Ethics and technology: controversies, questions, strategies for ethical - The full ebook version is

Page 1


The Impact of Populism on European Institutions and Civil Society: Discourses, Practices, and Policies Carlo Ruzza (Editor)

https://ebookmass.com/product/the-impact-of-populism-on-europeaninstitutions-and-civil-society-discourses-practices-and-policiescarlo-ruzza-editor/

ebookmass.com

In Search of Truth Sharon Wray

https://ebookmass.com/product/in-search-of-truth-sharon-wray-3/

ebookmass.com

Gymnasia and Greek Identity in Ptolemaic Egypt 1st Edition Mario C. D. Paganini

https://ebookmass.com/product/gymnasia-and-greek-identity-inptolemaic-egypt-1st-edition-mario-c-d-paganini/

ebookmass.com

Natural Obsession (Au Naturel Nights Book 1) Anna Durand

https://ebookmass.com/product/natural-obsession-au-naturel-nightsbook-1-anna-durand/

ebookmass.com

Poisoning & Drug Overdose 7th Edition Kent R. Olson (Ed.)

https://ebookmass.com/product/poisoning-drug-overdose-7th-editionkent-r-olson-ed/

ebookmass.com

Shakespeare in the Theatre: Sarah Siddons and John Philip

Kemble Fiona Ritchie

https://ebookmass.com/product/shakespeare-in-the-theatre-sarahsiddons-and-john-philip-kemble-fiona-ritchie/

ebookmass.com

PREFACExvii

TABLEOFCONTENTS

Newtothe FourthEdition xviii

AudienceandScopexix

OrganizationandStructureoftheBookxxi

TheWebSitefor EthicsandTechnology xxiii

ANotetoStudentsxxiv

NotetoInstructors:ARoadmapforUsingThisBookxxiv

ANotetoComputerScienceInstructorsxxv

ACKNOWLEDGMENTSxxvii FOREWORDxxix

c CHAPTER1

INTRODUCTIONTOCYBERETHICS:CONCEPTS,PERSPECTIVES, ANDMETHODOLOGICALFRAMEWORKS1

Scenario1–1:AFatalCyberbullyingIncidentonMySpace1

Scenario1–2:ContestingtheOwnershipofaTwitterAccount2

Scenario1–3: “TheWashingtonienne” Blogger2

1.1DefiningKeyTerms:CyberethicsandCybertechnology3

1.1.1WhatIsCybertechnology?4

1.1.2WhytheTermCyberethics?5

1.2TheCyberethicsEvolution:FourDevelopmentalPhasesinCybertechnology6

1.3AreCyberethicsIssuesUniqueEthicalIssues?9

Scenario1–4:DevelopingtheCodeforaComputerizedWeaponSystem10

Scenario1–5:DigitalPiracy11

1.3.1DistinguishingbetweenUniqueTechnologicalFeaturesandUnique EthicalIssues11

1.3.2AnAlternativeStrategyforAnalyzingtheDebateabouttheUniqueness ofCyberethicsIssues12

