Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

What is cybertechnology

27/03/2021 Client: saad24vbs Deadline: 2 Day

What Is Cyberethics?

 Cyberethics is the study of moral, legal, and social issues involving cybertechnology.

 As a field of applied ethics, it:

 examines the impact that cybertechnology has for our social, legal, and moral systems.

 evaluates the social policies and laws that we frame in response to issues generated by the development and use of cybertechnology.

What Is Cybertechnology?

 Cybertechnology refers to a wide range of computing and communications devices

– from standalone computers, to "connected" or networked computing and communications technologies, to the Internet itself.

 Cybertechnologies include (but are not limited to):  digital hand-held devices (including PDSa);

 networked computers (desktops and laptops);

 stand-alone computers.

Cybertechnology (Continued)

 Networked devices can be connected directly to the Internet.

 They also can be connected to other devices through one or more privately owned computer networks.

 Privately owned networks include both:  Local Area Networks (LANs),

 Wide Area Networks (WANs).

Why the term cyberethics?

 Cyberethics is a more accurate label than computer ethics, which can suggest the study of ethical issues limited either to:

 computing machines,

 computing professionals.

 Cyberethics is also more accurate than Internet ethics, which is limited only to ethical issues affecting computer networks.

The Evolution of Cybertechnology and Cyberethics: Four Phases

 Computer technology emerged in the late 1940s, when some analysts confidently predicted that no more than six computers would ever need to be built.

 The first phase of computing technology (1950s and 1960s) consisted mainly of huge mainframe computers that were unconnected (i.e., stand-alone machines).

 One ethical/social question that arose during Phase 1 dealt with the impact of computing machines as “giant brains” and what that meant for being human.

 Another question raised during this phase concerned privacy threats and the fear of Big Brother.

The Evolution of Cybertechnology and Cyberethics (Continued)

 In Phase 2 (1970s and 1980s), computing machines and communications devices began to converge.

 Mainframe computers and personal computers could be linked together via privately owned networks such as LANs and WANs.

 Privacy concerns arose because confidential information could easily be exchanged between networked databases.

 Intellectual property issues emerged because personal computers could easily duplicate proprietary software programs.

 Computer crime was possible because people could break into the computers of large organizations.

The Evolution of Cybertechnology and Cyberethics (Continued)

 During Phase 3 (1990-present), the availability of Internet access to the general public has increased significantly.

 This has been facilitated by the phenomenal growth of the World Wide Web.

 The proliferation of Internet- and Web-based technologies in this phase has raised ethical and social concerns affecting:

 free speech,

 anonymity,

 jurisdiction.

The Evolution of Cybertechnology and Cyberethics (Continued)

 As cybertechnology evolves in Phase 4, computers will likely become more and more a part of who or what we are as human beings.

 James Moor (2005) notes that computing devices will soon be a part of our clothing, and even our bodies.

 Computers are already becoming ubiquitous, and are beginning to “pervade” both our work and recreational environments.

 Objects in these environments already exhibit what Philip Brey (2005) calls “ambient intelligence,” which enables “smart objects” to be connected to one another via wireless technology.

The Evolution of Cybertechnology and Cyberethics (Continued)

 In Phase 4, computers are becoming less visible as distinct entities, as they:  (a) continue to be miniaturized and integrated into

ordinary objects,

 (b) blend unobtrusively into our surroundings.

 Cybertechnology is also becoming less distinguishable from other technologies as boundaries that have previously separated them begin to blur because of convergence.

Table 1-1: Summary of Four

Phases of Cyberethics

Phase Time Period Technological Features Associated Issues

1 1950s-1960s Stand-alone machines (large mainframe computers)

Artificial intelligence (AI), database privacy ("Big Brother")

2 1970s-1980s Minicomputers and PCs interconnected via privately owned networks

Issues from Phase 1 plus concerns involving intellectual property and software piracy, computer crime, privacy and the exchange of records.

3 1990s-Present Internet and World Wide Web Issues from Phases 1 and 2 plus concerns about free speech, anonymity, legal jurisdiction, virtual communities, etc.

4 Present to

Near Future

Convergence of information and communication technologies with nanotechnology research and bioinformatics research, etc.

