Podcast
Questions and Answers
What was the total benefit to the Girl Scouts from the cookie sales?
What was the total benefit to the Girl Scouts from the cookie sales?
What was the estimated harm to the company from Ann's actions?
What was the estimated harm to the company from Ann's actions?
What would likely be the result if all employees solicited donations via email?
What would likely be the result if all employees solicited donations via email?
According to Social Contract Theory, how did Ann exercise her rights?
According to Social Contract Theory, how did Ann exercise her rights?
Signup and view all the answers
Which key virtue did Ann exhibit in her email communication?
Which key virtue did Ann exhibit in her email communication?
Signup and view all the answers
What could Ann have done to engage her daughter more effectively?
What could Ann have done to engage her daughter more effectively?
Signup and view all the answers
What alternative method could Ann have used to avoid employee complaints?
What alternative method could Ann have used to avoid employee complaints?
Signup and view all the answers
Why was Ann's action ultimately deemed wrong by Rule Utilitarian Analysis?
Why was Ann's action ultimately deemed wrong by Rule Utilitarian Analysis?
Signup and view all the answers
Which country has internet access that is virtually inaccessible to its citizens?
Which country has internet access that is virtually inaccessible to its citizens?
Signup and view all the answers
What was the main concern for governments regarding internet filtering?
What was the main concern for governments regarding internet filtering?
Signup and view all the answers
Who proposed that censorship is unnecessary because 'any opinion may contain a kernel of truth'?
Who proposed that censorship is unnecessary because 'any opinion may contain a kernel of truth'?
Signup and view all the answers
What does Mill's Principle of Harm suggest is a valid reason for exercising power over individuals?
What does Mill's Principle of Harm suggest is a valid reason for exercising power over individuals?
Signup and view all the answers
Which historical entity administered the De Scandalis Magnatum law?
Which historical entity administered the De Scandalis Magnatum law?
Signup and view all the answers
What significant legal document was adopted by American states to protect freedom of expression?
What significant legal document was adopted by American states to protect freedom of expression?
Signup and view all the answers
What theory emphasizes the importance of free and open discourse in revealing truth?
What theory emphasizes the importance of free and open discourse in revealing truth?
Signup and view all the answers
What was a restriction on publication that occurred before the 18th century?
What was a restriction on publication that occurred before the 18th century?
Signup and view all the answers
Which country is noted for having a sophisticated internet filtering system that can block access during social unrest?
Which country is noted for having a sophisticated internet filtering system that can block access during social unrest?
Signup and view all the answers
Which philosopher is known for encouraging individuals to have 'the courage to use your own reason'?
Which philosopher is known for encouraging individuals to have 'the courage to use your own reason'?
Signup and view all the answers
What is the maximum liability a consumer has for credit card losses if reported?
What is the maximum liability a consumer has for credit card losses if reported?
Signup and view all the answers
What has contributed to the rapid decline of point-of-sale fraud?
What has contributed to the rapid decline of point-of-sale fraud?
Signup and view all the answers
Which method of gaining access to personal information is NOT mentioned as a tactic used by identity thieves?
Which method of gaining access to personal information is NOT mentioned as a tactic used by identity thieves?
Signup and view all the answers
Why are college students reported to be more likely victims of identity theft?
Why are college students reported to be more likely victims of identity theft?
Signup and view all the answers
What percentage of North Americans reportedly read online reviews regularly according to a 2014 survey?
What percentage of North Americans reportedly read online reviews regularly according to a 2014 survey?
Signup and view all the answers
What is one of the controversial methods used in police sting operations against child predators?
What is one of the controversial methods used in police sting operations against child predators?
Signup and view all the answers
What is a significant issue surrounding the quality of web-based information?
What is a significant issue surrounding the quality of web-based information?
Signup and view all the answers
What ethical viewpoint might view police sting operations as morally acceptable?
What ethical viewpoint might view police sting operations as morally acceptable?
Signup and view all the answers
What percentage of online reviews is believed to be fraudulent?
What percentage of online reviews is believed to be fraudulent?
Signup and view all the answers
What type of software is commonly used for real-time chatting over the Internet?
