Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Computers ethics and society ermann pdf

07/12/2021 Client: muhammad11 Deadline: 2 Day

Computer Ethics Assignment

FFIRS3GXML 10/20/2012 0:58:24 Page 1

�F O U R T H E D I T I O N ETHICS AND

TECHNOLOGY Controversies, Questions, and Strategies

for Ethical Computing

HERMAN T. TAVANI Rivier University

FFIRS3GXML 10/20/2012 0:58:24 Page 2

VP & Executive Publisher: Donald Fowley Executive Editor: Beth Lang Golub Editorial Assistant: Katherine Willis Marketing Manager: Chris Ruel Marketing Assistant: Marissa Carroll Associate Production Manager: Joyce Poh Production Editor: Jolene Ling Designer: Kenji Ngieng Cover Photo Credit: Bernhard Lang/Getty Images, Inc. Production Management Services: Thomson Digital

This book was set in 10/12 TimesTenLTStd-Roman by Thomson Digital, and printed and bound by Edwards Brothers Malloy. The cover was printed by Edwards Brothers Malloy.

This book is printed on acid free paper.

Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the worldmeet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the communities we serve and where we live and work. In 2008, we launched a Corporate Citizenship Initiative, a global effort to address the environmental, social, economic, and ethical challenges we face in our business. Among the issues we are addressing are carbon impact, paper specifications and procurement, ethical conduct within our business and among our vendors, and community and charitable support. For more information, please visit our website: www.wiley.com/go/citizenship.

Copyright# 2013, 2011, 2007, 2004 JohnWiley & Sons, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976United States CopyrightAct, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the PermissionsDepartment, JohnWiley& Sons, Inc., 111 River Street, Hoboken, NJ 07030- 5774, (201)748-6011, fax (201)748-6008, website http://www.wiley.com/go/permissions.

Evaluation copies are provided to qualified academics and professionals for review purposes only, for use in their courses during the next academic year. These copies are licensed and may not be sold or transferred to a third party. Upon completion of the review period, please return the evaluation copy to Wiley. Return instructions and a free of charge return mailing label are available at www.wiley.com/go/returnlabel. If you have chosen to adopt this textbook for use in your course, please accept this book as your complimentary desk copy. Outside of the United States, please contact your local sales representative.

Library of Congress Cataloging-in-Publication Data

Tavani, Herman T. Ethics and technology : controversies, questions, and strategies for ethical

computing / Herman T. Tavani, Rivier University—Fourth edition. pages cm

Includes bibliographical references and index. ISBN 978-1-118-28172-7 (pbk.)

1. Computer networks—Moral and ethical aspects. I. Title. TK5105.5.T385 2013 175—dc23

2012028589

Printed in the United States of America

10 9 8 7 6 5 4 3 2 1

http://www.wiley.com/go/permissions
http://www.wiley.com/go/citizenship
http://www.copyright.com
http://www.wiley.com/go/returnlabel
FFIRS3GXML 10/20/2012 0:58:24 Page 3

In memory of my grandparents, Leon and Marian (Roberts) Hutton,

and Antonio and Clelia (Giamberardino) Tavani

FFIRS3GXML 10/20/2012 0:58:24 Page 4

FTOC3GXML 10/20/2012 1:3:1 Page 5

� CONTENTS AT A GLANCE

PREFACE xvii

ACKNOWLEDGMENTS xxvii

FOREWORD xxix

CHAPTER 1. INTRODUCTION TO CYBERETHICS: CONCEPTS, PERSPECTIVES, AND METHODOLOGICAL FRAMEWORKS 1

CHAPTER 2. ETHICAL CONCEPTS AND ETHICAL THEORIES: ESTABLISHING AND JUSTIFYING A MORAL SYSTEM 33

CHAPTER 3. CRITICAL REASONING SKILLS FOR EVALUATING DISPUTES IN CYBERETHICS 74

CHAPTER 4. PROFESSIONAL ETHICS, CODES OF CONDUCT, AND MORAL RESPONSIBILITY 101

CHAPTER 5. PRIVACY AND CYBERSPACE 131

CHAPTER 6. SECURITY IN CYBERSPACE 174

CHAPTER 7. CYBERCRIME AND CYBER-RELATED CRIMES 201

CHAPTER 8. INTELLECTUAL PROPERTY DISPUTES IN CYBERSPACE 230

CHAPTER 9. REGULATING COMMERCE AND SPEECH IN CYBERSPACE 269

CHAPTER 10. THE DIGITAL DIVIDE, DEMOCRACY, AND WORK 303

CHAPTER 11. ONLINE COMMUNITIES, CYBER IDENTITIES, AND SOCIAL NETWORKS 337

CHAPTER 12. ETHICAL ASPECTS OF EMERGING AND CONVERGING TECHNOLOGIES 368

GLOSSARY 411

INDEX 417

v

FTOC3GXML 10/20/2012 1:3:1 Page 6

FTOC3GXML 10/20/2012 1:3:1 Page 7

� TABLE OF CONTENTS

PREFACE xvii New to the Fourth Edition xviii Audience and Scope xix Organization and Structure of the Book xxi The Web Site for Ethics and Technology xxiii A Note to Students xxiv Note to Instructors: A Roadmap for Using This Book xxiv A Note to Computer Science Instructors xxv

ACKNOWLEDGMENTS xxvii FOREWORD xxix

c CHAPTER 1

INTRODUCTION TO CYBERETHICS: CONCEPTS, PERSPECTIVES, AND METHODOLOGICAL FRAMEWORKS 1

Scenario 1–1: A Fatal Cyberbullying Incident on MySpace 1 Scenario 1–2: Contesting the Ownership of a Twitter Account 2 Scenario 1–3: “The Washingtonienne” Blogger 2 1.1 Defining Key Terms: Cyberethics and Cybertechnology 3

1.1.1 What Is Cybertechnology? 4 1.1.2 Why the Term Cyberethics? 5

1.2 The Cyberethics Evolution: Four Developmental Phases in Cybertechnology 6 1.3 Are Cyberethics Issues Unique Ethical Issues? 9 Scenario 1–4: Developing the Code for a Computerized Weapon System 10 Scenario 1–5: Digital Piracy 11

1.3.1 Distinguishing between Unique Technological Features and Unique Ethical Issues 11

1.3.2 An Alternative Strategy for Analyzing the Debate about the Uniqueness of Cyberethics Issues 12

1.3.3 A Policy Vacuum in Duplicating Computer Software 13 1.4 Cyberethics as a Branch of Applied Ethics: Three Distinct Perspectives 14

1.4.1 Perspective #1: Cyberethics as a Field of Professional Ethics 15 1.4.2 Perspective #2: Cyberethics as a Field of Philosophical Ethics 18 1.4.3 Perspective #3: Cyberethics as a Field of Sociological/Descriptive Ethics 21

Scenario 1–6: The Impact of Technology X on the Pleasantville Community 21 1.5 A Comprehensive Cyberethics Methodology 24

1.5.1 A “Disclosive” Method for Cyberethics 25 1.5.2 An Interdisciplinary and Multilevel Method for Analyzing

Cyberethics Issues 26 1.6 A Comprehensive Strategy for Approaching Cyberethics Issues 27 1.7 Chapter Summary 28

vii

FTOC3GXML 10/20/2012 1:3:1 Page 8

Review Questions 28 Discussion Questions 29 Essay/Presentation Questions 29 Scenarios for Analysis 29 Endnotes 30 References 31 Further Readings 32 Online Resources 32

c CHAPTER 2

ETHICAL CONCEPTS AND ETHICAL THEORIES: ESTABLISHING AND JUSTIFYING A MORAL SYSTEM 33

2.1 Ethics and Morality 33 Scenario 2–1: The “Runaway Trolley”: A Classic Moral Dilemma 34

2.1.1 What Is Morality? 35 2.1.2 Deriving and Justifying the Rules and Principles of a Moral System 38

2.2 Discussion Stoppers as Roadblocks to Moral Discourse 42 2.2.1 Discussion Stopper #1: People Disagree on Solutions to

Moral Issues 43 2.2.2 Discussion Stopper #2: Who Am I to Judge Others? 45 2.2.3 Discussion Stopper #3: Morality Is Simply a Private Matter 47 2.2.4 Discussion Stopper #4: Morality Is Simply a Matter for Individual

Cultures to Decide 48 Scenario 2–2: The Perils of Moral Relativism 49 2.3 Why Do We Need Ethical Theories? 52 2.4 Consequence-Based Ethical Theories 53

2.4.1 Act Utilitarianism 55 Scenario 2–3: A Controversial Policy in Newmerica 55

2.4.2 Rule Utilitarianism 55 2.5 Duty-Based Ethical Theories 56

2.5.1 Rule Deontology 57 Scenario 2–4: Making an Exception for Oneself 58

2.5.2 Act Deontology 59 Scenario 2–5: A Dilemma Involving Conflicting Duties 60 2.6 Contract-Based Ethical Theories 61

2.6.1 Some Criticisms of Contract-Based Theories 62 2.6.2 Rights-Based Contract Theories 63

2.7 Character-Based Ethical Theories 64 2.7.1 Being a Moral Person vs. Following Moral Rules 64 2.7.2 Acquiring the “Correct” Habits 65

2.8 Integrating Aspects of Classical Ethical Theories into a Single Comprehensive Theory 66 2.8.1 Moor’s Just-Consequentialist Theory and Its Application to

Cybertechnology 67 2.8.2 Key Elements in Moor’s Just-Consequentialist Framework 69

2.9 Chapter Summary 70 Review Questions 70 Discussion Questions 71 Essay/Presentation Questions 71 Scenarios for Analysis 72 Endnotes 72

viii c Table of Contents

FTOC3GXML 10/20/2012 1:3:2 Page 9

References 73 Further Readings 73

c CHAPTER 3

CRITICAL REASONING SKILLS FOR EVALUATING DISPUTES IN CYBERETHICS 74

3.1 Getting Started 74 Scenario 3–1: Reasoning About Whether to Download a File from “Sharester” 75

3.1.1 Defining Two Key Terms in Critical Reasoning: Claims and Arguments 75 3.1.2 The Role of Arguments in Defending Claims 76 3.1.3 The Basic Structure of an Argument 76

3.2 Constructing an Argument 78 3.3 Valid Arguments 80 3.4 Sound Arguments 83 3.5 Invalid Arguments 85 3.6 Inductive Arguments 86 3.7 Fallacious Arguments 87 3.8 A Seven-Step Strategy for Evaluating Arguments 89 3.9 Identifying Some Common Fallacies 91

3.9.1 Ad Hominem Argument 92 3.9.2 Slippery Slope Argument 92 3.9.3 Fallacy of Appeal to Authority 93 3.9.4 False Cause Fallacy 93 3.9.5 Begging the Question 94 3.9.6 Fallacy of Composition/Fallacy of Division 94 3.9.7 Fallacy of Ambiguity/Equivocation 95 3.9.8 Appeal to the People (Argumentum ad Populum) 95 3.9.9 The Many/Any Fallacy 96 3.9.10 The Virtuality Fallacy 97

3.10 Chapter Summary 98 Review Questions 98 Discussion Questions 98 Essay/Presentation Questions 99 Scenarios for Analysis 99 Endnotes 99 References 100 Further Readings 100

c CHAPTER 4

PROFESSIONAL ETHICS, CODES OF CONDUCT, AND MORAL RESPONSIBILITY 101

4.1 Professional Ethics 102 4.1.1 What Is a Profession? 103 4.1.2 Who Is a Professional? 103 4.1.3 Who Is a Computer/IT Professional? 104

4.2 Do Computer/IT Professionals Have Any Special Moral Responsibilities? 105 4.2.1 Safety-Critical Software 105

4.3 Professional Codes of Ethics and Codes of Conduct 106 4.3.1 The Purpose of Professional Codes 107 4.3.2 Some Criticisms of Professional Codes 108 4.3.3 Defending Professional Codes 109 4.3.4 The IEEE-CS/ACM Software Engineering Code of Ethics and Professional

Practice 110

Table of Contents b ix

FTOC3GXML 10/20/2012 1:3:2 Page 10

4.4 Conflicts of Professional Responsibility: Employee Loyalty and Whistle-Blowing 112 4.4.1 Do Employees Have an Obligation of Loyalty to Employers? 112 4.4.2 Whistle-Blowing Issues 114

Scenario 4–1: Whistle-Blowing and the “Star Wars” Controversy 115 4.4.3 An Alternative Strategy for Understanding Professional Responsibility 117

4.5 Moral Responsibility, Legal Liability, and Accountability 117 4.5.1 Distinguishing Responsibility from Liability and Accountability 118 4.5.2 Accountability and the Problem of “Many Hands” 119

Scenario 4–2: The Therac-25 Machine 120 4.5.3 Legal Liability and Moral Accountability 120

4.6 Risk Assessment in the Software Development Process 121 Scenario 4–3: The Aegis Radar System 121 4.7 Do Some Computer Corporations Have Special Moral Obligations? 122

4.7.1 Special Responsibilities for Search Engine Companies 123 4.7.2 Special Responsibilities for Companies that Develop Autonomous Systems 124

4.8 Chapter Summary 125 Review Questions 126 Discussion Questions 126 Essay/Presentation Questions 126 Scenarios for Analysis 127 Endnotes 128 References 128 Further Readings 130

c CHAPTER 5

PRIVACY AND CYBERSPACE 131

5.1 Are Privacy Concerns Associated with Cybertechnology Unique or Special? 132 5.2 What is Personal Privacy? 134

5.2.1 Accessibility Privacy: Freedom from Unwarranted Intrusion 135 5.2.2 Decisional Privacy: Freedom from Interference in One’s

Personal Affairs 135 5.2.3 Informational Privacy: Control over the Flow of Personal

Information 136 5.2.4 A Comprehensive Account of Privacy 136

Scenario 5–1: Descriptive Privacy 137 Scenario 5–2: Normative Privacy 137

5.2.5 Privacy as “Contextual Integrity” 137 Scenario 5–3: Preserving Contextual Integrity in a University Seminar 138 5.3 Why is Privacy Important? 139

5.3.1 Is Privacy an Intrinsic Value? 140 5.3.2 Privacy as a Social Value 141

5.4 Gathering Personal Data: Monitoring, Recording, and Tracking Techniques 141 5.4.1 “Dataveillance” Techniques 141 5.4.2 Internet Cookies 142 5.4.3 RFID Technology 143 5.4.4 Cybertechnology and Government Surveillance 145

5.5 Exchanging Personal Data: Merging and Matching Electronic Records 146 5.5.1 Merging Computerized Records 146

Scenario 5–4: Merging Personal Information in Unrelated Computer Databases 147 5.5.2 Matching Computerized Records 148

Scenario 5–5: Using Biometric Technology at Super Bowl XXXV 149

x c Table of Contents

FTOC3GXML 10/20/2012 1:3:2 Page 11

5.6 Mining Personal Data 150 5.6.1 How Does Data Mining Threaten Personal Privacy? 150

Scenario 5–6: Data Mining at the XYZ Bank 151 5.6.2 Web Mining 154

Scenario 5–7: The Facebook Beacon Controversy 154 5.7 Protecting Personal Privacy in Public Space 156 Scenario 5–8: Shopping at SuperMart 157 Scenario 5–9: Shopping at Nile.com 157

5.7.1 Search Engines and the Disclosure of Personal Information 158 Scenario 5–10: Tracking Your Search Requests on Google 159

5.7.2 Accessing Online Public Records 160 Scenario 5–11: Accessing Online Public Records in Pleasantville 161 Scenario 5–12: Accessing a State’s Motor Vehicle Records Online 162 5.8 Privacy-Enhancing Technologies 162

5.8.1 Educating Users about PETs 163 5.8.2 PETs and the Principle of Informed Consent 163

5.9 Privacy Legislation and Industry Self-Regulation 164 5.9.1 Industry Self-Regulation Initiatives Regarding Privacy 164

Scenario 5–13: Controversies Involving Google’s Privacy Policy 166 5.9.2 Privacy Laws and Data Protection Principles 166

5.10 Chapter Summary 168 Review Questions 169 Discussion Questions 169 Essay/Presentation Questions 170 Scenarios for Analysis 170 Endnotes 171 References 171 Further Readings 173

c CHAPTER 6

SECURITY IN CYBERSPACE 174

6.1 Security in the Context of Cybertechnology 174 6.1.1 Cybersecurity as Related to Cybercrime 175 6.1.2 Security and Privacy: Some Similarities and Some Differences 175

6.2 Three Categories of Cybersecurity 176 6.2.1 Data Security: Confidentiality, Integrity, and Availability

of Information 177 6.2.2 System Security: Viruses, Worms, and Malware 178

Scenario 6–1: The Conficker Worm 178 6.2.3 Network Security: Protecting our Infrastructure 179

Scenario 6–2: The GhostNet Controversy 179 6.3 “Cloud Computing” and Security 180

6.3.1 Deployment and Service/Delivery Models for the Cloud 181 6.3.2 Securing User Data Residing in the Cloud 182

6.4 Hacking and “The Hacker Ethic” 183 6.4.1 What Is “The Hacker Ethic”? 184 6.4.2 Are Computer Break-ins Ever Ethically Justifiable? 186

6.5 Cyberterrorism 187 6.5.1 Cyberterrorism vs. Hacktivism 188

Scenario 6–3: Anonymous and the “Operation Payback” Attack 189 6.5.2 Cybertechnology and Terrorist Organizations 190

Table of Contents b xi

FTOC3GXML 10/20/2012 1:3:2 Page 12

6.6 Information Warfare (IW) 191 6.6.1 Information Warfare vs. Conventional Warfare 191

Scenario 6–4: The Stuxnet Worm and the “Olympic Games” Operation 192 6.6.2 Potential Consequences for Nations that Engage in IW 192

