TABLEOFCONTENTS
Newtothe FourthEdition xviii
AudienceandScopexix
OrganizationandStructureoftheBookxxi
TheWebSitefor EthicsandTechnology xxiii
ANotetoStudentsxxiv
NotetoInstructors:ARoadmapforUsingThisBookxxiv
ANotetoComputerScienceInstructorsxxv
ACKNOWLEDGMENTSxxvii FOREWORDxxix
c CHAPTER1
INTRODUCTIONTOCYBERETHICS:CONCEPTS,PERSPECTIVES, ANDMETHODOLOGICALFRAMEWORKS1
Scenario1–1:AFatalCyberbullyingIncidentonMySpace1
Scenario1–2:ContestingtheOwnershipofaTwitterAccount2
Scenario1–3: “TheWashingtonienne” Blogger2
1.1DefiningKeyTerms:CyberethicsandCybertechnology3
1.1.1WhatIsCybertechnology?4
1.1.2WhytheTermCyberethics?5
1.2TheCyberethicsEvolution:FourDevelopmentalPhasesinCybertechnology6
1.3AreCyberethicsIssuesUniqueEthicalIssues?9
Scenario1–4:DevelopingtheCodeforaComputerizedWeaponSystem10
Scenario1–5:DigitalPiracy11
1.3.1DistinguishingbetweenUniqueTechnologicalFeaturesandUnique EthicalIssues11
1.3.2AnAlternativeStrategyforAnalyzingtheDebateabouttheUniqueness ofCyberethicsIssues12
1.3.3APolicyVacuuminDuplicatingComputerSoftware13
1.4CyberethicsasaBranchofAppliedEthics:ThreeDistinctPerspectives14
1.4.1Perspective#1:CyberethicsasaFieldofProfessionalEthics15
1.4.2Perspective#2:CyberethicsasaFieldofPhilosophicalEthics18
1.4.3Perspective#3:CyberethicsasaFieldofSociological/DescriptiveEthics21
Scenario1–6:TheImpactofTechnologyXonthePleasantvilleCommunity21
1.5AComprehensiveCyberethicsMethodology24
1.5.1A “Disclosive” MethodforCyberethics25
1.5.2AnInterdisciplinaryandMultilevelMethodforAnalyzing CyberethicsIssues26
1.6AComprehensiveStrategyforApproachingCyberethicsIssues27
1.7ChapterSummary28
ReviewQuestions28
DiscussionQuestions29
Essay/PresentationQuestions29
ScenariosforAnalysis29
Endnotes30
References31
FurtherReadings32
OnlineResources32
c CHAPTER2
ETHICALCONCEPTSANDETHICALTHEORIES:ESTABLISHING ANDJUSTIFYINGAMORALSYSTEM33
2.1EthicsandMorality33
Scenario2–1:The “RunawayTrolley”:AClassicMoralDilemma34
2.1.1WhatIsMorality?35
2.1.2DerivingandJustifyingtheRulesandPrinciplesofaMoralSystem38
2.2DiscussionStoppersasRoadblockstoMoralDiscourse42
2.2.1DiscussionStopper#1:PeopleDisagreeonSolutionsto MoralIssues43
2.2.2DiscussionStopper#2:WhoAmItoJudgeOthers?45
2.2.3DiscussionStopper#3:MoralityIsSimplyaPrivateMatter47
2.2.4DiscussionStopper#4:MoralityIsSimplyaMatterforIndividual CulturestoDecide48
Scenario2–2:ThePerilsofMoralRelativism49
2.3WhyDoWeNeedEthicalTheories?52
2.4Consequence-BasedEthicalTheories53
2.4.1ActUtilitarianism55
Scenario2–3:AControversialPolicyinNewmerica55
2.4.2RuleUtilitarianism55
2.5Duty-BasedEthicalTheories56
2.5.1RuleDeontology57
Scenario2–4:MakinganExceptionforOneself58
2.5.2ActDeontology59
Scenario2–5:ADilemmaInvolvingConflictingDuties60
2.6Contract-BasedEthicalTheories61
2.6.1SomeCriticismsofContract-BasedTheories62
2.6.2Rights-BasedContractTheories63
2.7Character-BasedEthicalTheories64
2.7.1BeingaMoralPersonvs.FollowingMoralRules64
2.7.2Acquiringthe “Correct” Habits65
2.8IntegratingAspectsofClassicalEthicalTheoriesintoaSingle ComprehensiveTheory66
2.8.1Moor’sJust-ConsequentialistTheoryandItsApplicationto Cybertechnology67
2.8.2KeyElementsinMoor’sJust-ConsequentialistFramework69
2.9ChapterSummary70 ReviewQuestions70
DiscussionQuestions71 Essay/PresentationQuestions71 ScenariosforAnalysis72 Endnotes72
References73 FurtherReadings73
c CHAPTER3
CRITICALREASONINGSKILLSFOREVALUATINGDISPUTESINCYBERETHICS74
3.1GettingStarted74
Scenario3–1:ReasoningAboutWhethertoDownloadaFilefrom “Sharester” 75
3.1.1DefiningTwoKeyTermsinCriticalReasoning:ClaimsandArguments75
3.1.2TheRoleofArgumentsinDefendingClaims76
3.1.3TheBasicStructureofanArgument76
3.2ConstructinganArgument78
3.3ValidArguments80
3.4SoundArguments83
3.5InvalidArguments85
3.6InductiveArguments86
3.7FallaciousArguments87
3.8ASeven-StepStrategyforEvaluatingArguments89
3.9IdentifyingSomeCommonFallacies91
3.9.1 AdHominem Argument92
3.9.2SlipperySlopeArgument92
3.9.3FallacyofAppealtoAuthority93
3.9.4FalseCauseFallacy93
3.9.5BeggingtheQuestion94
3.9.6FallacyofComposition/FallacyofDivision94
3.9.7FallacyofAmbiguity/Equivocation95
3.9.8AppealtothePeople(ArgumentumadPopulum)95
3.9.9TheMany/AnyFallacy96
3.9.10TheVirtualityFallacy97
3.10ChapterSummary98
ReviewQuestions98
DiscussionQuestions98
Essay/PresentationQuestions99 ScenariosforAnalysis99
Endnotes99 References100
FurtherReadings100
c CHAPTER4 PROFESSIONALETHICS,CODESOFCONDUCT,ANDMORALRESPONSIBILITY101
4.1ProfessionalEthics102
4.1.1WhatIsaProfession?103
4.1.2WhoIsaProfessional?103
4.1.3WhoIsaComputer/ITProfessional?104
4.2DoComputer/ITProfessionalsHaveAnySpecialMoralResponsibilities?105
4.2.1Safety-CriticalSoftware105
4.3ProfessionalCodesofEthicsandCodesofConduct106
4.3.1ThePurposeofProfessionalCodes107
4.3.2SomeCriticismsofProfessionalCodes108
4.3.3DefendingProfessionalCodes109
4.3.4TheIEEE-CS/ACMSoftwareEngineeringCodeofEthicsandProfessional Practice110
4.4ConflictsofProfessionalResponsibility:EmployeeLoyaltyandWhistle-Blowing112
4.4.1DoEmployeesHaveanObligationofLoyaltytoEmployers?112
4.4.2Whistle-BlowingIssues114
Scenario4–1:Whistle-Blowingandthe “StarWars” Controversy115
4.4.3AnAlternativeStrategyforUnderstandingProfessionalResponsibility117
4.5MoralResponsibility,LegalLiability,andAccountability117
4.5.1DistinguishingResponsibilityfromLiabilityandAccountability118
4.5.2AccountabilityandtheProblemof “ManyHands” 119
Scenario4–2:TheTherac-25Machine120
