54
Instructor’s Guide to Ethics for the Information Age Fifth Edition Michael J. Quinn January 20, 2012 Copyright c 2012 by Pearson Education, Inc. All rights reserved. ©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Instructor's Guide - Ethics For the Information Age 5E

Embed Size (px)

DESCRIPTION

Ethics For the Information Age 5E Quinn

Citation preview

Page 1: Instructor's Guide - Ethics For the Information Age 5E

Instructor’s Guide to Ethics for the Information Age

Fifth Edition

Michael J. Quinn

January 20, 2012

Copyright c© 2012 by Pearson Education, Inc. All rights reserved.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 2: Instructor's Guide - Ethics For the Information Age 5E

ii

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 3: Instructor's Guide - Ethics For the Information Age 5E

Contents

Preface v

Teaching Computer Ethics vii

1 Catalysts for Change 1

2 Introduction to Ethics 7

3 Networked Communications 13

4 Intellectual Property 17

5 Information Privacy 21

6 Privacy and the Government 25

7 Computer and Network Security 31

8 Computer Reliability 35

9 Professional Ethics 39

10 Work and Wealth 41

iii

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 4: Instructor's Guide - Ethics For the Information Age 5E

iv CONTENTS

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 5: Instructor's Guide - Ethics For the Information Age 5E

Preface

This booklet has supplementary information for instructors using the fifth edition of Ethicsfor the Information Age. It gives practical suggestions for running a successful class, pointsout other resources available via the Web, and contains solutions to all of the book’s reviewquestions. If you identify any errors in this manual, or if you have any ideas for additionalexercises, I would enjoy hearing from you.

Michael J. QuinnCollege of Science and EngineeringSeattle University901 12th AvenueSeattle, WA 98122

[email protected]

v

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 6: Instructor's Guide - Ethics For the Information Age 5E

vi PREFACE

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 7: Instructor's Guide - Ethics For the Information Age 5E

Teaching Computer Ethics

Introduction

Teaching a computers, ethics, and society course for the first time can be intimidating.Unlike the typical computer science class, which focuses on technical content, a computersand society class focuses on people and the decisions they make. Doing ethics is not likefinding the maximum element on a list. The moral problems discussed in this book arecomplicated, and there are no algorithms that enable you to “solve” a moral problem asneatly as you can construct a binary search tree. If you have little or no formal training inethics, you may feel uncomfortable teaching an ethics class.

Fortunately, your job is not to preach to the students or tell them how they ought tobehave (outside of class, anyway!). Rather, your role as the teacher is to raise questions,give students the opportunity to formulate answers, and then gently, but firmly insist thatthe students justify their answers by explaining their reasoning. If you are successful, thestudents will complete the course with a greater understanding of the social and ethicalimplications of computer use and abuse, an improved ability to think critically and defendtheir decisions logically, and a greater appreciation for alternate points of view.

As C. Dianne Martin and Hilary J. Holz put it:

Our belief is that ethics cannot be taught; rather what can be taught is aframework for evaluating ethical dilemmas and making decisions. In accept-ing the premise that technology is value-laden, we stress the need to teach amethodology of explicit ethical analysis in all decision-making related to technol-ogy... The role of ethics education should be to provide students with at least aminimal theoretical background essential for their understanding of the role thatvalues and ethics play in all decision-making, whether it be technical, economic,political, social, or personal.1

1“Non-Apologetic Computer Ethics Education: A Strategy for Integrating Social Impact and Ethicsinto the Computer Science Curriculum,” C. Dianne Martin and Hillary J. Holz, The Research Center onComputing & Society (web site), www.southernct.edu/organizations/rccs.

vii

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 8: Instructor's Guide - Ethics For the Information Age 5E

viii TEACHING COMPUTER ETHICS

What is the best way to achieve this goal? The consensus among experienced instructorsis that the best computer ethics classes are discussion-oriented. Students are more receptiveto hearing ideas from peers than from you. They will come to realize that every complicatedissue can be looked at from multiple points of view. They will also see that all opinions arenot equally valid, and that the best arguments are those that use logic to reach conclusionsfrom facts and commonly held values.

Discussions

Finding topics to discuss should not be a problem for you. The book raises far more issuesthan you will have time to discuss, and late-breaking news stories provide even more discus-sion material. You will have to pick and choose the topics you deem most important. Takeadvantage of the discussion questions and in-class exercises found at the end of each chapter.They can lead to interesting class debates and require no preparation beyond reading thechapter.

The end-of-chapter interviews provide another source of discussion topics. Your studentsmay be highly critical of some of the opinions expressed by the interviewees—so much thebetter!

One of your important responsibilities as the teacher is to prevent a few extroverts fromdominating the discussion. It is easier to keep the discussion moving from person to personif you can get a wide variety of people used to speaking up regularly. Ideally your class issmall enough that you can learn the name of each student. If you know everyone by name,you can call on people even if they do not have their hands up. The first few meetings ofyour class are crucial in establishing a culture of engagement. Try to create an expectationamong the students that nearly everyone will contribute something to every class session.

Another one of your responsibilities is to ensure that the students justify their point ofview. If a student should say, “I think such-and-such is wrong” without further elaboration,you should ask the student to explain why the action is wrong. Sometimes you need to drilldown several levels before you get to the moral value or principle upon which the conclusionrests. I encourage my students to couch their arguments in one or more of these words:benefit, harm, right, obligation, or duty. A utilitarian analysis relies upon an evaluation ofbenefits and harms. A social contract theory analysis focuses on rights. A Kantian analysisconsiders duties or obligations. Asking for these words can have two benefits. It makes theanalysis more rigorous, and it helps the class understand the ethical theory being invoked.

Many of the issues discussed in this class are highly controversial. Students often havedifficulty coming up with a logical argument defending a point of view to which they areemotionally attached. One way to solve this problem is to poll the class and find out whichstudents support an issue and which are opposed to it. If the class is reasonably well divided

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 9: Instructor's Guide - Ethics For the Information Age 5E

ix

between the two points of view, ask the students to argue the point of view opposite totheir own personal beliefs. Without an emotional attachment to a particular point of view,students can be more analytical.

You can add value to a discussion and keep it moving along through the use of meta-comments. For example: “Maria has just given a utilitarian argument why the proposedaction is wrong. Can someone analyze this issue from a Kantian point of view?”

It is important that students understand there are multiple ways to look at nearly everyissue. Through the use of leading questions, you can help ensure that both sides of an issueare expressed. If you cannot find anyone to express a contrarian view, you may need to bringthat view out yourself. Be prepared to promote either side of every issue!

Role-Playing Exercises

You should occasionally set aside time for role-playing exercises. Role-playing activitiesguarantee that many students will participate, and students particularly enjoy them. Thetextbook contains many of these exercises.

For a typical activity, the class is divided into small groups that give presentations rep-resenting a particular point of view. You will need to give the groups time to discuss theissue and devise the arguments they will make to the rest of the class. The amount of timedepends on the exercise, but it is often 10–20 minutes. Next, each group makes its case.Again, the amount of time depends on the exercise, but it is often 20–30 minutes. Finally,it is good to have a concluding discussion in which the students have the opportunity todiscuss the relative strengths of each group’s case.

Writing Assignments

Writing assignments provide another important opportunity for students to practice con-structing ethical evaluations. The media are filled with stories raising moral problems re-lated to information technology. It is easy for students to find a current news story relatedto the topic of a chapter. In a typical 600-word essay I ask students to describe a moralproblem, take a clear stand on whether a particular action or decision is right or wrong, andthen defend their position through the use of one or more of the practical ethical theoriesdescribed in the book (Kantianism, act utilitarianism, rule utilitarianism, or social contracttheory). You can find rubrics for grading written essays on the Web (see the next section).

Web Resources

A variety of Web sites contain information valuable to instructors of computer ethics courses.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 10: Instructor's Guide - Ethics For the Information Age 5E

x TEACHING COMPUTER ETHICS

This section describes a few good sites.Robert Greene, a faculty member at the University of Wisconsin-Eu Claire, has created

a Web site organized according to the chapters of Ethics for the Information Age. The sitehas links to hundreds of articles from Wikipedia, The New York Times, and other newssources. The home page for his site is people.uwec.edu/GREENER/Philosophy308.html.

The ComputingCases.org Web site provides detailed case studies that you can use inclass. Some of them overlap with cases described in Ethics for the Information Age, whileothers are different. The site introduces a methodology called “Social Impact Analysis” forexploring the social and ethical issues related to a computing system. It gives practicaladvice on how to lead an ethics case discussion, and it provides a worksheet that studentscan use when weighing the pros and cons of alternative actions. The home page for the siteis ComputingCases.org.

