Computer Ethics: A Case-Based Approach teaches students to solve ethical dilemmas in the field of computing, taking a philosophical, rather than a legal, approach to the topic. It first examines the principles of Idealism, Realism, Pragmatism, Existentialism, and Philosophical Analysis, explaining how each might be adopted as a basis for solving computing dilemmas. The book then presents a worksheet of key questions to be used in solving dilemmas. Twenty-nine cases, drawn from the real-life experiences of computer professionals, are included in the book as a means of letting students experiment with solving ethical dilemmas and identify the philosophical underpinnings of the solutions.
Robert N. Barger is an associate professor in the Computer Applications Program at the University of Notre Dame and professor emeritus at Eastern Illinois University, where he received several awards for teaching excellence. He has spent the last thirty-six years teaching and writing on computer ethics and educational issues.
CAMBRIDGE UNIVERSITY PRESS
Cambridge, New York, Melbourne, Madrid, Cape Town, Singapore, São Paulo, Delhi
Cambridge University Press
32 Avenue of the Americas, New York, NY 10013-2473, USA
www.cambridge.org
Information on this title: www.cambridge.org/9780521709149
© Robert Newton Barger 2008
This publication is in copyright. Subject to statutory exception and to the provisions of relevant collective licensing agreements, no reproduction of any part may take place without the written permission of Cambridge University Press.
First published 2008
Printed in the United States of America
A catalog record for this publication is available from the British Library.
Library of Congress Cataloging in Publication Data
Barger, Robert N., 1938– Computer ethics : a case-based approach / Robert N. Barger. p. cm. Includes bibliographical references and index. ISBN 978-0-521-88251-4 (hardback) – ISBN 978-0-521-70914-9 (pbk.) 1. Computers – Moral ethical aspects. 2. Information technology – Social aspects. I. Title. QA 76.9.M65B37 2008 303.48′33 – dc22 2007049088
ISBN 978-0-521-88251-4 hardback
ISBN 978-0-521-70914-9 paperback
Cambridge University Press has no responsibility for the persistence or accuracy of URLs for external or third-party Internet Web sites referred to in this publication and does not guarantee that any content on such Web sites is, or will remain, accurate or appropriate.
This book is dedicated to my lovely wife, Jo,
with love and gratitude.
