| |
| |
Preface | |
| |
| |
| |
Catalysts for Change | |
| |
| |
| |
Introduction | |
| |
| |
| |
Milestones in Computing | |
| |
| |
| |
Mechanical Adding Machines | |
| |
| |
| |
The Analytical Engine | |
| |
| |
| |
Boolean Algebra | |
| |
| |
| |
Zuse's Z Series | |
| |
| |
| |
Harvard Mark 1 | |
| |
| |
| |
Colossus | |
| |
| |
| |
The Atanasoff-Berry Computer | |
| |
| |
| |
ENIAC (Electronic Numerical Integrator and Computer) | |
| |
| |
| |
Small-Scale Experimental Machine | |
| |
| |
| |
First Commerical Computers | |
| |
| |
| |
Transistor | |
| |
| |
| |
Integrated Circuit | |
| |
| |
| |
IBM System/360 | |
| |
| |
| |
Microprocessor | |
| |
| |
| |
Milestones in Networking | |
| |
| |
| |
Electricity and Electromagnetism | |
| |
| |
| |
Telegraph | |
| |
| |
| |
Telephone | |
| |
| |
| |
Typewriter and Teletype | |
| |
| |
| |
Radio | |
| |
| |
| |
Television | |
| |
| |
| |
Remote Computing | |
| |
| |
| |
ARPANET | |
| |
| |
| |
Email | |
| |
| |
| |
Internet | |
| |
| |
| |
NSFNET | |
| |
| |
| |
Broadband | |
| |
| |
| |
Milestones in Information Storage and Retrieval | |
| |
| |
| |
Codex | |
| |
| |
| |
Gutenberg's Printing Press | |
| |
| |
| |
Newspapers | |
| |
| |
| |
Hypertext | |
| |
| |
| |
Personal Computers | |
| |
| |
| |
Single-Computer Hypertext Systems | |
| |
| |
| |
Networked Hypertext: World Wide Web | |
| |
| |
| |
Search Engines | |
| |
| |
| |
Information Technology Issues | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
Discussion Questions | |
| |
| |
In-Class Exercises | |
| |
| |
Further Reading | |
| |
| |
References | |
| |
| |
An Interview with Douglas Engelbart | |
| |
| |
| |
Introduction to Ethics | |
| |
| |
| |
Introduction | |
| |
| |
| |
Defining Terms | |
| |
| |
| |
Four Scenarios | |
| |
| |
| |
Overview of Ethical Theories | |
| |
| |
| |
Subjective Relativism | |
| |
| |
| |
The Case for Subjective Relativism | |
| |
| |
| |
The Case against Subjective Relativism | |
| |
| |
| |
Cultural Relativism | |
| |
| |
| |
The Case for Cultural Relativism | |
| |
| |
| |
The Case against Cultural Relativism | |
| |
| |
| |
Divine Command Theory | |
| |
| |
| |
The Case for the Divine Command Theory | |
| |
| |
| |
The Case against the Divine Command Theory | |
| |
| |
| |
Kantianism | |
| |
| |
| |
Good Will and the Categorical Imperative | |
| |
| |
| |
Evaluating a Scenario Using Kantianism | |
| |
| |
| |
The Case for Kantianism | |
| |
| |
| |
The Case against Kantianism | |
| |
| |
| |
Act Utilitarianism | |
| |
| |
| |
Principle of Utility | |
| |
| |
| |
Evaluating a Scenario Using Act Utilitarianism | |
| |
| |
| |
The Case for Act Utilitarianism | |
| |
| |
| |
The Case against Act Utilitarianism | |
| |
| |
| |
Rule Utilitarianism | |
| |
| |
| |
Basis of Rule Utilitarianism | |
| |
| |
| |
Evaluating a Scenario Using Rule Utilitarianism | |
| |
| |
| |
The Case for Rule Utilitarianism | |
| |
| |
| |
The Case against Utilitarianism in General | |
| |
| |
| |
Social Contract Theory | |
| |
| |
| |
The Social Contract | |
| |
| |
| |
Rawls's Theory of Justice | |
| |
| |
| |
Evaluating a Scenario Using Social Contract Theory | |
| |
| |
| |
The Case for Social Contract Theory | |
| |
| |
| |
