respect,fairness,obligationstoassistothersinneed,andso forth.So,weshouldnotinferthatthemorallandscapeitselfhasbeenalteredbecauseof behaviorsmadepossiblebythesetechnologies.Wewillseethat,forthemostpart,the newissuesexaminedinthiseditionof EthicsandTechnology aresimilarinrelevant respectstothekindsofethicalissuesweexaminedinthebook’spreviouseditions. However,manyemergingtechnologiespresentuswithchallengesthat,initiallyatleast, donotseemto fiteasilyintoourconventionalethicalcategories.So,amajorobjectiveof thistextbookistoshowhowthosecontroversiescanbeanalyzedfromtheperspectiveof standardethicalconceptsandtheories.

Thepurposeof EthicsandTechnology,asstatedintheprefacestothethreeprevious editionsofthisbook,istointroducestudentstoissuesandcontroversiesthatcomprise therelativelynew fieldofcyberethics.Theterm “cyberethics” isusedinthistextbookto refertothe fieldofstudythatexaminesmoral,legal,andsocialissuesinvolving cybertechnology. Cybertechnology,inturn,referstoabroadspectrumofcomputing/ informationandcommunicationtechnologiesthatrangefromstand-alonecomputersto thecurrentclusterofnetworkeddevicesandtechnologies.Manyofthesetechnologies includedevicesandapplicationsthatareconnectedtoprivatelyownedcomputer networksaswellastotheInternetitself.

Thistextbookexaminesawiderangeofcyberethicsissues fromspecificissuesof moralresponsibilitythatdirectlyaffectcomputerandinformationtechnology(IT) professionalstobroadersocialandethicalconcernsthataffecteachofusinourdayto-daylives.Questionsabouttherolesandresponsibilitiesofcomputer/ITprofessionals indevelopingsafeandreliablecomputersystemsareexaminedunderthecategoryof professionalethics.Broadersocialandethicalconcernsassociatedwithcybertechnology areexaminedundertopicssuchasprivacy,security,crime,intellectualproperty,Internet regulation,andsoforth.

c NEWTOTHE FOURTHEDITION

Newpedagogicalmaterial includes anewlydesignedsetofend-of-chapterexercisescalled “ScenariosforAnalysis,” whichcanbeusedforeitherin-classanalysisorgroupprojects; newand/orupdated(in-chapter) scenarios,illustratingbothactualcasesand hypotheticalsituations,whichenablestudentstoapplymethodologicalconcepts/ frameworksandethicaltheoriescoveredinChapters1and2; new samplearguments insomechapters,whichenablestudentstoapplythetools forargumentanalysiscoveredinChapter3; updated “reviewquestions,”“discussionquestions,” and “essay/presentation questions” attheendofchapters;

anupdatedandrevisedglossaryofkeytermsusedinthebook; anupdated EthicsandTechnology CompanionSitewithnewresourcesand materialsforstudentsandinstructors.

Newissues examinedandanalyzedinclude ethicalandsocialaspectsofCloudcomputing,includingconcernsaboutthe privacyandsecurityofusers’ datathatisincreasinglybeingstoredin “theCloud”; concernsaboutthe “personalization filters” thatsearchenginecompaniesuseto tailoroursearchresultstoconformtotheirperceptionsofwhatwewant. questionsaboutGoogle’s(2012)privacypolicyvis-a-vistheamountofuserdata thatcanbecollectedviathesearchenginecompany’ssuiteofapplications; concernsaboutcyberwarfareactivitiesinvolvingnationstatesandtheiralleged launchingoftheStuxnetwormandFlamevirus; controversiessurroundingWikiLeaksandthetensionitcreatesbetweenfree speechandresponsiblejournalism,aswellasforconcernsinvolvingnational security; concernsaffecting “networkneutrality” andwhetherregulationmayberequired toensurethatInternetserviceprovidersdonotgaintoomuchcontroloverthe contenttheydeliver; controversiesin “machineethics,” includingthedevelopmentofautonomous machinescapableofmakingdecisionsthathavemoralimpacts; questionsaboutwhetherwecantrustartificialagentstoactinwaysthatwill alwaysbeinthebestinterestsofhumans.

Inrevisingthebook,Ihavealsoeliminatedsomeolder,nowout-of-date,material. Additionally,Ihavestreamlinedsomeofthematerialthatoriginallyappearedin previouseditionsofthebookbutstillneedstobecarriedoverintothepresentedition.

