Professional Documents
Culture Documents
Preface xxi
2 Introduction to Ethics 49
2.1 Introduction 49
2.1.1 Defining Terms 50
2.1.2 Four Scenarios 52
2.1.3 Overview of Ethical Theories 55
2.2 Subjective Relativism 56
2.2.1 The Case for Subjective Relativism 56
2.2.2 The Case against Subjective Relativism 57
2.3 Cultural Relativism 58
2.3.1 The Case for Cultural Relativism 58
2.3.2 The Case against Cultural Relativism 59
2.4 Divine Command Theory 61
2.4.1 The Case for the Divine Command Theory 62
2.4.2 The Case against the Divine Command Theory 63
2.5 Ethical Egoism 64
2.5.1 The Case for Ethical Egoism 65
2.5.2 The Case against Ethical Egoism 65
2.6 Kantianism 67
2.6.1 Good Will and the Categorical Imperative 67
2.6.2 Evaluating a Scenario Using Kantianism 70
Contents ix
Index 507
This page intentionally left blank
Preface
.
The digital representation of intellectual property enables perfect copies to be made.
Free copies are widely available, thanks to high-speed Internet connections. To-
gether, these two technological developments have made possible an unprecedented
amount of illegal copying, forcing companies selling these products to make “doing
the right thing”—obtaining a legal copy—as easy as “doing the wrong thing”—
obtaining a pirated copy [Christopher Kauffman, private communication].
.
The concepts of copyright and patent have been extended to computer software,
but issuing software patents has been problematic. The arguments for granting
intellectual property protection to software are not strong.
.
Some believe that the current system of intellectual property protection actually
inhibits creativity. The open-source movement advocates the distribution of source
code to programs. Creative Commons has developed licenses that make it easier
for artists, musicians, and writers to use the Internet as a vehicle for stimulating
creativity and enhancing collaboration.
The seventh edition also adds new coverage of many important recent develop-
ments. Among them are
.
employers accessing social media to learn more about job candidates
.
the growth of the “gig economy”
.
the “right to be forgotten” and the European Union court order requiring Google
to suppress certain search results
.
revenge porn
.
fake online reviews and efforts to filter them out
.
the debate over whether mashups are a violation of copyright law
.
breaches of privacy caused by corporations releasing large data sets that were not
correctly anonymized
.
the “smartphone patent wars”
.
the Open Internet Order released by the Federal Communications Commission to
preserve net neutrality
.
responses by China and South Korea to the Internet addiction of many of its youth
.
the use of darknets by criminals, political dissidents, and others
.
recent US Supreme Court rulings that seem to indicate that software, as a class, is
worthy of patent protection
.
passage of the USA Freedom Act to reform the Patriot Act in light of Edward
Snowden’s revelations
.
the emerging power of data brokers
.
the trend away from using direct-recording electronic voting machines in the
United States
The seventh edition contains many other improvements. It introduces two new
ethical case studies: one in Chapter 4 and the other in Chapter 10. Dozens of new review
questions require the reader to apply and analyze material appearing in the chapters,
Preface xxiii
replacing more simplistic review questions. Finally, I have updated a significant number
of facts and figures throughout the book.
used for cyber crime, cyber espionage, and cyber attacks. We conclude with a discussion
of the risks associated with online voting.
Computerized system failures have led to lost business, the destruction of property,
human suffering, and even death. Chapter 8 describes some notable software system
failures, including the story of the Therac-25 radiation therapy system. It also discusses
the reliability of computer simulations, the emergence of software engineering as a
distinct discipline, and the validity of software warranties.
Chapter 9 is particularly relevant for those readers who plan to take jobs in the
computer industry. The chapter presents a professional code related to computing, the
Software Engineering Code of Ethics and Professional Practice, followed by an analysis
of the code. Several case studies illustrate how to use the code to evaluate moral problems
related to the use of computers. The chapter concludes with an ethical evaluation of
whistle-blowing, an extreme example of organizational dissent.
Chapter 10 raises a wide variety of issues related to how information technology
has impacted work and wealth. Topics include workplace monitoring, telecommuting,
and globalization. Does automation increase unemployment? Is there a “digital divide”
separating society into “haves” and “have nots”? Is information technology widening the
gap between rich and poor? These are just a few of the important questions the chapter
addresses.
NOTE TO INSTRUCTORS
In December 2013, a joint task force of the Association for Computing Machinery
and the IEEE Computer Society released the final draft of Computer Science Curricula
2013 (www.acm.org/education/CS2013-final-report.pdf). The report recommends that
every undergraduate computer science degree program incorporate instruction related
to Social Issues and Professional Practice through “a combination of one required course
along with short modules in other courses” (Computer Science Curricula 2013, p. 193).
Ethics for the Information Age covers nearly all of the core and elective material described
in the report, with the notable exception of Professional Communications. Table 1 shows
Name Chapter(s)
SP/Social Context 3, 10
SP/Analytical Tools 2
SP/Professional Ethics 9
SP/Intellectual Property 4
SP/Privacy and Civil Liberties 5, 6
SP/Sustainability 8, 10
SP/History 1
SP/Economies of Computing 10
SP/Security Policies, Laws, and Computer Crimes 7
Table 1 Mapping between the conceptual areas of Social and Professional Issues in
Computer Science Curricula 2013 and the chapters of this book.
Another random document with
no related content on Scribd:
The Project Gutenberg eBook of When the birds
fly south
This ebook is for the use of anyone anywhere in the United States
and most other parts of the world at no cost and with almost no
restrictions whatsoever. You may copy it, give it away or re-use it
under the terms of the Project Gutenberg License included with this
ebook or online at www.gutenberg.org. If you are not located in the
United States, you will have to check the laws of the country where
you are located before using this eBook.
Language: English
By STANTON A. COBLENTZ
Copyright 1945
by
The Wings Press
To
F. B. C.
whose eyes
have followed with mine
the flight
of the birds southward
Contents
PART I DRIFTING LEAVES
I The Mountain of Vanished Men
II The Verge of the Precipice
III Welcome To Sobul
IV The Weaving of the Spell
V Yulada
VI Foreshadowings
VII Yasma
VIII The Birds Fly South
IX In the Reddening Woods
X The Ibandru Take Wing