Answers to the Review Questions included at the end of each chapter in the third edition of Ethics and Technology can be found fairly easily. You simply need to locate and review the relevant section in each chapter, from which the question is drawn. Each Review Question is fairly simple and straightforward, and each is designed in such a way that a clear and precise answer to it can be found in the text. However, there are no “correct,” or at least no uniquely correct, answers to the Discussion Questions or to the Essay/Presentation Questions, which are also included at the end of each chapter. Hence, I make no attempt to provide “solutions,” in the conventional sense of that term, to the controversial issues raised in those questions. Instead, I provide some strategies for instructors and students to consider as they set out to resolve the issues and dilemmas raised in selected Discussion and Essay Questions from each chapter. For example, I suggest some ways in which certain conceptual tools and methodological frameworks—including the various ethical theories and critical-thinking skills introduced in the early chapters of the textbook—can be applied in answering many of the Discussion and Essay Questions included.
Please note that the full text of the Discussion and the Essay Questions themselves, included at the end of each chapter in the book, are not repeated here. So you will likely want to have the textbook in hand, and opened to the relevant pages, as you read through the various strategies provided below.
I: Strategies for selected Discussion and Essay Questions in Chapter 1 (See pages 30-31 in the textbook) A. Strategies for Selected Discussion Questions in Chapter 1 4. Gotterbarn’s arguments are well constructed, and Gotterbarn makes a plausible case for why computer ethics should be conceived of as field of professional ethics. In defense of Gotterbarn’s position, we must concede that an understanding of professional-responsibility issues is critical to an adequate understanding and analysis of computer ethics issues. In the period of computing preceding the World Wide Web, Gotterbarn’s argument for why the field of computer ethics should be conceived of as an area of professional ethics (whose primary concern was for computer professionals) was plausible. At that time, many (if not most) of the ethical issues involving computers directly affected the computing profession. Since then, however, two important factors have influenced the field. First, a new (and broader) wave of computer-related ethical issues emerged when the Internet became accessible to ordinary people. Second, most people who currently use computers, either for work or for recreational purposes, are not computer professionals. So, it would seem that we need a much broader conception of the field than the one proposed by Gotterbarn. However, we also saw that Gotterbarn’s view may ultimately turn out to be correct as more and more traditional computer-ethics issues, such as those involving privacy, property, speech, and so forth, become folded into “ordinary ethics.”
6. If we apply the first two-steps of the methodology described in Sec. 1.6 (entitled “A Comprehensive Strategy for Approaching Cyberethics Issues”), we must first identify what the ethical issues are in this case. Here, issues involving the personal privacy of Internet users would seem to be apparent; so we have identified at least one ethical issue. Next, we need to see whether there are any “policy vacuums” associated with this particular issue. There would indeed seem to be a policy vacuum in the sense that neither ISPs nor ordinary users have a clear understanding of a law or a policy for determining whether personal information about a user’s online activities can be given to a non-law-enforcement organization merely because some organization suspects one or more subscribers to an ISP of having violated copyright laws. Consider that the RIAA is not a law enforcement agency. So, a policy vacuum regarding cybertechnology once again emerges, and this vacuum or void needs to be filled with a clear and explicit policy.
B. Strategies for Selected Essay Questions in Chapter 1 1. As we saw in this chapter of the textbook, a relatively recent practice that has generated considerably controversy involved the way that the Recording Industry Association of America (RIAA) pursued individuals it suspected of exchanging copyrighted music files on the Internet. For example, we saw that the RIAA monitored the amount of “traffic” of unauthorized music files that was routed through the computer systems of users’ systems. In order for the RIAA to get the information it needed about the users who operated these computer systems, the Recording Industry requested that ISPs provide to them the names of individuals that corresponded to certain IP addresses.
Were the ISPs obligated, either legally or morally, to provide the RIAA with the actual names of individuals, which are normally protected under the anonymity of IP addresses? On the one hand, ISPs are required to comply with law enforcement authorities in cases where criminal activities are suspected of taking place in their online forums. On the other hand, having P2P software installed on one’s computer system is not in itself illegal. And even if having unauthorized copyrighted music on one’s computer system is illegal, one could still question whether the means used by the RIAA to track down suspected violators falls within the parameters of what is morally (and even legally) acceptable behavior.
If we apply the first two-steps of the methodology described in Sec. 1.6 (entitled “A Comprehensive Strategy for Approaching Cyberethics Issues”), we must first identify what the ethical issues are in this case. Here, issues involving the personal privacy of Internet users would seem to be apparent; so we have identified at least one ethical issue. Next, we need to see whether there are any “policy vacuums” associated with this particular issue. There would indeed seem to be a policy vacuum in the sense that neither ISPs nor ordinary users have a clear understanding of a law or a policy for determining whether personal information about a user’s online activities can be given to a non-law-enforcement organization merely because some organization suspects one or more subscribers to an ISP of having violated copyright laws. Consider that the RIAA is not a law enforcement agency. So, a policy vacuum regarding cybertechnology once again emerges, and this vacuum or void needs to be filled with a clear and explicit policy.
