1 / 12

Readings in Cyberethics

Readings in Cyberethics. Notes from book by Spinello. Chapter One. Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics 1. Contents. Privacy in Cyberspace Security and Crime in Cyberspace

tab
Download Presentation

Readings in Cyberethics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Readings in Cyberethics Notes from book by Spinello

  2. Chapter One • Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics 1

  3. Contents • Privacy in Cyberspace • Security and Crime in Cyberspace • Professional Ethics, Codes of Conduct, and Computer/Information Professionals

  4. Cyberethics • The field of applied ethics that examines moral, legal, and social issues in the development and use of cybertechnology.

  5. Cybertechnology • Cybertechnology: the broad spectrum of technologies that range from stand-alone computers to the cluster of networked computing, information, and communication technologies.

  6. Pioneers in Field • Terrell Bynum -- applied ethics • Deborah Johnson -- “new species” theory • James Moore -- logical malleability (general purpose machines) gives rise to “vacuums.”

  7. Terrell Byrnum • “Ethics and the Information Revolution” • History of cyberethics beginning with Norbert Weiner, 1940s • Unique moral issues? • Powerful technologies have profound social consequences

  8. Deborah Johnson • “Ethics Online” • Unique ethical considerations: • Global and interactive scope of the Net • Anonymity • reproducibility

  9. James Moore • “What is Computer Ethics?” • Multipurpose machine • Vacuums • Laws and social policies • Conceptual frameworks and muddles

  10. James Moore • 4 steps • Identify any policy vacuums • Clarify conceptual muddles • Revise policies or formulate new ones • Justify them • “routine ethics” not sufficient

  11. Cyberethics methodology • Brey’s “disclosive computer ethics” • 3-levels • Disclosive • Theoretical • application

  12. Rational Ethical Theory • Consequences or duty • Utilitarianism -- assess consequences of a policy -- advance the greatest good for the greatest number • Deontological (duty-based) -- everyone is respected as an individual.

More Related