What type of software is commonly used for real-time chatting over the Internet?
Signup and view all the answers
Which of the following is considered a situational factor contributing to addiction?
Which of the following is considered a situational factor contributing to addiction?
Signup and view all the answers
What does the Enlightenment view suggest regarding individual responsibilities?
What does the Enlightenment view suggest regarding individual responsibilities?
Signup and view all the answers
According to Jeffrey Reiman’s view, what is a significant factor in an addict’s behavior?
According to Jeffrey Reiman’s view, what is a significant factor in an addict’s behavior?
Signup and view all the answers
What is one potential negative outcome of social media as mentioned in the content?
What is one potential negative outcome of social media as mentioned in the content?
Signup and view all the answers
What challenge do governments face regarding the Internet?
What challenge do governments face regarding the Internet?
Signup and view all the answers
What is the definition of cyberbullying?
What is the definition of cyberbullying?
Signup and view all the answers
Which of the following is a characteristic of Internet addiction according to Jerald Block?
Which of the following is a characteristic of Internet addiction according to Jerald Block?
Signup and view all the answers
What is revenge porn?
What is revenge porn?
Signup and view all the answers
What action has been taken by platforms like Reddit and Twitter regarding revenge porn?
What action has been taken by platforms like Reddit and Twitter regarding revenge porn?
Signup and view all the answers
According to a 2009 survey, what percentage of individuals admitted to being a victim of cyberbullying?
According to a 2009 survey, what percentage of individuals admitted to being a victim of cyberbullying?
Signup and view all the answers
What type of feedback do digital device users receive that can lead to addiction?
What type of feedback do digital device users receive that can lead to addiction?
Signup and view all the answers
How many hours per week does the average South Korean high school student spend gaming?
How many hours per week does the average South Korean high school student spend gaming?
Signup and view all the answers
What has the American Psychiatric Association concluded about Internet addiction?
What has the American Psychiatric Association concluded about Internet addiction?
Signup and view all the answers
What variant of Internet addiction involves specifically online gaming?
What variant of Internet addiction involves specifically online gaming?
Signup and view all the answers
What is the consequence of the law in South Korea regarding gaming for children?
What is the consequence of the law in South Korea regarding gaming for children?
Signup and view all the answers
Which factor does NOT contribute to individual addiction according to the content?
Which factor does NOT contribute to individual addiction according to the content?
Signup and view all the answers
What is a key responsibility of society regarding addiction as proposed by Jeffrey Reiman?
What is a key responsibility of society regarding addiction as proposed by Jeffrey Reiman?
Signup and view all the answers
Which of the following statements accurately reflects the Enlightenment view on addiction?
Which of the following statements accurately reflects the Enlightenment view on addiction?
Signup and view all the answers
What does the content suggest about social media’s impact on political views?
What does the content suggest about social media’s impact on political views?
Signup and view all the answers
Which of the following is considered a situational factor contributing to addiction?
Which of the following is considered a situational factor contributing to addiction?
Signup and view all the answers
What is the primary factor contributing to the decline of traditional newspapers?
What is the primary factor contributing to the decline of traditional newspapers?
Signup and view all the answers
Which of the following is a form of direct censorship?
Which of the following is a form of direct censorship?
Signup and view all the answers
What characterizes self-censorship?
What characterizes self-censorship?
Signup and view all the answers
Which statement best reflects the challenge posed by the Internet regarding censorship?
Which statement best reflects the challenge posed by the Internet regarding censorship?
Signup and view all the answers
What is the primary role traditionally held by the press, often referred to as the Fourth Estate?
What is the primary role traditionally held by the press, often referred to as the Fourth Estate?
Signup and view all the answers
In what historical context did the printing press change the landscape of information dissemination?
In what historical context did the printing press change the landscape of information dissemination?
Signup and view all the answers
Which of the following is NOT a method of direct censorship?
Which of the following is NOT a method of direct censorship?
Signup and view all the answers
What is one significant challenge that the Internet poses for censorship efforts?
What is one significant challenge that the Internet poses for censorship efforts?
Signup and view all the answers
What reason might lead a group to practice self-censorship?
