Ethics and technology: controversies, questions, and strategies for ethical computing
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
John Wiley & Sons, Inc.
[2016]
|
Ausgabe: | Fifth edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXVIII, 359 Seiten |
ISBN: | 9781119239758 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043872104 | ||
003 | DE-604 | ||
005 | 20230321 | ||
007 | t | ||
008 | 161110s2016 xxu |||| 00||| eng d | ||
010 | |a 015031994 | ||
020 | |a 9781119239758 |c paperback |9 978-1-119-23975-8 | ||
035 | |a (OCoLC)992476308 | ||
035 | |a (DE-599)BVBBV043872104 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-M382 |a DE-473 |a DE-898 |a DE-29 | ||
050 | 0 | |a TK5105.5 | |
082 | 0 | |a 174/.9004678 |2 23 | |
084 | |a SR 850 |0 (DE-625)143366: |2 rvk | ||
100 | 1 | |a Tavani, Herman T. |e Verfasser |0 (DE-588)157945502 |4 aut | |
245 | 1 | 0 | |a Ethics and technology |b controversies, questions, and strategies for ethical computing |c Herman T. Tavani, Rivier University |
250 | |a Fifth edition | ||
264 | 1 | |a Hoboken, NJ |b John Wiley & Sons, Inc. |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a XXVIII, 359 Seiten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a COMPUTERS / Software Development & Engineering / General |2 bisacsh | |
650 | 4 | |a Ethik | |
650 | 4 | |a Computer networks |x Moral and ethical aspects | |
650 | 4 | |a COMPUTERS / Software Development & Engineering / General | |
650 | 0 | 7 | |a Technologie |0 (DE-588)4059276-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Ethik |0 (DE-588)4015602-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Ethik |0 (DE-588)4015602-3 |D s |
689 | 0 | 1 | |a Technologie |0 (DE-588)4059276-5 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Ethik |0 (DE-588)4015602-3 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 2 | 1 | |a Ethik |0 (DE-588)4015602-3 |D s |
689 | 2 | |8 2\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Onlineausgabe, EVALC |z 978-1-119-22415-0 |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029281964&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-029281964 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804176761026510848 |
---|---|
adam_text | CHAPTER
CHAPTER
CHAPTER
CHAPTER
CHAPTER
CHAPTER
CHAPTER
CHAPTER
CHAPTER
CHAPTER
CHAPTER
CHAPTER
T
CONTENTS AT A GLANCE
PREFACE xvii
FOREWORD xxvii
1. INTRODUCTION TO CYBERETHICS: CONCEPTS, PERSPECTIVES,
AND METHODOLOGICAL FRAMEWORKS 1
2. ETHICAL CONCEPTS AND ETHICAL THEORIES: FRAMEWORKS FOR
ANALYZING MORAL ISSUES 27
3. CRITICAL REASONING SKILLS FOR EVALUATING DISPUTES IN
CYBERETHICS 63
4. PROFESSIONAL ETHICS, CODES OF CONDUCT, AND MORAL
RESPONSIBILITY 87
5. PRIVACY AND CYBERSPACE 113
6. SECURITY IN CYBERSPACE 151
7 CYBERCRIME AND CYBER-RELATED CRIMES 175
8. INTELLECTUAL PROPERTY DISPUTES IN CYBERSPACE 201
9. REGULATING COMMERCE AND SPEECH IN CYBERSPACE 236
10. THE DIGITAL DIVIDE, DEMOCRACY, AND WORK 263
11. ONLINE COMMUNITIES, VIRTUAL REALITY, AND ARTIFICIAL
INTELLIGENCE 292
12. ETHICAL ASPECTS OF EMERGING AND CONVERGING
TECHNOLOGIES 317
GLOSSARY 347
INDEX 353
v
TABLE OF CONTENTS
PREFACE xvii
New to the Fifth Edition xviii
Audience and Scope xix
Organization and Structure of the Book xx
The Web Site for Ethics and Technology xxii
A Note to Students xxiii
Note to Instructors: A Roadmap for Using This Book xxiii
A Note to Computer Science Instructors xxiv
Acknowledgments xxv
FOREWORD xxvii
► CHAPTER 1
INTRODUCTION TO CYBERETHICS: CONCEPTS, PERSPECTIVES,
AND METHODOLOGICAL FRAMEWORKS 1
Scenario 1-1: Hacking into the Mobile Phones of Celebrities 1
1.1 Defining Key Terms: Cyberethics and Cybertechnology 2
L1.1 What Is Cybertechnology? 3
