Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

What is cybertechnology

27/03/2021 Client: saad24vbs Deadline: 2 Day

What Is Cyberethics?

 Cyberethics is the study of moral, legal, and social issues involving cybertechnology.

 As a field of applied ethics, it:

 examines the impact that cybertechnology has for our social, legal, and moral systems.

 evaluates the social policies and laws that we frame in response to issues generated by the development and use of cybertechnology.

What Is Cybertechnology?

 Cybertechnology refers to a wide range of computing and communications devices

– from standalone computers, to "connected" or networked computing and communications technologies, to the Internet itself.

 Cybertechnologies include (but are not limited to):  digital hand-held devices (including PDSa);

 networked computers (desktops and laptops);

 stand-alone computers.

Cybertechnology (Continued)

 Networked devices can be connected directly to the Internet.

 They also can be connected to other devices through one or more privately owned computer networks.

 Privately owned networks include both:  Local Area Networks (LANs),

 Wide Area Networks (WANs).

Why the term cyberethics?

 Cyberethics is a more accurate label than computer ethics, which can suggest the study of ethical issues limited either to:

 computing machines,

 computing professionals.

 Cyberethics is also more accurate than Internet ethics, which is limited only to ethical issues affecting computer networks.

The Evolution of Cybertechnology and Cyberethics: Four Phases

 Computer technology emerged in the late 1940s, when some analysts confidently predicted that no more than six computers would ever need to be built.

 The first phase of computing technology (1950s and 1960s) consisted mainly of huge mainframe computers that were unconnected (i.e., stand-alone machines).

 One ethical/social question that arose during Phase 1 dealt with the impact of computing machines as “giant brains” and what that meant for being human.

 Another question raised during this phase concerned privacy threats and the fear of Big Brother.

The Evolution of Cybertechnology and Cyberethics (Continued)

 In Phase 2 (1970s and 1980s), computing machines and communications devices began to converge.

 Mainframe computers and personal computers could be linked together via privately owned networks such as LANs and WANs.

 Privacy concerns arose because confidential information could easily be exchanged between networked databases.

 Intellectual property issues emerged because personal computers could easily duplicate proprietary software programs.

 Computer crime was possible because people could break into the computers of large organizations.

The Evolution of Cybertechnology and Cyberethics (Continued)

 During Phase 3 (1990-present), the availability of Internet access to the general public has increased significantly.

 This has been facilitated by the phenomenal growth of the World Wide Web.

 The proliferation of Internet- and Web-based technologies in this phase has raised ethical and social concerns affecting:

 free speech,

 anonymity,

 jurisdiction.

The Evolution of Cybertechnology and Cyberethics (Continued)

 As cybertechnology evolves in Phase 4, computers will likely become more and more a part of who or what we are as human beings.

 James Moor (2005) notes that computing devices will soon be a part of our clothing, and even our bodies.

 Computers are already becoming ubiquitous, and are beginning to “pervade” both our work and recreational environments.

 Objects in these environments already exhibit what Philip Brey (2005) calls “ambient intelligence,” which enables “smart objects” to be connected to one another via wireless technology.

The Evolution of Cybertechnology and Cyberethics (Continued)

 In Phase 4, computers are becoming less visible as distinct entities, as they:  (a) continue to be miniaturized and integrated into

ordinary objects,

 (b) blend unobtrusively into our surroundings.

 Cybertechnology is also becoming less distinguishable from other technologies as boundaries that have previously separated them begin to blur because of convergence.

Table 1-1: Summary of Four

Phases of Cyberethics

Phase Time Period Technological Features Associated Issues

1 1950s-1960s Stand-alone machines (large mainframe computers)

Artificial intelligence (AI), database privacy ("Big Brother")

2 1970s-1980s Minicomputers and PCs interconnected via privately owned networks

Issues from Phase 1 plus concerns involving intellectual property and software piracy, computer crime, privacy and the exchange of records.

