Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

What is cybertechnology

27/03/2021 Client: saad24vbs Deadline: 2 Day

What Is Cyberethics?

 Cyberethics is the study of moral, legal, and social issues involving cybertechnology.

 As a field of applied ethics, it:

 examines the impact that cybertechnology has for our social, legal, and moral systems.

 evaluates the social policies and laws that we frame in response to issues generated by the development and use of cybertechnology.

What Is Cybertechnology?

 Cybertechnology refers to a wide range of computing and communications devices

– from standalone computers, to "connected" or networked computing and communications technologies, to the Internet itself.

 Cybertechnologies include (but are not limited to):  digital hand-held devices (including PDSa);

 networked computers (desktops and laptops);

 stand-alone computers.

Cybertechnology (Continued)

 Networked devices can be connected directly to the Internet.

 They also can be connected to other devices through one or more privately owned computer networks.

 Privately owned networks include both:  Local Area Networks (LANs),

 Wide Area Networks (WANs).

Why the term cyberethics?

 Cyberethics is a more accurate label than computer ethics, which can suggest the study of ethical issues limited either to:

 computing machines,

 computing professionals.

 Cyberethics is also more accurate than Internet ethics, which is limited only to ethical issues affecting computer networks.

The Evolution of Cybertechnology and Cyberethics: Four Phases

 Computer technology emerged in the late 1940s, when some analysts confidently predicted that no more than six computers would ever need to be built.

 The first phase of computing technology (1950s and 1960s) consisted mainly of huge mainframe computers that were unconnected (i.e., stand-alone machines).

 One ethical/social question that arose during Phase 1 dealt with the impact of computing machines as “giant brains” and what that meant for being human.

 Another question raised during this phase concerned privacy threats and the fear of Big Brother.

The Evolution of Cybertechnology and Cyberethics (Continued)

 In Phase 2 (1970s and 1980s), computing machines and communications devices began to converge.

 Mainframe computers and personal computers could be linked together via privately owned networks such as LANs and WANs.

 Privacy concerns arose because confidential information could easily be exchanged between networked databases.

 Intellectual property issues emerged because personal computers could easily duplicate proprietary software programs.

 Computer crime was possible because people could break into the computers of large organizations.

The Evolution of Cybertechnology and Cyberethics (Continued)

 During Phase 3 (1990-present), the availability of Internet access to the general public has increased significantly.

 This has been facilitated by the phenomenal growth of the World Wide Web.

 The proliferation of Internet- and Web-based technologies in this phase has raised ethical and social concerns affecting:

 free speech,

 anonymity,

 jurisdiction.

The Evolution of Cybertechnology and Cyberethics (Continued)

 As cybertechnology evolves in Phase 4, computers will likely become more and more a part of who or what we are as human beings.

 James Moor (2005) notes that computing devices will soon be a part of our clothing, and even our bodies.

 Computers are already becoming ubiquitous, and are beginning to “pervade” both our work and recreational environments.

 Objects in these environments already exhibit what Philip Brey (2005) calls “ambient intelligence,” which enables “smart objects” to be connected to one another via wireless technology.

The Evolution of Cybertechnology and Cyberethics (Continued)

 In Phase 4, computers are becoming less visible as distinct entities, as they:  (a) continue to be miniaturized and integrated into

ordinary objects,

 (b) blend unobtrusively into our surroundings.

 Cybertechnology is also becoming less distinguishable from other technologies as boundaries that have previously separated them begin to blur because of convergence.

Table 1-1: Summary of Four

Phases of Cyberethics

Phase Time Period Technological Features Associated Issues

1 1950s-1960s Stand-alone machines (large mainframe computers)

Artificial intelligence (AI), database privacy ("Big Brother")

2 1970s-1980s Minicomputers and PCs interconnected via privately owned networks

Issues from Phase 1 plus concerns involving intellectual property and software piracy, computer crime, privacy and the exchange of records.

3 1990s-Present Internet and World Wide Web Issues from Phases 1 and 2 plus concerns about free speech, anonymity, legal jurisdiction, virtual communities, etc.

