Podcast
Questions and Answers
Information Ethics may be described as the study of the moral issues arising
from “the triple
Information Ethics may be described as the study of the moral issues arising from “the triple
What does IE stand for in the context of computer ethics?
What does IE stand for in the context of computer ethics?
The term “ecopoiesis” refers to
The term “ecopoiesis” refers to
what is a morally qualifiable action?
what is a morally qualifiable action?
Signup and view all the answers
what sort of moral agents inhabit the infosphere?
what sort of moral agents inhabit the infosphere?
Signup and view all the answers
transition system is:
transition system is:
Signup and view all the answers
Which one of the stages does IE have?
Which one of the stages does IE have?
Signup and view all the answers
information ethics was used as a general label to discuss issues regarding
information (or data) confidentiality, reliability, quality, and usage.
information ethics was used as a general label to discuss issues regarding information (or data) confidentiality, reliability, quality, and usage.
Signup and view all the answers
information-intensive services are business and property services,
communications, finance, and insurance
information-intensive services are business and property services, communications, finance, and insurance
Signup and view all the answers
consideration of artificial agents as moral agents IE does not refer to the
moral value of meaningful data such as an e-mail.
consideration of artificial agents as moral agents IE does not refer to the moral value of meaningful data such as an e-mail.
Signup and view all the answers
Justice requires “the liberty of each human being to develop in his freedom
the full measure of the human possibilities embodied in him.”:
Justice requires “the liberty of each human being to develop in his freedom the full measure of the human possibilities embodied in him.”:
Signup and view all the answers
Justice requires “the equality by which what is just for A and B remains just
when the positions of A and B are interchanged.”:
Justice requires “the equality by which what is just for A and B remains just when the positions of A and B are interchanged.”:
Signup and view all the answers
Justice requires “a good will between man and man that knows no limits short
of those of humanity itself.”:
Justice requires “a good will between man and man that knows no limits short of those of humanity itself.”:
Signup and view all the answers
Enables human beings to do an enormous number of new things that they
never were able to do before:
Enables human beings to do an enormous number of new things that they never were able to do before:
Signup and view all the answers
Many people found Moor's account of computer ethics to be _________ way
to understand and deal with emerging computer ethics issues:
Many people found Moor's account of computer ethics to be _________ way to understand and deal with emerging computer ethics issues:
Signup and view all the answers
His account of the nature of computer ethics quickly became the most
influential one among a growing number of scholars across America who were
joining the computer ethics research community
His account of the nature of computer ethics quickly became the most influential one among a growing number of scholars across America who were joining the computer ethics research community
Signup and view all the answers
Moor provided a very effective problem-solving method:
Moor provided a very effective problem-solving method:
Signup and view all the answers
"Fundamental Principles" of information ethics offered by Floridi.
"Fundamental Principles" of information ethics offered by Floridi.
Signup and view all the answers
Since everything that exists, according to Floridi's theory, is an informational
object or process, he calls the totality of all that exists:
Since everything that exists, according to Floridi's theory, is an informational object or process, he calls the totality of all that exists:
Signup and view all the answers
A typical problem in computer ethics arise because there is a _____________
about how computer technology shoulde be used.
A typical problem in computer ethics arise because there is a _____________ about how computer technology shoulde be used.
Signup and view all the answers
After a focus on normative ethical theory and its application and justification,
emphasis is now placed by some authors on the ................. of institutions,
infrastructure, and technology, as shaping factors in our lives and in society.
After a focus on normative ethical theory and its application and justification, emphasis is now placed by some authors on the ................. of institutions, infrastructure, and technology, as shaping factors in our lives and in society.
Signup and view all the answers
Until now ................ (was/were) treated in moral philosophy as a mere
supplier of thought experiments and counter-examples to arguments and
theories.
Until now ................ (was/were) treated in moral philosophy as a mere supplier of thought experiments and counter-examples to arguments and theories.