1.3.3APolicyVacuuminDuplicatingComputerSoftware13

1.4CyberethicsasaBranchofAppliedEthics:ThreeDistinctPerspectives14

1.4.1Perspective#1:CyberethicsasaFieldofProfessionalEthics15

1.4.2Perspective#2:CyberethicsasaFieldofPhilosophicalEthics18

1.4.3Perspective#3:CyberethicsasaFieldofSociological/DescriptiveEthics21

Scenario1–6:TheImpactofTechnologyXonthePleasantvilleCommunity21

1.5AComprehensiveCyberethicsMethodology24

1.5.1A “Disclosive” MethodforCyberethics25

1.5.2AnInterdisciplinaryandMultilevelMethodforAnalyzing CyberethicsIssues26

1.6AComprehensiveStrategyforApproachingCyberethicsIssues27

1.7ChapterSummary28

References73 FurtherReadings73

c CHAPTER3

CRITICALREASONINGSKILLSFOREVALUATINGDISPUTESINCYBERETHICS74

3.1GettingStarted74

Scenario3–1:ReasoningAboutWhethertoDownloadaFilefrom “Sharester” 75

3.1.1DefiningTwoKeyTermsinCriticalReasoning:ClaimsandArguments75

3.1.2TheRoleofArgumentsinDefendingClaims76

3.1.3TheBasicStructureofanArgument76

3.2ConstructinganArgument78

3.3ValidArguments80

3.4SoundArguments83

3.5InvalidArguments85

3.6InductiveArguments86

3.7FallaciousArguments87

3.8ASeven-StepStrategyforEvaluatingArguments89

3.9IdentifyingSomeCommonFallacies91

3.9.1 AdHominem Argument92

3.9.2SlipperySlopeArgument92

3.9.3FallacyofAppealtoAuthority93

3.9.4FalseCauseFallacy93

3.9.5BeggingtheQuestion94

3.9.6FallacyofComposition/FallacyofDivision94

3.9.7FallacyofAmbiguity/Equivocation95

3.9.8AppealtothePeople(ArgumentumadPopulum)95

3.9.9TheMany/AnyFallacy96

3.9.10TheVirtualityFallacy97

3.10ChapterSummary98

ReviewQuestions98

DiscussionQuestions98

Essay/PresentationQuestions99 ScenariosforAnalysis99

Endnotes99 References100

FurtherReadings100

c CHAPTER4 PROFESSIONALETHICS,CODESOFCONDUCT,ANDMORALRESPONSIBILITY101

4.1ProfessionalEthics102

4.1.1WhatIsaProfession?103

4.1.2WhoIsaProfessional?103

4.1.3WhoIsaComputer/ITProfessional?104

4.2DoComputer/ITProfessionalsHaveAnySpecialMoralResponsibilities?105

4.2.1Safety-CriticalSoftware105

4.3ProfessionalCodesofEthicsandCodesofConduct106

4.3.1ThePurposeofProfessionalCodes107

4.3.2SomeCriticismsofProfessionalCodes108

4.3.3DefendingProfessionalCodes109

4.3.4TheIEEE-CS/ACMSoftwareEngineeringCodeofEthicsandProfessional Practice110

4.4ConflictsofProfessionalResponsibility:EmployeeLoyaltyandWhistle-Blowing112

4.4.1DoEmployeesHaveanObligationofLoyaltytoEmployers?112

4.4.2Whistle-BlowingIssues114

Scenario4–1:Whistle-Blowingandthe “StarWars” Controversy115

4.4.3AnAlternativeStrategyforUnderstandingProfessionalResponsibility117

4.5MoralResponsibility,LegalLiability,andAccountability117

4.5.1DistinguishingResponsibilityfromLiabilityandAccountability118

4.5.2AccountabilityandtheProblemof “ManyHands” 119

Scenario4–2:TheTherac-25Machine120

4.5.3LegalLiabilityandMoralAccountability120

4.6RiskAssessmentintheSoftwareDevelopmentProcess121

Scenario4–3:TheAegisRadarSystem121

4.7DoSomeComputerCorporationsHaveSpecialMoralObligations?122

4.7.1SpecialResponsibilitiesforSearchEngineCompanies123

4.7.2SpecialResponsibilitiesforCompaniesthatDevelopAutonomousSystems124

4.8ChapterSummary125

ReviewQuestions126

DiscussionQuestions126

Essay/PresentationQuestions126

ScenariosforAnalysis127

Endnotes128 References128 FurtherReadings130

c CHAPTER5 PRIVACYANDCYBERSPACE131

5.1ArePrivacyConcernsAssociatedwithCybertechnologyUniqueorSpecial?132

5.2WhatisPersonalPrivacy?134

5.2.1AccessibilityPrivacy:FreedomfromUnwarrantedIntrusion135

5.2.2DecisionalPrivacy:FreedomfromInterferenceinOne’s PersonalAffairs135

5.2.3InformationalPrivacy:ControlovertheFlowofPersonal Information136

5.2.4AComprehensiveAccountofPrivacy136

Scenario5–1:DescriptivePrivacy137

Scenario5–2:NormativePrivacy137

5.2.5Privacyas “ContextualIntegrity” 137

Scenario5–3:PreservingContextualIntegrityinaUniversitySeminar138

5.3WhyisPrivacyImportant?139

5.3.1IsPrivacyanIntrinsicValue?140

5.3.2PrivacyasaSocialValue141

5.4GatheringPersonalData:Monitoring,Recording,andTrackingTechniques141

