Skip to content

Ethics for the Information Age

Spend $50 to get a free DVD!

ISBN-10: 0321194349

ISBN-13: 9780321194343

Edition: 2005

Authors: Michael J. Quinn

List price: $62.00
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Widely praised for its balanced treatment of computer ethics, Ethics for the Information Age offers a modern presentation of the moral controversies surrounding information technology. Topics such as privacy and intellectual property are explored through multiple ethical theories, encouraging readers to think critically about these issues and to make their own ethical decisions.
Customers also bought

Book details

List price: $62.00
Copyright year: 2005
Publisher: Addison-Wesley Longman, Incorporated
Publication date: 5/11/2004
Binding: Paperback
Pages: 456
Size: 7.00" wide x 9.25" long x 0.75" tall
Weight: 1.430
Language: English

Michael J. Quinn is Dean of the College of Science and Engineering atSeattle University.

Preface
Catalysts for Change
Introduction
Milestones in Computing
Mechanical Adding Machines
The Analytical Engine
Boolean Algebra
Zuse's Z Series
Harvard Mark 1
Colossus
The Atanasoff-Berry Computer
ENIAC (Electronic Numerical Integrator and Computer)
Small-Scale Experimental Machine
First Commerical Computers
Transistor
Integrated Circuit
IBM System/360
Microprocessor
Milestones in Networking
Electricity and Electromagnetism
Telegraph
Telephone
Typewriter and Teletype
Radio
Television
Remote Computing
ARPANET
Email
Internet
NSFNET
Broadband
Milestones in Information Storage and Retrieval
Codex
Gutenberg's Printing Press
Newspapers
Hypertext
Personal Computers
Single-Computer Hypertext Systems
Networked Hypertext: World Wide Web
Search Engines
Information Technology Issues
Summary
Review Questions
Discussion Questions
In-Class Exercises
Further Reading
References
An Interview with Douglas Engelbart
Introduction to Ethics
Introduction
Defining Terms
Four Scenarios
Overview of Ethical Theories
Subjective Relativism
The Case for Subjective Relativism
The Case against Subjective Relativism
Cultural Relativism
The Case for Cultural Relativism
The Case against Cultural Relativism
Divine Command Theory
The Case for the Divine Command Theory
The Case against the Divine Command Theory
Kantianism
Good Will and the Categorical Imperative
Evaluating a Scenario Using Kantianism
The Case for Kantianism
The Case against Kantianism
Act Utilitarianism
Principle of Utility
Evaluating a Scenario Using Act Utilitarianism
The Case for Act Utilitarianism
The Case against Act Utilitarianism
Rule Utilitarianism
Basis of Rule Utilitarianism
Evaluating a Scenario Using Rule Utilitarianism
The Case for Rule Utilitarianism
The Case against Utilitarianism in General
Social Contract Theory
The Social Contract
Rawls's Theory of Justice
Evaluating a Scenario Using Social Contract Theory
The Case for Social Contract Theory
The Case against Social Contract Theory
Comparing Workable Ethical Theories
Morality of Breaking the Law
Social Contract Theory Perspective
Kantian Perspective
Rule Utilitarian Perspective
Act Utilitarian Perspective
Conclusion
Summary
Review Questions
Discussion Questions
In-Class Exercises
Further Reading
References
An Interview with James Moor
Networking
Introduction
Email and Spam
How Email Works
The Spam Epidemic
Ethical Evaluations of Spamming
Fighting Spam
Mail Abuse Prevention System
Ethical Evaluations of Blacklisting by MAPS
Proposed Solutions to the Spam Epidemic
CAN SPAM Act of 2003
Emergence of "Spim"
The World Wide Web
Attributes of the Web
How We Use the Web
Too Much Control or Too Little?
Ethical Perspectives on Pornography
Analyses Concluding Pornography Is Immoral
Analyses Concluding Adult Pornography Is Moral
Commentary
Summary
Censorship
Direct Censorship
Self-Censorship
Challenges Posed by the Internet
Ethical Perspectives on Censorship
Freedom of Expression
History
Freedom of Expression Not an Absolute Right
FCC v. Pacifica Foundation et al.
Children and the Web
Web Filters
Child Internet Protection Act
Ethical Evaluations of CIPA
Breaking Trust on the Internet
Identity Theft
Chat-Room Predators
Ethical Evaluations of Police "Sting" Operations
False Information
Internet Addiction
Is Internet Addiction Real?
Contributing Factors
Ethical Evaluation of Internet Addiction
Summary
Review Questions
Discussion Questions
In-Class Exercises
Further Reading
References
An Interview with Jennifer Preece
Intellectual Property
Introduction
Intellectual Property Rights
What Is Intellectual Property?
Property Rights
Extending the Argument to Intellectual Property
Benefits of Intellectual Property Protection
Limits to Intellectual Property Protection
Protecting Intellectual Property
Trade Secrets
Trademarks and Service Marks
Patents
Copyrights
Fair Use
Sony v. Universal City Studios
RIAA v. Diamond Multimedia Systems Inc.
Digital Technology and Fair Use
New Restrictions on Use
Digital Millennium Copyright Act
Digital Rights Management
Secure Digital Music Initiative
Encrypting DVDs
Making CDs Copyproof
Criticisms of Digital Rights Management
Peer-to-Peer Networks
Napster
FastTrack
BitTorrent
RIAA Lawsuits
MP3 Spoofing
Universities Caught in the Middle
MGM v. Grokster
Legal Music Services on the Internet
Protections for Software
Software Copyrights
Violations of Software Copyrights
Software Patents