What reason might lead a group to practice self-censorship?
Signup and view all the answers
Which of these options best describes the future outlook for traditional newspapers as presented?
Which of these options best describes the future outlook for traditional newspapers as presented?
Signup and view all the answers
What is the maximum liability for consumers regarding reported credit card losses?
What is the maximum liability for consumers regarding reported credit card losses?
Signup and view all the answers
Which of the following factors contributes to college students being more vulnerable to identity theft?
Which of the following factors contributes to college students being more vulnerable to identity theft?
Signup and view all the answers
What has led to a rapid decline in point-of-sale fraud?
What has led to a rapid decline in point-of-sale fraud?
Signup and view all the answers
What is a common method that identity thieves use to gain access to personal information?
What is a common method that identity thieves use to gain access to personal information?
Signup and view all the answers
What is one reason for the significant number of fraudulent online reviews?
What is one reason for the significant number of fraudulent online reviews?
Signup and view all the answers
Which software application is commonly associated with real-time chatting over the Internet?
Which software application is commonly associated with real-time chatting over the Internet?
Signup and view all the answers
What ethical concern is raised about police sting operations against online predators?
What ethical concern is raised about police sting operations against online predators?
Signup and view all the answers
How does the quality of web-based information generally compare to traditional media?
How does the quality of web-based information generally compare to traditional media?
Signup and view all the answers
What percentage of North Americans reportedly used online reviews in the past year according to a survey?
What percentage of North Americans reportedly used online reviews in the past year according to a survey?
Signup and view all the answers
What is a key reason for police conducting sting operations targeting child predators?
What is a key reason for police conducting sting operations targeting child predators?
Signup and view all the answers
What is a significant feature of the World Wide Web?
What is a significant feature of the World Wide Web?
Signup and view all the answers
What is one reason mobile apps are preferred over web browsers on mobile devices?
What is one reason mobile apps are preferred over web browsers on mobile devices?
Signup and view all the answers
Which of the following is NOT a common use of the internet?
Which of the following is NOT a common use of the internet?
Signup and view all the answers
What was a significant outcome of the M-PESA system in Kenya?
What was a significant outcome of the M-PESA system in Kenya?
Signup and view all the answers
How does Twitter primarily serve its users?
How does Twitter primarily serve its users?
Signup and view all the answers
What is one of the political impacts of social media mentioned?
What is one of the political impacts of social media mentioned?
Signup and view all the answers
What is a unique aspect of URLs in the context of the web?
What is a unique aspect of URLs in the context of the web?
Signup and view all the answers
What characterizes the growing use of mobile apps compared to traditional web browsing?
What characterizes the growing use of mobile apps compared to traditional web browsing?
Signup and view all the answers
What ethical evaluation considers CIPA to be wrong based on Kantian principles?
What ethical evaluation considers CIPA to be wrong based on Kantian principles?
Signup and view all the answers
Which methodology do web filters use to prevent access to objectionable sites?
Which methodology do web filters use to prevent access to objectionable sites?
Signup and view all the answers
What is the primary legal requirement placed on libraries by the Child Internet Protection Act (CIPA)?
What is the primary legal requirement placed on libraries by the Child Internet Protection Act (CIPA)?
Signup and view all the answers
What percentage of teens are reported to be involved in sexting?
What percentage of teens are reported to be involved in sexting?
Signup and view all the answers
Which of the following is the leading form of identity theft?
Which of the following is the leading form of identity theft?
Signup and view all the answers
Which ethical theory emphasizes the weighing of benefits and harms in evaluating actions related to CIPA?
Which ethical theory emphasizes the weighing of benefits and harms in evaluating actions related to CIPA?
Signup and view all the answers
Which concept describes the act of sending sexually suggestive messages or images, often among teens?
Which concept describes the act of sending sexually suggestive messages or images, often among teens?
Signup and view all the answers
What is the primary rationale behind the Supreme Court's ruling on CIPA concerning the First Amendment?
What is the primary rationale behind the Supreme Court's ruling on CIPA concerning the First Amendment?
Signup and view all the answers
What significant legal protection does CIPA impose on libraries that receive federal funds?
