Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

The fourth stall part 3 summary

16/11/2021 Client: muhammad11 Deadline: 2 Day

A Gift of Fire

This page intentionally left blank

A Gift of Fire Social, Legal, and Ethical Issues for Computing Technology

fourth edition

Sara Baase San Diego State University

Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo

Editorial Director Marcia Horton Executive Editor Tracy Johnson Associate Editor Carole Snyder Editorial Assistant Jenah Blitz-Stoehr Director of Marketing Christy Lesko Marketing Manager Yez Alayan Marketing Coordinator Kathryn Ferranti Director of Production Erin Gregg Managing Editor Jeff Holcomb Production Project Manager Kayla Smith-Tarbox Operations Supervisor Nick Skilitis Manufacturing Buyer Lisa McDowell Art Director Anthony Gemmellaro

Cover Designer Anthony Gemmellaro Manager, Visual Research Karen Sanatar Manager, Rights and Permissions Michael Joyce Text Permission Coordinator Danielle Simon Cover Art Crocodile Images/Glow Images,

Yuri Arcurs/AGE Fotostock Lead Media Project Manager Daniel Sandin Full-Service Project Management Windfall Software Composition Windfall Software Printer/Binder R.R. Donnelley Harrisonburg Cover Printer R.R. Donnelley Harrisonburg Text Font Adobe Garamond

Credits and acknowledgements. Excerpt from Mike Godwin speech: at Carnegie Mellon University, November 1994. Copyright © 1994 by Mike Godwin. Reprinted with permission. Excerpt from Jerrold H. Zar’s “Candidate for a Pullet Surprise”: from JOURNAL OF IRREPRODUCIBLE RESULTS, 39, no. 1 (Jan/Feb 1994). Copyright © 1994 Norman Sperling Publishing. Reprinted with permission. Excerpt from “Social and Legal Issues”: From INVITATION TO COMPUTER SCIENCE, 1E by Schneider/Gertsing. Copyright © 1995 South-Western, a part of Cengage Learning, Inc. Reproduced by permission. www.cengage.com/permissions. Appendix A.1: The Software Engineering Code of Ethics and Professional Practice. THE SOFTWARE ENGINEERING CODE OF ETHICS AND PROFESSIONAL PRACTICE © 1999 by the Institute of Electrical and Electronics Engineers, Inc. and the Association for Computing Machinery, Inc. Reprinted by permission. Appendix A.2: The ACM Code of Ethics and Professional Conduct. ACM CODE OF ETHICS AND PROFESSIONAL CONDUCT. Copyright © 1999 by the Association for Computing Machinery, Inc. and the Institute for Electrical and Electronics Engineers, Inc. Reprinted by permission. Adi Kamdar Excerpt: Adi Kamdar, “EFF Denounces Flawed E-Verify Proposal That Would Trample on Worker Privacy,” July 1, 2011, www.eff.org/deeplinks/2011/07/eff-denounces-flawede-verify-proposal, viewed July 31, 2011. Reprinted under the terms of the Creative Commons Attributions License. Calvin and Hobbes “today at school . . . ” cartoon © 1993 Watterson. Reprinted with permission of UNIVERSAL PRESS SYNDICATE. All rights reserved. Calvin and Hobbes “what’s all the fuss about computers . . . ” cartoon © 1995 Watterson. Dist. By UNIVERSAL PRESS SYNDICATE. Reprinted with permission. All rights reserved. “Opus” cartoon used with the permission of Berkeley Breathed and the Cartoonist Group. All rights reserved.

Copyright © 2013, 2008, 2003 by Pearson Education, Inc., publishing as Prentice Hall. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission(s) to use material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, One Lake Street, Upper Saddle River, New Jersey 07458, or you may fax your request to 201-236-3290.

Many of the designations by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial caps or all caps.

Library of Congress Cataloging-in-Publication Data

Baase, Sara. A gift of fire : social, legal, and ethical issues for computing technology / Sara Baase. — 4th ed.

p. cm. Includes bibliographical references and index. ISBN 978-0-13-249267-6 1. Computers—Social aspects. 2. Computers—Moral and ethical aspects. 3. Internet—Social aspects.

4. Internet—Moral and ethical aspects. I. Title. QA76.9.C66B3 2013 303.48′34—dc23 2012020988

10 9 8 7 6 5 4 3 2 1

ISBN 10: 0-13-249267-9 ISBN 13: 978-0-13-249267-6

www.cengage.com/permissions
www.eff.org/deeplinks/2011/07/eff-denounces-flawede-verify-proposal
To Keith, always

And to Michelle Nygord Matson (1959–2012)

For her love of life, learning, and adventure For her laughter, wisdom, and determination For her friendship

This page intentionally left blank

Contents

Preface xiii

Prologue 1

1 UNWRAPPING THE GIFT 3

1.1 The Pace of Change 4 1.2 Change and Unexpected Developments 6

1.2.1 Connections: Cellphones, Social Networking, and More 7 1.2.2 E-commerce and Free Stuff 15 1.2.3 Artificial Intelligence, Robotics, Sensors, and Motion 17 1.2.4 Tools for Disabled People 21