3 1990s-Present Internet and World Wide Web Issues from Phases 1 and 2 plus concerns about free speech, anonymity, legal jurisdiction, virtual communities, etc.

4 Present to

Near Future

Convergence of information and communication technologies with nanotechnology research and bioinformatics research, etc.

Issues from Phases 1-3 plus concerns about artificial electronic agents ("bots") with decision-making capabilities, bionic chip implants, nanocomputing research, etc.

Are Any Cyberethics Issues Unique Ethical Issues?

 Consider “The “Washingtonienne” scenario (in the textbook) involving Jessica Cutler.

 The scenario raises several interesting ethical issues – from anonymity expectations to privacy concerns to free speech, etc.

 But are any ethical issues raised in this scenario, or in blogging cases in general, unique ethical issues?

Are Any Cyberethics Issues Unique (Continued)?

 Review the Verizon v. RIAA scenario (described in the textbook) in light of the ethical issues that arise.

 The ethical issues in this scenario include concerns about privacy, anonymity, surveillance, and intellectual property rights.

 Are any of these issues new or unique ethical issues?

Are Any Cyberethics Issues Unique (Continued)?

 Review the Amy Boyer cyberstalking scenario (described in the textbook).

 Is there anything new or unique, from an ethical point of view, about the ethical issues that emerge in this scenario?

 On the one hand, Boyer was stalked in ways that were not possible in the pre-Internet era.

 But are any new or any unique ethical issues generated in this scenario?

Debate about the Uniqueness of Cyberethics Issues (Continued)

 There are two points of view on whether cybertechnology has generated any new or unique ethical issues:  (1) Traditionalists argue that nothing is new –

crime is crime, and murder is murder.

 (2) Uniqueness Proponents argue that cybertechnology has introduced (at least some) new and unique ethical issues that could not have existed before computers.

The Uniqueness Debate (Continued)

 Both sides seem correct on some claims, and both seem to be wrong on others.

 Traditionalists underestimate the role that issues of scale and scope that apply because of the impact of computer technology.  E.g., cyberstalkers can stalk multiple victims

simultaneously (scale) and globally (because of the scope or reach of the Internet).

 Cyberstalkers can also operate without ever having to leave the comfort of their homes.

The Uniqueness Debate (Continued)

 Those who defend the Uniqueness thesis tend to overstate the effect that cybertechnology has on ethics per se.

 Walter Maner (2004) correctly points out that computers are uniquely fast, uniquely malleable, etc.

 So, there may indeed be some unique aspects of computer technology.

The Uniqueness Debate (Continued)

 Proponents of the uniqueness thesis tend to confuse unique features of tcomputer echnology with unique ethical issues.

 Their argument is based on a logical fallacy: Premise. Cybertechnology has some unique technological

features.

Premise. Cybertechnology generates some ethical issues. ___________________________________________________________________________________

Conclusion. (At least some of the) Ethical issues generated by cybertechnology must be unique.

The Uniqueness Debate (Continued)

 Traditionalists and uniqueness advocates are each partly correct.  Traditionalists correctly point out that no new

ethical issues have been introduced by computers.

 Uniqueness proponents are correct in that cybertechnology has complicated our analysis of traditional ethical issues.

The Uniqueness Debate (Continued)

 So we must distinguish between any:  (a) unique technological features;

 (b) (alleged) unique ethical issues.

 Consider two scenarios described in the textbook:  (1) computer professionals designing the software

code for a controversial computer system;

 (2) users making unauthorized copies of software.

Alternative Strategy for Analyzing the Uniqueness Issue

 James Moor (2000) argues that computer technology generates “new possibilities for human action” because computers are logically malleable.  Logical malleability in computers makes possible

new kinds of behavior for humans that introduce policy vacuums.