1.1.2 Why the Term Cyberethics? 3
1.2 The Cyberethics Evolution: Four Developmental Phases in Cybertechnology 4
1.3 Are Cyberethics Issues Unique Ethical Issues? 7
Scenario 1-2: Developing the Code for a Computerized Weapon System 8
Scenario 1-3: Digital Piracy 8
1.3.1 Distinguishing between Unique Technological Features and Unique
Ethical Issues 9
1.3.2 An Alternative Strategy for Analyzing the Debate about the Uniqueness
of Cyberethics Issues 10
1.3.3 A Policy Vacuum in Duplicating Computer Software 10
1.4 Cyberethics as a Branch of Applied Ethics: Three Distinct Perspectives 12
1.4.1 Perspective #7: Cyberethics as a Field of Professional Ethics 12
1.4.2 Perspective #2: Cyberethics as a Field of Philosophical Ethics 14
1.4.3 Perspective #T Cyberethics us a Field of Sociological/Descriptive Ethics 16
Scenario 1-4: The Impact of Technology X on the Pleasantville Community 17
1.5 A Comprehensive Cyberethics Methodology 19
1.5.1 A “Disclosive” Method for Cyberethics 19
1.5.2 An Interdisciplinary and Multilevel Method for Analyzing Cyberethics Issues 21
1.6 A Comprehensive Strategy for Approaching Cyberethics Issues 21
1.7 Chapter Summary 22
Review Questions 23
Discussion Questions 23
Scenarios for Analysis 23
Endnotes 24
References 25
Further Readings 26
Online Resources 26
vll
viii ► Table of Contents
► CHAPTER 2
ETHICAL CONCEPTS AND ETHICAL THEORIES: FRAMEWORKS FOR ANALYZING
MORAL ISSUES 27
Scenario 2-1:The Case of the “Runaway Trolley’ : A Classic Moral Dilemma 27
2.1 Ethics and Morality 29
2.1.1 What Is Morality? 29
2.1.2 The Study of Morality: Three Distinct Approaches for Evaluating and Justifying
the Rules Comprising a Moral System 32
2.2 Discussion Stoppers as Roadblocks to Moral Discourse 35
2.2.1 Discussion Stopper #7: People Disagree on Solutions to Moral Issues 36
2.2.2 Discussion Stopper #2: Who Am 1 to Judge Others? 37
2.2.3 Discussion Stopper #3: Morality Is Simply a Private Matter 39
2.2.4 Discussion Stopper #4: Morality Is Simply a Matter for Individual Cultures to
Decide 40
Scenario 2-2: The Price of Defending Moral Relativism 41
2.3 Why Do We Need Ethical Theories? 43
2.4 Consequence-Based Ethical Theories 44
2.4.1 Act Utilitarianism 46
Scenario 2-3: A Controversial Policy in Newmerica 46
2.4.2 Rule Utilitarianism 46
2.5 Duty-Based Ethical Theories 47
2.5.1 Rule Deontology 48
Scenario 2-4: Making an Exception for Oneself 48
2.5.2 Act Deontology 49
Scenario 2-5: A Dilemma Involving Conflicting Duties 50
2.6 Contract-Based Ethical Theories 51
2.6.1 Some Criticisms of Contract-Based Theories 52
2.6.2 Rights-Based Contract Theories 53
2.7 Character-Based Ethical Theories 54
2.7.1 Being a Moral Person vs. Following Moral Rules 54
2.7.2 Acquiring the “Correct”Habits 55
2.8 Integrating Aspects of Classical Ethical Theories into a Single Comprehensive Theory 56
2.8.1 Moor s Just-Consequential^! Theory and Its Application to Cybertechnology 57
2.8.2 Key Elements in Moor s Just-Consequentialist Framework 58
2.9 Chapter Summary 59
Review Questions 59
Discussion Questions 60
Scenarios for Analysis 60
Endnotes 61
References 61
Further Readings 62
► CHAPTER 3
CRITICAL REASONING SKILLS FOR EVALUATING DISPUTES IN CYBERETHICS 63
SCENARIO 3-1: Reasoning About Whether to Download Software from “Sharester” 63
3.1 What Is Critical Reasoning? 64
1.1 Some Basic Concepts: (Logical) A rguments and Claims 64
3.1.2 The Role of Arguments 65
3.1.3 The Basic Structure of an Argument 65
3.2 Constructing an Argument 67
3.3 Valid Arguments 68
3.4 Sound Arguments 71
3.5 Invalid Arguments 73
3.6 Inductive Arguments 74
3.7 Fallacious Arguments 75
Table of Contents ◄ ix
3.8 A Seven-Step Strategy for Evaluating Arguments 77
3.9 Identifying Some Common Fallacies 79