Signup and view all the answers
This/These developments in ethics come in the idea of Value Sensitive Design (VSD).
This/These developments in ethics come in the idea of Value Sensitive Design (VSD).
Signup and view all the answers
Was first proposed in connection with information and communication
technology, and that is still its main area of application.
Was first proposed in connection with information and communication technology, and that is still its main area of application.
Signup and view all the answers
Focuses on existing moral controversies and practices and on use, although it
should also explore uncharted terrain and focus on the technology and its
design.
Focuses on existing moral controversies and practices and on use, although it should also explore uncharted terrain and focus on the technology and its design.
Signup and view all the answers
Ethics was in the beginning of the twentieth century predominantly a .............
Ethics was in the beginning of the twentieth century predominantly a .............
Signup and view all the answers
Ethics has seen notable changes in the course of the past 100 years
Ethics has seen notable changes in the course of the past 100 years
Signup and view all the answers
The simplest way to be a generalist is to think that there are fairly accurate
general moral rules or principles that may be captured and codified, for
example, in codes of conduct, which can be applied to particular cases.
The simplest way to be a generalist is to think that there are fairly accurate general moral rules or principles that may be captured and codified, for example, in codes of conduct, which can be applied to particular cases.
Signup and view all the answers
Jonathan Dancy defines particularism in Ethics Without Principles as follows:
“The possibility of moral thought and judgment depend on the provision of a
suitable supply of moral principles.”
Jonathan Dancy defines particularism in Ethics Without Principles as follows: “The possibility of moral thought and judgment depend on the provision of a suitable supply of moral principles.”
Signup and view all the answers
onathan Dancy defines particularism in Ethics Without Principles as follows:
“The possibility of moral thought and judgment does not depend on the provision
of a suitable supply of moral principles.”
onathan Dancy defines particularism in Ethics Without Principles as follows: “The possibility of moral thought and judgment does not depend on the provision of a suitable supply of moral principles.”
Signup and view all the answers
Computer ethicists should probe beyond the technicalstatus quo and ask how
the problem came into being, and what are the designs and architectural
decisions that have led up to it.
Computer ethicists should probe beyond the technicalstatus quo and ask how the problem came into being, and what are the designs and architectural decisions that have led up to it.
Signup and view all the answers
………………. refer to parties (individuals or organizations) who interact directly
with the computer system or its output.
………………. refer to parties (individuals or organizations) who interact directly with the computer system or its output.
Signup and view all the answers
……………… refer to all other parties who are affected by the use of the
system
……………… refer to all other parties who are affected by the use of the system
Signup and view all the answers
Focus on the design and performance of the technology itself:
Focus on the design and performance of the technology itself:
Signup and view all the answers
Focus on the individuals, groups, or larger social systems that configure, use,
or are otherwise affected by the technology:
Focus on the individuals, groups, or larger social systems that configure, use, or are otherwise affected by the technology:
Signup and view all the answers
theoretically grounded approach to the design of technology that accounts
for human values in a principled and comprehensive manner throughout the
design process:
theoretically grounded approach to the design of technology that accounts for human values in a principled and comprehensive manner throughout the design process:
Signup and view all the answers
Heuristics for Interviewing Stakeholders:
Heuristics for Interviewing Stakeholders:
Signup and view all the answers
When systematically determining the benefits and harms for each group of
stakeholders, attention must be paid to:
When systematically determining the benefits and harms for each group of stakeholders, attention must be paid to:
Signup and view all the answers
Empirical investigations are not need to evaluate the success of a particular
design.
Empirical investigations are not need to evaluate the success of a particular design.
Signup and view all the answers
Empirical investigations need to evaluate the success of a particular design.
Empirical investigations need to evaluate the success of a particular design.
Signup and view all the answers
conceptual investigation entails a philosophically informed analysis of the
central value constructs.
conceptual investigation entails a philosophically informed analysis of the central value constructs.