What significant legal protection does CIPA impose on libraries that receive federal funds?
Signup and view all the answers
Which of the following percentages represents adults in the U.S. that experienced identity theft in 2017?
Which of the following percentages represents adults in the U.S. that experienced identity theft in 2017?
Signup and view all the answers
What characteristic defines a web object within the World Wide Web?
What characteristic defines a web object within the World Wide Web?
Signup and view all the answers
How have mobile apps affected internet usage on mobile devices?
How have mobile apps affected internet usage on mobile devices?
Signup and view all the answers
Which activity is NOT typically associated with internet use?
Which activity is NOT typically associated with internet use?
Signup and view all the answers
What is one specific feature of M-PESA as utilized in Kenya?
What is one specific feature of M-PESA as utilized in Kenya?
Signup and view all the answers
What role does Twitter serve as part of its functionality?
What role does Twitter serve as part of its functionality?
Signup and view all the answers
What is one way the internet positively impacts humanitarian actions?
What is one way the internet positively impacts humanitarian actions?
Signup and view all the answers
What factor contributes to the political impact of social media?
What factor contributes to the political impact of social media?
Signup and view all the answers
What major change does the use of mobile apps reflect in internet access?
What major change does the use of mobile apps reflect in internet access?
Signup and view all the answers
What role did social media play in the ousting of Philippine president Joseph Estrada in 2001?
What role did social media play in the ousting of Philippine president Joseph Estrada in 2001?
Signup and view all the answers
What was a result of misinformation spread via Twitter during the Massachusetts special election in 2010?
What was a result of misinformation spread via Twitter during the Massachusetts special election in 2010?
Signup and view all the answers
What was the primary method used by Macedonian entrepreneurs to monetize pro-Trump websites?
What was the primary method used by Macedonian entrepreneurs to monetize pro-Trump websites?
Signup and view all the answers
Which statement accurately describes the activity of the Internet Research Agency in the 2016 election?
Which statement accurately describes the activity of the Internet Research Agency in the 2016 election?
Signup and view all the answers
What is a major ethical concern regarding Kate's action of posting a photo without Jerry's permission?
What is a major ethical concern regarding Kate's action of posting a photo without Jerry's permission?
Signup and view all the answers
What is a significant concern regarding social media's impact on democracy?
What is a significant concern regarding social media's impact on democracy?
Signup and view all the answers
Which methodology do web filters commonly utilize to manage objectionable content?
Which methodology do web filters commonly utilize to manage objectionable content?
Signup and view all the answers
According to the U.S. Supreme Court ruling on the Child Internet Protection Act (CIPA), what constitutional right was upheld?
According to the U.S. Supreme Court ruling on the Child Internet Protection Act (CIPA), what constitutional right was upheld?
Signup and view all the answers
What did the indictment of the Internet Research Agency reveal about its operations during the 2016 election?
What did the indictment of the Internet Research Agency reveal about its operations during the 2016 election?
Signup and view all the answers
What is one of the effects of Facebook's algorithm on news consumption?
What is one of the effects of Facebook's algorithm on news consumption?
Signup and view all the answers
Which conceptual framework argues that the evaluation of CIPA depends on weighing its benefits and harms?
Which conceptual framework argues that the evaluation of CIPA depends on weighing its benefits and harms?
Signup and view all the answers
Why is there a debate regarding the impact of social media on high-risk political activism during the Arab Spring?
Why is there a debate regarding the impact of social media on high-risk political activism during the Arab Spring?
Signup and view all the answers
Which definition accurately describes 'sexting' as mentioned in the content?
Which definition accurately describes 'sexting' as mentioned in the content?
Signup and view all the answers
What is the leading form of identity theft as defined in the content?
What is the leading form of identity theft as defined in the content?
Signup and view all the answers
What was the effect of pro-Trump sensationalized headlines created by Macedonian entrepreneurs?
What was the effect of pro-Trump sensationalized headlines created by Macedonian entrepreneurs?
Signup and view all the answers
What are the four characteristics of Internet addiction as proposed by Jerald Block?
What are the four characteristics of Internet addiction as proposed by Jerald Block?
