ebook img

Ethics for the Information Age PDF

550 Pages·2012·7.645 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Ethics for the Information Age

E thics FOR THE I N F O R M AT I O N A G E FIFTH EDITION This page intentionally left blank E thics FOR THE I N F O R M AT I O N A G E FIFTH EDITION Michael J. Quinn Seattle University VicePresidentandEditorialDirector,ECS MarciaHorton EditorinChief MichaelHirsch EditorialAssistant EmmaSnider VicePresidentMarketing PatriceJones MarketingManager YezAlayan MarketingCoordinator KathrynFerranti VicePresidentandDirectorofProduction VinceO’Brien ManagingEditor JeffHolcomb SeniorProductionProjectManager MarilynLloyd ManufacturingManager NickSklitsis OperationsSpecialist LisaMcDowell TextPermissions,assessment DanaWeightman TextPermissions,clearance DanielleSimon/CreativeCompliance ImagePermissions MelodyEnglish TextDesigner SandraRigney CoverDesigner AnthonyGemmellaro CoverImage Antenna/GettyImages MediaEditor DanSandin Full-ServiceVendor CypressGraphics ProjectManagement PaulC.Anagnostopoulos InteriorandCoverPrinter/Binder STP/R.R.DonnelleyHarrisonburg Creditsandacknowledgmentsborrowedfromothersourcesandreproduced,withpermission,in thistextbookappearontheappropriatepagewithinthetext. ThisinteriorofthisbookwassetinMinionandNofretbyWindfallSoftwareusingZzTEX. Copyright©2013,2011,2009,2006,2005byPearsonEducation,Inc.,publishingasAddison- Wesley.Allrightsreserved.ManufacturedintheUnitedStatesofAmerica.Thispublicationis protectedbyCopyright, andpermissionshouldbeobtainedfromthepublisherpriortoany prohibitedreproduction,storageinaretrievalsystem,ortransmissioninanyformorbyany means,electronic,mechanical,photocopying,recording,orlikewise.Toobtainpermission(s) tousematerialfromthiswork, pleasesubmitawrittenrequesttoPearsonEducation, Inc., PermissionsDepartment,OneLakeStreet,UpperSaddleRiver,NewJersey07458,oryoumayfax yourrequestto201-236-3290. Manyofthedesignationsbymanufacturersandsellerstodistinguishtheirproductsareclaimed astrademarks.Wherethosedesignationsappearinthisbook,andthepublisherwasawareofa trademarkclaim,thedesignationshavebeenprintedininitialcapsorallcaps. LibraryofCongressCataloging-in-PublicationData Quinn,MichaelJ.(MichaelJay) Ethicsfortheinformationage/MichaelJ.Quinn.—5thed. p. cm. Includesindex. ISBN978-0-13-285553-2—ISBN0-13-285553-4 1.Electronicdataprocessing—Moralandethicalaspects. 2.Computersandcivilization. I.Title. QA76.9.M65Q562013 (cid:2) 303.4834—dc23 2011049442 16 15 14 13 12—RRD—10 9 8 7 6 5 4 3 2 1 ISBN10:0-13-285553-4 ISBN13:978-0-13-285553-2 EX14.3 Brief Contents Preface xix 1 Catalysts for Change 1 An Interview with Dalton Conley 49 2 Introduction to Ethics 51 An Interview with James Moor 105 3 Networked Communications 109 An Interview with Michael Liebhold 159 4 Intellectual Property 161 An Interview with June Besek 223 5 Information Privacy 227 An Interview with Michael Zimmer 263 6 Privacy and the Government 267 An Interview with Jerry Berman 311 7 Computer and Network Security 315 An Interview with Matt Bishop 351 8 Computer Reliability 355 An Interview with Avi Rubin 401 9 Professional Ethics 403 An Interview with Paul Axtell 443 10 