Ethics for the information age 6th global edtion quinn

551 1.9K 0
Ethics for the information age 6th global edtion quinn

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

www.downloadslide.com GlobAl EdItIon Ethics for the Information Age SIXth EdItIon Michael J Quinn www.downloadslide.com Global Edition www.downloadslide.com This page is intentionally left blank www.downloadslide.com Global Edition www.downloadslide.com Editorial Director, ECS Marcia Horton Head of Learning Asset Acquisition, Global Edition Laura Dent Acquisitions Editor Matt Goldstein Program Manager Kayla Smith-Tarbox Director of Marketing Christy Lesko Marketing Manager Yezan Alayan Marketing Assistant Jon Bryant Director of Production Erin Gregg Senior Managing Editor Scott Disanno Acquisitions Editor, Global Edition Murchana Borthakur Associate Project Editor, Global Edition Binita Roy Project Manager Camille Trentacoste Manufacturing Buyer Linda Sager Senior Manufacturing Controller, Production, Global Edition Trudy Kimber Text Designer Sandra Rigney Manager, Text Permissions Tim Nicholls Text Permission Project Manager William Opaluch Cover Image © Tom Wang Shutterstock Media Project Manager Renata Butera Full-Service Project Management Cypress Graphics, Paul C Anagnostopoulos Credits and acknowledgments borrowed from other sources and reproduced, with permission, appear on the appropriate page in the text Pearson Education Limited Edinburgh Gate Harlow Essex CM20 2JE England and Associated Companies throughout the world Visit us on the World Wide Web at: www.pearsonglobaleditions.com © Pearson Education Limited 2015 The rights of Michael J Quinn to be identified as the author of this work have been asserted by him in accordance with the Copyright, Designs and Patents Act 1988 Authorized adaptation from the United States edition, entitled Ethics for the Information Age, 6th edition, ISBN 978-0-13-374162-9, by Michael J Quinn, published by Pearson Education © 2015 All rights reserved No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without either the prior written permission of the publisher or a license permitting restricted copying in the United Kingdom issued by the Copyright Licensing Agency Ltd, Saffron House, 6–10 Kirby Street, London EC1N 8TS Many of the designations by manufacturers and sellers to distinguish their products are claimed as trademarks Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial caps or all caps All trademarks used herein are the property of their respective owners The use of any trademark in this text does not vest in the author or publisher any trademark ownership rights in such trademarks, nor does the use of such trademarks imply any affiliation with or endorsement of this book by such owners ISBN 10: 1-292-06123-5 ISBN 13: 978-1-292-06123-8 (Print) ISBN 13: 978-1-292-06190-0 (PDF) British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library 14 13 12 11 10 Typeset in Minion and Nofret by Cypress Graphics Printed and bound by Courier Westford in The United States of America www.downloadslide.com Brief Contents Preface 21 Catalysts for Change 29 An Interview with Dalton Conley 75 Introduction to Ethics 77 An Interview with James Moor 133 Networked Communications 137 An Interview with Michael Liebhold 187 Intellectual Property 189 An Interview with June Besek 251 Information Privacy 255 An Interview with Michael Zimmer 293 Privacy and the Government 297 An Interview with Jerry Berman 343 Computer and Network Security An Interview with Matt Bishop 385 Computer Reliability 389 An Interview with Avi Rubin 433 Professional Ethics 435 An Interview with Paul Axtell 475 10 Work and Wealth 479 An Interview with Martin Ford 519 Appendix A: Plagiarism Index 527 523 347 www.downloadslide.com This page is intentionally left blank www.downloadslide.com Contents Preface 21 Catalysts for Change 1.1 Introduction 1.2 Milestones in Computing 1.2.1 1.2.2 1.2.3 1.2.4 1.2.5 1.2.6 1.2.7 1.2.8 1.2.9 1.2.10 1.2.11 1.3 30 33 Aids to Manual Calculating 33 Mechanical Calculators 34 Cash Register 36 Punched-Card Tabulation 37 Precursors of Commercial Computers 39 First Commercial Computers 41 Programming Languages and Time-Sharing Transistor and Integrated Circuit 43 IBM System/360 45 Microprocessor 45 Personal Computer 46 Milestones in Networking 1.3.1 1.3.2 1.3.3 1.3.4 1.3.5 1.3.6 1.3.7 1.3.8 1.3.9 1.3.10 1.3.11 1.3.12 1.3.13 29 49 Electricity and Electromagnetism 49 Telegraph 51 Telephone 52 Typewriter and Teletype 53 Radio 53 Television 54 Remote Computing 56 ARPANET 56 Email 57 Internet 57 NSFNET 59 Broadband 59 Wireless Networks 59 42 www.downloadslide.com Contents 1.4 Milestones in Information Storage and Retrieval 1.4.1 1.4.2 1.4.3 1.4.4 1.4.5 1.4.6 1.4.7 1.4.8 1.4.9 1.5 Greek Alphabet 60 Codex and Paper 60 Gutenberg’s Printing Press 61 Newspapers 61 Hypertext 61 Graphical User Interface 62 Single-Computer Hypertext Systems 64 Networked Hypertext: World Wide Web 64 Search Engines 65 Information Technology Issues 66 Summary 67 Review Questions 69 Discussion Questions 70 In-Class Exercises 71 Further Reading and Viewing 72 References 72 An Interview with Dalton Conley 75 Introduction to Ethics 2.1 Introduction 2.1.1 2.1.2 2.1.3 2.2 2.3 2.6 84 86 The Case for Cultural Relativism 87 The Case against Cultural Relativism 88 93 The Case for Ethical Egoism 93 The Case against Ethical Egoism 94 Kantianism 2.6.1 2.6.2 90 The Case for the Divine Command Theory 90 The Case against the Divine Command Theory 91 Ethical Egoism 2.5.1 2.5.2 83 The Case for Subjective Relativism 84 The Case against Subjective Relativism 85 Divine Command Theory 2.4.1 2.4.2 2.5 Defining Terms 78 Four Scenarios 80 Overview of Ethical Theories Cultural Relativism 2.3.1 2.3.2 2.4 77 Subjective Relativism 2.2.1 2.2.2 77 95 Good Will and the Categorical Imperative 96 Evaluating a Scenario Using Kantianism 98 60 www.downloadslide.com Contents 2.6.3 2.6.4 2.7 Act Utilitarianism 2.7.1 2.7.2 2.7.3 2.7.4 2.8 100 Principle of Utility 101 Evaluating a Scenario Using Act Utilitarianism The Case for Act Utilitarianism 103 The Case against Act Utilitarianism 104 Rule Utilitarianism 2.8.1 2.8.2 2.8.3 2.8.4 2.9 The Case for Kantianism 99 The Case against Kantianism 99 106 Basis of Rule Utilitarianism 106 Evaluating a Scenario Using Rule Utilitarianism 106 The Case for Rule Utilitarianism 107 The Case against Utilitarianism in General 108 Social Contract Theory 2.9.1 2.9.2 2.9.3 2.9.4 2.9.5 109 The Social Contract 109 Rawls’s Theory of Justice 111 Evaluating a Scenario Using Social Contract Theory The Case for Social Contract Theory 114 The Case against Social Contract Theory 115 2.10 Virtue Ethics 2.10.1 2.10.2 2.10.3 2.10.4 117 Virtues and Vices 117 Making a Decision Using Virtue Ethics The Case for Virtue Ethics 120 The Case against Virtue Ethics 121 119 2.11 Comparing Workable Ethical Theories 2.12 Morality of Breaking the Law 2.12.1 2.12.2 2.12.3 2.12.4 2.12.5 102 124 Social Contract Theory Perspective 124 Kantian