6.7 Cybersecurity and Risk Analysis 194 6.7.1 The Risk Analysis Methodology 194 6.7.2 The Problem of “De-Perimeterization” of Information Security for

Analyzing Risk 195 6.8 Chapter Summary 196 Review Questions 196 Discussion Questions 197 Essay/Presentation Questions 197 Scenarios for Analysis 197 Endnotes 198 References 198 Further Readings 200

c CHAPTER 7

CYBERCRIME AND CYBER-RELATED CRIMES 201

7.1 Cybercrimes and Cybercriminals 201 7.1.1 Background Events: A Brief Sketch 202 7.1.2 A Typical Cybercriminal 203

7.2 Hacking, Cracking, and Counterhacking 203 7.2.1 Hacking vs. Cracking 204 7.2.2 Active Defense Hacking: Can Acts of “Hacking Back” or Counter

Hacking Ever Be Morally Justified? 204 7.3 Defining Cybercrime 205

7.3.1 Determining the Criteria 206 7.3.2 A Preliminary Definition of Cybercrime 207

Scenario 7–1: Using a Computer to File a Fraudulent Tax Return 207 7.3.3 Framing a Coherent and Comprehensive Definition of Cybercrime 208

7.4 Three Categories of Cybercrime: Piracy, Trespass, and Vandalism in Cyberspace 208 7.5 Cyber-Related Crimes 209

7.5.1 Some Examples of Cyber-Exacerbated vs. Cyber-Assisted Crimes 209 7.5.2 Identity Theft 211

7.6 Technologies and Tools for Combating Cybercrime 213 Scenario 7–2: Intercepting Mail that Enters and Leaves Your Neighborhood 213

7.6.1 Biometric Technologies 214 7.6.2 Keystroke-Monitoring Software and Packet-Sniffing Programs 215

7.7 Programs and Techniques Designed to Combat Cybercrime in the United States 216 7.7.1 Entrapment and “Sting” Operations to Catch Internet Pedophiles 216

Scenario 7–3: Entrapment on the Internet 216 7.7.2 Enhanced Government Surveillance Techniques and the Patriot Act 217

7.8 National and International Laws to Combat Cybercrime 218 7.8.1 The Problem of Jurisdiction in Cyberspace 218

Scenario 7–4: A Virtual Casino 218 Scenario 7–5: Prosecuting a Computer Corporation in Multiple Countries 219

7.8.2 Some International Laws and Conventions Affecting Cybercrime 220 Scenario 7–6: The Pirate Bay Web Site 221 7.9 Cybercrime and the Free Press: The WikiLeaks Controversy 221

7.9.1 Are WikiLeaks’ Practices Ethical? 222

xii c Table of Contents

FTOC3GXML 10/20/2012 1:3:2 Page 13

7.9.2 Are WikiLeaks’ Practices Criminal? 222 7.9.3 WikiLeaks and the Free Press 223

7.10 Chapter Summary 225 Review Questions 225 Discussion Questions 226 Essay/Presentation Questions 226 Scenarios for Analysis 226 Endnotes 227 References 228 Further Readings 229

c CHAPTER 8

INTELLECTUAL PROPERTY DISPUTES IN CYBERSPACE 230

8.1 What is Intellectual Property? 230 8.1.1 Intellectual Objects 231 8.1.2 Why Protect Intellectual Objects? 232 8.1.3 Software as Intellectual Property 232 8.1.4 Evaluating an Argument for Why It is Wrong to Copy

Proprietary Software 233 8.2 Copyright Law and Digital Media 235

8.2.1 The Evolution of Copyright Law in the United States 235 8.2.2 The Fair-Use and First-Sale Provisions of Copyright Law 236

Scenario 8–1: Making Classic Books Available Online 237 Scenario 8–2: Decrypting Security on an e-Book Reader 237

8.2.3 Software Piracy as Copyright Infringement 238 8.2.4 Napster and the Ongoing Battles over Sharing Digital Music 239

Scenario 8–3: The Case of MGM v. Grokster 241 8.3 Patents, Trademarks, and Trade Secrets 242

8.3.1 Patent Protections 242 8.3.2 Trademarks 243 8.3.3 Trade Secrets 243

8.4 Jurisdictional Issues Involving Intellectual Property Laws 244 8.5 Philosophical Foundations for Intellectual Property Rights 245

8.5.1 The Labor Theory of Property 245 Scenario 8–4: DEF Corporation vs. XYZ Inc. 246

8.5.2 The Utilitarian Theory of Property 247 Scenario 8–5: Sam’s e-Book Reader Add-on Device 247

8.5.3 The Personality Theory of Property 248 Scenario 8–6: Angela’s Bþþ Programming Tool 249 8.6 The Free Software and the Open Source Movements 250

8.6.1 GNU and the Free Software Foundation 250 8.6.2 The “Open Source Software” Movement: OSS vs. FSF 251

8.7 The “Common-Good” Approach: An Alternative Framework for Analyzing the Intellectual Property Debate 252 8.7.1 Information Wants to be Shared vs. Information Wants to be Free 254 8.7.2 Preserving the Information Commons 256 8.7.3 The Fate of the Information Commons: Could the Public Domain of

Ideas Eventually Disappear? 257 8.7.4 The Creative Commons 259

8.8 PIPA, SOPA, and RWA Legislation: Current Battlegrounds in the Intellectual Property War 260

Table of Contents b xiii

FTOC3GXML 10/20/2012 1:3:2 Page 14

8.8.1 The PIPA and SOPA Battles 261 8.8.2 RWA and Public Access to Health-Related Information 261

Scenario 8–7: Elsevier Press and “The Cost of Knowledge” Boycott 262 8.8.3 Intellectual Property Battles in the Near Future 263

8.9 Chapter Summary 264 Review Questions 264 Discussion Questions 265 Essay/Presentation Questions 265 Scenarios for Analysis 265 Endnotes 266 References 267 Further Readings 268

c CHAPTER 9

REGULATING COMMERCE AND SPEECH IN CYBERSPACE 269

9.1 Background Issues and Some Preliminary Distinctions 270 9.1.1 The Ontology of Cyberspace: Is the Internet a Medium or a Place? 270 9.1.2 Two Categories of Cyberspace Regulation 271

9.2 Four Modes of Regulation: The Lessig Model 273 9.3 Digital Rights Management and the Privatization of Information Policy 274

9.3.1 DRM Technology: Implications for Public Debate on Copyright Issues 274 Scenario 9–1: The Sony Rootkit Controversy 275

9.3.2 Privatizing Information Policy: Implications for the Internet 276 9.4 The Use and Misuse of (HTML) Metatags and Web Hyperlinks 278

9.4.1 Issues Surrounding the Use/Abuse of HTML Metatags 278 Scenario 9–2: A Deceptive Use of HTML Metatags 279

9.4.2 Hyperlinking and Deep Linking 279 Scenario 9–3: Deep Linking on the Ticketmaster Web Site 280 9.5 E-Mail Spam 281

9.5.1 Defining Spam 281 9.5.2 Why Is Spam Morally Objectionable? 282

9.6 Free Speech vs. Censorship and Content Control in Cyberspace 284 9.6.1 Protecting Free Speech 284 9.6.2 Defining Censorship 285

9.7 Pornography in Cyberspace 286 9.7.1 Interpreting “Community Standards” in Cyberspace 286 9.7.2 Internet Pornography Laws and Protecting Children Online 287 9.7.3 Virtual Child Pornography 288

Scenario 9–4: A Sexting Incident Involving Greensburg Salem High School 290 9.8 Hate Speech and Speech that can Cause Physical Harm to Others 292

9.8.1 Hate Speech on the Web 292 9.8.2 Online “Speech” that Can Cause Physical Harm to Others 294

9.9 “Network Neutrality” and the Future of Internet Regulation 294 9.9.1 Defining Network Neutrality 295 9.9.2 SomeArgumentsAdvanced byNetNeutrality’s Proponents andOpponents 296 9.9.3 Future Implications for the Net Neutrality Debate 296

9.10 Chapter Summary 297 Review Questions 298 Discussion Questions 298 Essay/Presentation Questions 299 Scenarios for Analysis 299 Endnotes 300

xiv c Table of Contents

FTOC3GXML 10/20/2012 1:3:2 Page 15

References 300 Further Readings 301

c CHAPTER 10

THE DIGITAL DIVIDE, DEMOCRACY, AND WORK 303

10.1 The Digital Divide 304 10.1.1 The Global Digital Divide 304 10.1.2 The Digital Divide within Nations 305

Scenario 10–1: Providing In-Home Internet Service for Public School Students 306 10.1.3 Is the Digital Divide an Ethical Issue? 307

10.2 Cybertechnology and the Disabled 309 10.2.1 Disabled Persons and Remote Work 310 10.2.2 Arguments for Continued WAI Support 311

10.3 Cybertechnology and Race 312 10.3.1 Internet Usage Patterns 312 10.3.2 Racism and the Internet 313

10.4 Cybertechnology and Gender 314 10.4.1 Access to High-Technology Jobs 315 10.4.2 Gender Bias in Software Design and Video Games 317

10.5 Cybertechnology, Democracy, and Democratic Ideals 317 10.5.1 Has Cybertechnology Enhanced or Threatened Democracy? 318 10.5.2 How has Cybertechnology Affected Political Elections in

Democratic Nations? 322 10.6 The Transformation and the Quality of Work 324

10.6.1 Job Displacement and the Transformed Workplace 324 10.6.2 The Quality of Work Life in the Digital Era 328

Scenario 10–2: Employee Monitoring and the Case of Ontario v. Quon 329 10.7 Chapter Summary 331 Review Questions 332 Discussion Questions 332 Essay/Presentation Questions 333 Scenarios for Analysis 333 Endnotes 334 References 335 Further Readings 336

c CHAPTER 11

ONLINE COMMUNITIES, CYBER IDENTITIES, AND SOCIAL NETWORKS 337

11.1 Online Communities and Social Networking Services 337 11.1.1 Online Communities vs. Traditional Communities 337 11.1.2 Blogs in the Context of Online Communities 339 11.1.3 Assessing Pros and Cons of Online Communities 339

Scenario 11–1: A Virtual Rape in Cyberspace 342 11.2 Virtual Environments and Virtual Reality 343

11.2.1 What is Virtual Reality (VR)? 344 11.2.2 Ethical Controversies Involving Behavior in VR Applications and Games 345 11.2.3 Misrepresentation, Bias, and Indecent Representations in VR Applications 349

11.3 Cyber Identities and Cyber Selves: Personal Identity and Our Sense of Self in the Cyber Era 351 11.3.1 Cybertechnology as a “Medium of Self-Expression” 352 11.3.2 “MUD Selves” and Distributed Personal Identities 352 11.3.3 The Impact of Cybertechnology on Our Sense of Self 353

11.4 AI and its Implications for What it Means to be Human 355

Table of Contents b xv

FTOC3GXML 10/20/2012 1:3:2 Page 16

11.4.1 What is AI? A Brief Overview 355 11.4.2 The Turing Test and John Searle’s “Chinese Room” Argument 357 11.4.3 Cyborgs and Human-Machine Relationships 358

Scenario 11–2: Artificial Children 361 11.4.4 Do (At Least Some) AI Entities Warrant Moral Consideration? 361

11.5 Chapter Summary 363 Review Questions 363 Discussion Questions 364 Essay/Presentation Questions 364 Scenarios for Analysis 365 Endnotes 365 References 366 Further Readings 367

c CHAPTER 12

ETHICAL ASPECTS OF EMERGING AND CONVERGING TECHNOLOGIES 368

12.1 Converging Technologies and Technological Convergence 368 12.2 Ambient Intelligence (AmI) and Ubiquitous Computing 369

12.2.1 Pervasive Computing 371 12.2.2 Ubiquitous Communication 371 12.2.3 Intelligent User Interfaces 371 12.2.4 Ethical and Social Issues in AmI 372

Scenario 12–1: E. M. Forster’s Precautionary Tale 373 Scenario 12–2: Jeremy Bentham’s Panopticon 375 12.3 Bioinformatics and Computational Genomics 376

12.3.1 Computing and Genetic “Machinery”: Some Conceptual Connections 376 12.3.2 Ethical Issues and Controversies 376

Scenario 12–3: deCODE Genetics Inc. 377 12.3.3 ELSI Guidelines and Genetic-Specific Legislation 380

12.4 Nanotechnology and Nanocomputing 381 12.4.1 Nanotechnology: A Brief Overview 382 12.4.2 Optimistic vs. Pessimistic Views of Nanotechnology 383 12.4.3 Ethical Issues in Nanotechnology and Nanocomputing 386

12.5 Autonomous Machines and Machine Ethics 389 12.5.1 What is an Autonomous Machine (AM)? 390 12.5.2 Some Ethical and Philosophical Questions Involving AMs 393 12.5.3 Machine Ethics and Moral Machines 398

12.6 A “Dynamic” Ethical Framework for Guiding Research in New and Emerging Technologies 402 12.6.1 Is an ELSI-Like Model Adequate for New/Emerging Technologies? 402 12.6.2 A “Dynamic Ethics” Model 403

12.7 Chapter Summary 404 Review Questions 404 Discussion Questions 405 Essay/Presentation Questions 405 Scenarios for Analysis 405 Endnotes 406 References 407 Further Readings 409

GLOSSARY 411

INDEX 417

xvi c Table of Contents

FPREF3GXML 10/20/2012 1:5:10 Page 17

c

PREFACE

As the digital landscape continues to evolve at a rapid pace, new variations of moral, legal, and social concerns arise along with it. Not surprisingly, then, an additional cluster of cyberethics issues has emerged since the publication of the previous edition of Ethics and Technology in late 2009. Consider, for example, the ways in which Cloud- based storage threatens the privacy and security of our personal data. Also consider the increasing amount of personal data that social networking sites such as Facebook and major search engine companies such as Google now collect. Should we worry about how that information can be subsequently used? Should we also worry about the filtering techniques that leading search engines now use to tailor or “personalize” the results of our search queries based on profiles derived from information about our previous search requests? Some analysts note that the current information-gathering/profiling practices and techniques used in the commercial sector can also be adopted by governments, and they point out that these practices could not only support the surveillance initiatives of totalitarian governments but could also threaten the privacy of citizens in democratic countries as well.

Also consider the impact that recent cyberwarfare activities, including the clan- destine cyberattacks allegedly launched by some nation sates, could have for our national infrastructure. Additionally, consider the national-security-related concerns raised by the WikiLeaks controversy, which has also exacerbated an ongoing tension between free speech on the Internet vs. standards for “responsible reporting” on the part of investigative journalists. And the recent debate about “network neutrality” causes us to revisit questions about the extent to which the service providers responsi- ble for delivering online content should also be able to control the content that they deliver.

Other kinds of concerns now arise because of developments in a relatively new subfield of cyberethics called “machine ethics” (sometimes referred to as “robo-ethics”). For example, should we develop autonomous machines that are capable of making decisions that have moral implications? Some semiautonomous robots, which serve as companions and caregivers for the elderly and as “babysitters” for young children, are already available. Recent and continued developments in robotics and autonomous machines may provide many conveniences and services, but they can also cause us to question our conventional notions of autonomy, moral agency, and trust. For example, can/should these machines be fully autonomous? Can they qualify as (artificial) moral agents? Also, will humans be able to trust machines that they will increasingly rely on to carry out critical tasks? If we do not yet know the answers to these questions, and if no clear and explicit policies are in place to guide research in this area, should we continue to develop autonomous machines? These and related questions in the emerging

xvii

FPREF3GXML 10/20/2012 1:5:10 Page 18

field of machine ethics are but a few of the many new questions we examine in the fourth edition of Ethics and Technology.

Although new technologies emerge, and existing technologies continue to mature and evolve, many of the ethical issues associated with them are basically variations of existing ethical problems. At bottom, these issues reduce to traditional ethical concerns having to do with dignity, respect, fairness, obligations to assist others in need, and so forth. So, we should not infer that the moral landscape itself has been altered because of behaviors made possible by these technologies. We will see that, for the most part, the new issues examined in this edition of Ethics and Technology are similar in relevant respects to the kinds of ethical issues we examined in the book’s previous editions. However, many emerging technologies present us with challenges that, initially at least, do not seem to fit easily into our conventional ethical categories. So, a major objective of this textbook is to show how those controversies can be analyzed from the perspective of standard ethical concepts and theories.

The purpose ofEthics and Technology, as stated in the prefaces to the three previous editions of this book, is to introduce students to issues and controversies that comprise the relatively new field of cyberethics. The term “cyberethics” is used in this textbook to refer to the field of study that examines moral, legal, and social issues involving cybertechnology. Cybertechnology, in turn, refers to a broad spectrum of computing/ information and communication technologies that range from stand-alone computers to the current cluster of networked devices and technologies. Many of these technologies include devices and applications that are connected to privately owned computer networks as well as to the Internet itself.