Signup and view all the answers
What aspect of social media usage poses a potential threat to informed public discourse?
What aspect of social media usage poses a potential threat to informed public discourse?
Signup and view all the answers
Which statement best reflects the Kantian evaluation of CIPA?
Which statement best reflects the Kantian evaluation of CIPA?
Signup and view all the answers
In which countries has revenge porn been specifically criminalized?
In which countries has revenge porn been specifically criminalized?
Signup and view all the answers
What percentage of teens reportedly engage in sexting as defined in the content?
What percentage of teens reportedly engage in sexting as defined in the content?
Signup and view all the answers
How does Google's ranking system boost the visibility of certain pages?
How does Google's ranking system boost the visibility of certain pages?
Signup and view all the answers
In the context of web filters, which option describes an incorrect method used to evaluate objectionable content?
In the context of web filters, which option describes an incorrect method used to evaluate objectionable content?
Signup and view all the answers
Which of the following is a misconception regarding identity theft based on the content?
Which of the following is a misconception regarding identity theft based on the content?
Signup and view all the answers
Which of the following describes a specific variant of internet addiction as identified by Jerald Block?
Which of the following describes a specific variant of internet addiction as identified by Jerald Block?
Signup and view all the answers
What legal action did South Korea take regarding children's gaming hours?
What legal action did South Korea take regarding children's gaming hours?
Signup and view all the answers
What ethical perspective does Virtue Ethics primarily emphasize in evaluating Kate's actions?
What ethical perspective does Virtue Ethics primarily emphasize in evaluating Kate's actions?
Signup and view all the answers
According to the Act Utilitarian Analysis, what was the perceived net benefit of Kate's action?
According to the Act Utilitarian Analysis, what was the perceived net benefit of Kate's action?
Signup and view all the answers
What fundamental principle does Social Contract Theory emphasize in evaluating Kate's privacy violation?
What fundamental principle does Social Contract Theory emphasize in evaluating Kate's privacy violation?
Signup and view all the answers
From the Rule Utilitarian perspective, what aspect of Kate's actions was highlighted as particularly negative?
From the Rule Utilitarian perspective, what aspect of Kate's actions was highlighted as particularly negative?
Signup and view all the answers
Which of the following best describes the lack of reciprocity in Kate's actions according to Virtue Ethics?
Which of the following best describes the lack of reciprocity in Kate's actions according to Virtue Ethics?
Signup and view all the answers
What was identified as a consequence of widespread sharing of personal photos under the Rule Utilitarian analysis?
What was identified as a consequence of widespread sharing of personal photos under the Rule Utilitarian analysis?
Signup and view all the answers
Which of these analyses suggested that the benefits outweighed the harms of Kate's action?
Which of these analyses suggested that the benefits outweighed the harms of Kate's action?
Signup and view all the answers
What aspect of Kate's decision is criticized from a Kantian perspective?
What aspect of Kate's decision is criticized from a Kantian perspective?
Signup and view all the answers
In which ethical framework was there an assertion that negative consequences outweighed positive consequences, making Kate’s actions wrong?
In which ethical framework was there an assertion that negative consequences outweighed positive consequences, making Kate’s actions wrong?
Signup and view all the answers
What key factor made Kate's action against the principles of Virtue Ethics?
What key factor made Kate's action against the principles of Virtue Ethics?
Signup and view all the answers
Study Notes
Act Utilitarian Analysis
- Ann’s action benefited the Girl Scouts by generating $108 in profit from the sale of 36 boxes of cookies
- The action resulted in a loss of productivity for the company due to employees taking orders during breaks and complaining, estimated at $70
- The action is considered good because the benefits exceed the harms
Rule Utilitarian Analysis
- If all employees were to use company email to solicit donations, it would likely lead to employee grumbling and lower morale
- It is unlikely that any one cause would benefit from such a widespread practice
- The harms outweigh the benefits, making Ann's action wrong.
Social Contract Theory Analysis
- Acme Corporation's email system doesn't explicitly prohibit the use of company email for fundraising
- Ann was exercising her right to express herself by promoting her daughter's Girl Scout cookie sales.
