Utilitarianism and Social Contract Theory
129 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What was the total benefit to the Girl Scouts from the cookie sales?

  • $70
  • $60
  • $180
  • $108 (correct)
  • What was the estimated harm to the company from Ann's actions?

  • $50
  • $110
  • $90
  • $70 (correct)
  • What would likely be the result if all employees solicited donations via email?

  • Higher donation amounts
  • Lower morale and grumbling (correct)
  • No impact on productivity
  • Increased employee engagement
  • According to Social Contract Theory, how did Ann exercise her rights?

    <p>By expressing herself without concealing her identity</p> Signup and view all the answers

    Which key virtue did Ann exhibit in her email communication?

    <p>Honesty</p> Signup and view all the answers

    What could Ann have done to engage her daughter more effectively?

    <p>Involve her daughter in selling strategies</p> Signup and view all the answers

    What alternative method could Ann have used to avoid employee complaints?

    <p>Create a sign-up sheet for interested coworkers</p> Signup and view all the answers

    Why was Ann's action ultimately deemed wrong by Rule Utilitarian Analysis?

    <p>It caused more complaints than benefits</p> Signup and view all the answers

    Which country has internet access that is virtually inaccessible to its citizens?

    <p>North Korea</p> Signup and view all the answers

    What was the main concern for governments regarding internet filtering?

    <p>Protection of minors from harmful content</p> Signup and view all the answers

    Who proposed that censorship is unnecessary because 'any opinion may contain a kernel of truth'?

    <p>Mill</p> Signup and view all the answers

    What does Mill's Principle of Harm suggest is a valid reason for exercising power over individuals?

    <p>To prevent harm to others</p> Signup and view all the answers

    Which historical entity administered the De Scandalis Magnatum law?

    <p>The Court of Star Chamber</p> Signup and view all the answers

    What significant legal document was adopted by American states to protect freedom of expression?

    <p>The Bill of Rights</p> Signup and view all the answers

    What theory emphasizes the importance of free and open discourse in revealing truth?

    <p>Mill's Theory of Knowledge</p> Signup and view all the answers

    What was a restriction on publication that occurred before the 18th century?

    <p>Sedition or libel punishment</p> Signup and view all the answers

    Which country is noted for having a sophisticated internet filtering system that can block access during social unrest?

    <p>China</p> Signup and view all the answers

    Which philosopher is known for encouraging individuals to have 'the courage to use your own reason'?

    <p>Kant</p> Signup and view all the answers

    What is the maximum liability a consumer has for credit card losses if reported?

    <p>$50</p> Signup and view all the answers

    What has contributed to the rapid decline of point-of-sale fraud?

    <p>Adoption of EMV credit cards and terminals</p> Signup and view all the answers

    Which method of gaining access to personal information is NOT mentioned as a tactic used by identity thieves?

    <p>Keyloggers</p> Signup and view all the answers

    Why are college students reported to be more likely victims of identity theft?

    <p>They live in close quarters and may not secure sensitive information</p> Signup and view all the answers

    What percentage of North Americans reportedly read online reviews regularly according to a 2014 survey?

    <p>39%</p> Signup and view all the answers

    What is one of the controversial methods used in police sting operations against child predators?

    <p>Posing as children to lure predators</p> Signup and view all the answers

    What is a significant issue surrounding the quality of web-based information?

    <p>Quality varies widely.</p> Signup and view all the answers

    What ethical viewpoint might view police sting operations as morally acceptable?

    <p>Consequentialist ethics</p> Signup and view all the answers

    What percentage of online reviews is believed to be fraudulent?

    <p>A significant percentage</p> Signup and view all the answers

    What type of software is commonly used for real-time chatting over the Internet?

    <p>Instant messaging applications</p> Signup and view all the answers

    Which of the following is considered a situational factor contributing to addiction?

    <p>Stress</p> Signup and view all the answers

    What does the Enlightenment view suggest regarding individual responsibilities?

    <p>Individuals can and should govern their lives.</p> Signup and view all the answers

    According to Jeffrey Reiman’s view, what is a significant factor in an addict’s behavior?

    <p>They feel they have no hope for a better future.</p> Signup and view all the answers

    What is one potential negative outcome of social media as mentioned in the content?