The Case against Social Contract Theory | |
| |
| |
| |
Comparing Workable Ethical Theories | |
| |
| |
| |
Morality of Breaking the Law | |
| |
| |
| |
Social Contract Theory Perspective | |
| |
| |
| |
Kantian Perspective | |
| |
| |
| |
Rule Utilitarian Perspective | |
| |
| |
| |
Act Utilitarian Perspective | |
| |
| |
| |
Conclusion | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
Discussion Questions | |
| |
| |
In-Class Exercises | |
| |
| |
Further Reading | |
| |
| |
References | |
| |
| |
An Interview with James Moor | |
| |
| |
| |
Networking | |
| |
| |
| |
Introduction | |
| |
| |
| |
Email and Spam | |
| |
| |
| |
How Email Works | |
| |
| |
| |
The Spam Epidemic | |
| |
| |
| |
Ethical Evaluations of Spamming | |
| |
| |
| |
Fighting Spam | |
| |
| |
| |
Mail Abuse Prevention System | |
| |
| |
| |
Ethical Evaluations of Blacklisting by MAPS | |
| |
| |
| |
Proposed Solutions to the Spam Epidemic | |
| |
| |
| |
CAN SPAM Act of 2003 | |
| |
| |
| |
Emergence of "Spim" | |
| |
| |
| |
The World Wide Web | |
| |
| |
| |
Attributes of the Web | |
| |
| |
| |
How We Use the Web | |
| |
| |
| |
Too Much Control or Too Little? | |
| |
| |
| |
Ethical Perspectives on Pornography | |
| |
| |
| |
Analyses Concluding Pornography Is Immoral | |
| |
| |
| |
Analyses Concluding Adult Pornography Is Moral | |
| |
| |
| |
Commentary | |
| |
| |
| |
Summary | |
| |
| |
| |
Censorship | |
| |
| |
| |
Direct Censorship | |
| |
| |
| |
Self-Censorship | |
| |
| |
| |
Challenges Posed by the Internet | |
| |
| |
| |
Ethical Perspectives on Censorship | |
| |
| |
| |
Freedom of Expression | |
| |
| |
| |
History | |
| |
| |
| |
Freedom of Expression Not an Absolute Right | |
| |
| |
| |
FCC v. Pacifica Foundation et al. | |
| |
| |
| |
Children and the Web | |
| |
| |
| |
Web Filters | |
| |
| |
| |
Child Internet Protection Act | |
| |
| |
| |
Ethical Evaluations of CIPA | |
| |
| |
| |
Breaking Trust on the Internet | |
| |
| |
| |
Identity Theft | |
| |
| |
| |
Chat-Room Predators | |
| |
| |
| |
Ethical Evaluations of Police "Sting" Operations | |
| |
| |
| |
False Information | |
| |
| |
| |
Internet Addiction | |
| |
| |
| |
Is Internet Addiction Real? | |
| |
| |
| |
Contributing Factors | |
| |
| |
| |
Ethical Evaluation of Internet Addiction | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
Discussion Questions | |
| |
| |
In-Class Exercises | |
| |
| |
Further Reading | |
| |
| |
References | |
| |
| |
An Interview with Jennifer Preece | |
| |
| |
| |
Intellectual Property | |
| |
| |
| |
Introduction | |
| |
| |
| |
Intellectual Property Rights | |
| |
| |
| |
What Is Intellectual Property? | |
| |
| |
| |
Property Rights | |
| |
| |
| |
Extending the Argument to Intellectual Property | |
| |
| |
| |
Benefits of Intellectual Property Protection | |
| |
| |
| |
Limits to Intellectual Property Protection | |
| |
| |
| |
Protecting Intellectual Property | |
| |
| |
| |
Trade Secrets | |
| |
| |
| |
Trademarks and Service Marks | |
| |
| |
| |
Patents | |
| |
| |
| |
Copyrights | |
| |
| |
| |
Fair Use | |
| |
| |
| |
Sony v. Universal City Studios | |
| |
| |
| |
RIAA v. Diamond Multimedia Systems Inc. | |
| |
| |
| |
Digital Technology and Fair Use | |
| |
| |
| |