c AUDIENCEANDSCOPE

Becausecyberethicsisaninterdisciplinary field,thistextbookaimsatreachingseveral audiencesandthuseasilyrunstheriskoffailingtomeettheneedsofanyoneaudience.I havenonethelessattemptedtocomposeatextbookthataddressestheneedsofcomputer science,philosophy,social/behavioralscience,andlibrary/informationsciencestudents. Computersciencestudentsneedaclearunderstandingoftheethicalchallengestheywill faceascomputerprofessionalswhentheyentertheworkforce.Philosophystudents,on thecontrary,shouldunderstandhowmoralissuesaffectingcybertechnologycanbe situatedinthe fieldofappliedethicsingeneralandthenanalyzedfromtheperspectiveof ethicaltheory.Socialscienceandbehavioralsciencestudentswilllikelywanttoassessthe sociologicalimpactofcybertechnologyonoursocialandpoliticalinstitutions(government,commerce,andeducation)andsociodemographicgroups(affectinggender,race, ethnicity,andsocialclass).Andlibraryscienceandinformationsciencestudentsshould beawareofthecomplexitiesandnuancesofcurrentintellectualpropertylawsthat threatenunfetteredaccesstoelectronicinformation,andshouldbeinformedabout recentregulatoryschemesthatthreatentocensorcertainformsofelectronicspeech.

Studentsfromotheracademicdisciplinesshouldalso findmanyissuescoveredinthis textbookpertinenttotheirpersonalandprofessionallives;someundergraduatesmay electtotakeacourseinsocialandethicalaspectsoftechnologytosatisfyoneoftheir generaleducationrequirements.Although EthicsandTechnology isintendedmainlyfor undergraduatestudents,itcouldbeused,inconjunctionwithothertexts,ingraduate coursesaswell.

Weexamineethicalcontroversiesusing scenarios thatincludebothactualcasesand hypotheticalexamples,whereverappropriate.InsomeinstancesIhavedeliberately constructedprovocativescenariosandselectedcontroversialcasestoconveythe severityoftheethicalissuesweconsider.Somereadersmaybeuncomfortablewith, andpossiblyevenoffendedby,thesescenariosandcases forexample,thoseillustrating unethicalpracticesthatnegativelyaffectchildrenandminorities.Althoughitmighthave beenpoliticallyexpedienttoskipoverissuesandscenariosthatcouldunintentionally offendcertainindividuals,Ibelievethatnotextbookinappliedethicswoulddojusticeto itstopicifitfailedtoexposeandexamineissuesthatadverselyaffectvulnerablegroupsin society.

Alsoincludedinmostchaptersaresamplearguments thatareintendedtoillustrate someoftherationalesthathavebeenputforthbyvariousinterestgroupstodefend policiesandlawsaffectingprivacy,security,property,andsoforth,incyberspace. InstructorsandstudentscanevaluatetheseargumentsviatherulesandcriteriaestablishedinChapter3toseehowwell,orhowpoorly,thepremisesinthesearguments succeedinestablishingtheirconclusions.

Exercisequestionsareincludedattheendofeachchapter.First,basic “review questions” quizthereader’scomprehensionofkeyconcepts,themes,issues,and scenarioscoveredinthatchapter.Thesearefollowedbyhigherlevel “discussion questions” designedtoencouragestudentstoreflectmoredeeplyonsomeofthecontroversialissuesexaminedinthechapter.Inadditionto “essay/presentationquestions” that arealsoincludedineachchapter,anewsetof “ScenariosforAnalysis” havebeenadded inresponsetoinstructorswhorequestedtheadditionofsome unanalyzed scenarios forclassroomuse.Buildingonthehigherlevelnatureofthediscussionquestions andessay/presentationquestions,thesescenariosareintendedtoprovidestudents andinstructorswithadditionalresourcesforanalyzingimportantcontroversiesintroducedinthevariouschapters.Assuch,thesescenarioscanfunctionasin-classresources forgroupprojects.

Someessay/presentationquestionsandend-of-chapterscenariosaskstudentsto compareandcontrastargumentsandtopicsthatspanmultiplechapters;forexample, studentsareaskedtorelateargumentsusedtodefendintellectualpropertyrights, consideredinChapter8,toargumentsforprotectingprivacyrights,examinedin Chapter5.Otherquestionsandscenariosaskstudentstoapplyfoundationalconcepts andframeworks,suchasethicaltheoryandcriticalthinkingtechniquesintroducedin Chapters2and3,totheanalysisofspecifi ccyberethicsissuesexaminedinsubsequent chapters.Insomecases,theseend-of-chapterquestionsandscenariosmaygenerate livelydebateintheclassroom;inothercases,theycanserveasapointofdeparturefor variousclassassignmentsandgroupprojects.Althoughno final “solutions” totheissues anddilemmasraisedinthesequestionsandscenariosareprovidedinthetext, some “strategies” foranalyzingthemareincludedinthesectionofthebook’sWeb site (www.wiley.com/college/tavani) entitled “Strategies for Discussi on Questions.”