- Ann’s actions were not considered “spamming” because she didn’t conceal her identity or advertise a fraudulent product.
Virtue Ethics Analysis
- Honesty, fairness, and respect are considered relevant virtues for an employee
- Ann was honest because her email did not mislead anyone.
- However, she wasn’t fair or respectful to her coworkers, and she exercised poor judgment.
- Ann should have found a way for her daughter to help with the cookie sales and a way to advertise that respected her co-workers.
Summary
- Although Act Utilitarianism considers Ann’s action good, Rule Utilitarianism, Social Contract Theory, and Virtue Ethics view it as wrong.
- A less controversial approach would have been to post a sign-up sheet to identify people who were interested in buying cookies.
- This would have allowed Ann to send emails only to those who were interested, avoiding the issues of grumbling and lost productivity.
Governmental Filtering and Surveillance of Internet Content
- Countries like North Korea and Saudi Arabia heavily restrict internet access.
- China has one of the most sophisticated filtering systems and blocks access during periods of social unrest.
- Germany forbids access to neo-Nazi sites.
Ethical Perspectives on Censorship
- Kant, an Enlightenment thinker, opposed censorship.
- He believed individuals should have the courage to use their own reason.
- Mill opposed censorship because:
- No one is infallible.
- Every opinion, even those we disagree with, may contain a kernel of truth.
- The clash of ideas reveals truth.
- Free and open discourse promotes critical thinking and leads to better decision-making.
Mill's Principle of Harm
- Mill believed that the only justification for restricting an individual's freedom is to prevent harm to others.
- Personal well-being, whether physical or moral, is not a sufficient reason to restrict freedom.
Freedom of Expression: History
- The Court of Star Chamber in England was known for its broad anti-sedition laws
- Trials were conducted without traditional rules of evidence and often resulted in convictions for verbal insults and private writings.
- In the 18th century, there were no prior restraints on publication, but individuals could be punished for sedition or libel.
- The US Constitution adopted the Bill of Rights, including the First Amendment, which guarantees freedom of expression.
Identity Theft
- Victims lose billions of dollars each year to credit card fraud.
- Consumer liability for credit card losses is limited to $50.
- Most banks and credit card companies offer zero-liability fraud protection.
- Point-of-sale fraud declined with the introduction of EMV (embedded chip) credit cards.
- Online fraud is on the rise.
- Identity thieves gain access to information through various tactics, including dumpster diving, shoulder surfing, and phishing.
- College students are more likely to be victims due to living in densely populated areas and not taking proper care to secure sensitive information.
Fake Reviews
- Online reviews are widely used by consumers to make informed decisions about products and services.
- A significant percentage of online reviews are fraudulent.
- Websites like Yelp invest significant resources to identify and remove fake reviews.
Online Predators
- Child predators use instant messaging apps to find victims.
- Sting operations by law enforcement frequently result in arrests.
- The use of deception in these sting operations raises ethical concerns.
Ethical Evaluations of “Stings”
- Police officers' goals in sting operations are laudable:
- Identify and arrest pedophiles.
- Protect children.
- Ethical concerns include:
- The use of deception by posing as children.
- The privacy violations involved in revealing private conversations.
- The possibility of encouraging criminal behavior.
- Consequentialists are more likely to accept such methods because they prioritize outcomes over the means.
False Information
- The quality of online information varies tremendously.
- The New York Times and 60 Minutes are considered more reliable sources than the National Enquirer and Conspiracy Theory.
- Google utilizes an algorithm to rank websites based on the number of links pointing to them, rewarding high-quality information.
Cyberbullying
- Cyberbullying involves using the internet or phone systems to inflict psychological harm.
- Studies indicate a significant number of people admit to either cyberbullying or being cyberbullied.
- High-profile cases like those of Ghyslain Raza and Megan Meier have drawn attention to this issue.
- The Megan Meier Cyberbullying Prevention Act was enacted to address this issue.
Revenge Porn
- Revenge porn is a specific instance of cyberbullying involving the posting of pornographic images without the consent of the individuals in the images.
- The intent is malicious and aimed at harming the victims.