1.3 Themes 23 1.4 Ethics 26

1.4.1 What Is Ethics, Anyway? 26 1.4.2 A Variety of Ethical Views 28 1.4.3 Some Important Distinctions 36 Exercises 40

2 PRIVACY 47

2.1 Privacy Risks and Principles 48 2.1.1 What Is Privacy? 48 2.1.2 New Technology, New Risks 50 2.1.3 Terminology and Principles for Managing Personal Data 56

2.2 The Fourth Amendment, Expectation of Privacy, and Surveillance Technologies 60 2.2.1 The Fourth Amendment 61 2.2.2 New Technologies, Supreme Court Decisions, and Expectation of

Privacy 63 2.2.3 Search and Seizure of Computers and Phones 66 2.2.4 Video Surveillance and Face Recognition 68

2.3 The Business and Social Sectors 70 2.3.1 Marketing and Personalization 70 2.3.2 Our Social and Personal Activity 75 2.3.3 Location Tracking 79 2.3.4 A Right to Be Forgotten 82

viii Contents

2.4 Government Systems 84 2.4.1 Databases 84 2.4.2 Public Records: Access versus Privacy 90 2.4.3 National ID Systems 91

2.5 Protecting Privacy: Technology, Markets, Rights, and Laws 95 2.5.1 Technology and Markets 95 2.5.2 Rights and Law 100 2.5.3 Privacy Regulations in the European Union 110

2.6 Communications 112 2.6.1 Wiretapping and Email Protection 113 2.6.2 Designing Communications Systems for Interception 115 2.6.3 The NSA and Secret Intelligence Gathering 116 Exercises 119

3 FREEDOM OF SPEECH 133

3.1 Communications Paradigms 134 3.1.1 Regulating Communications Media 134 3.1.2 Free Speech Principles 137

3.2 Controlling Speech 139 3.2.1 Offensive Speech: What Is It? What Is Illegal? 139 3.2.2 Censorship Laws and Alternatives 141 3.2.3 Child Pornography and Sexting 146 3.2.4 Spam 148 3.2.5 Challenging Old Regulatory Structures and Special Interests 152

3.3 Posting, Selling, and Leaking Sensitive Material 153 3.4 Anonymity 159 3.5 The Global Net: Censorship and Political Freedom 163

3.5.1 Tools for Communication, Tools for Oppression 163 3.5.2 Aiding Foreign Censors and Repressive Regimes 165 3.5.3 Shutting Down Communications in Free Countries 168

3.6 Net Neutrality Regulations or the Market? 169 Exercises 171

4 INTELLECTUAL PROPERTY 179

4.1 Principles, Laws, and Cases 180 4.1.1 What Is Intellectual Property? 180 4.1.2 Challenges of New Technologies 182 4.1.3 A Bit of History 185 4.1.4 The Fair Use Doctrine 186 4.1.5 Ethical Arguments About Copying 187 4.1.6 Significant Legal Cases 190

Contents ix

4.2 Responses to Copyright Infringement 196 4.2.1 Defensive and Aggressive Responses From the Content Industries 196 4.2.2 The Digital Millennium Copyright Act: Anticircumvention 201 4.2.3 The Digital Millennium Copyright Act: Safe Harbor 204 4.2.4 Evolving Business Models 206

4.3 Search Engines and Online Libraries 208 4.4 Free Software 211

4.4.1 What Is Free Software? 211 4.4.2 Should All Software Be Free? 213

4.5 Patents for Inventions in Software 214 4.5.1 Patent Decisions, Confusion, and Consequences 215 4.5.2 To Patent or Not? 218 Exercises 220

5 CRIME 229

5.1 Introduction 230 5.2 Hacking 230

5.2.1 What is “Hacking”? 230 5.2.2 Hacktivism, or Political Hacking 236 5.2.3 Hackers as Security Researchers 237 5.2.4 Hacking as Foreign Policy 239 5.2.5 Security 241 5.2.6 The Law: Catching and Punishing Hackers 245

5.3 Identity Theft and Credit Card Fraud 250 5.3.1 Stealing Identities 251 5.3.2 Responses to Identity Theft 253 5.3.3 Biometrics 257

5.4 Whose Laws Rule the Web? 258 5.4.1 When Digital Actions Cross Borders 258 5.4.2 Libel, Speech, and Commercial Law 262 5.4.3 Culture, Law, and Ethics 265 5.4.4 Potential Solutions 266 Exercises 267

6 WORK 275

6.1 Changes, Fears, and Questions 276 6.2 Impacts on Employment 277

6.2.1 Job Destruction and Creation 277 6.2.2 Changing Skills and Skill Levels 282 6.2.3 Telecommuting 284 6.2.4 A Global Workforce 287

x Contents

6.3 Employee Communication and Monitoring 293 6.3.1 Learning About Job Applicants 293 6.3.2 Risks and Rules for Work and Personal Communications 296 Exercises 304

7 EVALUATING AND CONTROLLING TECHNOLOGY 311

7.1 Evaluating Information 312 7.1.1 The Need for Responsible Judgment 312 7.1.2 Computer Models 321

7.2 The “Digital Divide” 329 7.2.1 Trends in Computer Access 329 7.2.2 The Global Divide and the Next Billion Users 331

7.3 Neo-Luddite Views of Computers, Technology, and Quality of Life 332 7.3.1 Criticisms of Computing Technologies 333 7.3.2 Views of Economics, Nature, and Human Needs 336