This textbook examines a wide range of cyberethics issues—from specific issues of moral responsibility that directly affect computer and information technology (IT) professionals to broader social and ethical concerns that affect each of us in our day- to-day lives. Questions about the roles and responsibilities of computer/IT professionals in developing safe and reliable computer systems are examined under the category of professional ethics. Broader social and ethical concerns associated with cybertechnology are examined under topics such as privacy, security, crime, intellectual property, Internet regulation, and so forth.

c NEW TO THE FOURTH EDITION

New pedagogical material includes

� a newly designed set of end-of-chapter exercises called “Scenarios for Analysis,” which can be used for either in-class analysis or group projects;

� new and/or updated (in-chapter) scenarios, illustrating both actual cases and hypothetical situations, which enable students to apply methodological concepts/ frameworks and ethical theories covered in Chapters 1 and 2;

� new sample arguments in some chapters, which enable students to apply the tools for argument analysis covered in Chapter 3;

� updated “review questions,” “discussion questions,” and “essay/presentation questions” at the end of chapters;

xviii c Preface

FPREF3GXML 10/20/2012 1:5:10 Page 19

� an updated and revised glossary of key terms used in the book; � an updated Ethics and Technology Companion Site with new resources and

materials for students and instructors.

New issues examined and analyzed include

� ethical and social aspects of Cloud computing, including concerns about the privacy and security of users’ data that is increasingly being stored in “the Cloud”;

� concerns about the “personalization filters” that search engine companies use to tailor our search results to conform to their perceptions of what we want.

� questions about Google’s (2012) privacy policy vis-�a-vis the amount of user data that can be collected via the search engine company’s suite of applications;

� concerns about cyberwarfare activities involving nation states and their alleged launching of the Stuxnet worm and Flame virus;

� controversies surrounding WikiLeaks and the tension it creates between free speech and responsible journalism, as well as for concerns involving national security;

� concerns affecting “network neutrality” and whether regulation may be required to ensure that Internet service providers do not gain too much control over the content they deliver;

� controversies in “machine ethics,” including the development of autonomous machines capable of making decisions that have moral impacts;

� questions about whether we can trust artificial agents to act in ways that will always be in the best interests of humans.

In revising the book, I have also eliminated some older, now out-of-date, material. Additionally, I have streamlined some of the material that originally appeared in previous editions of the book but still needs to be carried over into the present edition.

c AUDIENCE AND SCOPE

Because cyberethics is an interdisciplinary field, this textbook aims at reaching several audiences and thus easily runs the risk of failing to meet the needs of any one audience. I have nonetheless attempted to compose a textbook that addresses the needs of computer science, philosophy, social/behavioral science, and library/information science students. Computer science students need a clear understanding of the ethical challenges they will face as computer professionals when they enter the workforce. Philosophy students, on the contrary, should understand how moral issues affecting cybertechnology can be situated in the field of applied ethics in general and then analyzed from the perspective of ethical theory. Social science and behavioral science students will likely want to assess the sociological impact of cybertechnology on our social and political institutions (govern- ment, commerce, and education) and sociodemographic groups (affecting gender, race, ethnicity, and social class). And library science and information science students should be aware of the complexities and nuances of current intellectual property laws that threaten unfettered access to electronic information, and should be informed about recent regulatory schemes that threaten to censor certain forms of electronic speech.

Preface b xix

FPREF3GXML 10/20/2012 1:5:10 Page 20

Students from other academic disciplines should also findmany issues covered in this textbook pertinent to their personal and professional lives; some undergraduates may elect to take a course in social and ethical aspects of technology to satisfy one of their general education requirements. Although Ethics and Technology is intended mainly for undergraduate students, it could be used, in conjunction with other texts, in graduate courses as well.

We examine ethical controversies using scenarios that include both actual cases and hypothetical examples, wherever appropriate. In some instances I have deliberately constructed provocative scenarios and selected controversial cases to convey the severity of the ethical issues we consider. Some readers may be uncomfortable with, and possibly even offended by, these scenarios and cases—for example, those illustrating unethical practices that negatively affect children and minorities. Although it might have been politically expedient to skip over issues and scenarios that could unintentionally offend certain individuals, I believe that no textbook in applied ethics would do justice to its topic if it failed to expose and examine issues that adversely affect vulnerable groups in society.

Also included in most chapters are sample arguments that are intended to illustrate some of the rationales that have been put forth by various interest groups to defend policies and laws affecting privacy, security, property, and so forth, in cyberspace. Instructors and students can evaluate these arguments via the rules and criteria estab- lished in Chapter 3 to see how well, or how poorly, the premises in these arguments succeed in establishing their conclusions.

Exercise questions are included at the end of each chapter. First, basic “review questions” quiz the reader’s comprehension of key concepts, themes, issues, and scenarios covered in that chapter. These are followed by higher level “discussion questions” designed to encourage students to reflect more deeply on some of the contro- versial issues examined in the chapter. In addition to “essay/presentation questions” that are also included in each chapter, a new set of “Scenarios for Analysis” have been added in response to instructors who requested the addition of some unanalyzed scenarios for classroom use. Building on the higher level nature of the discussion questions and essay/presentation questions, these scenarios are intended to provide students and instructors with additional resources for analyzing important controversies intro- duced in the various chapters. As such, these scenarios can function as in-class resources for group projects.

Some essay/presentation questions and end-of-chapter scenarios ask students to compare and contrast arguments and topics that span multiple chapters; for example, students are asked to relate arguments used to defend intellectual property rights, considered in Chapter 8, to arguments for protecting privacy rights, examined in Chapter 5. Other questions and scenarios ask students to apply foundational concepts and frameworks, such as ethical theory and critical thinking techniques introduced in Chapters 2 and 3, to the analysis of specific cyberethics issues examined in subsequent chapters. In some cases, these end-of-chapter questions and scenarios may generate lively debate in the classroom; in other cases, they can serve as a point of departure for various class assignments and group projects. Although no final “solutions” to the issues and dilemmas raised in these questions and scenarios are provided in the text, some “strategies” for analyzing them are included in the section of the book’s Web site (www.w iley.co m/college /tava ni) entit led “Strate gies for Discussi on Quest ions. ”

xx c Preface

http://www.wiley.com/college/tavani
FPREF3GXML 10/20/2012 1:5:11 Page 21

c ORGANIZATION AND STRUCTURE OF THE BOOK

Ethics and Technology is organized into 12 chapters. Chapter 1, “Introduction to Cyberethics: Concepts, Perspectives, and Methodological Frameworks,” defines key concepts and terms that will appear throughout the book. For example, definitions of terms such as cyberethics and cybertechnology are introduced in this chapter. We then examine whether any ethical issues involving cybertechnology are unique ethical issues. We also consider how we can approach cyberethics issues from three different perspec- tives: professional ethics, philosophical ethics, and sociological/descriptive ethics, each of which represents the approach generally taken by a computer scientist, a philosopher, and a social/behavioral scientist. Chapter 1 concludes with a proposal for a comprehen- sive and interdisciplinary methodological scheme for analyzing cyberethics issues from these perspectives.

In Chapter 2, “Ethical Concepts and Ethical Theories: Establishing and Justifying a Moral System,”we examine some of the basic concepts that make up a moral system. We draw a distinction between “ethics” and “morality” by defining ethics as “the study of morality.” “Morality,” or a moral system, is defined as an informal, public system comprising rules of conduct and principles for evaluating those rules. We then examine consequence-based, duty-based, character-based, and contract-based ethical theories. Chapter 2 concludes with a model that integrates elements of competing ethical theories into one comprehensive and unified theory.

Chapter 3, “Critical Reasoning Skills for Evaluating Disputes in Cyberethics,” includes a brief overview of basic concepts and strategies that are essential for debating moral issues in a structured and rational manner. We begin by describing the structure of a logical argument and show how arguments can be constructed and analyzed. Next, we examine a technique for distinguishing between arguments that are valid and invalid, sound and unsound, and inductive and fallacious. We illustrate examples of each type with topics affecting cybertechnology and cyberethics. Finally, we identify some strate- gies for spotting and labeling “informal” logical fallacies that frequently occur in everyday discourse.

Chapter 4, “Professional Ethics, Codes of Conduct, and Moral Responsibility,” examines issues related to professional responsibility for computer/IT professionals. We consider whether there are any special moral responsibilities that computer/IT professionals have as professionals. We then examine some professional codes of conducted that have been adopted by computer organizations. We also ask: To what extent are software engineers responsible for the reliability of the computer systems they design and develop, especially applications that include “life-critical” and “safety- critical” software? Are computer/IT professionals ever permitted, or perhaps even required, to “blow the whistle” when they have reasonable evidence to suggest that a computer system is unreliable? Finally, we examine some schemes for analyzing risks associated with the development of safety-critical software.

We discuss privacy issues involving cybertechnology in Chapter 5. First, we examine the concept of privacy as well as some arguments for why privacy is considered an important human value. We then look at how personal privacy is threatened by the kinds of surveillance techniques and data-collection schemes made possible by cybertechnol- ogy. Specific data-gathering and data-exchanging techniques are examined in detail. We next consider some challenges that data mining and Web mining pose for protecting

Preface b xxi

FPREF3GXML 10/20/2012 1:5:11 Page 22

personal privacy in public space. In Chapter 5, we also consider whether technology itself, in the form of privacy-enhancing technologies (or PETs), can provide an adequate solution to some privacy issues generated by cybertechnology.

Chapter 6, “Security in Cyberspace,” examines security threats in the context of computers and cybertechnology. Initially, we differentiate three distinct senses of “security”: data security, system security, and network security. We then examine the concepts of “hacker” and “hacker ethic,” and we ask whether computer break-ins can ever be morally justified. Next, we differentiate acts of “hacktivism,” cyberterrorism, and information warfare. Chapter 6 concludes with a brief examination of risk analysis in the context of cybersecurity.

We begin our analysis of cybercrime, in Chapter 7, by considering whether we can construct a profile of a “typical” cybercriminal. We then propose a definition of cybercrime that enables us to distinguish between “cyberspecific” and “cyber-related” crimes to see whether such a distinction would aid in the formulation of more coherent cybercrime laws. We also consider the notion of legal jurisdiction in cyberspace, especially with respect to the prosecution of cybercrimes that involve interstate and international venues. In addition, we examine technological efforts to combat cyber- crime, such as controversial uses of biometric technologies.

Chapters 8 and 9 examine legal issues involving intellectual property and free speech, respectively, as they relate to cyberspace. One objective of Chapter 8, “Intellectual Property Disputes in Cyberspace,” is to show why an understanding of the concept of intellectual property is important in an era of digital information. We consider three theories of property rights and make important distinctions among legal concepts such as copyright law, patent protection, and trademarks. Additionally, we consider specific scenarios involving intellectual property disputes, including the original Napster contro- versy as well as some recent peer-to-peer (P2P) networks that have been used for file sharing. We also examine the Free Software and the Open Source Software initiatives. Finally, we consider a compromise solution that supports and encourages the sharing of digital information in an era when strong copyright legislation seems to discourage that practice.

Chapter 9, “Regulating Commerce and Speech in Cyberspace,” looks at additional legal issues, especially as they involve regulatory concerns in cyberspace. We draw distinctions between two different senses of “regulation” as it applies to cyberspace, and we also consider whether the Internet should be understood as a medium or as a “place.” We also examine controversies surrounding e-mail spam, which some believe can be viewed as a formof “speech” in cyberspace.We then askwhether all formsof online speech should be granted legal protection; for example, should child pornography, hate speech, and speech that can cause physical harm to others be tolerated in online forums?

Chapter 10 examines a wide range of equity-and-access issues from the perspective of cybertechnology’s impact for sociodemographic groups (affecting class, race, and gender). The chapter begins with an analysis of global aspects of the “digital divide.”We then examine specific equity-and-access issues affecting disabled persons, racial minor- ities, and women. Next, we explore the relationship between cybertechnology and democracy, and we consider whether the Internet facilitates democracy or threatens it. We then examine some social and ethical issues affecting employment in the contemporary workplace, and we ask whether the use of cybertechnology has trans- formed work and has affected the overall quality of work life.

xxii c Preface

FPREF3GXML 10/20/2012 1:5:11 Page 23

In Chapter 11, we examine issues pertaining to online communities, virtual-reality (VR) environments, and artificial intelligence (AI) developments in terms of two broad themes: community and personal identity in cyberspace. We begin by analyzing the impact that cybertechnology has for our traditional understanding of the concept of community. In particular, we ask whether online communities, such as Facebook and Twitter, raise any special ethical or social issues. Next, we examine some implications that behaviors made possible by virtual environments and virtual-reality applications have for our conventional understanding of personal identity. The final section of Chapter 11 examines the impact that developments in AI have for our sense of self and for what it means to be human.

Chapter 12, the final chapter of Ethics and Technology, examines some ethical challenges that arise in connection with emerging and converging technologies. We note that cybertechnology is converging with noncybertechnologies, including biotechnology and nanotechnology, generating new fields such as bioinformatics and nanocomputing that, in turn, introduce ethical concerns. Chapter 12 also includes a brief examination of some issues in the emerging (sub)field of machine ethics. Among the questions consid- ered are whether we should develop autonomous machines that are capable of making moral decisions and whether we could trust those machines to always act in our best interests.

A Glossary that defines terms commonly used in the context of computer ethics and cyberethics is also included. However, the glossary is by no means intended as an exhaustive list of such terms. Additional material for this text is available on the book’s W eb site : www .wiley.c om/col lege.tava ni.

c THEWEB SITE FOR ETHICS AND TECHNOLOGY

Seven appendices for Ethics and Technology are available only in online format. Appendices A through E include the full text of five professional codes of ethics: the ACM Code of Ethics and Professional Conduct, the Australian Computer Society Code of Ethics, the British Computer Society Code of Conduct, the IEEE Code of Ethics, and the IEEE-CS/ACM Software Engineering Code of Ethics and Professional Practice, respectively. Specific sections of these codes are included in hardcopy format as well, in relevant sections of Chapter 4. Two appendices, F and G, are also available online. Appendix F contains the section of the IEEE-CS/ACM Computing Curricula 2001 Final Report that describes the social, professional, and ethical units of instruction mandated in their computer science curriculum. Appendix G provides some additional critical reasoning techniques that expand on the strategies introduced in Chapter 3.

The Web site for Ethics and Technology also contains additional resources for instructors and students. Presentation slides in PowerPoint format for Chapters 1–12, as well as graphics (for tables and figures in each chapter), are available in the “Instructor” and “Student” sections of the site. As noted earlier, a section on “Strategies,” which includes some techniques for answering the discussion questions and unanalyzed sce- narios included at the end of each of the book’s 12 chapters, is also included on this site.

The book’s Web site is intended as an additional resource for both instructors and students. It also enables me to “update the book,” in between editions, with new issues and scenarios in cyberethics, as they arise. For example, a section entitled “Recent

Preface b xxiii

http://www.wiley.com/college.tavani
FPREF3GXML 10/20/2012 1:5:11 Page 24

Controversies” is included on the book’s Web site. I invite your feedback as to how this site can be continually improved.

c A NOTE TO STUDENTS

If you are taking an ethics course for the first time, you might feel uncomfortable with the prospect of embarking on a study of moral issues and controversial topics that might initially cause you discomfort because ethics is sometimes perceived to be preachy, and its subject matter is sometimes viewed as essentially personal and private in nature. Because these are common concerns, I address them early in the textbook. I draw a distinction between an ethicist, who studies morality or a “moral system,” and a moralist who may assume to have the correct answers to all of the questions; note that a primary objective of this book is to examine and analyze ethical issues, not to presume that any of us already has the correct answer to any of the questions I consider.

To accomplish this objective, I introduce three types of conceptual frameworks early in the textbook. In Chapter 1, I provide a methodological scheme that enables you to identify controversial problems and issues involving cybertechnology as ethical issues. The conceptual scheme included in Chapter 2, based on ethical theory, provides some general principles that guide your analysis of specific cases as well as your deliberations about which kinds of solutions to problems should be proposed. A third, and final, conceptual framework is introduced in Chapter 3 in the form of critical reasoning techniques, which provides rules and standards that you can use for evaluating the strengths of competing arguments and for defending a particular position that you reach on a certain issue.

This textbook was designed and written for you, the student! Whether or not it succeeds in helping you to meet the objectives of a course in cyberethics is very important to me, so I welcome your feedback on this textbook; and I would sincerely appreciate hearing your ideas on how this textbook could be improved. Please feel free to write to me with your suggestions, comments, and so forth. My email address is htavani@rivier .edu. I look forward to hearing from you!

c NOTE TO INSTRUCTORS: A ROADMAP FOR USING THIS BOOK

The chapters that make up Ethics and Technology are sequenced so that readers are exposed to foundational issues and conceptual frameworks before they examine specific problems in cyberethics. In some cases, it may not be possible for instructors to cover all of the material in Chapters 1–3. It is strongly recommended, however, that before students are assigned material in Chapter 4, they at least read Sections 1.1, 1.4–1.5, 2.4– 2.8, and 3.1. Instructors using this textbook can determine which chapters best accom- modate their specific course objectives. Computer science instructors, for example, will likely want to assign Chapter 4, on professional ethics and responsibility, early in the term. Social science instructors, on the other hand, will likely examine issues discussed in Chapters 10 and 11 early in their course. Philosophy instructors may wish to structure their courses beginning with a thorough examination of the material on ethical concepts

xxiv c Preface

FPREF3GXML 10/20/2012 1:5:11 Page 25

and ethical theory in Chapter 2 and techniques for evaluating logical arguments in Chapter 3. Issues discussed in Chapter 12 may be of particular interest to CS instructors teaching advanced undergraduate students.