3.9.1 Ad Hominem Argument 79
3.9.2 Slippery Slope Argument 80
3.9.3 Fallacy of Appeal to Authority 80
3.9.4 False Cause Fallacy 81
3.9.5 Fallacy of Composition/Fallacy of Division 81
3.9.6 Fallacy of Ambiguity/Equivocation 82
3.9.7 The False Dichotomy/Either-Or Fallacy/A ll-or-Nothing Fallacy 82
3.9.8 The Virtuality Fallacy 83
3.10 Chapter Summary 84
Review Questions 84
Discussion Questions 85
Scenarios for Analysis 85
Endnotes 85
References 86
Further Readings 86
► CHAPTER 4
PROFESSIONAL ETHICS, CODES OF CONDUCT, AND MORAL RESPONSIBILITY 87
Scenario 4-1: Fatalities Involving the Oerlikon GDF-005 Robotic Cannon 87
4.1 What is Professional Ethics? 88
4.1.1 What Is a Profession ? 89
4.1.2 Who Is a Professional? 89
4.1.3 Who Is a Computer/IT Professional? 90
4.2 Do Computer/IT Professionals Have Any Special Moral Responsibilities? 90
4.3 Professional Codes of Ethics and Codes of Conduct 91
4.3.1 The Purpose of Professional Codes 92
4.3.2 Some Criticisms of Professional Codes 93
4.3.3 Defending Professional Codes 94
4.3.4 The IEEE- CS/ACM Software Engineering Code of Ethics and Professional
Practice 95
4.4 Conflicts of Professional Responsibility: Employee Loyalty and Whistle-Blowing 97
4.4.1 Do Employees Have an Obligation of Loyalty to Employers? 97
4.4.2 Whistle-Blowing 98
Scenario 4-2: NSA Surveillance and the Case of Edward Snowden 101
4.5 Moral Responsibility, Legal Liability, and Accountability 103
4.5.1 Distinguishing Responsibility from Liability and Accountability 104
4.5.2 Accountability and the Problem of “Many Hands” 105
Scenario 4-3: The Case of the Therac-25 Machine 105
4.5.3 Legal Liability and Moral Accountability 106
4.6 Do Some Computer Corporations Have Special Moral Obligations? 107
4.7 Chapter Summary 108
Review Questions 109
Discussion Questions 109
Scenarios for Analysis 110
Endnotes 110
References 111
Further Readings 112
► CHAPTER 5
PRIVACY AND CYBERSPACE 113
Scenario 5-1: A New NSA Data Center 113
5.1 Privacy in the Digital Age: Who Is Affected and Why Should We Worry? 114
5.1.1 Whose Privacy Is Threatened by Cybertechnology? 115
5.1.2 Are Any Privacy Concerns Generated by Cybertechnology Unique or Special? 115
x ► Table of Contents
5.2 What Is Personal Privacy? 117
5.2.1 Accessibility Privacy: Freedom from Unwarranted Intrusion 118
5.2.2 Decisional Privacy: Freedom from Interference in One !v Personal Aff airs 118
5.2.3 Informational Privacy: Control over the Flow of Personal Information 118
5.2.4 A Comprehensive Account of Privacy 119
Scenario 5-2: Descriptive Privacy 119
Scenario 5-3: Normative Privacy 120
5.2.5 Privacy as “Contextual Integrity ” 120
Scenario 5-4: Preserving Contextual Integrity in a University Seminar 121
5.3 Why Is Privacy Important? 121
5.3.1 Is Privacy an Intrinsic Value? 122
5.3.2 Privacy as a Social Value 123
5.4 Gathering Personal Data: Surveillance, Recording, and Tracking Techniques 123
5.4.1 “ Dataveillance ” Techniques 124
5.4.2 Internet Cookies 124
5.4.3 RFID Technology 125
5.4.4 Cybertechnology and Government Surveillance 126
5.5 Analyzing Personal Data: Big Data, Data Mining, and Web Mining 127
5.5.1 Big Data: What, Exactly, Is It, and Why Does It Threaten Privacy? 128
5.5.2 Data Mining and Personal Privacy 128
Scenario 5-5: Data Mining at the XYZ Credit Union 129
5.5.3 Web Mining: Analyzing Personal Data Acquired from Our Interactions Online 132
5.6 Protecting Personal Privacy in Public Space 132
5.6.1 PPI vs. NPI 133
Scenario 5-6: Shopping at SuperMart 133
Scenario 5-7: Shopping at Nile.com 134
5.6.2 Search Engines and the Disclosure of Personal Information 135
5.7 Privacy Legislation and Industry Self-Regulation 137
5.7.1 Industry Self-Regulation and Privacy-Enhancing Tools 137