Perspective 124 Rule Utilitarian Perspective 125 Act Utilitarian Perspective 125 Conclusion 126 Summary 126 Review Questions 127 Discussion Questions 129 In-Class Exercises 130 Further Reading and Viewing References 131 131 An Interview with James Moor 133 122 113 www.downloadslide.com 536 Index Government (continued) national ID cards, 324–328 NCIC database, 302–303 OneDOJ database, 303–304 Patriot Act, 314–319 references, 337–342 review questions, 334–335 summary, 333–334 and virtue ethics, 122 wiretapping legislation, 311– 314 GPS, OnStar, 272 Gramm-Leach-Bliley Act, 322 Grammar checkers, 393 Graphical user interfaces, 62–64 Great Britain, surveillance cameras in, 305 Great Firewall of China, 152 Greatest Happiness Principle, 101–102 Greek alphabet, 60 Green Stamps, 269 Greenpeace, 497 Greensboro, N.C., sit–ins, 115 Griffiths, Mark, 172 Grills, Ashley, 171 Grocery club cards, 269 Grokster network, 217, 220–222 Guardian, 312, 319 Guide software, 64 Guilford County voting machine errors, 404 Gutenberg, Johannes, 61 Gutenberg Bible, 61 Guzner, Dmitriy, 371 Gyges, legend of, 130, 133 H H-1B visas, 498–499 “Hack SDMI” challenge, 212 Hacking Firesheep case study, 351–353 incidents, 350–351 past and present, 348–349 penalties for, 349–350 Hactivists, 370–371 Hafner, Katie, 357 Holocaust, 39 Hamlet scenario, 193–194 Hampden-Turner, Charles, 86 Hanger, Charles, 302 Hanging chads, 372 “Happy Birthday to You”, 196–197 Harborview Medical Center, 422 Harmonic telegraph, 52 Harris Interactive study, 331 Harrison, George, 227 Harvard College, social networking in, 293–294 Harvard University, admissions software for, 350 Harvey Mudd College, 500 HAVA (Help America Vote Act), 402–405 HD-DVDs, encryption, 214 Health care, 33 Health Information Technology for Economic and Clinical Health (HITECH) Act, 273 Health Insurance Portability and Accountability Act (HIPAA), 329 Hello worm, 361 Help America Vote Act (HAVA), 402–405 Henley, Don, 251 Henry, Joseph, 50 Henry, Patrick, 155 Hernandez, Roberto, 391 Hertz, Heinrich, 53 Herzenberg, Joe, 288 “He’s So Fine”, 225 Hewlett Packard, 494 HIPAA (Health Insurance Portability and Accountability Act), 329 History computing See Computing milestones information storage and retrieval See Information storage and retrieval milestones networking See Networking HITECH (Health Information Technology for Economic and Clinical Health) Act, 273 Hitler, Adolf, 39, 85 Hobbes, Thomas, 109–111 Hoff, Marcian “Ted”, 45 Holberton, Frances, 42 Holidays, 485 Hollaar, Lee, 224 Hollerith, Herman, 38 Holocaust, 169 Homebrew Computer Club, 47–48 Honda Motor Company, 71–72, 486 Hong Kong, broadband in, 59 Hoover, J Edgar, 302, 307–308 Hopper, Grace Murray, 42–43 Horne, Thomas, 164 Hosts for viruses, 354 Hotmail, Blue Frog bot for, 366 Hotspots, 59–60 HTTP (HyperText Transport Protocol), 351 Hughes Aircraft case, 460–462 Humanitarian action, online, 148 Hursti, Harri, 404 Hussein, Saddam, overthrow of looting after, 109 self-censorship after, 151 Hybrid computer chips, 460–462 HyperCard system, 64 Hypertext systems evolution of, 61–62 networked See World Wide Web (WWW) single-computer, 64 HyperText Transport Protocol (HTTP), 351 Hypothetical social contract agreements, 116 I Ibarra, Ruth, 461–462 IBM See International Business Machines (IBM) Identification cards, national, 324–328 Identity theft law for, 322 national ID cards, 324–328 overview, 165–166 Real ID Act, 327–328 Identity Theft and Assumption Act, 166 Identity Theft and Assumption Deterrence Act, 350 www.downloadslide.com Index Identity Theft Penalty Enhancement Act, 166 IEEE Computer Society, 439– 440 Immigration and Naturalization Service, 350 IMP (Interface Message Processor), 57 Imperfect duties, 100 Implanted chips, 271 Inanimate objects, 135 Income tax, 301 Incredible Bulk II game, 423– 424 India direct recording voting machines, 402 globalization of jobs to, 479 IT development in, 499 for multinational teams, 494–495 Information Age, catalysts for, 30 Information collection by government, 300–306 legislation, 299–300 in privacy, 298 Information disclosures, 266– 268 automobile black boxes, 272 body scanners, 269–270 cookies, 273–274 digital video recorders, 273 enhanced 911 services, 268 Facebook tags, 268 implanted chips, 271 medical records, 273 OnStar, 272 rewards programs, 269 RFIDs, 270–271 Information dissemination, 298–299, 328–330 Information Hiding Workshop, 212 Information processing in privacy, 298 Information storage and retrieval milestones codex, 60–61 graphical user interfaces, 62–64 Greek alphabet, 60 hypertext, 61–62 newspapers, 61 printing press, 61 search engines, 65–66 World Wide Web, 64–65 Information technology (IT) declining costs, 494–496 digital divide, 500–507 dot-com bust, 498 foreign workers, 498–499 history computing See Computing milestones information storage and retrieval See Information storage and retrieval milestones networking See Networking issues, 66–67 networking See Networking supply-chain automation, 491 Information Technology & Innovation Foundation, 364 Innovation commons, 237 Inquisition, 150 Instagram terms of service, 283 Instant messaging popularity, 166–167 worms in, 361 Instant photography patents, 199 Integrated circuits, 43–45 Intel Corporation, 499 4004 microprocessor, 45 founding of, 45 India offices, 494 software growth encouraged by, 235 stock price, 498 Intellectual activities, privacy for, 259 Intellectual property Apple/EMI agreement, 215 Besek interview, 251–253 Creative Commons, 236–238 definition, 191 digital rights management, 212, 214–215 discussion questions, 242 DMCA, 211 DVDs, 213–214 537 Extended Copy Protection, 212–213 fair use, 204–210 further reading, 243 HD-DVDs, 214 in-class exercises, 242–243 introduction, 189–191 open-source movement, 228–233 peer-to-peer networks, 216– 226 protection of, 66 benefits, 195 copyrights, 200–204, 251– 253 limitations, 195–197 patents, 198–199 trade secrets, 197–198 trademarks and service marks, 198 references, 244–252 review questions, 241–242 rights to, 191–195 SDMI, 212 software protection, 224 copyrights, 224–225 legitimacy of, 233–236 patents, 226–228 safe development, 225–226 summary, 238–241 Xbox One, 215–216 Intellectual virtues, 117 Intelligent machines, 135 Interest-free loans, 148 Interface Message Processor (IMP), 57 Internal Revenue Service (IRS) audits, 323 data collection, 301 Operation Shamrock, 309– 310 Privacy Act of 1974, 319 Social Security number requirement, 325 International Business Machines (IBM) BIOS, 228 Chinese acquisition of assets, 499 early success, 42 formation of, 38–39 Holocaust role, 39 www.downloadslide.com 538 Index International Business Machines (IBM) (continued) higher-level programming languages, 43 IBM PC computers, 49, 63 System/360 computers, 45–46 International Federation of the Phonographic Industry, 222 International Olympic Committee, 153 Internet, 57–58, 145 addiction to contributing factors, 173– 174 ethical evaluation, 174–175 reality of, 171–173 apps, 145 Carnivore