4 Present to

Near Future

Convergence of information and communication technologies with nanotechnology research and bioinformatics research, etc.

Issues from Phases 1-3 plus concerns about artificial electronic agents ("bots") with decision-making capabilities, bionic chip implants, nanocomputing research, etc.

Are Any Cyberethics Issues Unique Ethical Issues?

 Consider “The “Washingtonienne” scenario (in the textbook) involving Jessica Cutler.

 The scenario raises several interesting ethical issues – from anonymity expectations to privacy concerns to free speech, etc.

 But are any ethical issues raised in this scenario, or in blogging cases in general, unique ethical issues?

Are Any Cyberethics Issues Unique (Continued)?

 Review the Verizon v. RIAA scenario (described in the textbook) in light of the ethical issues that arise.

 The ethical issues in this scenario include concerns about privacy, anonymity, surveillance, and intellectual property rights.

 Are any of these issues new or unique ethical issues?

Are Any Cyberethics Issues Unique (Continued)?

 Review the Amy Boyer cyberstalking scenario (described in the textbook).

 Is there anything new or unique, from an ethical point of view, about the ethical issues that emerge in this scenario?

 On the one hand, Boyer was stalked in ways that were not possible in the pre-Internet era.

 But are any new or any unique ethical issues generated in this scenario?

Debate about the Uniqueness of Cyberethics Issues (Continued)

 There are two points of view on whether cybertechnology has generated any new or unique ethical issues:  (1) Traditionalists argue that nothing is new –

crime is crime, and murder is murder.

 (2) Uniqueness Proponents argue that cybertechnology has introduced (at least some) new and unique ethical issues that could not have existed before computers.

The Uniqueness Debate (Continued)

 Both sides seem correct on some claims, and both seem to be wrong on others.

 Traditionalists underestimate the role that issues of scale and scope that apply because of the impact of computer technology.  E.g., cyberstalkers can stalk multiple victims

simultaneously (scale) and globally (because of the scope or reach of the Internet).

 Cyberstalkers can also operate without ever having to leave the comfort of their homes.

The Uniqueness Debate (Continued)

 Those who defend the Uniqueness thesis tend to overstate the effect that cybertechnology has on ethics per se.

 Walter Maner (2004) correctly points out that computers are uniquely fast, uniquely malleable, etc.

 So, there may indeed be some unique aspects of computer technology.

The Uniqueness Debate (Continued)

 Proponents of the uniqueness thesis tend to confuse unique features of tcomputer echnology with unique ethical issues.

 Their argument is based on a logical fallacy: Premise. Cybertechnology has some unique technological

features.

Premise. Cybertechnology generates some ethical issues. ___________________________________________________________________________________

Conclusion. (At least some of the) Ethical issues generated by cybertechnology must be unique.

The Uniqueness Debate (Continued)

 Traditionalists and uniqueness advocates are each partly correct.  Traditionalists correctly point out that no new

ethical issues have been introduced by computers.

 Uniqueness proponents are correct in that cybertechnology has complicated our analysis of traditional ethical issues.

The Uniqueness Debate (Continued)

 So we must distinguish between any:  (a) unique technological features;

 (b) (alleged) unique ethical issues.

 Consider two scenarios described in the textbook:  (1) computer professionals designing the software

code for a controversial computer system;

 (2) users making unauthorized copies of software.

Alternative Strategy for Analyzing the Uniqueness Issue

 James Moor (2000) argues that computer technology generates “new possibilities for human action” because computers are logically malleable.  Logical malleability in computers makes possible

new kinds of behavior for humans that introduce policy vacuums.