2. Theoretically, one could envision cyberethics issues being examined from an indefinite number of perspectives. For example, we could conceivably analyze these issues from the vantage point of political science, economics, history, and so forth. However, the three perspectives that we have laid out in Chapter 1 are fairly exhaustive in their scope. Consider that the professional-ethics perspective addresses many of the concerns faced by software and hardware engineers, computer science professionals, and information-technology and library-science professionals in their roles as professionals. The descriptive-ethics approach, which is empirically-based, addresses concerns that are of interest to sociologists, anthropologists, and psychologists (and thus indirectly addresses the interests of related groups such as political scientists, economists, historians, and so forth). And the philosophical-ethics approach examines cyberethics issues from a perspective that is both normative (as opposed to descriptive) and conceptual/analytical (as opposed to empirical).
We saw that the Amy Boyer case was interesting because it could be analyzed from all three perspectives. While not all cyberethics issues are analyzable from each of the three perspectives, many are capable of being analyzed from two vantage points. For example, the Napster case can be examined from the perspectives of descriptive ethics (i.e., its sociological impact) and philosophical ethics (i.e., normative questions having to do with fairness and moral obligation).
4. Some computer scientists have suggested that because: (a) Cybertechnology is relatively new; (b) Cybertechnology raises ethical issues; it follows that (c) Cybertechnology has raised new ethical issues. They point out, for example, that recent technologies such as data encryption raise certain kinds of social and ethical concerns that did not exist prior to the introduction of that technology.
Some computer scientists and philosophers have also argued that because computer technology has had a global impact with respect to ethical issues, a new global (or universal) theory of ethics is needed. In other words, Western ethical theories such as utilitarianism are no longer adequate to deal with ethical issues that are global in scope.
Other philosophers have taken a slightly different tack to show why a new ethical framework is needed. Philosophers Hans Jonas (2006) and Luciano Floridi (1999) have argued, independently of one another, that modern technology has introduced new “objects of moral consideration.” For example, recent work in the fields of artificial intelligence has contributed to the creation of software robots (“softbots”); and developments at the intersection of cybertechnology and biotechnology has made possible the creation of certain kinds of objects, entities, or “creatures” that appear to be human-like. As a result, some philosophers argue that we need to expand our sphere of moral consideration to include such objects and entities; and in the process, we will also likely need a new ethical framework.
In our analysis of question of whether any computer ethics issues are unique (in Chapter 1), however, we saw that our existing ethical framework is fairly robust. We also that if we make certain adjustments to the standard, three-step method used in applied ethics, then we can avoid having to construct a new ethical framework For example, if we include the recommendations suggested by James Moor and Philip Brey, we can proceed with our existing set of ethical theories. Following Brey, we would first need to identify and disclose any embedded values in technology (i.e., either transparent or non-transparent moral values); and following Moor, we need to identify and resolve any policy vacuums and conceptual muddles that arise, before we can apply the traditional ethical theories.
II: Strategies for Essay Questions in Chapter 2 (See page 72-73 in the textbook) 1. Another example of a discussion stopper would be a remark to the effect, “Morality and ethics are really about religion, so questions about morality only apply for those who have religious beliefs.” Here, the suggestion is that morality is tied exclusively to religious beliefs and that moral issues cannot be debated independently of those beliefs. When we examined the connection between religion and morality, however, we saw that religion was as one of many perspectives from which moral issues could be examined. And we saw that the religious approach to these issues was very different from the approach taken by (philosophical) ethics, which we defined as “the philosophical study of morality.” For example, we saw that philosophical ethics analyzes a moral system from the point of view of ethical theories and logical argumentation.
Unfortunately, it is very easy to fall victim to one or more of the four discussion stoppers that we identified in Chapter 2, because, at first glance, each stopper seems to have some merit. Upon closer inspection, however, we saw why each also is conceptually flawed.
2. If you approach this problem from a utilitarian perspective, you will want to do what is best for the majority of employees and for the company itself. So, if laying off 5% of the workforce would help to bring about more desirable ends for the greatest number of employees affected by the decision, then a utilitarian would favor Proposal # 2. A deontologist, on the other hand, will want to choose whichever option is fair to all of the employees (not just the majority). As such, the deontologist would likely favor Proposal # 1, since everyone would receive a 5 percent cut in pay. In Kant’s deontological scheme, Proposal #1 would be the right course of action because the principle behind that proposal is “universalizable” in the sense that it can be applied to everyone in the corporation, without exception. And, a Kantian would argue that such a principle would treat each employee as an end-in-him/herself, as opposed to a means to some end.
3. In this scenario, you encounter a genuine ethical dilemma. It is a dilemma because you must choose between one of two undesirable options: lying or breaking a promise. A utilitarian would most likely choose lying in order to save the life of her friend. However, we saw that utilitarianism, as a moral principle, also allows some individuals to be treated as means to the ends of others. So utilitarianism is not a fully satisfactory ethical theory, and many philosophers reject solutions to ethical dilemmas that are based solely on utilitarian principles.
David Ross’s scheme of Act Deontology offers an alternative strategy for approaching this kind of dilemma by asking us to look at the “situation” or “circumstances,” as opposed to consequences, in deciding which course of action to take. Ross points out that we would have to be omniscient to know whether a particular action would necessarily lead to a desirable outcome (consequence). So, in Ross’s scheme, the pursuit of desirable outcomes or consequences – i.e., the utilitarian model – cannot be our guiding principle in ethical deliberation. On the other hand, Ross’s scheme also requires that we use a form of ethical intuitionism (similar to mathematical intuitionism) in each situation to “weigh” between the various “prima facie duties” in order to arrive at the correct decision for that particular situation. And, as we noted in Chapter 2, this aspect of Ross’s theory has been controversial.