Issues from Phases 1-3 plus concerns about artificial electronic agents ("bots") with decision-making capabilities, bionic chip implants, nanocomputing research, etc.

Are Any Cyberethics Issues Unique Ethical Issues?

 Consider “The “Washingtonienne” scenario (in the textbook) involving Jessica Cutler.

 The scenario raises several interesting ethical issues – from anonymity expectations to privacy concerns to free speech, etc.

 But are any ethical issues raised in this scenario, or in blogging cases in general, unique ethical issues?

Are Any Cyberethics Issues Unique (Continued)?

 Review the Verizon v. RIAA scenario (described in the textbook) in light of the ethical issues that arise.

 The ethical issues in this scenario include concerns about privacy, anonymity, surveillance, and intellectual property rights.

 Are any of these issues new or unique ethical issues?

Are Any Cyberethics Issues Unique (Continued)?

 Review the Amy Boyer cyberstalking scenario (described in the textbook).

 Is there anything new or unique, from an ethical point of view, about the ethical issues that emerge in this scenario?

 On the one hand, Boyer was stalked in ways that were not possible in the pre-Internet era.

 But are any new or any unique ethical issues generated in this scenario?

Debate about the Uniqueness of Cyberethics Issues (Continued)

 There are two points of view on whether cybertechnology has generated any new or unique ethical issues:  (1) Traditionalists argue that nothing is new –

crime is crime, and murder is murder.

 (2) Uniqueness Proponents argue that cybertechnology has introduced (at least some) new and unique ethical issues that could not have existed before computers.

The Uniqueness Debate (Continued)

 Both sides seem correct on some claims, and both seem to be wrong on others.

 Traditionalists underestimate the role that issues of scale and scope that apply because of the impact of computer technology.  E.g., cyberstalkers can stalk multiple victims

simultaneously (scale) and globally (because of the scope or reach of the Internet).

 Cyberstalkers can also operate without ever having to leave the comfort of their homes.

The Uniqueness Debate (Continued)

 Those who defend the Uniqueness thesis tend to overstate the effect that cybertechnology has on ethics per se.

 Walter Maner (2004) correctly points out that computers are uniquely fast, uniquely malleable, etc.

 So, there may indeed be some unique aspects of computer technology.

The Uniqueness Debate (Continued)

 Proponents of the uniqueness thesis tend to confuse unique features of tcomputer echnology with unique ethical issues.

 Their argument is based on a logical fallacy: Premise. Cybertechnology has some unique technological

features.

Premise. Cybertechnology generates some ethical issues. ___________________________________________________________________________________

Conclusion. (At least some of the) Ethical issues generated by cybertechnology must be unique.

The Uniqueness Debate (Continued)

 Traditionalists and uniqueness advocates are each partly correct.  Traditionalists correctly point out that no new

ethical issues have been introduced by computers.

 Uniqueness proponents are correct in that cybertechnology has complicated our analysis of traditional ethical issues.

The Uniqueness Debate (Continued)

 So we must distinguish between any:  (a) unique technological features;

 (b) (alleged) unique ethical issues.

 Consider two scenarios described in the textbook:  (1) computer professionals designing the software

code for a controversial computer system;

 (2) users making unauthorized copies of software.

Alternative Strategy for Analyzing the Uniqueness Issue

 James Moor (2000) argues that computer technology generates “new possibilities for human action” because computers are logically malleable.  Logical malleability in computers makes possible

new kinds of behavior for humans that introduce policy vacuums.

 Policy vacuums cannot easily be filled because of conceptual muddles.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Buy Coursework Help
Smart Homework Helper
Math Exam Success
Write My Coursework
Instant Assignment Writer
Top Quality Assignments
Writer Writer Name Offer Chat
Buy Coursework Help

ONLINE

Buy Coursework Help

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$20 Chat With Writer
Smart Homework Helper

ONLINE

Smart Homework Helper

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$32 Chat With Writer
Math Exam Success

ONLINE

Math Exam Success

Give me a chance, i will do this with my best efforts

$18 Chat With Writer
Write My Coursework

ONLINE

Write My Coursework

Give me a chance, i will do this with my best efforts

$24 Chat With Writer
Instant Assignment Writer

ONLINE

Instant Assignment Writer

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$32 Chat With Writer
Top Quality Assignments

