Cambridge University Press
9780521882514 - Computer Ethics: A Case-Based Approach - By Robert N. Barger
Frontmatter/Prelims

Computer Ethics: A Case-Based Approach

Computer Ethics: A Case-Based Approach teaches students to solve ethical dilemmas in the field of computing, taking a philosophical, rather than a legal, approach to the topic. It first examines the principles of Idealism, Realism, Pragmatism, Existentialism, and Philosophical Analysis, explaining how each might be adopted as a basis for solving computing dilemmas. The book then presents a worksheet of key questions to be used in solving dilemmas. Twenty-nine cases, drawn from the real-life experiences of computer professionals, are included in the book as a means of letting students experiment with solving ethical dilemmas and identify the philosophical underpinnings of the solutions.

Robert N. Barger is an associate professor in the Computer Applications Program at the University of Notre Dame and professor emeritus at Eastern Illinois University, where he received several awards for teaching excellence. He has spent the last thirty-six years teaching and writing on computer ethics and educational issues.


Computer Ethics: A Case-Based Approach

Robert N. Barger

University of Notre Dame


CAMBRIDGE UNIVERSITY PRESS
Cambridge, New York, Melbourne, Madrid, Cape Town, Singapore, São Paulo, Delhi
Cambridge University Press
32 Avenue of the Americas, New York, NY 10013-2473, USA

www.cambridge.org
Information on this title: www.cambridge.org/9780521709149

© Robert Newton Barger 2008

This publication is in copyright. Subject to statutory exception and to the provisions of relevant collective licensing agreements, no reproduction of any part may take place without the written permission of Cambridge University Press.

First published 2008
Printed in the United States of America

A catalog record for this publication is available from the British Library.

Library of Congress Cataloging in Publication Data

Barger, Robert N., 1938–
Computer ethics : a case-based approach / Robert N. Barger.
p. cm.
Includes bibliographical references and index.
ISBN 978-0-521-88251-4 (hardback) – ISBN 978-0-521-70914-9 (pbk.)
1. Computers – Moral ethical aspects. 2. Information technology – Social aspects. I. Title.
QA 76.9.M65B37 2008
303.48′33 – dc22 2007049088

ISBN 978-0-521-88251-4 hardback
ISBN 978-0-521-70914-9 paperback

Cambridge University Press has no responsibility for the persistence or accuracy of URLs for external or third-party Internet Web sites referred to in this publication and does not guarantee that any content on such Web sites is, or will remain, accurate or appropriate.


This book is dedicated to my lovely wife, Jo,

with love and gratitude.