 Policy vacuums cannot easily be filled because of conceptual muddles.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Buy Coursework Help
Smart Homework Helper
Math Exam Success
Write My Coursework
Instant Assignment Writer
Top Quality Assignments
Writer Writer Name Offer Chat
Buy Coursework Help

ONLINE

Buy Coursework Help

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$20 Chat With Writer
Smart Homework Helper

ONLINE

Smart Homework Helper

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$32 Chat With Writer
Math Exam Success

ONLINE

Math Exam Success

Give me a chance, i will do this with my best efforts

$18 Chat With Writer
Write My Coursework

ONLINE

Write My Coursework

Give me a chance, i will do this with my best efforts

$24 Chat With Writer
Instant Assignment Writer

ONLINE

Instant Assignment Writer

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$32 Chat With Writer
Top Quality Assignments

ONLINE

Top Quality Assignments

Give me a chance, i will do this with my best efforts

$39 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Outcasts united chapter 3 summary - Challenges working with diverse populations - Leslie manookian con artist new zealand - What is the meaning of all the world's a stage - I’m looking for a tutor online for econimcs - Annotated bibliograpghy - Plant cell rap lyrics - Cell process - Component analysis aba example - Udp wireshark lab solutions - The benefits of change management mgt 362 - Branchcache hosted cache server - Bp texas city report - Advanced persistent threats are ________ - Www bogglesworldesl com 2006 the human digestive system answers - Ergogenic Aids in Sport - Research Paper Part III - Sky chefs inc prepares in flight meals 4000 - Nelson university of northampton - Economy - Ls ayres tea room cookbook - What is the purpose of an allusion - First aid introduction ppt - Mbo blood pressure monitor instructions - What is coefficient in algebra - Speed ratio of pelton wheel - Identifying hazards in occupational environments ati - Lesson 9.3 histograms and boxplots answers - Inclusive language persuasive technique - Rocker bogie suspension system - Ps music continuing problem answers - Oracle eloqua user guide - 3 5 9 17 33 - Andrew jackson indian removal act speech - New brown memorial baptist church red hook - Human Resource Management - Romeo and juliet annotations - Wsus updates needing files - Pamper spoil crossword clue - MG375 Discussion Post 3 - Chemistry Lab - Cultural Deviance and Crime - Can someone help me with Week 2 Assignment in Principle of Marketing? - Social media good or bad argumentative essay - This blood's for you tommy combs - Removing old wallpaper from plaster walls - One point perspective art lesson plan - Sure thing david ives analysis - Hip protector pants canada - Business Math (Inventory development plan) - Shrek test taking strategy - What is an operationalised independent variable - Business assignment - Non diegetic sound synonym - How has an understanding of consumer behavior helped coppertone - Lance h and wanda b dean - Software solutions - Castle clash talent priority list - Estee lauder presidential management associate salary - How to write a soap note for nurse practitioners - Trapped in america's safety net sparknotes - Analyzing managerial decisions ebay com - Palindrome computer science - Whitman edu virtual pig dissection - QUIZ - Brenda patton was admitted to labor and delivery - Mass media ethics case studies - Programming - Add new server to dfs replication group - Burger king application questionnaire answers - 14 jenkins avenue myrtle bank - What part of poetry can be compared to paragraphs - Careers at murdoch university dubai - Exponent in vba - Your landscaping company can lease a truck for - Psalm 133 commentary david guzik - Social engineering amazon refund - Volk superfield vs 90d - The sentinel arthur c clarke analysis - The cask of amontillado mla citation - Alternate ending for romeo and juliet - Threat model data flow diagram - Martin brundle mercedes 190e cosworth - Cassowary plum life cycle - Four square writing template - Chp 4 HR - Calculate formal charge on each oxygen atom in ozone - How much for 7 stuff - Introduction to management accounting assignment - Can physical therapists accept gifts from patients - Need monday - Tweet history by date - Domenic maisto wanted in ohio - Amp flexible super contact - How to recover from emergency loan capsim - Pcib in ms project - Technology mandatory units of work - Literature Review : Divorce - Logos in jfk inaugural address - R v hallett 1969