5.7.2 Privacy Laws and Data Protection Principles 139
5.8 A Right to “Be Forgotten” (or to “Erasure”) in the Digital Age 140
Scenario 5-8: An Arrest for an Underage Drinking Incident 20 Years Ago 141
5.8.1 Arguments Opposing RTBF 142
5.8.2 Arguments Defending RTBF 143
5.8.3 Establishing “Appropriate ” Criteria 144
5.9 Chapter Summary 146
Review Questions 146
Discussion Questions 147
Scenarios for Analysis 148
Endnotes 148
References 149
Further Readings 150
CHAPTER 6
SECURITY IN CYBERSPACE 151
Scenario 6-1: The “Olympic Games” Operation and the Stuxnet Worm 151
6.1 Security in the Context of Cybertechnology 152
6.1.1 Cybersecurity as Related to Cybercrime 153
6.1.2 Security and Privacy: Some Similarities and Some Differences 153
6.2 Three Categories of Cybersecurity 154
6.2.1 Data Security: Confidentiality, Integrity, and Availability of Information 155
6.2.2 System Security: Viruses, Worms, and Malware 156
6.2.3 Network Security: Protecting our Infrastructure 156
Scenario 6-2: The “GhostNet” Controversy 157
Table of Contents M xi
6.3 Cloud Computing and Security 158
6.3.1 Deployment and Service/Delivery Models for the Cloud 158
6.3.2 Securing User Data Residing in the Cloud 159
6.3.3 Assessing Risk in the Cloud and in the Context of Cybersecurity 160
6.4 Hacking and “The Hacker Ethic” 160
6.4.1 What Is “The Hacker Ethic”? 161
6.4.2 Are Computer Break-ins Ever Ethically Justifiable? 163
6.5 Cyberterrorism 164
6.5.1 Cyberterrorism vs. Hacktivism 165
Scenario 6-3; Anonymous and the “Operation Payback” Attack 166
6.5.2 Cybertechnology and Terrorist Organizations 167
6.6 Information Warfare (IW) 167
6.6.1 Information Warfare vs. Con ventional Warfare 167
6.6.2 Potential Consequences for Nations that Engage in IW 168
6.7 Chapter Summary 170
Review Questions 170
Discussion Questions 171
Scenarios for Analysis 171
Endnotes 171
References 172
Further Readings 174
► CHAPTER 7
CYBERCRIME AND CYBER-RELATED CRIMES 175
Scenario 7-1: Creating a Fake Facebook Account to Catch Criminals 175
7.1 Cybercrimes and Cybercriminals 177
7.1.1 Background Events: A Brief Sketch 177
7.1.2 A Typical Cybercriminal 178
1.2 Hacking, Cracking, and Counter Hacking 178
7.2.1 Hacking vs. Cracking 179
7.2.2 Active Defense Hacking: Can Acts of “Hacking Back” or Counter
Hacking Ever Be Morally Justified? 179
7.3 Defining Cybercrime 180
7.3.1 Determining the Criteria 181
7.3.2 A Preliminary Definition of Cybercrime 181
7.3.3 Framing a Coherent and Comprehensive Definition of Cybercrime 182
1A Three Categories of Cybercrime: Pi racy, Trespass, and Vandalism in Cyberspace 183
7.5 Cyber-Related Crimes 184
7.5.1 Some Examples of Cyber-Exacerbated vs. Cyber-Assisted Crimes 184
7.5.2 identity Theft 185
7.6 Technologies and Tools for Combating Cybercrime 187
7.6. J Biometric Technologies 187
7.6.2 Keystroke- Mon itoring Software and Packet-Sniffing Programs 188
1.1 Programs and Techniques Designed to Combat Cybercrime in the United States 189
7.7.1 Entrapment and “Sting ” Operations to Catch Internet Pedophiles 189
Scenario 7-2: Entrapment on the Internet 189
7.7.2 Enhanced Government Surveillance Techniques and the Patriot Act 189
7.8 National and International Laws to Combat Cybercrime 190
7.8.1 The Problem of Jurisdiction in Cyberspace 190
Scenario 7-3: A Virtual Casino 191
Scenario 7-4: Prosecuting a Computer Corporation in Multiple Countries 192
7.8.2 Some International Laws and Conventions Ajfeating Cybercrime 192
Scenario 7-5: The Pirate Bay Web Site 193
7.9 Cybercrime and the Free Press: The Wikileaks Controversy 193
xii ► Table of Contents
7.9.1 Are WikiLeaks9 Practices Ethical? 194
7.9.2 Are WikiLeaks9 Practices Criminal? 194
7.9.3 WikiLeaks and the Free Press 195