New Restrictions on Use | |
| |
| |
| |
Digital Millennium Copyright Act | |
| |
| |
| |
Digital Rights Management | |
| |
| |
| |
Secure Digital Music Initiative | |
| |
| |
| |
Encrypting DVDs | |
| |
| |
| |
Making CDs Copyproof | |
| |
| |
| |
Criticisms of Digital Rights Management | |
| |
| |
| |
Peer-to-Peer Networks | |
| |
| |
| |
Napster | |
| |
| |
| |
FastTrack | |
| |
| |
| |
BitTorrent | |
| |
| |
| |
RIAA Lawsuits | |
| |
| |
| |
MP3 Spoofing | |
| |
| |
| |
Universities Caught in the Middle | |
| |
| |
| |
MGM v. Grokster | |
| |
| |
| |
Legal Music Services on the Internet | |
| |
| |
| |
Protections for Software | |
| |
| |
| |
Software Copyrights | |
| |
| |
| |
Violations of Software Copyrights | |
| |
| |
| |
Software Patents | |
| |
| |
| |
Safe Software Development | |
| |
| |
| |
Open-Source Software | |
| |
| |
| |
Consequences of Proprietary Software | |
| |
| |
| |
Open-Source Definition | |
| |
| |
| |
Beneficial Consequences of Open-Source Software | |
| |
| |
| |
Examples of Open-Source Software | |
| |
| |
| |
The GNU Project and Linux | |
| |
| |
| |
Impact of Open-Source Software | |
| |
| |
| |
Critique of the Open-Source Software Movement | |
| |
| |
| |
Legitimacy of Intellectual Property Protection for Software | |
| |
| |
| |
Rights-Based Analysis | |
| |
| |
| |
Utilitarian Analysis | |
| |
| |
| |
Conclusion | |
| |
| |
| |
Creative Commons | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
Discussion Questions | |
| |
| |
In-Class Exercises | |
| |
| |
Further Reading | |
| |
| |
References | |
| |
| |
An Interview with Wendy Seltzer | |
| |
| |
| |
Privacy | |
| |
| |
| |
Introduction | |
| |
| |
| |
Perspectives on Privacy | |
| |
| |
| |
Defining Privacy | |
| |
| |
| |
Harms and Benefits of Privacy | |
| |
| |
| |
Is There a Natural Right to Privacy? | |
| |
| |
| |
Privacy and Trust | |
| |
| |
| |
Disclosing Information | |
| |
| |
| |
Public Information | |
| |
| |
| |
Rewards or Loyalty Programs | |
| |
| |
| |
Body Scanners | |
| |
| |
| |
Digital Video Recorders | |
| |
| |
| |
Automobile "Black Boxes" | |
| |
| |
| |
Enhanced 911 Service | |
| |
| |
| |
RFIDs | |
| |
| |
| |
Implanted Chips | |
| |
| |
| |
Cookies | |
| |
| |
| |
Spyware | |
| |
| |
| |
U.S. Legislation | |
| |
| |
| |
Fair Credit Reporting Act | |
| |
| |
| |
The Family Education Rights and Privacy Act | |
| |
| |
| |
Video Privacy Protection Act | |
| |
| |
| |
Financial Services Modernization Act | |
| |
| |
| |
Children's Online Privacy Protection Act | |
| |
| |
| |
Health Insurance Portability and Accountability Act | |
| |
| |
| |
Public Records | |
| |
| |
| |
Census Records | |
| |
| |
| |
Internal Revenue Service Records | |
| |
| |
| |
FBI National Crime Information Center 2000 | |
| |
| |
| |
Privacy Act of 1974 | |
| |
| |
| |
Covert Government Surveillance | |
| |
| |
| |
Wiretaps and Bugs | |
| |
| |
| |
Operation Shamrock | |
| |
| |
| |
U.S. Legislation Authorizing Wiretapping | |
| |
| |
| |
Title III | |
| |
| |
| |
Electronic Communications Privacy Act | |
| |
| |
| |
Communications Assistance for Law Enforcement Act | |
| |
| |
| |
USA PATRIOT Act | |
| |
| |
| |
Data Mining | |
| |
| |
| |
Marketplace: Households | |
| |