4. We saw that each of the four traditional ethical theories had its own particular strengths and weaknesses, and that none of these theories, individually, could withstand certain kinds of criticisms. However, we also saw the clever way in which Moor’s theory of “just consequentialism” is able to combine the best aspects of both the utilitarianism and deontological ethical theories, while managing to avoid some of weaknesses of each theory. Moor’s theory also presents us with a concrete, two-step strategy for deliberating on how to proceed in the case of each ethical issue. You may want to review that strategy, described on page 66 in the textbook.
III: Strategies for selected Discussion and Questions in Chapter 3 (See page 98-99 in the textbook) A. Strategies for Selected Discussion Questions in Chapter3 3. Construct the best arguments you can to advance the positions that have been held on both sides of the Napster dispute. Next compare the strength of your argument for why the sharing of on-line proprietary music files should be allowed to the strength of your argument for why it should not. Is either argument sound? If not, is either argument deductive (but with one or more false premises)? Is either inductive? Is either, or are both, arguments fallacious? You may also want to consult Appendix G (available on this Web site) to go over the guidelines for determining how to verify the truth and falsity of statements that make up arguments.
4. In constructing this argument, you may want to look ahead to some of the sample arguments included in Chapter 5, on privacy in cyberspace. Once you construct the best argument you can for why personal privacy should be strongly protected in all e-commerce activities, test your arguments against the standards for validity and invalidity that we examined in Chapter 3. Also determine whether your argument contains any informal logical fallacies by reviewing the list of common fallacies that we examined in Sec. 3.9.
B. Strategies for Selected Essay Questions in Chapter3 1. One could construct the following kind of argument for why students should be required to take a course in cyberethics.
Premise 1. Undergraduate student should be required to take courses on topics that examine ethical and social issues that will impact them in their professional and personal lives.
Premise 2. Cyberethics courses examine ethical and social issues that impact students in both their professional and personal lives.
Conclusion. Undergraduate students should take a course in cyberethics
This argument is valid or deductive because if the premises are both true, the conclusion must also be true. However, we don’t yet know whether the premises are, in fact, true. Premise 1 is somewhat controversial in that the truth of that statement can be challenged. So the argument is not sound. If we modified Premise 1 slightly to read, “Generally, students should be required…”, the argument would be invalid (instead of deductive), because it would then be possible for one or more premises to be true and the conclusion false. However, because the conclusion would likely be true when the premises are true, this argument would also be inductive. And since it premises would be true in the actual world, this particular inductive argument would be stronger overall than it was in its deductive form.
2. A good starting point in this case would be to locate a copy of either Time or Newsweek magazine. Each periodical has columns on technology issues, and each has run cover stories on Napster, Internet pornography, Internet pedophilia, etc. Once you have located a periodical that contains an article that addresses a particular ethical or social involving cybertechnology, isolate one or more arguments made by the author(s). Next, test each argument via the seven-step strategy we used in Chapter 3 (pages 90-91 to determine whether each argument is deductive, inductive, or fallacious.
IV: Strategies for selected Discussion and Essay Questions in Chapter 4 (See pages 128-129 in the textbook) A. Strategies for Selected Discussion Questions in Chapter 4 1. You can begin by reviewing Table 4-1 on p. 110. Once you have assessed the individual strengths and weaknesses of professional codes, determine whether the overall benefits of having professional codes outweighs the disadvantages of not having them. Apply your conclusion to a current case, such as the one involving computer professionals who are working on aspects of the National Missile Defense System. Or consider a hypothetical scenario where computer professionals are working on the development of a kind of “spyware” to be used by government officials for the purpose of monitoring the on-line activities of its citizens.
B. Strategies for Selected Essay Questions in Chapter 4 1. In examining the five computer-related professional codes (included in Appendixes A-E on the book’s Web site), you will see that the IEEE-CS/ACM Code of Software Engineering and Professional Practice (SECEPP) is the most comprehensive. Review the full text of SECEPP, which you will find in Appendix E. This professional code is fairly comprehensive. Determine whether it is also internally coherent and consistent.
Should a professional code of ethics be expected to be exhaustive in the sense that it can provide its members with a precise or unambiguous answer for every possible ethical issue that may present itself within the context of one’s professional duties and obligations? What are some of the reasonable expectations of a professional code?
2. Here, you face a genuine ethical dilemma. You have an obligation as a spouse and parent-to-be to provide financially for your family. On the contrary, you have personal convictions and principles that have to be balanced against considerations of career advancement. You would no doubt want to express the concerns you are having with your spouse, who could help you in your deliberation in this particular dilemma. One additional variable, which is external to the case per se but which is also very relevant to your deliberation, has to do with the state of the economy at the time you encounter this particular dilemma. For example, if alternative employment with a similar salary is available to you, then your options are very different than they would be in a bad economy. This factor can clearly affect your autonomy with respect determining whether to leave or remain in your current position.