5.4.1 “Dataveillance” Techniques141

5.4.2InternetCookies142

5.4.3RFIDTechnology143

5.4.4CybertechnologyandGovernmentSurveillance145

5.5ExchangingPersonalData:MergingandMatchingElectronicRecords146

5.5.1MergingComputerizedRecords146

Scenario5–4:MergingPersonalInformationinUnrelatedComputerDatabases147

5.5.2MatchingComputerizedRecords148

Scenario5–5:UsingBiometricTechnologyatSuperBowlXXXV149

5.6MiningPersonalData150

5.6.1HowDoesDataMiningThreatenPersonalPrivacy?150

Scenario5–6:DataMiningattheXYZBank151

5.6.2WebMining154

Scenario5–7:TheFacebookBeaconControversy154

5.7ProtectingPersonalPrivacyinPublicSpace156

Scenario5–8:ShoppingatSuperMart157

Scenario5–9:ShoppingatNile.com157

5.7.1SearchEnginesandtheDisclosureofPersonalInformation158

Scenario5–10:TrackingYourSearchRequestsonGoogle159

5.7.2AccessingOnlinePublicRecords160

Scenario5–11:AccessingOnlinePublicRecordsinPleasantville161

Scenario5–12:AccessingaState’sMotorVehicleRecordsOnline162

5.8Privacy-EnhancingTechnologies162

5.8.1EducatingUsersaboutPETs163

5.8.2PETsandthePrincipleofInformedConsent163

5.9PrivacyLegislationandIndustrySelf-Regulation164

5.9.1IndustrySelf-RegulationInitiativesRegardingPrivacy164

Scenario5–13:ControversiesInvolvingGoogle’sPrivacyPolicy166

5.9.2PrivacyLawsandDataProtectionPrinciples166

5.10ChapterSummary168

ReviewQuestions169 DiscussionQuestions169

Essay/PresentationQuestions170 ScenariosforAnalysis170 Endnotes171 References171 FurtherReadings173

c CHAPTER6 SECURITYINCYBERSPACE174

6.1SecurityintheContextofCybertechnology174

6.1.1CybersecurityasRelatedtoCybercrime175

6.1.2SecurityandPrivacy:SomeSimilaritiesandSomeDifferences175

6.2ThreeCategoriesofCybersecurity176

6.2.1DataSecurity:Confidentiality,Integrity,andAvailability ofInformation177

6.2.2SystemSecurity:Viruses,Worms,andMalware178

Scenario6–1:TheConfickerWorm178

6.2.3NetworkSecurity:ProtectingourInfrastructure179

Scenario6–2:TheGhostNetControversy179

6.3 “CloudComputing” andSecurity180

6.3.1DeploymentandService/DeliveryModelsfortheCloud181

6.3.2SecuringUserDataResidingintheCloud182

6.4Hackingand “TheHackerEthic” 183

6.4.1WhatIs “TheHackerEthic”?184

6.4.2AreComputerBreak-insEverEthicallyJustifiable?186

6.5Cyberterrorism187

6.5.1Cyberterrorismvs.Hacktivism188

Scenario6–3: Anonymous andthe “OperationPayback” Attack189

6.5.2CybertechnologyandTerroristOrganizations190

8.8.1ThePIPAandSOPABattles261

8.8.2RWAandPublicAccesstoHealth-RelatedInformation261

Scenario8–7:ElsevierPressand “TheCostofKnowledge” Boycott262

8.8.3IntellectualPropertyBattlesintheNearFuture263

8.9ChapterSummary264

ReviewQuestions264

DiscussionQuestions265

Essay/PresentationQuestions265

ScenariosforAnalysis265 Endnotes266 References267

FurtherReadings268

c CHAPTER9 REGULATINGCOMMERCEANDSPEECHINCYBERSPACE269

9.1BackgroundIssuesandSomePreliminaryDistinctions270

9.1.1TheOntologyofCyberspace:IstheInternetaMediumoraPlace?270

9.1.2TwoCategoriesofCyberspaceRegulation271

9.2FourModesofRegulation:TheLessigModel273

9.3DigitalRightsManagementandthePrivatizationofInformationPolicy274

9.3.1DRMTechnology:ImplicationsforPublicDebateonCopyrightIssues274

Scenario9–1:TheSonyRootkitControversy275

9.3.2PrivatizingInformationPolicy:ImplicationsfortheInternet276

9.4TheUseandMisuseof(HTML)MetatagsandWebHyperlinks278

9.4.1IssuesSurroundingtheUse/AbuseofHTMLMetatags278

Scenario9–2:ADeceptiveUseofHTMLMetatags279

9.4.2HyperlinkingandDeepLinking279

Scenario9–3:DeepLinkingontheTicketmasterWebSite280

9.5E-MailSpam281

9.5.1DefiningSpam281

9.5.2WhyIsSpamMorallyObjectionable?282

9.6FreeSpeechvs.CensorshipandContentControlinCyberspace284

9.6.1ProtectingFreeSpeech284

9.6.2DefiningCensorship285

9.7PornographyinCyberspace286

9.7.1Interpreting “CommunityStandards” inCyberspace286

9.7.2InternetPornographyLawsandProtectingChildrenOnline287

9.7.3VirtualChildPornography288 Scenario9–4:ASextingIncidentInvolvingGreensburgSalemHighSchool290