Signup and view all the answers
Technical investigations provides a critical protection for privacy, and
supports other human values such as autonomy and trust
Technical investigations provides a critical protection for privacy, and supports other human values such as autonomy and trust
Signup and view all the answers
Informed consent provides a critical protection for privacy, and supports
other human values such as autonomy and trust
Informed consent provides a critical protection for privacy, and supports other human values such as autonomy and trust
Signup and view all the answers
. …………………. `s ground intellectual property rights in social progress and
incentives to innovate.
. …………………. `s ground intellectual property rights in social progress and incentives to innovate.
Signup and view all the answers
…………………… is generally characterized as nonphysical property that is the
product of cognitive processes and whose value is based up on some idea or
collection of ideas
…………………… is generally characterized as nonphysical property that is the product of cognitive processes and whose value is based up on some idea or collection of ideas
Signup and view all the answers
……………. protection extends to original works of authorship fixed in any tangible
medium of expression.
……………. protection extends to original works of authorship fixed in any tangible medium of expression.
Signup and view all the answers
…………… yield the strongest form of protection, in that a 20 years exclusive
monopoly is granted over any expression or implementation of the protected
work.
…………… yield the strongest form of protection, in that a 20 years exclusive monopoly is granted over any expression or implementation of the protected work.
Signup and view all the answers
A …………………. may consist of any formula, pattern, device, or compilation of
information that is used in one's business
A …………………. may consist of any formula, pattern, device, or compilation of information that is used in one's business
Signup and view all the answers
The two major restrictions on the domain of trade secrets are:
The two major restrictions on the domain of trade secrets are:
Signup and view all the answers
…………………… defenders maintain that intellectual property is an extension of
individual personality.
…………………… defenders maintain that intellectual property is an extension of individual personality.
Signup and view all the answers
Intellectual property falls under the umbrella of tangible property.
Intellectual property falls under the umbrella of tangible property.
Signup and view all the answers
Intellectual property falls under the umbrella of intangible property
Intellectual property falls under the umbrella of intangible property
Signup and view all the answers
One alternative to granting patent rights to inventors as incentive is government
support of intellectual labor.
One alternative to granting patent rights to inventors as incentive is government support of intellectual labor.
Signup and view all the answers
personality-based theories of intellectual property aren’t appeal to other moral
considerations.
personality-based theories of intellectual property aren’t appeal to other moral considerations.
Signup and view all the answers
personality-based theories of intellectual property often appeal to other moral
considerations
personality-based theories of intellectual property often appeal to other moral considerations
Signup and view all the answers
…………………. one has informational privacy when she is able to limit or restrict
others from access to information about herself.
…………………. one has informational privacy when she is able to limit or restrict others from access to information about herself.
Signup and view all the answers
One's having privacy is directly linked to one's having control over information
about oneself.
One's having privacy is directly linked to one's having control over information about oneself.
Signup and view all the answers
Distinguishes between the concept of privacy, which it defines in terms of
restricted access, and the management of privacy.
Distinguishes between the concept of privacy, which it defines in terms of restricted access, and the management of privacy.
Signup and view all the answers
The way individuals can easily become associated with and linked to newly
created groups that are made possible by technologies such as KDD (Knowledge
Discovery in Databases).
The way individuals can easily become associated with and linked to newly created groups that are made possible by technologies such as KDD (Knowledge Discovery in Databases).
Signup and view all the answers
…………………………… are relatively recent expressions used to refer to a conception
of privacy.
…………………………… are relatively recent expressions used to refer to a conception of privacy.
Signup and view all the answers
…………… concerns affected by the amount of personal data collected
…………… concerns affected by the amount of personal data collected
Signup and view all the answers
privacy protects the interest individuals have in sustaining a personal space, free
from interference by other people and organizations.
privacy protects the interest individuals have in sustaining a personal space, free from interference by other people and organizations.