surveillance system, 310 censorship on, 152 controlling, 152–153 global divide, 501–502 law for, 343–345 music services, 223–224 net neutrality, 506–507 networking See Networking news from, 137–138 uses, 145–148 World Wide Web, 145 Internet Explorer browser, 65 Internet of Things, 148 Internet Protocol (IP), 58 Internet radio, 211 Internet worm, 356–360 Internment camps, 301 Intimacy and privacy, 259 Invasion, 330–333 Invasion of privacy, 299 IP (Internet Protocol), 58 iPAQ handheld computer, 395 iPhone address book uploads, 282– 283 significance, 187 Iran, 369–370 Iraq War looting in, 109 self-censorship in, 151 Ireland, 504–505 IRS (Internal Revenue Service) audits, 323 data collection, 301 Operation Shamrock, 309– 310 Privacy Act of 1974, 319 Social Security number requirement, 325 Isaac, 92–93 Islam, 90 IT See Information technology (IT) ITT Communications, 309 iTunes Music store, 215, 224 J J-Com, 401–402 Jackson, Shirley, 390 Janesch, Rachel, 461 Jaovisidha, Suchart, 393 Japan air traffic control system failure, 393 broadband, 59 Japanese American internment, 301 Jaschan, Sven, 360 Jaynes, Jeremy, 156 Jennings, Christine, 404 Jennings, Ken, 487–488 Jeopardy! television program, 487–488 Jerome-Parks, Scott, 412 Jet Propulsion Laboratory, 399–400 Jiabao, Wen, 499 Jn-Charles, Alexandra, 412 Jobs automation effects jobs gained, 483–484 jobs lost, 481–483 productivity changes, 484–486 robots for, 486–489 supply-chain, 491 trends, 519–522 background checks, 268 Berman interview, 343–345 discussion questions, 512–514 Ford interview, 519–522 further reading, 515 global movement, 33, 67, 479–480, 496–500 in-class exercises, 514–515 monitoring, 493–494 multinational teams, 494–496 organization changes, 490– 491 references, 515–518 review questions, 512 summary, 510–512 telework, 491–493 temporary work, 493 Jobs, Steve, 48, 63 Joffe, Rodney, 361 Johansen, Jon, 213–214 Johnson, Lyndon, 309, 329 Johnson & Johnson, 198 Jonson, Ben, in Hamlet scenario, 193–194 Jordon, Eason, 151 JP Morgan Chase, offshoring by, 500 Judaism, 90 Judgment principles in Software Engineering Code of Ethics, 445–446 Just consequentialism, 134–135 Just deserts argument, 233–234 Just-in-time production, 490 Juvenal, 150 K Kahn, Robert, 57 Kanka, Brenda, 298 Kant, Immanuel on addiction, 174 beliefs, 95–96 on censorship, 153 on duties, 111 Kantianism, 95–96 case against, 99–100 case for, 99 ethical evaluations CIPA, 162 Firesheep case, 353 freedom of expression, 158 Incredible Bulk II game, 423–424 Internet addiction, 174 Internet worm, 359 mispriced items, 395 online voting, 375 privacy, 265–266 scenario for, 98–99 spam, 142 www.downloadslide.com Index sting operation, 168 good will and Categorical Imperative in, 96–98 law breaking in, 124–125 Kapauku, 485 Kasparov, Gary, 486 Katz, Charles, 308–309 Kay, Alan, 63 Kaysen, Carl, 320 Kazaa network, 217–220 Kelly, Leslie, 208–209 Kelly, Max, 368 Kelly v Arriba Soft Corporation, 208–210 Kelvir worm, 361 Kemeny, John, 43 Kenadek, Richard, 201 Kennedy, Robert, 309–310 Kennestone Regional Oncology Center, 406 Kenswil, Larry, 211 Kepler, Johannes, 34 Kerry, John, 404 Kilby, Jack, 45 Kilminster, Joe, 460 Kim, Selena, 215 Kimball, Curtis, 149 Kimberly-Clark, 198 King, Martin Luther, Jr., 302, 309 King for a Day, 197 Kinko’s Graphics Corporation, 201, 204 Kiva site, 148 Kleenex brand, 198 Kleinrock, Leonard, 57 Kling, Rob, 505 KLM airline, 146 Knowledge portfolios, 493 Knuth, Donald, 232 Kodak, 199 Kolata, Gina, 357 Krum, Charles and Howard, 53 Kufrovich, Francis, 167 Kung Bushmen, 485 Kurtz, Thomas, 43 L L-1 visas, 498–499 LaChat, Michael, 488–489 Ladder of privacy, 259 LaMacchia, David, 201–202 Land, Edwin, 199 Lane, Sean, 281 LaPorte voting machine errors, 403 LaRue, Donald, 461 Laws breaking, 124 act utilitarianism, 125–126 conclusion, 126 Kantianism, 124–125 rule utilitarianism, 125 social contract theory, 124 for Internet, 343–345 Robotics, 481 for winner-take-all effects, 510 Learning, online, 146 Legal Protection of Digital Information, 224 Legal responsibility, 466 Legislation See Government Lei, Hong, 370 Leibniz, Gottfried, 34 Leiner, Barry M., 57 Lenovo company, 499 Lentz, Jacobus, 435–436 Leonard, Andrew, 232 Lessig, Lawrence, 196, 237 Letters, National Security Letters, 315–316 Leveson, Nancy, 411, 419 Leviathan, 109 Leviticus, 90 Libel laws, 155 Licensing, 437 Creative Commons, 237–238 direct censorship through, 151 inventions, 199 open-source software, 230 software engineers, 439–440 software patents, 227 Licensing Act, 61 Licklider, J.C.R., 56 Lie detectors, 299 Liebold, Michael, interview with, 187–188 Lightner, Lisa, 461 Limbaugh, Rush, 273 Limited rights, 111 Limits to Growth, The, 413–414 Lindh, John Walker, 317 Linear accelerators See Therac25 linear accelerator 539 Linspire, 218 Linux DVD support for, 213 in open-source movement, 232 Lisa computer, 63 Live Free or Die Hard, 347 LiveBridge company, 479 Loan applications, 66–67 Loans, 148 Locke, John, 111, 191–193, 233 Lockheed Martin, 399–400 Logan, Jesse, 164 Logarithms, 34 Logography, 60 London International Financial Futures and Options Exchange, 393 Long-distance telephone systems, 398–399 Los Angeles County+USC Medical Center, 394 Lotus Development Corporation, 280 Loud television commercials, 331 Loyalty programs, 269 Lund, Robert, 459–460 Lundstrom, Carl, 222 Luther, Martin, 61 Luxury taxes, 510 Lynn, Loretta, 251 M M A Mortenson Company, 422 M-PESA services, 148 Macintosh computers, 63 Madison, James, 155 Magnatune record label, 238 Mail email See Email targeted direct, 277–278 Mainframe computers, 45–46 Major League Baseball, 494 Malls, cell phone tracking in, 282 Malware, 353–354 bots and botnets, 362–363 cross-site scripting, 361 defensive measures, 363 drive-by downloads, 361–362 rootkits, 362 www.downloadslide.com 540 Index Malware (continued) spyware and adware, 362 Trojan horses, 362 viruses, 354–356 worms Internet, 356–360 types, 360–363 Management principles in Software Engineering Code of Ethics, 446 Mandiant company, 370 Manufacturing jobs lost, 481 Many/any fallacy, 89 Maps, Web-enabled, 187 Marconi, Guglielmo, 54 Marconi Wireless Telegraph Company, 54 “Marketplace: Households” CD, 280 Markoff, John, 357, 359 Mars missions, 399–400 Marshall Field’s, 38 Mason, George, 155 Mason, Jerald, 460 Massachusetts Institute of Technology admissions software for, 350 OpenCourseWare program, 146 Massive Open Online Courses (MOOCs), 146, 505–506 MasterCard Operation Payback attack, 371 Mattrick, Don, 216 Mauchley, John W., 39 Maxwell, James Clerk, 53 May, Christopher, 212 Mayfield, Brandon, 318 Mazor, Stanley, 45 McAuliffe, Christa, 459 McFarland, Michael, 466 McGinn, Mike, 305 McGuire, Melanie, 330 McKinley, William, 53 McLeod, Kembrew, 196 McNealy, Scott, 256 McVeigh, Timothy, 302–303 Mechanical calculators, 34–36 Medical records, 273 Medicine, 33 Megan Meier Cyberbullying Prevention Act, 171 Megaupload Limited, 223, 371 Meier, Megan, 170–171 Meier, Sid, 420 Memex system, 62 Memory in EDVAC, 40 Mental