ebook img

Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing, 4th Edition PDF

456 Pages·2012·3.232 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing, 4th Edition

FFIRS3GXML 10/20/2012 0:58:24 Page4 FFIRS3GXML 10/20/2012 0:58:24 Page1 (cid:2) FOURTH EDITION ETHICS AND TECHNOLOGY Controversies, Questions, and Strategies for Ethical Computing HERMAN T. TAVANI Rivier University FFIRS3GXML 10/20/2012 0:58:24 Page2 VP& Executive Publisher: Donald Fowley Executive Editor: Beth LangGolub EditorialAssistant: Katherine Willis Marketing Manager: ChrisRuel Marketing Assistant: Marissa Carroll Associate Production Manager: Joyce Poh Production Editor: Jolene Ling Designer: Kenji Ngieng Cover PhotoCredit: BernhardLang/Getty Images, Inc. Production ManagementServices: ThomsonDigital Thisbookwassetin10/12TimesTenLTStd-RomanbyThomsonDigital,andprintedandboundbyEdwardsBrothersMalloy. ThecoverwasprintedbyEdwardsBrothersMalloy. Thisbookisprintedonacidfreepaper. Foundedin1807,JohnWiley&Sons,Inc.hasbeenavaluedsourceofknowledgeandunderstandingformorethan200years, helpingpeoplearoundtheworldmeettheirneedsandfulfilltheiraspirations.Ourcompanyisbuiltonafoundationofprinciples thatincluderesponsibilitytothecommunitiesweserveandwhereweliveandwork.In2008,welaunchedaCorporate CitizenshipInitiative,aglobalefforttoaddresstheenvironmental,social,economic,andethicalchallengeswefaceinour business.Amongtheissuesweareaddressingarecarbonimpact,paperspecificationsandprocurement,ethicalconductwithin ourbusinessandamongourvendors,andcommunityandcharitablesupport.Formoreinformation,pleasevisitourwebsite: www.wiley.com/go/citizenship. Copyright#2013,2011,2007,2004JohnWiley&Sons,Inc.Allrightsreserved.Nopartofthispublicationmaybereproduced, storedinaretrievalsystemortransmittedinanyformorbyanymeans,electronic,mechanical,photocopying,recording, scanningorotherwise,exceptaspermittedunderSections107or108ofthe1976UnitedStatesCopyrightAct,withouteitherthe priorwrittenpermissionofthePublisher,orauthorizationthroughpaymentoftheappropriateper-copyfeetotheCopyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, website www.copyright.com. Requests to the Publisher for permissionshouldbeaddressedtothePermissionsDepartment,JohnWiley&Sons,Inc.,111RiverStreet,Hoboken,NJ07030- 5774, (201)748-6011, fax (201)748-6008, website http://www.wiley.com/go/permissions. Evaluationcopiesareprovidedtoqualifiedacademicsandprofessionalsforreviewpurposesonly,foruseintheircoursesduring thenextacademicyear.Thesecopiesarelicensedandmaynotbesoldortransferredtoathirdparty.Uponcompletionofthe reviewperiod,pleasereturntheevaluationcopytoWiley.Returninstructionsandafreeofchargereturnmailinglabelare available at www.wiley.com/go/returnlabel. If you have chosen to adopt this textbook for use in your course, please accept this bookasyourcomplimentarydeskcopy.OutsideoftheUnitedStates,pleasecontactyourlocalsalesrepresentative. LibraryofCongressCataloging-in-PublicationData Tavani,HermanT. Ethicsandtechnology:controversies,questions,andstrategiesforethical computing/HermanT.Tavani,RivierUniversity—Fourthedition. pagescm Includesbibliographicalreferencesandindex. ISBN978-1-118-28172-7(pbk.) 1. Computernetworks—Moralandethicalaspects. I. Title. TK5105.5.T3852013 175—dc23 2012028589 PrintedintheUnitedStatesofAmerica 10 9 8 7 6 5 4 3 2 1 FFIRS3GXML 10/20/2012 0:58:24 Page3 In memory of my grandparents, Leon and Marian (Roberts) Hutton, and Antonio and Clelia (Giamberardino) Tavani FFIRS3GXML 10/20/2012 0:58:24 Page4 FTOC3GXML 10/20/2012 1:3:1 Page5 (cid:2) CONTENTS AT A GLANCE PREFACE xvii ACKNOWLEDGMENTS xxvii FOREWORD xxix CHAPTER1. INTRODUCTION TO CYBERETHICS: CONCEPTS,PERSPECTIVES, ANDMETHODOLOGICAL FRAMEWORKS 1 CHAPTER2. ETHICAL CONCEPTS ANDETHICAL THEORIES: ESTABLISHING ANDJUSTIFYING AMORAL SYSTEM 33 CHAPTER3. CRITICAL REASONING SKILLS FOREVALUATING DISPUTES IN CYBERETHICS 74 CHAPTER4. PROFESSIONAL ETHICS, CODESOFCONDUCT, ANDMORAL RESPONSIBILITY 101 CHAPTER5. PRIVACY AND CYBERSPACE 131 CHAPTER6. SECURITY