4.5.3LegalLiabilityandMoralAccountability120
4.6RiskAssessmentintheSoftwareDevelopmentProcess121
Scenario4–3:TheAegisRadarSystem121
4.7DoSomeComputerCorporationsHaveSpecialMoralObligations?122
4.7.1SpecialResponsibilitiesforSearchEngineCompanies123
4.7.2SpecialResponsibilitiesforCompaniesthatDevelopAutonomousSystems124
4.8ChapterSummary125
ReviewQuestions126
DiscussionQuestions126
Essay/PresentationQuestions126
ScenariosforAnalysis127
Endnotes128 References128 FurtherReadings130
c CHAPTER5 PRIVACYANDCYBERSPACE131
5.1ArePrivacyConcernsAssociatedwithCybertechnologyUniqueorSpecial?132
5.2WhatisPersonalPrivacy?134
5.2.1AccessibilityPrivacy:FreedomfromUnwarrantedIntrusion135
5.2.2DecisionalPrivacy:FreedomfromInterferenceinOne’s PersonalAffairs135
5.2.3InformationalPrivacy:ControlovertheFlowofPersonal Information136
5.2.4AComprehensiveAccountofPrivacy136
Scenario5–1:DescriptivePrivacy137
Scenario5–2:NormativePrivacy137
5.2.5Privacyas “ContextualIntegrity” 137
Scenario5–3:PreservingContextualIntegrityinaUniversitySeminar138
5.3WhyisPrivacyImportant?139
5.3.1IsPrivacyanIntrinsicValue?140
5.3.2PrivacyasaSocialValue141
5.4GatheringPersonalData:Monitoring,Recording,andTrackingTechniques141
5.4.1 “Dataveillance” Techniques141
5.4.2InternetCookies142
5.4.3RFIDTechnology143
5.4.4CybertechnologyandGovernmentSurveillance145
5.5ExchangingPersonalData:MergingandMatchingElectronicRecords146
5.5.1MergingComputerizedRecords146
Scenario5–4:MergingPersonalInformationinUnrelatedComputerDatabases147
5.5.2MatchingComputerizedRecords148
Scenario5–5:UsingBiometricTechnologyatSuperBowlXXXV149
5.6MiningPersonalData150
5.6.1HowDoesDataMiningThreatenPersonalPrivacy?150
Scenario5–6:DataMiningattheXYZBank151
5.6.2WebMining154
Scenario5–7:TheFacebookBeaconControversy154
5.7ProtectingPersonalPrivacyinPublicSpace156
Scenario5–8:ShoppingatSuperMart157
Scenario5–9:ShoppingatNile.com157
5.7.1SearchEnginesandtheDisclosureofPersonalInformation158
Scenario5–10:TrackingYourSearchRequestsonGoogle159
5.7.2AccessingOnlinePublicRecords160
Scenario5–11:AccessingOnlinePublicRecordsinPleasantville161
Scenario5–12:AccessingaState’sMotorVehicleRecordsOnline162
5.8Privacy-EnhancingTechnologies162
5.8.1EducatingUsersaboutPETs163
5.8.2PETsandthePrincipleofInformedConsent163
5.9PrivacyLegislationandIndustrySelf-Regulation164
5.9.1IndustrySelf-RegulationInitiativesRegardingPrivacy164
Scenario5–13:ControversiesInvolvingGoogle’sPrivacyPolicy166
5.9.2PrivacyLawsandDataProtectionPrinciples166
5.10ChapterSummary168
ReviewQuestions169 DiscussionQuestions169
Essay/PresentationQuestions170 ScenariosforAnalysis170 Endnotes171 References171 FurtherReadings173
c CHAPTER6 SECURITYINCYBERSPACE174
6.1SecurityintheContextofCybertechnology174
6.1.1CybersecurityasRelatedtoCybercrime175
6.1.2SecurityandPrivacy:SomeSimilaritiesandSomeDifferences175
6.2ThreeCategoriesofCybersecurity176
6.2.1DataSecurity:Confidentiality,Integrity,andAvailability ofInformation177
6.2.2SystemSecurity:Viruses,Worms,andMalware178
Scenario6–1:TheConfickerWorm178
6.2.3NetworkSecurity:ProtectingourInfrastructure179
Scenario6–2:TheGhostNetControversy179
6.3 “CloudComputing” andSecurity180
6.3.1DeploymentandService/DeliveryModelsfortheCloud181
6.3.2SecuringUserDataResidingintheCloud182
6.4Hackingand “TheHackerEthic” 183
6.4.1WhatIs “TheHackerEthic”?184
6.4.2AreComputerBreak-insEverEthicallyJustifiable?186
6.5Cyberterrorism187
6.5.1Cyberterrorismvs.Hacktivism188
Scenario6–3: Anonymous andthe “OperationPayback” Attack189
6.5.2CybertechnologyandTerroristOrganizations190
6.6InformationWarfare(IW)191
6.6.1InformationWarfarevs.ConventionalWarfare191
Scenario6–4:TheStuxnetWormandthe “OlympicGames” Operation192
6.6.2PotentialConsequencesforNationsthatEngageinIW192
6.7CybersecurityandRiskAnalysis194
6.7.1TheRiskAnalysisMethodology194
6.7.2TheProblemof “De-Perimeterization” ofInformationSecurityfor AnalyzingRisk195
6.8ChapterSummary196
ReviewQuestions196
DiscussionQuestions197
Essay/PresentationQuestions197
ScenariosforAnalysis197
Endnotes198
References198
FurtherReadings200
c CHAPTER7 CYBERCRIMEANDCYBER-RELATEDCRIMES201
7.1CybercrimesandCybercriminals201
7.1.1BackgroundEvents:ABriefSketch202
7.1.2ATypicalCybercriminal203
7.2Hacking,Cracking,andCounterhacking203
7.2.1Hackingvs.Cracking204
7.2.2ActiveDefenseHacking:CanActsof “HackingBack” orCounter HackingEverBeMorallyJustified?204
7.3DefiningCybercrime205
7.3.1DeterminingtheCriteria206
7.3.2APreliminaryDefinitionofCybercrime207 Scenario7–1:UsingaComputertoFileaFraudulentTaxReturn207
7.3.3FramingaCoherentandComprehensiveDefinitionofCybercrime208
7.4ThreeCategoriesofCybercrime:Piracy,Trespass,andVandalisminCyberspace208
7.5Cyber-RelatedCrimes209
7.5.1SomeExamplesofCyber-Exacerbatedvs.Cyber-AssistedCrimes209
7.5.2IdentityTheft211
7.6TechnologiesandToolsforCombatingCybercrime213
Scenario7–2:InterceptingMailthatEntersandLeavesYourNeighborhood213
7.6.1BiometricTechnologies214
7.6.2Keystroke-MonitoringSoftwareandPacket-SniffingPrograms215
7.7ProgramsandTechniquesDesignedtoCombatCybercrimeintheUnitedStates216
7.7.1Entrapmentand “Sting” OperationstoCatchInternetPedophiles216
Scenario7–3:EntrapmentontheInternet216
7.7.2EnhancedGovernmentSurveillanceTechniquesandthePatriotAct217
7.8NationalandInternationalLawstoCombatCybercrime218
7.8.1TheProblemofJurisdictioninCyberspace218
Scenario7–4:AVirtualCasino218
