Podcast Beta
Questions and Answers
Information Ethics may be described as the study of the moral issues arising from “the triple
What does IE stand for in the context of computer ethics?
The term “ecopoiesis” refers to
what is a morally qualifiable action?
Signup and view all the answers
what sort of moral agents inhabit the infosphere?
Signup and view all the answers
transition system is:
Signup and view all the answers
Which one of the stages does IE have?
Signup and view all the answers
information ethics was used as a general label to discuss issues regarding information (or data) confidentiality, reliability, quality, and usage.
Signup and view all the answers
information-intensive services are business and property services, communications, finance, and insurance
Signup and view all the answers
consideration of artificial agents as moral agents IE does not refer to the moral value of meaningful data such as an e-mail.
Signup and view all the answers
Justice requires “the liberty of each human being to develop in his freedom the full measure of the human possibilities embodied in him.”:
Signup and view all the answers
Justice requires “the equality by which what is just for A and B remains just when the positions of A and B are interchanged.”:
Signup and view all the answers
Justice requires “a good will between man and man that knows no limits short of those of humanity itself.”:
Signup and view all the answers
Enables human beings to do an enormous number of new things that they never were able to do before:
Signup and view all the answers
Many people found Moor's account of computer ethics to be _________ way to understand and deal with emerging computer ethics issues:
Signup and view all the answers
His account of the nature of computer ethics quickly became the most influential one among a growing number of scholars across America who were joining the computer ethics research community
Signup and view all the answers
Moor provided a very effective problem-solving method:
Signup and view all the answers
"Fundamental Principles" of information ethics offered by Floridi.
Signup and view all the answers
Since everything that exists, according to Floridi's theory, is an informational object or process, he calls the totality of all that exists:
Signup and view all the answers
A typical problem in computer ethics arise because there is a _____________ about how computer technology shoulde be used.
Signup and view all the answers
After a focus on normative ethical theory and its application and justification, emphasis is now placed by some authors on the ................. of institutions, infrastructure, and technology, as shaping factors in our lives and in society.
Signup and view all the answers
Until now ................ (was/were) treated in moral philosophy as a mere supplier of thought experiments and counter-examples to arguments and theories.
Signup and view all the answers
This/These developments in ethics come in the idea of Value Sensitive Design (VSD).
Signup and view all the answers
Was first proposed in connection with information and communication technology, and that is still its main area of application.
Signup and view all the answers
Focuses on existing moral controversies and practices and on use, although it should also explore uncharted terrain and focus on the technology and its design.
Signup and view all the answers
Ethics was in the beginning of the twentieth century predominantly a .............
Signup and view all the answers
Ethics has seen notable changes in the course of the past 100 years
Signup and view all the answers
The simplest way to be a generalist is to think that there are fairly accurate general moral rules or principles that may be captured and codified, for example, in codes of conduct, which can be applied to particular cases.
Signup and view all the answers
Jonathan Dancy defines particularism in Ethics Without Principles as follows: “The possibility of moral thought and judgment depend on the provision of a suitable supply of moral principles.”
Signup and view all the answers
onathan Dancy defines particularism in Ethics Without Principles as follows: “The possibility of moral thought and judgment does not depend on the provision of a suitable supply of moral principles.”
Signup and view all the answers
Computer ethicists should probe beyond the technicalstatus quo and ask how the problem came into being, and what are the designs and architectural decisions that have led up to it.
Signup and view all the answers
………………. refer to parties (individuals or organizations) who interact directly with the computer system or its output.
Signup and view all the answers
……………… refer to all other parties who are affected by the use of the system
Signup and view all the answers
Focus on the design and performance of the technology itself:
Signup and view all the answers
Focus on the individuals, groups, or larger social systems that configure, use, or are otherwise affected by the technology:
Signup and view all the answers
theoretically grounded approach to the design of technology that accounts for human values in a principled and comprehensive manner throughout the design process:
Signup and view all the answers
Heuristics for Interviewing Stakeholders:
Signup and view all the answers
When systematically determining the benefits and harms for each group of stakeholders, attention must be paid to:
Signup and view all the answers
Empirical investigations are not need to evaluate the success of a particular design.
Signup and view all the answers
Empirical investigations need to evaluate the success of a particular design.
Signup and view all the answers
conceptual investigation entails a philosophically informed analysis of the central value constructs.
Signup and view all the answers
Technical investigations provides a critical protection for privacy, and supports other human values such as autonomy and trust
Signup and view all the answers
Informed consent provides a critical protection for privacy, and supports other human values such as autonomy and trust
Signup and view all the answers
. …………………. `s ground intellectual property rights in social progress and incentives to innovate.
Signup and view all the answers
…………………… is generally characterized as nonphysical property that is the product of cognitive processes and whose value is based up on some idea or collection of ideas
Signup and view all the answers
……………. protection extends to original works of authorship fixed in any tangible medium of expression.
Signup and view all the answers
…………… yield the strongest form of protection, in that a 20 years exclusive monopoly is granted over any expression or implementation of the protected work.
Signup and view all the answers
A …………………. may consist of any formula, pattern, device, or compilation of information that is used in one's business
Signup and view all the answers
The two major restrictions on the domain of trade secrets are:
Signup and view all the answers
…………………… defenders maintain that intellectual property is an extension of individual personality.
Signup and view all the answers
Intellectual property falls under the umbrella of tangible property.
Signup and view all the answers
Intellectual property falls under the umbrella of intangible property
Signup and view all the answers
One alternative to granting patent rights to inventors as incentive is government support of intellectual labor.