Work and Wealth 447 An Interview with Martin Ford 487 Appendix A: Plagiarism 491 Index 495 This page intentionally left blank Contents Prefacexix 1 CatalystsforChange 1 1.1Introduction 2 1.2MilestonesinComputing 5 1.2.1AidstoManualCalculating5 1.2.2MechanicalCalculators6 1.2.3CashRegister8 1.2.4PunchedCardTabulation9 1.2.5PrecursorsofCommercialComputers12 1.2.6FirstCommercialComputers13 1.2.7ProgrammingLanguagesandTime-Sharing15 1.2.8TransistorandIntegratedCircuit16 1.2.9IBMSystem/36018 1.2.10Microprocessor19 1.2.11PersonalComputer19 1.3MilestonesinNetworking 22 1.3.1ElectricityandElectromagnetism23 1.3.2Telegraph23 1.3.3Telephone25 1.3.4TypewriterandTeletype26 1.3.5Radio26 1.3.6Television27 1.3.7RemoteComputing29 1.3.8ARPANET29 1.3.9Email30 1.3.10In ternet30 1.3.11NSFNET32 1.3.12Broadband32 viii Contents 1.4 MilestonesinInformationStorageandRetrieval 32 1.4.1 Codex 32 1.4.2 Gutenberg’sPrintingPress 33 1.4.3 Newspapers 33 1.4.4 Hypertext 34 1.4.5 GraphicalUserInterface 34 1.4.6 Single-ComputerHypertextSystems 36 1.4.7 NetworkedHypertext:WorldWideWeb 36 1.4.8 SearchEngines 38 1.5 InformationTechnologyIssues 38 Summary 40 ReviewQuestions 42 DiscussionQuestions 43 In-ClassExercises 44 FurtherReading 45 References 46 An Interview with Dalton Conley 49 2 Introduction to Ethics 51 2.1 Introduction 51 2.1.1 DefiningTerms 52 2.1.2 FourScenarios 54 2.1.3 OverviewofEthicalTheories 57 2.2 SubjectiveRelativism 58 2.2.1 TheCaseforSubjectiveRelativism 58 2.2.2 TheCaseagainstSubjectiveRelativism 59 2.3 CulturalRelativism 60 2.3.1 TheCaseforCulturalRelativism 61 2.3.2 TheCaseagainstCulturalRelativism 62 2.4 DivineCommandTheory 64 2.4.1 TheCasefortheDivineCommandTheory 65 2.4.2 TheCaseagainsttheDivineCommandTheory 66 2.5 EthicalEgoism 67 2.5.1 TheCaseforEthicalEgoism 68 2.5.2 TheCaseagainstEthicalEgoism 68 2.6 Kantianism 70 2.6.1 GoodWillandtheCategoricalImperative 70 2.6.2 EvaluatingaScenarioUsingKantianism 72 Contents ix 2.6.3 TheCaseforKantianism 73 2.6.4 TheCaseagainstKantianism 74 2.7 ActUtilitarianism 75 2.7.1 PrincipleofUtility 75 2.7.2 EvaluatingaScenarioUsingActUtilitarianism 76 2.7.3 TheCaseforActUtilitarianism 78 2.7.4 TheCaseagainstActUtilitarianism 78 2.8 RuleUtilitarianism 80 2.8.1 BasisofRuleUtilitarianism 80 2.8.2 EvaluatingaScenarioUsingRuleUtilitarianism 81 2.8.3 TheCaseforRuleUtilitarianism 82 2.8.4 TheCaseagainstUtilitarianisminGeneral 83 2.9 SocialContractTheory 84 2.9.1 TheSocialContract 84 2.9.2 Rawls’sTheoryofJustice 86 2.9.3 EvaluatingaScenarioUsingSocialContractTheory 88 2.9.4 TheCaseforSocialContractTheory 89 2.9.5 TheCaseagainstSocialContractTheory 90 2.10 ComparingWorkableEthicalTheories 91 2.11 MoralityofBreakingtheLaw 93 2.11.1 SocialContractTheoryPerspective 93 2.11.2 KantianPerspective 93 2.11.3 RuleUtilitarianPerspective 94 2.11.4 ActUtilitarianPerspective 95 2.11.5 Conclusion 95 Summary 95 ReviewQuestions 98 DiscussionQuestions 99 In-ClassExercises 100 FurtherReading 101 References 102 An Interview with James Moor 105 3 Networked Communications 109 3.1 Introduction 109 3.2 EmailandSpam 111 3.2.1 HowEmailWorks 111 3.2.2 TheSpamEpidemic 111

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.