Scenario7–5:ProsecutingaComputerCorporationinMultipleCountries219
7.8.2SomeInternationalLawsandConventionsAffectingCybercrime220
Scenario7–6:ThePirateBayWebSite221
7.9CybercrimeandtheFreePress:TheWikiLeaksControversy221
7.9.1AreWikiLeaks’ PracticesEthical?222
7.9.2AreWikiLeaks’ PracticesCriminal?222
7.9.3WikiLeaksandtheFreePress223
7.10ChapterSummary225
ReviewQuestions225
DiscussionQuestions226
Essay/PresentationQuestions226
ScenariosforAnalysis226
Endnotes227
References228
FurtherReadings229
c CHAPTER8 INTELLECTUALPROPERTYDISPUTESINCYBERSPACE230
8.1WhatisIntellectualProperty?230
8.1.1IntellectualObjects231
8.1.2WhyProtectIntellectualObjects?232
8.1.3SoftwareasIntellectualProperty232
8.1.4EvaluatinganArgumentforWhyItisWrongtoCopy ProprietarySoftware233
8.2CopyrightLawandDigitalMedia235
8.2.1TheEvolutionofCopyrightLawintheUnitedStates235
8.2.2TheFair-UseandFirst-SaleProvisionsofCopyrightLaw236
Scenario8–1:MakingClassicBooksAvailableOnline237
Scenario8–2:DecryptingSecurityonane-BookReader237
8.2.3SoftwarePiracyasCopyrightInfringement238
8.2.4NapsterandtheOngoingBattlesoverSharingDigitalMusic239
Scenario8–3:TheCaseof MGMv.Grokster 241
8.3Patents,Trademarks,andTradeSecrets242
8.3.1PatentProtections242
8.3.2Trademarks243
8.3.3TradeSecrets243
8.4JurisdictionalIssuesInvolvingIntellectualPropertyLaws244
8.5PhilosophicalFoundationsforIntellectualPropertyRights245
8.5.1TheLaborTheoryofProperty245
Scenario8–4:DEFCorporationvs.XYZInc.246
8.5.2TheUtilitarianTheoryofProperty247
Scenario8–5:Sam’se-BookReaderAdd-onDevice247
8.5.3ThePersonalityTheoryofProperty248
Scenario8–6:Angela’sBþþ ProgrammingTool249
8.6TheFreeSoftwareandtheOpenSourceMovements250
8.6.1GNUandtheFreeSoftwareFoundation250
8.6.2The “OpenSourceSoftware” Movement:OSSvs.FSF251
8.7The “Common-Good” Approach:AnAlternativeFrameworkforAnalyzingthe IntellectualPropertyDebate252
8.7.1InformationWantstobeSharedvs.InformationWantstobeFree254
8.7.2PreservingtheInformationCommons256
8.7.3TheFateoftheInformationCommons:CouldthePublicDomainof IdeasEventuallyDisappear?257
8.7.4TheCreativeCommons259
8.8PIPA,SOPA,andRWALegislation:CurrentBattlegroundsintheIntellectual PropertyWar260
8.8.1ThePIPAandSOPABattles261
8.8.2RWAandPublicAccesstoHealth-RelatedInformation261
Scenario8–7:ElsevierPressand “TheCostofKnowledge” Boycott262
8.8.3IntellectualPropertyBattlesintheNearFuture263
8.9ChapterSummary264
ReviewQuestions264
DiscussionQuestions265
Essay/PresentationQuestions265
ScenariosforAnalysis265 Endnotes266 References267
FurtherReadings268
c CHAPTER9 REGULATINGCOMMERCEANDSPEECHINCYBERSPACE269
9.1BackgroundIssuesandSomePreliminaryDistinctions270
9.1.1TheOntologyofCyberspace:IstheInternetaMediumoraPlace?270
9.1.2TwoCategoriesofCyberspaceRegulation271
9.2FourModesofRegulation:TheLessigModel273
9.3DigitalRightsManagementandthePrivatizationofInformationPolicy274
9.3.1DRMTechnology:ImplicationsforPublicDebateonCopyrightIssues274
Scenario9–1:TheSonyRootkitControversy275
9.3.2PrivatizingInformationPolicy:ImplicationsfortheInternet276
9.4TheUseandMisuseof(HTML)MetatagsandWebHyperlinks278
9.4.1IssuesSurroundingtheUse/AbuseofHTMLMetatags278
Scenario9–2:ADeceptiveUseofHTMLMetatags279
9.4.2HyperlinkingandDeepLinking279
Scenario9–3:DeepLinkingontheTicketmasterWebSite280
9.5E-MailSpam281
9.5.1DefiningSpam281
9.5.2WhyIsSpamMorallyObjectionable?282
9.6FreeSpeechvs.CensorshipandContentControlinCyberspace284
9.6.1ProtectingFreeSpeech284
9.6.2DefiningCensorship285
9.7PornographyinCyberspace286
9.7.1Interpreting “CommunityStandards” inCyberspace286
9.7.2InternetPornographyLawsandProtectingChildrenOnline287
9.7.3VirtualChildPornography288 Scenario9–4:ASextingIncidentInvolvingGreensburgSalemHighSchool290
9.8HateSpeechandSpeechthatcanCausePhysicalHarmtoOthers292
9.8.1HateSpeechontheWeb292
9.8.2Online “Speech” thatCanCausePhysicalHarmtoOthers294
9.9 “NetworkNeutrality” andtheFutureofInternetRegulation294
9.9.1DefiningNetworkNeutrality295
9.9.2SomeArgumentsAdvancedbyNetNeutrality’sProponentsandOpponents296
9.9.3FutureImplicationsfortheNetNeutralityDebate296
9.10ChapterSummary297
ReviewQuestions298
DiscussionQuestions298 Essay/PresentationQuestions299 ScenariosforAnalysis299 Endnotes300
References300 FurtherReadings301
c CHAPTER10
THEDIGITALDIVIDE,DEMOCRACY,ANDWORK303
10.1TheDigitalDivide304
10.1.1TheGlobalDigitalDivide304
10.1.2TheDigitalDividewithinNations305 Scenario10–1:ProvidingIn-HomeInternetServiceforPublicSchoolStudents306
10.1.3IstheDigitalDivideanEthicalIssue?307
10.2CybertechnologyandtheDisabled309
10.2.1DisabledPersonsandRemoteWork310
10.2.2ArgumentsforContinuedWAISupport311
10.3CybertechnologyandRace312
10.3.1InternetUsagePatterns312
10.3.2RacismandtheInternet313
10.4CybertechnologyandGender314
10.4.1AccesstoHigh-TechnologyJobs315
10.4.2GenderBiasinSoftwareDesignandVideoGames317
10.5Cybertechnology,Democracy,andDemocraticIdeals317
10.5.1HasCybertechnologyEnhancedorThreatenedDemocracy?318
10.5.2HowhasCybertechnologyAffectedPoliticalElectionsin DemocraticNations?322
10.6TheTransformationandtheQualityofWork324
10.6.1JobDisplacementandtheTransformedWorkplace324
10.6.2TheQualityofWorkLifeintheDigitalEra328
Scenario10–2:EmployeeMonitoringandtheCaseof Ontariov.Quon329
10.7ChapterSummary331
ReviewQuestions332 DiscussionQuestions332
Essay/PresentationQuestions333
ScenariosforAnalysis333 Endnotes334 References335 FurtherReadings336