Many textbooks in applied ethics include a requisite chapter on ethical concepts/ theory at the beginning of the book. Unfortunately, they often treat them in a cursory manner; furthermore, these ethical concepts and theories are seldom developed and reinforced in the remaining chapters. Thus, readers often experience a “disconnect” between the material included in the book’s opening chapter and the content of the specific cases and issues discussed in subsequent chapters. By incorporating elements of ethical theory into my discussion and analysis of the specific cyberethics issues I examine, I have tried to avoid the “disconnect” between theory and practice that is commonplace in many applied ethics textbooks.

c ANOTE TO COMPUTER SCIENCE INSTRUCTORS

Ethics and Technology can be used as the main text in a course dedicated to ethical and social issues in computing, or it can be used as a supplementary textbook for computer science courses in which one or more ethics modules are included. As I suggested in the preceding section, instructors may find it difficult to cover all of the material included in this book in the course of a single semester. And as I also previously suggested, computer science instructors will likely want to ensure that they allocate sufficient course time to the professional ethical issues discussed in Chapter 4. Also of special interest to computer science instructors and their students will be the sections on computer security and risk analysis in Chapter 6; open source code and intellectual property issues in Chapter 8; and regulatory issues affecting software code in Chapter 9. Because computer science instructors may need to limit the amount of class time they devote to covering founda- tional concepts included in the earlier chapters, I recommend covering at least the critical sections of Chapters 1–3 described previously. This should provide computer science students with some of the tools they will need as professionals to deliberate on ethical issues and to justify the positions they reach.

In designing this textbook, I took into account the guidelines on ethical instruction included in the Computing Curricula 2001 Final Report, issued in December 2001 by the IEEE-CS/ACM Joint Task Force on Computing Curricula, which recommends the inclusion of 16 core hours of instruction on social, ethical, and professional topics in the curriculum for undergraduate computer science students. [See the online Appendix F at www .wiley.c om/college .tavani for de tailed inform ation abo ut the social /professiona l (SP) units in the Computing Curricula 2001.] Each topic prefaced with an SP designation defines one “knowledge area” or a CS “body of knowledge.” They are distributed among the following 10 units:

SP1: History of computing (e.g., history of computer hardware, software, and networking)

SP2: Social context of computing (e.g., social implications of networked computing, gender-related issues, and international issues)

Preface b xxv

http://www.wiley.com/college.tavani
FPREF3GXML 10/20/2012 1:5:11 Page 26

SP3: Methods and tools of analysis (e.g., identifying assumptions and values, making and evaluating ethical arguments)

SP4: Professional and ethical responsibilities (e.g., the nature of professionalism, codes of ethics, ethical dissent, and whistle-blowing)

SP5: Risks and liabilities of computer-based systems (e.g., historical examples of software risks)

SP6: Intellectual property (e.g., foundations of intellectual property, copyrights, patents, and software piracy)

SP7: Privacy and civil liberties (e.g., ethical and legal basis for privacy protection, technological strategies for privacy protection)

SP8: Computer crime (e.g., history and examples of computer crime, hacking, viruses, and crime prevention strategies)

SP9: Economic issues in computing (e.g., monopolies and their economic implications; effect of skilled labor supply)

SP10: Philosophical frameworks (e.g., ethical theory, utilitarianism, relativism)

All 10 SP units are covered in this textbook. Topics described in SP1 are examined in Chapters 1 and 10, and topics included in SP2 are discussed in Chapters 1 and 11. The methods and analytical tools mentioned in SP3 are described at length in Chapters 2 and 3, whereas professional issues involving codes of conduct and professional responsibility described in SP4 are included in Chapters 4 and 12. Also discussed in Chapter 4, as well as in Chapter 6, are issues involving risks and liabilities (SP5). Intellectual property issues (SP6) are discussed in detail in Chapter 8 and in certain sections of Chapter 9, whereas privacy and civil liberty concerns (SP7) are discussed mainly in Chapters 5 and 12. Chapters 6 and 7 examine topics described in SP8. Economic issues (SP9) are considered in Chapters 9 and 10. And philosophical frameworks of ethics, including ethical theory (SP10), are discussed in Chapters 1 and 2.

Table 1 illustrates the corresponding connection between SP units and the chapters of this book.

TABLE 1 SP (“Knowledge”) Units and Corresponding Book Chapters

SP unit 1 2 3 4 5 6 7 8 9 10 Chapter(s) 1, 10 1, 11 2, 3 4, 12 4, 6 8, 9 5, 12 6, 7 9, 10 1, 2

xxvi c Preface

FACKN3GXML 10/20/2012 1:7:33 Page 27

c

ACKNOWLEDGMENTS

In revising Ethics and Technology for a fourth edition, I have once again drawn from several of my previously published works. Chapters 1–4, on foundational and profes- sional issues in cyberethics, incorporate material from four articles: “The State of Computer Ethics as a Philosophical Field of Inquiry,”Ethics and Information Technology 3, no. 2 (2001); “Applying an Interdisciplinary Approach to Teaching Computer Ethics,” IEEE Technology and Society Magazine 21, no. 3 (2002); “The Uniqueness Debate in Computer Ethics,” Ethics and Information Technology 4, no. 1 (2002); and “Search Engines and Ethics,” Stanford Encyclopedia of Philosophy (2012).

Chapter 5, on privacy in cyberspace, also draws from material in four works: “Computer Matching and Personal Privacy,” Proceedings of the Symposium on Com- puters and the Quality of Life (ACM Press, 1996); “Informational Privacy, Data Mining, and the Internet,” Ethics and Information Technology 1, no. 2 (1999); “Privacy Enhanc- ing Technologies as a Panacea for Online Privacy Concerns: Some Ethical Considera- tions,” Journal of Information Ethics 9, no. 2 (2000); and “Applying the ‘Contextual Integrity’ Model of Privacy to Personal Blogs in the Blogosphere” (coauthored with Frances Grodzinsky), International Journal of Internet Research Ethics 3 (2010). Chapters 6 and 7, on security and crime in cyberspace, draw from material in three sources: “Privacy and Security” in Duncan Langford’s book Internet Ethics (Macmillan/St. Martins, 2000); “Defining the Boundaries of Computer Crime: Piracy, Trespass, and Vandalism in Cyberspace” in Readings in CyberEthics 2nd ed. (Jones and Bartlett, 2004); and “Privacy in ‘the Cloud’” (coauthored with Frances Grodzinsky), Computers and Society 41, no. 1 (2011).

In Chapters 8 and 9, on intellectual property and Internet regulation, I drew from material in “Information Wants to be Shared: An Alternative Approach for Analyzing Intellectual Property Disputes in the Information Age,”Catholic Library World 73, no. 2 (2002); and two papers coauthored with Frances Grodzinsky: “P2P Networks and the Verizon v. RIAA Case,” Ethics and Information Technology 7, no. 4 (2005) and “Online File Sharing: Resolving the Tensions between Privacy and Property” Computers and Society 38, no. 4 (2008). Chapters 10 and 11, on the digital divide, democracy, and online communities, draw from material from two papers: “Ethical Reflections on the Digital Divide,” Journal of Information, Communication and Ethics in Society 1, no. 2 (2003) and “Online Communities, Democratic Ideals, and the Digital Divide” (coauthored with Frances Grodzinsky) in Soraj Hongladarom and Charles Ess’s book Information Tech- nology Ethics: Cultural Perspectives (IGI Global, 2007).

Chapter 12, on emerging and converging technologies, incorporates material from my book Ethics, Computing, and Genomics (Jones and Bartlett, 2006), and from three recently published papers: “CanWeDevelop Artificial Agents Capable of Making Good

xxvii

FACKN3GXML 10/20/2012 1:7:33 Page 28

Moral Decisions?” Minds and Machines 21, no. 3 (2011); “Trust and Multi-Agent Systems” (coauthored with Jeff Buechner), Ethics and Information Technology 13, no. 1 (2011); and “Ethical Aspects of Autonomous Systems” in Michael Decker and Mathias Gutmann’s book Robo- and Information-Ethics (Berlin: Verlag LIT, 2012).

The fourth edition of Ethics and Technology has benefited from suggestions and comments I received from many anonymous reviewers, as well as from the following colleagues: Jeff Buechner, Lloyd Carr, Jerry Dolan, Frances Grodzinsky, Kenneth Himma, James Moor, Martin Menke, Wayne Pauley, Mark Rosenbaum, Regina Tavani, and John Weckert. I am especially grateful to Fran Grodzinsky (Sacred Heart Univer- sity), with whom I have coauthored several papers, for permitting me to incorporate elements of our joint research into relevant sections of this book. And I ammost grateful to Lloyd Carr (Rivier University) for his invaluable feedback on several chapters and sections of this edition of the book, which he was willing to review multiple times; his astute comments and suggestions have helpedme to refinemany of the positions I defend in this book.

The new edition of the book has also benefited from some helpful comments that I received from many students who have used previous editions of the text. I am also grateful to the numerous reviewers and colleagues who commented on the previous editions of this book; many of their helpful suggestions have been carried over to the present edition.

I also wish to thank the editorial and production staffs atWiley and ThomsonDigital, especially Beth Golub, Elizabeth Mills, Katherine Willis, Jolene Ling, and Sanchari Sil, for their support during the various stages of the revision process for the fourth edition of Ethics and Technology.

Finally, I must once again thank the two most important people in my life: my wife Joanne, and our daughter Regina. Without their continued support and extraordinary patience, the fourth edition of this book could not have been completed.

This edition of Ethics and Technology is dedicated to the memory of my grand- parents: Leon and Marian (Roberts) Hutton, and Antonio and Clelia (Giamberardino) Tavani.

Herman T. Tavani Nashua, NH

xxviii c Acknowledgments

FFOR3GXML 10/20/2012 1:8:53 Page 29

c

FOREWORD

The computer/information revolution is shaping our world in ways it has been difficult to predict and to appreciate. When mainframe computers were developed in the 1940s and 1950s, some thought only a few computers would ever be needed in society. When personal computers were introduced in the 1980s, they were considered fascinating toys for hobbyists but not something serious businesses would ever use.WhenWeb tools were initially created in the 1990s to enhance the Internet, they were a curiosity. Using the Web to observe the level of a coffee pot across an ocean was intriguing, at least for a few moments, but not of much practical use. Today, armed with the wisdom of hindsight, the impact of such computing advancements seems obvious, if not inevitable, to all of us. What government claims that it does not need computers?What major business does not have a Web address? How many people, even in the poorest of countries, are not aware of the use of cell phones?

The computer/information revolution has changed our lives and has brought with it significant ethical, social, and professional issues; consider the area of privacy as but one example. Today, surveillance cameras are abundant, and facial recognition systems are effective even under less than ideal observing conditions. Information about buying habits, medical conditions, and human movements can be mined and correlated relent- lessly using powerful computers. Individuals’ DNA information can easily be collected, stored, and transmitted throughout the world in seconds. This computer/information revolution has brought about unexpected capabilities and possibilities. The revolution is not only technological but also ethical, social, and professional. Our computerized world is perhaps not the world we expected, and, even to the extent that we expected it, it is not a world for which we have well-analyzed policies about how to behave. Now more than ever we need to take cyberethics seriously.

Herman Tavani has written an excellent introduction to the field of cyberethics. His text differs from others in at least three important respects: First, the book is extra- ordinarily comprehensive and up to date in its subject matter. The text covers all of the standard topics such as codes of conduct, privacy, security, crime, intellectual property, and free speech, and also discusses sometimes overlooked subjects such as democracy, employment, access, and the digital divide. Tavani more than anyone else has tracked and published the bibliographical development of cyberethics over many years, and his expertise with this vast literature shines through in this volume. Second, the book approaches the subject matter of cyberethics from diverse points of view. Tavani examines issues from a social science perspective, from a philosophical perspective, and from a computing professional perspective, and then he suggests ways to integrate these diverse approaches. If the task of cyberethics is multidisciplinary, as many of us believe, then such a diverse but integrated methodology is crucial to accomplishing

xxix

FFOR3GXML 10/20/2012 1:8:53 Page 30

the task. His book is one of the few that constructs such amethodology. Third, the book is unusually helpful to students and teachers because it contains an entire chapter discussing critical thinking skills and is filled with review and discussion questions.

The cyberage is going to evolve. The future details and applications are, as always, difficult to predict. But it is likely that computing power and bandwidth will continue to grow while computing devices themselves will shrink in size to the nanometer scale. More andmore information devices will be inserted into our environment, our cars, our houses, our clothing, and us. Computers will become smarter. They will be made out of new materials, possibly biological. They will operate in new ways, possibly using quantum properties. The distinction between the virtual world and the real world will blur more andmore.We need a good book in cyberethics to deal with the present and prepare us for this uncertain future. Tavani’s Ethics and Technology is such a book.

James H. Moor Dartmouth College

xxx c Foreword

C013GXML 10/19/2012 20:48:52 Page 1

c

C H A P T E R

1 Introduction to Cyberethics:

Concepts, Perspectives, and Methodological Frameworks

Our primary objective in Chapter 1 is to introduce some foundational concepts and methodological frameworks that will be used in our analysis of specific cyberethics issues in subsequent chapters of this textbook. To accomplish this objective, we

� define key terms such as cyberethics and cybertechnology; � describe key developmental phases in cybertechnology that influenced the

evolution of cyberethics as a distinct field of applied ethics; � consider whether there is anything unique or special about cyberethics issues; � examine three distinct perspectives for identifying and approaching cyberethics

issues; � propose a comprehensive methodological scheme for analyzing cyberethics

issues.

We begin by reflecting briefly on three scenarios, each illustrating a cluster of ethical issues that will be examined in detail in later chapters of this book.

c SCENARIO 1–1:A Fatal Cyberbullying Incident on MySpace

Megan Meier, a 13-year-old resident of Dardenne Prairie, Missouri, had an account on MySpace where she received a “friend” request from a user named Josh Evans. Evans, who claimed to be a 16-year-old boy, told Meier that he lived near her and was being home-schooled by his parents. At first, Evans sent flattering e-mails to Meier, which also suggested that he might be romantically interested in her. Soon, however, Evans’s remarks turned from compliments to insults, and Evans informed Meier that he was no longer sure that he wanted to be friends with her because he heard that she “wasn’t very nice to her friends.” Next, Meier noticed that some highly derogatory posts about her—e.g., “MeganMeier is a slut” and “MeganMeier is fat”—began to appear onMySpace. Meier, who was reported to have suffered from low self-esteem and depression, became increas- ingly distressed by the online harassment (cyberbullying) being directed at her—i.e., from both the

1

C013GXML 10/19/2012 20:48:52 Page 2

First, consider some ethical concerns that arise in the Megan Meier cyberbullying scenario. These include worries affecting anonymity and pseudonymity, deception, crime, legal liability, and moral responsibility. Should Lori Drew, as well as any other MySpace user, have been permitted to open an account on that social networking site (SNS) under an alias or pseudonym that also included a fictitious profile? Should MySpace, or any SNS, tolerate members who deceive, intimidate, or harass other users? Should users who create accounts on SNSs with the intention to deceive or harass others be subject to criminal prosecution? ShouldMySpace have been held legally liable, at least in some contributory sense, for Meier’s death? Also, do ordinary users of an SNS who discover that someone is being bullied in that online forum have a moral responsibility to inform the SNS? Do they also have a moral responsibility to inform that SNS if they

c SCENARIO 1–2: Contesting the Ownership of a Twitter Account

Noah Kravitz was employed by PhoneDog Media, a mobile phone company, for nearly four years. PhoneDog had two divisions: an e-commerce site (phonedog.com) that sold mobile phones, and a blog that enabled customers to interact with the company. Kravitz created a blog on Twitter (called Phonedog_Noah) while employed at PhoneDog, and his blog attracted 17,000 followers by the time he left the company in October 2010. However, Kravitz informed PhoneDog that he wanted to keep his Twitter blog, with all of his followers; in return, Kravitz agreed that he would still “tweet” occasionally on behalf of his former company, under a new (Twitter) “handle,” or account name, NoahKravitz. Initially, PhoneDog seemed to have no problem with this arrangement. In July 2011, however, PhoneDog sued Kravitz, arguing that his list of Twitter followers was, in fact, a company list. PhoneDog also argued that it had invested a substantial amount of money in growing its customer list, which it considered to be the property of PhoneDogMedia. The company (as of early 2012) is seeking $340,000 in damages—the amount that PhoneDog estimated it had lost based on 17,000 customers at $2.50 per customer over an eight-month period (following Kravitz’s departure from the company).2 &

insulting MySpace postings and hurtful e-mail messages she continued to receive from Evans. On October 17, 2006,Meier decided to end her life by hanging herself in her bedroom.An investigation of this incident, following Meier’s death, revealed that Josh Evans was not a teenage boy; she was Lori Drew, the 49-year-old mother of a former friend of Meier’s.1 &

c SCENARIO 1–3: “The Washingtonienne” Blogger

Jessica Cutler, a former staff assistant to U.S. Senator Michael DeWine (R-Ohio), authored an online diary (on blogger.com) under the pseudonym “The Washingtonienne.” In May 2004, she was fired when the contents of her diary appeared in Wonkette: The DC Gossip, a popular blog in the Washington D.C. area. Until her diary was discovered and published in Wonkette, Cutler assumed that it had been viewed by only a few of her fellow “staffers” (Washington D.C. staff assistants) who were interested in reading about the details of her romantic relationships and sexual encounters. In her diary, Cutler disclosed that she earned an annual salary of only $25,000 as a staffer and that most of her living expenses were “thankfully subsidized by a few generous older gentlemen.” She also described some details of her sexual relationships with these men, one of whom was married and an official in the George W. Bush administration. (Cutler did not use the real names of these men but instead referred to them via initials that could easily be linked to their actual identities.) Following her termination as a staffer, in response to the political fallout and the media attention resulting from the publication of her diary, Cutler was offered a book contract with a major publisher. She was also subsequently sued by one of the men implicated in her blog.3 &

2 c Chapter 1. Introduction to Cyberethics: Concepts, Perspectives, and Methodological Frameworks

http://www.phonedog.com
http://www.blogger.com
C013GXML 10/19/2012 20:48:52 Page 3

discover that someone has created a fraudulent account on their forum, which could be used to deceive and harass other members? These and similar questions are examined in detail in Chapters 7 and 11.