condition for moral responsibility, 411 Merchandise 7X formula, 197 Merck-Medco pharmacy, 481 Mercury Theater, 54–55 Merit Systems Protection Board, 462 Mestas, Colleen, 272 Methamphetamine, 331–332 Mettenbrink, Brian, 371 MGM v Grokster, 220–222 Miceli, Marcia, 463 Mickey Mouse, 203 Micro-lending, 148 Microprocessors invention, 45–46 uses, 30 Microsoft Corporation BASIC interpreter, 47 DOS, 49 India offices, 494 information storage, 313 offshoring, 500 patent applications, 226 and software piracy, 235 stock prices, 497 warranties, 419–420 Windows systems, 63 Xbox One, 215–216 Microtargeting, 278 Microwave radar systems, 43–44 Middlemen, eliminating, 490– 491 Milestones computing See Computing milestones information storage and retrieval See Information storage and retrieval milestones networking See Networking Mill, John Stuart and act utilitarianism, 100– 101 on censorship, 154 on pleasures, 174 on Principle of Harm, 154 and rule utilitarianism, 106 Mining, data See Data mining Minuteman II ballistic missiles, 45 Missile system failures, 396–397 Missiles, 45 Misuse of sources, 524–525 MITS company, 47 Mizuho Securities, 401–402 Mobile apps, 145 Mocmex Trojan horse, 362 Models computer, 412–415 technological diffusion, 502– 503 Mondale, Walter, 71 Monitoring in workplace, 493–494 Monks, 60 Monmouth University poll, 305 Monty Python’s Flying Circus, 139 MOOCs (Massive Open Online Courses), 146, 505–506 Moon landings faked, 169 transmission of, 54, 56 Moor, James, interview with, 133–135 Moore, Gordon, 44–45 Moore School, 40 Moore’s Law, 45 Moral capital, privacy as, 259 Moral luck problem, 105 Moral responsibilities characteristics, 465–466 conditions for, 411–412 Moral virtues, 117 Morality vs ethics, 78–79 Moravec, Hans, 486–488 Morin, David, 282–283 Morris, Robert Tappan, Jr., 356–360 Morse, Samuel, 49 Morse code, 52 Mortenson v Timberline Software, 420, 422 Morton Thiokol, 459–460 Mosaic browser, 65 Motion Picture Association of America (MPAA) copyright extension support, 203 Operation Payback attack, 370–371 www.downloadslide.com Index Motorola cell phones, 59 Mouse, invention of, 62 MoveOn.org, 281 MP3 music files, 207–208 MPAA (Motion Picture Association of America) copyright extension support, 203 Operation Payback attack, 370–371 Multilink software, 420–421 Multinational teams, 494–496 Mubarak, Hosni, 150 Muris, Timothy, 331 Murphy, Eddie, 197 Murrah Federal Building bombing, 302 Music copyrights, 251–253 legal Internet services, 223– 224 piracy, 189–190, 207 Musical telegraph, 52 Muslims, 90 “My Sweet Lord”, 225 Myst game, 64 N Nachi worm, 106 Nader, Ralph, 497 NAFTA (North American Free Trade Agreement), 496–497 Napier, John, 34 Napster network, 217–218, 223 Nardone v United States, 307 NASA Mars missions, 399–400 Space Shuttle disaster, 459– 460 Nashi group, 367 National Archives, 146–147 National Bureau of Standards, 41 National Crime Information Center (NCIC), 302–303, 390–392 National Data Center, 320 National Do Not Call Registry, 331 National Fraud Alert System, 322 National ID cards, 324–328 National Organization of Women, 161 National Security Agency (NSA) Internet access, 312 phone record access, 318–319 telecommunications record database, 323–324 watch lists, 309–310 wiretapping, 310–311 National Security Letters, 315– 316 National Stolen Property Act, 350 Natural rights privacy, 260–263 property, 191–192 software protection, 233–234 Nautical Almanac Office, 36 Nazi government, 39, 435–436 NCIC (National Crime Information Center), 302–303, 390–392 Near, Janet, 463 Negative rights, 111 Neij, Fredrik, 222 Nelson, Ted, 62 Net Addiction Treatment Center, 147 Net neutrality, 506–507 Netflix Prize, 281–282 Networked hypertext systems See World Wide Web (WWW) Networking addiction to, 171–174 censorship in, 150–154 chat-room predators, 166– 167 and children, 160–164 cyberbullying, 170–171 discussion questions, 177–179 false information, 169–170 freedom of expression, 155– 160 further reading, 180–181 identity theft from, 165–166 in-class exercises, 179–180 Internet, 145–148 introduction, 137–139 Liebhold interview, 187–188 milestones, 49–50 ARPANET, 56–57 broadband, 59 541 electricity and electromagnetism, 49–50 email, 57 Internet, 57–58 NSFNET, 59 radio, 53–54 remote computing, 56 telegraph, 51–52 telephone, 52–53 television, 54–56 typewriters and teletypes, 53 wireless, 59–60 peer-to-peer, 216–226 references, 181–186 review questions, 176–177 spam, 139–144 summary, 175–176 text messaging, 148–150 Neumann, Peter, 326 New Technologies Products (NTP), 227 New York City, surveillance cameras, 304 New York City Housing Authority, 393 New York Civil Liberties Union (NYCLU), 304 New York Stock Exchange, 368 News agencies, self-censorship by, 151 News from Internet, 137–138 Newspapers, 61 NeXT computer, 64 Nicomachean Ethics, The, 117 Nielsen/NetRatings for chat rooms, 166 Nipkow, Paul, 54 Nixon, Richard abuses, 298 quoted, 297 war on drugs, 309–310 NLS system, 62 No Electronic Theft Act, 201– 202 Nonhistorical social contract agreements, 116 Nonpolitical speech, freedom of, 157–158 Normalization model, 503 Norms, 85–86 Norris, Pippa, 501 North American Free Trade www.downloadslide.com 542 Index Agreement (NAFTA), 496–497 North Korea, Internet access in, 152 Noyce, Robert, 44–45 Nozick, Robert, 233 NSA (National Security Agency) Internet access, 312 phone record access, 318–319 telecommunications record database, 323–324 watch lists, 309–310 wiretapping, 310–311 NSFNET, 59 Nuclear power plants, 32–33 Nugent, Alan, 377 O Obama, Barack CALM Act, 331 Internet donations, 138 NSA phone record access, 319 PRISM program, 312 Object-oriented design, 416–417 Objectivism, 122 Oei, Ting-Yi, 164 Oersted, Christian, 50 Office of the Inspector General, 461–462 Office Workstations, Ltd., 64 Oil exploration, 412–413 Oklahoma City bombing, 302 Olean, NY, surveillance cameras in, 304 Olmstead, Roy, 307 Olmstead v United States, 307 Olson, Theodore, 161 Olympics, 153 Omnibus Crime Control and Safe Streets Act, 311 OneDOJ database, 303–304 Online communities, 53 Online courses, 505–506 Online System, 62 Online voting ethical evaluations, 373–376 motivation for, 371–372 proposals, 372–373 OnStar Corporation, 272 Ontario Cancer Foundation, 406 Open Directory search engine, 66 “Open Letter to Hobbyists, An”, 47 Open Source Initiative, 230 Open-source software, 228 benefits, 230 criticisms, 232–233 definition, 228–229 examples, 231 GNU Project and Linux, 231–232 impact, 232 vs proprietary, 228–229 Open Voting Consortium, 404 Open64 compiler, 500 OpenCourseWare program, 146 OpenOffice.org, 231 Operation In Our Sites, 223 Operation Payback, 370–371 Operation Shamrock, 309–310 Opt-in policies, 275–276 Opt-out policies, 275–276 Optimists, technological, 503 Oracle program, 357 Ordeals, 264 Organization changes in workplace, 490–491 Organized crime, 309 Orphaned books, 210 Orzack, Maressa, 171–172 Overflow, buffer, 386 Ovid, 150 Oxfam, 497 P Pacific Research Institute, 404– 405, 433 Pacifica