ORGANIZATIONANDSTRUCTUREOFTHEBOOK

EthicsandTechnology isorganizedinto12chapters.Chapter1, “Introductionto Cyberethics:Concepts,Perspectives,andMethodologicalFrameworks,” defineskey conceptsandtermsthatwillappearthroughoutthebook.Forexample,de finitionsof termssuchas cyberethics and cybertechnology areintroducedinthischapter.Wethen examinewhetheranyethicalissuesinvolvingcybertechnologyareuniqueethicalissues. Wealsoconsiderhowwecanapproachcyberethicsissuesfromthreedifferentperspectives:professionalethics,philosophicalethics,andsociological/descriptiveethics,eachof whichrepresentstheapproachgenerallytakenbyacomputerscientist,aphilosopher, andasocial/behavioralscientist.Chapter1concludeswithaproposalforacomprehensiveandinterdisciplinarymethodologicalschemeforanalyzingcyberethicsissuesfrom theseperspectives.

InChapter2, “EthicalConceptsandEthicalTheories:EstablishingandJustifyinga MoralSystem,” weexaminesomeofthebasicconceptsthatmakeupamoralsystem.We drawadistinctionbetween “ethics” and “morality” byde finingethicsas “thestudy ofmorality.”“Morality,” oramoralsystem,isdefinedasaninformal,publicsystem comprisingrulesofconductandprinciplesforevaluatingthoserules.Wethenexamine consequence-based,duty-based,character-based,andcontract-basedethicaltheories. Chapter2concludeswithamodelthatintegrateselementsofcompetingethicaltheories intoonecomprehensiveandunifiedtheory.

Chapter3, “CriticalReasoningSkillsforEvaluatingDisputesinCyberethics,” includesabriefoverviewofbasicconceptsandstrategiesthatareessentialfordebating moralissuesinastructuredandrationalmanner.Webeginbydescribingthestructureof alogicalargumentandshowhowargumentscanbeconstructedandanalyzed.Next, weexamineatechniquefordistinguishingbetweenargumentsthatarevalidandinvalid, soundandunsound,andinductiveandfallacious.Weillustrateexamplesofeachtype withtopicsaffectingcybertechnologyandcyberethics.Finally,weidentifysomestrategiesforspottingandlabeling “informal” logicalfallaciesthatfrequentlyoccurin everydaydiscourse.

Chapter4, “ProfessionalEthics,CodesofConduct,andMoralResponsibility, ” examinesissuesrelatedtoprofessionalresponsibilityforcomputer/ITprofessionals. Weconsiderwhetherthereareanyspecialmoralresponsibilitiesthatcomputer/IT professionalshave as professionals.Wethenexaminesomeprofessionalcodesof conductedthathavebeenadoptedbycomputerorganizations.Wealsoask:Towhat extentaresoftwareengineersresponsibleforthereliabilityofthecomputersystemsthey designanddevelop,especiallyapplicationsthatinclude “life-critical” and “safetycritical” software?Arecomputer/ITprofessionalseverpermitted,orperhapseven required,to “blowthewhistle” whentheyhavereasonableevidencetosuggestthata computersystemisunreliable?Finally,weexaminesomeschemesforanalyzingrisks associatedwiththedevelopmentofsafety-criticalsoftware.

WediscussprivacyissuesinvolvingcybertechnologyinChapter5.First,weexamine theconceptofprivacyaswellassomeargumentsforwhyprivacyisconsideredan importanthumanvalue.Wethenlookathowpersonalprivacyisthreatenedbythekinds ofsurveillancetechniquesanddata-collectionschemesmadepossiblebycybertechnology.Specificdata-gatheringanddata-exchangingtechniquesareexaminedindetail. WenextconsidersomechallengesthatdataminingandWebminingposeforprotecting

personalprivacyinpublicspace.InChapter5,wealsoconsiderwhethertechnologyitself, intheformofprivacy-enhancingtechnologies(orPETs),canprovideanadequate solutiontosomeprivacyissuesgeneratedbycybertechnology.

Chapter6, “SecurityinCyberspace,” examinessecuritythreatsinthecontextof computersandcybertechnology.Initially,wedifferentiatethreedistinctsensesof “security”:datasecurity,systemsecurity,andnetworksecurity.Wethenexaminethe conceptsof “hacker” and “hackerethic,” andweaskwhethercomputerbreak-inscan everbemorallyjustified.Next,wedifferentiateactsof “hacktivism,” cyberterrorism,and informationwarfare.Chapter6concludeswithabriefexaminationofriskanalysisinthe contextofcybersecurity.

Webeginouranalysisofcybercrime,inChapter7,byconsideringwhetherwe canconstructaprofileofa “typical” cybercriminal.Wethenproposeadefinition ofcybercrimethatenablesustodistinguishbetween “cyberspecific” and “cyber-related” crimestoseewhethersuchadistinctionwouldaidintheformulationofmorecoherent cybercrimelaws.Wealsoconsiderthenotionoflegaljurisdictionincyberspace, especiallywithrespecttotheprosecutionofcybercrimesthatinvolveinterstateand internationalvenues.Inaddition,weexaminetechnologicaleffortstocombatcybercrime,suchascontroversialusesofbiometrictechnologies.