7.10 Chapter Summary 196
Review Questions 197
Discussion Questions 197
Scenarios for Analysis 198
Endnotes 199
References 199
Further Readings 200
CHAPTER 8
INTELLECTUAL PROPERTY DISPUTES IN CYBERSPACE 201
Scenario 8-1: Streaming Music Online 201
8.1 What Is Intellectual Property? 202
8.1.1 Intellectual Objects 203
8.12 Why Protect Intellectual Objects? 203
8.1.3 Software as Intellectual Property 204
8.1.4 Evaluating a Popular Argument Used by the Software Industry to Show Why
It Is Morally Wrong to Copy Proprietary Software 205
8.2 Copyright Law and Digital Media 206
8.2.1 The Evolution of Copyright Law in the United States 206
8.2.2 The Fair-Use and First-Sale Provisions of Copyright Law 207
8.2.3 Software Piracy as Copyright Infringement 208
8.2.4 Napster and the Ongoing Battles over Sharing Digital Music 209
8.3 Patents, Trademarks, and Trade Secrets 212
8.3.1 Patent Protections 212
8.3.2 Trademarks 213
8.3.3 Trade Secrets 214
8.4 Jurisdictional Issues Involving Intellectual Property Laws 214
8.5 Philosophical Foundations for Intellectual Property Rights 215
8.5.1 The Labor Theory of Property 215
Scenario 8-2: DEF Corporation vs. XYZ Inc. 216
8.5.2 The Utilitarian Theory of Property 216
Scenario 8-3: Sam’s e-Book Reader Add-on Device 217
8.5.3 The Personality Theory of Property 217
Scenario 8-4: Angela’s B++ Programming Tool 218
8.6 The “Free Software” and “Open Source” Movements 219
8.6.1 GNU and the Free Software Foundation 219
8.6.2 The ‘ Open Source Software99 Movement: OSS vs. FSF 220
8.7 The “Common Good” Approach: An Alternative Framework for
Analyzing the Intellectual Property Debate 221
8.7.1 Information Wants to be Shared vs. Information Wants to be Free 223
8.7.2 Preserving the Information Commons 225
8.7.3 The Fate of the Information Commons: Could the Public Domain
of Ideas Eventually Disappear? 226
8.7.4 The Creative Commons 227
8.8 PIPA, SOPA, and RWA Legislation: Current Battlegrounds in the Intellectual
Property War 228
8.8.1 The PIPA and SOPA Battles 228
8.8.2 RWA and Public Access to Health-Related Information 229
Scenario 8-5: Elsevier Press and “The Cost of Knowledge” Boycott 229
8.8.3 Intellectual Property Battles in the Near Future 231
8.9 Chapter Summary 231
Review Questions 231
Table of Contents ◄ xiii
Discussion Questions 232
Scenarios for Analysis 232
Endnotes 233
References 234
Further Readings 235
► CHAPTER 9
REGULATING COMMERCE AND SPEECH IN CYBERSPACE 236
Scenario 9-1: Anonymous and the Ku Klux Klan 236
9.1 Introduction and Background Issues: Some Key Questions and Critical Distinctions Affecting
Internet Regulation 237
9.1.1 Is Cyberspace a Medium or a Place? 238
9.1.2 Two Categories of Cyberspace Regulation: Regulating Content and Regulating
Process 239
9.1.3 Four Modes of Regulation: The Lessig Model 240
9.2 Digital Rights Management (DRM) 242
9.2.7 Some Implications of DRM for Public Policy Debates Affecting Copyright Law 242
9.2.2 DRM and the Music Industry 243
Scenario 9-2: The Sony Rootkit Controversy 243
9.3 E-Mail Spam 244
9.3.1 Defining Spam 244
9.3.2 Why Is Spam Morally Objectionable? 245
9.4 Free Speech vs. Censorship and Content Control in Cyberspace 246
9.4.1 Protecting Free Speech 247
9.4.2 Defining Censorship 247
9.5 Pornography in Cyberspace 248
9.5.1 Interpreting “Community Standards ” in Cyberspace 248
9.5.2 Internet Pornography Laws and Protecting Children Online 249
9.5.3 Virtual Child Pornography 250
9.5.4 Sexting and Its Implications for Current Child Pornography La ws 252
Scenario 9-3: A Sexting Incident Involving Greensburg Salem High School 252
9.6 Hate Speech and Speech that Can Cause Physical Harm to Others 254
9.6.1 Hate Speech on the Web 254