Foundation, 157–158 Packet-switched networking, 57–58 Palevo worm, 361 Palm Beach County “butterfly ballots”, 372 Palo Alto Research Center (PARC), 63 PalTalk, NSA access to, 312 Paper, invention of, 61 Paper audit trails, 402, 405 Papert, Seymour, 68 Papua, 485 Papyrus scrolls, 60 Paradoxes, intellectual property, 193–194 Paramount Pictures, 197 PARC (Palo Alto Research Center), 63 Parchment, 60–61 Party phone lines, 53 Pascal, Blaise, 34 Passwords, guidelines, 349 Patches, security, 386–387 Patent and Trademark Office, 226–228 Patent-holding companies, 227 Patent trolls, 227 Patents purpose, 198–199 software, 226–228 Path Intelligence, 282 Path site, 282–283 Patriot Act, 314 National Security Letters, 315–316 NSA access to phone records, 318–319 provisions, 314–315 renewal, 318 responses, 316–317 successes and failures, 317– 318 Patriot missile system failures, 396–397 Pay ratios, CEOs to production worker, 507–508 PayPal service Operation Payback attack, 371 phishing, 166 PC bangs, 147 Pedophilia, 167–168, 298 Peele, Stanton, 172–173 Peer-to-peer networks, 216–217 BitTorrent, 218–219 FastTrack, 217–218 Internet music services, 223–224 Megaupload Limited, 223 MGM v Grokster, 220–222 Napster, 217–218 Pirate Bay, 222 PRO-IP Act, 223 Pen registers, 312 Pennsylvania Steel Company, 38 Pentagon, terrorist attack on, 314 People’s Computer Center, 47 www.downloadslide.com Index People’s Computer Company, 46–47 People’s Liberation Army, 370 People’s Republic of China counterfeit music, 210 dictatorships, 497 gaming in, 147–148 IBM assets acquired by, 499 Internet access, 152–153 IT development, 499–500 Perfect duties, 100 Perl language, 231 Persistent online games, 147 Personal AI machines, 489 Personal computers graphical user interfaces, 62–64 invention of, 46–49 Personal information, 267 Personalized search, Google search engine, 274–275 Pessimists, technological, 503 Petersen, Joe, 167 Pew Internet & American Life Project, 219 Pew Surveys, 502 PGA Tour, 509 Pharmacies, online, 481 PharmaMaster spammer, 366 Philippines, 149–150 Phishing, 166, 364 Phonebook services ProCD, 421–422 Whitepages.com, 255 Photographs copyrights, 208–209 sexting, 163–164 Photoshop trademark, 198 PHP language, 231 Physical effects, 31 Pinto, Ford, 466 Piracy, 189–190, 207 Pirate Bay site, 222 Pistole, John, 333 Plagiarism avoiding, 524 citing sources, 524 consequences, 523 misuse of sources, 524–525 types, 523–524 Plato Crito, 83 Euthyphro, 92 Republic, The, 130, 133 Player Piano, 481 Player piano rolls, 202–203 PlayStation 4, 216 Plowman, James, 164 Polaroid Corporation, 199 Police social network monitoring, 279 sting operations, 167–169 Police drones, 305–306 Political content blocking, 153 text messaging for, 149–150 Political fundraising, 138 Politically motivated cyber attacks, 367–371 Polygraphs, 299 Pony Express, 51 Poor and rich, growing gap between, 503 Pornography blocking, 151 child, 163–164 child pornography scenario, 453–454 Sesame Street channel hacking, 350–351 Web filters for, 160–162 Web restrictions on, 152, 344 Port Washington Community Concert Association, 201 Portland Seven, 317–318 Positive rights, 111 Possessions vs time, 485–486 Postal Inspection Service, 166 Postal Service, 393 Potter, Stewart, 309 Precision Bid Analysis package, 422 Predators, chat-room, 166–167 Predictions, simulations for, 412–414 Predictive policing, 324 Predictor products, 278 Prepublication reviews, 151 Presidential elections, U.S 1896, 53 1952, 42 1984, 71 2000, 55–56, 371–371, 390 543 Prices, customization, 279 Principle of Harm, 154 Principle of Utility, 101–102, 106 Principles of justice, 112–113 Printing press, 61, 150 Prior restraints on expression, 155 Prioritization Resources and Organization for Intellectual Property (PRO-IP) Act, 223 PRISM program, 312 Privacy, 66, 255–256 for autonomous moral agents, 263 benefits, 258–260 case study, 264–266 data mining, 274–280 defining, 257–258 discussion questions, 285–287 DRM effect, 214–215 encryption, 214 further reading, 288 government actions See Government harms, 258 historical evolution, 264 in-class exercises, 287–288 information disclosures, 266–274 ladder of, 259 natural right to, 260–263 as prudential right, 263–264 references, 289–292 review questions, 284–285 rights associated with, 262– 263 summary, 283–284 and telemarketing, 331 and telephones, 53 Zimmer interview, 293–295 Privacy Act of 1974, 321, 391 PRO-IP (Prioritization Resources and Organization for Intellectual Property) Act, 223 Problem of moral luck, 105 ProCD, Inc v Zeidenberg, 420–422 Proctor & Gamble, 267 Product principles in Software www.downloadslide.com 544 Index Engineering Code of Ethics, 444–445 Production workers, pay ratios to CEOs, 507–508 Productivity from automation, 484–486 changes in, 481 monitoring for, 493–494 Profession principles in Software Engineering Code of Ethics, 446–447 Professional development, 437 Professional ethics, 435–436 Axtell interview, 475–477 case studies, 451–452 anti-worm, 454–456 child pornography, 453–454 consulting opportunity, 456–458 software recommendation, 452–453 discussion questions, 468– 470 further reading, 471 in-class exercises, 470–471 references, 471–475 review questions, 467–468 software engineering See Software Engineering Code of Ethics and Professional Practice summary, 466–467 whistleblowing, 458 Hughes Aircraft case, 460–462 morality of, 463–466 Morton Thiokol case, 459–460 and organizational failure, 475–477 Professional societies, 437 Professions characteristics, 437–438 computer-related, 439–440 CPAs, 438–439 defined, 436 “Professor Publishing” business, 201 Programming languages early, 42–43 for security, 385–386 Promenade Temecula mall, 282 Property intellectual See Intellectual property natural right to, 191–192 Proprietary software, 228–229 Protect America Act, 312 Protestant Ethic and the Spirit of Capitalism, The, 485 Protestant Reformation, 61, 485 Protestant work ethic, 485 Prudential rights, 263–264 Pseudoephedrine purchases, 331–332 Psychology of Computer Programming, The, 435 Public access wireless networks, 59–60 Public domain, 196 Public information See Information disclosures Public life vs private life, 257 Public principles in Software Engineering Code of Ethics, 442–443 Public records, 266–267, 321 Publishing industry, reliability of, 169–170 Punched card tabulation, 37–40 Purchasing power, 483–484 Puritans, 485 Pythagoras, 189 Python language, 231 Q Quality, software, 418–419 Quartering Act, 260 Quotation marks (“ ”) for cited text, 525 Qwest company, 392 R Race conditions, 408–410 Rachels, James on core values, 89 on ethical egoism, 94–95 on social contract theory, 110–111 Radar systems, 43–44 Radiation treatments See Therac-25 linear accelerator Radio Internet, 211 invention of, 53–54 Radio frequency ID (RFID) tags, 270–271 Railroad Tycoon software, 420 Rand, Ayn, 93 Ratings systems, voluntary, 151 Rawls, John on freedom of expression, 163 principles of justice, 111–113 social contract agreements, 116 Ray, James