Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

What is cybertechnology

27/03/2021 Client: saad24vbs Deadline: 2 Day

What Is Cyberethics?

 Cyberethics is the study of moral, legal, and social issues involving cybertechnology.

 As a field of applied ethics, it:

 examines the impact that cybertechnology has for our social, legal, and moral systems.

 evaluates the social policies and laws that we frame in response to issues generated by the development and use of cybertechnology.

What Is Cybertechnology?

 Cybertechnology refers to a wide range of computing and communications devices

– from standalone computers, to "connected" or networked computing and communications technologies, to the Internet itself.

 Cybertechnologies include (but are not limited to):  digital hand-held devices (including PDSa);

 networked computers (desktops and laptops);

 stand-alone computers.

Cybertechnology (Continued)

 Networked devices can be connected directly to the Internet.

 They also can be connected to other devices through one or more privately owned computer networks.

 Privately owned networks include both:  Local Area Networks (LANs),

 Wide Area Networks (WANs).

Why the term cyberethics?

 Cyberethics is a more accurate label than computer ethics, which can suggest the study of ethical issues limited either to:

 computing machines,

 computing professionals.

 Cyberethics is also more accurate than Internet ethics, which is limited only to ethical issues affecting computer networks.

The Evolution of Cybertechnology and Cyberethics: Four Phases

 Computer technology emerged in the late 1940s, when some analysts confidently predicted that no more than six computers would ever need to be built.

 The first phase of computing technology (1950s and 1960s) consisted mainly of huge mainframe computers that were unconnected (i.e., stand-alone machines).

 One ethical/social question that arose during Phase 1 dealt with the impact of computing machines as “giant brains” and what that meant for being human.

 Another question raised during this phase concerned privacy threats and the fear of Big Brother.

The Evolution of Cybertechnology and Cyberethics (Continued)

 In Phase 2 (1970s and 1980s), computing machines and communications devices began to converge.

 Mainframe computers and personal computers could be linked together via privately owned networks such as LANs and WANs.

 Privacy concerns arose because confidential information could easily be exchanged between networked databases.

 Intellectual property issues emerged because personal computers could easily duplicate proprietary software programs.

 Computer crime was possible because people could break into the computers of large organizations.

The Evolution of Cybertechnology and Cyberethics (Continued)

 During Phase 3 (1990-present), the availability of Internet access to the general public has increased significantly.

 This has been facilitated by the phenomenal growth of the World Wide Web.

 The proliferation of Internet- and Web-based technologies in this phase has raised ethical and social concerns affecting:

 free speech,

 anonymity,

 jurisdiction.

The Evolution of Cybertechnology and Cyberethics (Continued)

 As cybertechnology evolves in Phase 4, computers will likely become more and more a part of who or what we are as human beings.

 James Moor (2005) notes that computing devices will soon be a part of our clothing, and even our bodies.

 Computers are already becoming ubiquitous, and are beginning to “pervade” both our work and recreational environments.

 Objects in these environments already exhibit what Philip Brey (2005) calls “ambient intelligence,” which enables “smart objects” to be connected to one another via wireless technology.

The Evolution of Cybertechnology and Cyberethics (Continued)

 In Phase 4, computers are becoming less visible as distinct entities, as they:  (a) continue to be miniaturized and integrated into

ordinary objects,

 (b) blend unobtrusively into our surroundings.

 Cybertechnology is also becoming less distinguishable from other technologies as boundaries that have previously separated them begin to blur because of convergence.

Table 1-1: Summary of Four

Phases of Cyberethics

Phase Time Period Technological Features Associated Issues

1 1950s-1960s Stand-alone machines (large mainframe computers)

Artificial intelligence (AI), database privacy ("Big Brother")

2 1970s-1980s Minicomputers and PCs interconnected via privately owned networks

Issues from Phase 1 plus concerns involving intellectual property and software piracy, computer crime, privacy and the exchange of records.