c CHAPTER11 ONLINECOMMUNITIES,CYBERIDENTITIES,ANDSOCIALNETWORKS337
11.1OnlineCommunitiesandSocialNetworkingServices337
11.1.1OnlineCommunitiesvs.TraditionalCommunities337
11.1.2BlogsintheContextofOnlineCommunities339
11.1.3AssessingProsandConsofOnlineCommunities339
Scenario11–1:AVirtualRapeinCyberspace342
11.2VirtualEnvironmentsandVirtualReality343
11.2.1WhatisVirtualReality(VR)?344
11.2.2EthicalControversiesInvolvingBehaviorinVRApplicationsandGames345
11.2.3Misrepresentation,Bias,andIndecentRepresentationsinVRApplications349
11.3CyberIdentitiesandCyberSelves:PersonalIdentityandOurSenseofSelf intheCyberEra351
11.3.1Cybertechnologyasa “MediumofSelf-Expression” 352
11.3.2 “MUDSelves” andDistributedPersonalIdentities352
11.3.3TheImpactofCybertechnologyonOurSenseofSelf353
11.4AIanditsImplicationsforWhatitMeanstobeHuman355
11.4.1WhatisAI?ABriefOverview355
11.4.2TheTuringTestandJohnSearle’ s “ChineseRoom” Argument357
11.4.3CyborgsandHuman-MachineRelationships358 Scenario11–2:ArtificialChildren361
11.4.4Do(AtLeastSome)AIEntitiesWarrantMoralConsideration?361 11.5ChapterSummary363
ReviewQuestions363 DiscussionQuestions364
Essay/PresentationQuestions364 ScenariosforAnalysis365
Endnotes365 References366
FurtherReadings367
c CHAPTER12
ETHICALASPECTSOFEMERGINGANDCONVERGINGTECHNOLOGIES368
12.1ConvergingTechnologiesandTechnologicalConvergence368
12.2AmbientIntelligence(AmI)andUbiquitousComputing369
12.2.1PervasiveComputing371
12.2.2UbiquitousCommunication371
12.2.3IntelligentUserInterfaces371
12.2.4EthicalandSocialIssuesinAmI372 Scenario12–1:E.M.Forster’sPrecautionaryTale373 Scenario12–2:JeremyBentham’sPanopticon375
12.3BioinformaticsandComputationalGenomics376
12.3.1ComputingandGenetic “Machinery”:SomeConceptualConnections376
12.3.2EthicalIssuesandControversies376 Scenario12–3:deCODEGeneticsInc.377
12.3.3ELSIGuidelinesandGenetic-Speci ficLegislation380 12.4NanotechnologyandNanocomputing381
12.4.1Nanotechnology:ABriefOverview382
12.4.2Optimistic vs. PessimisticViewsofNanotechnology383
12.4.3EthicalIssuesinNanotechnologyandNanocomputing386
12.5AutonomousMachinesandMachineEthics389
12.5.1WhatisanAutonomousMachine(AM)?390
12.5.2SomeEthicalandPhilosophicalQuestionsInvolvingAMs393
12.5.3MachineEthicsandMoralMachines398
12.6A “Dynamic” EthicalFrameworkforGuidingResearchinNewandEmerging Technologies402
12.6.1IsanELSI-LikeModelAdequateforNew/EmergingTechnologies?402
12.6.2A “DynamicEthics” Model403
12.7ChapterSummary404
ReviewQuestions404
DiscussionQuestions405 Essay/PresentationQuestions405 ScenariosforAnalysis405 Endnotes406 References407 FurtherReadings409 GLOSSARY411
c PREFACE
Asthedigitallandscapecontinuestoevolveatarapidpace,newvariationsofmoral, legal,andsocialconcernsarisealongwithit.Notsurprisingly,then,anadditionalcluster ofcyberethicsissueshasemergedsincethepublicationofthepreviouseditionof EthicsandTechnology inlate2009.Consider,forexample,thewaysinwhichCloudbasedstoragethreatenstheprivacyandsecurityofourpersonaldata.Alsoconsiderthe increasingamountofpersonaldatathatsocialnetworkingsitessuchasFacebookand majorsearchenginecompaniessuchasGooglenowcollect.Shouldweworryabouthow thatinformationcanbesubsequentlyused?Shouldwealsoworryaboutthe fi ltering techniquesthatleadingsearchenginesnowusetotailoror “personalize” theresultsof oursearchqueriesbasedonprofilesderivedfrominformationaboutourprevioussearch requests?Someanalystsnotethatthecurrentinformation-gathering/pro filingpractices andtechniquesusedinthecommercialsectorcanalsobeadoptedbygovernments,and theypointoutthatthesepracticescouldnotonlysupportthesurveillanceinitiativesof totalitariangovernmentsbutcouldalsothreatentheprivacyofcitizensindemocratic countriesaswell.
Alsoconsidertheimpactthatrecentcyberwarfareactivities,includingtheclandestinecyberattacksallegedlylaunche dbysomenationsates,couldhaveforour nationalinfrastructure.Additionally,consid erthenational-security-relatedconcerns raisedbytheWikiLeakscontroversy,which hasalsoexacerbatedanongoingtension betweenfreespeechontheInternetvs.standardsfor “ responsiblereporting ” onthe partofinvestigativejournalists.Andtherecentdebateabout “ networkneutrality ” causesustorevisitquestionsabouttheextenttowhichtheserviceprovidersresponsiblefordeliveringonlinecontentshouldalsobeabletocontrolthecontentthatthey deliver.
Otherkindsofconcernsnowarisebecauseofdevelopmentsinarelativelynew subfieldofcyberethicscalled “machineethics” (sometimesreferredtoas “robo-ethics”). Forexample,shouldwedevelopautonomousmachinesthatarecapableofmaking decisionsthathavemoralimplications?Somesemiautonomousrobots,whichserveas companionsandcaregiversfortheelderlyandas “babysitters” foryoungchildren,are alreadyavailable.Recentandcontinueddevelopmentsinroboticsandautonomous machinesmayprovidemanyconveniencesandservices,buttheycanalsocauseusto questionourconventionalnotionsofautonomy,moralagency,andtrust.Forexample, can/shouldthesemachinesbefullyautonomous?Cantheyqualifyas(arti ficial)moral agents?Also,willhumansbeabletotrustmachinesthattheywillincreasinglyrelyonto carryoutcriticaltasks?Ifwedonotyetknowtheanswerstothesequestions,andif noclearandexplicitpoliciesareinplacetoguideresearchinthisarea,shouldwe continuetodevelopautonomousmachines?Theseandrelatedquestionsintheemerging
fieldofmachineethicsarebutafewofthemanynewquestionsweexamineinthefourth editionof EthicsandTechnology.