Chapters8and9examinelegalissuesinvolvingintellectualpropertyandfreespeech, respectively,astheyrelatetocyberspace.OneobjectiveofChapter8, “Intellectual PropertyDisputesinCyberspace,” istoshowwhyanunderstandingoftheconceptof intellectualpropertyisimportantinaneraofdigitalinformation.Weconsiderthree theoriesofpropertyrightsandmakeimportantdistinctionsamonglegalconceptssuchas copyrightlaw,patentprotection,andtrademarks.Additionally,weconsiderspecific scenariosinvolvingintellectualpropertydisputes,includingtheoriginalNapstercontroversyaswellassomerecentpeer-to-peer(P2P)networksthathavebeenusedfor file sharing.WealsoexaminetheFreeSoftwareandtheOpenSourceSoftwareinitiatives. Finally,weconsideracompromisesolutionthatsupportsandencouragesthesharingof digitalinformationinanerawhenstrongcopyrightlegislationseemstodiscourage thatpractice.

Chapter9, “RegulatingCommerceandSpeechinCyberspace,” looksatadditional legalissues,especiallyastheyinvolveregulatoryconcernsincyberspace.Wedraw distinctionsbetweentwodifferentsensesof “regulation” asitappliestocyberspace,and wealsoconsiderwhethertheInternetshouldbeunderstoodasamediumorasa “place.” Wealsoexaminecontroversiessurroundinge-mailspam,whichsomebelievecanbe viewedasaformof “speech” incyberspace.Wethenaskwhetherallformsofonlinespeech shouldbegrantedlegalprotection;forexample,shouldchildpornography,hatespeech, andspeechthatcancausephysicalharmtoothersbetoleratedinonlineforums?

Chapter10examinesawiderangeofequity-and-accessissuesfromtheperspective ofcybertechnology’simpactforsociodemographicgroups(affectingclass,race,and gender).Thechapterbeginswithananalysisofglobalaspectsofthe “digitaldivide.” We thenexaminespeci ficequity-and-accessissuesaffectingdisabledpersons,racialminorities,andwomen.Next,weexploretherelationshipbetweencybertechnologyand democracy,andweconsiderwhethertheInternetfacilitatesdemocracyorthreatens it.Wethenexaminesomesocialandethicalissuesaffectingemploymentinthe contemporaryworkplace,andweaskwhethertheuseofcybertechnologyhastransformed workandhasaffectedtheoverallqualityofworklife.

InChapter11,weexamineissuespertainingtoonlinecommunities,virtual-reality (VR)environments,andarti ficialintelligence(AI)developmentsintermsoftwobroad themes: community and personalidentity incyberspace.Webeginbyanalyzingthe impactthatcybertechnologyhasforourtraditionalunderstandingoftheconceptof community.Inparticular,weaskwhetheronlinecommunities,suchasFacebookand Twitter,raiseanyspecialethicalorsocialissues.Next,weexaminesomeimplicationsthat behaviorsmadepossiblebyvirtualenvironmentsandvirtual-realityapplicationshavefor ourconventionalunderstandingofpersonalidentity.The finalsectionofChapter11 examinestheimpactthatdevelopmentsinAIhaveforoursenseofselfandforwhatit meanstobehuman.

Chapter12,the fi nalchapterof EthicsandTechnology,examinessomeethical challengesthatariseinconnectionwithemergingandconvergingtechnologies.Wenote thatcybertechnologyis converging withnoncybertechnologies,includingbiotechnology andnanotechnology,generatingnew fieldssuchasbioinformaticsandnanocomputing that,inturn,introduceethicalconcerns.Chapter12alsoincludesabriefexaminationof someissuesintheemerging(sub)fieldofmachineethics.Amongthequestionsconsideredarewhetherweshoulddevelopautonomousmachinesthatarecapableofmaking moraldecisionsandwhetherwecouldtrustthosemachinestoalwaysactinourbest interests.

AGlossarythatdefi nestermscommonlyusedinthecontextofcomputerethicsand cyberethicsisalsoincluded.However,theglossaryisbynomeansintendedasan exhaustivelistofsuchterms.Additionalmaterialforthistextisavailableonthebook’s Web site: www.wiley.com/college.tavani.

c THEWEBSITEFOR ETHICSANDTECHNOLOGY

Sevenappendicesfor EthicsandTechnology areavailableonlyinonlineformat. AppendicesAthroughEincludethefulltextof fiveprofessionalcodesofethics:the ACMCodeofEthicsandProfessionalConduct,theAustralianComputerSocietyCode ofEthics,theBritishComputerSocietyCodeofConduct,theIEEECodeofEthics,and theIEEE-CS/ACMSoftwareEngineeringCodeofEthicsandProfessionalPractice, respectively.Specificsectionsofthesecodesareincludedinhardcopyformataswell,in relevantsectionsofChapter4.Twoappendices,FandG,arealsoavailableonline. AppendixFcontainsthesectionofthe IEEE-CS/ACMComputingCurricula2001Final Report thatdescribesthesocial,professional,andethicalunitsofinstructionmandatedin theircomputersciencecurriculum.AppendixGprovidessomeadditionalcritical reasoningtechniquesthatexpandonthestrategiesintroducedinChapter3.