9.8HateSpeechandSpeechthatcanCausePhysicalHarmtoOthers292

9.8.1HateSpeechontheWeb292

9.8.2Online “Speech” thatCanCausePhysicalHarmtoOthers294

9.9 “NetworkNeutrality” andtheFutureofInternetRegulation294

9.9.1DefiningNetworkNeutrality295

9.9.2SomeArgumentsAdvancedbyNetNeutrality’sProponentsandOpponents296

9.9.3FutureImplicationsfortheNetNeutralityDebate296

9.10ChapterSummary297

ReviewQuestions298

DiscussionQuestions298 Essay/PresentationQuestions299 ScenariosforAnalysis299 Endnotes300

References300 FurtherReadings301

c CHAPTER10

THEDIGITALDIVIDE,DEMOCRACY,ANDWORK303

10.1TheDigitalDivide304

10.1.1TheGlobalDigitalDivide304

10.1.2TheDigitalDividewithinNations305 Scenario10–1:ProvidingIn-HomeInternetServiceforPublicSchoolStudents306

10.1.3IstheDigitalDivideanEthicalIssue?307

10.2CybertechnologyandtheDisabled309

10.2.1DisabledPersonsandRemoteWork310

10.2.2ArgumentsforContinuedWAISupport311

10.3CybertechnologyandRace312

10.3.1InternetUsagePatterns312

10.3.2RacismandtheInternet313

10.4CybertechnologyandGender314

10.4.1AccesstoHigh-TechnologyJobs315

10.4.2GenderBiasinSoftwareDesignandVideoGames317

10.5Cybertechnology,Democracy,andDemocraticIdeals317

10.5.1HasCybertechnologyEnhancedorThreatenedDemocracy?318

10.5.2HowhasCybertechnologyAffectedPoliticalElectionsin DemocraticNations?322

10.6TheTransformationandtheQualityofWork324

10.6.1JobDisplacementandtheTransformedWorkplace324

10.6.2TheQualityofWorkLifeintheDigitalEra328

Scenario10–2:EmployeeMonitoringandtheCaseof Ontariov.Quon329

10.7ChapterSummary331

ReviewQuestions332 DiscussionQuestions332

Essay/PresentationQuestions333

ScenariosforAnalysis333 Endnotes334 References335 FurtherReadings336

c CHAPTER11 ONLINECOMMUNITIES,CYBERIDENTITIES,ANDSOCIALNETWORKS337

11.1OnlineCommunitiesandSocialNetworkingServices337

11.1.1OnlineCommunitiesvs.TraditionalCommunities337

11.1.2BlogsintheContextofOnlineCommunities339

11.1.3AssessingProsandConsofOnlineCommunities339

Scenario11–1:AVirtualRapeinCyberspace342

11.2VirtualEnvironmentsandVirtualReality343

11.2.1WhatisVirtualReality(VR)?344

11.2.2EthicalControversiesInvolvingBehaviorinVRApplicationsandGames345

11.2.3Misrepresentation,Bias,andIndecentRepresentationsinVRApplications349

11.3CyberIdentitiesandCyberSelves:PersonalIdentityandOurSenseofSelf intheCyberEra351

11.3.1Cybertechnologyasa “MediumofSelf-Expression” 352

11.3.2 “MUDSelves” andDistributedPersonalIdentities352

11.3.3TheImpactofCybertechnologyonOurSenseofSelf353

11.4AIanditsImplicationsforWhatitMeanstobeHuman355

fieldofmachineethicsarebutafewofthemanynewquestionsweexamineinthefourth editionof EthicsandTechnology.

Althoughnewtechnologiesemerge,andexistingtechnologiescontinuetomature andevolve,manyoftheethicalissuesassociatedwiththemarebasicallyvariationsof existingethicalproblems.Atbottom,theseissuesreducetotraditionalethicalconcerns havingtodowithdignity,respect,fairness,obligationstoassistothersinneed,andso forth.So,weshouldnotinferthatthemorallandscapeitselfhasbeenalteredbecauseof behaviorsmadepossiblebythesetechnologies.Wewillseethat,forthemostpart,the newissuesexaminedinthiseditionof EthicsandTechnology aresimilarinrelevant respectstothekindsofethicalissuesweexaminedinthebook’spreviouseditions. However,manyemergingtechnologiespresentuswithchallengesthat,initiallyatleast, donotseemto fiteasilyintoourconventionalethicalcategories.So,amajorobjectiveof thistextbookistoshowhowthosecontroversiescanbeanalyzedfromtheperspectiveof standardethicalconceptsandtheories.

