Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Ethics for the Information Age, 8/e 2 Ethics for the Information Age 8th edition 3 Ethics for the Information Age 8th edition Michael J. Quinn Seattle University 221 River Street, Hoboken NJ...

1 answer below »
Ethics for the Information Age, 8/e
2
Ethics for the Information Age
8th edition
3
Ethics for the Information Age
8th edition
Michael J. Quinn
Seattle University
221 River Street, Hoboken NJ 07030
4
Senior Vice President Courseware Portfolio Management: Engineering,
Computer Science, Mathematics, Statistics, and Global Editions: Marcia J.
Horton
Director, Portfolio Management: Engineering, Computer Science, and Global
Editions: Julian Partridge
Executive Portfolio Manager: Matt Goldstein
Portfolio Management Assistant: Meghan Jacoby
Managing Producer, ECS and Mathematics: Scott Disanno
Senior Content Producer: Erin Ault
Project Manager: Windfall Software, Paul C. Anagnostopoulos
Manager, Rights and Permissions: Ben Fe
ini
Operations Specialist: Maura Zaldivar-Garcia
Inventory Manager: Bruce Boundy
Product Marketing Manager: Yvonne Vannatta
Field Marketing Manager: Demetrius Hall
Marketing Assistant: Jon Bryant
Cover Image: Phonlamai Photo/Shutterstock
Cover Design: Pearson CSC
Composition: Windfall Software
Cover Printer: Phoenix Colo
Hagerstown
Printe
Binder: Lake Side Communications, Inc. (LSC)
Copyright © 2020, 2017, 2015, 2013, 2011 Pearson Education, Inc.,
Hoboken, NJ XXXXXXXXXXAll rights reserved. Manufactured in the United
States of America. This publication is protected by copyright, and
5
permission should be obtained from the publisher prior to any prohibited
eproduction, storage in a retrieval system, or transmission in any form o
y any means, electronic, mechanical, photocopying, recording, o
otherwise. For information regarding permissions, request forms and the
appropriate contacts within the Pearson Education Global Rights &
Permissions department, please visit www.pearsoned.com/permissions
Many of the designations by manufacturers and seller to distinguish thei
products are claimed as trademarks. Where those designations appear in
this book, and the publisher was aware of a trademark claim, the
designations have been printed in initial caps or all caps.
The author and publisher of this book have used their best efforts in
preparing this book. These efforts include the development, research, and
testing of the theories and programs to determine their effectiveness. The
author and publisher make no wa
anty of any kind, expressed o
implied, with regard to these programs or the documentation contained
in this book. The author and publisher shall not be liable in any event fo
incidental or consequential damages in connection with, or arising out of,
the furnishing, performance, or use of these programs.
Li
ary of Congress Cataloging-in-Publication Data on file.
1 19
6
http:
www.pearsoned.com/permissions
ISBN 10: XXXXXXXXXX
ISBN 13: XXXXXXXXXX
7
Brief Contents
Preface xxi
1 Catalysts for Change 1
An Interview with Dalton Conley 47
2 Introduction to Ethics 49
An Interview with James Moor 105
3 Networked Communications 109
An Interview with Cal Newport 163
4 Intellectual Property 165
An Interview with June Besek 229
5 Information Privacy 233
An Interview with Michael Zimmer 277
6 Privacy and the Government 281
An Interview with Je
y Berman 329
7 Computer and Network Security 333
An Interview with Matt Bishop 377
8 Computer Reliability 381
An Interview with Avi Rubin 437
9 Professional Ethics 439
An Interview with Paul Axtell 479



















8
10 Work and Wealth 483
An Interview with Martin Ford 529
Appendix A: Plagiarism 533
Appendix B: Introduction to Argumentation 537




9
Contents
Preface xxi
1 Catalysts for Change 1
1.1 Introduction 1
1.2 Milestones in Computing 5
1.2.1 Aids to Manual Calculating 5
1.2.2 Mechanical Calculators 6
1.2.3 Cash Register 8
1.2.4 Punched-Card Tabulation 8
1.2.5 Precursors of Commercial Computers 10
1.2.6 First Commercial Computers 12
1.2.7 Programming Languages and Time-Sharing 13
1.2.8 Transistor and Integrated Circuit 15
1.2.9 IBM System/360 15
1.2.10 Microprocessor 16
1.2.11 Personal Computer 17
1.3 Milestones in Networking 20
1.3.1 Electricity and Electromagnetism 20

