| |
| |
IRS Audits | |
| |
| |
| |
Syndromic Surveillance System | |
| |
| |
| |
Total Information Awareness | |
| |
| |
| |
Criticisms of the TIA Program | |
| |
| |
| |
Who Should Own Information about a Transaction? | |
| |
| |
| |
Opt-in Versus Opt-out | |
| |
| |
| |
Platform for Privacy Preferences (P3P) | |
| |
| |
| |
Identity Theft | |
| |
| |
| |
Background | |
| |
| |
| |
History and Role of the Social Security Number | |
| |
| |
| |
Debate over a National ID Card | |
| |
| |
| |
The REAL ID Act | |
| |
| |
| |
Encryption | |
| |
| |
| |
Symmetric Encryption | |
| |
| |
| |
Public-Key Cryptography | |
| |
| |
| |
Pretty Good Privacy | |
| |
| |
| |
Clipper Chip | |
| |
| |
| |
Effects of U.S. Export Restrictions | |
| |
| |
| |
Digital Cash | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
Discussion Questions | |
| |
| |
In-class Exercises | |
| |
| |
Further Reading | |
| |
| |
References | |
| |
| |
An Interview with Ann Cavoukian | |
| |
| |
| |
Computer and Network Security | |
| |
| |
| |
Introduction | |
| |
| |
| |
Viruses, Worms, and Trojan Horses | |
| |
| |
| |
Viruses | |
| |
| |
| |
Worms | |
| |
| |
| |
The Internet Worm | |
| |
| |
| |
Trojan Horses | |
| |
| |
| |
Defensive Measures | |
| |
| |
| |
Phreaks and Hackers | |
| |
| |
| |
Hackers | |
| |
| |
| |
Phone Phreaking | |
| |
| |
| |
The Cuckoo's Egg | |
| |
| |
| |
Legion of Doom | |
| |
| |
| |
Fry Guy | |
| |
| |
| |
U.S. v. Riggs | |
| |
| |
| |
Steve Jackson Games | |
| |
| |
| |
Retrospective | |
| |
| |
| |
Penalties for Hacking | |
| |
| |
| |
Recent Incidents | |
| |
| |
| |
Denial-of-Service Attacks | |
| |
| |
| |
Attacks that Consume Scarce Resources | |
| |
| |
| |
Defensive Measures | |
| |
| |
| |
Distributed Denial-of-Service Attacks | |
| |
| |
| |
SATAN | |
| |
| |
| |
Online Voting | |
| |
| |
| |
Motivation for Online Voting | |
| |
| |
| |
Proposals | |
| |
| |
| |
Ethical Evaluation | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
Discussion Questions | |
| |
| |
In-Class Exercises | |
| |
| |
Further Reading | |
| |
| |
References | |
| |
| |
An Interview with Matt Bishop | |
| |
| |
| |
Computer Reliability | |
| |
| |
| |
Introduction | |
| |
| |
| |
Data-Entry or Data-Retrieval Errors | |
| |
| |
| |
Disfranchised Voters | |
| |
| |
| |
False Arrests | |
| |
| |
| |
Analysis: Accuracy of NCIC Records | |
| |
| |
| |
Software and Billing Errors | |
| |
| |
| |
Errors Leading to System Malfunctions | |
| |
| |
| |
Errors Leading to System Failures | |
| |
| |
| |
Analysis: E-Retailer Posts Wrong Price, Refuses to Deliver | |
| |
| |
| |
Notable Software System Failures | |
| |
| |
| |
Patriot Missile | |
| |
| |
| |
Ariane 5 | |
| |
| |
| |
AT&T Long-Distance Network | |
| |
| |
| |
Robot Missions to Mars | |
| |
| |
| |
Denver International Airport | |
| |
| |
| |
Therac-25 | |
| |
| |
| |
Genesis of the Therac-25 | |
| |
| |
| |
Chronology of Accidents and AECL Responses | |
| |
| |
| |
Software Errors | |
| |
| |
| |
Post Mortem | |
| |
| |
| |
Moral Responsibility of the Therac-25 Team | |
| |
| |
| |
Computer Simulations | |
| |
| |
| |
Uses of Simulation | |
| |
| |
| |
Validating Simulations | |
| |
| |
| |
Software Engineering | |
| |
| |