Earl, 302 Raza, Ghyslain, 170 RCA Communications, 309 Reagan, Ronald 1984 election, 71 Bork nomination, 328 Real ID Act, 327–328 Real-time sensor data, 187 Real-time systems, 396 Recording Industry Association of America (RIAA) copyrights, 203 Diamond Multimedia Systems lawsuit, 207–208 Felton letter, 212 Grokster/Kazaa warning, 219–220 lawsuits against individuals, 189–190 Napster lawsuit, 217 Operation Payback attack, 370–371 Verizon subpoena, 219 Reddick, Jaret, 189 Reddick, Shirley, 461 Reddit site, 146 Reformation, Protestant, 61, 485 Refrigerators, 32 Registration, censorship through, 151 Regulation of Internet, 343–345 Rehnquist, William, 161 Reid, Richard, 317 Reiman, Jeffrey on privacy, 263 on vices, 174 Reines, Philippe, 137 Relativism cultural, 86–90 www.downloadslide.com Index subjective, 84–86 Reliability, 389–390 data-entry and data-retrieval errors, 390–392 discussion questions, 427–428 further reading, 429 in-class exercises, 428–429 references, 429–432 review questions, 426–427 Rubin interview, 433–434 simulations, 412–415 software and billing errors, 392–395 software engineering, 415–419 software system failures, 393–394 software warranties, 419 enforceability of, 420–422 shrinkwrap software, 419– 420 summary, 424–426 Therac-25 See Therac-25 linear accelerator Religion in divine command theory, 90–93 Religious Freedom Restoration Act, 333 Remington & Sons Company, 53 Remington Rand Corporation, 38, 41–43 Remote computing, 56 Reprogramming ENIAC, 40 Republic, The, 130, 133 Research In Motion (RIM), 227 Reshef, Eran, 366 Responsibility characteristics, 465–466 conditions for, 411–412 Reuse of code, 411 Reuters news agency, 361 Reverse engineering, 198 Rewards programs, 269 RFID (radio frequency ID) tags, 270–271 Rhapsody music service, 223 RIAA See Recording Industry Association of America (RIAA) RIAA v Diamond Multimedia Systems, Inc., 207–208 Rich and poor, growing gap between, 503 Richardson, Elliot, 320–321 Ridge, Tom, 317 Ries, Richard, 172 “Right To Privacy, The”, 261 Rights intellectual property, 192–195 privacy, 260–263 property, 191–192 in social contract theory, 112–113 and software protection, 233–234 Ring of Gyges, 130, 133 Rio portable music player, 208 Ripskis, Al, 465 Ritty, James and John, 37 Riven game, 64 Roberts, Lawrence, 57 Robotics, Three Laws of, 481 Robots, 486–489 Roentgen, Wilhelm, 405 Rogan, Terry Dean, 391 Role playing games, 147 Role responsibility, 465–466 Roosevelt, Franklin, 308, 324 Rootkits, 212–213, 362 Ross, W D., 105 Rousseau, Jean-Jacques, 110 Roving surveillance, 315 Roving wiretaps, 312 Royal Society of Arts, 203 Rubin, Avi D., interview with, 433–434 Ruby language, 231 Rule utilitarianism basis of, 106 case against, 108–109 case for, 107–108 ethical evaluations in freedom of expression, 159 mispriced items, 395 privacy, 265 scenario, 106–107 spam, 143 law breaking in, 125 Rutter, Brad, 487–488 S S&H Green Stamps, 269 Safari browser, 65 Safe software development, 225–226 545 Saffo, Paul, 62 Salem, Enrique, 377 Saltzman, Eric, 237 Sandwich Islands, 485 Sarnoff, David, 54 Sasser worm, 360 Saturday Evening Gazette, 261 Saudi Arabia, Internet access in, 152 Sawyer, Robert, 285 SCADA (Supervisory Control and Data Acquisition), 369–370 Scanlan, Michael, 193 Scanners AIT, 332–333 body, 269–270 Scantlebury, Roger, 57 Schaeffer, Rebecca, 295 Scheutz, Georg and Edvard, 35–36 Schmidt, Eric, 317, 336 Schneier, Bruce, 376 Schools, monitoring in, 494 Schor, Juliet, 482, 484–485 Schumer, Charles, 282 SCMS (Serial Copyright Management System), 207 Scripting, cross-site, 361 Scrolls, papyrus, 60 Scud missiles, 396–397 SDMI (Secure Digital Music Initiative), 212 Search engines, 65–66 SEC (Securities and Exchange Commission), 309–310 Second Treatise of Government, The, 191 Secondary use of data, 274–280 Secret Service cyber attacks on, 368 identity theft investigations, 166 Secrets, trade, 197–198 Secure Digital Music Initiative (SDMI), 212 Secure Electronic Registration and Voting Experiment, 373 Securepoint company, 360 Securities and Exchange www.downloadslide.com 546 Index Commission (SEC), 309–310 Security, 347–348 Bishop interview, 385–387 cyber crime, 363–371 discussion questions, 377–379 further reading, 380 hackings See Hacking in-class exercises, 379–380 malware, 353–363 monitoring for, 494 online voting, 371–376 references, 380–384 review questions, 376–377 summary, 376 worms See Worms Sega Genesis game console, 225 Sega v Accolade, 225 Segregation protests, 115 SelectPhone product, 421 Self-censorship, 151 Self principles in Software Engineering Code of Ethics, 448–449 Semaphore telegraph, 49–50 sendmail application Morris worm, 358–359 as open-source software, 230 Sensenbrenner, Jim, 319 September 11 attacks, 310–311 Serial Copyright Management System (SCMS), 207 Serious Organised Crime Agency, 371 Service marks, 198 Servicemembers Legal Defense Network, 311 SESAC, 200 Sesame Street channel, 350–351 Sex offenders, 298 Sexting, 163–164 Shakespeare, William, in Hamlet scenario, 193–194 Shamrock, Operation, 309–310 Shedd, John, 347 Shockley, Bill, 44–45 Shockley Semiconductor, 44 Shockwave Rider, The, 356 Sholes, Christopher, 53 Shopping, online, 145 Shopping carts, 269 ShopRite stores, 269 Short Pump Town Center mall, 282 Shoulder surfing, 165 Shrinkwrap software, 419–420 Sidejacking, 351–353 Siegel, Martha, 140 Signal Security Agency, 309 Silken Mountain Web Services, Inc., 421 Silver Rule, 129 “Simple Gifts”, 236 Simulations, 412–415 Single-computer hypertext systems, 64 Sit–ins, 115 Size of passwords, 349 Sjodin, Henrik, 59 Skills development, 437 Skimmers, 166 Skype NSA access to, 312 videoconferencing, 188 Slavery, 489 Sleep deprivation, 172 Small-Scale Experimental Machine, 40 Smartphones, 59 Smith, Paul, 161 Snowden, Edward, 312, 319 Social change, Elsewhere Ethic, 75–76 Social Contract, The, 110 Social contract theory, 109 case against, 115–117 case for, 114–115 ethical evaluations in CIPA, 163 freedom of expression, 158–159 Internet addiction, 174 Internet worm, 359 privacy, 265 scenario, 113–114 spam, 143 sting operation, 168 law breaking in, 124 social contract in, 109–111 theory of justice, 111–113 Social divide, 502 Social engineering, 349 Social equality, 112–113 Social Intelligence Corporation, 268 Social network analysis, 279 Social networking platforms, Zimmer interview, 293– 295 Social Security Act, 324 Social Security numbers, 324– 325 Social-technical spam solutions, 141 Socialization, online, 145–146 Societies in cultural relativism, 86–90 definition, 78–79 professional, 437 winner-take-all, 507–510 Socrates, 83, 92 Software errors in, 392–395 Incredible Bulk II, 423–424 open-source See Open-source software piracy, 189–190, 207 as product, 423 protections for, 224 copyrights, 224–225 legitimacy of, 233–236 patents, 226–228 safe development, 225–226 quality of, 418–419 recommendation scenario, 452–453 shrinkwrap, 419–420 software system failures, 393–394 Ariane, 397–398 AT&T long distance network collapse, 398– 