Althoughnewtechnologiesemerge,andexistingtechnologiescontinuetomature andevolve,manyoftheethicalissuesassociatedwiththemarebasicallyvariationsof existingethicalproblems.Atbottom,theseissuesreducetotraditionalethicalconcerns havingtodowithdignity,respect,fairness,obligationstoassistothersinneed,andso forth.So,weshouldnotinferthatthemorallandscapeitselfhasbeenalteredbecauseof behaviorsmadepossiblebythesetechnologies.Wewillseethat,forthemostpart,the newissuesexaminedinthiseditionof EthicsandTechnology aresimilarinrelevant respectstothekindsofethicalissuesweexaminedinthebook’spreviouseditions. However,manyemergingtechnologiespresentuswithchallengesthat,initiallyatleast, donotseemto fiteasilyintoourconventionalethicalcategories.So,amajorobjectiveof thistextbookistoshowhowthosecontroversiescanbeanalyzedfromtheperspectiveof standardethicalconceptsandtheories.
Thepurposeof EthicsandTechnology,asstatedintheprefacestothethreeprevious editionsofthisbook,istointroducestudentstoissuesandcontroversiesthatcomprise therelativelynew fieldofcyberethics.Theterm “cyberethics” isusedinthistextbookto refertothe fieldofstudythatexaminesmoral,legal,andsocialissuesinvolving cybertechnology. Cybertechnology,inturn,referstoabroadspectrumofcomputing/ informationandcommunicationtechnologiesthatrangefromstand-alonecomputersto thecurrentclusterofnetworkeddevicesandtechnologies.Manyofthesetechnologies includedevicesandapplicationsthatareconnectedtoprivatelyownedcomputer networksaswellastotheInternetitself.
Thistextbookexaminesawiderangeofcyberethicsissues fromspecificissuesof moralresponsibilitythatdirectlyaffectcomputerandinformationtechnology(IT) professionalstobroadersocialandethicalconcernsthataffecteachofusinourdayto-daylives.Questionsabouttherolesandresponsibilitiesofcomputer/ITprofessionals indevelopingsafeandreliablecomputersystemsareexaminedunderthecategoryof professionalethics.Broadersocialandethicalconcernsassociatedwithcybertechnology areexaminedundertopicssuchasprivacy,security,crime,intellectualproperty,Internet regulation,andsoforth.
c NEWTOTHE FOURTHEDITION
Newpedagogicalmaterial includes anewlydesignedsetofend-of-chapterexercisescalled “ScenariosforAnalysis,” whichcanbeusedforeitherin-classanalysisorgroupprojects; newand/orupdated(in-chapter) scenarios,illustratingbothactualcasesand hypotheticalsituations,whichenablestudentstoapplymethodologicalconcepts/ frameworksandethicaltheoriescoveredinChapters1and2; new samplearguments insomechapters,whichenablestudentstoapplythetools forargumentanalysiscoveredinChapter3; updated “reviewquestions,”“discussionquestions,” and “essay/presentation questions” attheendofchapters;
anupdatedandrevisedglossaryofkeytermsusedinthebook; anupdated EthicsandTechnology CompanionSitewithnewresourcesand materialsforstudentsandinstructors.
Newissues examinedandanalyzedinclude ethicalandsocialaspectsofCloudcomputing,includingconcernsaboutthe privacyandsecurityofusers’ datathatisincreasinglybeingstoredin “theCloud”; concernsaboutthe “personalization filters” thatsearchenginecompaniesuseto tailoroursearchresultstoconformtotheirperceptionsofwhatwewant. questionsaboutGoogle’s(2012)privacypolicyvis-a-vistheamountofuserdata thatcanbecollectedviathesearchenginecompany’ssuiteofapplications; concernsaboutcyberwarfareactivitiesinvolvingnationstatesandtheiralleged launchingoftheStuxnetwormandFlamevirus; controversiessurroundingWikiLeaksandthetensionitcreatesbetweenfree speechandresponsiblejournalism,aswellasforconcernsinvolvingnational security; concernsaffecting “networkneutrality” andwhetherregulationmayberequired toensurethatInternetserviceprovidersdonotgaintoomuchcontroloverthe contenttheydeliver; controversiesin “machineethics,” includingthedevelopmentofautonomous machinescapableofmakingdecisionsthathavemoralimpacts; questionsaboutwhetherwecantrustartificialagentstoactinwaysthatwill alwaysbeinthebestinterestsofhumans.
Inrevisingthebook,Ihavealsoeliminatedsomeolder,nowout-of-date,material. Additionally,Ihavestreamlinedsomeofthematerialthatoriginallyappearedin previouseditionsofthebookbutstillneedstobecarriedoverintothepresentedition.
c AUDIENCEANDSCOPE
Becausecyberethicsisaninterdisciplinary field,thistextbookaimsatreachingseveral audiencesandthuseasilyrunstheriskoffailingtomeettheneedsofanyoneaudience.I havenonethelessattemptedtocomposeatextbookthataddressestheneedsofcomputer science,philosophy,social/behavioralscience,andlibrary/informationsciencestudents. Computersciencestudentsneedaclearunderstandingoftheethicalchallengestheywill faceascomputerprofessionalswhentheyentertheworkforce.Philosophystudents,on thecontrary,shouldunderstandhowmoralissuesaffectingcybertechnologycanbe situatedinthe fieldofappliedethicsingeneralandthenanalyzedfromtheperspectiveof ethicaltheory.Socialscienceandbehavioralsciencestudentswilllikelywanttoassessthe sociologicalimpactofcybertechnologyonoursocialandpoliticalinstitutions(government,commerce,andeducation)andsociodemographicgroups(affectinggender,race, ethnicity,andsocialclass).Andlibraryscienceandinformationsciencestudentsshould beawareofthecomplexitiesandnuancesofcurrentintellectualpropertylawsthat threatenunfetteredaccesstoelectronicinformation,andshouldbeinformedabout recentregulatoryschemesthatthreatentocensorcertainformsofelectronicspeech.
Studentsfromotheracademicdisciplinesshouldalso findmanyissuescoveredinthis textbookpertinenttotheirpersonalandprofessionallives;someundergraduatesmay electtotakeacourseinsocialandethicalaspectsoftechnologytosatisfyoneoftheir generaleducationrequirements.Although EthicsandTechnology isintendedmainlyfor undergraduatestudents,itcouldbeused,inconjunctionwithothertexts,ingraduate coursesaswell.
Weexamineethicalcontroversiesusing scenarios thatincludebothactualcasesand hypotheticalexamples,whereverappropriate.InsomeinstancesIhavedeliberately constructedprovocativescenariosandselectedcontroversialcasestoconveythe severityoftheethicalissuesweconsider.Somereadersmaybeuncomfortablewith, andpossiblyevenoffendedby,thesescenariosandcases forexample,thoseillustrating unethicalpracticesthatnegativelyaffectchildrenandminorities.Althoughitmighthave beenpoliticallyexpedienttoskipoverissuesandscenariosthatcouldunintentionally offendcertainindividuals,Ibelievethatnotextbookinappliedethicswoulddojusticeto itstopicifitfailedtoexposeandexamineissuesthatadverselyaffectvulnerablegroupsin society.
Alsoincludedinmostchaptersaresamplearguments thatareintendedtoillustrate someoftherationalesthathavebeenputforthbyvariousinterestgroupstodefend policiesandlawsaffectingprivacy,security,property,andsoforth,incyberspace. InstructorsandstudentscanevaluatetheseargumentsviatherulesandcriteriaestablishedinChapter3toseehowwell,orhowpoorly,thepremisesinthesearguments succeedinestablishingtheirconclusions.