 Policy vacuums cannot easily be filled because of conceptual muddles.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Buy Coursework Help
Smart Homework Helper
Math Exam Success
Write My Coursework
Instant Assignment Writer
Top Quality Assignments
Writer Writer Name Offer Chat
Buy Coursework Help

ONLINE

Buy Coursework Help

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$20 Chat With Writer
Smart Homework Helper

ONLINE

Smart Homework Helper

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$32 Chat With Writer
Math Exam Success

ONLINE

Math Exam Success

Give me a chance, i will do this with my best efforts

$18 Chat With Writer
Write My Coursework

ONLINE

Write My Coursework

Give me a chance, i will do this with my best efforts

$24 Chat With Writer
Instant Assignment Writer

ONLINE

Instant Assignment Writer

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$32 Chat With Writer
Top Quality Assignments

ONLINE

Top Quality Assignments

Give me a chance, i will do this with my best efforts

$39 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Diagnostic Excellence 03 - Lectures on urban economics brueckner exercise solutions - Johnson theory of nursing ppt - Does len cariou have false teeth - ENG 1252 FINAL 1 - Chemistry - MBA 570 - DISCUSSION $7 - 12 angry men organizational behavior - Outline text effect lime accent 3 - How does atticus finch show wisdom - Nemo me impune lacessit pronunciation audio - Grade 0 muscle strength - The magnetic field of a straight current carrying wire is - The United States History Assignment - Case study - Hclo4 naoh neutralization reaction - Folding st andrews cross - Health services management a case study approach - Cillit bang degreaser ingredients - A crane has a cable with a breaking strain - Hairy bikers eve's pudding - I am legend free book - Chatham grammar term dates - Feminist lens in literature - A fan is turned off and its angular - Southampton university lifelong learning - Hilltop hoods exit sign chords - Cell theory graphic organizer answer key - Discuss and identify leader traits and attributes that are most beneficial in implementing the best decisions in an organization. - Be good little migrants poem - Diy tire drag sled - Rules of stage movement - Griffith writing and referencing guide - Apple customer service training manual - 2/59 westbrook street kew east - Canticle of the creatures - Www sric bi com vals survey - If a firm raises capital by selling - Edinburgh napier social sciences - Managerial economics - Capsim final paper - Moses maimonides impact on judaism - Spark plug heat chart - Nursing intervention for fracture - How ferrite beads work - Student Impact Scholarship ESSAY - George j & jones g understanding and managing organizational behavior - Dippy duck letterland story - Quarterly retail e commerce sales - Week 5 discussion - Discussion-13 - Pancakes by joan bauer answers - City of bingham chapter 4 solutions - One rope pulls a barge directly east - Bay leather republic couch - Cdc distracted driving study tradução do texto - Master data services add in for excel - Diffusion experiment potassium permanganate - Homework - Midnight interchange 5.3 by trojan - Checklists and rating scales are used as - How to create an ecomap - How to sanitize owl pellets - Construct viable arguments and critique the reasoning of others - Cloverleaf plc case study answers - Ops 571 week 6 final exam - Usp labs versa 1 review - What is a windshield survey nursing - Human Resource Management: Final Project Milestone Four: Compensating Employees - Woody word monty python - Understanding human behavior and the social environment 11th edition - The history of american fire prevention from 1600 to 2000 - Issuing common shares journal entry - Job postings are effective internal recruitment tools because they - Phet simulations balloons and static electricity answers - Compare independent variables dependent variables and extraneous variables - Crisis intervention strategies 8th edition ebook - Cwv 101 week 2 powerpoint - Biological basis of learning - Which aspect of the following poem might imagists most admire - Social psychology by elliot aronson pdf - Formulate, express, and support individual perspectives on diverse works and issues. - Hindu melodic formula crossword clue - 01.09 macbeth plot analysis quiz - Liu dapeng - Diploma in security and risk management - Helping skills facilitating exploration insight and action 4th edition - Dr aafia siddiqui wikipedia - Discussion question 500 words - Scientist and naval officer grace crossword clue - Zitkala sa impressions of an indian childhood - Potter and perry fundamentals of nursing 9th edition apa citation - Moral/Ethics and human behavior - Comprehensive problem 2 palisade creek co - A Midsummer Night’s Dream Marketing & Casting Design Project - 3d brain model playdough - Clairol touch of yogurt shampoo - Bending and stretching vibrations - 5 layer density tower - James and the giant peach chapter 10