3. You may already have seen the similarity between the hypothetical scenario posed in Discussion Question 4 and the BART case that we examined. Review that case and then decide whether you would follow the same course that the three employees at BART took. Which factors, if any, might influence you to make a decision that would be different from the one made by the engineers at BART? Were they justified in blowing the whistle? Would you be justified in this case?
4. In the case involving BART, and in the hypothetical scenario (similar to the BART case) that we considered in the preceding question, you had to decide whether, on moral grounds, you are justified in blowing the whistle. In this case there were no legal constraints preventing you from for doing so. (Of course, you could have been fired for blowing the whistle, as the BART engineers were; but it would not have been illegal to blow the whistle in those cases.) Currently, however, there are certain anti-whistle-blowing provisions in the Homeland Security Act that make it illegal to blow the whistle. Thus, depending on the nature of your work and on the status of your employer, you may now find yourself in a situation where you have to consider whether it would be illegal to blow the whistle even when it may seem morally permissible – perhaps even morally required of you – to do so. Would you still be willing to break the law (and possibly face a jail sentence in doing so), if you thought that blowing the whistle in a certain case might save lives?
V: Strategies for selected Discussion and Essay Questions in Chapter 5 (see pages 169-170 in the textbook) A. Strategies for Selected Discussion Questions in Chapter 5 2. As a test case, connect to the search engine Google.com and then type in your name in Google’s entry box. How many “hits” were returned under your name? Assuming that one or more hits were returned, was any of the information that you were able to retrieve about yourself information that you personally had authorized to be on the Web. Were you surprised that any of the information about you identified on Google was so easily accessible to the general public? Should that kind of personal information be treated as “public information”? What recourse should you have, if you wish to get that information about you removed from the Internet.
3. Striking the “appropriate” balance in this case has not been easy. Generally, in the US, privacy laws have tended to favor the interests of businesses and organizations in the commercial sector rather than individuals. In Europe, on the other hand, privacy policies and data-protection schemes have been friendlier to individuals. Judith DeCew has argued that we should presume in favor of individual privacy and then let people negotiate their personal information in ways that they choose.
Further complicating the process of trying to balance the interests of personal privacy and information access has been recent concerns about national security. This has been especially apparent in period following the 9/11 attack.
B. Strategies for Selected Essay Questions in Chapter 5 1. In the early days of computing, the main concern about privacy invasion tended to be centered around issues associated with fears involving governments snooping on their private citizens. This was especially the case in the 1960s, when the U.S. government considered the feasibility of constructing a huge, national database that would contain information about every citizen. Fears about this proposal were then allayed when it was determined that such a database would not be constructed at that time. In the 1970s through the 1990s, fears regarding privacy violations of individuals shifted away from concerns about the federal government to worries about businesses and organizations in the commercial sector that collect and exchange personal information about individuals. Following September 11, 2001, however, privacy concerns have once again shifted – this time, moving away from concerns about privacy invasions in the commercial sector to privacy concerns about the new roles that the federal government plays in gathering personal information. The USA Patriot Act, for example, has concerned many civil libertarians who fear that personal privacy has been significantly eroded and that it may never again be fully restored.
3. In the days immediately following 9/11, there were some signs that people would be willing to trade-off bits of their privacy in return for greater security. Indeed, many Americans still seem willing to do this. However, there have also been attempts by privacy advocates to “reclaim” some of the individual privacy rights that appear to have been undermined by controversial legislation such as the Total Information Awareness Act. For example, under certain provisions of this act, it would be permissible for airlines to conduct a background check on one’s credit history before determining whether that individual is considered a security risk. (In other words, an association is made between one’s credit record and that person’s likelihood of being a terrorist; opponents of this legislation have argued that it unfairly biases poorer individuals.)
In some sense, privacy interests have already been reassessed and recalibrated in the post-September 11 world. Yet, many American still claim to value their privacy. One way to proceed with respect to privacy expectations in the current period is for individuals to concede that they must be willing to give away more pieces of their privacy to the federal government for purposes of national security, but that they should be able to expect to retain their privacy in cases of commercial transactions. One way of doing this is to think of privacy not so much in all-or-nothing terms but rather how individual privacy can be protected in various sectors – i.e. sectors involving medical privacy, financial privacy, employee privacy, and so forth. Personal privacy in most of these sectors could still be protected from commercial interests, even if the federal government has greater access to our personal information.
VI: Strategies for selected Discussion and Essay Questions in Chapter6 (See pages 197-198 in the textbook) A. Strategies for Selected Discussion Questions in Chapter 6 2. Any attempt to strike an appropriate balance between security and convenience will always be controversial. For one thing, people often have very different beliefs about where the default should lie – i.e., should we presume in favor of security or of convenience, as a starting point? If we opt in favor of more secure computer systems, then the likely result will be a loss of some convenience for users. If we presume in favor of convenience, on the other hand, then certain aspects of security can be compromised. As computer systems become increasingly vulnerable to attacks from “malicious” programs, more and more ordinary users may be willing to tolerate less convenience and ease of use in order to achieve greater security.