TheWebsitefor EthicsandTechnology alsocontainsadditionalresourcesfor instructorsandstudents.PresentationslidesinPowerPointformatforChapters1–12,as wellasgraphics(fortablesand figuresineachchapter),areavailableinthe “Instructor” and “Student” sectionsofthesite.Asnotedearlier,asectionon “Strategies,” which includessometechniquesforansweringthediscussionquestionsandunanalyzedscenariosincludedattheendofeachofthebook’s12chapters,isalsoincludedonthissite.

Thebook’sWebsiteisintendedasanadditionalresourceforbothinstructorsand students.Italsoenablesmeto “updatethebook,” inbetweeneditions,withnewissues andscenariosincyberethics,astheyarise.Forexample,asectionentitled “Recent Preface b xxiii

Controversies” isincludedonthebook’sWebsite.Iinviteyourfeedbackastohowthis sitecanbecontinuallyimproved.

c ANOTETOSTUDENTS

Ifyouaretakinganethicscourseforthe firsttime,youmightfeeluncomfortablewiththe prospectofembarkingonastudyofmoralissuesandcontroversialtopicsthatmight initiallycauseyoudiscomfortbecauseethicsissometimesperceivedtobepreachy,andits subjectmatterissometimesviewedasessentiallypersonalandprivateinnature.Because thesearecommonconcerns,Iaddressthemearlyinthetextbook.Idrawadistinction betweenanethicist,whostudiesmoralityora “moralsystem,” andamoralistwhomay assumetohavethecorrectanswerstoallofthequestions;notethataprimaryobjectiveof thisbookistoexamineandanalyzeethicalissues,nottopresumethatanyofusalready has the correctanswertoanyofthequestionsIconsider.

Toaccomplishthisobjective,Iintroducethreetypesofconceptualframeworksearly inthetextbook.InChapter1,Iprovideamethodologicalschemethatenablesyouto identifycontroversialproblemsandissuesinvolvingcybertechnology as ethicalissues. TheconceptualschemeincludedinChapter2,basedonethicaltheory,providessome generalprinciplesthatguideyouranalysisofspeci ficcasesaswellasyourdeliberations aboutwhichkindsofsolutionstoproblemsshouldbeproposed.Athird,and fi nal, conceptualframeworkisintroducedinChapter3intheformofcriticalreasoning techniques,whichprovidesrulesandstandardsthatyoucanuseforevaluatingthe strengthsofcompetingargumentsandfordefendingaparticularpositionthatyoureach onacertainissue.

Thistextbookwasdesignedandwrittenforyou,thestudent!Whetherornotit succeedsinhelpingyoutomeettheobjectivesofacourseincyberethicsisveryimportant tome,soIwelcomeyourfeedbackonthistextbook;andIwouldsincerelyappreciate hearingyourideasonhowthistextbookcouldbeimproved.Pleasefeelfreetowriteto mewithyoursuggestions,comments,andsoforth.Myemailaddressishtavani@rivier .edu.Ilookforwardtohearingfromyou!

c NOTETOINSTRUCTORS:AROADMAPFORUSINGTHISBOOK

Thechaptersthatmakeup EthicsandTechnology aresequencedsothatreadersare exposedtofoundationalissuesandconceptualframeworksbeforetheyexaminespecific problemsincyberethics.Insomecases,itmaynotbepossibleforinstructorstocoverall ofthematerialinChapters1–3.Itisstronglyrecommended,however,thatbefore studentsareassignedmaterialinChapter4,theyatleastreadSections1.1,1.4–1.5,2.4–2.8,and3.1.Instructorsusingthistextbookcandeterminewhichchaptersbestaccommodatetheirspecifi ccourseobjectives.Computerscienceinstructors,forexample,will likelywanttoassignChapter4,onprofessionalethicsandresponsibility,earlyinthe term.Socialscienceinstructors,ontheotherhand,willlikelyexamineissuesdiscussedin Chapters10and11earlyintheircourse.Philosophyinstructorsmaywishtostructure theircoursesbeginningwithathoroughexaminationofthematerialonethicalconcepts

andethicaltheoryinChapter2andtechniquesforevaluatinglogicalargumentsin Chapter3.IssuesdiscussedinChapter12maybeofparticularinteresttoCSinstructors teachingadvancedundergraduatestudents.