Thepurposeof EthicsandTechnology,asstatedintheprefacestothethreeprevious editionsofthisbook,istointroducestudentstoissuesandcontroversiesthatcomprise therelativelynew fieldofcyberethics.Theterm “cyberethics” isusedinthistextbookto refertothe fieldofstudythatexaminesmoral,legal,andsocialissuesinvolving cybertechnology. Cybertechnology,inturn,referstoabroadspectrumofcomputing/ informationandcommunicationtechnologiesthatrangefromstand-alonecomputersto thecurrentclusterofnetworkeddevicesandtechnologies.Manyofthesetechnologies includedevicesandapplicationsthatareconnectedtoprivatelyownedcomputer networksaswellastotheInternetitself.

Thistextbookexaminesawiderangeofcyberethicsissues fromspecificissuesof moralresponsibilitythatdirectlyaffectcomputerandinformationtechnology(IT) professionalstobroadersocialandethicalconcernsthataffecteachofusinourdayto-daylives.Questionsabouttherolesandresponsibilitiesofcomputer/ITprofessionals indevelopingsafeandreliablecomputersystemsareexaminedunderthecategoryof professionalethics.Broadersocialandethicalconcernsassociatedwithcybertechnology areexaminedundertopicssuchasprivacy,security,crime,intellectualproperty,Internet regulation,andsoforth.

c NEWTOTHE FOURTHEDITION

Newpedagogicalmaterial includes anewlydesignedsetofend-of-chapterexercisescalled “ScenariosforAnalysis,” whichcanbeusedforeitherin-classanalysisorgroupprojects; newand/orupdated(in-chapter) scenarios,illustratingbothactualcasesand hypotheticalsituations,whichenablestudentstoapplymethodologicalconcepts/ frameworksandethicaltheoriescoveredinChapters1and2; new samplearguments insomechapters,whichenablestudentstoapplythetools forargumentanalysiscoveredinChapter3; updated “reviewquestions,”“discussionquestions,” and “essay/presentation questions” attheendofchapters;

ORGANIZATIONANDSTRUCTUREOFTHEBOOK

EthicsandTechnology isorganizedinto12chapters.Chapter1, “Introductionto Cyberethics:Concepts,Perspectives,andMethodologicalFrameworks,” defineskey conceptsandtermsthatwillappearthroughoutthebook.Forexample,de finitionsof termssuchas cyberethics and cybertechnology areintroducedinthischapter.Wethen examinewhetheranyethicalissuesinvolvingcybertechnologyareuniqueethicalissues. Wealsoconsiderhowwecanapproachcyberethicsissuesfromthreedifferentperspectives:professionalethics,philosophicalethics,andsociological/descriptiveethics,eachof whichrepresentstheapproachgenerallytakenbyacomputerscientist,aphilosopher, andasocial/behavioralscientist.Chapter1concludeswithaproposalforacomprehensiveandinterdisciplinarymethodologicalschemeforanalyzingcyberethicsissuesfrom theseperspectives.

InChapter2, “EthicalConceptsandEthicalTheories:EstablishingandJustifyinga MoralSystem,” weexaminesomeofthebasicconceptsthatmakeupamoralsystem.We drawadistinctionbetween “ethics” and “morality” byde finingethicsas “thestudy ofmorality.”“Morality,” oramoralsystem,isdefinedasaninformal,publicsystem comprisingrulesofconductandprinciplesforevaluatingthoserules.Wethenexamine consequence-based,duty-based,character-based,andcontract-basedethicaltheories. Chapter2concludeswithamodelthatintegrateselementsofcompetingethicaltheories intoonecomprehensiveandunifiedtheory.

Chapter3, “CriticalReasoningSkillsforEvaluatingDisputesinCyberethics,” includesabriefoverviewofbasicconceptsandstrategiesthatareessentialfordebating moralissuesinastructuredandrationalmanner.Webeginbydescribingthestructureof alogicalargumentandshowhowargumentscanbeconstructedandanalyzed.Next, weexamineatechniquefordistinguishingbetweenargumentsthatarevalidandinvalid, soundandunsound,andinductiveandfallacious.Weillustrateexamplesofeachtype withtopicsaffectingcybertechnologyandcyberethics.Finally,weidentifysomestrategiesforspottingandlabeling “informal” logicalfallaciesthatfrequentlyoccurin everydaydiscourse.

Chapter4, “ProfessionalEthics,CodesofConduct,andMoralResponsibility, ” examinesissuesrelatedtoprofessionalresponsibilityforcomputer/ITprofessionals. Weconsiderwhetherthereareanyspecialmoralresponsibilitiesthatcomputer/IT professionalshave as professionals.Wethenexaminesomeprofessionalcodesof conductedthathavebeenadoptedbycomputerorganizations.Wealsoask:Towhat extentaresoftwareengineersresponsibleforthereliabilityofthecomputersystemsthey designanddevelop,especiallyapplicationsthatinclude “life-critical” and “safetycritical” software?Arecomputer/ITprofessionalseverpermitted,orperhapseven required,to “blowthewhistle” whentheyhavereasonableevidencetosuggestthata computersystemisunreliable?Finally,weexaminesomeschemesforanalyzingrisks associatedwiththedevelopmentofsafety-criticalsoftware.