B. Strategies for Selected Essay Questions in Chapter 6 1. This question presents us with a case for examining moral relativism, described in Chapter 2. You may want to review that discussion on pages 50-52 in the textbook. Those subscribing to the Hacker Code of Ethics may believe that “innocent” or non-malicious hacking is acceptable. But the broader community has not been as sensitive to the distinctions that computer enthusiasts draw when it comes to hacking. So, it would seem that from the point of view of descriptive ethics, we have two different moral systems. But it doesn’t follow that members in each group are free to act as they please. The hacker community is clearly a sub-group in the population. As such, it can work to change laws, as well as attitudes, toward non-malicious hacking. However, to embrace its own standards for hacking as an acceptable alternative to the general laws and policies for hacking would also be to embrace a form of moral relativism.
2. Unfortunately, Spafford’s position might seem inconsistent because he claims that one is doing “the right thing” by breaking into the hospital computer system to save a life, even though breaking into computer systems is “unethical” because break-ins always cause harm. However, we also noted that Spafford’s position can be justified on a version of Act Deontology, as described in Chapter 2. There we saw that it is the agent’s actions, not the consequences that result from actions, which need to be assessed in moral dilemmas. So, Spafford could consistently argue that, all things being equal, it is wrong to break into a computer system, and he can also make exceptions on nonconsequentialist grounds for when such a break-in is justified. You may want to review David Ross’ version of Act Deontology (pages 55-57 in the textbook).
3. Once again, we have a question about whether the ends (desired) justify the means (used to achieve the ends). In this particular case, the injured candidate would seem to have a presumptive right to know whether the person who had defamed him or her on the Internet was indeed a rival political opponent. However, if we allow the breach of anonymity in this case, why shouldn’t we allow it in other cases involving on-line defamation? But why stop with defamation? We see that we may encounter a slippery-slope line of reasoning (see Chapter 3). An important question here, at the general level, is: When should an ISP be required to reveal the identity of one of its subscribers to some external source? Consider, for example, the incident in which the RIAA solicited from ISPs the names of individual subscribers that it suspected to be illegally sharing copyrighted music via P2P systems. Should ISPs comply with these requests in such cases, even when no direct warrants have been issued by law-enforcement organizations?
VII: Strategies for selected Discussion and Essay Questions in Chapter 7 (see pages 225-226 in the textbook) A. Strategies for Selected Discussion Questions in Chapter 7 1. In one important way, the Internet entrapment case illustrates the classic tension between utilitarians and non-consequentilists that can be found in a wide range of contemporary debates involving the means-ends distinction, which we considered above. (See, for example, the strategy for resolving Question 3 in Chapter 5.) Utilitarians would argue that the end (catching the pedophile) justifies the means used (entrapment on the Internet). Clearly, there is something desirable in being able to catch pedophiles. But is the use of any means whatsoever acceptable? Consider that we could have inspectors constantly monitoring conversations between Internet users to catch pedophiles. Is that the kind of society in which we want to live?
Recall the example of computerized matching of electronic records that we discussed in Chapter 5. There we saw that the prospect of catching welfare cheats and deadbeat parents was desirable, but that the means used were highly questionable and very controversial. Non-consequentialists, such as deontologists, argue that we cannot base an adequate moral system solely on the goal of achieving desirable consequences, as utilitarians do.
3. Both the critics and proponents of Clipper believed that the central issue in that 1990s’ controversy would arise again in a different guise. At issue is whether the government can be trusted to hold one of the keys (in a public-key encryption system) in escrow. In the post-September 11 era, however, there seems to be much more sympathy for the view that the government should be able to have a technology such as Clipper. On the contrary, it is not clear how external market forces will respond to American electronics products that have embedded in them an encryption device similar to Clipper.
4. Drafting specific laws to handle certain kinds of crimes can be useful in helping to understand the nuances of certain crimes and in helping to prosecute a crime as a crime of a particular type. For example, we have general crimes involving homicide, and specific crimes involving vehicular homicide. In this case, it is believed that a separate crime for homicides resulting from the use of motor vehicles is useful both in understanding and prosecuting such crimes. Analogously, having cybercrime statutes can help us both to understand and prosecute certain crimes involving cybertechnology is useful. However, attempting to understand and prosecute every crime involving the use of cybertechnology under that category could also be problematic and confusing. Hence, separating crimes that depend solely on cybertechnology from those that happen merely to involve the use of that technology to some degree would seem to be useful.
B. Strategies for Selected Essay Questions in Chapter 7 1. The use of biometric technologies in large public places such as airports and sports stadiums would seem to be justified. Although this technique also is a form of computerized matching, it differs in significant respects from the kinds of matching operations used to track down deadbeat parents and welfare cheats. In those cases, databases containing the names of individuals presumed to be innocent were cross-referenced in the hope of obtaining one or more “hits,” which identified individuals whose names reside in two incompatible databases (e.g., the database of federal employees and the database of welfare recipients). In the case of biometric matching, however, one of the databases used contains a list of names and photos of known or suspected criminals and terrorists.
VIII: Strategies for selected Discussion and Essay Questions in Chapter 8 (See pages 261-262 in the textbook) A. Strategies for Selected Discussion Questions in Chapter 8 2. The “common good” approach used by McFarland (and others) to analyze ethical issues has its roots in natural law theory. Natural law, which traces it origins to the writings of Aristotle and St. Thomas Aquinas, operates on the assumption that every object has a natural purpose or end. Using McFarland’s insight, we see that the purpose or natural goal of information (as an ‘object” of some kind) is something to be shared and communicated. The view that information should be fee is not necessarily incompatible with natural law theory; however, that theory need not require that information be totally free. Nonetheless, natural law provides us with a certain presumptive principle about how we should proceed in the debate over intellectual property – viz., that information should be shared and communicated. So using this presumptive principle, we could argue against framing overly oppressive and restrictive intellectual property laws that “commodify” information and that militate against the sharing and communicating of information.