Safe Software Development
Open-Source Software
Consequences of Proprietary Software
Open-Source Definition
Beneficial Consequences of Open-Source Software
Examples of Open-Source Software
The GNU Project and Linux
Impact of Open-Source Software
Critique of the Open-Source Software Movement
Legitimacy of Intellectual Property Protection for Software
Rights-Based Analysis
Utilitarian Analysis
Conclusion
Creative Commons
Summary
Review Questions
Discussion Questions
In-Class Exercises
Further Reading
References
An Interview with Wendy Seltzer
Privacy
Introduction
Perspectives on Privacy
Defining Privacy
Harms and Benefits of Privacy
Is There a Natural Right to Privacy?
Privacy and Trust
Disclosing Information
Public Information
Rewards or Loyalty Programs
Body Scanners
Digital Video Recorders
Automobile "Black Boxes"
Enhanced 911 Service
RFIDs
Implanted Chips
Cookies
Spyware
U.S. Legislation
Fair Credit Reporting Act
The Family Education Rights and Privacy Act
Video Privacy Protection Act
Financial Services Modernization Act
Children's Online Privacy Protection Act
Health Insurance Portability and Accountability Act
Public Records
Census Records
Internal Revenue Service Records
FBI National Crime Information Center 2000
Privacy Act of 1974
Covert Government Surveillance
Wiretaps and Bugs
Operation Shamrock
U.S. Legislation Authorizing Wiretapping
Title III
Electronic Communications Privacy Act
Communications Assistance for Law Enforcement Act
USA PATRIOT Act
Data Mining
Marketplace: Households
IRS Audits
Syndromic Surveillance System
Total Information Awareness
Criticisms of the TIA Program
Who Should Own Information about a Transaction?
Opt-in Versus Opt-out
Platform for Privacy Preferences (P3P)
Identity Theft
Background
History and Role of the Social Security Number
Debate over a National ID Card
The REAL ID Act
Encryption
Symmetric Encryption
Public-Key Cryptography
Pretty Good Privacy
Clipper Chip
Effects of U.S. Export Restrictions
Digital Cash
Summary
Review Questions
Discussion Questions
In-class Exercises
Further Reading
References
An Interview with Ann Cavoukian
Computer and Network Security
Introduction
Viruses, Worms, and Trojan Horses
Viruses
Worms
The Internet Worm
Trojan Horses
Defensive Measures
Phreaks and Hackers
Hackers
Phone Phreaking
The Cuckoo's Egg
Legion of Doom
Fry Guy
U.S. v. Riggs
Steve Jackson Games
Retrospective
Penalties for Hacking
Recent Incidents
Denial-of-Service Attacks
Attacks that Consume Scarce Resources
Defensive Measures
Distributed Denial-of-Service Attacks
SATAN
Online Voting
Motivation for Online Voting
Proposals
Ethical Evaluation
Summary
Review Questions
Discussion Questions
In-Class Exercises
Further Reading
References
An Interview with Matt Bishop
Computer Reliability
Introduction
Data-Entry or Data-Retrieval Errors
Disfranchised Voters
False Arrests
Analysis: Accuracy of NCIC Records
Software and Billing Errors
Errors Leading to System Malfunctions
Errors Leading to System Failures
Analysis: E-Retailer Posts Wrong Price, Refuses to Deliver
Notable Software System Failures
Patriot Missile
Ariane 5
AT&T Long-Distance Network
Robot Missions to Mars
Denver International Airport
Therac-25
Genesis of the Therac-25
Chronology of Accidents and AECL Responses
Software Errors
Post Mortem
Moral Responsibility of the Therac-25 Team
Computer Simulations
Uses of Simulation
Validating Simulations
Software Engineering
Specification
Development
Validation
Software Quality Is Improving
Software Warranties
Shrinkwrap Warranties
Are Software Warranties Enforceable?
Uniform Computer Information Transaction Act
Moral Responsibility of Software Manufacturers
Summary
Review Questions
Discussion Questions
In-class Exercises
Further Reading
References
Work and Wealth
Introduction
Automation and Unemployment
Automation and Job Destruction
Automation and Job Creation
Effects of Increase in Productivity
Rise of the Robots?
Workplace Changes
Organizational Changes
Telework
Temporary Work
Monitoring
Multinational Teams
Globalization
Arguments for Globalization
Arguments against Globalization
Dot-Com Bust Increases IT Sector Unemployment
Foreign Workers in the American IT Industry
Foreign Competition
The Digital Divide
Evidence of the Digital Divide
Models of Technological Diffusion
Critiques of the Digital Divide
The "Winner-Take-All Society"
The Winner-Take-All Phenomenon
Harmful Effects of Winner-Take-All
Reducing Winner-Take-All Effects
Access to Public Colleges
Effects of Tuition Increases
Ethical Analysis
Summary
Review Questions
Discussion Questions
In-class Exercises
Further Reading
References
An Interview with Jerry Berman
Professional Ethics
Introduction
Is Software Engineering a Profession?
Characteristics of a Profession
Certified Public Accountants
Software Engineers
Software Engineering Code of Ethics
Preamble
Principles
Analysis of the Code
Preamble
Virtue Ethics
Alternative List of Fundamental Principles
Case Studies
Software Recommendation
Child Pornography
Anti-Worm
Whistleblowing
Morton Thiokol/NASA
Hughes Aircraft
Morality of Whistleblowing
Summary
Review Questions
Discussion Questions
In-class Exercises
Further Reading
References
An Interview with Paul Axtell
Plagiarism
Consequences of Plagiarism
Types of Plagiarism
Guidelines for Citing Sources
How to Avoid Plagiarism
Misuse of Sources
Additional Information
References