399 baggage handling systems, 400–401 Mars missions, 399–400 Patriot missile system, 396–397 Tokyo Stock Exchange, 401–402 voting machine failures, 402–405, 433–434 warranties, 419 www.downloadslide.com Index enforceability of, 420–422 shrinkwrap software, 419– 420 Software Engineering Code of Ethics and Professional Practice, 441 alternative fundamental principles, 450–451 analysis of, 449–451 case studies, 451–452 anti-worm, 454–456 child pornography, 453–454 software recommendation, 452–453 preamble, 441–442, 449–450 principles, 442–448 Software engineers as professionals, 437–440 software development process, 415–419 Software Link, The, 420–421 Solove, Daniel, 298–299 Sonny Bono Copyright Term Extension Act, 202–203 Sony, 205–206, 216 Sony BMG Music Entertainment, 212–213 Sony v Universal City Studios, 205–206, 221–222 Soo, Kim Hyun, 147 Soule, Samuel, 53 Sources citing, 524 misuse, 524–525 Souter, David, 221 South Korea broadband in, 59 cyber attacks in, 368 gaming in, 147, 172–173 South Ossetia, 367 Southbound on the Freeway, 29, 31 Soviet Union, censorship in, 150–151 Space shifting, 208 Space shuttle disaster, 459–460 Spain, terrorist attack in, 318 Spam, 66 Blue Frog bot for, 366 ethical evaluations of, 142–144 growth, 140–141 origin of term, 139 social-technical solutions, 141 Sparapani, Timothy, 328 SPARC architecture, 199–200 Spear, Tony, 400 Spear-phishing, 364 Special Subcommittee on Invasion of Privacy, 320–321 Specialization, 77 Specification process for software, 416 Spector PRO program, 160 Speculation, 498 Speelman, Jane, 272 Spelling checkers, 393 Sperry Rand, 42 Spider programs, 65 Spitzer, Robert, 464 Spock, Benjamin, 309 Spreadsheet programs, 48–49 Spyware description, 362 identity theft from, 166 SQL injection, 364 Stacks, HyperCard, 64 Stallman, Richard, 228–229, 232, 235 Standard of living, 486 Standish Group report, 418–419 Stanford Racing Team, 486–487 Stanford Research Institute, 62 Stanley robotic car, 486–487 Star Chamber, Court of, 155 “Star Wars kid”, 170 State of nature, 110 Steinhardt, Barry, 303–304 Step Reckoner, 34 Step-Saver Data Systems v Wyse Technology and The Software Link, 420–421 Stevenson, Adlai, 42 Stibitz, George, 56 Stillwell, Tami, 287 Sting operations, 167–169 Stored Communications Act, 313 Stored-program concept, 40 Stossier, Sheila Jackson, 390 Stout, Donald, 227 Stratification model, 503 547 StreamCast, 221 Stringfellow, Ken, 137 Strip searches, virtual, 332–333 Sturgeon, William, 50 Stuxnet worm, 369–370 Subjective relativism, 84–86 Subscribers in cell phone markets, 279 Subscription music services, 223–224 Sudafed, 331 Sudduth, Andy, 358–359 Suicides, 171 Summer Olympics, 153 Sumner, William Graham, 86 Sun Microsystems India offices, 494 SPARC architecture, 199–200 Sunde, Peter, 222 Supervisory Control and Data Acquisition (SCADA), 369–370 Supply-chain automation, 491 Supreme Court, United States Bork nomination, 328–329 Charles Katz v United States, 308–309 children Internet access restrictions, 153 copyrights, 203, 205–206 Diamond v Diehr, 226 FCC v Pacifica Foundation et al., 157–158 MGM v Grokster, 220–222 Nardone v United States, 307 Olmstead v United States, 307 Sony v Universal City Studios, 206, 221 United States v American Library Association, 161–162 Weiss v United States, 307 wiretapping decisions, 306– 307 Sustein, Cass, 524 Swenson, May, 29, 31 Syllabary writing systems, 60 Syndromic Surveillance System, 323 Syrus, Publilius, 255 System/360, IBM, 45–46 www.downloadslide.com 548 Index System malfunctions, 392–395 Systrom, Kevin, 283 T Tablets, 34–35 Tags E-ZPass, 330 Facebook, 268 TALON (Threat and Local Observation Notices) database, 311 Tandy computers, 48 Tarbox, Katie, 167 Target, 278 Targeted direct mail, 277–278 Task Force on Heroin Suppression, 309–310 “Tastes, Ties, and Time” research project, 293 Taxes online payments, 148 for winner-take-all effect reduction, 510 TCL/TK language, 231 TCP (Transmission Control Protocol), 57–58 TCP/IP protocol, 57–58, 64 Technological diffusion, 502– 503 Technology, dependence on, 31 Telecommunications record database, 323–324 Telecommuting, 67 Telegraph harmonic, 52 invention of, 51–52 semaphore, 49–50 Telemarketing, 331 Telephone records, NSA access, 318–319 Telephone systems, history of, 52–53 Telephony metadata, 319 Teletype machines, 53 Television closed-circuit cameras, 304– 305 commercials volume, 331 invention of, 54–56 Telework, 491 advantages, 491–492 disadvantages, 492–493 Telfind Corporation, 227 Telvent Canada, 370 Templeton, Brad, 139 Temporary work, 493 Tenenbaum, Joel, 190, 220 Teresa, Mother, 85 Termination rights for music copyrights, 251–253 Terms of service, instagram, 283 Terrorism and Patriot Act, 314–319 TEX typesetting system, 232 Texas Instruments India offices, 494 integrated circuits developed by, 44 Text messaging, 148 developing countries, 148–149 Elsewhere Ethic, 75–76 political activation, 149–150 sexting, 163–164 Twitter, 149 Thampi, Arun, 282 Theory of justice, 111–113 Therac-25 linear accelerator, 405 accidents, 406–408 analysis, 410–411 harm from, 440 moral responsibility for, 411–412 origin of, 405–406 postscript, 412 software errors in, 408–410 Third Amendment, 260–261 Thomas-Rassert, Jammie, 220 Thompson, Herbert, 404 Thomson, Judith Jarvis, 262–263 Threat and Local Observation Notices (TALON) database, 311 Three Laws of Robotics, 481 Thukral, Shilpa, 479 Thumbnail photographs, 208– 209 Tibetan government, cyber attacks on, 368 Tiered services, Internet, 506– 507 Tiger teams, 490 Timberline Software, Inc., 422 Time-sharing, 42–43 Time shifting, 205–206 Time vs possessions, 485–486 TimeWarner, 196 Titanic, 54 Title III of the Omnibus Crime Control and Safe Streets Act, 311–312 TiVo, 273 Tokyo Stock Exchange, 401–402 Tolerance, 85–86 Tollbooth information, 330 Tom Sawyer, 53 Tomlinson, Ray, 57 Torah, 90 Torvalds, Linus, 232 Touch screen voting machines, 402–405 Tracking cell phones, 282 Trade secrets, 197–198 Trade unions, 497 Trademarks, 198 Traffic jams, 146 Traitorous eight, 44 Trans Union credit reporting agency, 322 Transistors, 43–45 Transportation Security Administration, 332–333 Trap-and-trace devices, 312 Treasury Department, cyber attacks on, 368 Trilobite robot, 486 Trojan horses, 362 minimizing, 386 from rootkits, 213 Trompenaars, Fons, 86 Truncation errors, 397 Trust and privacy, 264 Tsinghua University, 500 Tunisia, 150, 371 Turner, Clark, 411, 419 Twain, Mark, 53 Tweets, 149 Twitter, HTTPS option, 352 Two-factor authentication, 349 Typewriters, 53 Tysver, Daniel A., 224 U UCC (Uniform Commercial Code), 420 Udall, Mark, 318–319 www.downloadslide.com Index Umpire Information System, 494 Unemployment from automation, 480–489 Uniform Commercial Code (UCC), 420 Uniform Resource Locators (URLs), 145 United Nations, 489 United States, cyber attacks in, 368 United States v American Library Association, 161–162 UNIVAC computer, 41–43 Universal City Studios, 205–206, 222 Universal Declaration of Human Rights, 489 Universal law in