3 1990s-Present Internet and World Wide Web Issues from Phases 1 and 2 plus concerns about free speech, anonymity, legal jurisdiction, virtual communities, etc.

4 Present to

Near Future

Convergence of information and communication technologies with nanotechnology research and bioinformatics research, etc.

Issues from Phases 1-3 plus concerns about artificial electronic agents ("bots") with decision-making capabilities, bionic chip implants, nanocomputing research, etc.

Are Any Cyberethics Issues Unique Ethical Issues?

 Consider “The “Washingtonienne” scenario (in the textbook) involving Jessica Cutler.

 The scenario raises several interesting ethical issues – from anonymity expectations to privacy concerns to free speech, etc.

 But are any ethical issues raised in this scenario, or in blogging cases in general, unique ethical issues?

Are Any Cyberethics Issues Unique (Continued)?

 Review the Verizon v. RIAA scenario (described in the textbook) in light of the ethical issues that arise.

 The ethical issues in this scenario include concerns about privacy, anonymity, surveillance, and intellectual property rights.

 Are any of these issues new or unique ethical issues?

Are Any Cyberethics Issues Unique (Continued)?

 Review the Amy Boyer cyberstalking scenario (described in the textbook).

 Is there anything new or unique, from an ethical point of view, about the ethical issues that emerge in this scenario?

 On the one hand, Boyer was stalked in ways that were not possible in the pre-Internet era.

 But are any new or any unique ethical issues generated in this scenario?

Debate about the Uniqueness of Cyberethics Issues (Continued)

 There are two points of view on whether cybertechnology has generated any new or unique ethical issues:  (1) Traditionalists argue that nothing is new –

crime is crime, and murder is murder.

 (2) Uniqueness Proponents argue that cybertechnology has introduced (at least some) new and unique ethical issues that could not have existed before computers.

The Uniqueness Debate (Continued)

 Both sides seem correct on some claims, and both seem to be wrong on others.

 Traditionalists underestimate the role that issues of scale and scope that apply because of the impact of computer technology.  E.g., cyberstalkers can stalk multiple victims

simultaneously (scale) and globally (because of the scope or reach of the Internet).

 Cyberstalkers can also operate without ever having to leave the comfort of their homes.

The Uniqueness Debate (Continued)

 Those who defend the Uniqueness thesis tend to overstate the effect that cybertechnology has on ethics per se.

 Walter Maner (2004) correctly points out that computers are uniquely fast, uniquely malleable, etc.

 So, there may indeed be some unique aspects of computer technology.

The Uniqueness Debate (Continued)

 Proponents of the uniqueness thesis tend to confuse unique features of tcomputer echnology with unique ethical issues.

 Their argument is based on a logical fallacy: Premise. Cybertechnology has some unique technological

features.

Premise. Cybertechnology generates some ethical issues. ___________________________________________________________________________________

Conclusion. (At least some of the) Ethical issues generated by cybertechnology must be unique.

The Uniqueness Debate (Continued)

 Traditionalists and uniqueness advocates are each partly correct.  Traditionalists correctly point out that no new

ethical issues have been introduced by computers.

 Uniqueness proponents are correct in that cybertechnology has complicated our analysis of traditional ethical issues.

The Uniqueness Debate (Continued)

 So we must distinguish between any:  (a) unique technological features;

 (b) (alleged) unique ethical issues.

 Consider two scenarios described in the textbook:  (1) computer professionals designing the software

code for a controversial computer system;

 (2) users making unauthorized copies of software.

Alternative Strategy for Analyzing the Uniqueness Issue

 James Moor (2000) argues that computer technology generates “new possibilities for human action” because computers are logically malleable.  Logical malleability in computers makes possible

new kinds of behavior for humans that introduce policy vacuums.