7.4 Making Decisions About Technology 342 7.4.1 Questions 343 7.4.2 The Difficulty of Prediction 344 7.4.3 Intelligent Machines and Superintelligent Humans—Or the End of the

Human Race? 347 7.4.4 A Few Observations 350 Exercises 350

8 ERRORS, FAILURES, AND RISKS 361

8.1 Failures and Errors in Computer Systems 362 8.1.1 An Overview 362 8.1.2 Problems for Individuals 364 8.1.3 System Failures 367 8.1.4 What Goes Wrong? 375

8.2 Case Study: The Therac-25 377 8.2.1 Therac-25 Radiation Overdoses 377 8.2.2 Software and Design Problems 378 8.2.3 Why So Many Incidents? 380 8.2.4 Observations and Perspective 382

8.3 Increasing Reliability and Safety 383 8.3.1 Professional Techniques 383 8.3.2 Trust the Human or the Computer System? 388 8.3.3 Law, Regulation, and Markets 389

8.4 Dependence, Risk, and Progress 392 8.4.1 Are We Too Dependent on Computers? 392 8.4.2 Risk and Progress 393 Exercises 395

Contents xi

9 PROFESSIONAL ETHICS AND RESPONSIBILITIES 403

9.1 What Is “Professional Ethics”? 404 9.2 Ethical Guidelines for Computer Professionals 405

9.2.1 Special Aspects of Professional Ethics 405 9.2.2 Professional Codes of Ethics 406 9.2.3 Guidelines and Professional Responsibilities 407

9.3 Scenarios 410 9.3.1 Introduction and Methodology 410 9.3.2 Protecting Personal Data 412 9.3.3 Designing an Email System With Targeted Ads 414 9.3.4 Webcams in School Laptops1 415 9.3.5 Publishing Security Vulnerabilities 416 9.3.6 Specifications 417 9.3.7 Schedule Pressures 418 9.3.8 Software License Violation 421 9.3.9 Going Public 422 9.3.10 Release of Personal Information 423 9.3.11 Conflict of Interest 424 9.3.12 Kickbacks and Disclosure 426 9.3.13 A Test Plan 427 9.3.14 Artificial Intelligence and Sentencing Criminals 427 9.3.15 A Gracious Host 430 Exercises 430

Epilogue 437

A THE SOFTWARE ENGINEERING CODE AND THE ACM CODE 439

A.1 Software Engineering Code of Ethics and Professional Practice 439 A.2 ACM Code of Ethics and Professional Conduct 447

Index 455

This page intentionally left blank

Preface

This book has two intended audiences: students preparing for careers in computer science (and related fields) and students in other fields who want to learn about issues that arise from computing technology, the Internet, and other aspects of cyberspace. The book has no technical prerequisites. Instructors can use it at various levels, in both introductory and advanced courses about computing or technology.

Scope of This Book

Many universities offer courses with titles such as “Ethical Issues in Computing” or “Computers and Society.” Some focus primarily on professional ethics for computer professionals. Others address a wide range of social issues. The bulky subtitle and the table of contents of this book indicate its scope. I also include historical background to put some of today’s issues in context and perspective. I believe it is important for students (in computer and information technology majors and in other majors) to see and understand the implications and impacts of the technology. Students will face a wide variety of issues in this book as members of a complex technological society, in both their professional and personal lives.

The last chapter focuses on ethical issues for computer professionals. The basic ethical principles are not different from ethical principles in other professions or other aspects of life: honesty, responsibility, and fairness. However, within any one profession, special kinds of problems arise. Thus, we discuss professional ethical guidelines and case scenarios specific to computing professions. I include two of the main codes of ethics and professional practices for computer professionals in an Appendix. I placed the professional ethics chapter last because I believe students will find it more interesting and useful after they have as background the incidents, issues, and controversies in the earlier chapters.

Each of the chapters in this book could easily be expanded to a whole book. I had to leave out many interesting topics and examples. In some cases, I mention an issue, example, or position with little or no discussion. I hope some of these will spark further reading and debate.

Changes for the Fourth Edition

For this fourth edition, I updated the whole book, removed outdated material, added many new topics and examples, and reorganized several topics. New material appears throughout. I mention here some major changes, completely new sections and topics, and some that I extensively revised.

xiv Preface

. This edition has approximately 85 new exercises.

. In Chapter 1, I added a section on kill switches for smartphone apps, tablets, and so on, i.e., the ability of companies to remotely delete apps and other items from a user’s device (in Section 1.2.1).

. All parts of Section 1.2 have new material, including, for example, uses of smart- phone data and social network data for social research.

. I added a brief section on social contracts and John Rawls’ views on justice and fairness (in Section 1.4.2).

New topics in Chapter 2 include

. smartphones and their apps collecting personal data without permission (in Section 2.1.2)

. Fourth Amendment issues about tracking a person’s location via cellphone, track- ing cars with GPS devices, and search of cellphones (in Sections 2.2.2 and 2.2.3)

. applications of face recognition (several places in the chapter)

. privacy implications of some social networking applications and social network company policies

. a right to be forgotten (Section 2.3.4)

Chapter 3 includes new sections on

. sexting (Section 3.2.3)

. ethics of leaking sensitive information (in Section 3.3)

. shutting down cellphone service or access to social media during riots or protests (Section 3.5.3)

The chapter also has

. use of social media by freedom movements and countermeasures by governments

. more on Western countries selling surveillance systems to dictators.