3. The “intellectual commons” is analogous to the physical commons in that it provides people with a common area in which they can congregate and freely use the resources available. (In the case of the intellectual commons, the resources are ideas and information that can be freely shared.) As stronger intellectual property laws are passed, the intellectual commons tends to shrink. Many, including Lawrence Lessig, believe that the intellectual commons is shrinking. Consider once again the case of Eric Eldred’s Web site, which we examined in Sec. 8.4.3. We saw that with the passage of the Sonny Bono Copyright Term Extension Act in 1998, some books that were about to enter the public domain will instead remain copyrighted.
James Boyle’s suggestion that we think of the intellectual commons along the lines of the environmental movement of the 1970s could help us to reframe the current debate. For example, thinking of it in this way can help us to see that the short-sightedness of arguments used in favor individual rights for ownership of land could easily have destroyed the environment. When applied to the intellectual commons, the environmental analogy can also be used to muster support among the various “stakeholders” to help preserve the intellectual commons from further degradation.
B.Strategies for Selected Essays Questions in Chapter 8 1. If we proceed from a principle like “information wants to be shared” (but not necessarily free), then we can frame intellectual property laws and policies that help to keep information accessible to individuals while, at the same time rewarding the producers of proprietary information, including computer software. Such a presumptive principle could also help to reverse the trend of commercializing information, which has greatly reduced its ability to be shared.
3. There would certainly appear to be an inconsistency in that both groups flip-flop their positions when it comes to privacy vs. property claims. Each side seems to want to have it both ways. We can find similar inconsistencies between liberals and conservatives with respect to life issues. For example, conservatives who are pro-life in the abortion debate are often pro-death penalty in the debate over capital punishment (despite the fact that conservatives claim to believe in the “sanctity of life,” which implies that all human life is sacred). Conversely, liberals tend to be pro-choice in the abortion debate, but are anti-death penalty in the capital punishment debate (presumably because they believe that taking any human life is morally wrong). So perhaps it is not surprising that with respect to the personal privacy and intellectual property debates, liberal and conservatives are also inconsistent in their respective views.
IX: Strategies for selected Discussion and Essay Questions in Chapter 9 (see pages 296-297 in the textbook) A. Strategies for Selected Discussion Questions in Chapter 9 2. “Deep linking” is the ability to connect directly to a sub-page of a Web site without first having to access the site’s main page or home page. We saw that in the case of Ticketmaster v. Microsoft, deep inking can be controversial. One problem with deciding controversial cases involving deep linking on the Web has to do with determining what the legal status of a Web site is. If a Web site is considered private property, then users wishing to enter that site can be told which path they must take (just as the owner of home can inform visitors about which door they must use to enter the house). If a Web site is considered a public space, on the contrary, then the site’s owner should not be able to restrict users’ movements in that space by determining which access point (if more than one is available) they must use to enter when linking to that site.
3. We saw that Spinello believes that spam is morally objectionable for two reasons; one utilitarian and the other deontological. For one thing, he points out that spam has harmful consequences, because of its financial impacts, such as cost shifting and the consumption of valuable network resources. Spinello notes that spam consumes and strains valuable computing resources. We saw that he also pointed out that even if Internet resources were infinite and there were no negative utilitarian consequences, spam would still be morally objectionable because it does not respect the autonomy of individual users as persons or as “ends-in-themselves.” He appeals to (Kant’s version of) a deontological argument to show why spam cannot be universalizable. In Chapter 2, we saw that in Kant’s system, a practice is universalizable only if it can coherently apply to all persons without exception. So, Spinello makes a plausible case for why spam can be considred morally objectionable on deontological as well as utilitarian grounds.
Miller andMoor (2008) take a different path in their analysis of moral objections to spam. For one thing, they argue that an adequate ethical analysis of spam also needs to take into consideration criteria such as accountability and deception. Recall their distinction between Unsolicited Commercial Bulk Email (UCBE) that is non-fraudulent (NF-UCBE) and that which is fraudulent (F-UCBE). Miller and Moor believe F-UCBE should always be condemned, they argue that some cases of NF-UCBE can be justifiable from a moral point of view, in certain cases. They imagine a scenario in which a whistleblower might send a message to a large commercial mailing list to alert recipients of an injustice or a danger. Miller and Moor suggest that in this scenario, the whistleblower may have justifiable reasons for sending the email broadly and for wishing to be anonymous. They point out Miller that in this whistle-blowing scenario, the “intent” of the sender needs to be taken into consideration. So, in their scheme, there can be some cases where sending spam in the form of NF-UCBE would be morally justifiable.
B. Strategies for Selected Essay Questions in Chapter 9 1. On the one hand, companies like Sony BMG have an interest, as well as a right, in protecting their online content. On the other hand, these companies also have an obligation to obey the law in their effort to track down individuals who make unauthorized use of their copyrighted content. While DRM systems are legal, it is not clear that using spyware of the sort employed by Sony BMG to track users is also legal. It would seem reasonable for users to expect to be told that, when they purchase a CD, their activities can be monitored via the company’s DRM systems. In that case, the practice would be open (or transparent) and could be more easily challenged in the courts, and a ruling one way or another on the legality of this practice could be established. So, a model of transparency on the part of the companies who use DRM systems would seem to be the best compromise at this point in time.