Manytextbooksinappliedethicsincludearequisitechapteronethicalconcepts/ theoryatthebeginningofthebook.Unfortunately,theyoftentreattheminacursory manner;furthermore,theseethicalconceptsandtheoriesareseldomdevelopedand reinforcedintheremainingchapters.Thus,readersoftenexperiencea “disconnect” betweenthematerialincludedinthebook’sopeningchapterandthecontentofthe specificcasesandissuesdiscussedinsubsequentchapters.Byincorporatingelementsof ethicaltheoryintomydiscussionandanalysisofthespecifi ccyberethicsissuesIexamine, Ihavetriedtoavoidthe “disconnect” betweentheoryandpracticethatiscommonplace inmanyappliedethicstextbooks.

c ANOTETOCOMPUTERSCIENCEINSTRUCTORS

EthicsandTechnology canbeusedasthemaintextinacoursededicatedtoethicaland socialissuesincomputing,oritcanbeusedasasupplementarytextbookforcomputer sciencecoursesinwhichoneormoreethicsmodulesareincluded.AsIsuggestedinthe precedingsection,instructorsmay finditdifficulttocoverallofthematerialincludedin thisbookinthecourseofasinglesemester.AndasIalsopreviouslysuggested,computer scienceinstructorswilllikelywanttoensurethattheyallocatesuf ficientcoursetimeto theprofessionalethicalissuesdiscussedinChapter4.Alsoofspecialinteresttocomputer scienceinstructorsandtheirstudentswillbethesectionsoncomputersecurityandrisk analysisinChapter6;opensourcecodeandintellectualpropertyissuesinChapter8;and regulatoryissuesaffectingsoftwarecodeinChapter9.Becausecomputerscience instructorsmayneedtolimittheamountofclasstimetheydevotetocoveringfoundationalconceptsincludedintheearlierchapters,Irecommendcoveringatleastthecritical sectionsofChapters1–3describedpreviously.Thisshouldprovidecomputerscience studentswithsomeofthetoolstheywillneedasprofessionalstodeliberateonethical issuesandtojustifythepositionstheyreach.

Indesigningthistextbook,Itookintoaccounttheguidelinesonethicalinstruction includedinthe ComputingCurricula2001FinalReport,issuedinDecember2001bythe IEEE-CS/ACMJointTaskForceonComputingCurricula,whichrecommendsthe inclusionof16corehoursofinstructiononsocial,ethical,andprofessionaltopicsin thecurriculumforundergraduatecomputersciencestudents.[SeetheonlineAppendixF at www.wiley.com/college.tavani for detailed information about the social/professional (SP)unitsintheComputingCurricula2001.]EachtopicprefacedwithanSPdesignation de finesone “knowledgearea” oraCS “bodyofknowledge.” Theyaredistributedamong thefollowing10units:

SP1:Historyofcomputing(e.g.,historyofcomputerhardware,software,and networking)

SP2:Socialcontextofcomputing(e.g.,socialimplicationsofnetworkedcomputing, gender-relatedissues,andinternationalissues)

SP3:Methodsandtoolsofanalysis(e.g.,identifyingassumptionsandvalues,making andevaluatingethicalarguments)

SP4:Professionalandethicalresponsibilities(e.g.,thenatureofprofessionalism,codes ofethics,ethicaldissent,andwhistle-blowing)

SP5:Risksandliabilitiesofcomputer-basedsystems(e.g.,historicalexamplesof softwarerisks)

SP6:Intellectualproperty(e.g.,foundationsofintellectualproperty,copyrights, patents,andsoftwarepiracy)

SP7:Privacyandcivilliberties(e.g.,ethicalandlegalbasisforprivacyprotection, technologicalstrategiesforprivacyprotection)

SP8:Computercrime(e.g.,historyandexamplesofcomputercrime,hacking,viruses, andcrimepreventionstrategies)

SP9:Economicissuesincomputing(e.g.,monopoliesandtheireconomicimplications; effectofskilledlaborsupply)

SP10:Philosophicalframeworks(e.g.,ethicaltheory,utilitarianism,relativism)

All10SPunitsarecoveredinthistextbook.TopicsdescribedinSP1areexaminedin Chapters1and10,andtopicsincludedinSP2arediscussedinChapters1and11.The methodsandanalyticaltoolsmentionedinSP3aredescribedatlengthinChapters2and 3,whereasprofessionalissuesinvolvingcodesofconductandprofessionalresponsibility describedinSP4areincludedinChapters4and12.AlsodiscussedinChapter4,aswellas inChapter6,areissuesinvolvingrisksandliabilities(SP5).Intellectualpropertyissues (SP6)arediscussedindetailinChapter8andincertainsectionsofChapter9,whereas privacyandcivillibertyconcerns(SP7)arediscussedmainlyinChapters5and12. Chapters6and7examinetopicsdescribedinSP8.Economicissues(SP9)areconsidered inChapters9and10.Andphilosophicalframeworksofethics,includingethicaltheory (SP10),arediscussedinChapters1and2.

Table1illustratesthecorrespondingconnectionbetweenSPunitsandthechapters ofthisbook.