Chapter 4 includes

. discussion of plagiarism

. expanded sections on the Digital Millennium Copyright Act (Sections 4.2.2 and 4.2.3)

. an expanded section on patents for software (Section 4.5)

Chapter 5 has new sections on

. hacking by governments to attack others (Section 5.2.4)

Preface xv

. expansion of the Computer Fraud and Abuse Act to cover actions it was not intended to cover (in Section 5.2.6)

Chapter 6 has new sections on

. how content of social media can affect getting hired and fired

. use of social media and personal devices at work

Chapter 7 has expanded sections on

. the “wisdom of the crowd”

. ways the Internet can narrow or restrict the points of view people see (in Section 7.1.1)

Chapter 8 has

. an introduction to high reliability organizations (in Section 8.3.1).

Chapter 9 contains

. two new scenarios.

This is an extremely fast-changing field. Clearly, some issues and examples in this book are so current that details will change before or soon after publication. I don’t consider this to be a serious problem. Specific events are illustrations of the underlying issues and arguments. I encourage students to bring in current news reports about relevant issues to discuss in class. Finding so many ties between the course and current events adds to their interest in the class.

Controversies

This book presents controversies and alternative points of view: privacy vs. access to information, privacy vs. law enforcement, freedom of speech vs. control of content on the Net, pros and cons of offshoring jobs, market-based vs. regulatory solutions, and so on. Often the discussion in the book necessarily includes political, economic, social, and philosophical issues. I encourage students to explore the arguments on all sides and to be able to explain why they reject the ones they reject before they take a position. I believe this approach prepares them to tackle new controversies. They can figure out the consequences of various proposals, generate arguments for each side, and evaluate them. I encourage students to think in principles, rather than case by case, or at least to recognize similar principles in different cases, even if they choose to take different positions on them.

My Point of View

Any writer on subjects such as those in this book has some personal opinions, positions, or biases. I believe strongly in the principles in the Bill of Rights. I also have a generally

xvi Preface

positive view of technology. Don Norman, a psychologist and technology enthusiast who writes on humanizing technology, observed that most people who have written books about technology “are opposed to it and write about how horrible it is.”� I am not one of those people. I think that technology, in general, has been a major factor in bringing physical well-being, liberty, and opportunity to hundreds of millions of people. That does not mean technology is without problems. Most of this book focuses on problems. We must recognize and study them so that we can reduce the negative effects and increase the positive ones.

For many topics, this book takes a problem-solving approach. I usually begin with a description of what is happening in a particular area, often including a little history. Next comes a discussion of why there are concerns and what the new problems are. Finally, I give some commentary or perspective and some current and potential solutions to the problems. Some people view problems and negative side effects of new technologies as indications of inherent badness in the technology. I see them as part of a natural process of change and development. We will see many examples of human ingenuity, some that create problems and some that solve them. Often solutions come from improved or new applications of technology.

At a workshop on Ethical and Professional Issues in Computing sponsored by the National Science Foundation, Keith Miller, one of the speakers, gave the following outline for discussing ethical issues (which he credited to a nun who had been one of his teachers years ago): “What? So what? Now what?” It struck me that this describes how I organized many sections of this book.

An early reviewer of this book objected to one of the quotations I include at the beginnings of many sections. He thought it was untrue. So perhaps I should make it clear that I agree with many of the quotations—but not with all of them. I chose some to be provocative and to remind students of the variety of opinions on some of the issues.

I am a computer scientist, not an attorney. I summarize the main points of many laws and legal cases and discuss arguments about them, but I do not give a comprehensive legal analysis. Many ordinary terms have specific meanings in laws, and often a difference of one word can change the impact of a provision of a law or of a court decision. Laws have exceptions and special cases. Any reader who needs precise information about how a law applies in a particular case should consult an attorney or read the full text of laws, court decisions, and legal analysis.

Class Activities

The course I designed in the Computer Science Department at San Diego State Uni- versity requires a book report, a term paper, and an oral presentation by each student. Students do several presentations, debates, and mock trials in class. The students are very

� Quoted in Jeannette DeWyze, “When You Don’t Know How to Turn On Your Radio, Don Norman Is On Your Side,” The San Diego Reader , Dec. 1, 1994, p. 1.

Preface xvii

enthusiastic about these activities. I include several in the Exercises sections, marked as Class Discussion Exercises. Although I selected some exercises for this category, I find that many others in the General Exercises sections are also good for lively class discussions.

It has been an extraordinary pleasure to teach this course. At the beginning of each semester, some students expect boredom or sermons. By the end, most say they have found it eye-opening and important. They’ve seen and appreciated new arguments, and they understand more about the risks of computer technology and their own responsibilities. Many students send me news reports about issues in the course long after the semester is over, sometimes after they have graduated and are working in the field.