 Policy vacuums cannot easily be filled because of conceptual muddles.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Buy Coursework Help
Smart Homework Helper
Math Exam Success
Write My Coursework
Instant Assignment Writer
Top Quality Assignments
Writer Writer Name Offer Chat
Buy Coursework Help

ONLINE

Buy Coursework Help

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$20 Chat With Writer
Smart Homework Helper

ONLINE

Smart Homework Helper

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$32 Chat With Writer
Math Exam Success

ONLINE

Math Exam Success

Give me a chance, i will do this with my best efforts

$18 Chat With Writer
Write My Coursework

ONLINE

Write My Coursework

Give me a chance, i will do this with my best efforts

$24 Chat With Writer
Instant Assignment Writer

ONLINE

Instant Assignment Writer

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$32 Chat With Writer
Top Quality Assignments

ONLINE

Top Quality Assignments

Give me a chance, i will do this with my best efforts

$39 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

What happens in the cask of amontillado - Toms shoes revenue 2014 - My favorite tv show essay example - Gomalco - Instrumental and expressive roles - Example of charging by contact - Farlingaye 6th form open evening - Limit process to find area under curve - Black velvet line dance - Ethics of environmental health profession - Dob in a tax cheat - Discussion. ale - Sans top 20 critical security controls pdf - For my mind misgives - Three springs in series - English Outline - In order to recognize the interrelationship between financing and investments - Calculate the five profitability ratios listed above for adrian express - Shpx railcar outage table - Baking soda and vinegar limiting reactant lab answers - Please read the case and answer the questions below. Your submission should be about 3-4 pages (double-spaced). Please use only the information in the case to complete this assignment. - Abhimanyu jindal crime patrol - Characteristics of polynomial functions worksheet - Both adaptive and perfective maintenance activities decrease in a dynamic business environment. - English - Pcb pool beta layout - Staunton harold sailing club - Integration by parts practice worksheet - Final Project paper - Camp millowski - Looking for a writer to complete now - Quiz 4 - Which of the following statements is true about scarcity - Se habla espanol by tanya barrientos - Reflective paper - The communication process involves all of the following except - Quotes about australian identity - Drowning ruth book club questions - Bad back posture homework - Https www youtube com watch v bink6r1wy78 - Plastic snap hook design - Comprehensive problem 2 accounting - Which statement is true concerning custom filters in ftk - Causes of ards mnemonic - Distorted evidence definition - Permutations and combinations in excel - Can you say what your strategy is - Systems understanding aid solutions 9th edition - Binomial expansion with fractions - MARISSA JONES ONLY!!!! - Education Assistance - Mcgraw hill connect plus - Need four slides for a group powerpoint. Please see attachment for templet - Bolman and deal apa citation - University of kent careers - Who stole the golden fleece - Splitting field of irreducible polynomial - The light of the plaza engraves the time smash ultimate - Mt 7 - Steps to analyzing a poem - Paddy killer textile artist - Swot analysis of hong kong disneyland - Unimelb confirmation of enrolment - Differential analysis the key to decision making - Chrome-extension //mhjfbmdgcfjbbpaeojofohoefgiehjai/index.html - Sap mm process flow - Stephen king why we crave horror - Graduate entry medicine warwick - Mi abuela se jubiló y se mudó (moved) a viña del mar - The last human stranger - Quotes by king george the third - Apa 6th referencing acu - Sap solution manager test suite training - Thio free perm kit - What effect does inclusive language have on the reader - Anderson plug solder or crimp - Media ethics issues and cases 9th edition pdf free - MENTAL ASSESSMENT - My contraband - Economic - Discussion Board Chapter 11 - Size 4 us baby shoes age - Cost accounting 14th edition - Fan letter to idol - Ageless multi collagen reviews - Python homework sheet 1 answers - Citizenship ceremony brimbank city council - Public health - Qbcc mechanical plumbing licence - How do you measure success essay - Essay Questions - Does history repeat itself evidence from the course - Important scenes in v for vendetta - Finger lickin good trademark - 32 sunnyside ave point clare - Week 9 discussion Board - Middle school density problems - Assignment - Application of Concepts from Caring Science (Watson’s Caring Theory as a guide for practice). - Objectives of teaching pronunciation - Doing media research an introduction