TABLE1SP(“Knowledge”)UnitsandCorrespondingBookChapters

SPunit12345678910

Chapter(s)1,101,112,34,124,68,95,126,79,101,2

c

ACKNOWLEDGMENTS

Inrevising EthicsandTechnology forafourthedition,Ihaveonceagaindrawnfrom severalofmypreviouslypublishedworks.Chapters1–4,onfoundationalandprofessionalissuesincyberethics,incorporatematerialfromfourarticles: “TheStateof ComputerEthicsasaPhilosophicalFieldofInquiry,” EthicsandInformationTechnology 3,no.2(2001); “ApplyinganInterdisciplinaryApproachtoTeachingComputerEthics,” IEEETechnologyandSocietyMagazine 21,no.3(2002); “TheUniquenessDebatein ComputerEthics,” EthicsandInformationTechnology 4,no.1(2002);and “Search EnginesandEthics,” StanfordEncyclopediaofPhilosophy (2012).

Chapter5,onprivacyincyberspace,alsodrawsfrommaterialinfourworks: “ComputerMatchingandPersonalPrivacy,” ProceedingsoftheSymposiumonComputersandtheQualityofLife (ACMPress,1996); “InformationalPrivacy,DataMining, andtheInternet,” EthicsandInformationTechnology 1,no.2(1999); “PrivacyEnhancingTechnologiesasaPanaceaforOnlinePrivacyConcerns:SomeEthicalConsiderations,” JournalofInformationEthics 9,no.2(2000);and “Applyingthe ‘Contextual Integrity’ ModelofPrivacytoPersonalBlogsintheBlogosphere” (coauthored withFrancesGrodzinsky), InternationalJournalofInternetResearchEthics 3(2010). Chapters6and7,onsecurityandcrimeincyberspace,drawfrommaterialin threesources: “PrivacyandSecurity” inDuncanLangford’sbook InternetEthics (Macmillan/St.Martins,2000); “DefiningtheBoundariesofComputerCrime:Piracy, Trespass,andVandalisminCyberspace” in ReadingsinCyberEthics 2nded.(Jonesand Bartlett,2004);and “Privacyin ‘theCloud’” (coauthoredwithFrancesGrodzinsky), ComputersandSociety 41,no.1(2011).

InChapters8and9,onintellectualpropertyandInternetregulation,Idrewfrom materialin “InformationWantstobeShared:AnAlternativeApproachforAnalyzing IntellectualPropertyDisputesintheInformationAge,” CatholicLibraryWorld 73,no.2 (2002);andtwopaperscoauthoredwithFrancesGrodzinsky: “P2PNetworksandthe Verizonv.RIAA Case,” Ethics andInformationTechnology 7, no.4(2005)and “Online FileSharing:ResolvingtheTensionsbetweenPrivacyandProperty” Computersand Society 38,no.4(2008).Chapters10and11,onthedigitaldivide,democracy,andonline communities,drawfrommaterialfromtwopapers: “EthicalReflectionsontheDigital Divide,” JournalofInformation,CommunicationandEthicsinSociety 1,no.2(2003)and “OnlineCommunities,DemocraticIdeals,andtheDigitalDivide” (coauthoredwith FrancesGrodzinsky)inSorajHongladaromandCharlesEss’sbook InformationTechnologyEthics:CulturalPerspectives (IGIGlobal,2007).

Chapter12,onemergingandconvergingtechnologies,incorporatesmaterialfrom mybook Ethics,Computing,andGenomics (JonesandBartlett,2006),andfromthree recentlypublishedpapers: “CanWeDevelopArti ficialAgentsCapableofMakingGood

MoralDecisions?” MindsandMachines 21,no.3(2011); “TrustandMulti-Agent Systems” (coauthoredwithJeffBuechner), EthicsandInformationTechnology 13, no.1(2011);and “EthicalAspectsofAutonomousSystems” inMichaelDeckerand MathiasGutmann’sbook Robo-andInformation-Ethics (Berlin:VerlagLIT,2012).

Thefourtheditionof EthicsandTechnology hasbenefi tedfromsuggestionsand commentsIreceivedfrommanyanonymousreviewers,aswellasfromthefollowing colleagues:JeffBuechner,LloydCarr,JerryDolan,FrancesGrodzinsky,Kenneth Himma,JamesMoor,MartinMenke,WaynePauley,MarkRosenbaum,ReginaTavani, andJohnWeckert.IamespeciallygratefultoFranGrodzinsky(SacredHeartUniversity),withwhomIhavecoauthoredseveralpapers,forpermittingmetoincorporate elementsofourjointresearchintorelevantsectionsofthisbook.AndIammostgrateful toLloydCarr(RivierUniversity)forhisinvaluablefeedbackonseveralchaptersand sectionsofthiseditionofthebook,whichhewaswillingtoreviewmultipletimes;his astutecommentsandsuggestionshavehelpedmetorefinemanyofthepositionsIdefend inthisbook.

Theneweditionofthebookhasalsobenefi tedfromsomehelpfulcommentsthatI receivedfrommanystudentswhohaveusedpreviouseditionsofthetext.Iamalso gratefultothenumerousreviewersandcolleagueswhocommentedontheprevious editionsofthisbook;manyoftheirhelpfulsuggestionshavebeencarriedovertothe presentedition.