Contents

Preface
xiii
Acknowledgments
xvii
1       Introduction
1
1.1     A Brief History of Computers and the Internet
1
1.2     The Meaning of Ethics
6
1.3     The Distinction between Law and Ethics
7
1.4     The Subjects of Ethics
8
1.5     Computer Ethics as a Unique Kind of Ethics
8
1.6     Chapter Summary
14
1.7     Your Turn
15
2       The Computer as a Humanizing Agent
16
2.1     Introduction
16
2.2     Autonomy
18
2.3     Individuality
18
2.4     Rationality
19
2.5     Affectivity
20
2.6     Responsiveness
21
2.7     Creativity
22
2.8     Conclusion
22
2.9     Chapter Summary
23
2.10    Your Turn
24
3       Philosophic Belief Systems
25
3.1     Introduction
25
3.2     Idealism
28
3.3     Realism
42
3.4     Pragmatism
45
3.5     Existentialism
51
3.6     Philosophical Analysis
55
3.7     Conclusion
57
3.8     Chapter Summary
58
3.9     Your Turn
58
4       A Philosophic Inventory
59
4.1     Introduction
59
4.2     Inventory Questions
59
4.3     Inventory Scoring
61
4.4     Significance of Scores
62
4.5     Conclusion
63
4.6     Chapter Summary
63
4.7     Your Turn
64
5       The Possibility of a Unifying Ethical Theory
65
5.1     Introduction
65
5.2     The Argument of James H. Moor
66
5.3     Chapter Summary
68
5.4     Your Turn
69
6       The Ethical Decision-Making Process
70
6.1     Steps in the Ethical Decision-Making Process
70
6.2     The Culture Clash on the Net Case
73
6.3     A Sample Solution to the Culture Clash on the Net Case
74
6.4     Chapter Summary
77
6.5     Your Turn
78
7       Psychology and Computer Ethics
80
7.1     Introduction
80
7.2     Lawrence Kohlberg's Stages of Moral Development
80
7.3     Morality at Premier Software Story
82
7.4     Chapter Summary
83
7.5     Your Turn
84
8       The Computing Field as a Profession
85
8.1     Introduction
85
8.2     Expert Knowledge
85
8.3     Autonomy
85
8.4     Internal Governance
86
8.5     Service to Society
86
8.6     A History of the Professions
86
8.7     Computing Considered as a Profession
87
8.8     Chapter Summary
88
8.9     Your Turn
89
9       Computer-Related Codes of Ethics
90
9.1     ACM Code of Ethics and Professional Conduct
90
9.2     Software Engineering Code of Ethics and Professional Practice
98
9.3     The Ten Commandments of Computer Ethics
105
9.4     Chapter Summary
106
9.5     Your Turn
106
10      Computer Ethics and International Development
107
10.1    Introduction
107
10.2    The World Summit on the Information Society
107
10.3    Geneva Plan of Action (10–12 December 2003)
108
10.4    Geneva Declaration of Principles (13 December 2003)
112
10.5    Tunis Commitment (16–18 November 2005)
128
10.6    Tunis Agenda for the Information Society (18 November 2005)
136
10.7    Chapter Summary
139
10.8    Your Turn
139
11      Robotics and Ethics
140
11.1    Introduction
140
11.2    What Is Roboethics?
141
11.3    Ethical Issues in Robotics
142
11.4    Disciplines Involved in Robotics
143
11.5    The Roboethics Roadmap in EURON's Own Words
143
11.6    Difficulties of Programming Robots for Ethics
150
11.7    Chapter Summary
152
11.8    Your Turn
152
12      Theft and Piracy Concerns
154
12.1    Introduction
154
12.2    Cybersquatting
154
12.3    Fake IDs
155
12.4    Identity Theft
156
12.5    Intellectual Property
157
12.6    Peer-to-Peer Music Sharing
158
12.7    Open-Source Software
159
12.8    Phishing
160
12.9    Pharming
162
12.10   Software Bombs
162
12.11   Sale of Term Papers Online
163
12.12   Sale of Academic Degrees Online
164
12.13   Web Spoofing
165
12.14   Chapter Summary
165
12.15   Your Turn
166
13      Cases Concerning Theft and Piracy
168
13.1    Internet Fraud Case
168
13.2    Free Software Case
169
13.3    Finals Week Case
171
13.4    Software Licensing: Stuck in the Middle Case
172
13.5    Borrowed Hardware Case
173
13.6    Risks of Academic Cheating by Computer Case
173
13.7    Chapter Summary
175
13.8    Your Turn
176
14      Privacy Concerns
177
14.1    Introduction
177
14.2    Cookies
177
14.3    Data Mining
178
14.4    Denial-of-Service Attacks
179
14.5    Employee Monitoring
179
14.6    Government Surveillance
179
14.7    Hackers
180
14.8    Viruses and Worms
182
14.9    Chapter Summary
184
14.10   Your Turn
185
15      Cases Concerning Privacy
186
15.1    Fingering Case
186
15.2    E-mail Addresses Case
188
15.3    Deceased Student Case
189
15.4    Incapacitated Administrator Case
191
15.5    Chain Letter Case
192
15.6    Administrator vs. Student Case
193
15.7    Chapter Summary
196
15.8    Your Turn
196
16      Power Concerns
197
16.1    Introduction
197
16.2    Accountability of Bloggers
197
16.3    Censorship/Free Speech
198
16.4    Cyberchondria
199
16.5    Internet Addiction
200
16.6    Online Voting
202
16.7    Whistle-Blowing
202
16.8    Chapter Summary
205
16.9    Your Turn
205
17      Cases Concerning Power
207
17.1    Google and Chinese Censorship Case
207
17.2    Demon Worship Case
208
17.3    System Privileges Case
208
17.4    The Computer Goes to Court Case
209
17.5    The Computer Becomes the Court Case
210
17.6    File Transfer Case
210
17.7    Fix Bug Case
211
17.8    Life-and-Death Computer Case
211
17.9    Chapter Summary
214
17.10   Your Turn
215
18      A Miscellaneous Collection of Cases
216
18.1    Mail Inspection Case
216
18.2    Fake Sale Case
216
18.3    Numerically Unstable Case
216
18.4    Edited File Case
217
18.5    Class Project Case
217
18.6    Hide from the IRS Case
217
18.7    Ignore the Problem Case
218
18.8    Chapter Summary
218
18.9    Your Turn
218
19      Parasitic Computing Case
219
19.1    Introduction
219
19.2    The TCP/IP Protocol
220
19.3    Communication on the Internet
220
19.4    Ethical Issues in Parasitic Computing
223
19.5    Chapter Summary
226
19.6    Your Turn
226
Appendix: Topics for Presentations, Discussions, and Papers
227
Notes
231
Selected Bibliography
239
Index
243



© Cambridge University Press