2. The Communications Decency Act (CDA) was struck down as unconstitutional because the US Supreme Court ruled that this act was over-reaching in terms of its scope. However, the portion of CDA known as the Child Pornography Protection Act (CPPA) was originally upheld, despite the Court’s ruling against CDA overall. The CPPA was also eventually struck down as unconstitutional (in 2002). The Child Online Pornography Act (COPA), passed in 1998, was also declared unconstitutional. One problem with each of these child-pornography acts is that they failed to distinguish between real children being represented on a computer screen in some type of pornographic depiction, and “virtual children” (i.e., computer-generated images of children) being similarly represented. To determine whether these acts should have been declared unconstitutional, review the full texts of the court decisions, which are available on the Web.
We also saw that the Supreme Court upheld the Children’s Internet Pornography Act (CIPA). Yet the majority of the Court’s members also argued that it was unconstitutional to filter information accessed by adults in public libraries, where CIPA applies. So some have questioned whether the Court has been consistent in its decisions regarding online pornography, as it affects children.
X: Strategies for selected Discussion Questions and Essay Questions in Chapter 10 (see page 326 in the textbook) A. Strategies for Selected Discussion Questions in Chapter 10 1. If cybertechnology is a vital human resource as Jeremy Moss suggests it is, then having access to that technology would seem to be very important. And if access to that technology is as vital and as important as Moss claims, then it would seem to follow that developed nations in the West have some moral obligation to provide developing nations with better access to cybertechnology.
2. We have seen some of the paradoxical characteristics of race and the Internet. On the one hand, the Internet is “color blind” in that Internet users are not conscious of race in terms of the kinds of physical characteristics that are apparent to people when they interact in geographical space. On the other hand, the Internet can and has been used as a tool to promote and spread racist speech. European nations, especially France and Germany, have been more interested in censoring race-related hate speech (such as neo-Nazi propaganda) and have been less concerned with censoring pornography. The US, on the other hand, has been less concerned about censoring speech involving hate and racial prejudice than with controlling pornography as a form of speech.
3. Within the US, there is some debate over whether universal service for cybertechnology is a necessary condition for receiving a public education. In Chapter 10, we saw that in the US, access to free public education from grades 1 through 12 is considered a “positive right.” Hence, that the US government is legally obligated to provide access to public education for all school-age children. And some argue that if having access to cybertechnology in homes is a necessary condition for one’s acquiring that education, the US government must ensure that all school-age children attending public schools have such access in their homes.
4. With respect to the goal of providing cybertechnology to the disabled, we saw that the World Wide Web Consortium (W3C) established the Web Accessibility Initiative (WAI). This initiative has mandated that accessibility features for disabled persons be built into the design of all Web interfaces for computer systems.
We also saw that some have argued that improving access for the disabled is good, because all people (disabled and non-disabled as well) will benefit. There may indeed be some truth to this argument. However, the danger in proceeding with that kind of utilitarian-based argument is that it assumes that greater benefits for the majority of users will continue to be realized. What if it turned out that, at some future date, non-disabled persons would not necessarily benefit from improvements made to access for the disabled? And further suppose that these improvements were also very costly. In this case, it would seem that if we followed the utilitarian analogy we would be justified in not continuing to improve technological access for disabled persons. But would this be the right thing to do from a moral point of view? You can probably see the danger of proceeding from a utilitarian perspective on this issue.
B. Strategies for Selected Essay Questions in Chapter 10 1. In trying to make sense of the question, “Who should be held responsible for the actions of ES systems?” it would be helpful to return to our discussion of the problem of “many hands” in Chapter 4. There we saw that in the case of the Therac-25 malfunctions, several parties could be held accountability. For example, we saw that moral responsibility is not an “exclusionary” concept. That is, because X is responsible for Z, it doesn’t follow that Y also cannot be held responsible for Z. So it would seem that in the case of an ES involving an “expert doctor,’ the following parties could each bear some level of moral responsibility: the hospital that uses the system; the hospital employee who may have entered incorrect information into the system; the manufacturer who sold the system to the hospital; and the software and hardware engineers who built the system for the manufacturer.
XI: Strategies for selected Discussion Questions and Essay Questions in Chapter 11 (see pages 357-358 in the textbook) A. Strategies for Selected Discussion Questions in Chapter 11 1. We saw that Gordon Graham believes that online communities promote individual freedom because members can more easily disregard personal attributes, such as gender and ethnicity, which are more obvious in traditional communities. However, we also noted online communities have also had some negative effects. In addition to threatening traditional community life, they have: facilitated social polarization (because of the very narrow focus of some groups); minimized the kind of face-to-face communications (that have defined traditional friendships); and facilitated anonymity and deception (thereby enabling some forms of socially and morally objectionable behavior that would not be tolerated in traditional communities).