9.6.2 Online “Speech” that Can Cause Physical Harm to Others 255
9.7 “Network Neutrality” and the Future of Internet Regulation 256
9.7.1 Defining Network Neutrality 256
9.7.2 Some Arguments Advanced by Net Neutrality s Proponents and Opponents 257
9.7.3 Future Implications for the Net Neutrality Debate 257
9.8 Chapter Summary 258
Review Questions 259
Discussion Questions 259
Scenarios for Analysis 260
Endnotes 260
References 261
Further Readings 262
► CHAPTER 10
THE DIGITAL DIVIDE, DEMOCRACY, AND WORK 263
Scenario 1(M: Digital Devices, Social Media, Democracy, and the “Arab Spring” 264
10.1 The Digital Divide 265
10.1.1 The Global Digital Divide 265
10.1.2 The Digital Divide within Nations 266
Scenario 10—2: Providing In-Home Internet Service for Public School Students 267
10.1.3 Is the Digital Divide an Ethical Issue? 268
10.2 Cybertechnology and the Disabled 270
xiv ► Table of Contents
10.3 Cybertechnology and Race 271
10.3.1 Internet Usage Patterns 212
10.3.2 Racism and the Internet 212
10.4 Cybertechnology and Gender 273
10.4.1 Access to High- Technology Jobs 214
10.4.2 Gender Bias in Software Design and Video Games 215
10.5 Cybertechnology, Democracy, and Demotratic Ideals 276
10.5.1 Has Cybertechnology Enhanced or Threatened Democracy? 216
10.5.2 How has Cybertechnology Affected Political Elections in Democratic Nations? 219
10.6 The Transformation and the Quality of Work 280
10.6.1 Job Displacement and the Transformed Workplace 281
10.6.2 The Quality of Work Life in the Digital Era 283
Scenario 10-3: Employee Monitoring and the Case of Ontario vs. Quon 284
10.7 Chapter Summary 287
Review Questions 287
Discussion Questions 288
Scenarios for Analysis 288
Endnotes 289
References 289
Further Readings 291
chapter u
ONLINE COMMUNITIES, VIRTUAL REALITY, AND ARTIFICIAL INTELLIGENCE 292
Scenario 11-1: Ralph’s Online Friends and Artificial Companions 292
11.1 Online Communities and Social Networking Services 293
11.1.1 Online Communities vs. Traditional Communities 294
11.1.2 Blogs and Some Controversial Aspects of the Bogosphere 295
Scenario 11-2: “The Washingtonienne” Blogger 295
11.1.3 Some Pros and Cons ofSNSs (and Other Online Communities) 296
Scenario 11-3: A Suicide Resulting from Deception on MySpace 298
11.2 Virtual Environments and Virtual Reality 299
11.2.1 What Is Virtual Reality (VR)? 300
11.2.2 Ethical Aspects of VR Applications 301
11.3 Artificial Intelligence (AI) 305
11.3.1 What Is A I? A Brief Overview 305
11.3.2 The Turing Test and John Searle’s “Chinese Room ” Argument 306
11.3.3 Cyborgs and Human-Machine Relationships 301
11.4 Extending Moral Consideration to AI Entities 310
Scenario 11 -4: Artificial Children 310
11.4.1 Determining Which Kinds of Beings/Entities Deserve Moral Consideration 310
11.4.2 Moral Patients vs. Moral Agents 311
11.5 Chapter Summary 312
Review Questions 313
Discussion Questions 313
Scenarios for Analysis 313
Endnotes 314
References 315
Further Readings 316
* CHAPTER 12
ETHICAL ASPECTS OF EMERGING AND CONVERGING TECHNOLOGIES 317
Scenario 12-1: When “Things” Communicate with One Another 317
12.1 Converging Technologies and Technological Convergence 318
12.2 Ambient Intelligence (Ami) and Ubiquitous Computing 319
Table of Contents *4 xv
GLOSSARY
INDEX 353
12.2.1 Pervasive Computing, Ubiquitous Communication, and intelligent
User Interfaces 320
12.2.2 Ethical and Social Aspects of Ami 321
Scenario 12—2: E. M. Forster’s “(Pre)Cautionary Tale” 322
Scenario 12-3: Jeremy Bentham’s “Panopticon/Inspection House” (Thought Experiment) 323
12.3 Nanotechnology and Nanocomputing 324
12.3.1 Nanotechnology: A Brief Overview 324
12.3.2 Ethical Issues in Nanotechnology and Nanocomputing 326
12.4 Autonomous Machines 329
72.4.1 What Is an A M? 329