Next, consider the scenario involving Twitter. Here, several important ethical, legal, and policy issues also arise—especially with respect to intellectual property rights and ownership of information. For example, can an employer’s customer list constitute a “trade secret,” as PhoneDog claimed? Should an employee be authorized to create a single Twitter account in which the followers are simultaneously interested both in the employer’s product and in the employee’s (private) blog? Should employees be allowed to post to their private accounts on SNSs, such as Twitter or Facebook, during work hours or, for that matter, whenever/wherever they are using an employer’s computing resources? If so, who has legal ownership rights to that information? A different, but somewhat related, question has to do with whether ordinary users should be able to post on their private SNS accounts anything they wish to say about their current or former employers, without first getting explicit permission to do so. Questions pertaining to these and related issues are examined in Chapters 8 and 9.

Third, consider “The Washingtonienne” scenario, where a wide range of ethical and legal issues also arise. These include concerns affecting privacy, confidentiality, anonym- ity, free speech, defamation, and so forth. For example, did Cutler violate the privacy and confidentiality of her romantic partners through the remarks she made about them in her online diary? Should she be held liable for defamation because of the nature of her remarks about these individuals, or was she merely exercising her right to free speech? Was Cutler’s expectation of anonymity violated when she was eventually “outed” by Wonkette, or were the circumstances surrounding this incident no different from that of any author or journalist who writes under a pseudonym but whose real identity is eventually discovered and made public? Should Cutler’s online diary be considered a “public document”merely because it was on theWeb, or did her diary also deserve some privacy protection because of the limited scope of its intended audience? Answers to these and related questions affecting blogs and the “blogosphere” are examined in Chapters 5, 9, and 11.

The Meier, Twitter, and Washingtonienne scenarios provide us with particular contexts in which we can begin to think about a cluster of ethical issues affecting the use of computers and cybertechnology. A number of alternative examples could also have been used to illustrate many of the moral and legal concerns that arise in connection with this technology. In fact, examples abound. One has only to read a daily newspaper or view regular television news programs to be informed about controversial issues involving computers and the Internet, including questions that pertain to property, privacy, security, anonymity, crime, and jurisdiction. Ethical aspects of these issues are examined in the chapters comprising this textbook. In the remainder of Chapter 1, we identify and examine some key foundational concepts and frameworks in cyberethics.

c 1.1 DEFINING KEY TERMS: CYBERETHICS AND CYBERTECHNOLOGY

Before we propose a definition of cyberethics, it is important to note that the field of cyberethics can be viewed as a branch of (applied) ethics. In Chapter 2, where we define ethics as “the study of morality,” we provide a detailed account of what is meant by

1.1 Defining Key Terms: Cyberethics and Cybertechnology b 3

C013GXML 10/19/2012 20:48:52 Page 4

morality and a moral system, and we also focus on some important aspects of theoretical, as opposed to, applied ethics. For example, both ethical concepts and ethical theories are also examined in detail in that chapter. There, we also include a “Getting Started” section on how to engage in ethical reasoning in general, as well as reasoning in the case of some specific moral dilemmas. In Chapter 1, however, our main focus is on clarifying some key cyber and cyber-related terms that will be used throughout the remaining chapters of this textbook.

For our purpose, cyberethics can be defined as the study of moral, legal, and social issues involving cybertechnology. Cyberethics examines the impact of cybertechnology on our social, legal, and moral systems, and it evaluates the social policies and laws that have been framed in response to issues generated by its development and use. To grasp the significance of these reciprocal relationships, it is important to understand what is meant by the term cybertechnology.

1.1.1 What Is Cybertechnology?

Cybertechnology, as used throughout this textbook, refers to a wide range of computing and communication devices, from stand-alone computers to connected, or networked, computing and communication technologies. These technologies include, but need not be limited to, devices such as “smart” phones, iPods, (electronic) “tablets,” personal computers (desktops and laptops), and large mainframe computers. Networked devices can be connected directly to the Internet, or they can be connected to other devices through one or more privately owned computer networks. Privately owned networks, in turn, include local area networks (LANs) and wide area networks (WANs). A LAN is a privately owned network of computers that span a limited geographical area, such as an office building or a small college campus. WANs, on the other hand, are privately owned networks of computers that are interconnected throughout a much broader geographic region.

How exactly are LANs and WANs different from the Internet? In one sense, the Internet can be understood as the network of interconnected computer networks. A synthesis of contemporary information and communications technologies, the Internet evolved from an earlier United States Defense Department initiative (in the 1960s) known as the ARPANET. Unlike WANs and LANs, which are privately owned computer networks, the Internet is generally considered to be a public network, in the sense that much of the information available on the Internet resides in “public space” and is thus available to anyone. The Internet, which should be differentiated from the World Wide Web, includes several applications. The Web, based on hypertext transfer protocol (HTTP), is one application; other applications include file transfer protocol (FTP), Telnet, and e-mail. Because many users navigate the Internet by way of the Web, and because the majority of users conduct their online activities almost exclusively on the Web portion of the Internet, it is very easy to confuse the Web with the Internet.

The Internet and privately owned computer networks, such asWANs and LANs, are perhaps the most common and well-known examples of cybertechnology. However, “cybertechnology” is used in this book to represent the entire range of computing systems, from stand-alone computers to privately owned networks to the Internet itself. “Cyberethics” refers to the study of moral, legal, and social issues involving those technologies.

4 c Chapter 1. Introduction to Cyberethics: Concepts, Perspectives, and Methodological Frameworks

C013GXML 10/19/2012 20:48:52 Page 5

1.1.2 Why the Term Cyberethics?

Many authors have used the term “computer ethics” to describe the field that examines moral issues pertaining to computing and information technology (see, for example, Barger 2008; Johnson 2010). Others use the expression “information ethics” (e.g., Capurro 2007) to refer to a cluster of ethical concerns regarding the flow of information that is either enhanced or restricted by computer technology.4 Because of concerns about ethical issues involving the Internet in particular, some have also used the term “Internet ethics” (Langford 2000). Ethical issues examined in this textbook, however, are not limited to the Internet; they also include privately owned computer networks and interconnected communication technologies—i.e., technologies that we refer to collect- ively as cybertechnology. Hence, we use “cyberethics” to capture the wide range of moral issues involving cybertechnology.

For our purposes, “cyberethics” is more accurate than “computer ethics” for two reasons. First, the term “computer ethics” can connote ethical issues associated with computing machines, and thus could be construed as pertaining to stand-alone or “unconnected computers.” Because computing technologies and communication tech- nologies have converged in recent years, resulting in networked systems, a computer system may now be thought of more accurately as a new kind of medium than as a machine. Second, the term “computer ethics” might also suggest a field of study that is concerned exclusively with ethical issues affecting computer professionals. Although these issues are very important, and are examined in detail in Chapter 4 as well as in relevant sections of Chapters 6 and 12, we should note that the field of cyberethics is not limited to an analysis of moral issues that affect only professionals.

“Cyberethics” is also more accurate, for our purposes, than “information ethics.” For one thing, “information ethics” is ambiguous because it can mean a specific methodo- logical framework—i.e., Information Ethics (or IE)—for analyzing issues in cyberethics (Floridi 2007).5 Or it can connote a cluster of ethical issues of particular interest to professionals in the fields of library science and information science (Buchanan and Henderson 2009). In the latter sense, “information ethics” refers to ethical concerns affecting the free flow of, and unfettered access to, information, which include issues such as library censorship and intellectual freedom. (These issues are examined in Chapter 9.) Our analysis of cyberethics issues in this text, however, is not limited to controversies often considered under the heading “information ethics.”

Given the wide range of moral issues examined in this book, the term “cyberethics” is also more comprehensive, and more appropriate, than “Internet ethics.”Although many of the issues considered under the heading cyberethics often pertain to the Internet, some issues examined in this textbook do not involve the Internet per se—for example, issues associated with computerized monitoring in the workplace, with professional responsi- bility for designing reliable computer hardware and software systems, and with the implications of cybertechnology for gender and race. We examine ethical issues that cut across the spectrum of devices and networked communication systems comprising cybertechnology, from stand-alone computers to networked systems.

Finally, we should note that some issues in the emerging fields of “agent ethics,” “bot ethics,” “robo-ethics,” or what Wallach and Allen (2009) call “machine ethics,” overlap with a cluster of concerns examined under the heading of cyberethics. Wallach and Allen define machine ethics as a field that expands upon traditional computer ethics because it

1.1 Defining Key Terms: Cyberethics and Cybertechnology b 5

C013GXML 10/19/2012 20:48:52 Page 6

shifts the main area of focus away from “what people do with computers to questions about what machines do by themselves.” It also focuses on questions having to do with whether computers can be autonomous agents capable of making good moral decisions. Research in machine ethics overlaps with the work of interdisciplinary researchers in the field of artificial intelligence (AI).6 We examine some aspects of this emerging field (or subfield of cyberethics) in Chapters 11 and 12.

c 1.2 THE CYBERETHICS EVOLUTION: FOUR DEVELOPMENTAL PHASES IN CYBERTECHNOLOGY

In describing the key evolutionary phases of cybertechnology and cyberethics, we begin by noting that the meaning of “computer” has evolved significantly since the 1940s. If you were to look up the meaning of that word in a dictionary written before World War II, you would most likely discover that a computer was defined as a person who calculated numbers. In the time period immediately following World War II, the term “computer” came to be identified with a (calculating) machine as opposed to a person (who calculated).7 By the 1980s, however, computers had shrunk in size considerably and they were beginning to be understood more in terms of desktop machines (that manipulated symbols as well as numbers), or as a new kind of medium for communica- tion, rather than simply as machines that crunch numbers. As computers became increasingly connected to one another, they came to be associated with metaphors such as the “information superhighway” and cyberspace; today, many ordinary users tend to think about computers in terms of various Internet- and Web-based applications made possible by cybertechnology.

In response to some social and ethical issues that were anticipated in connection with the use of electronic computers, the field that we now call cyberethics had its informal and humble beginnings in the late 1940s. It is interesting to note that during this period, when ENIAC (Electronic Numerical Integrator and Calculator)—the first electronic com- puter, developed at the University of Pennsylvania, became operational in 1946—some analysts confidently predicted that nomore than five or six computers would ever need to be built. It is also interesting to point out that during this same period, a few insightful thinkers had already begun to describe some social and ethical concerns that would likely arise in connection with computing and cybertechnology.8 Although still a relatively young academic field, cyberethics has now matured to a point where several articles about its historical development have appeared in books and scholarly journals. For our purposes, the evolution of cyberethics can be summarized in four distinct technological phases.9

Phase 1 (1950s and 1960s) In Phase 1, computing technology consisted mainly of huge mainframe computers, such as ENIAC, that were “unconnected” and thus existed as stand-alone machines. One set of ethical and social questions raised during this phase had to do with the impact of computing machines as “giant brains.” Today, we might associate these kinds of questions with the field of artificial intelligence (or AI). The following kinds of questions were introduced in Phase 1: Can machines think? If so, should we invent thinking

6 c Chapter 1. Introduction to Cyberethics: Concepts, Perspectives, and Methodological Frameworks

C013GXML 10/19/2012 20:48:52 Page 7

machines? If machines can be intelligent entities, what does this mean for our sense of self? What does it mean to be human?

Another set of ethical and social concerns that arose during Phase 1 could be catalogued under the heading of privacy threats and the fear of Big Brother. For example, some people in the United States feared that the federal government would set up a national database in which extensive amounts of personal information about its citizens would be stored as electronic records. A strong centralized government could then use that information to monitor and control the actions of ordinary citizens. Although networked computers had not yet come on to the scene, work on the ARPANET—the Internet’s predecessor, which was funded by an agency in the United States Defense Department—began during this phase, in the 1960s.

Phase 2 (1970s and 1980s) In Phase 2, computing machines and communication devices in the commercial sector began to converge. This convergence, in turn, introduced an era of computer/commu- nications networks. Mainframe computers, minicomputers, microcomputers, and personal computers could now be linked together by way of one or more privately owned computer networks such as LANs and WANs (see Section 1.1.1), and infor- mation could readily be exchanged between and among databases accessible to networked computers.

Ethical issues associated with this phase of computing included concerns about personal privacy, intellectual property, and computer crime. Privacy concerns, which had emerged during Phase 1 because of worries about the amount of personal information that could be collected by government agencies and stored in a centralized government- owned database, were exacerbated because electronic records containing personal and confidential information could now also easily be exchanged between two or more commercial databases in the private sector. Concerns affecting intellectual property and proprietary information also emerged during this phase because personal (desktop) computers could be used to duplicate proprietary software programs. And concerns associated with computer crime appeared during this phase because individuals could now use computing devices, including remote computer terminals, to break into and disrupt the computer systems of large organizations.

Phase 3 (1990–Present) During Phase 3, the Internet era, availability of Internet access to the general public has increased significantly. This was facilitated, in no small part, by the development and phenomenal growth of the World Wide Web in the 1990s. The proliferation of Internet- and Web-based technologies has contributed to some additional ethical concerns involving computing technology; for example, issues of free speech, anonymity, jurisdic- tion, and trust have been hotly disputed during this phase. Should Internet users be free to post any messages they wish on publicly accessible Web sites or even on their own personal Web pages—i.e., is that a “right” that is protected by free speech or freedom of expression? Should users be permitted to post anonymous messages on Web pages, or even be allowed to navigate the Web anonymously or under the cover of a pseudonym?

Issues of jurisdiction also arose because there are no clear national or geographical boundaries in cyberspace; if a crime occurs on the Internet, it is not always clear where—i.e., in which legal jurisdiction—it took place and thus it is unclear where it

1.2 The Cyberethics Evolution: Four Developmental Phases in Cybertechnology b 7

C013GXML 10/19/2012 20:48:52 Page 8

should be prosecuted. And as e-commerce emerged during this phase, potential consumers initially had concerns about trusting online businesses with their financial and personal information. Other ethical and social concerns that arose during Phase 3 include disputes about the public vs. private aspects of personal information that has become increasingly available on the Internet. Concerns of this type have been exacerbated by the amount of personal information included on social networking sites, such as Facebook and Twitter, and on other kinds of interactive Web-based forums (made possible by “Web 2.0” technology).

We should note that during Phase 3, both the interfaces used to interact with computer technology and the devices used to “house” it were still much the same as in Phases 1 and 2. A computer was still essentially a “box,” i.e., a CPU, with one or more peripheral devices, such as a video screen, keyboard, and mouse, serving as interfaces to that box. And computers were still viewed as devices essentially external to humans, as things or objects “out there.” As cybertechnology continues to evolve, however, it may no longer make sense to try to understand computers simply in terms of objects or devices that are necessarily external to us. Instead, computers will likely become more and more a part of who or what we are as human beings. For example, James Moor (2005) notes that computing devices will soon be a part of our clothing and even our bodies. This brings us to Phase 4.

Phase 4 (Present–Near Future) Presently we are on the threshold of Phase 4, a point at which we have begun to experience an unprecedented level of convergence of technologies. We have already witnessed aspects of technological convergence beginning in Phase 2, where the integra- tion of computing and communication devices resulted in privately owned networked systems, as we noted above. And in Phase 3, the Internet era, we briefly described the convergence of text, video, and sound technologies on the Web, and we noted how the computer began to be viewedmuchmore as a new kind of medium than as a conventional type of machine. The convergence of information technology and biotechnology in recent years has resulted in the emerging fields of bioinformatics and computational genomics; this has also caused some analysts to question whether computers of the future will still be silicon-based or whether some may also possibly be made of biological materials. Additionally, biochip implant technology, which has been enhanced by developments in AI research (described in Chapter 11), has led some to predict that in the not-too-distant future it may become difficult for us to separate certain aspects of our biology from our technology.

Today, computers are also becoming ubiquitous or pervasive; i.e., they are “every- where” and they permeate both our workplace and our recreational environments. Many of the objects that we encounter in these environments are also beginning to exhibit what Philip Brey (2005) and others call “ambient intelligence,” which enables “smart objects” to be connected to one another via wireless technology. Some consider radio frequency identification (RFID) technology (described in detail in Chapter 5) to be the first step in what is now referred to as pervasive or ubiquitous computing (described in detail in Chapter 12).

What other kinds of technological changes should we anticipate as research and development continues in Phase 4? For one thing, computing devices will likely continue to become more and more indistinguishable from many kinds of noncomputing devices.

8 c Chapter 1. Introduction to Cyberethics: Concepts, Perspectives, and Methodological Frameworks

C013GXML 10/19/2012 20:48:52 Page 9

For another thing, a computer may no longer typically be conceived of as a distinct device or object with which users interact via an explicit interface such as a keyboard, mouse, and video display. We are now beginning to conceive of computers and cybertechnology in drastically different ways. Consider also that computers are becoming less visible—as computers and electronic devices continue to be miniaturized and integrated/embedded in objects, they are also beginning to “disappear” or to become “invisible” as distinct entities.

Many analysts predict that computers will become increasingly smaller in size, ultimately achieving the nano scale. (We examine some ethical implications of nano- technology and nanocomputing in Chapter 12.) Many also predict that aspects of nanotechnology, biotechnology, and information technology will continue to converge. However, we will not speculate any further in this chapter about either the future of cybertechnology or the future of cyberethics. The purpose of our brief description of the four phases of cybertechnology mentioned here is to provide a historical context for understanding the origin and evolution of at least some of the ethical concerns affecting cybertechnology that we will examine in this book.