Mitch Parsell considers some aspects of online communities whose focus tends to be on topics and issues that are divisive and narrow. He worries that “extremely narrowly focused” online communities can be dangerous because they “can polarize attitudes and prejudices,” which can lead to increased division and “social cleavage.” So, rather than reinforcing and extending positive values of community life, Parsell suggests that some narrowly focused online communities threaten social cohesiveness.
2. Many critics worry that political blogs are dangerous for democracy because they disseminate information that typically has not been vetted by journalistic standards. So, there are questions of accuracy and reliability with political blogs, and critics worry because it is generally believed that truth is essential for a democracy to thrive. However, Alvin Goldman is not as pessimistic about these factors as many critics are. For one thing, he notes that even if some bogs are biased and inaccurate, it doesn’t follow that the entire blogosphere is biased (appealing to kind of Fallacy of Composition critique. But we also saw that Goldman suggests that the “zealous advocacy” of some political bloggers, as well as the “adversarial process” facilitated by blogs in general, may even turn out to be a good thing? How can that be? Goldman believes the system of checks and balances, which are “collectively stronger than the kinds of filtering mechanisms used in the conventional media” may be a good mechanism for “truth-determination.” In this sense, Goldman implies that the blogosphere may ultimately contribute to the preservation of democracy and democratic ideals.
B. Strategies for Selected Essay Questions in Chapter 11 1. For one thing, Rheingold’s portrayal of virtual interaction in the future does not address the kind of harm that could result from individuals engaging in “cybersex.” Because sexual activity of this type is considered virtual, i.e., in the sense that it takes place in cyberspace or virtual space, it does not follow that this activity is unreal (see the Virtuality Fallacy discussed in Chapter 3). Marital infidelity that takes place in cyberspace can still cause harm to the injured party. Brey has shown why we cannot simply dismiss the kinds of harm that can result from behavior carried out in virtual environments as unreal harms.
2. Critics of VR technologies seem to be correct in that, all things being equal, VR experiences are less fulfilling than (“real”) experiences in the physical world. In this sense, then, we can agree with the critics of VR that virtual reality is an “impoverished reality.” However, some people may be capable of experiencing something only through the use of VR technology. For these people, including those with disabilities of a certain sort, the VR experience of some activity would seem to be preferable to not being able to experience it at all. An interesting question, however, is whether some individuals may eventually come to prefer virtual interactions to the kinds of interactions that take place in the physical world. For example, some may prefer to conduct all of their social activities in cyberspace. It is one thing, if someone can interact only in a virtual forum because of geographic constraints or because of a disability. However, if persons prefer virtual interactions because it can eliminate the need of one’s ever having to interact at all in face-to-face social situations, then something of what we have come to believe is a vital part of natural human discourse could be threatened.
XII: Strategies for selected Discussion Questions and Essay Questions in Chapter 12 (see p. 389-390 in the textbook) A. Strategies for Selected Discussion Questions in Chapter 12 2. Would you want intelligent machines making all you house-hold decisions for you? On the one hand, the thought might be appealing—after all, who wants to have to be bothered with routine tasks that seem merely mundane? On the other hand, there are certain risks to consider in delegating these tasks and chores solely to machines. Recall the scenario (in the textbook) involving E. M. Forster’s description of what can happen to humans when they become too dependent on a machine. Also consider what could happen to us if we delegate too many “cognitive” tasks to machines.
3. As a research subject, you could ask for a guarantee that your genetic data would not be used in subsequent processing without your explicit authorization. You could also insist that your data not be sold to third parties. Perhaps you could also find out what would happen if the organization to whom you volunteered you genetic data were to cease operations as that organization—i.e., either declare bankruptcy or be taken over by another organization (in the public or the private sector). You could also ask what role the government would take in your behalf in protecting and safeguarding the personal genetic data about you that resides in the organization’s computer database.
4. John Weckert offers an interesting discussion of the question of how we should proceed with research and development in nanotechnology—i.e., that the “presumptive principle” should be “in favor of” conducting this research. At present, there are no universally agreed upon guidelines in place for conducting research at the nano-level. An ethical framework for nanotechnology research that has been advanced by Ray Kurzweil is based on the ELSI (ethical, legal, social implications) model, used in the Human Genome Project. The ELSI model has been defended as a proactive, rather than a reactive, set of guidelines. But Moor and Weckert reject the ELSI model for nanotechnology, which they describe as an “ethics-first” model. Moor and Weckert are also critical of the “ethics-last” model, as well, which they note has been the standard in many fields of applied ethics. Because the future advances in nanotechnology are difficult to predict, they argue that we can’t wait to get all of the facts before conducting nanotechnology research. They correctly note that ethics is “dynamic” and that the process has to be continually evaluated in terms of ethics and policies. In effect, the (nanotechnology) genie is already out of the bottle! What we need now is a set of clear ethical and policy guidelines to direct us in future research in this area.
B. Strategies for Selected Essay Questions in Chapter 12 2. One concern that could arise has to do with the converging aspects of computers and humans into cyborgs. Will humans, as they acquire more and more computer parts (e.g., bionic chips and implants), become more computer-like? And will computers, as they acquire emotional states and more intelligence, become more human-like? Will there come a time in the near future when it will be difficult to distinguish some humans from some machines? It would seem that the emergence of cyborgs illustrates one way in which the pace of accelerated convergence of cyber and non-cybertechnologies can generate some additional ethical and social concerns.