WediscussprivacyissuesinvolvingcybertechnologyinChapter5.First,weexamine theconceptofprivacyaswellassomeargumentsforwhyprivacyisconsideredan importanthumanvalue.Wethenlookathowpersonalprivacyisthreatenedbythekinds ofsurveillancetechniquesanddata-collectionschemesmadepossiblebycybertechnology.Specificdata-gatheringanddata-exchangingtechniquesareexaminedindetail. WenextconsidersomechallengesthatdataminingandWebminingposeforprotecting

personalprivacyinpublicspace.InChapter5,wealsoconsiderwhethertechnologyitself, intheformofprivacy-enhancingtechnologies(orPETs),canprovideanadequate solutiontosomeprivacyissuesgeneratedbycybertechnology.

Chapter6, “SecurityinCyberspace,” examinessecuritythreatsinthecontextof computersandcybertechnology.Initially,wedifferentiatethreedistinctsensesof “security”:datasecurity,systemsecurity,andnetworksecurity.Wethenexaminethe conceptsof “hacker” and “hackerethic,” andweaskwhethercomputerbreak-inscan everbemorallyjustified.Next,wedifferentiateactsof “hacktivism,” cyberterrorism,and informationwarfare.Chapter6concludeswithabriefexaminationofriskanalysisinthe contextofcybersecurity.

Webeginouranalysisofcybercrime,inChapter7,byconsideringwhetherwe canconstructaprofileofa “typical” cybercriminal.Wethenproposeadefinition ofcybercrimethatenablesustodistinguishbetween “cyberspecific” and “cyber-related” crimestoseewhethersuchadistinctionwouldaidintheformulationofmorecoherent cybercrimelaws.Wealsoconsiderthenotionoflegaljurisdictionincyberspace, especiallywithrespecttotheprosecutionofcybercrimesthatinvolveinterstateand internationalvenues.Inaddition,weexaminetechnologicaleffortstocombatcybercrime,suchascontroversialusesofbiometrictechnologies.

Chapters8and9examinelegalissuesinvolvingintellectualpropertyandfreespeech, respectively,astheyrelatetocyberspace.OneobjectiveofChapter8, “Intellectual PropertyDisputesinCyberspace,” istoshowwhyanunderstandingoftheconceptof intellectualpropertyisimportantinaneraofdigitalinformation.Weconsiderthree theoriesofpropertyrightsandmakeimportantdistinctionsamonglegalconceptssuchas copyrightlaw,patentprotection,andtrademarks.Additionally,weconsiderspecific scenariosinvolvingintellectualpropertydisputes,includingtheoriginalNapstercontroversyaswellassomerecentpeer-to-peer(P2P)networksthathavebeenusedfor file sharing.WealsoexaminetheFreeSoftwareandtheOpenSourceSoftwareinitiatives. Finally,weconsideracompromisesolutionthatsupportsandencouragesthesharingof digitalinformationinanerawhenstrongcopyrightlegislationseemstodiscourage thatpractice.

Chapter9, “RegulatingCommerceandSpeechinCyberspace,” looksatadditional legalissues,especiallyastheyinvolveregulatoryconcernsincyberspace.Wedraw distinctionsbetweentwodifferentsensesof “regulation” asitappliestocyberspace,and wealsoconsiderwhethertheInternetshouldbeunderstoodasamediumorasa “place.” Wealsoexaminecontroversiessurroundinge-mailspam,whichsomebelievecanbe viewedasaformof “speech” incyberspace.Wethenaskwhetherallformsofonlinespeech shouldbegrantedlegalprotection;forexample,shouldchildpornography,hatespeech, andspeechthatcancausephysicalharmtoothersbetoleratedinonlineforums?

Chapter10examinesawiderangeofequity-and-accessissuesfromtheperspective ofcybertechnology’simpactforsociodemographicgroups(affectingclass,race,and gender).Thechapterbeginswithananalysisofglobalaspectsofthe “digitaldivide.” We thenexaminespeci ficequity-and-accessissuesaffectingdisabledpersons,racialminorities,andwomen.Next,weexploretherelationshipbetweencybertechnologyand democracy,andweconsiderwhethertheInternetfacilitatesdemocracyorthreatens it.Wethenexaminesomesocialandethicalissuesaffectingemploymentinthe contemporaryworkplace,andweaskwhethertheuseofcybertechnologyhastransformed workandhasaffectedtheoverallqualityofworklife.