Table 1.1 summarizes key aspects of each phase in the development of cyberethics as a field of applied ethics.

c 1.3 ARE CYBERETHICS ISSUES UNIQUE ETHICAL ISSUES?

Few would dispute the claim that the use of cybertechnology has had a significant impact on ourmoral, legal, and social systems. Some also believe, however, that cybertechnology has introduced new and unique moral problems. Are any of these problems genuinely unique moral issues? There are two schools of thought regarding this question.

Consider once again the three scenarios included in the chapter’s opening section. Have any new ethical issues been introduced in these scenarios, or are the issues that arise in each merely examples of existing ethical issues that have been exacerbated in some

TABLE 1.1 Summary of Four Phases of Cyberethics

Phase Time Period Technological Features Associated Issues

1 1950s–1960s Stand-alone machines (large mainframe computers)

Artificial intelligence (AI), database privacy (“Big Brother”)

2 1970s–1980s Minicomputers and the ARPANET; desktop computers interconnected via privately owned networks

Issues from Phase 1 plus concerns involving intellectual property and software piracy, computer crime, and communications privacy

3 1990s–present Internet, World Wide Web, and early “Web.2.0” applications, environments, and forums

Issues from Phases 1 and 2 plus concerns about free speech, anonymity, legal jurisdiction, behavioral norms in virtual communities

4 Present to near future

Convergence of information and communication technologies with nanotechnology and biotechnology; increasing use of autonomous systems

Issues from Phases 1–3 plus concerns about artificial electronic agents (“bots”) with decision-making capabilities, and developments in nanocomputing, bioinformatics, and ambient intelligence

1.3 Are Cyberethics Issues Unique Ethical Issues? b 9

C013GXML 10/19/2012 20:48:52 Page 10

sense by new technologies used to communicate and disseminate personal information (such as in blogs in the Washingtonienne and Twitter scenarios), or to harass and bully someone (as in the Meier scenario)? To see whether any new ethical issues arise because of cybertechnology in general, consider once again the cyberbullying scenario involving Megan Meier. Here, one could argue that there is nothing really new or unique in the bullying incident that led to Meier’s death, because in the final analysis “bullying is bullying” and “crime is crime.” According to this line of reasoning, whether someone happens to use cybertechnology to assist in carrying out a particular bullying incident is irrelevant. One might further argue that there is nothing special about cyberbullying incidents in general, regardless of whether or not they also result in a victim’s death. Proponents of this position could point to the fact that bullying activities are hardly new, since these kinds of activities have been carried out in the off-line world for quite some time. So, cybertechnology might be seen simply as the latest in a series of tools or techniques that are now available to aid bullies in carrying out their activities.

Alternatively, some argue that forms of behavior made possible by cybertechnology have indeed raised either new or special ethical problems. Using the example of cyberbullying to support this view, one might point out the relative ease with which bullying activities can now be carried out. Simply by using a computing device with Internet access, one can bully others without having to leave the comfort of his or her home. A cyberbully can, as Lori Drew did, also easily deceive her victim under the cloak of an alias, or pseudoname. The fact that a user can bully a victim with relative anonymity makes it much more difficult for law enforcement agents to track down a bully, either before or after that bully has caused harm to the victim(s).

Also consider issues having to do with scope and scale: an Internet user can bully multiple victims simultaneously via the use of multiple “windows” on his or her computer screen or electronic device. The bully can also harass victims who happen to live in states and nations that are geographically distant from the bully. Bullying activities can now occur on a scale or order of magnitude that could not have been realized in the pre- Internet era. More individuals can now engage in bullying behavior because cybertech- nology has made it easy, and, as a result, significantly more people can now become the victims of bullies.

But do these factors support the claim that cybertechnology has introduced any new and unique ethical issues? Walter Maner (2004) argues that computer use has generated a series of ethical issues that (a) did not exist before the advent of computing, and (b) could not have existed if computer technology had not been invented.10 Is there any evidence to support Maner’s claim? Next we consider two scenarios that, initially at least, might suggest that some new ethical issues have been generated by the use of cybertechnology.

c SCENARIO 1–4:Developing the Code for a Computerized Weapon System

Sally Bright, a recent graduate from Technical University, has accepted a position as a software engineer for a company called CyberDefense, Inc. This company has a contract with the U.S. Defense Department to develop and deliver applications for the U.S. military. When Sally reports to work on her first day, she is assigned to a controversial project that is developing the software for a computer system designed to deliver chemical weapons to and from remote locations. Sally is conflicted about whether she can, given her personal values, agree to work on this kind of weapon- delivery system, which would not have been possible without computer technology. &

10 c Chapter 1. Introduction to Cyberethics: Concepts, Perspectives, and Methodological Frameworks

C013GXML 10/19/2012 20:48:52 Page 11

Is the conflict that Sally faces in this particular scenario one that is new or unique because of computers and cybertechnology? One might argue that the ethical concerns surrounding Sally’s choices are unique because they never would have arisen had it not been for the invention of computer technology. In one sense, it is true that ethical concerns having to do with whether or not one should participate in developing a certain kind of computer system did not exist before the advent of computing technology. However, it is true only in a trivial sense. Consider that long before computing technologies were available, engineers were confronted with ethical choices involving whether or not to participate in the design and development of certain kinds of controversial technological systems. Prior to the computer era, for example, they had to make decisions involving the design of aircraft intended to deliver conventional as well as nuclear bombs. So, is the fact that certain technological systems happen to include the use of computer software or computer hardware componentsmorally relevant in this scenario?Haveanyneworunique ethical issues, in a nontrivial sense of “unique,” been generated here? Based on our brief analysis of this scenario, there does not seem to be sufficient evidence to substantiate the claim that one or more new ethical issues have been introduced.

Is Harry’s ethical conflict one that is unique to computers and cybertechnology? Are the ethical issues surrounding Harry’s situation new and thus unique to cybertechnology, because the practice of downloading digital media from the Internet—a practice that many in the movie and recording industries call “digital piracy”—would not have been possible if computer technology had not been invented in the first place? If so, this claim would, once again, seem to be true only in a trivial sense. The issue of piracy itself as a moral concern existed before the widespread use of computer technology. For example, people were able to “pirate” audio cassette tapes simply by using two ormore analog tape recorders to make unauthorized copies of proprietary material. The important point to note here is that moral issues surrounding the pirating of audio cassette tapes are, at bottom, the same issues underlying the pirating of digital media. They arise in each case because, fundamentally, the behavior associated with unauthorized copying raises moral concerns about property, fairness, rights, and so forth. So, as in Scenario 1–4, there seems to be insufficient evidence to suggest that the ethical issues associated with digital piracy are either new or unique in some nontrivial sense.

1.3.1 Distinguishing between Unique Technological Features and Unique Ethical Issues

Based on our analysis of the two scenarios in the preceding section, we might conclude that there is nothing new or special about the kinds of moral issues associated with

c SCENARIO 1–5:Digital Piracy

Harry Flick is an undergraduate student at Pleasantville State College. In many ways, Harry’s interests are similar to those of typical students who attend his college. But Harry is also very fond of classic movies, especially films that weremade before 1950. DVD copies of thesemovies are difficult to find; those that are available tend to be expensive to purchase, and very few are available for loan at libraries. One day, Harry discovers a Web site that has several classic films (in digital form) freely available for downloading. Since the movies are still protected by copyright, however, Harry has some concerns about whether it would be permissible for him to download any of these films (even if only for private use). &

1.3 Are Cyberethics Issues Unique Ethical Issues? b 11

C013GXML 10/19/2012 20:48:52 Page 12

cybertechnology. In fact, some philosophers have argued that we have the same old ethical issues reappearing in a new guise. But is such a view accurate?

If we focus primarily on the moral issues themselves as moral issues, it would seem that perhaps there is nothing new. Cyber-related concerns involving privacy, property, free speech, etc., can be understood as specific expressions of core (traditional) moral notions, such as autonomy, fairness, justice, responsibility, and respect for persons. However, if instead we focus more closely on cybertechnology itself, we see that there are some interesting and possibly unique features that distinguish this technology from earlier technologies. Maner has argued that computing technology is “uniquely fast,” “uniquely complex,” and “uniquely coded.” But even if cybertechnology has these unique features, does it necessarily follow that any of the moral questions associated with that technology must also be unique? One would commit a logical fallacy if he or she concluded that cyberethics issues must be unique simply because certain features or aspects of cybertechnology are unique. The fallacy can be expressed in the following way:

PREMISE 1. Cybertechnology has some unique technological features.

PREMISE 2. Cybertechnology has generated some ethical concerns.

CONCLUSION. At least someethical concerns generatedby cybertechnologymust be unique ethical concerns.

As we will see in Chapter 3, this reasoning is fallacious because it assumes that characteristics that apply to a certain technology must also apply to ethical issues generated by that technology.11

1.3.2 An Alternative Strategy for Analyzing the Debate about the Uniqueness of Cyberethics Issues

Although it may be difficult to prove conclusively whether or not cybertechnology has generated any new or unique ethical issues, wemust not rule out the possibility that many of the controversies associated with this technology warrant special consideration from an ethical perspective. But what, exactly, is so different about issues involving computers and cybertechnology that makes them deserving of special moral consideration? James Moor (2007) points out that computer technology, unlike most previous technologies, is “logically malleable”; it can be shaped and molded to perform a variety of functions. Because noncomputer technologies are typically designed to perform some particular function or task, they lack the universal or general-purpose characteristics that comput- ing technologies possess. For example, microwave ovens and DVD players are techno- logical devices that have been designed to perform specific tasks. Microwave ovens cannot be used to view DVDs, and DVD players cannot be used to defrost, cook, or reheat food. However, a computer, depending on the software used, can perform a range of diverse tasks: it can be instructed to behave as a video game, a word processor, a spreadsheet, a medium to send and receive e-mail messages, or an interface toWeb sites. Hence, cybertechnology is extremely malleable.

12 c Chapter 1. Introduction to Cyberethics: Concepts, Perspectives, and Methodological Frameworks

C013GXML 10/19/2012 20:48:52 Page 13

Moor points out that because of its logical malleability, cybertechnology can generate “new possibilities for human action” that appear to be limitless. Some of these possibilities for action generate what Moor calls “policy vacuums,” because we have no explicit policies or laws to guide new choices made possible by computer technology. These vacuums, in turn, need to be filled with either new or revised policies. But what, exactly, does Moor mean by “policy”? Moor (2004) defines policies as “rules of conduct, ranging from formal laws to informal, implicit guidelines for actions.”12 Viewing com- puter ethics issues in terms of policies is useful, Moor believes, because policies have the right level of generality to consider when we evaluate the morality of conduct. As noted, policies can range from formal laws to informal guidelines. Moor also notes that policies can have “justified exemptions” because they are not absolute; yet policies usually imply a certain “level of obligation” within their contexts.

What action is required to resolve a policy vacuum when it is discovered? Initially, a solution to this problem might seem quite simple and straightforward. We might assume that all we need to do is identify the vacuums that have been generated and then fill them with policies and laws. However, this will not always work, because sometimes the new possibilities for human action generated by cybertechnology also introduce “conceptual vacuums,” or what Moor calls “conceptual muddles.” In these cases, we must first eliminate the muddles by clearing up certain conceptual confusions before we can frame coherent policies and laws.

1.3.3 A Policy Vacuum in Duplicating Computer Software

A critical policy vacuum, which also involved a conceptual muddle, emerged with the advent of personal desktop computers (henceforth referred to generically as PCs). The particular vacuum arose because of the controversy surrounding the copying of software. When PCs became commercially available, many users discovered that they could easily duplicate software programs. They found that they could use their PCs to make copies of proprietary computer programs such as word processing programs, spreadsheets, and video games. Some users assumed that in making copies of these programs they were doing nothing wrong. At that time there were no explicit laws to regulate the subsequent use and distribution of software programs once they had been legally purchased by an individual or by an institution. Although it might be difficult to imagine today, at one time software was not clearly protected by either copyright law or the patent process.

Of course, there were clear laws and policies regarding the theft of physical property. Such laws and policies protected against the theft of personal computers as well as against the theft of a physical disk drive residing in a PC on which the proprietary software programs could easily be duplicated. However, this was not the case with laws and policies regarding the “theft,” or unauthorized copying, of software programs that run on computers. Although there were intellectual property laws in place, it had not been determined that software was or should be protected by intellectual property (IP) law: It was unclear whether software should be understood as an idea (which is not protected by IP law), as a form of writing protected by copyright law, or as a set of machine instructions protected by patents. Consequently, many entrepreneurs who designed and manufac- tured software programs argued for explicit legal protection for their products. A policy vacuum arose with respect to duplicating software: Could a user make a backup copy of a

1.3 Are Cyberethics Issues Unique Ethical Issues? b 13

C013GXML 10/19/2012 20:48:52 Page 14

program for herself? Could she share it with a friend? Could she give the original program to a friend? A clear policy was needed to fill this vacuum.

Before we can fill the vacuum regarding software duplication with a coherent policy or law, we first have to resolve a certain conceptual muddle by answering the question: what, exactly, is computer software?Until we can clarify the concept of software itself, we cannot frame a coherent policy as to whether or not we should allow the free duplication of software. Currently there is still much confusion, as well as considerable controversy, as to how laws concerning the exchange (and, in effect, duplication) of proprietary software over the Internet should be framed.

In Moor’s scheme, how one resolves the conceptual muddle (or decides the conceptual issue) can have a significant effect on which kinds of policies are acceptable. Getting clear about the conceptual issues is an important first step, but it is not a sufficient condition for being able to formulate a policy. Finally, the justification of a policy requires much factual knowledge, as well as an understanding of normative and ethical principles.

Consider the controversies surrounding the original Napster Web site and the Recording Industry Association of America (RIAA), in the late 1990s, regarding the free exchange of music over the Internet. Proponents on both sides of this dispute experienced difficulties in making convincing arguments for their respective positions due, in no small part, to confusion regarding the nature and the status of information (digitized music in the form of MP3 files) being exchanged between Internet users and the technology (P2P systems) that facilitated this exchange. Although cybertechnology has made it possible to exchange MP3 files, there is still debate, and arguably a great deal of confusion as well, about whether doing so should necessarily be illegal. Until the conceptual confusionsormuddlesunderlyingargumentsused in theNapster vs.RIAAcase inparticular, and about the nature of P2P file-sharing systems in general, are resolved, it is difficult to frame an adequate policy regarding the exchange of MP3 files in P2P transactions.

How does Moor’s insight that cyberethics issues need to be analyzed in terms of potential policy vacuums and conceptual muddles contribute to our earlier question as to whether there is anything unique or special about cyberethics? First, we should note that Moor takes no explicit stance on the question as to whether any cyberethics issues are unique. However, he does argue that cyberethics issues deserve special consideration because of the nature of cybertechnology itself, which is significantly different from alternative technologies in terms of the vast number of policy vacuums it generates (Moor 2001). So, even though the ethical issues associated with cybertechnology—that is, issues involving privacy, intellectual property, and so forth—might not be new or unique, they nonetheless can put significant pressure on our conceptual frameworks and normative reasoning to a degree not found in other areas of applied ethics. Thus it would seem to follow, on Moor’s line of reasoning, that an independent field of applied ethics that focuses on ethical aspects of cybertechnology is indeed justified.

c 1.4 CYBERETHICS AS A BRANCHOF APPLIED ETHICS: THREE DISTINCT PERSPECTIVES

Cyberethics, as a field of study, can be understood as a branch of applied ethics. Applied ethics, as opposed to theoretical ethics, examines practical ethical issues. It does so by analyzing those issues from the vantage point of one or more ethical theories. Whereas

14 c Chapter 1. Introduction to Cyberethics: Concepts, Perspectives, and Methodological Frameworks

C013GXML 10/19/2012 20:48:52 Page 15

ethical theory is concerned with establishing logically coherent and consistent criteria in the form of standards and rules for evaluating moral problems, the principal aim of applied ethics is to analyze specific moral problems themselves through the application of ethical theory. As such, those working in fields of applied ethics, or practical ethics, are not inclined to debate some of the finer points of individual ethical theories. Instead, their interest in ethical theory is primarily with how one or more theories can be successfully applied to the analysis of specific moral problems that they happen to be investigating.

For an example of a practical ethics issue involving cybertechnology, consider again the original Napster controversy. Recall that at the heart of this dispute is the question: should proprietary information, in a digital format known as MP3 files, be allowed to be exchanged freely over the Internet? Those advocating the free exchange of MP3 files could appeal to one or more ethical theories to support their position. For example, they might appeal to utilitarianism, an ethical theory that is based on the principle that our policies and laws should be such that they produce the greatest good (happiness) for the greatest number of people. A utilitarian might argue that MP3 files should be distributed freely over the Internet because the consequences of allowing such a practice would make the majority of users happy and would thus contribute to the greatest good for the greatest number of persons affected.

Others might argue that allowing proprietary material to be exchanged freely over the Internet would violate the rights of those who created, and who legally own, the material. Proponents of this view could appeal to a nonutilitarian principle or theory that is grounded in the notion of respecting the rights of individuals. According to this view, an important consideration for an ethical policy is that it protects the rights of individuals—in this case, the rights of those who legally own the proprietary material in question—irrespective of the happiness that might or might not result for the majority of Internet users.

Notice that in our analysis of the dispute over the exchange of MP3 files on the Internet (in the Napster case), the application of two different ethical theories yielded two very different answers to the question of which policy or course of action ought to be adopted. Sometimes, however, the application of different ethical theories to a particular problem will yield similar solutions. We will examine in detail some standard ethical theories, including utilitarianism, in Chapter 2. Our main concern in this textbook is with applied, or practical, ethics issues, and not with ethical theory per se. Wherever appropriate, however, ethical theory will be used to inform our analysis of moral issues involving cybertechnology.

Understanding cyberethics as a field of applied ethics that examines moral issues pertaining to cybertechnology is an important first step. But much more needs to be said about the perspectives that interdisciplinary researchers bring to their analysis of the issues that make up this relatively new field.Most scholars and professionals conducting research in this field of applied ethics have proceeded from one of three different perspectives— professional ethics, philosophical ethics, or sociological/descriptive ethics.13 Gaining a clearer understanding of what is meant by each perspective is useful at this point.

1.4.1 Perspective #1: Cyberethics as a Field of Professional Ethics

According to those who view cyberethics primarily as a branch of professional ethics, the field can best be understood as identifying and analyzing issues of ethical responsibility

1.4 Cyberethics as a Branch of Applied Ethics: Three Distinct Perspectives b 15

C013GXML 10/19/2012 20:48:52 Page 16

for computer and information-technology (IT) professionals. Among the cyberethics issues considered from this perspective are those having to do with the computer/IT professional’s role in designing, developing, and maintaining computer hardware and software systems. For example, suppose a programmer discovers that a software product she has been working on is about to be released for sale to the public even though that product is unreliable because it contains “buggy” software. Should she blow the whistle?

Those who see cyberethics essentially as a branch of professional ethics would likely draw on analogies from other professional fields, such as medicine and law. They would point out that in medical ethics and legal ethics, the principal focus of analysis is on issues of moral responsibility that affect individuals as members of these professions. By analogy, they would go on to argue that the same rationale should apply to the field of cyberethics—i.e., the primary, and possibly even exclusive, focus of cyberethics should be on issues of moral responsibility that affect computer/IT professionals. Don Gotterbarn (1995) can be interpreted as defending a version of this position when he asserts

The only way to make sense of ‘Computer Ethics’ is to narrow its focus to those actions that are within the control of the individualmoral computer professional.14 [Italics Gotterbarn]

So, in this passage, Gotterbarn suggests that the principal focus of computer ethics should be on issues of professional responsibility and not on the broader moral and social implications of that technology.

The analogies Gotterbarn uses to defend his argument are instructive. He notes, for example, that in the past, certain technologies have profoundly altered our lives, especially in the ways that many of us conduct our day-to-day affairs. Consider three such technologies: the printing press, the automobile, and the airplane. Despite the significant and perhaps revolutionary effects of each of these technologies, we do not have “printing press ethics,” “automobile ethics,” or “airplane ethics.” So why, Gotterbarn asks, should we have a field of computer ethics apart from the study of those ethical issues that affect the professionals responsible for the design, development, and delivery of computer systems? In other words, Gotterbarn suggests that it is not the business of computer ethics to examine ethical issues other than those that affect computer professionals.

Professional Ethics and the Computer Science Practitioner Gotterbarn’s view about what the proper focus of computer ethics research and inquiry should be is shared by other practitioners in the discipline of computer science. However, some of those practitioners, as well as many philosophers and social scientists, believe that Gotterbarn’s conception of computer ethics as simply a field of professional ethics is too narrow. In fact, some who identify themselves as computer professionals or as “information professionals,” and who are otherwise sympathetic to Gotterbarn’s overall attention to professional ethics issues, believe that a broader model is needed. For example, Elizabeth Buchanan (2004), in describing the importance of analyzing ethical issues in the “information professions,” suggests that some nonprofessional ethics issues must also be examined because of the significant impact they have on noninformation professionals, including ordinary computer users. Consider that these issues can also affect people who have never used a computer.

Of course, Buchanan’s category of “informational professional” is considerably broader in scope than Gotterbarn’s notion of computer professional. But the central

16 c Chapter 1. Introduction to Cyberethics: Concepts, Perspectives, and Methodological Frameworks

C013GXML 10/19/2012 20:48:53 Page 17

point of her argument still holds, especially in the era of the Internet and theWorldWide Web. In the computing era preceding the Web, Gotterbarn’s conception of computer ethics as a field limited to the study of ethical issues affecting computer professionals seemed plausible. Now, computers are virtually everywhere, and the ethical issues generated by certain uses of computers and cybertechnology affect virtually everyone, professional and nonprofessional alike.

Despite the critiques leveled against Gotterbarn’s conception of the field, his position may turn out to be the most plausible of the three models we consider. Because of the social impact that computer and Internet technologies have had during the past three decades, we have tended to identify many of the ethical issues associated with these technologies, especially concerns affecting privacy and intellectual property, as computer ethics issues. But Deborah Johnson (2000) believes that in the future, computer-related ethical issues, such as privacy and property (that are currently associated with the field of computer ethics), may becomepart of what she calls “ordinary ethics.” In fact, Johnson has suggested that computer ethics, as a separate field of applied ethics, may eventually “go away.”However, even if Johnson’s prediction turns out to be correct, computer ethics as a field that examines ethical issues affecting responsibility for computer professionals will, in all likelihood, still be needed. In this sense, then, Gotterbarn’s original model of computer ethics might turn out to be the correct one in the long term.

Applying the Professional Ethics Model to Specific Scenarios It is fairly easy to see how the professional ethics model can be used to analyze issues involving professional responsibility that directly impact computer/IT professionals. For example, issues concerned with the development and implementation of critical software would fit closely with the professional model. But can that model be extended to include cases that may only affect computer professionals indirectly?

We can ask how some of the issues in the scenarios described earlier in this chapter might be analyzed from the perspective of professional ethics. Consider the Washingtonienne scenario, which initially might seem to be outside the purview of computer ethics vis-�a-vis professional ethics. However, some interesting and controver- sial questions arise that can have implications for computer/IT professionals as well as for professional bloggers. For example, should Internet service providers (ISPs) and SNSs hire programmers to design features that would support anonymity for individuals who post certain kinds of personal information (e.g., personal diaries such as Cutler’s) to blogs aimed at sharing that information with a limited audience, as opposed to blogs whose content is intended to be available to the entire “online world”?Also, should providers of online services be encouraged to include applications that enable bloggers to delete, permanently, some embarrassing information they had entered in a blog in the past—e.g., information that could threaten their current employment (as in the case of Jessica Cutler) or harm their chances or future employment (e.g., if information they had previously posted to a blog were discovered by a prospective employer)? Consider the example of information about oneself that a person might have carelessly posted on Facebook when he or she was a first-year college student; the question of whether an individual’s remarks entered in an online forum should remain there indefinitely (or should be stored in that forum’s database in perpetuity) is one that is now hotly debated.

Another aspect of the professional ethics model as applied to blogs is whether bloggers themselves should be expected to comply with a professional “blogger code of

1.4 Cyberethics as a Branch of Applied Ethics: Three Distinct Perspectives b 17

C013GXML 10/19/2012 20:48:53 Page 18

ethics,” as some have proposed. For example, there are ethical codes of conduct that professional journalists are expected to observe. (We examine professional codes of ethics in detail in Chapter 4.)

Also, consider the Megan Meier scenario. From the vantage point of professional ethics, one might argue that cyberbullying in general and the death of Meier in particular are not the kinds of concerns that are the proper business of computer ethics.We saw that someone such as Gotterbarn might ask why a crime that happened to involve the use of a computer should necessarily be construed as an issue for computer ethics. For example, he notes that a murder that happened to be committed with a surgeon’s scalpel would not be considered an issue for medical ethics. While murders involving the use of a computer, like all murders, are serious moral and legal problems, Gotterbarn seems to imply that they are not examples of genuine computer ethics issues. However, Gotterbarn and the advocates for his position are acutely aware that software developed by engineers can have implications that extend far beyond the computing/IT profession itself.

Many of the ethical issues discussed in this book have implications for computer/IT professionals, either directly or indirectly. Issues that have a direct impact on computer professionals in general, and software engineers in particular, are examined in Chapter 4, which is dedicated to professional ethics. Computer science students and computer professionals will likely also want to assess some of the indirect implications that issues examined in Chapters 5 through 12 also have for the computing profession.

1.4.2 Perspective #2: Cyberethics as a Field of Philosophical Ethics

What, exactly, is philosophical ethics and how is it different from professional ethics? Since philosophical methods and tools are also used to analyze issues involving professional ethics, any attempt to distinguish between the twomight seem arbitrary, perhaps even odd. For our purposes, however, a useful distinction can be drawn between the two fields because of the approach each takes in addressing ethical issues. Whereas professional ethics issues typically involve concerns of responsibility andobligation affecting individuals as members of a certain profession, philosophical ethics issues include broader concerns— social policies as well as individual behavior—that affect virtually everyone in society. Cybertechnology-related moral issues involving privacy, security, property, and free speech can affect everyone, including individuals who have never even used a computer.

To appreciate the perspective of cyberethics as a branch of philosophical ethics, consider James Moor’s classic definition of the field. According to Moor (2007), cyberethics, or what he calls “computer ethics,” is

the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology.15

Two points in Moor’s definition are worth examining more closely. First, computer ethics (i.e., what we call “cyberethics”) is concerned with the social impact of computers and cybertechnology in a broad sense, and not merely the impact of that technology for computer professionals. Secondly, this definition challenges us to reflect on the social impact of cybertechnology in a way that also requires a justification for our social policies.

Why is cyberethics, as a field of philosophical ethics dedicated to the study of ethical issues involving cybertechnology, warranted when there aren’t similar fields of applied ethics for other technologies? Recall our earlier discussion of Gotterbarn’s observation

18 c Chapter 1. Introduction to Cyberethics: Concepts, Perspectives, and Methodological Frameworks

C013GXML 10/19/2012 20:48:53 Page 19

that we do not have fields of applied ethics called “automobile ethics” or “airplane ethics,” even though automobile and airplane technologies have significantly affected our day-to-day lives. Moor could respond to Gotterbarn’s point by noting that the introduction of automobile and airplane technologies did not affect our social policies and norms in the same kinds of fundamental ways that computer technology has. Of course, we have had to modify and significantly revise certain laws and policies to accommodate the implementation of new kinds of transportation technologies. In the case of automobile technology, we had to extend, and in some cases modify, certain policies and laws previously used to regulate the flow of horse-drawn modes of transpor- tation. And clearly, automobile and airplane technologies have revolutionized trans- portation, resulting in our ability to travel faster and farther than was possible in previous eras.

What hasmade the impact of computer technology significantly different from that of othermodern technologies?We have already seen that forMoor, three factors contribute to this impact: logical malleability, policy vacuums, and conceptual muddles. Because cybertechnology is logically malleable, its uses often generate policy vacuums and conceptual muddles. In Section 1.3.2 we saw how certain kinds of conceptual muddles contributed to some of the confusion surrounding software piracy issues in general, and the Napster controversy in particular. What implications do these factors have for the standard methodology used by philosophers in the analysis of applied ethics issues?

Methodology and Philosophical Ethics Philip Brey (2004) notes that the standard methodology used by philosophers to conduct research in applied ethics has three distinct stages in that an ethicist must

1. identify a particular controversial practice as a moral problem,

2. describe and analyze the problem by clarifying concepts and examining the factual data associated with that problem,

3. apply moral theories and principles in the deliberative process in order to reach a position about the particular moral issue.16

We have already noted (in Section 1.3) how the first two stages in this methodology can be applied to an analysis of ethical issues associated with digital piracy. We saw that, first, a practice involving the use of cybertechnology to “pirate” or make unauthorized copies of proprietary information was identified as morally controversial. At the second stage, the problemwas analyzed in descriptive and contextual terms to clarify the practice and to situate it in a particular context. In the case of digital piracy, we saw that the concept of piracy could be analyzed in terms of moral issues involving theft and intellectual property theory. When we describe and analyze problems at this stage, we will want to be aware of and address any policy vacuums and conceptual muddles that are relevant.

At the third and final stage, the problem must be deliberated over in terms of moral principles (or theories) and logical arguments. Brey describes this stage in the method as the “deliberative process.”Here, various arguments are used to justify the application of particular moral principles to the issue under consideration. For example, issues involv- ing digital piracy can be deliberated upon in terms of one or more standard ethical theories, such as utilitarianism (defined in Chapter 2).

1.4 Cyberethics as a Branch of Applied Ethics: Three Distinct Perspectives b 19

C013GXML 10/19/2012 20:48:53 Page 20

Applying the Method of Philosophical Ethics to Specific Scenarios To see how the philosophical ethics perspective of cyberethics can help us to analyze a cluster of moral issues affecting cybertechnology, we revisit the Washingtonienne, Twitter, and Meier scenarios introduced in the opening section of this chapter. In applying the philosophical ethics model to these scenarios, our first task is to identify one or more moral issues associated with each. We have already seen that these scenarios illustrate a wide range of ethical issues. For example, we saw that ethical issues associated with the Washingtonienne scenario include free speech, defamation, confidentiality, anonymity, and privacy with respect to blogs and blogging. But what kinds of policy vacuums and conceptual muddles, if any, arise in this case? For one thing, both the nature of a blog and the practices surrounding blogging are relatively new. Thus, not surprisingly, we have very few clear and explicit policies affecting the “blogosphere.” To consider why this is so, we begin by asking: what, exactly, is a blog? For example, is it similar to a newspaper or a periodical (such as theNew York Times or TIME Magazine), which is held to standards of accuracy and truth? Or is a blog more like a tabloid (such as the National Inquirer), in which case there is little expectation of accuracy? Our answers to these questions may determine whether bloggers should be permitted to post anything they wish, without concern for the accuracy of any of their remarks that may be false or defamatory, or both? At present, there are no clear answers to these and related questions surrounding blogs. So, it would seem that explicit policies are needed to regulate blogs and bloggers. But it would also seem that before we can frame explicit policies for blogging, we first need to resolve some important conceptual muddles.17

Next, consider the Twitter scenario. Among the ethical issues identified in that scenario were concerns affecting intellectual property. We can now ask whether any policy vacuums and conceptual muddles were generated in that scenario. The answer would clearly seem to be “yes.” However, policy vacuums concerning intellectual pro- perty in the digital era are by no means new. For example, we noted earlier that the original Napster scenario introduced controversies with respect to sharing copyrighted information, in the form of proprietary MP3 files, online. The Twitter scenario, however, introduces issues that go beyond that kind of concern. Here, we have a dispute about who owns a list of names that can constitute both a company’s customer list and a blogger’s group of followers on a private SNS account. Should one party have exclusive ownership of this list of names? Can a list of names qualify as a “trade secret” for a corporation, as companies such as PhonedogMedia claim? If a blogger generates a list of followers while blogging for an employer, should that employer have exclusive rights to the list of names?

Finally, consider the Meier scenario. Did MySpace have a clear policy in place regarding the creation of user accounts on its forum when Lori Drew set up the “Josh Evans” account? Do/Should SNS users have an expectation of anonymity or pseudo- nomity when they set up an account? Should SNSs, such as MySpace and Facebook, bear some moral responsibility, or at least some legal liability, for harm that is caused to users of its service, especially when users of that SNS have set up accounts with fictitious names and profiles? It would appear that the Meier scenario illustrates how a clear and significant policy vacuum arose in the case of the rules governing acceptable behavior on SNSs. Fortunately, many SNSs now, following the tragic incident involving Meier, have clear and explicit policies that require one to disclose his or her true identity to the SNS before setting up an account on its forum.

20 c Chapter 1. Introduction to Cyberethics: Concepts, Perspectives, and Methodological Frameworks

C013GXML 10/19/2012 20:48:53 Page 21

1.4.3 Perspective #3: Cyberethics as a Field of Sociological/Descriptive Ethics

The two perspectives on cyberethics that we have examined thus far—professional ethics and philosophical ethics—can both be understood as normative inquiries into applied ethics issues. Normative inquiries or studies, which focus on evaluating and prescribing moral systems, can be contrasted with descriptive inquiries or studies. Descriptive ethics is, or aims to be, nonevaluative in approach; typically, it describes particular moral systems and sometimes also reports how members of various groups and cultures view particular moral issues. This kind of analysis of ethical and social issues is often used by sociologists and social scientists; hence, our use of the expression “sociological/descriptive perspective” to analyze this methodological framework.

Descriptive vs. Normative Inquiries Whereas descriptive investigations provide us with information about what is the case, normative inquiries evaluate situations from the vantage point of questions having to do with what ought to be the case. Those who approach cyberethics from the perspective of descriptive ethics often describe sociological aspects of a particular moral issue, such as the social impact of a specific technology on a particular community or social group. For example, one way of analyzing moral issues surrounding the “digital divide” (examined in Chapter 10) is first to describe the problem in terms of its impact on various socio- demographic groups involving social class, race, and gender. We can investigate whether, in fact, fewer poor people, non-whites, and women have access to cybertechnology than wealthy and middle-class persons, whites, and men. In this case, the investigation is one that is basically descriptive in character. If we were then to inquire whether the lack of access to technology for some groups relative to others was unfair, we would be engaging in a normative inquiry. For example, a normative investigation of this issue would question whether certain groups should have more access to cybertechnology than they currently have. The following scenario illustrates an approach to a particular cyberethics issue via the perspective of sociological/descriptive ethics.