12.4.2 Some Ethical and Philosophical Questions Pertaining to A Ms 332
12.5 Machine Ethics and Moral Machines 336
12.5.1 What Is Machine Ethics? 336
12.5.2 Designing Moral Machines 337
12.6 A “Dynamic” Ethical Framework for Guiding Research in New and Emerging
Technologies 340
12.6.1 Is an ELSE Like Model A dequate for New/Emerging Technologies? 340
12.6.2 A “Dynamic Ethics” Model 341
12.7 Chapter Summary 341
Review Questions 342
Discussion Questions 342
Scenarios for Analysis 343
Endnotes 343
References 344
Further Readings 346
347
|
any_adam_object | 1 |
author | Tavani, Herman T. |
author_GND | (DE-588)157945502 |
author_facet | Tavani, Herman T. |
author_role | aut |
author_sort | Tavani, Herman T. |
author_variant | h t t ht htt |
building | Verbundindex |
bvnumber | BV043872104 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.5 |
callnumber-search | TK5105.5 |
callnumber-sort | TK 45105.5 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | SR 850 |
ctrlnum | (OCoLC)992476308 (DE-599)BVBBV043872104 |
dewey-full | 174/.9004678 |
dewey-hundreds | 100 - Philosophy & psychology |
dewey-ones | 174 - Occupational ethics |
dewey-raw | 174/.9004678 |
dewey-search | 174/.9004678 |
dewey-sort | 3174 79004678 |
dewey-tens | 170 - Ethics (Moral philosophy) |
discipline | Informatik Philosophie |
edition | Fifth edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02500nam a2200601 c 4500</leader><controlfield tag="001">BV043872104</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230321 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">161110s2016 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">015031994</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119239758</subfield><subfield code="c">paperback</subfield><subfield code="9">978-1-119-23975-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)992476308</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043872104</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-29</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.5</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">174/.9004678</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SR 850</subfield><subfield code="0">(DE-625)143366:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tavani, Herman T.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)157945502</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ethics and technology</subfield><subfield code="b">controversies, questions, and strategies for ethical computing</subfield><subfield code="c">Herman T. Tavani, Rivier University</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Fifth edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">John Wiley & Sons, Inc.</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXVIII, 359 Seiten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Software Development & Engineering / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ethik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Moral and ethical aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Software Development & Engineering / General</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Technologie</subfield><subfield code="0">(DE-588)4059276-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Technologie</subfield><subfield code="0">(DE-588)4059276-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Ethik</subfield><subfield code="0">(DE-588)4015602-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Onlineausgabe, EVALC</subfield><subfield code="z">978-1-119-22415-0</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029281964&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029281964</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV043872104 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:37:19Z |
institution | BVB |
isbn | 9781119239758 |
language | English |
lccn | 015031994 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029281964 |
oclc_num | 992476308 |
open_access_boolean | |
owner | DE-M382 DE-473 DE-BY-UBG DE-898 DE-BY-UBR DE-29 |
owner_facet | DE-M382 DE-473 DE-BY-UBG DE-898 DE-BY-UBR DE-29 |
physical | XXVIII, 359 Seiten |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | John Wiley & Sons, Inc. |
record_format | marc |
spelling | Tavani, Herman T. Verfasser (DE-588)157945502 aut Ethics and technology controversies, questions, and strategies for ethical computing Herman T. Tavani, Rivier University Fifth edition Hoboken, NJ John Wiley & Sons, Inc. [2016] © 2016 XXVIII, 359 Seiten txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index COMPUTERS / Software Development & Engineering / General bisacsh Ethik Computer networks Moral and ethical aspects COMPUTERS / Software Development & Engineering / General Technologie (DE-588)4059276-5 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Ethik (DE-588)4015602-3 gnd rswk-swf Informationstechnik (DE-588)4026926-7 gnd rswk-swf Ethik (DE-588)4015602-3 s Technologie (DE-588)4059276-5 s DE-604 Rechnernetz (DE-588)4070085-9 s 1\p DE-604 Informationstechnik (DE-588)4026926-7 s 2\p DE-604 Erscheint auch als Onlineausgabe, EVALC 978-1-119-22415-0 Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029281964&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Tavani, Herman T. Ethics and technology controversies, questions, and strategies for ethical computing COMPUTERS / Software Development & Engineering / General bisacsh Ethik Computer networks Moral and ethical aspects COMPUTERS / Software Development & Engineering / General Technologie (DE-588)4059276-5 gnd Rechnernetz (DE-588)4070085-9 gnd Ethik (DE-588)4015602-3 gnd Informationstechnik (DE-588)4026926-7 gnd |
subject_GND | (DE-588)4059276-5 (DE-588)4070085-9 (DE-588)4015602-3 (DE-588)4026926-7 |
title | Ethics and technology controversies, questions, and strategies for ethical computing |
title_auth | Ethics and technology controversies, questions, and strategies for ethical computing |
title_exact_search | Ethics and technology controversies, questions, and strategies for ethical computing |
title_full | Ethics and technology controversies, questions, and strategies for ethical computing Herman T. Tavani, Rivier University |
title_fullStr | Ethics and technology controversies, questions, and strategies for ethical computing Herman T. Tavani, Rivier University |
title_full_unstemmed | Ethics and technology controversies, questions, and strategies for ethical computing Herman T. Tavani, Rivier University |
title_short | Ethics and technology |
title_sort | ethics and technology controversies questions and strategies for ethical computing |
title_sub | controversies, questions, and strategies for ethical computing |
topic | COMPUTERS / Software Development & Engineering / General bisacsh Ethik Computer networks Moral and ethical aspects COMPUTERS / Software Development & Engineering / General Technologie (DE-588)4059276-5 gnd Rechnernetz (DE-588)4070085-9 gnd Ethik (DE-588)4015602-3 gnd Informationstechnik (DE-588)4026926-7 gnd |
topic_facet | COMPUTERS / Software Development & Engineering / General Ethik Computer networks Moral and ethical aspects Technologie Rechnernetz Informationstechnik |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029281964&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT tavanihermant ethicsandtechnologycontroversiesquestionsandstrategiesforethicalcomputing |