Exercisequestionsareincludedattheendofeachchapter.First,basic “review questions” quizthereader’scomprehensionofkeyconcepts,themes,issues,and scenarioscoveredinthatchapter.Thesearefollowedbyhigherlevel “discussion questions” designedtoencouragestudentstoreflectmoredeeplyonsomeofthecontroversialissuesexaminedinthechapter.Inadditionto “essay/presentationquestions” that arealsoincludedineachchapter,anewsetof “ScenariosforAnalysis” havebeenadded inresponsetoinstructorswhorequestedtheadditionofsome unanalyzed scenarios forclassroomuse.Buildingonthehigherlevelnatureofthediscussionquestions andessay/presentationquestions,thesescenariosareintendedtoprovidestudents andinstructorswithadditionalresourcesforanalyzingimportantcontroversiesintroducedinthevariouschapters.Assuch,thesescenarioscanfunctionasin-classresources forgroupprojects.
Someessay/presentationquestionsandend-of-chapterscenariosaskstudentsto compareandcontrastargumentsandtopicsthatspanmultiplechapters;forexample, studentsareaskedtorelateargumentsusedtodefendintellectualpropertyrights, consideredinChapter8,toargumentsforprotectingprivacyrights,examinedin Chapter5.Otherquestionsandscenariosaskstudentstoapplyfoundationalconcepts andframeworks,suchasethicaltheoryandcriticalthinkingtechniquesintroducedin Chapters2and3,totheanalysisofspecifi ccyberethicsissuesexaminedinsubsequent chapters.Insomecases,theseend-of-chapterquestionsandscenariosmaygenerate livelydebateintheclassroom;inothercases,theycanserveasapointofdeparturefor variousclassassignmentsandgroupprojects.Althoughno final “solutions” totheissues anddilemmasraisedinthesequestionsandscenariosareprovidedinthetext, some “strategies” foranalyzingthemareincludedinthesectionofthebook’sWeb site (www.wiley.com/college/tavani) entitled “Strategies for Discussi on Questions.”
ORGANIZATIONANDSTRUCTUREOFTHEBOOK
EthicsandTechnology isorganizedinto12chapters.Chapter1, “Introductionto Cyberethics:Concepts,Perspectives,andMethodologicalFrameworks,” defineskey conceptsandtermsthatwillappearthroughoutthebook.Forexample,de finitionsof termssuchas cyberethics and cybertechnology areintroducedinthischapter.Wethen examinewhetheranyethicalissuesinvolvingcybertechnologyareuniqueethicalissues. Wealsoconsiderhowwecanapproachcyberethicsissuesfromthreedifferentperspectives:professionalethics,philosophicalethics,andsociological/descriptiveethics,eachof whichrepresentstheapproachgenerallytakenbyacomputerscientist,aphilosopher, andasocial/behavioralscientist.Chapter1concludeswithaproposalforacomprehensiveandinterdisciplinarymethodologicalschemeforanalyzingcyberethicsissuesfrom theseperspectives.
InChapter2, “EthicalConceptsandEthicalTheories:EstablishingandJustifyinga MoralSystem,” weexaminesomeofthebasicconceptsthatmakeupamoralsystem.We drawadistinctionbetween “ethics” and “morality” byde finingethicsas “thestudy ofmorality.”“Morality,” oramoralsystem,isdefinedasaninformal,publicsystem comprisingrulesofconductandprinciplesforevaluatingthoserules.Wethenexamine consequence-based,duty-based,character-based,andcontract-basedethicaltheories. Chapter2concludeswithamodelthatintegrateselementsofcompetingethicaltheories intoonecomprehensiveandunifiedtheory.
Chapter3, “CriticalReasoningSkillsforEvaluatingDisputesinCyberethics,” includesabriefoverviewofbasicconceptsandstrategiesthatareessentialfordebating moralissuesinastructuredandrationalmanner.Webeginbydescribingthestructureof alogicalargumentandshowhowargumentscanbeconstructedandanalyzed.Next, weexamineatechniquefordistinguishingbetweenargumentsthatarevalidandinvalid, soundandunsound,andinductiveandfallacious.Weillustrateexamplesofeachtype withtopicsaffectingcybertechnologyandcyberethics.Finally,weidentifysomestrategiesforspottingandlabeling “informal” logicalfallaciesthatfrequentlyoccurin everydaydiscourse.
Chapter4, “ProfessionalEthics,CodesofConduct,andMoralResponsibility, ” examinesissuesrelatedtoprofessionalresponsibilityforcomputer/ITprofessionals. Weconsiderwhetherthereareanyspecialmoralresponsibilitiesthatcomputer/IT professionalshave as professionals.Wethenexaminesomeprofessionalcodesof conductedthathavebeenadoptedbycomputerorganizations.Wealsoask:Towhat extentaresoftwareengineersresponsibleforthereliabilityofthecomputersystemsthey designanddevelop,especiallyapplicationsthatinclude “life-critical” and “safetycritical” software?Arecomputer/ITprofessionalseverpermitted,orperhapseven required,to “blowthewhistle” whentheyhavereasonableevidencetosuggestthata computersystemisunreliable?Finally,weexaminesomeschemesforanalyzingrisks associatedwiththedevelopmentofsafety-criticalsoftware.
WediscussprivacyissuesinvolvingcybertechnologyinChapter5.First,weexamine theconceptofprivacyaswellassomeargumentsforwhyprivacyisconsideredan importanthumanvalue.Wethenlookathowpersonalprivacyisthreatenedbythekinds ofsurveillancetechniquesanddata-collectionschemesmadepossiblebycybertechnology.Specificdata-gatheringanddata-exchangingtechniquesareexaminedindetail. WenextconsidersomechallengesthatdataminingandWebminingposeforprotecting
personalprivacyinpublicspace.InChapter5,wealsoconsiderwhethertechnologyitself, intheformofprivacy-enhancingtechnologies(orPETs),canprovideanadequate solutiontosomeprivacyissuesgeneratedbycybertechnology.
Chapter6, “SecurityinCyberspace,” examinessecuritythreatsinthecontextof computersandcybertechnology.Initially,wedifferentiatethreedistinctsensesof “security”:datasecurity,systemsecurity,andnetworksecurity.Wethenexaminethe conceptsof “hacker” and “hackerethic,” andweaskwhethercomputerbreak-inscan everbemorallyjustified.Next,wedifferentiateactsof “hacktivism,” cyberterrorism,and informationwarfare.Chapter6concludeswithabriefexaminationofriskanalysisinthe contextofcybersecurity.
Webeginouranalysisofcybercrime,inChapter7,byconsideringwhetherwe canconstructaprofileofa “typical” cybercriminal.Wethenproposeadefinition ofcybercrimethatenablesustodistinguishbetween “cyberspecific” and “cyber-related” crimestoseewhethersuchadistinctionwouldaidintheformulationofmorecoherent cybercrimelaws.Wealsoconsiderthenotionoflegaljurisdictionincyberspace, especiallywithrespecttotheprosecutionofcybercrimesthatinvolveinterstateand internationalvenues.Inaddition,weexaminetechnologicaleffortstocombatcybercrime,suchascontroversialusesofbiometrictechnologies.
Chapters8and9examinelegalissuesinvolvingintellectualpropertyandfreespeech, respectively,astheyrelatetocyberspace.OneobjectiveofChapter8, “Intellectual PropertyDisputesinCyberspace,” istoshowwhyanunderstandingoftheconceptof intellectualpropertyisimportantinaneraofdigitalinformation.Weconsiderthree theoriesofpropertyrightsandmakeimportantdistinctionsamonglegalconceptssuchas copyrightlaw,patentprotection,andtrademarks.Additionally,weconsiderspecific scenariosinvolvingintellectualpropertydisputes,includingtheoriginalNapstercontroversyaswellassomerecentpeer-to-peer(P2P)networksthathavebeenusedfor file sharing.WealsoexaminetheFreeSoftwareandtheOpenSourceSoftwareinitiatives. Finally,weconsideracompromisesolutionthatsupportsandencouragesthesharingof digitalinformationinanerawhenstrongcopyrightlegislationseemstodiscourage thatpractice.
Chapter9, “RegulatingCommerceandSpeechinCyberspace,” looksatadditional legalissues,especiallyastheyinvolveregulatoryconcernsincyberspace.Wedraw distinctionsbetweentwodifferentsensesof “regulation” asitappliestocyberspace,and wealsoconsiderwhethertheInternetshouldbeunderstoodasamediumorasa “place.” Wealsoexaminecontroversiessurroundinge-mailspam,whichsomebelievecanbe viewedasaformof “speech” incyberspace.Wethenaskwhetherallformsofonlinespeech shouldbegrantedlegalprotection;forexample,shouldchildpornography,hatespeech, andspeechthatcancausephysicalharmtoothersbetoleratedinonlineforums?
Chapter10examinesawiderangeofequity-and-accessissuesfromtheperspective ofcybertechnology’simpactforsociodemographicgroups(affectingclass,race,and gender).Thechapterbeginswithananalysisofglobalaspectsofthe “digitaldivide.” We thenexaminespeci ficequity-and-accessissuesaffectingdisabledpersons,racialminorities,andwomen.Next,weexploretherelationshipbetweencybertechnologyand democracy,andweconsiderwhethertheInternetfacilitatesdemocracyorthreatens it.Wethenexaminesomesocialandethicalissuesaffectingemploymentinthe contemporaryworkplace,andweaskwhethertheuseofcybertechnologyhastransformed workandhasaffectedtheoverallqualityofworklife.
InChapter11,weexamineissuespertainingtoonlinecommunities,virtual-reality (VR)environments,andarti ficialintelligence(AI)developmentsintermsoftwobroad themes: community and personalidentity incyberspace.Webeginbyanalyzingthe impactthatcybertechnologyhasforourtraditionalunderstandingoftheconceptof community.Inparticular,weaskwhetheronlinecommunities,suchasFacebookand Twitter,raiseanyspecialethicalorsocialissues.Next,weexaminesomeimplicationsthat behaviorsmadepossiblebyvirtualenvironmentsandvirtual-realityapplicationshavefor ourconventionalunderstandingofpersonalidentity.The finalsectionofChapter11 examinestheimpactthatdevelopmentsinAIhaveforoursenseofselfandforwhatit meanstobehuman.
Chapter12,the fi nalchapterof EthicsandTechnology,examinessomeethical challengesthatariseinconnectionwithemergingandconvergingtechnologies.Wenote thatcybertechnologyis converging withnoncybertechnologies,includingbiotechnology andnanotechnology,generatingnew fieldssuchasbioinformaticsandnanocomputing that,inturn,introduceethicalconcerns.Chapter12alsoincludesabriefexaminationof someissuesintheemerging(sub)fieldofmachineethics.Amongthequestionsconsideredarewhetherweshoulddevelopautonomousmachinesthatarecapableofmaking moraldecisionsandwhetherwecouldtrustthosemachinestoalwaysactinourbest interests.
AGlossarythatdefi nestermscommonlyusedinthecontextofcomputerethicsand cyberethicsisalsoincluded.However,theglossaryisbynomeansintendedasan exhaustivelistofsuchterms.Additionalmaterialforthistextisavailableonthebook’s Web site: www.wiley.com/college.tavani.
c THEWEBSITEFOR ETHICSANDTECHNOLOGY
Sevenappendicesfor EthicsandTechnology areavailableonlyinonlineformat. AppendicesAthroughEincludethefulltextof fiveprofessionalcodesofethics:the ACMCodeofEthicsandProfessionalConduct,theAustralianComputerSocietyCode ofEthics,theBritishComputerSocietyCodeofConduct,theIEEECodeofEthics,and theIEEE-CS/ACMSoftwareEngineeringCodeofEthicsandProfessionalPractice, respectively.Specificsectionsofthesecodesareincludedinhardcopyformataswell,in relevantsectionsofChapter4.Twoappendices,FandG,arealsoavailableonline. AppendixFcontainsthesectionofthe IEEE-CS/ACMComputingCurricula2001Final Report thatdescribesthesocial,professional,andethicalunitsofinstructionmandatedin theircomputersciencecurriculum.AppendixGprovidessomeadditionalcritical reasoningtechniquesthatexpandonthestrategiesintroducedinChapter3.
TheWebsitefor EthicsandTechnology alsocontainsadditionalresourcesfor instructorsandstudents.PresentationslidesinPowerPointformatforChapters1–12,as wellasgraphics(fortablesand figuresineachchapter),areavailableinthe “Instructor” and “Student” sectionsofthesite.Asnotedearlier,asectionon “Strategies,” which includessometechniquesforansweringthediscussionquestionsandunanalyzedscenariosincludedattheendofeachofthebook’s12chapters,isalsoincludedonthissite.
Thebook’sWebsiteisintendedasanadditionalresourceforbothinstructorsand students.Italsoenablesmeto “updatethebook,” inbetweeneditions,withnewissues andscenariosincyberethics,astheyarise.Forexample,asectionentitled “Recent Preface b xxiii
Controversies” isincludedonthebook’sWebsite.Iinviteyourfeedbackastohowthis sitecanbecontinuallyimproved.
c ANOTETOSTUDENTS
Ifyouaretakinganethicscourseforthe firsttime,youmightfeeluncomfortablewiththe prospectofembarkingonastudyofmoralissuesandcontroversialtopicsthatmight initiallycauseyoudiscomfortbecauseethicsissometimesperceivedtobepreachy,andits subjectmatterissometimesviewedasessentiallypersonalandprivateinnature.Because thesearecommonconcerns,Iaddressthemearlyinthetextbook.Idrawadistinction betweenanethicist,whostudiesmoralityora “moralsystem,” andamoralistwhomay assumetohavethecorrectanswerstoallofthequestions;notethataprimaryobjectiveof thisbookistoexamineandanalyzeethicalissues,nottopresumethatanyofusalready has the correctanswertoanyofthequestionsIconsider.
Toaccomplishthisobjective,Iintroducethreetypesofconceptualframeworksearly inthetextbook.InChapter1,Iprovideamethodologicalschemethatenablesyouto identifycontroversialproblemsandissuesinvolvingcybertechnology as ethicalissues. TheconceptualschemeincludedinChapter2,basedonethicaltheory,providessome generalprinciplesthatguideyouranalysisofspeci ficcasesaswellasyourdeliberations aboutwhichkindsofsolutionstoproblemsshouldbeproposed.Athird,and fi nal, conceptualframeworkisintroducedinChapter3intheformofcriticalreasoning techniques,whichprovidesrulesandstandardsthatyoucanuseforevaluatingthe strengthsofcompetingargumentsandfordefendingaparticularpositionthatyoureach onacertainissue.
Thistextbookwasdesignedandwrittenforyou,thestudent!Whetherornotit succeedsinhelpingyoutomeettheobjectivesofacourseincyberethicsisveryimportant tome,soIwelcomeyourfeedbackonthistextbook;andIwouldsincerelyappreciate hearingyourideasonhowthistextbookcouldbeimproved.Pleasefeelfreetowriteto mewithyoursuggestions,comments,andsoforth.Myemailaddressishtavani@rivier .edu.Ilookforwardtohearingfromyou!
c NOTETOINSTRUCTORS:AROADMAPFORUSINGTHISBOOK
Thechaptersthatmakeup EthicsandTechnology aresequencedsothatreadersare exposedtofoundationalissuesandconceptualframeworksbeforetheyexaminespecific problemsincyberethics.Insomecases,itmaynotbepossibleforinstructorstocoverall ofthematerialinChapters1–3.Itisstronglyrecommended,however,thatbefore studentsareassignedmaterialinChapter4,theyatleastreadSections1.1,1.4–1.5,2.4–2.8,and3.1.Instructorsusingthistextbookcandeterminewhichchaptersbestaccommodatetheirspecifi ccourseobjectives.Computerscienceinstructors,forexample,will likelywanttoassignChapter4,onprofessionalethicsandresponsibility,earlyinthe term.Socialscienceinstructors,ontheotherhand,willlikelyexamineissuesdiscussedin Chapters10and11earlyintheircourse.Philosophyinstructorsmaywishtostructure theircoursesbeginningwithathoroughexaminationofthematerialonethicalconcepts
andethicaltheoryinChapter2andtechniquesforevaluatinglogicalargumentsin Chapter3.IssuesdiscussedinChapter12maybeofparticularinteresttoCSinstructors teachingadvancedundergraduatestudents.
Manytextbooksinappliedethicsincludearequisitechapteronethicalconcepts/ theoryatthebeginningofthebook.Unfortunately,theyoftentreattheminacursory manner;furthermore,theseethicalconceptsandtheoriesareseldomdevelopedand reinforcedintheremainingchapters.Thus,readersoftenexperiencea “disconnect” betweenthematerialincludedinthebook’sopeningchapterandthecontentofthe specificcasesandissuesdiscussedinsubsequentchapters.Byincorporatingelementsof ethicaltheoryintomydiscussionandanalysisofthespecifi ccyberethicsissuesIexamine, Ihavetriedtoavoidthe “disconnect” betweentheoryandpracticethatiscommonplace inmanyappliedethicstextbooks.
c ANOTETOCOMPUTERSCIENCEINSTRUCTORS
EthicsandTechnology canbeusedasthemaintextinacoursededicatedtoethicaland socialissuesincomputing,oritcanbeusedasasupplementarytextbookforcomputer sciencecoursesinwhichoneormoreethicsmodulesareincluded.AsIsuggestedinthe precedingsection,instructorsmay finditdifficulttocoverallofthematerialincludedin thisbookinthecourseofasinglesemester.AndasIalsopreviouslysuggested,computer scienceinstructorswilllikelywanttoensurethattheyallocatesuf ficientcoursetimeto theprofessionalethicalissuesdiscussedinChapter4.Alsoofspecialinteresttocomputer scienceinstructorsandtheirstudentswillbethesectionsoncomputersecurityandrisk analysisinChapter6;opensourcecodeandintellectualpropertyissuesinChapter8;and regulatoryissuesaffectingsoftwarecodeinChapter9.Becausecomputerscience instructorsmayneedtolimittheamountofclasstimetheydevotetocoveringfoundationalconceptsincludedintheearlierchapters,Irecommendcoveringatleastthecritical sectionsofChapters1–3describedpreviously.Thisshouldprovidecomputerscience studentswithsomeofthetoolstheywillneedasprofessionalstodeliberateonethical issuesandtojustifythepositionstheyreach.
Indesigningthistextbook,Itookintoaccounttheguidelinesonethicalinstruction includedinthe ComputingCurricula2001FinalReport,issuedinDecember2001bythe IEEE-CS/ACMJointTaskForceonComputingCurricula,whichrecommendsthe inclusionof16corehoursofinstructiononsocial,ethical,andprofessionaltopicsin thecurriculumforundergraduatecomputersciencestudents.[SeetheonlineAppendixF at www.wiley.com/college.tavani for detailed information about the social/professional (SP)unitsintheComputingCurricula2001.]EachtopicprefacedwithanSPdesignation de finesone “knowledgearea” oraCS “bodyofknowledge.” Theyaredistributedamong thefollowing10units:
SP1:Historyofcomputing(e.g.,historyofcomputerhardware,software,and networking)
SP2:Socialcontextofcomputing(e.g.,socialimplicationsofnetworkedcomputing, gender-relatedissues,andinternationalissues)
SP3:Methodsandtoolsofanalysis(e.g.,identifyingassumptionsandvalues,making andevaluatingethicalarguments)
SP4:Professionalandethicalresponsibilities(e.g.,thenatureofprofessionalism,codes ofethics,ethicaldissent,andwhistle-blowing)
SP5:Risksandliabilitiesofcomputer-basedsystems(e.g.,historicalexamplesof softwarerisks)
SP6:Intellectualproperty(e.g.,foundationsofintellectualproperty,copyrights, patents,andsoftwarepiracy)
SP7:Privacyandcivilliberties(e.g.,ethicalandlegalbasisforprivacyprotection, technologicalstrategiesforprivacyprotection)
SP8:Computercrime(e.g.,historyandexamplesofcomputercrime,hacking,viruses, andcrimepreventionstrategies)
SP9:Economicissuesincomputing(e.g.,monopoliesandtheireconomicimplications; effectofskilledlaborsupply)
SP10:Philosophicalframeworks(e.g.,ethicaltheory,utilitarianism,relativism)
All10SPunitsarecoveredinthistextbook.TopicsdescribedinSP1areexaminedin Chapters1and10,andtopicsincludedinSP2arediscussedinChapters1and11.The methodsandanalyticaltoolsmentionedinSP3aredescribedatlengthinChapters2and 3,whereasprofessionalissuesinvolvingcodesofconductandprofessionalresponsibility describedinSP4areincludedinChapters4and12.AlsodiscussedinChapter4,aswellas inChapter6,areissuesinvolvingrisksandliabilities(SP5).Intellectualpropertyissues (SP6)arediscussedindetailinChapter8andincertainsectionsofChapter9,whereas privacyandcivillibertyconcerns(SP7)arediscussedmainlyinChapters5and12. Chapters6and7examinetopicsdescribedinSP8.Economicissues(SP9)areconsidered inChapters9and10.Andphilosophicalframeworksofethics,includingethicaltheory (SP10),arediscussedinChapters1and2.
Table1illustratesthecorrespondingconnectionbetweenSPunitsandthechapters ofthisbook.
TABLE1SP(“Knowledge”)UnitsandCorrespondingBookChapters
SPunit12345678910
Chapter(s)1,101,112,34,124,68,95,126,79,101,2