DOLCE is an acronym for Developing On/Off-Line Computer Ethics. The DOLCE Website contains several classroom activities, including quizzes and role-playing exercises, thatyou can use early in the term to help motivate the study of ethics. The site also containsseveral rubrics (evaluation sheets) that can help you grade written essays. The URL of theDOLCE home page is edocs.uis.edu/kmill2/www/dolce/.

Edward F. Gehringer at North Carolina State University has created an attractive vi-sual map that provides links to Web sites, news articles, and case studies related to computerethics. The URL for the Ethics in Computing site map is ethics.csc.ncsu.edu.

RCCS (Research Center of Computing & Society) is a particularly valuable site ifyou are integrating computer ethics in an existing computer science course. It pro-vides case studies relevant to a wide variety of courses in the typical undergraduatecomputer science curriculum. You could also take advantage of these case studies ifyou are teaching a stand-alone computer ethics course. The home page for this site iswww.southernct.edu/organizations/rccs.

CERIAS is an acronym for the Center for Education and Research in Information As-surance and Security. The CERIAS Web site is a good place to check if you are integratingcomputer ethics into another computer science course. Its materials suggest how discussionsof ethical issues can be introduced into various undergraduate courses in computer science.The URL for this site is www.cerias.purdue.edu.

Summary

One of your roles as a teacher of computer ethics is to raise questions and ensure that a widevariety of points of view are expressed. You are also serving as a role model, demonstratingto students the importance of thinking about the right thing to do—and then doing it.Thinking about ethics is not just for people with a Ph.D. in philosophy. Ethics is for all of

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 11: Instructor's Guide - Ethics For the Information Age 5E

xi

us, and all of us have more to learn. It’s perfectly acceptable to respond to a question with,“I don’t know. I’ll read up on that and get back to you.” I do that all the time. By lettingthe students know that you are a student of ethics, too, you can give them confidence thatthey can start—right now—to think about the moral qualities of their professional decisions.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 12: Instructor's Guide - Ethics For the Information Age 5E

xii TEACHING COMPUTER ETHICS

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 13: Instructor's Guide - Ethics For the Information Age 5E

Chapter 1

Catalysts for Change

1. According to the author, there is good reason to say we are living in the InformationAge because computer and communication technologies have made it easy to collect,store, manipulate, and distribute vast amounts of information.

2. The Amish demonstrate that people have the ability to evaluate every technologycritically and determine whether its use will improve or degrade their quality of life.

3. Three aids to manual calculating are the tablet, the abacus, and the mathematicaltable.

4. Commercial mechanical calculators became practical in the late nineteenth centurybecause advances in machine tools and mass-production methods made it possible tomanufacture reliable devices at a reasonable price.

5. Rapid industrialization, economic expansion, and a concentration of corporate powerin the late 19th century created a growing market for devices that could speed upaccounting.

6. The Burroughs Adding Machine Company surpassed its competitors by combining anexcellent product with excellent marketing.

7. The widespread adoption of the mechanical calculators led to the lowering of wagesof bookkeepers and the transformation of a male-only occupation to an occupationemploying a large number of women.

8. The invention of the cash register was a response to two needs: the need to preventclerks from embezzling money, and the need for better sales accounting.

1

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 14: Instructor's Guide - Ethics For the Information Age 5E

2 CHAPTER 1. CATALYSTS FOR CHANGE

9. In the early twentieth century, the U.S. Census Bureau used punched cards to storecensus data, Marshall Field’s used punched cards to analyze information generated bycash registers, railroads used punched cards to send out bills more frequently, and thePennsylvania Steel Company used punched cards to do cost accounting on manufac-turing processes.

10. A data-processing system has three principle components. The first component inputsdata, the second performs calculations, and the third outputs data.

11. The development of radar in World War II stimulated three advances in comput-ing: electrostatic memory (exemplified by the Williams Tube), semiconductor memory(exemplified by the transistor), and graphical user interfaces (exemplified by DougEngelbart’s oNLine System).

12. IBM quickly overtook Remington Rand as the leading mainframe computer maker be-cause it had a larger base of existing customers and a much better sales and marketingorganization, and it made a much greater investment in research and development.

13. The motivation for the creation of higher-level programming languages was a desire tomake programming less tedious and error-prone and improve programmer productiv-ity. Higher-level programming languages changed computing by enabling programs tobe moved more easily from one manufacturer’s computers to another manufacturer’scomputers. It also led to a large increase in the number of people writing computerprograms.

14. Time-sharing gave more organizations access to electronic digital computers in the1960s by allowing them to share the cost of purchasing (or leasing) and operating acomputer system.

15. Between 1962 and 1965, the Minuteman II missile program was the largest singleconsumer of integrated circuits in the United States, representing about 20 percent oftotal production. In the course of making these chips, manufacturers found ways tomake chips less expensive and more reliable.

16. The principal innovation of the IBM System/360 was the creation of a series of nineteenbinary-compatible computers. All nineteen computers had the same instruction set.That means customers could upgrade from one IBM System/360 to a bigger, fastercomputer in the same product line without having to rewrite their programs.

17. The semaphore telegraph was adopted more rapidly on the continent of Europe thanin the British Isles because the system only works when atmospheric conditions allow

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 15: Instructor's Guide - Ethics For the Information Age 5E

3

good visibility between stations. Since fog and rain are more common in the BritishIsles, the semaphore telegraph is not as practical.

18. Morse’s telegraph put the Pony Express out of business. Morse’s telegraph madepossible fire alarm boxes in urban areas.

19. The telephone blurred the traditional boundaries between private life and public life,between family and business. The telephone eroded traditional social hierarchies. Thetelephone enabled the creation of the first “on-line” communities.

20. A circuit-switched network sets up a permanent physical circuit between the machinesthat are communicating. The circuit may not be used for other communications whilethese two machines are holding the circuit, even when they are not actually exchangingmessages. A packet-switched network divides messages into groups of bits called pack-ets. Network routers transfer packets from a message sender to a a message receiver.At one moment a physical wire may be carrying a packet from one message, and atthe next moment it may carry a packet from another message.

21. The Internet has a decentralized structure because ARPA did not want the ARPANETto collapse if a single computer were lost. It is widely reported that fear of a nuclearattack led ARPA to this design decision.

22. The National Science Foundation stimulated the creation of commercial, long-distancedata networks in the United States by simultaneously (1) encouraging commercial useof regional NSFNET networks and (2) banning commercial traffic on the NSFNETBackbone.

23. The codex is more durable than a papyrus scroll, and it makes it much easier forreaders to locate a particular passage in a book.

24. Hypertext is a linked network of nodes containing information.

25. A hypertext link is similar to a citation in a book in the sense that both point to asource of related information. A hypertext link is superior to a citation in that youcan jump immediately to the related material by clicking on the link.

26. Douglas Engelbart invented the computer mouse in the 1960s.

27. The Apple Lisa was not commercially successful because it was too expensive and itsprocessor was too slow. The Macintosh was much cheaper and faster.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 16: Instructor's Guide - Ethics For the Information Age 5E

4 CHAPTER 1. CATALYSTS FOR CHANGE

28. An Apple HyperCard stack is fundamentally different from the World Wide Web be-cause hyperlinks connect pages (cards) all located on the same computer.

29. Constructing the World Wide Web on top of the TCP/IP protocol, rather than onevendor’s proprietary network protocol, helped ensure the success of the Web, because itenabled the Web to span computers made by different manufacturers running differentoperating systems.

30. The first widely used Web browser was Mosaic, developed at the National Center forSupercomputer Applications at the University of Illinois, Urbana-Champaign. Fourpopular Web browsers in use today are Microsoft’s Internet Explorer, Google’s Chrome,Mozilla’s Firefox, and Apple’s Safari.

31. A search engine is program that accepts a list of keywords from a user, searches adatabase of documents, and returns those documents most closely matching the spec-ified keywords.

Crawler-based search engines automatically create the database of information aboutWeb pages. Google and AltaVista are crawler-based search engines. The other type ofsearch engine relies upon databases of Web page information constructed by humans.OpenDirectory is an example of this kind of search engine.

32. Information technology refers to devices used in the creation, storage, manipulation,exchange, and dissemination of data, sound, and/or images.

33. Inventions mentioned in this chapter that were created for a military application arethe the ENIAC, radar, and the ARPANET.

34. The need for large amounts of timely information by corporate managers in the latenineteenth century fueled the growth of the manual calculator market. The needto store and manipulate large amounts of data prompted the invention of punched-card tabulation and data-processing systems. A demand for less expensive accessto computers stimulated the development of time sharing. BASIC became popularbecause there was a demand for an easy-to-learn programming language. An interestin accessing and sharing information led to the rapid adoption of the World Wide Webcreated by Tim Berners-Lee. (Other examples are possible.)

35. The adoption of the telephone erased traditional boundaries between work and home.The telephone also make possible the first on-line communities, through party lines.Manual calculators led to the deskilling and feminization of bookkeeping. Time-sharing

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 17: Instructor's Guide - Ethics For the Information Age 5E

5

systems gave many more people access to computers, which they used for both edu-cational and entertainment purposes. Television broadcasts may have influenced theoutcome of the U.S. Presidential election of 2000. (Other examples are possible.)

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 18: Instructor's Guide - Ethics For the Information Age 5E

6 CHAPTER 1. CATALYSTS FOR CHANGE

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 19: Instructor's Guide - Ethics For the Information Age 5E

Chapter 2

Introduction to Ethics

1. The “ethical point of view” means respecting not only your own goals and aspirations,but taking into consideration the goals and aspirations of other people as well.

2. Morality refers to guidelines that you can use to determine what you ought to do ina particular situation. Morality also allows you to figure out whether a particulardecision or action is right or wrong. Ethics is the philosophical study of morality.

3. Morality is focused on solving particular problems. Ethics is broader than morality inthat it includes the higher-level activities evaluating moral systems and the creationof new ways of evaluating moral problems.

4. Relativism is the view that “the good” exists inside the human mind. Our role ashumans is to invent “the good.” Since “the good” is invented, its definition is malleable.Objectivism is the view that “the good” exists outside the human mind. Our role ashumans is to find or discover “the good.” Since “the good” exists independently of ourintellectual activity, its definition never changes.

5. By using an ethical theory in which all humans are treated equally and guidelines aredeveloped through a process of logical reasoning, it is more likely that you can craftan ethical argument that will be convincing to a diverse audience.

6. Person B has not made a strong ethical argument because she has not brought up anyfacts or values that would undermine or contradict the explanation of Person A.

7. When we say an ethical theory is rational, we mean that it relies upon logical reasoningfrom facts or commonly held values.

7

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 20: Instructor's Guide - Ethics For the Information Age 5E

8 CHAPTER 2. INTRODUCTION TO ETHICS

8. The many/any fallacy is to conclude that any option is acceptable after observing thatmany options are acceptable. For example, you may observe me take several differentroutes between home and work, and all of them are good in the sense that they allowme to reach my destination safely and in a reasonable amount of time. That does notimply that all possible routes between home and work are good.

9. The equivalence fallacy is to confuse similarity with equality. It comes into play in thischapter in the discussion of the divine command theory. When we say “God is good,”it is fallacious to argue that God and the good are identical.

Another example of the equivalence fallacy would be to conclude from the statement“Adolph Hitler was evil incarnate” that everything Hitler said or did was evil.

10. Sometimes I leave home a little late, but I’d still like to get to work on time. Iwant to be able to drive through red lights on those days when I am running late.The proposed moral rule is: I may ignore traffic laws when I am pressed for time.If we universalized this rule, then traffic signals would cease to have any meaning.The streets would be chaotic. There would be gridlock or accidents at every busyintersection. That contradicts my desire to get to work on time. Hence my proposedmoral rule is logically self-defeating. It is wrong for me to drive through red lights onthose days when I am running late.

11. Plagiarism is the use of someone else’s words or ideas without giving that personcredit. Appendix A actually gives five ways of committing plagiarism: copying an-other’s words without putting the words in quotation marks and citing the source;paraphrasing another’s words without citing the source; incorporating someone else’sfigures or drawings without citing the source; referencing facts that are not commonknowledge without citing the source; and using another person’s ideas without givingthat person credit.

12. Plagiarism refers to deliberately concealing the fact that you have used someone else’swords or ideas. If the action is not intentional, it should be called misuse of sources.

13. A consequentialist theory determines whether an action is right or wrong by evaluatingits consequences. Utilitarianism is a consequentialist theory. A non-consequentialisttheory determines whether an action is right or wrong by considering the underlyingrule or principle motivating the action. Kantianism and social contract theory arenon-consequentialist theories.

14. Three situations in which my action would be primarily motivated by a sense of dutyor obligation:

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 21: Instructor's Guide - Ethics For the Information Age 5E

9

(a) I promised someone if he could get two tickets to a rock concert, I would purchasea ticket and go with him. He got the tickets and expects me to pay for mine. Ikeep my promise, even though I just lost my job and I really can’t afford to go.

(b) I pay my income taxes, even though I think the government has some wastefulprograms.

(c) Everybody in my fraternity is going to give blood. I donate blood, too, eventhough just thinking about it makes me queasy.

Three situations in which my action is primarily motivated by its expected conse-quences:

(a) I give money to a particular charity because it has the lowest administrativeoverhead of any international relief organization. I figure more of my money willactually reach those who need it.

(b) I work extra hard in a particular class, even though I am not interested in thematerial, because I hope the professor will write me a good letter of recommen-dation.

(c) I slightly exaggerate my experience in order to get a good job as a server in a nicerestaurant.

15. Moral luck is a problem associated with act utilitarianism. According to act utili-tarianism, the moral worth of an action depends solely on its consequences. If theconsequences are out of the control of the moral agent, an action that should have hada good effect may end up having a harmful effect. In this case, the action is deemedto be wrong, even though it was no fault of the person performing the action.

16. Businesses and governments often use utilitarian thinking to determine the propercourse of action because it allows all the consequences of a decision to be boiled downto dollars and cents (or some other quantifiable unit of measure).

17. The difference principle states that social and economic inequalities must be justified,and the only way to justify a social or economic inequality is to show that its overalleffect is to provide the most benefit to the least advantaged. For example, undercapitalism some people are allowed to have much more wealth than others. In orderto justify capitalism, it must be shown that the poorest are better off than underalternative economic systems.

18. Social contract theory is a non-consequentialist theory. Social contract theory as ar-ticulated in Rawls’s two principles of justice is a non-consequentialist theory.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 22: Instructor's Guide - Ethics For the Information Age 5E

10 CHAPTER 2. INTRODUCTION TO ETHICS

19. Subjective relativism and ethical egoism are similar in the sense that both theoriesallow an individual to put himself or herself first in determining the right action totake in a particular situation. However, there is a crucial difference between the twotheories. Subjective relativism, like all relativistic theories, holds that each persondecides what is right for himself or herself. Two people in the same circumstancescould choose completely different actions, and both could be right. Ethical egoism, onthe other hand, is an objective theory. It holds that the right action for a person to takein a particular situation is the action that will be to the greatest long-term benefit ofthat person. A rational, objective process is used to determine the greatest long-termbenefit, meaning anyone in the same situation should reach the same conclusion.

20. Both divine command theory and Kantianism are objective, holding that right andwrong can be expressed in rules that are true for all people at all times in history.Divine command theory identifies the good with the will of God, and holds that thewill of God is communicated through holy books. Kantianism, on the other hand,holds that we can use our reason to determine what is good.

21. Both subjective relativism and act utilitarianism would allow an individual to evaluatea situation to determine whether a particular action is right or wrong. However,subjective relativism allows a person to use any means to decide the right thing todo. According to act utilitarianism, the consequences of the possible actions mustevaluated. The correct action is the one that leads to the greatest increase in totalhappiness among the parties effected.

22. Both Kantianism and rule utilitarianism are objective. According to both theories,right actions are those that are in line with universal moral rules. However, the twotheories derive the rules in different ways. Kantianism determines whether a proposedmoral rule is acceptable by evaluating it according to the Categorical Imperative.Utilitarianism determines whether a proposed moral rule is acceptable by consideringthe long-term, overall total change in happiness that would result if everyone alwaysfollowed the rule.

23. Both act utilitarianism and rule utilitarianism are consequentialist theories. However,act utilitarianism considers the consequences that would result from an action takenin one particular situation. Rule utilitarianism considers the consequences that wouldresult if everyone always took a certain course of action in all similar situations.

24. Both theories focus on the notion of society, but they are quite different. For onething, cultural relativism is an example of relativism, while social contract theory is

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 23: Instructor's Guide - Ethics For the Information Age 5E

11

an example of objectivism. Cultural relativism says each society must determine foritself what people ought to do in various situations. Different societies come up withdifferent moral codes. These rules may be based heavily on tradition and not on reason.Social contract theory says morality consists in those rules that rational people oughtto recognize are in everyone’s best benefit if they are universally obeyed.

25. Both Kantianism and social contract theory are objective, rule-based theories. InKantianism, proposed rules are derived by seeing if they can meet the requirements ofthe Categorical Imperative. In social contract theory, proposed rules are derived byseeing if their universal adoption would be to everyone’s mutual benefit.

26. Alexis did wrong when she made use of a student’s login and password to gain accessto the library’s computers and printers. Alexis treated the student as a means to herend of getting access to the private college’s computers.

The anti-spam organization is treating the innocent computer users in the East Asiancountry as means to its end of reducing spam. That is wrong.

The analysis depends upon the expectation of privacy people should have. The exis-tence of the cameras is public knowledge. If nobody is being “used,” the action appearsto be morally acceptable.

Releasing the software without informing the potential users of the possible bugs wouldbe wrong. However, if the hospital staff were fully notified that the product was inbeta test, a decision to release the product could be justified.

27. The benefits to Alexis were large. The harms to others were small. Her action wasmorally acceptable.

Millions of people are getting much less spam. The benefit to each of these persons issmall, but meaningful. Tens of thousands of citizens of the East Asian country cannotsend email to the United States. The harm to each of these persons is significant.Concluding whether the action is right or wrong depends upon the weight you give toeach person’s benefit or harm.

In this case the benefits seem to outweigh the harms. The actions of the East DakotaState Police are morally acceptable.

To do the analysis, we must examine the various courses of action and weigh, for eachone, the potential benefits and harms to the patients, nurses, hospital, and membersof the start-up company.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 24: Instructor's Guide - Ethics For the Information Age 5E

12 CHAPTER 2. INTRODUCTION TO ETHICS

28. A rule utilitarian is likely to subscribe to the rule “Gaining access to another person’sprivate information is wrong,” since a great deal of harm can result if people wereunable to protect confidential information such as credit card numbers. For this rea-son, Alexis did wrong when she used someone else’s login and password to access thelibrary’s computers and printers.

The challenge with this scenario is to determine whether any moral rules have beenbroken. In general, utilitarianism is comfortable with the notion that maximizing theoverall good may mean that the majority gains a benefit while the minority suffers aharm.

The East Dakota State Police is using technology to increase the safety of the commu-nity. Its actions appear to be morally acceptable.

As long as the company fully discloses the status of the product, it appears to be onsafe ground.

29. Alexis violated the property rights of the private college when she used its computerswithout permission. Her action was wrong.

The residents of the East Asian country had a reasonable expectation that their emailwould be delivered. By blacklisting the country’s ISPs, the anti-spam organizationencouraged American ISPs to refuse to forward email. This seems wrong.

How much privacy should a person have while operating a motor vehicle on a freeway?If a person has given up all privacy, then there seems to be nothing wrong with thisaction. If a person has a reasonable expectation of privacy, then the East DakotaState Police may have done something wrong if it secretly gave the FBI access to theinformation.

The purchaser of a product has a right to expect the manufacturer stands behind thequality of the product. In this case it would be wrong for the company to sell theproduct as if it were completely debugged and 100 percent reliable. On the otherhand, the hospital might be willing to beta test the device if it could get a discountedprice or if that would help the company certify its reliability. The company could beginshipping the device to hospitals that understood the current state of the software.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 25: Instructor's Guide - Ethics For the Information Age 5E

Chapter 3

Networked Communications

1. The Internet is a network of computer networks that uses two protocols, collectivelyknown as TCP/IP, to control the exchange of data.

2. The first part of an email address (before the @ sign) identifies a particular computeruser. The second part of an email address (after the @ sign) contains a domain name.

3. Unless the email message is short, the mail server divides the message into packets.The message is sent from mail server through zero or more intermediate routers tothe mail server of the person to whom you are sending the email. The destinationemail server reassembles the message from the packets (if necessary) and transmits themessage to the intended recipient.

4. Spam is unsolicited, bulk email.

5. A spam filter attempts to keep spam from reaching someone’s mailbox by identifyingand discarding (or routing to a special folder) emails that appear to be spam.

6. A URL is a Uniform Resource Locator. Every Web page has a unique URL, enablinghyperlinks to be set up between arbitrary pages.

7. A wiki is a collaborative Web site that allows multiple people to create and edit thecontents of the site using Web browsers.

8. A blog (Web log) is a personal diary or journal kept on the Web. The journal maycontain text, photos, or videos.

9. A PC bang is a Korean cybercafe in which people play persistent, on-line games.

13

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 26: Instructor's Guide - Ethics For the Information Age 5E

14 CHAPTER 3. NETWORKED COMMUNICATIONS

10. Here are five among a multitude of other uses of the Web:

(a) We sell stuff in on-line auctions (such as eBay).

(b) We seek medical information from on-line special interest groups of people suffer-ing from particular diseases.

(c) We learn about the weather.

(d) We find out about current traffic conditions before deciding whether to leave work.

(e) We get directions before driving to a place we’ve never been before.

11. Censorship is when one person or organization prevents another person or organizationfrom expressing their opinion.

12. There are three forms of direct censorship: government monopolization, pre-publicationreview and licensing and registration. Government monopolization means the govern-ment owns all the media outlets. Pre-publication review means the government mustapprove information before it is disseminated. Licensing and registration means a newsorganization must get a license from the government before operating. It is used formedia with limited bandwidth, such as radio and television.

13. Broadcasters have the most limited First Amendment rights because they have a per-vasive presence. Broadcasters beam signals into the privacy of the home. Since peoplecan turn radios and televisions on and off, they may turn a device on in the middleof a show. That means that warnings at the start of a show are less effective than awarning at the front of a newspaper or magazine article. Also, broadcasting is acces-sible to children, even those too young to read. Restricting the access of children toradio or television is more difficult than restricting access to adult magazines or books.

14. Censorship is difficult on the Internet because:

(a) The Internet supports many-to-many communication. The Internet has far moreinformation outlets than television or radio.

(b) The Internet is dynamic. Millions of computers are being added to the Internetevery year.

(c) The Web is huge, containing billions of pages. Nobody can keep track of every-thing published on the Web.

(d) The Internet is global. Laws passed in one nation may have no effect outside thatnation’s borders.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 27: Instructor's Guide - Ethics For the Information Age 5E

15

(e) It is hard to distinguish between children and adults on the Internet.

15. A Web filter is a piece of software that prevents Web browsers from displaying certainpages, presumably because they have objectionable content.

16. The term “sexting” refers to sending text messages or emails that are sexually sugges-tive. Often sexting involves sending nude photos.

17. The leading form of identity theft in the United States is credit card fraud.

18. Phishing is a form of spamming in which the email messages are designed to trickvictims into revealing sensitive financial information.

19. Cyberbullying refers to bullying via the Internet or the phone system.

20. The term “Internet addiction” stretches the traditional concept of addiction becausethe traditional definition of addiction focuses on the misuse of a chemical substance ordrug.

21. The Enlightenment view of addiction is that people are responsible for the decisionsthey make about what they put into their bodies. Therefore, the responsibility for aperson becoming addicted rests with the addict himself/herself.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 28: Instructor's Guide - Ethics For the Information Age 5E

16 CHAPTER 3. NETWORKED COMMUNICATIONS

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 29: Instructor's Guide - Ethics For the Information Age 5E

Chapter 4

Intellectual Property

1. The term intellectual property is used to describe a unique creation of the humanmind that has commercial value. Examples of intellectual property include poems,photographs, songs, plays, books, paintings, sculptures, movies, logos, slogans, designs,perfumes, recipes, and computer programs.

2. John Locke holds that when people remove something from Nature through their ownlabor, they have mixed their labor with it, and therefore they have a property right inthat object.

3. If more than two people create the identical intellectual property, there is only oneinstance of that property, not two, meaning both people cannot claim full rights to thatproperty. Copying an intellectual property is different from stealing a physical property.Perfect copies can be made of objects embodying an intellectual property. When thishappens, the original owner has lost exclusive control over use of the property, eventhough he or she still has the original article.

4. An individual or firm in the United States may protect intellectual property throughtrade secrets, trademarks, service marks, patents, and copyrights.

5. A trademark is a word, symbol, picture, sound, color, or smell used to identify aproduct. It is good when a company’s trademark becomes well known to the public.Examples of trademarks are Kleenex, McDonald’s Golden Arches, and Advil. Yourcollege or university’s logo is most likely trademarked. A trade secret is a piece ofintellectual property that is kept confidential. Examples of trade secrets are formulas,processes, proprietary designs, strategic plans, and customer lists. The informationloses much or all of its value if it becomes public knowledge.

17

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 30: Instructor's Guide - Ethics For the Information Age 5E

18 CHAPTER 4. INTELLECTUAL PROPERTY

6. The advantage of a trade secret is that it does not expire. The disadvantage of a tradesecret is that a company cannot prevent another company from attempting to reverseengineer the formula or process. The advantage of a patent is that the government givesthe patent owner the exclusive right to the intellectual property. The disadvantage ofa patent is that this right expires after 20 years.

7. Fair use refers to those circumstances under which it is legal to reproduce a copyrightedwork without permission.

8. As information technology has advanced, companies have begun using digital media(such as CDs and DVDs) to store copyrighted songs, movies, and computer programs.The widespread availability of personal computers and CD/DVD burners has made itmuch easier for consumers to make copies of CDs and DVDs.

9. The Digital Millennium Copyright Act curtails fair use of copyrighted material byconsumers by making it illegal to make copies of DVDs.

10. Digital rights management refers to any of a variety of actions owners of intellectualproperty stored in digital form may take to protect their rights. Examples of digitalrights management include encryption, digital watermarking, and making CDs copy-proof.

11. A peer-to-peer network is a transient (temporary) network allowing computers runningthe same networking program to connect with each other and access files stored on eachother’s hard drives. Peer-to-peer networks facilitate file sharing.

12. Napster relied on a single central server to mediate requests. FastTrack distributes theindex of available files among many supernodes. Shutting down Napster simply re-quires shutting down the single central server. Shutting down FastTrack would requireshutting down all of the supernodes. Hence FastTrack would be more difficult for thejudicial system to shut down than Napster.

13. BitTorrent achieves an order-of-magnitude increase in downloading speed, comparedwith KaZaA and Grokster, by allowing a user to download different pieces of a filefrom many different sources simultaneously.

14. Sony did not actively encourage its customers to break copyright law. The SupremeCourt ruled that time-shifting was not an infringement of copyright. In contrast,Grokster and StreamCast actively encouraged the availability of copyrighted files ontheir networks and helped consumers download these files, because these actions in-creased the popularity of their services and heightened their advertising revenues.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 31: Instructor's Guide - Ethics For the Information Age 5E

19

15. Patents are considered an unreliable way of protecting intellectual property rights insoftware because the Patent Office has given out many bad software patents thancannot hold up in court. This has happened because for decades the Patent Officedid not give out patents on software. During this time a lot of “prior art” was beingdeveloped. Now, when a company applies for a software patent, the Patent Office maynot be aware of some of the prior art. It may issue a patent even though the algorithmis not novel. Such a patent has little value. The existence of bad patents in softwarereduces the value of software patents in general.

16. Company A resorts to “clean room” software development. Two independent teamswork on the project. The first team is responsible for determining how Company B’sprogram works and produces a technical specification. The second team relies solelyon the technical specification to develop the software. Because the code developers areisolated from Company B’s product, Company A can ensure no code get copied, evenunconsciously.

17. Open source refers to software in which the source code is distributed along with theexecutable program.

18. Linux has affected the market for proprietary software by putting price pressure oncompanies selling proprietary versions of Unix. It is providing an alternative to serversrunning the Windows operating system. Linux is also putting pressure on Microsoftand Apple, which sell proprietary operating systems for desktop computers.

19. My band can select a Creative Commons license that allows people to download musicfor noncommercial purposes, but still protects the band’s copyright to the song.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 32: Instructor's Guide - Ethics For the Information Age 5E

20 CHAPTER 4. INTELLECTUAL PROPERTY

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 33: Instructor's Guide - Ethics For the Information Age 5E

Chapter 5

Information Privacy

1. Whitepages.com combines information contained in two databases. The first databaseties phone numbers to addresses. The second database ties addresses to locations ona map. By combining information in these databases, Whitepages.com can show themap location associated with a phone number.

2. Privacy is a negative right because all I have to do to give you privacy is leave youalone.

3. The Third Amendment to the U.S. Constitution gives people the right to refuse to letthe government quarter soldiers in their homes in peacetime.

4. When we say privacy is a prudential right, we mean that granting people this rightprovides a net benefit to society. Hence it is prudent for a society to choose to give itsmembers some privacy.

5. With the invention of air conditioning and television, people spend more time in theirown apartments than they did 100 years ago. Automobiles and taxicabs give peoplemore privacy than subway cars. Young adults are more likely to live away from theirparents than they were 100 years ago. Other examples are possible, of course.

6. A public record contains information reported to a government agency for the purposeof informing the public.

7. Here are a few examples of public records that may exist about a person: legal name,address, list of real estate owned, property tax records, political party, date of birth,date of marriage, date of divorce, and date of death.

21

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 34: Instructor's Guide - Ethics For the Information Age 5E

22 CHAPTER 5. INFORMATION PRIVACY

8. Here are a couple of possible answers. In order to get a job, many people are requiredto take a drug test; i.e., submit a urine sample. People routinely submit urine andblood samples and hand over medical records in order to get a life insurance policy.

9. The Electronic Privacy Information Center filed a complaint about Facebook Tag Sug-gestions because Facebook apparently used photos posted on its site to develop itsfacial recognition technology, but it never received consent from Facebook users to usetheir photos for this purpose.

10. Enhanced 911 service raises new concerns about privacy because in order to implementthis service, cell phone companies must install technology that enables them to trackthe positions of all active cell phones.

11. By keeping track of a consumer’s purchases using a loyalty card, a company can predictwhich other products that consumer may be interested in purchasing and generatecoupons for those products to stimulate a sale.

12. If consumers cannot detach or disable the RFID tags associated with items they havepurchased, then information about their possessions may be collected by other peoplewith RFID scanners.

13. If every pet has an embedded RFID tag with the address and phone number of theowner, then authorities who recover a stray pet can use an RFID scanner to read thisinformation and quickly return the pet to her owner.

14. A two-way communication system allows drivers who need help to contact an OnStarrepresentative. If the vehicle’s airbags deploy, the system automatically communicatesthe location of the vehicle to an OnStar center. OnStar can be used to help ownersrecover stolen vehicles. OnStar representatives also have the power to disable the gaspedal on OnStar-equipped vehicles.

15. Consolidating a patient’s medical records into a single database can make it easierfor multiple health care professionals to provide quality service to that patient. Forexample, having all of a person’s prescriptions in a single database makes it easier toidentify potentially dangerous drug interactions. The risk of consolidation is that ifsomeone should gain access to the database without authorization, that person wouldget access to all of that patient’s medical information.

16. Digital video recorders provide viewers with less privacy that videotape recorders be-cause they report information about the viewing history back to the subscription serviceproviding the DVR.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 35: Instructor's Guide - Ethics For the Information Age 5E

23

17. Cookies created by a Web server can affect your privacy because if someone else shouldsteal the your cookie, that person can impersonate you. (This issue will be discussedin Chapter 7.)

18. Data mining means searching through multiple databases looking for patterns or rela-tionships in the records.

19. Secondary use of data is when information captured for one purpose is put to anotherpurpose.

20. Collaborative filtering is a way of helping an individual wade through a large amountof choices and focus in on the best ones. It uses information about the preferences ofa large number of people to predict those items an individual is more likely to like.On-line retailers and movie-rental sites use collaborative filtering to make recommen-dations.

21. Some campaigns are using data mining because it enables them to target their directmailings and home visits to the people most likely to support their candidates.

22. An opt-in policy requires a consumer to explicitly give permission before an organi-zation can share information it has collected about the individual. An opt-out policyallows an organization to share information it has collected about a consumer unlessthe individual explicitly forbids it.

23. Facebook’s decision to make their Beacon system opt-out infuriated many Facebookusers, who didn’t even know Beacon existed until it had revealed information theythought was private.

24. Cell phone companies are using data mining on social networks to identify “influencers”and offer them incentives to keep them loyal. Police are using data mining on socialnetworks to identify where big parties are happening and deploy officers accordingly.Banks are using data mining to evaluate the riskiness of loans.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 36: Instructor's Guide - Ethics For the Information Age 5E

24 CHAPTER 5. INFORMATION PRIVACY

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 37: Instructor's Guide - Ethics For the Information Age 5E

Chapter 6

Privacy and the Government

1. “Information collection refers to activities that gather personal information.” An ex-ample of information collection by a government agency would be educational recordsheld by a public university.

“Information processing refers to activities that store, manipulate, and use personaldata that has been collected.” An example of information processing would be makinga prediction about the number of graduates who are going to fall behind in repayingtheir federal student loans.

“Information dissemination refers to activities that spread personal information.” Anexample of information dissemination is when a state government releases a list offelons who are ineligible to vote.

“Invasion refers to activities that intrude upon a person’s daily life.” An example of agovernment activity in this category is requiring those who wish to purchase a gun tohave a criminal background check and to register their gun.

2. The Employee Polygraph Protection Act helps jobs applicants and company employeesmaintain their privacy by making it illegal for companies to require polygraph tests as acondition of employment (except for a few types of job). The EPPA also makes it illegalfor companies to give polygraph tests to current employees, with a few exceptions. Themost significant loophole of the Employee Polygraph Protection Act is that it does notapply to federal, state, or local government agencies.

3. The purpose of the Children’s Online Privacy Protection Act is to reduce the amountof personal information gathered from children using the Internet.

4. The two principal purposes of the Genetic Information Nondiscrimination Act are

25

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 38: Instructor's Guide - Ethics For the Information Age 5E

26 CHAPTER 6. PRIVACY AND THE GOVERNMENT

(1) to prevent health insurance companies and health plan administrators from us-ing genetic information when making decisions about “coverage, rates, or preexistingconditions,” and (2) to prohibit most employers from taking genetic information intoaccount when making decisions related to the terms of employment (e.g., hiring, firing,and promotions).

5. During World War I, the Census Bureau provided the names and addresses of youngmen to the military, which was searching for draft resistors. After the attack on PearlHarbor, the Census Bureau provided the Justice Department with information aboutthe general location of Japanese-Americans. The Army used this information to roundup Japanese-Americans and send them to internment camps.

6. The National Crime Information Center helped the FBI identify James Earl Ray as theassassin of Dr. Martin Luther King, Jr. The NCIC helped the FBI capture TimothyMcVeigh, who was later convicted of the bombing of the Federal Building in OklahomaCity.

7. The purpose of the OneDOJ database is to give state and local police officers accessto information generated by five federal law enforcement agencies. Since the databasecontains incident reports, interrogation summaries, and other such information, thereis information about people who have never been arrested or charged with a crime.Critics say local police should not have access to this kind of information, which mayinclude unsubstantiated and erroneous reports that will never be corrected or removed.

8. Great Britain leads the world in the deployment of closed-circuit television cameras.

9. An example of overt surveillance by a government agency in the United States is theuse of closed-circuit television cameras to provide security in public places.

10. Two examples of covert surveillance by the U.S. government are wiretapping and theuse of hidden microphones (bugs).

11. The Fourth Amendment to the U.S. Constitution protects people from unreasonablesearches and seizures of their property by law enforcement authorities.

12. The U.S. Supreme Court decision in Nardone v. United States established that evidencecollected from warrantless wiretaps is inadmissible in court.

13. In Weiss v. United States, the Supreme Court ruled that the the ban on the admis-sibility of evidence collected from warrantless wiretaps included intrastate as well asinterstate telephone calls.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 39: Instructor's Guide - Ethics For the Information Age 5E

27

14. In Charles Katz v. United States, the U.S. Supreme Court broadened the concept ofprivacy by affirming that citizens should be protected from all electronic surveillanceconducted without warrants, including bugs.

15. Operation Shamrock began during World War II, when the U.S. government decidedit needed to monitor all telegram traffic entering and leaving the United States, pre-sumably as a way of combating espionage. Eventually the Johnson and Nixon admin-istrations used this surveillance infrastructure to monitor the activities of Americancitizens opposed to the Vietnam war, including the Reverend Dr. Martin Luther King,Jr., The Reverend Ralph Abernathy, Black Panther Leader Eldrige Cleaver, pediatri-cian Dr. Benjamin Spock, folk singer Joan Baez, and actress Jane Fonda.

16. The purpose of the Carnivore system was to enable the FBI to monitor Internet traffic,including email messages.

17. The National Security Agency began its secret wiretapping program after 9/11 in thehope that it could gather information that could prove valuable in preventing furtherterrorist attacks.

18. The TALON database was supposed to store reports about suspicious activities orterrorist threats near military bases. Controversy ensued when it was revealed thatthe database was also being used to store reports about anti-war protests and emailsfrom university students planning protests against on-campus military recruiting.

19. A pen register is a surveillance device attached to a suspect’s phone line that displaysthe number being dialed.

20. A trap-and-trace device is a surveillance device attached to a suspect’s phone line thatdisplays the phone numbers of people calling the suspect.

21. A roving wiretap is a wiretap that moves from phone to phone. Roving wiretaps areauthorized by the Electronic Communications Privacy Act when a suspect attemptsto avoid surveillance by using many different phones.

22. The Stored Communications Act allows police to read emails more than 180 days oldstored by an Internet Service Provider, without a search warrant. This is an importantissue because most people allow their email provider to store their email messages.

23. The three most controversial provisions of the USA PATRIOT Act are those allowingthe use of roving wiretaps, permitting the surveillance of “lone wolf” suspects not linked

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 40: Instructor's Guide - Ethics For the Information Age 5E

28 CHAPTER 6. PRIVACY AND THE GOVERNMENT

to terrorist groups, and allowing the FBI to seize business, medical, educational, andlibrary records without showing probable cause.

24. The expansion in the use of National Security Letters has raised privacy concerns fora variety of reasons. The FBI can issue these letters without showing probable cause,and it has been issuing about 50,000 National Security Letters every year. Typicallya gag order is associated with a National Security Letter. The gag order preventsthe recipient of the letter (such as a library or educational institution) from disclosingreceipt of the letter.

25. The Code of Fair Information Practices has these five tenets: there cannot be anysecret databases, people have the right to know what information about them is storedand how it is being used, people should be able to prevent information collected forone purpose to be used for another purpose, people have the right to correct errorsin the information about them, and organizations maintaining databases should makesure the data are reliable and secure.

26. The Privacy Act is criticized by Bellair and others because it applies only to governmentdatabases, only covers records indexed by a personal identifier, does not assign anyfederal agency the responsibility of enforcing its provisions, and allows federal agenciesto share records.

27. Information about criminal convictions may be kept indefinitely, and bankruptcy in-formation may be held for 10 years.

28. The Fair and Accurate Credit Transactions Act helps consumers verify the accuracyof their credit reports by giving them the right to request a free copy of their creditreport once a year from each of the three major credit reporting bureaus.

29. The major provisions of the Financial Services Modernization Act are: allowing banksto offer insurance and brokerage services, requiring financial institutions to disclosetheir privacy policies to their customers at least once a year, and requiring financialinstitutions to take measures to prevent the unauthorized access of customers’ confi-dential information.

30. The IRS uses data mining to determine whom it should audit. New York City’s Syn-dromic Surveillance System looks for epidemics, environmental problems, or bioterror-ism. The Terrorist Information Awareness project is a third example of data miningby the U.S. government.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 41: Instructor's Guide - Ethics For the Information Age 5E

29

31. Social Security numbers are not unique. They are rarely checked, so criminals can getaway with supplying fake SSNs. They have no error-detecting capability, so SSNs areprone to data-entry errors.

32. Proponents of a national identification card argue that a modern identification cardwith biometric data would be harder to forge than a Social Security card or a driver’slicense. A national identification card would reduce illegal immigration by makingit impossible for an illegal alien to find work. Opponents of a national identificationcard say that corrupt officials inside government agencies would make it possible forpeople to obtain fake national identification cards. A national identification card willsimply make it easier for the government to perform data mining on the activities ofits citizens.

33. The Family Education Rights and Privacy Act gives students 18 years old and olderthe right to review their educational records. It also gives them the right to requestchanges to records containing errors. Students may prevent others from accessing theserecords without permission, except under certain circumstances. If a student is lessthan 18 years old, these rights are held by the student’s parents or guardians.

34. The Video Privacy Protection Act enhances privacy by making it illegal for videotapeservice providers to disclose rental records without the consent of the customer. Thelaw also requires stores to destroy information about who rented what within a year ofwhen the information is no longer needed for the purposes of the original transaction.

35. The Health Insurance Portability and Accountability Act limits how doctors, hospi-tals, pharmacies, and insurance companies can use medical information collected frompatients. The regulations forbid health care providers from releasing information to lifeinsurance companies, banks, or other businesses without specific signed authorizationfrom the person being treated. Health care providers must provide their patients witha notice describing how they use the information they gather. Patients have the rightto see their medical records and request corrections to errors they find in those records.

36. The purpose of the Freedom of Information Act is to ensure that the public has accessto the records of the U.S. government.

37. The Freedom of Information Act has nine exemptions, but two are particularly impor-tant. The Government does not have to release documents if they contain trade secretsor other confidential financial or commercial information. The Government does nothave to release documents related to law enforcement investigations.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 42: Instructor's Guide - Ethics For the Information Age 5E

30 CHAPTER 6. PRIVACY AND THE GOVERNMENT

38. Information collected by the E-ZPass network have been used to help obtain civil andcriminal convictions in court. For example, E-ZPass records were used as evidence inthe murder trial of Melanie McGuire. The records helped the prosecutor reconstructher movements.

39. The Federal Trade Commission reduced unwanted telemarketing by creating the Na-tional Do Not Call Registry.

40. The purpose of the CALM Act is to ensure that television commercials are broadcastat the same volume as the television programs they are interrupting.

41. Federal and state governments have passed laws limiting access to cold products con-taining pseudoephedrine because they are trying to eliminate the illegal manufacturingof methamphetamine, and pseudoephedrine is an ingredient of methamphetamine.

42. Privacy groups objected to the installation of advanced imaging technology scannersat airport security checkpoints because the scanners revealed anatomical features ingreat detail. The Transportation Security Administration responded to this criticismby developing new software that eliminates passenger-specific images and indicates thelocation of threatening items on a generic outline of a person.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 43: Instructor's Guide - Ethics For the Information Age 5E

Chapter 7

Computer and Network Security

1. In the 1950s the term “hacker” referred to an inquisitive and creative person able tomake systems do new things. When digital computers became available, the use of theterm shifted to include software virtuosos as well as hardware experts. After peoplebegan breaking into government and corporate computer networks in the 1980s, theeveryday meaning of the word shifted. Today, the word “hacker” is most frequentlyused to describe someone who gains unauthorized access to computers and computernetworks.

2. Three “low-tech” methods that hackers have used to obtain login names and passwordsare eavesdropping, dumpster diving, and social engineering.

3. The maximum penalty for violating the Computer Fraud and Abuse Act is 20 years inprison and a $250,000 fine.

4. It is dangerous to surf the Web using an open WiFi network because others withinrange of the wireless access point can sidejack your Web session by capturing a cookiebeing sent to your computer.

5. Here are definitions of common types of malware:

(a) Adware is a type of spyware that displays pop-up advertisements.

(b) A backdoor Trojan is a Trojan horse program that gives an outsider access to thevictim’s computer.

(c) A bot is a type of backdoor Trojan that can be controlled by a command-and-control program on another computer.

31

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 44: Instructor's Guide - Ethics For the Information Age 5E

32 CHAPTER 7. COMPUTER AND NETWORK SECURITY

(d) A botnet is a network of bot-infected computers controlled by a single person ororganization.

(e) Cross-site scripting is one way that a Web surfer can accidentally run malware.The victim visits a Web site and reads something posted by someone else (theattacker). The posting contains a client-side script that is executed by the victim’sWeb browser.

(f) A drive-by download is the unintentional downloading of malware caused simplyby visiting a compromised Web site.

(g) A rootkit is a set of programs that are launched every time the victim’s computeris booted. The programs have privileged access to the computer’s functions, andbecause they start executing before the operating system has launched, they usetheir privileges to hide their presence.

(h) Spyware is a program that communicates over a computer’s Internet connectionwithout the knowledge or consent of the user.

(i) A Trojan horse is a program that publicly does something beneficial but privatelyperforms other harmful actions.

(j) A virus is a piece of self-replicating code contained inside another program, calledthe host.

(k) A worm is a self-contained program that is capable of automatically propagatingthrough a computer network by exploiting security holes.

6. It is dangerous for an email program to open attachments automatically, because anattachment may be an executable program containing a virus.

7. Andy Sudduth’s email was of no help for two reasons. First, it didn’t have a subjectline. Second, and more importantly, the email was not delivered in a timely manner,because the mail server handling it was infected with the worm.

8. Here are descriptions of common types of cyber attack:

(a) A denial-of-service attack is an intentional action designed to prevent legitimateusers from gaining access to a networked computer service.

(b) A distributed denial-of-service attack is a type of denial-of-service attack in whichmultiple computers attack the computer service. Botnets can be used to launchdistributed denial-of-service attacks.

(c) Phishing is an effort to gain sensitive information from gullible computer usersthrough the use of a mass emailing.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 45: Instructor's Guide - Ethics For the Information Age 5E

33

(d) Spear-phishing is a type of phishing in which the email list is narrowed down toimprove the success rate.

(e) SQL injection is a way to attack a database-driven Web application by injectingan SQL query into a text string.

9. Some criminal organizations use the Internet to launch phishing attacks. They sell thecredit card numbers and other financial information netted by their phishing schemes.Other criminal organizations rent botnets to those who wish to send spam, attempt aphishing scheme, or launch a distributed denial-of-service attack.

10. A cyber attack is an attack from one computer to another that attempts to disable thetarget computer or steal information from it.

11. Companies are converting SCADA systems to the Internet Protocol because it savesthem money and allows them to do remote maintenance and monitoring.

12. The Stuxnet worm infected computers in Iran that controlled centrifuges processinguranium, causing a temporary shutdown of Iran’s nuclear program.

13. A vote thief could cast multiple votes in an on-line election by purchasing pass codesfrom people willing to sell their right to vote. A thief could fool other voters intorevealing their pass codes and then using this information to cast multiple votes.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 46: Instructor's Guide - Ethics For the Information Age 5E

34 CHAPTER 7. COMPUTER AND NETWORK SECURITY

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 47: Instructor's Guide - Ethics For the Information Age 5E

Chapter 8

Computer Reliability

1. Here are three ways a computer may produce faulty output:

(a) There is a bug in the program.

(b) Incorrect data are input into the system.

(c) A query for information is entered incorrectly.

2. A data-entry error is an error resulting from incorrect data being entered into a com-puter system. A data-retrieval error is an error resulting from the output of a computersystem being misunderstood.

3. A lot of the information entered into the NCIC comes from other law enforcement andintelligence agencies. It is not practical for the FBI to check all of this information.Sometimes the veracity of information is questionable. Agents should be able to usetheir discretion is to determine which information may be useful in criminal investiga-tions. If all data had to be double-checked before being entered into the NCIC, therewould be far fewer records in the NCIC, reducing its usefulness.

4. An embedded system is a computer used as a component of a larger system. A real-timesystem is a computer that processes data from sensors as events occur.

5. A linear accelerator is a device that is used to treat cancer patients with radiation.

6. In the Therac-20 the PDP 11 minicomputer was an optional add-on. Hardware inter-locks to prevent accidental overdoses remained in place. In contrast, the PDP 11 frontend computer was fully integrated into the Therac-25. Some hardware interlocks onthe Therac-20 were replaced with software controls on the Therac-25.

35

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 48: Instructor's Guide - Ethics For the Information Age 5E

36 CHAPTER 8. COMPUTER RELIABILITY

7. The Therac-25 was in operation two years before the first documented accident. Ittook another 20 months for the Therac-25 to be declared defective by the FDA.

8. A race condition in software is a situation in which two or more concurrent tasks sharea variable, and the order in which they read or write the value of the variable can affectthe behavior of a program. Race conditions are difficult to debug, because in order fora failure to occur, the timing of events must be exactly right. Often the probabilitythat an error will occur is very low.

9. (a) Patriot missile: I, III

(b) Ariane 5: III

(c) AT&T long distance network: IV

(d) Mars Climate Orbiter: III

(e) Mars Polar Lander: VII

(f) Denver International Airport baggage system: V

(g) Tokyo Stock Exchange: V, VII

(h) Direct recording electronic voting machines: III, VII

(i) Therac-25: II, V, VI

10. The advantage of allowing software users to identify and report bugs is that thereare usually many more users outside the company than software testers inside thecompany. When many more people are exercising the software, there is a greaterchance that errors can be uncovered.