IalsowishtothanktheeditorialandproductionstaffsatWileyandThomsonDigital, especiallyBethGolub,ElizabethMills,KatherineWillis,JoleneLing,andSanchariSil, fortheirsupportduringthevariousstagesoftherevisionprocessforthefourtheditionof EthicsandTechnology.

Finally,Imustonceagainthankthetwomostimportantpeopleinmylife:mywife Joanne,andourdaughterRegina.Withouttheircontinuedsupportandextraordinary patience,thefourtheditionofthisbookcouldnothavebeencompleted.

Thiseditionof EthicsandTechnology isdedicatedtothememoryofmygrandparents:LeonandMarian(Roberts)Hutton,andAntonioandClelia(Giamberardino) Tavani.

Nashua,NH

HermanT.Tavani

c

FOREWORD

Thecomputer/informationrevolutionisshapingourworldinwaysithasbeendif ficultto predictandtoappreciate.Whenmainframecomputersweredevelopedinthe1940sand 1950s,somethoughtonlyafewcomputerswouldeverbeneededinsociety.When personalcomputerswereintroducedinthe1980s,theywereconsideredfascinatingtoys forhobbyistsbutnotsomethingseriousbusinesseswouldeveruse.WhenWebtoolswere initiallycreatedinthe1990stoenhancetheInternet,theywereacuriosity.Usingthe Webtoobservethelevelofacoffeepotacrossanoceanwasintriguing,atleastforafew moments,butnotofmuchpracticaluse.Today,armedwiththewisdomofhindsight,the impactofsuchcomputingadvancementsseemsobvious,ifnotinevitable,toallofus. Whatgovernmentclaimsthatitdoesnotneedcomputers?Whatmajorbusinessdoesnot haveaWebaddress?Howmanypeople,eveninthepoorestofcountries,arenotaware oftheuseofcellphones?

Thecomputer/informationrevolutionhaschangedourlivesandhasbroughtwithit signi ficantethical,social,andprofessionalissues;considertheareaofprivacyasbutone example.Today,surveillancecamerasareabundant,andfacialrecognitionsystemsare effectiveevenunderlessthanidealobservingconditions.Informationaboutbuying habits,medicalconditions,andhumanmovementscanbeminedandcorrelatedrelentlesslyusingpowerfulcomputers.Individuals’ DNAinformationcaneasilybecollected, stored,andtransmittedthroughouttheworldinseconds.Thiscomputer/information revolutionhasbroughtaboutunexpectedcapabilitiesandpossibilities.Therevolutionis notonlytechnologicalbutalsoethical,social,andprofessional.Ourcomputerizedworld isperhapsnottheworldweexpected,and,eventotheextentthatweexpectedit,itisnot aworldforwhichwehavewell-analyzedpoliciesabouthowtobehave.Nowmorethan everweneedtotakecyberethicsseriously.

HermanTavanihaswrittenanexcellentintroductiontothe fieldofcyberethics.His textdiffersfromothersinatleastthreeimportantrespects:First,thebookisextraordinarilycomprehensiveanduptodateinitssubjectmatter.Thetextcoversallofthe standardtopicssuchascodesofconduct,privacy,security,crime,intellectualproperty, andfreespeech,andalsodiscussessometimesoverlookedsubjectssuchasdemocracy, employment,access,andthedigitaldivide.Tavanimorethananyoneelsehastracked andpublishedthebibliographicaldevelopmentofcyberethicsovermanyyears,andhis expertisewiththisvastliteratureshinesthroughinthisvolume.Second,thebook approachesthesubjectmatterofcyberethicsfromdiversepointsofview.Tavani examinesissuesfromasocialscienceperspective,fromaphilosophicalperspective, andfromacomputingprofessionalperspective,andthenhesuggestswaystointegrate thesediverseapproaches.Ifthetaskofcyberethicsismultidisciplinary,asmanyof usbelieve,thensuchadiversebutintegratedmethodologyiscrucialtoaccomplishing

thetask.Hisbookisoneofthefewthatconstructssuchamethodology.Third,thebookis unusuallyhelpfultostudentsandteachersbecauseitcontainsanentirechapterdiscussing criticalthinkingskillsandis filledwithreviewanddiscussionquestions.

Thecyberageisgoingtoevolve.Thefuturedetailsandapplicationsare,asalways, difficulttopredict.Butitislikelythatcomputingpowerandbandwidthwillcontinueto growwhilecomputingdevicesthemselveswillshrinkinsizetothenanometerscale.More andmoreinformationdeviceswillbeinsertedintoourenvironment,ourcars,ourhouses, ourclothing,andus.Computerswillbecomesmarter.Theywillbemadeoutofnew materials,possiblybiological.Theywilloperateinnewways,possiblyusingquantum properties.Thedistinctionbetweenthevirtualworldandtherealworldwillblurmore andmore.Weneedagoodbookincyberethicstodealwiththepresentandprepareusfor thisuncertainfuture.Tavani’s EthicsandTechnology issuchabook.

DartmouthCollege

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.