| |
Specification | |
| |
| |
| |
Development | |
| |
| |
| |
Validation | |
| |
| |
| |
Software Quality Is Improving | |
| |
| |
| |
Software Warranties | |
| |
| |
| |
Shrinkwrap Warranties | |
| |
| |
| |
Are Software Warranties Enforceable? | |
| |
| |
| |
Uniform Computer Information Transaction Act | |
| |
| |
| |
Moral Responsibility of Software Manufacturers | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
Discussion Questions | |
| |
| |
In-class Exercises | |
| |
| |
Further Reading | |
| |
| |
References | |
| |
| |
| |
Work and Wealth | |
| |
| |
| |
Introduction | |
| |
| |
| |
Automation and Unemployment | |
| |
| |
| |
Automation and Job Destruction | |
| |
| |
| |
Automation and Job Creation | |
| |
| |
| |
Effects of Increase in Productivity | |
| |
| |
| |
Rise of the Robots? | |
| |
| |
| |
Workplace Changes | |
| |
| |
| |
Organizational Changes | |
| |
| |
| |
Telework | |
| |
| |
| |
Temporary Work | |
| |
| |
| |
Monitoring | |
| |
| |
| |
Multinational Teams | |
| |
| |
| |
Globalization | |
| |
| |
| |
Arguments for Globalization | |
| |
| |
| |
Arguments against Globalization | |
| |
| |
| |
Dot-Com Bust Increases IT Sector Unemployment | |
| |
| |
| |
Foreign Workers in the American IT Industry | |
| |
| |
| |
Foreign Competition | |
| |
| |
| |
The Digital Divide | |
| |
| |
| |
Evidence of the Digital Divide | |
| |
| |
| |
Models of Technological Diffusion | |
| |
| |
| |
Critiques of the Digital Divide | |
| |
| |
| |
The "Winner-Take-All Society" | |
| |
| |
| |
The Winner-Take-All Phenomenon | |
| |
| |
| |
Harmful Effects of Winner-Take-All | |
| |
| |
| |
Reducing Winner-Take-All Effects | |
| |
| |
| |
Access to Public Colleges | |
| |
| |
| |
Effects of Tuition Increases | |
| |
| |
| |
Ethical Analysis | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
Discussion Questions | |
| |
| |
In-class Exercises | |
| |
| |
Further Reading | |
| |
| |
References | |
| |
| |
An Interview with Jerry Berman | |
| |
| |
| |
Professional Ethics | |
| |
| |
| |
Introduction | |
| |
| |
| |
Is Software Engineering a Profession? | |
| |
| |
| |
Characteristics of a Profession | |
| |
| |
| |
Certified Public Accountants | |
| |
| |
| |
Software Engineers | |
| |
| |
| |
Software Engineering Code of Ethics | |
| |
| |
| |
Preamble | |
| |
| |
| |
Principles | |
| |
| |
| |
Analysis of the Code | |
| |
| |
| |
Preamble | |
| |
| |
| |
Virtue Ethics | |
| |
| |
| |
Alternative List of Fundamental Principles | |
| |
| |
| |
Case Studies | |
| |
| |
| |
Software Recommendation | |
| |
| |
| |
Child Pornography | |
| |
| |
| |
Anti-Worm | |
| |
| |
| |
Whistleblowing | |
| |
| |
| |
Morton Thiokol/NASA | |
| |
| |
| |
Hughes Aircraft | |
| |
| |
| |
Morality of Whistleblowing | |
| |
| |
Summary | |
| |
| |
Review Questions | |
| |
| |
Discussion Questions | |
| |
| |
In-class Exercises | |
| |
| |
Further Reading | |
| |
| |
References | |
| |
| |
An Interview with Paul Axtell | |
| |
| |
| |
Plagiarism | |
| |
| |
Consequences of Plagiarism | |
| |
| |
Types of Plagiarism | |
| |
| |
Guidelines for Citing Sources | |
| |
| |
How to Avoid Plagiarism | |
| |
| |
Misuse of Sources | |
| |
| |
Additional Information | |
| |
| |
References | |