ONLINE

Top Quality Assignments

Give me a chance, i will do this with my best efforts

$39 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Goodnight mister tom characters - Desktopx 3.5 scenario colossus 3g - Discussion - Qsps dh 1 60 - Country racing victoria board members - Marketing and Reception Paper - Week 5 Discussion Forum: Peer Review For Cultural And Ethical Perspective Inquiry Draft - In which sea has connell set ship trap island - Week-10 assignment cpm - Bbc bitesize latin gcse - The dog ate my homework and other tales of woe - Capella university marriage and family therapy - Global strategy matrix - Vito bertoni moda round slide rail - Sarah palin is a cunt - 3 good things exercise - Dance moms dvd jb hi fi - Rmit daily health declaration - Abbott point of care clew update - Stickleback evolution lab quiz answers - X 2 y 2 expand - Picot paper example - The sneetches and other stories - Acid and base titration - Hispanic Adolescents Overweight - Corporate finance cases and solutions - Internal alignment compensation - What is 7 12 equivalent to - Worldview Analysis and Personal Inventory - Importance of Becoming a Global Citizen - AC/FI D4 - Data gathering techniques homework answers - Acra gov sg bizfile - Predicate logic proof exercises - The goal book eliyahu m goldratt - Interaction design 5th edition pdf - Health promotion in nursing practice 6th ed - What is the value of simple staining - 3 PARAGRAPHS DIALOGIC THEORY OF PUBLIC SPEAKING? EXPLAIN WHAT YOU UNDERSTAND ABOUT IT. IN YOUR OWN WORDS SHARE WHAT YOU HAVE LEARNED ABOUT THIS THEORY. WHY DO YOU THINK THIS THEORY COULD BE CONSIDERED THE CORNERSTONE TO OUR APPROACH TO PUBLIC SPEAKIN - A streetcar named desire summary scene 4 - Need help - Shulton company history - 1.16 unit test arguments and speeches part 1 - What are hieroglyphics 1 point - The corporate form of ownership has a significant advantage in that: - Kcl hr digital services login - Gre pipe jointing methods - Comparative analysis of financial statements project - How to make a pool game in java - Honda cub owners club uk - Drawing lewis dot structures worksheet - Can you predict a double pendulum - Challenges faced by small companies to create an efficient job classification system in which they can compete with other larger companies to attract, recruit, and retain highly talented employees. - I NEED THIS DONE ASAP!!! I AM A EDU MAJOR SO IT WILL NEE TO COME FROM A EDUCATIONAL CHAPTER!!!! PLEASE NO PLAGIARISM - ER patient assessment and clinical log for MSN - Fantastic mr fox illustrations - Department of education caps documents - Las playas de isla del sol son muy limpias - Er diagram in visual paradigm - Abu hassan alshari bin yahaya - How to dispose of formocresol - Kings cross parking permit - Phi 208 week 1 assignment - Capsim - The gatekeeper a case study in the selection of news - What to do with a history degree besides teach - Importance of brundtland commission report - Agl com au nswseniors - On a data flow diagram you may - Micrologic 6.0 e manual - Number of hotmail users - Ansi y32 2 ieee std 315 - 4 scholarly sources 300 word count - Cvp analysis exercises answers - Asce journal paper format - Soil moisture budget a level geography - The lost man chapter summary - Bose institute of nuclear physics - Daikin field settings table brc1e62 - Euler path and circuit examples - Three step writing process for persuasive messages - Electrical pre apprenticeship perth - Sap netweaver 7.5 installation steps with screenshots - Grant application form template word - Discussion - Learning outside the classroom manifesto summary - How to work consistently - War debris could cause cancer reading answers - Light organic solvent preservative - What does html stand for - Common investment banking questions - All my sons thesis statement - Dr phil dream interpretation quiz - Dorothea orem self care theory - Positive child guidance 7th edition - Why isnt days before rodeo on spotify - Chewing on tinfoil forty shades of grey lyrics - Management contract hotel example - What does candy hopefully ask george - Order of operations with brackets and braces worksheet