    <p>Increased political polarization.</p> Signup and view all the answers

    What challenge do governments face regarding the Internet?

    <p>Controlling the information that is available.</p> Signup and view all the answers

    What is the definition of cyberbullying?

    <p>Using the Internet or phone system to inflict psychological harm</p> Signup and view all the answers

    Which of the following is a characteristic of Internet addiction according to Jerald Block?

    <p>Excessive usage</p> Signup and view all the answers

    What is revenge porn?

    <p>Posting pornographic images without consent and with malicious intent</p> Signup and view all the answers

    What action has been taken by platforms like Reddit and Twitter regarding revenge porn?

    <p>They have taken action to protect victims</p> Signup and view all the answers

    According to a 2009 survey, what percentage of individuals admitted to being a victim of cyberbullying?

    <p>19%</p> Signup and view all the answers

    What type of feedback do digital device users receive that can lead to addiction?

    <p>Immediate positive feedback through dopamine hits</p> Signup and view all the answers

    How many hours per week does the average South Korean high school student spend gaming?

    <p>23 hours</p> Signup and view all the answers

    What has the American Psychiatric Association concluded about Internet addiction?

    <p>Insufficient data exists to list it as a mental disorder</p> Signup and view all the answers

    What variant of Internet addiction involves specifically online gaming?

    <p>Excessive gaming</p> Signup and view all the answers

    What is the consequence of the law in South Korea regarding gaming for children?

    <p>Prohibition of gaming between midnight and 6 a.m.</p> Signup and view all the answers

    Which factor does NOT contribute to individual addiction according to the content?

    <p>Low self-esteem due to peer pressure</p> Signup and view all the answers

    What is a key responsibility of society regarding addiction as proposed by Jeffrey Reiman?

    <p>To ensure hope for a better future for individuals</p> Signup and view all the answers

    Which of the following statements accurately reflects the Enlightenment view on addiction?

    <p>People are responsible for their choices and can govern their lives.</p> Signup and view all the answers

    What does the content suggest about social media’s impact on political views?

    <p>It may contribute to increasing political polarization.</p> Signup and view all the answers

    Which of the following is considered a situational factor contributing to addiction?

    <p>Stress</p> Signup and view all the answers

    What is the primary factor contributing to the decline of traditional newspapers?

    <p>Reduction in advertising income from social media</p> Signup and view all the answers

    Which of the following is a form of direct censorship?

    <p>Prepublication review</p> Signup and view all the answers

    What characterizes self-censorship?

    <p>Group decides not to publish to avoid persecution</p> Signup and view all the answers

    Which statement best reflects the challenge posed by the Internet regarding censorship?

    <p>It creates ambiguous distinctions between content for adults and minors.</p> Signup and view all the answers

    What is the primary role traditionally held by the press, often referred to as the Fourth Estate?

    <p>To inform citizens and hold power to account</p> Signup and view all the answers

    In what historical context did the printing press change the landscape of information dissemination?

    <p>It broke the information monopoly of governments and churches</p> Signup and view all the answers

    Which of the following is NOT a method of direct censorship?

    <p>Public backlash leading to content removal</p> Signup and view all the answers

    What is one significant challenge that the Internet poses for censorship efforts?

    <p>Global accessibility that transcends borders</p> Signup and view all the answers

    What reason might lead a group to practice self-censorship?

    <p>Interest in maintaining relational ties with officials</p> Signup and view all the answers

    Which of these options best describes the future outlook for traditional newspapers as presented?

    <p>They face a bleak future due to reduced advertising income.</p> Signup and view all the answers

    What is the maximum liability for consumers regarding reported credit card losses?

    <p>$50</p> Signup and view all the answers

    Which of the following factors contributes to college students being more vulnerable to identity theft?

    <p>Living in close quarters with others</p> Signup and view all the answers

    What has led to a rapid decline in point-of-sale fraud?

    <p>Adoption of EMV technology</p> Signup and view all the answers

    What is a common method that identity thieves use to gain access to personal information?

    <p>Shoulder surfing</p> Signup and view all the answers

    What is one reason for the significant number of fraudulent online reviews?

    <p>Review systems lacking verification</p> Signup and view all the answers

    Which software application is commonly associated with real-time chatting over the Internet?

    <p>Kik Messenger</p> Signup and view all the answers

    What ethical concern is raised about police sting operations against online predators?

    <p>Reliance on deception to catch criminals</p> Signup and view all the answers

    How does the quality of web-based information generally compare to traditional media?

    <p>Widely variable</p> Signup and view all the answers

    What percentage of North Americans reportedly used online reviews in the past year according to a survey?

    <p>88%</p> Signup and view all the answers

    What is a key reason for police conducting sting operations targeting child predators?

    <p>To safeguard children</p> Signup and view all the answers

    What is a significant feature of the World Wide Web?

    <p>It is decentralized.</p> Signup and view all the answers

    What is one reason mobile apps are preferred over web browsers on mobile devices?

    <p>Web browsers are awkward to use on mobile devices.</p> Signup and view all the answers

    Which of the following is NOT a common use of the internet?

    <p>Exploring universal abstract concepts</p> Signup and view all the answers

    What was a significant outcome of the M-PESA system in Kenya?

    <p>Facilitated saving money and transferring funds.</p> Signup and view all the answers

    How does Twitter primarily serve its users?

    <p>As a blogging platform and social networking service.</p> Signup and view all the answers

    What is one of the political impacts of social media mentioned?

    <p>Influence on public opinion through online advertising.</p> Signup and view all the answers

    What is a unique aspect of URLs in the context of the web?

    <p>Every web object has a unique URL.</p> Signup and view all the answers

    What characterizes the growing use of mobile apps compared to traditional web browsing?

    <p>Apps generally offer more efficient functionalities for internet access.</p> Signup and view all the answers

    What ethical evaluation considers CIPA to be wrong based on Kantian principles?

    <p>Kantian evaluation</p> Signup and view all the answers

    Which methodology do web filters use to prevent access to objectionable sites?

    <p>Black list methodology</p> Signup and view all the answers

    What is the primary legal requirement placed on libraries by the Child Internet Protection Act (CIPA)?

    <p>To filter obscenity and child pornography</p> Signup and view all the answers

    What percentage of teens are reported to be involved in sexting?

    <p>3% to 7%</p> Signup and view all the answers

    Which of the following is the leading form of identity theft?

    <p>Fraudulent use of credit cards</p> Signup and view all the answers

    Which ethical theory emphasizes the weighing of benefits and harms in evaluating actions related to CIPA?

    <p>Act utilitarian evaluation</p> Signup and view all the answers

    Which concept describes the act of sending sexually suggestive messages or images, often among teens?

    <p>Sexting</p> Signup and view all the answers

    What is the primary rationale behind the Supreme Court's ruling on CIPA concerning the First Amendment?

    <p>It balances free speech with child protection</p> Signup and view all the answers

    What significant legal protection does CIPA impose on libraries that receive federal funds?

    <p>Filtering of specific harmful content</p> Signup and view all the answers

    Which of the following percentages represents adults in the U.S. that experienced identity theft in 2017?

    <p>7%</p> Signup and view all the answers

    What characteristic defines a web object within the World Wide Web?

    <p>It has a unique address called a URL.</p> Signup and view all the answers

    How have mobile apps affected internet usage on mobile devices?

    <p>They provide an alternative to awkwardly using Web browsers.</p> Signup and view all the answers

    Which activity is NOT typically associated with internet use?

    <p>Engaging in face-to-face conversations.</p> Signup and view all the answers

    What is one specific feature of M-PESA as utilized in Kenya?

    <p>It allows users to communicate information about crop prices.</p> Signup and view all the answers

    What role does Twitter serve as part of its functionality?

    <p>It acts as a web-based social networking service and blogging tool.</p> Signup and view all the answers

    What is one way the internet positively impacts humanitarian actions?

    <p>It allows for better coordination and visibility of humanitarian efforts.</p> Signup and view all the answers

    What factor contributes to the political impact of social media?

    <p>Enhanced ability to promote political ideas and mobilize support.</p> Signup and view all the answers

    What major change does the use of mobile apps reflect in internet access?

    <p>A shift to a more fragmented internet experience.</p> Signup and view all the answers

    What role did social media play in the ousting of Philippine president Joseph Estrada in 2001?

    <p>Used for organizing demonstrations</p> Signup and view all the answers

    What was a result of misinformation spread via Twitter during the Massachusetts special election in 2010?

    <p>Misleading Google search results</p> Signup and view all the answers

    What was the primary method used by Macedonian entrepreneurs to monetize pro-Trump websites?

    <p>Advertising revenue from clicks</p> Signup and view all the answers

    Which statement accurately describes the activity of the Internet Research Agency in the 2016 election?

    <p>Posted inflammatory material to aid Trump</p> Signup and view all the answers

    What is a major ethical concern regarding Kate's action of posting a photo without Jerry's permission?

    <p>It disregards the principles of mutual consent.</p> Signup and view all the answers

    What is a significant concern regarding social media's impact on democracy?

    <p>Creates ideological echo chambers</p> Signup and view all the answers

    Which methodology do web filters commonly utilize to manage objectionable content?

    <p>Maintenance of a 'black list' of sites.</p> Signup and view all the answers

    According to the U.S. Supreme Court ruling on the Child Internet Protection Act (CIPA), what constitutional right was upheld?

    <p>Right to free speech.</p> Signup and view all the answers

    What did the indictment of the Internet Research Agency reveal about its operations during the 2016 election?

    <p>It utilized various social media platforms for outreach</p> Signup and view all the answers

    What is one of the effects of Facebook's algorithm on news consumption?

    <p>It enhances user engagement by personalizing content</p> Signup and view all the answers

    Which conceptual framework argues that the evaluation of CIPA depends on weighing its benefits and harms?

    <p>Utilitarian evaluation.</p> Signup and view all the answers

    Why is there a debate regarding the impact of social media on high-risk political activism during the Arab Spring?

    <p>Connections formed through social media are often too weak for effective mobilization</p> Signup and view all the answers

    Which definition accurately describes 'sexting' as mentioned in the content?

    <p>Sexually suggestive texts or emails with suggestive photographs.</p> Signup and view all the answers

    What is the leading form of identity theft as defined in the content?

    <p>Fraudulent use of existing credit cards.</p> Signup and view all the answers

    What was the effect of pro-Trump sensationalized headlines created by Macedonian entrepreneurs?

    <p>They attracted significant web traffic and revenue</p> Signup and view all the answers

    What are the four characteristics of Internet addiction as proposed by Jerald Block?

    <p>Excessive use, withdrawal symptoms, tolerance, negative social consequences</p> Signup and view all the answers

    What aspect of social media usage poses a potential threat to informed public discourse?

    <p>Creating filter bubbles based on personal preferences</p> Signup and view all the answers

    Which statement best reflects the Kantian evaluation of CIPA?

    <p>It is seen as a compromise of moral standards.</p> Signup and view all the answers

    In which countries has revenge porn been specifically criminalized?

    <p>Germany, Israel, the UK, and approximately half of U.S. states</p> Signup and view all the answers

    What percentage of teens reportedly engage in sexting as defined in the content?

    <p>3 to 7 percent.</p> Signup and view all the answers

    How does Google's ranking system boost the visibility of certain pages?

    <p>Through a 'voting' algorithm that favors pages linked by many sources</p> Signup and view all the answers

    In the context of web filters, which option describes an incorrect method used to evaluate objectionable content?

    <p>Using user preference surveys to assess site safety.</p> Signup and view all the answers

    Which of the following is a misconception regarding identity theft based on the content?

    <p>The misuse of personal identity is limited to online transactions.</p> Signup and view all the answers

    Which of the following describes a specific variant of internet addiction as identified by Jerald Block?

    <p>Excessive gaming</p> Signup and view all the answers

    What legal action did South Korea take regarding children's gaming hours?

    <p>Prohibit children from gaming between midnight and 6 a.m.</p> Signup and view all the answers

    What ethical perspective does Virtue Ethics primarily emphasize in evaluating Kate's actions?

    <p>The qualities of character demonstrated in friendships</p> Signup and view all the answers

    According to the Act Utilitarian Analysis, what was the perceived net benefit of Kate's action?

    <p>It temporarily angered Jerry but benefited him socially.</p> Signup and view all the answers

    What fundamental principle does Social Contract Theory emphasize in evaluating Kate's privacy violation?

    <p>The expectation of privacy and mutual respect in social interactions</p> Signup and view all the answers

    From the Rule Utilitarian perspective, what aspect of Kate's actions was highlighted as particularly negative?

    <p>The likelihood of creating an environment of self-consciousness</p> Signup and view all the answers

    Which of the following best describes the lack of reciprocity in Kate's actions according to Virtue Ethics?

    <p>Kate should have offered something in return for using Jerry's photo.</p> Signup and view all the answers

    What was identified as a consequence of widespread sharing of personal photos under the Rule Utilitarian analysis?

    <p>Harmful impacts on interpersonal relationships</p> Signup and view all the answers

    Which of these analyses suggested that the benefits outweighed the harms of Kate's action?

    <p>Act Utilitarian Analysis</p> Signup and view all the answers

    What aspect of Kate's decision is criticized from a Kantian perspective?

    <p>Her intentions to gain popularity without regard for others</p> Signup and view all the answers

    In which ethical framework was there an assertion that negative consequences outweighed positive consequences, making Kate’s actions wrong?

    <p>Rule Utilitarian Analysis</p> Signup and view all the answers

    What key factor made Kate's action against the principles of Virtue Ethics?

    <p>Her unilateral decision making in friendship</p> Signup and view all the answers

    Study Notes

    Act Utilitarian Analysis

    • Ann’s action benefited the Girl Scouts by generating $108 in profit from the sale of 36 boxes of cookies
    • The action resulted in a loss of productivity for the company due to employees taking orders during breaks and complaining, estimated at $70
    • The action is considered good because the benefits exceed the harms

    Rule Utilitarian Analysis

    • If all employees were to use company email to solicit donations, it would likely lead to employee grumbling and lower morale
    • It is unlikely that any one cause would benefit from such a widespread practice
    • The harms outweigh the benefits, making Ann's action wrong.

    Social Contract Theory Analysis

    • Acme Corporation's email system doesn't explicitly prohibit the use of company email for fundraising
    • Ann was exercising her right to express herself by promoting her daughter's Girl Scout cookie sales.
    • Ann’s actions were not considered “spamming” because she didn’t conceal her identity or advertise a fraudulent product.

    Virtue Ethics Analysis

    • Honesty, fairness, and respect are considered relevant virtues for an employee
    • Ann was honest because her email did not mislead anyone.
    • However, she wasn’t fair or respectful to her coworkers, and she exercised poor judgment.
    • Ann should have found a way for her daughter to help with the cookie sales and a way to advertise that respected her co-workers.

    Summary

    • Although Act Utilitarianism considers Ann’s action good, Rule Utilitarianism, Social Contract Theory, and Virtue Ethics view it as wrong.
    • A less controversial approach would have been to post a sign-up sheet to identify people who were interested in buying cookies.
    • This would have allowed Ann to send emails only to those who were interested, avoiding the issues of grumbling and lost productivity.

    Governmental Filtering and Surveillance of Internet Content

    • Countries like North Korea and Saudi Arabia heavily restrict internet access.
    • China has one of the most sophisticated filtering systems and blocks access during periods of social unrest.
    • Germany forbids access to neo-Nazi sites.

    Ethical Perspectives on Censorship

    • Kant, an Enlightenment thinker, opposed censorship.
    • He believed individuals should have the courage to use their own reason.
    • Mill opposed censorship because:
    • No one is infallible.
    • Every opinion, even those we disagree with, may contain a kernel of truth.
    • The clash of ideas reveals truth.
    • Free and open discourse promotes critical thinking and leads to better decision-making.

    Mill's Principle of Harm

    • Mill believed that the only justification for restricting an individual's freedom is to prevent harm to others.
    • Personal well-being, whether physical or moral, is not a sufficient reason to restrict freedom.

    Freedom of Expression: History

    • The Court of Star Chamber in England was known for its broad anti-sedition laws
    • Trials were conducted without traditional rules of evidence and often resulted in convictions for verbal insults and private writings.
    • In the 18th century, there were no prior restraints on publication, but individuals could be punished for sedition or libel.
    • The US Constitution adopted the Bill of Rights, including the First Amendment, which guarantees freedom of expression.

    Identity Theft

    • Victims lose billions of dollars each year to credit card fraud.
    • Consumer liability for credit card losses is limited to $50.
    • Most banks and credit card companies offer zero-liability fraud protection.
    • Point-of-sale fraud declined with the introduction of EMV (embedded chip) credit cards.
    • Online fraud is on the rise.
    • Identity thieves gain access to information through various tactics, including dumpster diving, shoulder surfing, and phishing.
    • College students are more likely to be victims due to living in densely populated areas and not taking proper care to secure sensitive information.

    Fake Reviews

    • Online reviews are widely used by consumers to make informed decisions about products and services.
    • A significant percentage of online reviews are fraudulent.
    • Websites like Yelp invest significant resources to identify and remove fake reviews.

    Online Predators

    • Child predators use instant messaging apps to find victims.
    • Sting operations by law enforcement frequently result in arrests.
    • The use of deception in these sting operations raises ethical concerns.

    Ethical Evaluations of “Stings”

    • Police officers' goals in sting operations are laudable:
      • Identify and arrest pedophiles.
      • Protect children.
    • Ethical concerns include:
      • The use of deception by posing as children.
      • The privacy violations involved in revealing private conversations.
      • The possibility of encouraging criminal behavior.
    • Consequentialists are more likely to accept such methods because they prioritize outcomes over the means.

    False Information

    • The quality of online information varies tremendously.
    • The New York Times and 60 Minutes are considered more reliable sources than the National Enquirer and Conspiracy Theory.
    • Google utilizes an algorithm to rank websites based on the number of links pointing to them, rewarding high-quality information.

    Cyberbullying

    • Cyberbullying involves using the internet or phone systems to inflict psychological harm.
    • Studies indicate a significant number of people admit to either cyberbullying or being cyberbullied.
    • High-profile cases like those of Ghyslain Raza and Megan Meier have drawn attention to this issue.
    • The Megan Meier Cyberbullying Prevention Act was enacted to address this issue.

    Revenge Porn

    • Revenge porn is a specific instance of cyberbullying involving the posting of pornographic images without the consent of the individuals in the images.
    • The intent is malicious and aimed at harming the victims.
    • The case of Hunter Moore, who ran a website featuring such images, highlights the issue.
    • Many countries, including Germany, Israel, the UK, and several U.S. states, have criminalized revenge porn.
    • Social media platforms have taken measures to protect victims against revenge porn.

    Is Internet Addiction Real?

    • Digital devices provide immediate positive feedback through dopamine release, making it difficult to detach from them.
    • Psychiatrist Jerald Block identifies three types of internet addiction:
      • Excessive gaming.
      • Sexual preoccupations.
      • Messaging.
    • Block identifies four characteristics of internet addiction:
      • Excessive use.
      • Withdrawal symptoms.
      • Tolerance.
      • Negative social consequences.
    • The American Psychiatric Association does not recognize internet addiction as a mental disorder.
    • South Korea and China have implemented measures to address concerns related to internet addiction among youth, including restrictions on gaming times.

    Contributing Factors to Addiction

    • Social factors: Peer pressure and influence.
    • Situational factors: Stress, a lack of social support and intimacy, limited opportunities for productive activities.
    • Individual factors: Tendency toward excessive behavior, lack of achievement, fear of failure.

    Ethical Evaluation of Internet Addiction

    • The Enlightenment view:
      • Individuals have the capacity and responsibility to manage their lives.
      • People are accountable for their choices.
    • Jeffrey Reiman’s view:
      • An addict's behavior makes sense if they have no hope for a better future.
      • Society bears responsibility for creating situations that lead to hopelessness.

    Summary (3 of 3)

    • The internet and mobile technology have revolutionized communication.
      • Increased access to information, social interaction, business, and political organization.
      • New opportunities for exploitation.
    • The internet reflects both the best and worst of humanity.
    • Social media plays an increasingly important role in news dissemination.
      • Raises concerns about political polarization.
    • Governments need to decide how to intervene in online activities, if at all, by addressing:
      • Information control.
      • Internet addiction.

    The World Wide Web

    • The Web is a networked hypertext system.
    • The Web's decentralized structure and unique addresses (URLs) for each object contribute to its vast popularity.

    Mobile Apps

    • Mobile devices such as smartphones and tablets are increasingly used for accessing the internet.
    • Web browsers are often awkward to use on mobile devices.
    • Mobile apps are replacing web browsers for internet access on mobile devices.

    How We Use the Internet

    • The internet is used for buying and selling products and services.
    • Socializing is done with platforms such as Facebook.
    • People contribute content on platforms such as wikis and blogs.
    • The internet is also used for crowdsourcing, learning, exploring family history, accessing virtual worlds, connecting Internet of Things devices, paying taxes, gambling, and humanitarian work.

    Text Messaging

    • Mobile money services, such as M-PESA in Kenya, allow users to save money, pay bills, and transfer funds.
    • Text messaging is used to communicate crop prices and protect against counterfeit medicine.

    Twitter

    • Twitter is a web-based social networking service.
    • With over 300 million users, Twitter is a popular blogging tool.
    • Companies use Twitter for business promotion.

    The Political Impact of Social Media and Online Advertising

    • Traditional newspaper advertising revenue has declined due to websites like Craigslist and social media.
    • Many newspapers have shut down or lost significant value.
    • Advertisers are shifting their spending to mobile devices, where users spend more time.
    • The future of traditional newspapers is uncertain.
    • The press ("Fourth Estate") has historically informed citizens and held power accountable.

    Censorship

    • Censorship involves suppressing or regulating public access to material deemed harmful or offensive.
    • Governments and religious institutions traditionally exercise censorship.
    • The printing press disrupted the monopoly on information distribution held by governments and churches.

    Direct Censorship

    • Government monopolization refers to government control of all media outlets (e.g., former Soviet Union).
    • Prepublication review involves reviewing and approving content before dissemination.
    • Licensing and registration are used to control media with limited bandwidth, such as radio and television.

    Self-Censorship

    • This is the most common form of censorship where a group decides not to publish.
    • Reasons for self-censorship include avoiding persecution and maintaining good relations with government officials.
    • Rating systems provide guidance to potential audiences for movies, TVs, CDs, and video games, but not for the Web.

    Challenges Posed by the Internet

    • The many-to-many communication model, dynamic connections, huge number of websites, and global reach of the internet pose challenges for censorship.
    • Distinguishing between minors and adults online is difficult.

    Children and Inappropriate Content

    • Web filters are software that prevent the display of certain websites.
    • They can be installed on individual PCs or provided by internet service providers.
    • Web filters use blacklists of objectionable sites or content analysis to identify inappropriate material.

    Child Internet Protection Act (CIPA)

    • Libraries receiving federal networking funds are required to filter pages containing obscenity or child pornography.
    • The US Supreme Court upheld CIPA, ruling that it does not violate the First Amendment.

    Ethical Evaluations of CIPA

    • Kantianism argues that CIPA is wrong.
    • Act utilitarianism suggests that CIPA's ethicality depends on the balance of benefits and harms.
    • Social contract theory emphasizes the importance of freedom of conscience over censorship.

    Sexting

    • Sexting involves sending sexually suggestive text messages or emails with nude or nearly nude photographs.
    • Around 3-7% of teens engage in sexting, with a smaller percentage sending photos of bare breasts, genitalia, or "bottoms".
    • High-profile cases involving sexting have highlighted the risks associated with this activity.

    Breaking Trust

    • Identity theft involves misusing another person's identity.
    • The most common form of identity theft is using someone's credit card or bank account fraudulently.
    • In 2017, around 7% of American adults reported experiencing identity theft.
    • Consumer liability for credit card losses is limited to $50, with many banks and credit card companies offering zero-liability fraud protection.

    Fake Reviews

    • Online reviews significantly influence buying decisions.
    • A significant percentage of online reviews are fraudulent.
    • Companies like Yelp dedicate resources to identifying and removing fake reviews.

    Online Predators

    • Child predators use instant messaging apps like Kik Messenger and Whisper to find victims.
    • Police conduct "sting" operations, posing as children to catch predators.
    • These operations have resulted in numerous arrests, but some critics raise ethical concerns about the methods used.

    Ethical Evaluations of "Stings"

    • Police aim to identify and arrest pedophiles to protect children.
    • However, the use of deception and the potential encouragement of criminal behavior are ethically questionable.
    • Consequentialists, who focus on results over methods, are more likely to find these operations morally acceptable.