10
1.3.2 Telegraph 22
1.3.3 Telephone 23
1.3.4 Typewriter and Teletype 24
1.3.5 Radio 25
1.3.6 Television 26
1.3.7 Remote Computing 27
1.3.8 ARPANET 27
1.3.9 Email 29
1.3.10 Internet 29
1.3.11 NSFNET 29
1.3.12 Broadband 30
1.3.13 Wireless Networks 30
1.3.14 Cloud Computing 31
1.4 Milestones in Information Storage and Retrieval 31
1.4.1 Greek Alphabet 31
1.4.2 Codex and Paper 32
1.4.3 Gutenberg’s Printing Press 32
1.4.4 Newspapers 32


















11
1.4.5 Hypertext 33
1.4.6 Graphical User Interface 33
1.4.7 Single-Computer Hypertext Systems 35
1.4.8 Networked Hypertext: World Wide Web 36
1.4.9 Search Engines 36
1.4.10 Cloud Storage 37
1.5 Contemporary Information Technology Issues 37
Summary 39
Further Reading and Viewing 40
Review Questions 41
Discussion Questions 41
In-Class Exercises 42
References 43
An Interview with Dalton Conley 47
2 Introduction to Ethics 49
2.1 Introduction 49
2.1.1 Defining Terms 50
2.1.2 Four Scenarios 51
2.1.3 Overview of Ethical Theories 54



















12
2.2 Subjective Relativism 55
2.2.1 The Case For Subjective Relativism 55
2.2.2 The Case Against Subjective Relativism 56
2.3 Cultural Relativism 57
2.3.1 The Case For Cultural Relativism 58
2.3.2 The Case Against Cultural Relativism 58
2.4 Divine Command Theory 60
2.4.1 The Case For the Divine Command Theory 61
2.4.2 The Case Against the Divine Command Theory 62
2.5 Ethical Egoism 63
2.5.1 The Case For Ethical Egoism 63
2.5.2 The Case Against Ethical Egoism 64
2.6 Kantianism 65
2.6.1 Good Will and the Categorical Imperative 66
2.6.2 Evaluating a Scenario Using Kantianism 68
2.6.3 The Case For Kantianism 69
2.6.4 The Case Against Kantianism 70
2.7 Act Utilitarianism 71
2.7.1 Principle of Utility 71
2.7.2 Evaluating a Scenario Using Act Utilitarianism 73




















13
2.7.3 The Case For Act Utilitarianism 74
2.7.4 The Case Against Act Utilitarianism 75
2.8 Rule Utilitarianism 76
2.8.1 Basis of Rule Utilitarianism 76
2.8.2 Evaluating a Scenario Using Rule Utilitarianism 77
2.8.3 The Case For Rule Utilitarianism 78
2.8.4 The Case Against Utilitarianism in General 79
2.9 Social Contract Theory 80
2.9.1 The Social Contract 80
2.9.2 Rawls’s Theory of Justice 82
2.9.3 Evaluating a Scenario Using Social Contract Theory 84
2.9.4 The Case For Social Contract Theory 85
2.9.5 The Case Against Social Contract Theory 86
2.10 Virtue Ethics 87
2.10.1 Virtues and Vices 87
2.10.2 Making a Decision Using Virtue Ethics 89
2.10.3 The Case For Virtue Ethics 91
2.10.4 The Case Against Virtue Ethics 92
2.11 Comparing Workable Ethical Theories 92



















14
2.12 Morality of Breaking the Law 94
2.12.1 Social Contract Theory Perspective 94
2.12.2 Kantian Perspective 94
2.12.3 Rule-Utilitarian Perspective 95
2.12.4 Act-Utilitarian Perspective 96
2.12.5 Conclusion 97
Summary 97
Further Reading and Viewing 98
Review Questions 98
Discussion Questions 100
In-Class Exercises 101
References 102
An Interview with James Moor 105
3 Networked Communications 109
3.1 Introduction 109
3.2 Spam 110
3.2.1 The Spam Tsunami 111
3.2.2 Need for Social-Technical Solutions 113
3.2.3 Case Study: Ann the Acme Accountant 113



