Signup and view all the answers
personality-based theories of intellectual property aren’t appeal to other moral considerations.
Signup and view all the answers
personality-based theories of intellectual property often appeal to other moral considerations
Signup and view all the answers
…………………. one has informational privacy when she is able to limit or restrict others from access to information about herself.
Signup and view all the answers
One's having privacy is directly linked to one's having control over information about oneself.
Signup and view all the answers
Distinguishes between the concept of privacy, which it defines in terms of restricted access, and the management of privacy.
Signup and view all the answers
The way individuals can easily become associated with and linked to newly created groups that are made possible by technologies such as KDD (Knowledge Discovery in Databases).
Signup and view all the answers
…………………………… are relatively recent expressions used to refer to a conception of privacy.
Signup and view all the answers
…………… concerns affected by the amount of personal data collected
Signup and view all the answers
privacy protects the interest individuals have in sustaining a personal space, free from interference by other people and organizations.
Signup and view all the answers
privacy is conceived of as a “utility” in that it can help to preserve human dignity
Signup and view all the answers
. Individual privacy is much more difficult to achieve in highly technological societies.
Signup and view all the answers
Informational privacy concerns can affect many aspects of an individual's life from commerce to healthcare to work to recreation
Signup and view all the answers
Informational privacy concerns cannot affect many aspects of an individual's life from commerce to healthcare to work to recreation
Signup and view all the answers
. ………. are choices between good and bad.
Signup and view all the answers
………. is fundamental laws that govern human behavior; i.e. Golden Rule.
Signup and view all the answers
………. is something a group holds to be valuable or worthwhile
Signup and view all the answers
Copyrights protect published works such as books, articles, software, etc.
Signup and view all the answers
Universality is reasons for action that all people in society could accept.
Signup and view all the answers
Transitivity is reasons for action that all people in society could accept.
Signup and view all the answers
Utilitarian Ethics is the decision that produces the highest good for all people involved.
Signup and view all the answers
. ………. is a legal protection for a design or invention.
Signup and view all the answers
………. is something that one owes; an obligation; debt.
Signup and view all the answers
………. is any wrongful act that does not involve a breach of contract and for which civil suit can be brought.
Signup and view all the answers
.………. not following reasonable rules and standards that apply and committed a wrongful act
Signup and view all the answers
In consequentialism ethical theory, human actions are judged good or bad, right or wrong, depending on the results of such actions.
Signup and view all the answers
Act utilitarianism tells one to obey those rules that bring the maximum happiness to the greatest number of people.
Signup and view all the answers
Rule utilitarianism tells one to obey those rules that bring the maximum happiness to the greatest number of people.
Signup and view all the answers
This theory considers human beings as endowed with all faculties and capabilities to live in happiness.
Signup and view all the answers
………. states how people ought to behave as they pursue their own interests.
Signup and view all the answers
It claims that pleasure is the only good thing in human life.
Signup and view all the answers
………. maintains that ethical statements are neither true nor false and cannot be proven; they are really only statement about how someone feels
Signup and view all the answers
Asymmetric encryption commonly known as ……….
Signup and view all the answers
Act in accordance with your duties, following the appropriate rules.
Signup and view all the answers
This theory is negatively formulated, denying the existence of universal moral norms.
Signup and view all the answers
………. prevents unauthorized withholding of information from those who need it when they need it.
Signup and view all the answers
A loss of privacy online and risk of hacking creates more deceit
Signup and view all the answers
A loss of privacy online and risk of hacking creates more deceit
Signup and view all the answers
………. causes more energy consumption and pollution
Signup and view all the answers
Bad Effects of New Technology on Society are
Signup and view all the answers
A loss of privacy online and risk of hacking creates more ……….
Signup and view all the answers
It is much easier to be a bully while hidden away ………
Signup and view all the answers
………. is set of moral principles that regulate the use of computers.
Signup and view all the answers
This may be one of the biggest drawbacks of device-filled world.
Signup and view all the answers
Technology addiction is becoming more ……….
Signup and view all the answers
………. is a process of exploration and analysis of large quantities of data by automatic or semi-automatic means.
Signup and view all the answers
Principles of right and wrong.
Signup and view all the answers
Privacy and Freedom in the Internet Age.
Signup and view all the answers
What are some potential motives for targeting a computer system while committing an offense, such as gaining entry to a computer system in order to cause damage to the computer or the data it contains?
Signup and view all the answers
A grant to the creator of an invention granting the owner an exclusive monopoly on the ideas behind an invention for between 17 and 20 years.
Signup and view all the answers
The Computer Ethics Institute developed these guidelines for ethical computer use that prohibit all the following behaviors EXCEPT
Signup and view all the answers
What is the illegal action through using a computer?
Signup and view all the answers
………. is an organized attempt by a country's military to disrupt or destroy the information and communications systems of another country.
Signup and view all the answers
Three main ways that intellectual property is protected:
Signup and view all the answers
Spyware is a Software downloaded onto a user’s computer - usually without the user’s knowledge - that tracks Web behaviour and reports that behaviour to a third-party server
Signup and view all the answers
. Spyware is a Software downloaded onto a user’s computer - usually with the user’s knowledge - that tracks Web behaviour and reports that behaviour to a third-party server
Signup and view all the answers
Organizations can easily maintain detailed databases on individuals.
Signup and view all the answers
Organizations can not easily maintain detailed databases on individuals
Signup and view all the answers