Categorical Imperative, 96 Universal Music Group, 211 Universities, online, 146 University of Illinois, 65 University of Kansas, 350 University of Manchester, 40 University of Massachusetts, 295 University of Nevada, 350 University of Pittsburgh, 393 University of Virginia, 523 Unix operating system GNU project, 232 security holes in, 357 Unsafe working conditions, 67 Uploads, address book, 282–283 URLs (Uniform Resource Locators), 145 US Citizenship and Immigration Service, 499 USA PATRIOT Act, 314 National Security Letters, 315–316 NSA access to phone records, 318–319 provisions, 314–315 renewal, 318 responses, 316–317 successes and failures, 317– 318 Utilitarianism act, 100–105 ethical evaluations in CIPA, 162–163 Firesheep case, 352 freedom of expression, 159 Internet addiction, 174 Internet worm, 359–360 NCIC records, 391–392 online voting, 374–376 spam, 142–143 sting operation, 167–168 law breaking in, 125 privacy, 265 rule, 106–109 on software protection, 234– 235 Utility, Principle of, 101–102, 106 V Vacuum tubes for signal amplifiers, 44 Vaidhyanathan, Siva, 202 Validating simulations, 414–415 software, 417–418 VCR sales, 503 Vellum, 60 Verichip Corporation, 271 Verifying simulations, 414–415 Verizon, 219 vices, 119 Video Privacy Protection Act, 328–329 Video recorders, digital, 273 Videoconferencing, 188 Vietnam war counterculture from, 46 watch lists during, 309–310 Virginia Declaration of Rights, 155 Virtual strip searches, 332–333 Virtual worlds, 147 Virtue ethics, 117–119 case against, 121–122 case for, 120–121 ethical evaluations in Firesheep case, 352–353 Internet worm, 360 privacy, 266 spam, 143 scenario for, 117–119 Viruses minimizing, 386 spread of, 354–356 549 Visa, Operation Payback attack, 371 Visas, work, 498–499 VisiCalc program, 49 VisiCorp Corporation, 63 Vivendi Universal, 375 Voice of America, 153 Volta, Alessandro, 50 Voltaire, 479 Voluntary information disclosures, 267–268 Vonnegut, Kurt, Jr., 481 Voter News Service, 55–56 Voters, disenfranchised, 390 Voting, online, 371–376 Voting machines, 402–405, 433–434 W Wages CEOs vs production worker, 507–508 and globalization of jobs, 479 Wake County voting machine errors, 403 Walt Disney Corporation, 203 Walt Disney Productions, 205– 206 War in Iraq looting in, 109 self-censorship in, 151 War of the Worlds, 54–55 Warg, Gottfrid Svartholm, 222 WarGames, 348 Warranties, software, 419 enforceability of, 420–422 shrinkwrap software, 419–420 Warren, Samuel, 261–262 Warschauer, Mark, 504–505 Watch lists for crime figures, 309 for library books, 295 Watson, Thomas A., 52 Watson, Thomas J., 39 Watson program, 487–488 Waze site, 146 WBAI radio station, 157 Wealth digital divide, 500–507 discussion questions, 512–514 dot-com bust, 498 Ford interview, 519–522 www.downloadslide.com 550 Index Wealth (continued) further reading, 515 in-class exercises, 514–515 references, 515–518 review questions, 512 summary, 510–512 winner-take-all society, 507– 510 Web See World Wide Web (WWW) Web 2.0, 146 Weber, Max, 485 Weinberg, Gerald, 435 Weinstein, Lauren, 326 Weiss v United States, 307 Welles, Orson, 54–55 Western Union, 309 Whistleblower Protection Act, 462 Whistleblowing, 458 Hughes Aircraft case, 460–462 legislation, 462 morality of, 463–466 Morton Thiokol case, 459–460 and organizational failure, 475–477 White-collar jobs lost, 481–482 White-Smith Music Company, 203 Whitepages.com site, 255 Whitman, Walt, 137 Whole Earth Catalog, 46–47 Wi-Fi networks, 351 Wiggins, Calvin, 460 WikiLeaks, 371 Wikipedia, 146 Wikis, 146 Williams, F C., 40 Williams, Samuel, 56 Williams Tube, 40 Windows Media Player, 215 Windows systems, 63 Winner-take-all society development of, 507–508 harmful effects, 508–510 reducing harm from, 510 Winner-Take-All Society, The, 507 Wire Fraud Act, 350 Wireless networks, 59–60, 494 Wiretapping history, 306–309 legislation authorizing, 311– 314 NSA, 310–311 roving, 312 Wolpe, Howard, 396 Wood engraving, 60 Woolworth’s store, 115 Work ethic, Protestant, 485 Work-for-hire rules, 251 Working conditions, 67 Workplace See also Jobs monitoring in, 493–494 multinational teams, 494–496 organization changes in, 490–491 telework, 491–493 temporary work, 493 World of Warcraft game, 147, 188 World Trade Center, 314 World Trade Organization (WTO), 497 World War II computing device development, 39–40 personal data collection, 435–436 wiretapping, 307–308 World Wide Web (WWW) attributes, 145 children on, 160–164 as democracy tool, 67 development of, 64–65 false information in, 169–170 filters for, 160–161 open-source servers, 230 popularity, 31 search engines, 65–66 Worms anti-worm scenario, 454–456 Conficker, 361 instant messaging, 361 Internet, 356–360 minimizing, 386 Sasser, 360 types, 360–363 Wozniak, Steve, 48 Writing Program Administrators (WPA), 523 Writing systems, 60 Writs of assistance, 306 WTO (World Trade Organization), 497 WWW See World Wide Web (WWW) Wyden, Ron, 318–319 Wyse Technology, 421 X X-rays See Therac-25 linear accelerator X Window System, 232 Xanadu network, 62 Xbox One, 215–216 Xerox Corporation, 63, 199 Xerox PARC, 63 Y Yahoo government request for email, 313 tiered services opposition, 506 Yahoo! Mail, Blue Frog bot for, 366 Yakima Valley Memorial Hospital, 407–410 Young, Kimberly, 172–174 Z Zeidenberg, Matthew, 421 Zennistrom, Niklas, 217 Zeus Trojan Horse, 367 Zillow.com site, 255, 267 Zimmer, Michael, interview with, 293–295 Zombie computers, 141 Zones of inaccessibility, 257– 258, 268 Zoning laws, 157 Zope language, 231 Zuckerberg, Mark, 281 ... for the Information Age with these ends in mind Ethics for the Information Age is suitable for college students at all levels The only prerequisite is some experience using computers and the Internet... and the World Wide Web There is good reason to say we are living in the Information Age Never before have so many people had such easy access to information The two principal catalysts for the Information. .. computing For those departments that choose to dedicate an entire course to these issues, the report provides a model syllabus for CS 280T, Social and Professional Issues Ethics for the Information Age

Ngày đăng: 02/06/2017, 10:11

Từ khóa liên quan

Mục lục

  • Cover

  • Brief Contents

  • Contents

  • Preface

  • Dedication

  • Chapter 1: Catalysts for Change

    • 1.1 Introduction

    • 1.2 Milestones in Computing

      • 1.2.1 Aids to Manual Calculating

      • 1.2.2 Mechanical Calculators

      • 1.2.3 Cash Register

      • 1.2.4 Punched-Card Tabulation

      • 1.2.5 Precursors of Commercial Computers

      • 1.2.6 First Commercial Computers

      • 1.2.7 Programming Languages and Time-Sharing

      • 1.2.8 Transistor and Integrated Circuit

      • 1.2.9 IBM System/360

      • 1.2.10 Microprocessor

      • 1.2.11 Personal Computer

      • 1.3 Milestones in Networking

        • 1.3.1 Electricity and Electromagnetism

        • 1.3.2 Telegraph

        • 1.3.3 Telephone

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan