- Nov 2022
-
inst-fs-iad-prod.inscloudgate.net inst-fs-iad-prod.inscloudgate.net
-
personal (desktop)computers could be used to duplicate proprietary software programs. And concernsassociated with computer crime appeared during this phase because individuals couldnow use computing devices, including remote computer terminals, to break into anddisrupt the computer systems of large organizations.
groups - Private citizens using personals computers to duplicate software and large orgs.
issues - duplication and this type peer to peer file transfers are considered theft by many.
-
included concerns aboutpersonal privacy, intellectual property, and computer crime. Privacy concerns, which hademerged during Phase 1 because of worries about the amount of personal informationthat could be collected by government agencies and stored in a centralized government-owned database, were exacerbated because electronic records containing personal andconfidential information could now also easily be exchanged between two or morecommercial databases in the private sector.
issues - privacy concerns about privacy and intellectual property. Information could now be exchanged between the government and the private sector
-
It also focuses on questions having to do withwhether computers can be autonomous agents capable of making good moral decisions.
groups - computers are getting to the point where they are very good at learning. If they are proven to be capable of being autonomous, should be they treated as such.
-
We examine ethical issues that cutacross the spectrum of devices and networked communication systems comprisingcybertechnology, from stand-alone computers to networked systems
issues - cybernetics is a comprehensive term. It involves mobilization issues, entire systems of communication as well as the internet.
-
These include concerns affecting privacy, confidentiality, anonym-ity, free speech, defamation, and so forth. For example, did Cutler violate the privacy andconfidentiality of her romantic partners through the remarks she made about them in heronline diary?
Groups - public, private
issues - just because something is posted anonymously doesn't mean it is private. Once ties can be made to the personal lives of very real people it all becomes public. So the conduct for what is done anonymously becomes an issue because it's harder to police behavior when there isn't a name attached to it. Who do you hold accountable? And what is the reach of the employer, is it fair for them to have oversight into the more intimate parts of their employees lives.
-
Do they also have a moral responsibility to inform that SNS
Muddles - A right can be framed as a responsibility. As we figure out new ways to engage with these new technologies, we will be given new responsibilities.
-
“Megan Meier is a slut” and “Megan Meier is fat”—began to appear on MySpace.Meier, who was reported to have suffered from low self-esteem and depression, became increas-ingly distressed by the online harassment (cyberbullying) being directed at her
issues - Harassment and degrading comments become easier to make when it's done online.
-