Preface
|
xiii |
Acknowledgments
|
xvii |
1 Introduction
|
1 |
1.1 A Brief History of Computers and the Internet
|
1 |
1.2 The Meaning of Ethics
|
6 |
1.3 The Distinction between Law and Ethics
|
7 |
1.4 The Subjects of Ethics
|
8 |
1.5 Computer Ethics as a Unique Kind of Ethics
|
8 |
1.6 Chapter Summary
|
14 |
1.7 Your Turn
|
15 |
2 The Computer as a Humanizing Agent
|
16 |
2.1 Introduction
|
16 |
2.2 Autonomy
|
18 |
2.3 Individuality
|
18 |
2.4 Rationality
|
19 |
2.5 Affectivity
|
20 |
2.6 Responsiveness
|
21 |
2.7 Creativity
|
22 |
2.8 Conclusion
|
22 |
2.9 Chapter Summary
|
23 |
2.10 Your Turn
|
24 |
3 Philosophic Belief Systems
|
25 |
3.1 Introduction
|
25 |
3.2 Idealism
|
28 |
3.3 Realism
|
42 |
3.4 Pragmatism
|
45 |
3.5 Existentialism
|
51 |
3.6 Philosophical Analysis
|
55 |
3.7 Conclusion
|
57 |
3.8 Chapter Summary
|
58 |
3.9 Your Turn
|
58 |
4 A Philosophic Inventory
|
59 |
4.1 Introduction
|
59 |
4.2 Inventory Questions
|
59 |
4.3 Inventory Scoring
|
61 |
4.4 Significance of Scores
|
62 |
4.5 Conclusion
|
63 |
4.6 Chapter Summary
|
63 |
4.7 Your Turn
|
64 |
5 The Possibility of a Unifying Ethical Theory
|
65 |
5.1 Introduction
|
65 |
5.2 The Argument of James H. Moor
|
66 |
5.3 Chapter Summary
|
68 |
5.4 Your Turn
|
69 |
6 The Ethical Decision-Making Process
|
70 |
6.1 Steps in the Ethical Decision-Making Process
|
70 |
6.2 The Culture Clash on the Net Case
|
73 |
6.3 A Sample Solution to the Culture Clash on the Net Case
|
74 |
6.4 Chapter Summary
|
77 |
6.5 Your Turn
|
78 |
7 Psychology and Computer Ethics
|
80 |
7.1 Introduction
|
80 |
7.2 Lawrence Kohlberg's Stages of Moral Development
|
80 |
7.3 Morality at Premier Software Story
|
82 |
7.4 Chapter Summary
|
83 |
7.5 Your Turn
|
84 |
8 The Computing Field as a Profession
|
85 |
8.1 Introduction
|
85 |
8.2 Expert Knowledge
|
85 |
8.3 Autonomy
|
85 |
8.4 Internal Governance
|
86 |
8.5 Service to Society
|
86 |
8.6 A History of the Professions
|
86 |
8.7 Computing Considered as a Profession
|
87 |
8.8 Chapter Summary
|
88 |
8.9 Your Turn
|
89 |
9 Computer-Related Codes of Ethics
|
90 |
9.1 ACM Code of Ethics and Professional Conduct
|
90 |
9.2 Software Engineering Code of Ethics and Professional Practice
|
98 |
9.3 The Ten Commandments of Computer Ethics
|
105 |
9.4 Chapter Summary
|
106 |
9.5 Your Turn
|
106 |
10 Computer Ethics and International Development
|
107 |
10.1 Introduction
|
107 |
10.2 The World Summit on the Information Society
|
107 |
10.3 Geneva Plan of Action (10–12 December 2003)
|
108 |
10.4 Geneva Declaration of Principles (13 December 2003)
|
112 |
10.5 Tunis Commitment (16–18 November 2005)
|
128 |
10.6 Tunis Agenda for the Information Society (18 November 2005)
|
136 |
10.7 Chapter Summary
|
139 |
10.8 Your Turn
|
139 |
11 Robotics and Ethics
|
140 |
11.1 Introduction
|
140 |
11.2 What Is Roboethics?
|
141 |
11.3 Ethical Issues in Robotics
|
142 |
11.4 Disciplines Involved in Robotics
|
143 |
11.5 The Roboethics Roadmap in EURON's Own Words
|
143 |
11.6 Difficulties of Programming Robots for Ethics
|
150 |
11.7 Chapter Summary
|
152 |
11.8 Your Turn
|
152 |
12 Theft and Piracy Concerns
|
154 |
12.1 Introduction
|
154 |
12.2 Cybersquatting
|
154 |
12.3 Fake IDs
|
155 |
12.4 Identity Theft
|
156 |
12.5 Intellectual Property
|
157 |
12.6 Peer-to-Peer Music Sharing
|
158 |
12.7 Open-Source Software
|
159 |
12.8 Phishing
|
160 |
12.9 Pharming
|
162 |
12.10 Software Bombs
|
162 |
12.11 Sale of Term Papers Online
|
163 |
12.12 Sale of Academic Degrees Online
|
164 |
12.13 Web Spoofing
|
165 |
12.14 Chapter Summary
|
165 |
12.15 Your Turn
|
166 |
13 Cases Concerning Theft and Piracy
|
168 |
13.1 Internet Fraud Case
|
168 |
13.2 Free Software Case
|
169 |
13.3 Finals Week Case
|
171 |
13.4 Software Licensing: Stuck in the Middle Case
|
172 |
13.5 Borrowed Hardware Case
|
173 |
13.6 Risks of Academic Cheating by Computer Case
|
173 |
13.7 Chapter Summary
|
175 |
13.8 Your Turn
|
176 |
14 Privacy Concerns
|
177 |
14.1 Introduction
|
177 |
14.2 Cookies
|
177 |
14.3 Data Mining
|
178 |
14.4 Denial-of-Service Attacks
|
179 |
14.5 Employee Monitoring
|
179 |
14.6 Government Surveillance
|
179 |
14.7 Hackers
|
180 |
14.8 Viruses and Worms
|
182 |
14.9 Chapter Summary
|
184 |
14.10 Your Turn
|
185 |
15 Cases Concerning Privacy
|
186 |
15.1 Fingering Case
|
186 |
15.2 E-mail Addresses Case
|
188 |
15.3 Deceased Student Case
|
189 |
15.4 Incapacitated Administrator Case
|
191 |
15.5 Chain Letter Case
|
192 |
15.6 Administrator vs. Student Case
|
193 |
15.7 Chapter Summary
|
196 |
15.8 Your Turn
|
196 |
16 Power Concerns
|
197 |
16.1 Introduction
|
197 |
16.2 Accountability of Bloggers
|
197 |
16.3 Censorship/Free Speech
|
198 |
16.4 Cyberchondria
|
199 |
16.5 Internet Addiction
|
200 |
16.6 Online Voting
|
202 |
16.7 Whistle-Blowing
|
202 |
16.8 Chapter Summary
|
205 |
16.9 Your Turn
|
205 |
17 Cases Concerning Power
|
207 |
17.1 Google and Chinese Censorship Case
|
207 |
17.2 Demon Worship Case
|
208 |
17.3 System Privileges Case
|
208 |
17.4 The Computer Goes to Court Case
|
209 |
17.5 The Computer Becomes the Court Case
|
210 |
17.6 File Transfer Case
|
210 |
17.7 Fix Bug Case
|
211 |
17.8 Life-and-Death Computer Case
|
211 |
17.9 Chapter Summary
|
214 |
17.10 Your Turn
|
215 |
18 A Miscellaneous Collection of Cases
|
216 |
18.1 Mail Inspection Case
|
216 |
18.2 Fake Sale Case
|
216 |
18.3 Numerically Unstable Case
|
216 |
18.4 Edited File Case
|
217 |
18.5 Class Project Case
|
217 |
18.6 Hide from the IRS Case
|
217 |
18.7 Ignore the Problem Case
|
218 |
18.8 Chapter Summary
|
218 |
18.9 Your Turn
|
218 |
19 Parasitic Computing Case
|
219 |
19.1 Introduction
|
219 |
19.2 The TCP/IP Protocol
|
220 |
19.3 Communication on the Internet
|
220 |
19.4 Ethical Issues in Parasitic Computing
|
223 |
19.5 Chapter Summary
|
226 |
19.6 Your Turn
|
226 |
Appendix: Topics for Presentations, Discussions, and Papers
|
227 |
Notes
|
231 |
Selected Bibliography
|
239 |
Index
|
243 |