One disadvantage of allowing software users to identify bugs is that if a lot of bugsare discovered, the reputation of a company can suffer. Most users probably do notthink it is their job to find and report errors (unless we’re talking about people whohave agreed to test a beta release of the software). Also, most software users are nottrying to break the software, so even if a lot of people are using a program, that is noguarantee that every bug will be found in a reasonable amount of time.

11. Computer simulations are playing an increasingly important role in science and engi-neering because in many cases physical experiments are impossible to perform.

12. Five uses of computer simulation are weather prediction, searching for oil, designingconsumer products such as disposable diapers, simulating galactic evolution, and pre-dicting global population growth.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 49: Instructor's Guide - Ethics For the Information Age 5E

37

13. A model is a representation of an actual system. There are different kinds of mod-els, including physical models and mathematical models. A computer simulation is aprogram that implements a mathematical model.

14. Verification is the process of determining if the computer program correctly imple-ments the model. Validation is the process of determining if the model is an accuraterepresentation of the real system.

15. You can validate a computer simulation by compare its predicted result with the actualresult found by doing the experiment in the real world. For example, you can use acomputer simulation to predict what happens when you drive a Nissan Leaf into a wallat 35 miles per hour. Then you can drive a real Nissan Leaf into a wall at 35 milesper hour and compare the predicted results with the actual results. Another way tovalidate a computer simulation is to take its prediction to an expert and ask the expertif the prediction is accurate.

16. Article 2 of the Uniform Commercial Code governs the sale of products in the UnitedStates. It helps protect the rights of consumers.

17. One purpose of the Magnuson-Moss Warranty Act was to prevent manufacturers fromputting unfair warranties on products costing more than $25. Another purpose wasmaking it feasible for consumers to bring warranty suits by allowing courts to awardattorney’s fees.

18. Some people argue that shrinkwrap software should be exempt from the Magnuson-Moss Warranty Act and Article 2 of the Uniform Commercial Code because there is nosuch thing as error-free software. A program is much more complicated than a pocketknife. If software manufacturers can be held liable for all sorts of damages caused bya bug in a program, less software will be available, and the software that is availablewill be more expensive.

19. The significance of the court’s ruling in Step-Saver Data Systems v. Wyse Technologyand The Software Link was that the purchase order, the invoice, and the oral statementsconstituted the contract, not the software license agreement.

20. The significance of the court’s ruling in ProCD, Inc. v. Zeidenberg is that shrinkwraplicenses are enforceable unless their terms are unconscionable, even though the licensesare not visible before the box is opened.

21. The significance of the court’s ruling in Mortenson v. Timberline Software was that thelicensing agreement limited the consequential damages that Mortenson could recover

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 50: Instructor's Guide - Ethics For the Information Age 5E

38 CHAPTER 8. COMPUTER RELIABILITY

from Timberline, even though Timberline knew there was a bug in the program andhad not told Mortenson.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 51: Instructor's Guide - Ethics For the Information Age 5E

Chapter 9

Professional Ethics

1. A profession is a vocation requiring a high level of education and practical experiencein the field. Software engineering has little in common with a fully developed pro-fession such as medicine or law, other than the ability to cause great harm. Initialprofessional education is very helpful, but not required. Even if software engineers getan undergraduate degree in computer science, the program may not be accredited byABET. There is no mandatory licensing of software engineers. Professional societiesexist, but software engineers do not have to belong to one of them. A code of ethicsexists, but following the code is strictly voluntary.

2. ACM opposed the licensing of software engineers in 1999 because it believed licensing“would not be effective in addressing the problems of software quality and reliability.”

3. Clauses related to privacy: 2.05, 3.12, 5.03, 7.06

4. Clauses related to intellectual property: 2.02, 2.06, 5.09

5. Rule utilitarian viewpoint: clauses 1.03, 1.07, 3.01, 4.06, 5.05 (more could be justified)

6. Kantian viewpoint: clauses 1.01, 1.04, 1.06, 2.01, 2.02, 2.03, 3.02, 4.03, 4.04, 4.05, 4.06,5.02, 5.06, 5.07, 5.11 (more could be justified)

7. Virtue ethics is the ethical theory that holds the right thing to in a particular circum-stance is what a person of high moral character would do in that situation. A personobtains high moral character by possessing many virtues. A person possesses a virtueby repeatedly practicing that virtue.

8. Five additional virtues: empathy, gentleness, helpfulness, kindness, trustworthiness.(There are many more good answers.)

39

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 52: Instructor's Guide - Ethics For the Information Age 5E

40 CHAPTER 9. PROFESSIONAL ETHICS

9. Whistleblowing occurs when an organization is involved in an activity that is fraudulentor a threat to public safety, and a member of that organization reveals informationabout this activity to someone outside the organization.

Harms of whistleblowing: Whistleblowing usually ruins the career of the whistleblowerand causes turmoil within the organization. The public relations damage caused theorganization may harm it for years to come.

Possible benefits of whistleblowing: Whistleblowing may keep people from being hurt,or it may prevent the public from being defrauded. Whistleblowing may discourageother companies from engaging in activities that defraud or harm the public.

10. These clauses of the Software Engineering Code of Ethics and Professional Practicetend to support the legitimacy of whistleblowing under certain circumstances: 1.02,1.04, 1.05, 4.01, 6.13

Even if the whistleblower is telling the truth, the whistleblower may be violating theseclauses of the Code: 2.03, 2.09, 6.05

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 53: Instructor's Guide - Ethics For the Information Age 5E

Chapter 10

Work and Wealth

1. Automation reduces the price of goods, increasing the real income of the people whobuy those goods. With a higher real income, people can use the extra money to buyother things. Hence automation increases the standard of living. However, automationputs some people out of work. They must go through unemployment, and perhapsretraining, before getting another job. People who are too old may be unable to findanother job after being displaced by a machine.

2. There is evidence that automation eliminates jobs. More than 43 million manufacturingjobs disappeared in the United States between 1979 and 1994. Spreadsheets and othersoftware packages are reducing the need for accountants and bookkeepers. A largenumber of white-collar, middle-management jobs were eliminated in 1991–1996. Mostof these people had at least some college education. Only 35 percent of these peoplewere able to find new jobs that paid as well.

There is also evidence that automation creates more jobs than it destroys. Automationcauses new kinds of jobs to be created. For example, the automation of stock exchangeshas led securities firms to hire mathematicians and computer scientists to developautomated trading systems.

3. The work week hasn’t gotten shorter, even though productivity has doubled sinceWorld War II, because the increase in productivity has been used to improve theaverage standard of living. Another reason is that people are aware that layoffs havehappened and can happen again. This knowledge is a strong incentive for people towork long hours so they won’t be part of the next layoff.

4. Information technology can lead to changes in the structure of an organization by open-ing up new communication paths. Access to information can lead to a decentralization

41

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Page 54: Instructor's Guide - Ethics For the Information Age 5E

42 CHAPTER 10. WORK AND WEALTH

of decision-making.

5. Telework can improve the environment by reducing pollution caused by automobilesdriven by commuters.

6. Teleworkers fret about being less visible, because they do not want to be forgotten whenit’s time for raises or promotions. In addition, they don’t want to be undervalued whenmanagers are trying to figure out who should be laid off.

7. Proponents of globalization say it helps workers in developing countries in several ways.Globalization increases competition and lowers prices, improving the purchasing powerof everyone, and raising the global standard of living. Globalization gives people indeveloping countries access to jobs. When they gain employment, their prosperityincreases. Every example in the 20th century of a poor country becoming more pros-perous has been the result of that country producing goods for the world market,rather than trying for self-sufficiency. Prosperity reduces the chance of countries goingto war.

Opponents of globalization say it hurts workers in developing countries by forcing themto compete with subsidized American agribusinesses. Mexican farmers who cannotcompete with these prices are driven out of business. Most of them cannot find jobsin Mexico and end up immigrating to the United States.

8. Pippa Norris says the digital divide has two dimensions. The global divide refers to thedisparity in Internet access between more industrialized nations and less industrializednations. The social divide refers to the difference in access between the rich and poorwithin a particular country.

9. Mark Warschauer says the term “digital divide” promotes the idea that the differencebetween the “haves” and the “have nots” is simply a question of access, but it’s morecomplicated than that. In reality, the underlying social system affects the adoptionof information technology. Another problem with the term “digital divide,” accordingto Warschauer, is that it implies that people either use information technology orthey do not, when in reality there is a continuum of engagement with informationtechnology. Third, the term “digital divide” implies that a lack of access will lead toa less advantaged position in society. But there is no simple causality. Each factoraffects the other.

©2013 Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.