    Internet Addiction

    • The internet can be addictive due to social, situational, and individual factors.
    • Social factors include peer group influence.
    • Situational factors include stress, lack of social support and intimacy, and limited opportunities for productive activities.
    • Individual factors include a tendency towards excessive pursuit of activities, low achievement, and fear of failure.

    Ethical Evaluation of Internet Addiction

    • The Enlightenment view emphasizes individual autonomy and responsibility for one's choices.
    • Jeffrey Reiman suggests that addicts' behaviour makes sense if they have no hope for a better future, indicating societal responsibility for creating hopeless conditions.

    Summary

    • The Internet has profoundly impacted communication, facilitating socialization, commerce, political organization, and exploitation.
    • The web reflects both the best and worst of humanity.
    • Social media plays an increasingly vital role in news dissemination and may contribute to political polarization.
    • Governments grapple with how to intervene, if at all, in regulating internet information and addressing internet addiction.

    The World Wide Web

    • The Web is a networked hypertext system
    • The Web has stimulated tremendous growth in the internet's popularity
    • It is decentralized
    • Each Web object has a unique address - the URL

    Mobile Apps

    • People are spending more time on smartphones and tablets
    • Using Web browsers on mobile devices is awkward
    • Mobile apps are replacing Web browsers as a way to access the internet on mobile devices

    Using the Internet

    • Uses include buying, selling, socializing, contributing content, learning, exploring, crowdsourcing, and visiting secret websites

    Mobile Text Messaging

    • M-PESA in Kenya is an example of how text messaging is transforming lives in developing countries
    • It can be used to save money, pay bills, and transfer funds

    Twitter

    • Twitter is a web-based social networking service
    • Twitter has more than 300 million users
    • It is used as a blogging tool and for business promotion

    Political Impact of Social Media and Online Advertising

    • Social media has been used to organize protests, spread misinformation, and influence elections
    • Text messaging was used to organize demonstrations during the ouster of Philippine President Joseph Estrada in 2001

    Macedonian Entrepreneurs

    • In 2016, Macedonian entrepreneurs created more than 100 pro-Trump websites
    • These websites registered with Google's AdSense program and used Facebook's share feature to drive traffic to websites
    • The entrepreneurs made money when people clicked on the stories they posted

    Internet Research Agency (IRA)

    • The IRA was based in St. Petersburg
    • They set up social media accounts using false US personas
    • They posted inflammatory material to help Trump and harm Clinton
    • 80,000 posts reached nearly 100 million Americans
    • There is no consensus on whether the posts changed the outcome of the election

    Democracy Under Threat

    • There are concerns that social media can harm democracy by undermining trust, informed dialogue, and a shared sense of reality
    • Facebook provides nearly half of Americans with news
    • Facebook uses user preference data to feed people content they like, which can create ideological echo chambers

    Identity Theft

    • Identity theft occurs when people misuses another person’s identity
    • The leading form of identity theft is the fraudulent use of existing credit cards or bank accounts
    • In 2017, about 7% of adults in the US were victims of identity theft

    Cyberbullying

    • This is the use of the internet or phones to inflict psychological harm
    • In 2009, 10% of teens admitted to cyberbullying, and 19% said they had been cyberbullied

    Revenge Porn

    • This is a form of cyberbullying where explicit images of a person are posted online without their consent
    • It has been criminalized in Germany, Israel, the UK, and about half of the US states

    Internet Addiction

    • Internet addiction is characterized by excessive use, withdrawal symptoms, tolerance, and negative social consequences
    • The American Psychiatric Association does not list it as a mental disorder
    • Some countries, like South Korea and China, have laws and software designed to discourage excessive internet use, especially among children

    Online Games

    • Many South Koreans play online games in centers called PC bangs
    • In 2005, a 28-year-old South Korean man died after playing a game practically nonstop for 50 hours

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz explores the analysis of Ann's actions using act utilitarianism, rule utilitarianism, and social contract theory. It assesses the implications of her fundraising efforts and their impact on both the Girl Scouts and her work environment. Test your understanding of these philosophical concepts and their applications in real-world scenarios.

    More Like This

    Use Quizgecko on...
    Browser
    Browser