top of page

CHAPTER SPECIFIC ANALYSES

NETWORKED COMMUNICATIONS

Chapter 3

In this chapter we explore how people use and abuse the Internet and cellular networks. We discuss how people communicate with one another and how they organize and find information. Some governments are threatened by the way in which modern networks have supported these activities; we detail various kinds of censorship and consider appropriate limits to the freedom of expression. We also discuss and evaluate new behaviors that have emerged with the growth of these networks, such as sexting, cyberbullying, and Internet addiction.
-Ethics for the Information Age (8th Edition) Chapter 3.1 Intro; by Michael J. Quinn

Chapter 4

In this chapter we discuss how information technology is affecting our notions of intellectual property. We consider what makes intellectual property different from tangible property and how governments have created a variety of mechanisms to guarantee intellectual property rights. We examine what has been considered “fair use” of intellectual property created by others, and how new copy protection technologies are eroding the notions of fair use. Meanwhile, peer-to-peer networks are making it easier than ever for consumers to get access to music and movies without purchasing them, putting pressure on companies selling these products to make obtaining a legal copy at least as easy as obtaining an illegal copy. We also explore the evolution of intellectual property protection for computer software and the rise of the open-source movement, which advocates the distribution of source code to programs. Finally, we take a look at one organization’s efforts to make it easier for artists, musicians, and writers to use the Internet as a vehicle for stimulating creativity and enhancing collaboration.
-Ethics for the Information Age (8th Edition) Chapter 4.1 Intro; by Michael J. Quinn

INFORMATIONAL PRIVACY

Chapter 5

In this chapter we focus on privacy issues related to the introduction of information technology. We begin by taking a philosophical look at privacy. What is privacy exactly? Do we have a natural right to privacy in the same way that we have the right to own property and the right to liberty? What about our need to know enough about others so that we can trust them? How do we handle conflicts between the right to privacy and the right to free expression?
-Ethics for the Information Age (8th Edition) Chapter 5.1 Intro; by Michael J. Quinn

PRIVACY AND THE GOVERNMENT

Chapter 6

In this chapter we consider the impact that federal, state, and local governments in the United States have had on the information privacy of those living in America. The word “privacy” does not even appear in the Constitution of the United States, and it has been difficult for the legislative, executive, and judicial branches of government to find the right compromise between demands for privacy and competing concerns. We survey legislation designed to protect the information privacy of individuals as well as legislation allowing law-enforcement agencies to collect information about individuals in an effort to prevent criminal or terrorist activities. We look at famous examples from American history in which governmental agencies engaged in illegal activities under the banner of protecting public safety and/or national security, and we see how the US Supreme Court gradually shifted its view of information privacy rights over time.
-Ethics for the Information Age (8th Edition) Chapter 6.1 Intro; by Michael J. Quinn

COMPUTER AND NETWORK SECURITY

Chapter 7

This chapter focuses on threats to computer and network security. Millions of people and most businesses rely upon computers and the Internet to conduct their affairs, making the security of these systems an important issue. Without adequate security, computers are vulnerable to criminal enterprises that introduce malicious software to reap valuable financial information or extort payments from victims. Computers can also be co-opted and used as weapons by governments seeking to further their political aims by sponsoring attacks on the cyber infrastructure of their enemies.
-Ethics for the Information Age (8th Edition) Chapter 7.1 Intro; by Michael J. Quinn

COMPUTER RELIABILITY

Chapter 8

The purpose of this chapter is to familiarize you with various ways in which computerized systems have proven to be unreliable. Systems typically have many components, of which the computer is just one. A well engineered system can tolerate the malfunction of any single component without causing harm. Unfortunately, there are many examples of systems in which the computer or the computer-human interface was a weak link and an error led to harm. Through a variety of examples, you will gain a greater appreciation for the complexity of building a reliable computerized system.
-Ethics for the Information Age (8th Edition) Chapter 8.1 Intro; by Michael J. Quinn

Chapter 10

In this chapter we take a closer look at how automation, globalization, artificial intelligence, and “winner-take-all” effects are transforming our workplaces and our communities. How has automation affected the pool of jobs? Does globalization really provide more benefits than harms? Will breakthroughs in artificial intelligence lead to significant job losses? Should we be concerned about the rising number of temporary jobs and the emergence of the “gig economy”? Is there a “digital divide,” an opportunity gap, between those who have access to information technology and those who do not? Do we need to be concerned about “winner-take-all” effects that are leading to a concentration of wealth? In the following sections we will examine each of these issues in turn.
-Ethics for the Information Age (8th Edition) Chapter 10.1 Intro; by Michael J. Quinn

Chapter Specific Analyses: Activities
bottom of page