Additional Sources

The notes at the ends of the chapters include sources for specific information in the text and, occasionally, additional information and comment. I usually put one endnote at or near the end of a paragraph with sources for the whole paragraph. In a few places the endnote for a section is on the section heading. (We have checked all the Web addresses, but files move, and inevitably some will not work. Usually a search on the author and a phrase from the title of a document will locate it.) The lists of references at the ends of the chapters include some references that I used, some that I think are particularly useful or interesting for various reasons, and some that you might not find elsewhere. I have made no attempt to be complete.

An italic page number in the index indicates the page on which the index entry is defined or explained. The text often refers to agencies, organizations, and laws by acronyms. If you look up the acronym in the index, you will find its expansion.

My website for this book (www-rohan.sdsu.edu/faculty/giftfire) contains updates on topics in the book and other resources. Pearson Education maintains a website (www .pearsonhighered.com/baase) with supplements for instructors, including PowerPoint slides and a testbank. For access to instructor material, please contact your Pearson Education sales representative or visit the site, where you will find instructions.

Feedback

This book contains a large amount of information on a large variety of subjects. I have tried to be as accurate as possible, but, inevitably, there will be errors. I appreciate corrections. Please send them to me at GiftOfFire@sdsu.edu.

Acknowledgments

I am grateful to many people who provided assistance for this edition: Susan Brown (Florida Atlantic University) for advice about citations; Charles Christopher for regularly sending me legal articles perfectly targeted to topics I am writing about; Mike Gallivan (Georgia State University) for checking the Web addresses in endnotes; Julie Johnson (Vanderbilt University) for research assistance, an exercise, and the scenario and analysis in Section 9.3.4; Patricia A. Joseph (Slippery Rock University) for research assistance and

www-rohan.sdsu.edu/faculty/giftfire
www.pearsonhighered.com/baase
www.pearsonhighered.com/baase
xviii Preface

an exercise; Ellen Kraft (Richard Stockton College) for assisting with research and the revision of Section 7.2; Jean Martinez for lively conversations about privacy, security, and social media; Michelle Matson for conversations about several topics in the book; Jack Revelle for bringing kill switches to my attention and sending me excellent articles; Carol Sanders for reading and improving Chapter 2, finding useful sources, and for many conversations about privacy, security, and social media; Marek A. Suchenek (California State University, Dominguez Hills) for research on software patent history and for email conversations about ethics, intellectual property, and human progress; Sue Smith, Char Glacy, and Michaeleen Trimarchi for their observations about how researchers use the Web; and my birding buddies, who got me out looking at birds once a week instead of at a screen.

I thank the following people for reviewing the third edition at the beginning of this project and providing suggestions for the new edition: Ric Heishman (George Mason University); Starr Suzanne Hiltz (New Jersey Institute of Technology); Jim K. Huggins (Kettering University); Patricia A. Joseph (Slippery Rock University); Tamara Maddox (George Mason University); Robert McIllhenny (California State University, Northridge); Evelyn Lulis (DePaul University); and Marek A. Suchenek (California State University, Dominguez Hills).

This edition includes some material from earlier editions. Thus again, I thank all the people I listed in the prefaces of those editions.

I appreciate the efforts of the staff at Pearson Education who worked on this book: my editor Tracy Johnson, associate editor Carole Snyder, production project manager Kayla Smith-Tarbox, the marketing department, and the people behind the scenes who handle the many tasks that must be done to produce a book. I thank the production team: Paul Anagnostopoulos, Richard Camp, Ted Laux, Jacqui Scarlott, and Priscilla Stevens.

Last but most, I thank Keith Mayers, for assisting with research, managing my software, reading all the chapters, being patient, running errands, finding other things to do while I worked (building a guitar!), and being my sweetheart.

Prologue

Prometheus, according to Greek myth, brought us the gift of fire. It is an awesome gift. It gives us the power to heat our homes, cook our food, and run the machines that make our lives more comfortable, healthy, and enjoyable. It is also awesomely destructive, both by accident and by arson. The Chicago fire in 1871 left 100,000 people homeless. In 1990, the oil fields of Kuwait were intentionally set ablaze. Since the beginning of the 21st century, wildfires in the United States have destroyed millions of acres and thousands of homes. In spite of the risks, in spite of these disasters, few of us would choose to return the gift of fire and live without it. We have learned, gradually, how to use it productively, how to use it safely, and how to respond more effectively to disasters, be they natural, accidental, or intentional.

Computer technology is the most significant new technology since the beginning of the Industrial Revolution. It is awesome technology, with the power to make routine tasks quick, easy, and accurate, to save lives, and to create large amounts of new wealth. It helps us explore space, communicate easily and cheaply, find information, create entertainment, and do thousands of other tasks. As with fire, this power creates powerful problems: potential loss of privacy, multimillion-dollar thefts, and breakdowns of large, complex systems (such as air traffic control systems, communications networks, and banking systems) on which we have come to depend. In this book, we describe some of the remarkable benefits of computer and communication technologies, some of the problems associated with them, and some of the means for reducing the problems and coping with their effects.

This page intentionally left blank

1 Unwrapping the Gift

1.1 The Pace of Change

1.2 Change and Unexpected Developments

1.3 Themes

1.4 Ethics

Exercises

4 Chapter 1 Unwrapping the Gift

1.1 The Pace of Change

In a way not seen since Gutenberg’s printing press that ended the Dark Ages and ignited the Renaissance, the microchip is an epochal technology with unimaginably far-reaching economic, social, and political consequences.

—Michael Rothschild1

In 1804, Meriwether Lewis and William Clark set out on a two-and-a-half-year voyage to explore what is now the western United States. Many more years passed before their journals were published. Later explorers did not know that Lewis and Clark had been there before them. Stephen Ambrose points out in his book about the Lewis and Clark expedition, Undaunted Courage, that information, people, and goods moved no faster than a horse—and this limitation had not changed in thousands of years.2 In 1997, millions of people went to the World Wide Web to watch a robot cart called Sojourner roll across the surface of Mars. We chat with people thousands of miles away, and instantly view Web pages from around the world. We can tweet from airplanes flying more than 500 miles per hour.

Telephones, automobiles, airplanes, radio, household electrical appliances, and many other marvels we take for granted were invented in the late 19th and early 20th centuries. They led to profound changes in how we work and play, how we get information, how we communicate, and how we organize our family lives. Our entry into space was one of the most dramatic feats of technology in the 20th century. Sputnik, the first man-made satellite, launched in 1957. Neil Armstrong walked on the moon in 1969. We still do not have personal spacecraft, vacation trips to the moon, or a large amount of commercial or research activity in space. Space tourism for the very rich is in an early stage. The moon landing has had little direct effect on our daily lives. But computer systems in cars can now apply the brakes if a pedestrian is in the car’s path. Some cars park themselves, and experimental cars drive themselves on city streets. Computer programs beat human experts at chess and Jeopardy!, and our smartphones answer our questions. Surgeons perform surgery with robotic instruments miles from the patient. Roughly five billion people use cellphones; U.S. texters send more than a trillion texts in a year; Facebook has more than 800 million members; Twitter users tweet hundreds of thousands of times a day; and these numbers will be out of date when you read them. A day without using an appliance or device containing a microchip is as rare as a day without turning on an electric light.

The first electronic computers were built in the 1940s. Scientists at Bell Laboratories invented the transistor—a basic component of microprocessors—in 1947. The first hard- disk drive, made by IBM in 1956, weighed more than a ton and stored only five megabytes of data, less than the amount of space we use for one photo. Now, we can walk around

1.1 The Pace of Change 5

with 150 hours of video in a pocket. A disk with a terabyte (one thousand gigabytes, or one trillion bytes) of storage—enough for 250 hours of high definition video—is inexpensive. There are hundreds of billions of gigabytes of information on the Internet. The 1991 space shuttle had a 1-megahertz� computer onboard. Ten years later, some luxury automobiles had 100-megahertz computers. Speeds of several gigahertz are now common. When I started my career as a computer science professor, personal computers had not yet been invented. Computers were large machines in air-conditioned rooms; we typed computer programs onto punched cards. If we wanted to do research, we went to a library, where the library catalog filled racks of trays containing 3 × 5 index cards. Social-networking sites were neighborhood pizza places and bars. The point is not that I am old; it is the speed and magnitude of the changes. The way you use computer systems and mobile devices, personally and professionally, will change substantially in two years, in five, and in ten, and almost unrecognizably over the course of your career. The ubiquity of computers, the rapid pace of change, and their myriad applications and impacts on daily life characterize the last few decades of the 20th century and the beginning of the 21st.

It is not just the technology that changes so fast. Social impacts and controversies morph constantly. With PCs and floppy disks came computer viruses and the beginnings of a huge challenge to the concept of copyright. With email came spam. With increased storage and speed came databases with details about our personal and financial lives. With the Web, browsers, and search engines came easy access by children to pornography, more threats to privacy, and more challenges to copyright. Online commerce brought bargains to consumers, opportunities to entrepreneurs, and identity theft and scams. Cellphones have had so many impacts that we discuss them in more detail later in this chapter and in Chapter 2. With hindsight, it might seem odd that people worried so much about antisocial, anticommunity effects of computers and the early Internet. Now, with the popularity of social networking, texting, and sharing video, photos, and information, the Net is a very social place. In 2008, “experts” worried the Internet would collapse within two years because of the demands of online video. It did not. Privacy threats of concern several years ago seem minor compared to new ones. People worried about how intimidating computers and the Internet were; now toddlers operate apps on tablets and phones. Concerns about technology “haves” and “have-nots” (the “digital divide”) waned as Internet access and cellphones spread throughout the United States and around the world, shrinking the digital divide far faster than long-standing global divides in, say, education and access to fresh water.

Discussions of social issues related to computers often focus on problems, and indeed, throughout this book we examine problems created or intensified by computer technolo- gies. Recognizing the benefits is important too. It is necessary for forming a reasonable, balanced view of the impact and value of the technology. Analyzing and evaluating the

� This is a measure of processing speed. One megahertz is 1 million cycles per second; 1 gigahertz is 1 billion cycles per second. “Hertz” is named for the 19th-century physicist Heinrich Rudolf Hertz.

6 Chapter 1 Unwrapping the Gift

impact of new technologies can be difficult. Some of the changes are obvious. Some are more subtle. Even when benefits are obvious, the costs and side effects might not be, and vice versa. Both the technological advances brought about by computer technology and the extraordinary pace of development have dramatic, sometimes unsettling, im- pacts on people’s lives. To some, this is frightening and disruptive. They see the changes as dehumanizing, reducing the quality of life, or as threats to the status quo and their well- being. Others see challenging and exciting opportunities. To them, the development of the technology is a thrilling and inspiring example of human progress.

When we speak of computers in this book, we include mobile devices such as smartphones and tablets, desktop computers and mainframes, embedded chips that control machines (from sewing machines to oil refineries), entertainment systems (such as video recorders and game machines), and the “Net,” or “cyberspace.” Cyberspace is built of computers (e.g., Web servers), communication devices (wired and wireless), and storage media, but its real meaning is the vast web of communications and information that includes the Internet and more.

In the next section, we look at some phenomena, often unplanned and spontaneous, that computer and communication technology made possible. They have deeply changed how we interact with other people, what we can accomplish, and how others can intrude into our relationships and activities. In the rest of the chapter, we introduce themes that show up often, and we present an introduction to some ethical theories that can help guide our thinking about controversies throughout the rest of the book. The next seven chapters look at ethical, social, and legal issues primarily from the perspective of any person who lives and works in a modern computerized society and is interested in the impact of the technology. The final chapter takes the perspective of someone who works as a computer professional who designs or programs computer systems or as a professional in any area who must make decisions and/or set policy about the use of computer systems. It explores the ethical responsibilities of the professional. The Software Engineering Code of Ethics and Professional Practice and the ACM Code of Ethics and Professional Conduct, in Appendix A, provide guidelines for professionals.

1.2 Change and Unexpected Developments

No one would design a bridge or a large building today without using computers, but the Brooklyn Bridge, built more than 130 years ago—long before computers, is both a work of art and a marvelous feat of engineering. The builders of the Statue of Liberty, the Pyramids, the Roman aqueducts, magnificent cathedrals, and countless other complex structures did not wait for computers. People communicated by letters and telephone before text messages, email, and Twitter. People socialized in person before social-networking sites. Yet we can identify several phenomena resulting from computer

1.2 Change and Unexpected Developments 7

and communication technology that are far different from what preceded them (in degree, if not entirely in kind), several areas where the impacts are dramatic, and many that were unanticipated. In this section, we consider a brief sampling of such phenomena. Some are quite recent. Some are routine parts of our lives now. The point is to remind us that a generation ago they did not exist. They illustrate the amazingly varied uses people find for new tools and technologies.

It is precisely this unique human capacity to transcend the present, to live one’s life by purposes stretching into the future—to live not at the mercy of the world, but as a builder and designer of that world—that is the distinction between human and animal behavior, or between the human being and the machine.

—Betty Friedan3

1.2.1 Connections: Cellphones, Social Networking, and More

The Web, social networking, cellphones, and other electronic devices keep us connected to other people and to information all day, virtually everywhere. We look at a few connectivity applications, focusing on fast changes and unanticipated uses and side effects (good and bad). The discussion suggests issues we study throughout the book.

Cellphones

In the 1990s, relatively few people had cellphones. Business people and sales people who often worked outside their office carried them. High-tech workers and gadget enthusiasts liked them. Others bought the phones so they could make emergency calls if their cars broke down. We were used to being out of touch when away from home or office. We planned ahead and arranged our activities so that we did not need a phone when one was not available. Within a short time, however, cell service improved and prices dropped. Cellphone makers and service providers developed new features and services, adding cameras, video, Web connections, and location detection. Apple introduced the iPhone in 2007, and phones got “smart.” People quickly developed hundreds of thousands of applications and embraced the term app. Consumers downloaded 10 billion apps from Apple’s App Store. Within very few years, people all over the world used phones, rather than PCs or laptops, as their connection to the Internet. Millions, then hundreds of millions, then billions of people started carrying mobile phones. In 2011, there were approximately five billion cellphone subscriptions worldwide—an astoundingly fast spread of a new technology. Writers describe the dramatic changes with observations such as, “A Masai warrior with a smartphone and Google has access to more information than the President did 15 years ago” and “More folks have access to a cellphone than to a toilet.”4

8 Chapter 1 Unwrapping the Gift

Cellphones became a common tool for conversations, messaging, taking pictures, downloading music, checking email, playing games, banking, managing investments, finding a restaurant, tracking friends, watching videos. Smartphones serve as electronic wallets and identification cards at store terminals or security checkpoints. Phones monitor security cameras at home or control home appliances from a distance. Professional people use smartphone apps for a myriad of business tasks. Smartphones with motion detectors remind obese teenagers to get moving. An app analyzes blood glucose levels for diabetics and reminds them when to exercise, take medication, or eat something. Military personnel on the front lines can use specialized apps to download satellite surveillance video and maps. More unanticipated uses include location tracking, sexting, life-saving medical apps, and malicious data-stealing apps. People use cellphones to organize flash mobs for street dances and pillow fights—or for attacking pedestrians and looting stores. Terrorists use cellphones to set off bombs. Apps designed for poor countries inform people when water is available and help perform medical imaging.

These examples suggest the number and variety of unanticipated applications of this one, relatively new “connection” device. The examples also suggest problems. We discuss privacy invasion by data theft and location tracking in Chapter 2. In Chapter 3, we consider whether phone service should be shut down during riots. Is the security of smartphones sufficient for banking and electronic wallets? (What if you lose your phone?) Do people realize that when they synch their phone with other devices, their files become vulnerable at the level of the weakest security?

As a side effect of cellphone use and the sophistication of smartphones, researchers are learning an enormous amount about our behavior. Laws protect the privacy of the content of our conversations, but smartphones log calls and messages and contain devices that detect location, motion, direction, light levels, and other phones nearby. Most owners carry their phones all day. Researchers analyze this trove of sensor data. (Yes, much of it can be stored.) Analysis of the data generates valuable information about traffic congestion, commuting patterns, and the spread of disease. In an example of the latter, by studying movement and communication patterns of MIT students, researchers could detect who had the flu, sometimes before the students knew it themselves. Researchers also can determine which people influence the decisions of others. Advertisers and politicians crave such information. Perhaps the eeriest result is that reseachers who analyzed time and location data from millions of calls said that, with enough data, a mathematical model could predict where someone would be at a particular future time with more than 90% accuracy. Who will have access to that information?5

Rudeness is an issue with cellphones. People use them in inappropriate places, dis- turbing others. The fact that so many people carry small cameras everywhere (mostly in phones, but also hidden in other small objects such as pens�) affects our privacy in public

� At least one company sells a working pen that records high-resolution video.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

ECFX Market
Instant Assignment Writer
Assignments Hut
Assignment Hut
Quick Mentor
Quality Homework Helper
Writer Writer Name Offer Chat
ECFX Market

ONLINE

ECFX Market

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$24 Chat With Writer
Instant Assignment Writer

ONLINE

Instant Assignment Writer

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$16 Chat With Writer
Assignments Hut

ONLINE

Assignments Hut

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$33 Chat With Writer
Assignment Hut

ONLINE

Assignment Hut

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$27 Chat With Writer
Quick Mentor

ONLINE

Quick Mentor

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$35 Chat With Writer
Quality Homework Helper

ONLINE

Quality Homework Helper

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$43 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Acct exam - Predictive Modeling Exercise - Advanced pathophysiology study worksheet - World laparoscopy hospital training - Maryborough correctional centre visiting phone number - Fao who unu 2004 - From the solubility product of zinc ferrocyanide - Target costing case study tata nano - Business and society stakeholders ethics public policy pdf - Ear punch mice identification - In parallelogram pqrs what is pq - Dq 1 - Lewis the gift of promise - The mask we live in discussion questions - Wendy and peter pan script - Http ozline com electraguide thesis php - Annual leave expense journal entry - ASSIGNMENT 6050 M-4 - Warehouse stationery standing desk - Nation to australia's north west - Nursing theories and nursing practice parker pdf - Hoselink 15m retractable hose reel - Intensifying stage of a relationship - Economics & public policy 6e w myeconlab rev - Epictetus discourses fragments handbook pdf - If poem by rudyard kipling meaning - Hedonic calculus 7 factors - Big Data and the Internet of Things - How does airbnb differentiate its offer delivery and image - Group therapy - Interpretative level of comprehension - Museum visit assignment - Financial accounting ifrs 3rd edition solution chapter 3 - Citric acid titration method - WK-5 - City of stirling food permit - Boughton under blean school - Informal paper - Strategic group map craft beer industry - St thomas of canterbury billingham - Plymouth city council staffroom - Misery anton chekhov sparknotes - Sap business processes list - Australian standard as/nas 2918 - Practical Connection Assignment - Advanced Pathophysiology - Guess the sweet quiz - If one worker can assemble 9 products per hour - Discussion Reply- Meghan - Does south korea have homework - Harrow bangkok term dates - Discussion - Glow in the dar - Als iddp case study - Explain why disorders caused by dominant alleles on - Calabash caye field station - Security breach access control - Do food safety assessment answers - Management - International fisher effect equation - Human Resources Management Discussion APA - 561 Week 5 Disease Analysis Paper - Athlean x xero program pdf - Charles bukowski i changed jobs and cities - Chapter 23 consumer rights and responsibilities answers - Fabry perot interferometer ppt - Research for Essay - COMPARE AND CONTRAST THE TWO VERSIONS OF THE STORY OF RAMA AND SITA: THE RAMAYANA AND SITA SINGS THE BLUES - What is the rhyme scheme in the road not taken - The firm's average total cost curve appears in which of the following panels? - Strategic Plan Paper - Sample letter for procurement of materials - Who owns wet n wild sydney - Medgar evers student email format - De anza book buyback - The coddling of the american mind pdf free - What is the product of the following elimination - Organizational culture artifacts values assumptions - Sunpower e20 327 e ac - ENG-102 POETRY ESSAY FIRST DRAFT - Digestive system parts and functions quiz - Case study end of life decisions gcu - Tickets to see katy perry - Grammatical rule of interpretation - Persuasive speech on why college athletes should be paid - Wall street journal redesign - How to cite strengthsfinder assessment - Don t blame the eater they say i say - Year 9 ecology worksheets - Undifferentiated marketing is more suited for _____________ products - Research Paper - How to bypass edexcel login - Reflection paper on death penalty - Finance case study - Insufficient logging and monitoring insufficient logging and monitoring - The first time in forever lyrics - Biztalk 2010 system requirements - Is love a concrete noun - Whitechapel club devil in the white city - Denton company manufactures and sells a single product