INCYBERSPACE 174 CHAPTER7. CYBERCRIME ANDCYBER-RELATED CRIMES 201 CHAPTER8. INTELLECTUAL PROPERTY DISPUTES IN CYBERSPACE 230 CHAPTER9. REGULATING COMMERCE ANDSPEECH IN CYBERSPACE 269 CHAPTER10. THE DIGITALDIVIDE, DEMOCRACY, ANDWORK 303 CHAPTER11. ONLINE COMMUNITIES,CYBER IDENTITIES, AND SOCIAL NETWORKS 337 CHAPTER12. ETHICAL ASPECTSOFEMERGING ANDCONVERGING TECHNOLOGIES 368 GLOSSARY 411 INDEX 417 v FTOC3GXML 10/20/2012 1:3:1 Page6 FTOC3GXML 10/20/2012 1:3:1 Page7 (cid:2) TABLE OF CONTENTS PREFACE xvii NewtotheFourthEdition xviii AudienceandScope xix OrganizationandStructureoftheBook xxi TheWebSiteforEthicsandTechnology xxiii ANotetoStudents xxiv NotetoInstructors:ARoadmapforUsingThisBook xxiv ANotetoComputerScienceInstructors xxv ACKNOWLEDGMENTS xxvii FOREWORD xxix cCHAPTER1 INTRODUCTION TO CYBERETHICS: CONCEPTS, PERSPECTIVES, AND METHODOLOGICAL FRAMEWORKS 1 Scenario1–1:AFatalCyberbullyingIncidentonMySpace 1 Scenario1–2:ContestingtheOwnershipofaTwitterAccount 2 Scenario1–3:“TheWashingtonienne”Blogger 2 1.1 DefiningKeyTerms:CyberethicsandCybertechnology 3 1.1.1 WhatIsCybertechnology? 4 1.1.2 WhytheTermCyberethics? 5 1.2 TheCyberethicsEvolution:FourDevelopmentalPhasesinCybertechnology 6 1.3 AreCyberethicsIssuesUniqueEthicalIssues? 9 Scenario1–4:DevelopingtheCodeforaComputerizedWeaponSystem 10 Scenario1–5:DigitalPiracy 11 1.3.1 DistinguishingbetweenUniqueTechnologicalFeaturesandUnique EthicalIssues 11 1.3.2 AnAlternativeStrategyforAnalyzingtheDebateabouttheUniqueness ofCyberethicsIssues 12 1.3.3 APolicyVacuuminDuplicatingComputerSoftware 13 1.4 CyberethicsasaBranchofAppliedEthics:ThreeDistinctPerspectives 14 1.4.1 Perspective#1:CyberethicsasaFieldofProfessionalEthics 15 1.4.2 Perspective#2:CyberethicsasaFieldofPhilosophicalEthics 18 1.4.3 Perspective#3:CyberethicsasaFieldofSociological/DescriptiveEthics 21 Scenario1–6:TheImpactofTechnologyXonthePleasantvilleCommunity 21 1.5 AComprehensiveCyberethicsMethodology 24 1.5.1 A“Disclosive”MethodforCyberethics 25 1.5.2 AnInterdisciplinaryandMultilevelMethodforAnalyzing CyberethicsIssues 26 1.6 AComprehensiveStrategyforApproachingCyberethicsIssues 27 1.7 ChapterSummary 28 vii FTOC3GXML 10/20/2012 1:3:1 Page8 viii c Table ofContents ReviewQuestions 28 DiscussionQuestions 29 Essay/PresentationQuestions 29 ScenariosforAnalysis 29 Endnotes 30 References 31 FurtherReadings 32 OnlineResources 32 cCHAPTER2 ETHICAL CONCEPTS AND ETHICAL THEORIES: ESTABLISHING AND JUSTIFYING A MORAL SYSTEM 33 2.1 EthicsandMorality 33 Scenario2–1:The“RunawayTrolley”:AClassicMoralDilemma 34 2.1.1 WhatIsMorality? 35 2.1.2 DerivingandJustifyingtheRulesandPrinciplesofaMoralSystem 38 2.2 DiscussionStoppersasRoadblockstoMoralDiscourse 42 2.2.1 DiscussionStopper#1:PeopleDisagreeonSolutionsto MoralIssues 43 2.2.2 DiscussionStopper#2:WhoAmItoJudgeOthers? 45 2.2.3 DiscussionStopper#3:MoralityIsSimplyaPrivateMatter 47 2.2.4 DiscussionStopper#4:MoralityIsSimplyaMatterforIndividual CulturestoDecide 48 Scenario2–2:ThePerilsofMoralRelativism 49 2.3 WhyDoWeNeedEthicalTheories? 52 2.4 Consequence-BasedEthicalTheories 53 2.4.1 ActUtilitarianism 55 Scenario2–3:AControversialPolicyinNewmerica 55 2.4.2 RuleUtilitarianism 55 2.5 Duty-BasedEthicalTheories 56 2.5.1 RuleDeontology 57 Scenario2–4:MakinganExceptionforOneself 58 2.5.2 ActDeontology 59 Scenario2–5:ADilemmaInvolvingConflictingDuties 60 2.6 Contract-BasedEthicalTheories 61 2.6.1 SomeCriticismsofContract-BasedTheories 62 2.6.2 Rights-BasedContractTheories 63 2.7 Character-BasedEthicalTheories 64 2.7.1 BeingaMoralPersonvs.FollowingMoralRules 64 2.7.2 Acquiringthe“Correct”Habits 65 2.8 IntegratingAspectsofClassicalEthicalTheoriesintoaSingle ComprehensiveTheory 66 2.8.1 Moor’sJust-ConsequentialistTheoryandItsApplicationto Cybertechnology 67 2.8.2 KeyElementsinMoor’sJust-ConsequentialistFramework 69 2.9 ChapterSummary 70 ReviewQuestions 70 DiscussionQuestions 71 Essay/PresentationQuestions 71 ScenariosforAnalysis 72 Endnotes 72

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.