Does the decision to implement Technology X pose a normative ethical problem for the AEC Corporation, as well as for Pleasantville? If we analyze the impact that Technology X has with respect to the number of jobs that are gained or lost, our investigation is essentially descriptive in nature. In reporting this phenomenon, we are simply describing or stating what is/ is not at issue in this case. If, however, we argue that AEC either should or should not implement this new technology, then we make a claim that is normative (i.e., a claim about what ought/ought not to be the case). For example, one might argue that the new technology should not be implemented because it would displace workers and thus possibly violate certain contractual obligations that may exist between AEC and its employees. Alternatively, one might argue that

c SCENARIO 1–6: The Impact of Technology X on the Pleasantville Community

AECCorporation, a company that employs 8,000 workers in Pleasantville, has decided to purchase and implement a new kind of computer/information technology, Technology X. The implementa- tion of Technology X will likely have a significant impact for AEC’s employees in particular, as well as for Pleasantville in general. It is estimated that 3,000 jobs at AEC will be eliminated when the new technology is implemented during the next six months. &

1.4 Cyberethics as a Branch of Applied Ethics: Three Distinct Perspectives b 21

C013GXML 10/19/2012 20:48:53 Page 22

implementing Technology X would be acceptable provided that certain factors are taken into consideration in determining which workers would lose their jobs. For example, suppose that in the process of eliminating jobs, older workers and minority employees would stand to be disproportionately affected. In this case, critics might argue that a fairer system should be used.

Our initial account of the impact of Technology X’s implementation for Pleasantville simply reported some descriptive information about the number of jobs that would likely be lost by employees at AEC Corporation, which has sociological implications. As our analysis of this scenario continued, however, we did much more than merely describe what the impact was; we also evaluated the impact for AEC’s employees in terms of what we believed ought to have been done. In doing so, we shifted from an analysis based on claims that were merely descriptive to an analysis in which some claims were also normative.

Some Benefits of Using the Sociological/Descriptive Approach to Analyze Cyberethics Issues Why is the examination of cyberethics issues from the sociological/descriptive ethics perspective useful? Huff and Finholt (1994) suggest that focusing on descriptive aspects of social issues can help us to better understand many of the normative features and implications. In other words, when we understand the descriptive features of the social effects of a particular technology, the normative ethical questions become clearer. So, Huff and Finholt believe that analyzing the social impact of cybertechnology from a sociological/descriptive perspective can better prepare us for our subsequent analysis of practical ethical issues affecting our system of policies and laws.

We have already noted that virtually all of our social institutions, from work to education to government to finance, have been affected by cybertechnology. This technology has also had significant impacts on different sociodemographic sectors and segments of our population. The descriptive information that we gather about these groups can provide important information that, in turn, can inform legislators and policy makers who are drafting and revising laws in response to the effects of cybertechnology.

From the perspective of sociological/descriptive ethics, we can also better examine the impact that cybertechnology has on our understanding of concepts such as community and individuality.We can ask, for instance, whether certain developments in social networking technologies used in Twitter and Facebook have affected the way that we conceive traditional notions such as “community” and “neighbor.” Is a community essentially a group of individuals with similar interests, or perhaps a similar ideology, irrespective of geographical limitations? Is national identity something that is, or may soon become, anachronistic? While these kinds of questions and issues in and of themselves are more correctly conceivedas descriptive rather thannormative concerns, they canhave significant normative implications for our moral and legal systems as well. Much more will be said about the relationship between descriptive and normative approaches to analyzing ethical issues in Chapters 10 and 11, where we examine the impact of cybertechnology on sociodemographic groups and on some of our social and political institutions.

Applying the Sociological/Descriptive Ethics Approach to Specific Scenarios Consider how someone approaching cyberethics issues from the perspective of socio- logical/descriptive ethics might analyze the Washingtonienne and Meier scenarios,

22 c Chapter 1. Introduction to Cyberethics: Concepts, Perspectives, and Methodological Frameworks

C013GXML 10/19/2012 20:48:53 Page 23

described above. In the Washingtonienne case, the focus might be on gathering socio- demographic and socioeconomic data pertaining to the kinds of individuals who are likely to view and interact in blogs. For example, some social scientists might consider the income and educational levels of bloggers, as compared to individuals who engage in alternative kinds of online activities or who do not use the Internet at all. Others might be interested in determining which kinds of users view their own blogs and online postings as simply an online outlet for the kind of personal information that traditionally was included only in one’s (physical) diary. (Jessica Cutler’s behavior seemed to fit this category.) Social and behavioral scientists might further inquire into why some individ- uals seem to display little-to-no concern about posting intimate details of their romantic and sexual encounters to online forums that could be read, potentially at least, by millions of people. They might also question why some bloggers (as well as ordinary users of SNSs such as Facebook and Twitter) are so eager to post personal information, including information about their location (at a given point in time) and about their recreational interests, to online forums, in an era when that kind of information is so easily tracked and recorded by individuals other than those for whom it is intended.

Next consider the Meier scenario with respect to how it might be analyzed by someone doing research from the point of view of sociological/descriptive ethics. For example, a researcher might inquire into whether there has been an increase in the number of bullying incidents. And if the answer to this question is “yes,” the researcher might next question whether such an increase is linked to the widespread availability of cybertechnology. Also, the researcher might consider whether certain groups in the population are now more at risk than others with respect to being bullied in cyberspace. The researcher could inquire whether there are any statistical patterns to suggest that late-adolescent/early-teenage females are more likely to be bullied via cybertechnology than are individuals in other groups. The researcher could also ask if women in general are typically more vulnerable than men to the kinds of harassment associated with cyberbullying.

Also, a researcher approaching the Meier scenario from the sociological/descriptive ethics perspective might set out to determine whether an individual who never would have thought of physically bullying a victim in geographical space might now be inclined to engage in cyberbullying—perhaps because of the relative ease of doing so with cybertechnology? Or is it the case that some of those same individuals might now be tempted to do so because they believe that they will not likely get caught? Also, has the fact that a potential cyberbully realizes that he or she can harass a victim on the Internet under the cloak of relative anonymity/pseudonymity contributed to the increase in bullying-related activities online? These are a few of the kinds of questions that could be examined from the sociological/descriptive perspective of cyberethics.

Table 1.2 summarizes some key characteristics that differentiate the three main perspectives for approaching cyberethics issues.

In Chapters 4–12, we examine specific cyberethics questions from the vantage points of our three perspectives. Issues considered from the perspective of professional ethics are examined in Chapters 4 and 12. Cyberethics issues considered from the perspective of philosophical ethics, such as those involving privacy, security, and intellectual property and free speech, are examined in Chapters 5–9. And several of the issues considered in Chapters 10 and 11 are examined from the perspective of sociological/descriptive ethics.

1.4 Cyberethics as a Branch of Applied Ethics: Three Distinct Perspectives b 23

C013GXML 10/19/2012 20:48:53 Page 24

c 1.5 A COMPREHENSIVE CYBERETHICS METHODOLOGY

The three different perspectives of cyberethics described in the preceding section might suggest that three different kinds of methodologies are needed to analyze the range of issues examined in this textbook. The goal of this section, however, is to show that a single, comprehensive method can be constructed, and that this method will be adequate in guiding us in our analysis of cyberethics issues.

Recall the standard model used in applied ethics, which we briefly examined in Section 1.4.2. There we saw that the standard model includes three stages, i.e., where a researcher must (1) identify an ethical problem, (2) describe and analyze the problem in conceptual and factual terms, and (3) apply ethical theories and principles in the deliberative process. We also saw that Moor argued that the conventional model was not adequate for an analysis of at least some cyberethics issues. Moor believed that additional steps, which address concerns affecting “policy vacuums” and “conceptual muddles,” are sometimes needed before we can move from the second to the third stage of the methodological scheme. We must now consider whether the standard model, with Moor’s additional steps included, is complete. Brey (2004) suggests that it is not.

Brey believes that while the (revised) standard model might work well in many fields of applied ethics, such as medical ethics, business ethics, and bioethics, it does not always fare well in cyberethics. Brey argues that the standard method, when used to identify ethical aspects of cybertechnology, tends to focus almost exclusively on the uses of that technology. As such, the standard method fails to pay sufficient attention to certain features that may be embedded in the technology itself, such as design features that may also have moral implications.

Wemight be inclined to assume that technology itself is neutral and that only the uses to which a particular technology is put are morally controversial. However, Brey and others believe that it is a mistake to conceive of technology, independent of its uses, as something that is value-free, or unbiased. Instead, they argue, moral values are often embedded or implicit in features built into technologies at the design stage. For example, critics, including some feminists, have pointed out that in the past the ergonomic systems

TABLE 1.2 Summary of Cyberethics Perspectives

Type of Perspective Associated Disciplines Issues Examined

Professional Computer Science Professional responsibility Engineering System reliability/safety Library/Information Science

Codes of conduct

Philosophical Philosophy Privacy and anonymity Law Intellectual property

Free speech Sociological/Descriptive Sociology/Behavioral

Sciences Impact of cybertechnology on governmental/financial/educational institutions and sociodemographic groups

24 c Chapter 1. Introduction to Cyberethics: Concepts, Perspectives, and Methodological Frameworks

C013GXML 10/19/2012 20:48:53 Page 25

designed for drivers of automobiles were biased toward men and gave virtually no consideration to women. That is, considerations having to do with the average height and typical body dimensions of men were implicitly built into the design specification. These critics also note that decisions about how the ergonomic systems would be designed were all made by men, which likely accounts for the bias embedded in that particular technological system.

1.5.1 A “Disclosive”Method for Cyberethics

As noted earlier, Brey believes that the standard, or what he calls “mainstream,” applied ethics methodology is not always adequate for identifying moral issues involving cybertechnology. Brey worries that using the standard model we might fail to notice certain features embedded in the design of cybertechnology. He also worries about the standard method of applied ethics because it tends to focus on known moral controver- sies, and because it fails to identify certain practices involving the use of cybertechnology that have moral import but that are not yet known. Brey refers to such practices as having “morally opaque” (or morally nontransparent) features, which he contrasts with “morally transparent” features.

According to Brey, morally controversial features that are transparent tend to be easily recognized as morally problematic. For example, many people are aware that the practice of placing closed circuit video surveillance cameras in undisclosed locations is controversial from a moral point of view. Brey notes that it is, however, generally much more difficult to discern morally opaque features in technology. These features can be morally opaque for one of two reasons: either they are unknown, or they are known but perceived to be morally neutral.18

Consider an example of each type of morally opaque (or morally nontransparent) feature. Computerized practices involving data mining (defined in Chapter 5) would be unknown to those who have never heard of the concept of data mining and who are unfamiliar with data mining technology. However, this technology should not be assumed to be morally neutral merely because data mining techniques are unknown to non- technical people, including some ethicists as well. Even if such techniques are opaque to many users, data mining practices raise certain moral issues pertaining to personal privacy.

Next consider an example of a morally opaque feature in which a technology is well known.Most Internet users are familiar with search engine technology.What users might fail to recognize, however, is that certain uses of search engines can be morally controversial with respect to personal privacy. Consequently, one of the features of search engine technology can be morally controversial in a sense that it is not obvious or transparent to many people, including those who are very familiar with and who use search engine technology. So, while a well-known technology, such as search engine programs, might appear to be morally neutral, a closer analysis of practices involving this technology will disclose that it has moral implications.

Figure 1.1 illustrates some differences between morally opaque and morally trans- parent features.

Brey argues that an adequate methodology for computer ethics must first identify, or “disclose,” features that, without proper probing and analysis, would go unnoticed as having moral implications. Thus, an extremely important first step in Brey’s “disclosive

1.5 A Comprehensive Cyberethics Methodology b 25

C013GXML 10/19/2012 20:48:53 Page 26

method” is to reveal moral values embedded in the various features and practices associated with cybertechnology itself.

1.5.2 An Interdisciplinary and Multilevel Method for Analyzing Cyberethics Issues

Brey’s disclosive model is interdisciplinary because it requires that computer scientists, philosophers, and social scientists collaborate. It is also multilevel because conducting computer ethics research requires three levels of analysis:

� disclosure level � theoretical level � application level First of all, the moral values embedded in the design of computer systems must be

disclosed. To do this, we need computer scientists because they understand computer technology much better than philosophers and social scientists do. However, social scientists are also needed to evaluate system design andmake it more user-friendly. Then philosophers can determine whether existing ethical theories are adequate to test the newly disclosed moral issues or whether more theory is needed. Finally, computer scientists, philosophers, and social scientists must cooperate by applying ethical theory in deliberations aboutmoral issues.19 In Chapter 2, we examine a range of ethical theories that can be used.

In the deliberations involved in applying ethical theory to a particular moral problem, one remaining methodological step also needs to be resolved. Jeroen van den Hoven (2000) has noted that methodological schemes must also address the “problem of justification of moral judgments.” For our purposes, we use the strategies of logical analysis included in Chapter 3 to justify the moral theories we apply to particular issues.

Morally transparent features Morally opaque (nontransparent) features

Known features Unknown features

Users are aware of these features but do not realize they have moral implications

(e.g., search engine tools).

Users are not aware of the technological features that have moral implications

(e.g., data mining tools).

Figure 1.1 Embedded technological features having moral implications.

26 c Chapter 1. Introduction to Cyberethics: Concepts, Perspectives, and Methodological Frameworks

C013GXML 10/19/2012 20:48:53 Page 27

Table 1.3 describes the academic disciplines and the corresponding tasks and functions involved in Brey’s disclosive model.

It is in the interdisciplinary spirit of the disclosive methodology proposed by Brey that we will examine the range of cyberethics issues described in Chapters 4–12.

c 1.6 A COMPREHENSIVE STRATEGY FOR APPROACHING CYBERETHICS ISSUES

The following methodological scheme, which expands on the original three-step scheme introduced in Section 1.4.2, is intended as a strategy to assist you in identifying and analyzing the specific cyberethics issues examined in this book. Note, however, that this procedure is not intended as a precise algorithm for resolving those issues in some definitive manner. Rather, its purpose is to guide you in the identification, analysis, and deliberation processes by summarizing key points that we have examined in Chapter 1.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

ECFX Market
A Grade Exams
Professor Smith
High Quality Assignments
Financial Hub
Coursework Helper
Writer Writer Name Offer Chat
ECFX Market

ONLINE

ECFX Market

I am an experienced researcher here with master education. After reading your posting, I feel, you need an expert research writer to complete your project.Thank You

$39 Chat With Writer
A Grade Exams

ONLINE

A Grade Exams

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$38 Chat With Writer
Professor Smith

ONLINE

Professor Smith

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$39 Chat With Writer
High Quality Assignments

ONLINE

High Quality Assignments

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$34 Chat With Writer
Financial Hub

ONLINE

Financial Hub

I am an academic and research writer with having an MBA degree in business and finance. I have written many business reports on several topics and am well aware of all academic referencing styles.

$37 Chat With Writer
Coursework Helper

ONLINE

Coursework Helper

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$37 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Mcgonigle nursing informatics and the foundation of knowledge - Https www hudp260 com pages resources hudtraining_mm3_portal aspx - Scs 100 theme 1 comparison template - How to respond electronically for an invite to interview - Electrical tools and equipment and their uses ppt - MIS Discussion - Cyclone v soc development kit schematic - Barbara ehrenreich serving in florida questions - Gregorian chant mass settings - Business studies hsc notes - Evaluating polynomial functions worksheet - 6-1 Discussion: Professional Relevance of Financial Accounting - Mirvac land for sale - Transvaal lands co v new belgium - 5 wing court maylands - Ctc math 1332 - Best practices in healthcare facilities capital planning - Jessica lynn graham ucsd - Rock cycle picture diagram - Salukinet d2l - Eddie mabo major achievements - Flank hernia repair cpt code - Week 3 Discussion - Example of a 4 mat review paper - Chest pain concept map - Handy andy inc case study - 4 page essay - Ccna 4 chapter 6 - Funding sources for early childhood programs - Wireshark lab dns v7 0 solution - Healthy myles fitness center - Cu no3 2 anion and cation - Quantitative analysis of medical records - Should cell phones be banned from school - Define the term prima facie - Paragliding ground handling tricks - Case study on moral status fetal abnormality - What is oral presentation wikipedia - Champiñón cebolla propina zanahoria - Who wrote blood brothers - The protocols of the elders of zion pdf - Cases in operations management robert johnston pdf - According to the negro digs up his past - Caryn campbell ted bundy - Braswell's reasons to study ethics - A quiet place 2 parents guide - St luke's south melbourne - STR/581: Strategic Planning & Implementation 1 - How to play scene it dvd game - PROFILO due in 6 hours - What do butterflies symbolize - Koch ag and energy solutions wichita ks - Summary - Environment lapse rate - SMGT 502 - Marketing Plan: Promotion Objectives - St annes pharmacy lewes - Judith wright australia 1970 - BW Texas Gov't Topic 7.1 and 7.2 - Discussion 3 Japan - Copper nitrate and sodium hydroxide equation - Research - Cloud Computing - Problem cause solution persuasive speech topics - Explain how dna sequences are used in classification - Terry wright cycles spalding - The metric system worksheet answers - Agrium advanced technologies u s inc - 1776 david mccullough study guide - Racq service centre gold coast - Discussion 7 - Subnetting practice exercises - Hagen style case study solution - Internet Marketing - Structural Versus Strategic Family Therapies - Assignment - Bacha meaning in arabic - How many islands philippines - Keda's sap implementation case - Discussion Week 3 - Jason stockwood net worth - The art of the commonplace chapter summaries - Igcse global perspectives textbook pdf - Sabre red download for windows 7 - Foreshadowing in the cask of amontillado - Management Fundamentals - An prc 117g technical manual - Iso 9001 gap analysis - Deflection of curved beams lab report - Rental property carpet replacement law nsw - Analytical apps in sap fiori - Assignment 1 - Sweeney todd ray winstone - Contemporary strategic management concepts - Writing html in notepad - Wrongs act 1958 vic - Joan templeton a doll's house - Discovering human sexuality 4th edition baldwin pdf - Flor de cana lcbo - Nbaa tanzania examination form final stage - Sociology