Signup and view all the answers
privacy is conceived of as a “utility” in that it can help to preserve human dignity
privacy is conceived of as a “utility” in that it can help to preserve human dignity
Signup and view all the answers
. Individual privacy is much more difficult to achieve in highly technological
societies.
. Individual privacy is much more difficult to achieve in highly technological societies.
Signup and view all the answers
Informational privacy concerns can affect many aspects of an individual's life
from commerce to healthcare to work to recreation
Informational privacy concerns can affect many aspects of an individual's life from commerce to healthcare to work to recreation
Signup and view all the answers
Informational privacy concerns cannot affect many aspects of an individual's life
from commerce to healthcare to work to recreation
Informational privacy concerns cannot affect many aspects of an individual's life from commerce to healthcare to work to recreation
Signup and view all the answers
. ………. are choices between good and bad.
. ………. are choices between good and bad.
Signup and view all the answers
………. is fundamental laws that govern human behavior; i.e. Golden
Rule.
………. is fundamental laws that govern human behavior; i.e. Golden Rule.
Signup and view all the answers
………. is something a group holds to be valuable or worthwhile
………. is something a group holds to be valuable or worthwhile
Signup and view all the answers
Copyrights protect published works such as books, articles, software,
etc.
Copyrights protect published works such as books, articles, software, etc.
Signup and view all the answers
Universality is reasons for action that all people in society could
accept.
Universality is reasons for action that all people in society could accept.
Signup and view all the answers
Transitivity is reasons for action that all people in society could
accept.
Transitivity is reasons for action that all people in society could accept.
Signup and view all the answers
Utilitarian Ethics is the decision that produces the highest good for all
people involved.
Utilitarian Ethics is the decision that produces the highest good for all people involved.
Signup and view all the answers
. ………. is a legal protection for a design or invention.
. ………. is a legal protection for a design or invention.
Signup and view all the answers
………. is something that one owes; an obligation; debt.
………. is something that one owes; an obligation; debt.
Signup and view all the answers
………. is any wrongful act that does not involve a breach of contract
and for which civil suit can be brought.
………. is any wrongful act that does not involve a breach of contract and for which civil suit can be brought.
Signup and view all the answers
.………. not following reasonable rules and standards that apply and
committed a wrongful act
.………. not following reasonable rules and standards that apply and committed a wrongful act
Signup and view all the answers
In consequentialism ethical theory, human actions are judged good
or bad, right or wrong, depending on the results of such actions.
In consequentialism ethical theory, human actions are judged good or bad, right or wrong, depending on the results of such actions.
Signup and view all the answers
Act utilitarianism tells one to obey those rules that bring the
maximum happiness to the greatest number of people.
Act utilitarianism tells one to obey those rules that bring the maximum happiness to the greatest number of people.
Signup and view all the answers
Rule utilitarianism tells one to obey those rules that bring the
maximum happiness to the greatest number of people.
Rule utilitarianism tells one to obey those rules that bring the maximum happiness to the greatest number of people.
Signup and view all the answers
This theory considers human beings as endowed with all faculties and
capabilities to live in happiness.
This theory considers human beings as endowed with all faculties and capabilities to live in happiness.
Signup and view all the answers
………. states how people ought to behave as they pursue their own
interests.
………. states how people ought to behave as they pursue their own interests.
Signup and view all the answers
It claims that pleasure is the only good thing in human life.
It claims that pleasure is the only good thing in human life.
Signup and view all the answers
………. maintains that ethical statements are neither true nor false
and cannot be proven; they are really only statement about how
someone feels
………. maintains that ethical statements are neither true nor false and cannot be proven; they are really only statement about how someone feels
Signup and view all the answers
Asymmetric encryption commonly known as ……….
Asymmetric encryption commonly known as ……….
Signup and view all the answers
Act in accordance with your duties, following the appropriate rules.
Act in accordance with your duties, following the appropriate rules.
Signup and view all the answers
This theory is negatively formulated, denying the existence of
universal moral norms.