15
3.3 Internet Interactions 116
3.3.1 The World Wide Web 116
3.3.2 Mobile Apps 116
3.3.3 How We Use the Internet 117
3.4 Text Messaging 120
3.4.1 Transforming Lives in Developing Countries 120
3.4.2 Twitter 120
3.4.3 Business Promotion 120
3.5 Political Impact of Social Media and Online Advertising 121
3.5.1 Political Activism 121
3.5.2 Macedonian Entrepreneurs 122
3.5.3 Internet Research Agency 122
3.5.4 Is Democracy Being Threatened? 123
3.5.5 Troubling Times for Traditional Newspapers 123
3.6 Censorship 125
3.6.1 Direct Censorship 125
3.6.2 Self-Censorship 125
3.6.3 Challenges Posed by the Internet 126
3.6.4 Government Filtering and Surveillance of Internet Content 127


















16
3.6.5 Ethical Perspectives on Censorship 128
3.7 Freedom of Expression 129
3.7.1 History 129
3.7.2 Freedom of Expression Not an Absolute Right 130
3.7.3 FCC v. Pacifica Foundation 132
3.7.4 Case Study: Kate’s Blog 132
3.8 Children and Inappropriate Content 135
3.8.1 Web Filters 135
3.8.2 Child Internet Protection Act 135
3.8.3 Ethical Evaluations of CIPA 136
3.8.4 Sexting 138
3.9 Breaking Trust 139
3.9.1 Identity Theft 139
3.9.2 Fake Reviews 140
3.9.3 Online Predators 141
3.9.4 Ethical Evaluations of Police Sting Operations 142
3.9.5 False Information 143
3.9.6 Cybe
ullying 144
3.9.7 Revenge Porn 146



















17
3.10 Internet Addiction 147
3.10.1 Is Internet Addiction Real? 147
3.10.2 Contributing Factors to Addiction 148
3.10.3 Ethical Evaluation of Internet Addiction 149
Summary 149
Further Reading and Viewing 151
Review Questions 151
Discussion Questions 152
In-Class Exercises 155
References 156
An Interview with Cal Newport 163
4 Intellectual Property 165
4.1 Introduction 165
4.2 Intellectual Property Rights 167
4.2.1 Property Rights 167
4.2.2 Extending the Argument to Intellectual Property 169
4.2.3 Benefits of Intellectual Property Protection 171
4.2.4 Limits to Intellectual Property Protection 171
4.3 Protecting Intellectual Property 173



















18
4.3.1 Trade Secrets 173
4.3.2 Trademarks and Service Marks 174
4.3.3 Patents 175
4.3.4 Copyrights 176
4.3.5 Case Study: The Database Guru 180
4.4 Fair Use 184
4.4.1 Sony v. Universal City Studios 186
4.4.2 Audio Home Recording Act of XXXXXXXXXX
4.4.3 RIAA v. Diamond Multimedia 188
4.4.4 Kelly v. A
iba Soft 188
4.4.5 Authors Guild v. Google 189
4.4.6 Mashups 190
4.5 Digital Media 191
4.5.1 Digital Rights Management 191
4.5.2 Digital Millennium Copyright Act 192
4.5.3 Secure Digital Music Initiative 192
4.5.4 Sony BMG Music Entertainment Rootkit 193
4.5.5 Criticisms of Digital Rights Management 193
4.5.6 Online Music Stores
Answered 2 days After Nov 07, 2022

Solution

Dr Insiyah R. answered on Nov 10 2022
52 Votes
Answe
The term "professionalism" describes the observance of a code of ethics that is generally accepted amongst those working in a profession. An "ethic" is a moral principle or set of principles that guide one's actions. Professionals in many disciplines must adhere to established standards of ethics. Professionals might consult these regulations for responding to difficult circumstances at work (Nielson and Cole,2022).
Establishing and sticking to universally applicable moral standards is essential to developing and maintaining a solid moral compass. Consideration of the needs of all stakeholders is essential while developing these recommendations. If users are in a sticky circumstance where it's tempting to let their morals go, stop and think about the outcomes that may result from that decision.
To begin, "professionalism" is a phrase that defines a style of behaving oneself that is commonly recognised as suitable in a specific business. This method of conducting oneself is usually accepted as being proper. Everyone working in a particular profession is expected to adhere to the standards in the class's code of ethics. If you follow these guidelines, you may assist guarantee that the professionals working in your field are adhering to the highest ethical standards possible (Gladden et al,2022).
The application of moral principles in one's day-to-day life provides a set of instructions for doing so ethically. Everyone whose lives will be touched favourably by choice will have their best...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here