Controversies” isincludedonthebook’sWebsite.Iinviteyourfeedbackastohowthis sitecanbecontinuallyimproved.

c ANOTETOSTUDENTS

Ifyouaretakinganethicscourseforthe firsttime,youmightfeeluncomfortablewiththe prospectofembarkingonastudyofmoralissuesandcontroversialtopicsthatmight initiallycauseyoudiscomfortbecauseethicsissometimesperceivedtobepreachy,andits subjectmatterissometimesviewedasessentiallypersonalandprivateinnature.Because thesearecommonconcerns,Iaddressthemearlyinthetextbook.Idrawadistinction betweenanethicist,whostudiesmoralityora “moralsystem,” andamoralistwhomay assumetohavethecorrectanswerstoallofthequestions;notethataprimaryobjectiveof thisbookistoexamineandanalyzeethicalissues,nottopresumethatanyofusalready has the correctanswertoanyofthequestionsIconsider.

Toaccomplishthisobjective,Iintroducethreetypesofconceptualframeworksearly inthetextbook.InChapter1,Iprovideamethodologicalschemethatenablesyouto identifycontroversialproblemsandissuesinvolvingcybertechnology as ethicalissues. TheconceptualschemeincludedinChapter2,basedonethicaltheory,providessome generalprinciplesthatguideyouranalysisofspeci ficcasesaswellasyourdeliberations aboutwhichkindsofsolutionstoproblemsshouldbeproposed.Athird,and fi nal, conceptualframeworkisintroducedinChapter3intheformofcriticalreasoning techniques,whichprovidesrulesandstandardsthatyoucanuseforevaluatingthe strengthsofcompetingargumentsandfordefendingaparticularpositionthatyoureach onacertainissue.

Thistextbookwasdesignedandwrittenforyou,thestudent!Whetherornotit succeedsinhelpingyoutomeettheobjectivesofacourseincyberethicsisveryimportant tome,soIwelcomeyourfeedbackonthistextbook;andIwouldsincerelyappreciate hearingyourideasonhowthistextbookcouldbeimproved.Pleasefeelfreetowriteto mewithyoursuggestions,comments,andsoforth.Myemailaddressishtavani@rivier .edu.Ilookforwardtohearingfromyou!

c NOTETOINSTRUCTORS:AROADMAPFORUSINGTHISBOOK

Thechaptersthatmakeup EthicsandTechnology aresequencedsothatreadersare exposedtofoundationalissuesandconceptualframeworksbeforetheyexaminespecific problemsincyberethics.Insomecases,itmaynotbepossibleforinstructorstocoverall ofthematerialinChapters1–3.Itisstronglyrecommended,however,thatbefore studentsareassignedmaterialinChapter4,theyatleastreadSections1.1,1.4–1.5,2.4–2.8,and3.1.Instructorsusingthistextbookcandeterminewhichchaptersbestaccommodatetheirspecifi ccourseobjectives.Computerscienceinstructors,forexample,will likelywanttoassignChapter4,onprofessionalethicsandresponsibility,earlyinthe term.Socialscienceinstructors,ontheotherhand,willlikelyexamineissuesdiscussedin Chapters10and11earlyintheircourse.Philosophyinstructorsmaywishtostructure theircoursesbeginningwithathoroughexaminationofthematerialonethicalconcepts

c

ACKNOWLEDGMENTS

Inrevising EthicsandTechnology forafourthedition,Ihaveonceagaindrawnfrom severalofmypreviouslypublishedworks.Chapters1–4,onfoundationalandprofessionalissuesincyberethics,incorporatematerialfromfourarticles: “TheStateof ComputerEthicsasaPhilosophicalFieldofInquiry,” EthicsandInformationTechnology 3,no.2(2001); “ApplyinganInterdisciplinaryApproachtoTeachingComputerEthics,” IEEETechnologyandSocietyMagazine 21,no.3(2002); “TheUniquenessDebatein ComputerEthics,” EthicsandInformationTechnology 4,no.1(2002);and “Search EnginesandEthics,” StanfordEncyclopediaofPhilosophy (2012).

Chapter5,onprivacyincyberspace,alsodrawsfrommaterialinfourworks: “ComputerMatchingandPersonalPrivacy,” ProceedingsoftheSymposiumonComputersandtheQualityofLife (ACMPress,1996); “InformationalPrivacy,DataMining, andtheInternet,” EthicsandInformationTechnology 1,no.2(1999); “PrivacyEnhancingTechnologiesasaPanaceaforOnlinePrivacyConcerns:SomeEthicalConsiderations,” JournalofInformationEthics 9,no.2(2000);and “Applyingthe ‘Contextual Integrity’ ModelofPrivacytoPersonalBlogsintheBlogosphere” (coauthored withFrancesGrodzinsky), InternationalJournalofInternetResearchEthics 3(2010). Chapters6and7,onsecurityandcrimeincyberspace,drawfrommaterialin threesources: “PrivacyandSecurity” inDuncanLangford’sbook InternetEthics (Macmillan/St.Martins,2000); “DefiningtheBoundariesofComputerCrime:Piracy, Trespass,andVandalisminCyberspace” in ReadingsinCyberEthics 2nded.(Jonesand Bartlett,2004);and “Privacyin ‘theCloud’” (coauthoredwithFrancesGrodzinsky), ComputersandSociety 41,no.1(2011).

InChapters8and9,onintellectualpropertyandInternetregulation,Idrewfrom materialin “InformationWantstobeShared:AnAlternativeApproachforAnalyzing IntellectualPropertyDisputesintheInformationAge,” CatholicLibraryWorld 73,no.2 (2002);andtwopaperscoauthoredwithFrancesGrodzinsky: “P2PNetworksandthe Verizonv.RIAA Case,” Ethics andInformationTechnology 7, no.4(2005)and “Online FileSharing:ResolvingtheTensionsbetweenPrivacyandProperty” Computersand Society 38,no.4(2008).Chapters10and11,onthedigitaldivide,democracy,andonline communities,drawfrommaterialfromtwopapers: “EthicalReflectionsontheDigital Divide,” JournalofInformation,CommunicationandEthicsinSociety 1,no.2(2003)and “OnlineCommunities,DemocraticIdeals,andtheDigitalDivide” (coauthoredwith FrancesGrodzinsky)inSorajHongladaromandCharlesEss’sbook InformationTechnologyEthics:CulturalPerspectives (IGIGlobal,2007).

Chapter12,onemergingandconvergingtechnologies,incorporatesmaterialfrom mybook Ethics,Computing,andGenomics (JonesandBartlett,2006),andfromthree recentlypublishedpapers: “CanWeDevelopArti ficialAgentsCapableofMakingGood

MoralDecisions?” MindsandMachines 21,no.3(2011); “TrustandMulti-Agent Systems” (coauthoredwithJeffBuechner), EthicsandInformationTechnology 13, no.1(2011);and “EthicalAspectsofAutonomousSystems” inMichaelDeckerand MathiasGutmann’sbook Robo-andInformation-Ethics (Berlin:VerlagLIT,2012).

Thefourtheditionof EthicsandTechnology hasbenefi tedfromsuggestionsand commentsIreceivedfrommanyanonymousreviewers,aswellasfromthefollowing colleagues:JeffBuechner,LloydCarr,JerryDolan,FrancesGrodzinsky,Kenneth Himma,JamesMoor,MartinMenke,WaynePauley,MarkRosenbaum,ReginaTavani, andJohnWeckert.IamespeciallygratefultoFranGrodzinsky(SacredHeartUniversity),withwhomIhavecoauthoredseveralpapers,forpermittingmetoincorporate elementsofourjointresearchintorelevantsectionsofthisbook.AndIammostgrateful toLloydCarr(RivierUniversity)forhisinvaluablefeedbackonseveralchaptersand sectionsofthiseditionofthebook,whichhewaswillingtoreviewmultipletimes;his astutecommentsandsuggestionshavehelpedmetorefinemanyofthepositionsIdefend inthisbook.

Theneweditionofthebookhasalsobenefi tedfromsomehelpfulcommentsthatI receivedfrommanystudentswhohaveusedpreviouseditionsofthetext.Iamalso gratefultothenumerousreviewersandcolleagueswhocommentedontheprevious editionsofthisbook;manyoftheirhelpfulsuggestionshavebeencarriedovertothe presentedition.

IalsowishtothanktheeditorialandproductionstaffsatWileyandThomsonDigital, especiallyBethGolub,ElizabethMills,KatherineWillis,JoleneLing,andSanchariSil, fortheirsupportduringthevariousstagesoftherevisionprocessforthefourtheditionof EthicsandTechnology.

Finally,Imustonceagainthankthetwomostimportantpeopleinmylife:mywife Joanne,andourdaughterRegina.Withouttheircontinuedsupportandextraordinary patience,thefourtheditionofthisbookcouldnothavebeencompleted.

Thiseditionof EthicsandTechnology isdedicatedtothememoryofmygrandparents:LeonandMarian(Roberts)Hutton,andAntonioandClelia(Giamberardino) Tavani.

Nashua,NH

HermanT.Tavani

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.