This theory is negatively formulated, denying the existence of universal moral norms.
Signup and view all the answers
………. prevents unauthorized withholding of information from those
who need it when they need it.
………. prevents unauthorized withholding of information from those who need it when they need it.
Signup and view all the answers
A loss of privacy online and risk of hacking creates more deceit
A loss of privacy online and risk of hacking creates more deceit
Signup and view all the answers
A loss of privacy online and risk of hacking creates more deceit
A loss of privacy online and risk of hacking creates more deceit
Signup and view all the answers
………. causes more energy consumption and pollution
………. causes more energy consumption and pollution
Signup and view all the answers
Bad Effects of New Technology on Society are
Bad Effects of New Technology on Society are
Signup and view all the answers
A loss of privacy online and risk of hacking creates more ……….
A loss of privacy online and risk of hacking creates more ……….
Signup and view all the answers
It is much easier to be a bully while hidden away ………
It is much easier to be a bully while hidden away ………
Signup and view all the answers
………. is set of moral principles that regulate the use of computers.
………. is set of moral principles that regulate the use of computers.
Signup and view all the answers
This may be one of the biggest drawbacks of device-filled world.
This may be one of the biggest drawbacks of device-filled world.
Signup and view all the answers
Technology addiction is becoming more ……….
Technology addiction is becoming more ……….
Signup and view all the answers
………. is a process of exploration and analysis of large quantities of
data by automatic or semi-automatic means.
………. is a process of exploration and analysis of large quantities of data by automatic or semi-automatic means.
Signup and view all the answers
Principles of right and wrong.
Principles of right and wrong.
Signup and view all the answers
Privacy and Freedom in the Internet Age.
Privacy and Freedom in the Internet Age.
Signup and view all the answers
What are some potential motives for targeting a computer system
while committing an offense, such as gaining entry to a computer
system in order to cause damage to the computer or the data it
contains?
What are some potential motives for targeting a computer system while committing an offense, such as gaining entry to a computer system in order to cause damage to the computer or the data it contains?
Signup and view all the answers
A grant to the creator of an invention granting the owner an exclusive
monopoly on the ideas behind an invention for between 17 and 20
years.
A grant to the creator of an invention granting the owner an exclusive monopoly on the ideas behind an invention for between 17 and 20 years.
Signup and view all the answers
The Computer Ethics Institute developed these guidelines for ethical
computer use that prohibit all the following behaviors EXCEPT
The Computer Ethics Institute developed these guidelines for ethical computer use that prohibit all the following behaviors EXCEPT
Signup and view all the answers
What is the illegal action through using a computer?
What is the illegal action through using a computer?
Signup and view all the answers
………. is an organized attempt by a country's military to disrupt or
destroy the information and communications systems of another
country.
………. is an organized attempt by a country's military to disrupt or destroy the information and communications systems of another country.
Signup and view all the answers
Three main ways that intellectual property is protected:
Three main ways that intellectual property is protected:
Signup and view all the answers
Spyware is a Software downloaded onto a user’s computer - usually
without the user’s knowledge - that tracks Web behaviour and reports
that behaviour to a third-party server
Spyware is a Software downloaded onto a user’s computer - usually without the user’s knowledge - that tracks Web behaviour and reports that behaviour to a third-party server
Signup and view all the answers
. Spyware is a Software downloaded onto a user’s computer - usually
with the user’s knowledge - that tracks Web behaviour and reports
that behaviour to a third-party server
. Spyware is a Software downloaded onto a user’s computer - usually with the user’s knowledge - that tracks Web behaviour and reports that behaviour to a third-party server
Signup and view all the answers
Organizations can easily maintain detailed databases on individuals.
Organizations can easily maintain detailed databases on individuals.
Signup and view all the answers
Organizations can not easily maintain detailed databases on
individuals
Organizations can not easily maintain detailed databases on individuals
Signup and view all the answers