- The case of Hunter Moore, who ran a website featuring such images, highlights the issue.
- Many countries, including Germany, Israel, the UK, and several U.S. states, have criminalized revenge porn.
- Social media platforms have taken measures to protect victims against revenge porn.
Is Internet Addiction Real?
- Digital devices provide immediate positive feedback through dopamine release, making it difficult to detach from them.
- Psychiatrist Jerald Block identifies three types of internet addiction:
- Excessive gaming.
- Sexual preoccupations.
- Messaging.
- Block identifies four characteristics of internet addiction:
- Excessive use.
- Withdrawal symptoms.
- Tolerance.
- Negative social consequences.
- The American Psychiatric Association does not recognize internet addiction as a mental disorder.
- South Korea and China have implemented measures to address concerns related to internet addiction among youth, including restrictions on gaming times.
Contributing Factors to Addiction
- Social factors: Peer pressure and influence.
- Situational factors: Stress, a lack of social support and intimacy, limited opportunities for productive activities.
- Individual factors: Tendency toward excessive behavior, lack of achievement, fear of failure.
Ethical Evaluation of Internet Addiction
- The Enlightenment view:
- Individuals have the capacity and responsibility to manage their lives.
- People are accountable for their choices.
- Jeffrey Reiman’s view:
- An addict's behavior makes sense if they have no hope for a better future.
- Society bears responsibility for creating situations that lead to hopelessness.
Summary (3 of 3)
- The internet and mobile technology have revolutionized communication.
- Increased access to information, social interaction, business, and political organization.
- New opportunities for exploitation.
- The internet reflects both the best and worst of humanity.
- Social media plays an increasingly important role in news dissemination.
- Raises concerns about political polarization.
- Governments need to decide how to intervene in online activities, if at all, by addressing:
- Information control.
- Internet addiction.
The World Wide Web
- The Web is a networked hypertext system.
- The Web's decentralized structure and unique addresses (URLs) for each object contribute to its vast popularity.
Mobile Apps
- Mobile devices such as smartphones and tablets are increasingly used for accessing the internet.
- Web browsers are often awkward to use on mobile devices.
- Mobile apps are replacing web browsers for internet access on mobile devices.
How We Use the Internet
- The internet is used for buying and selling products and services.
- Socializing is done with platforms such as Facebook.
- People contribute content on platforms such as wikis and blogs.
- The internet is also used for crowdsourcing, learning, exploring family history, accessing virtual worlds, connecting Internet of Things devices, paying taxes, gambling, and humanitarian work.
Text Messaging
- Mobile money services, such as M-PESA in Kenya, allow users to save money, pay bills, and transfer funds.
- Text messaging is used to communicate crop prices and protect against counterfeit medicine.
- Twitter is a web-based social networking service.
- With over 300 million users, Twitter is a popular blogging tool.
- Companies use Twitter for business promotion.
The Political Impact of Social Media and Online Advertising
- Traditional newspaper advertising revenue has declined due to websites like Craigslist and social media.
- Many newspapers have shut down or lost significant value.
- Advertisers are shifting their spending to mobile devices, where users spend more time.
- The future of traditional newspapers is uncertain.
- The press ("Fourth Estate") has historically informed citizens and held power accountable.
Censorship
- Censorship involves suppressing or regulating public access to material deemed harmful or offensive.
- Governments and religious institutions traditionally exercise censorship.
- The printing press disrupted the monopoly on information distribution held by governments and churches.
Direct Censorship
- Government monopolization refers to government control of all media outlets (e.g., former Soviet Union).
- Prepublication review involves reviewing and approving content before dissemination.
- Licensing and registration are used to control media with limited bandwidth, such as radio and television.
Self-Censorship
- This is the most common form of censorship where a group decides not to publish.
- Reasons for self-censorship include avoiding persecution and maintaining good relations with government officials.
- Rating systems provide guidance to potential audiences for movies, TVs, CDs, and video games, but not for the Web.
Challenges Posed by the Internet
- The many-to-many communication model, dynamic connections, huge number of websites, and global reach of the internet pose challenges for censorship.
- Distinguishing between minors and adults online is difficult.
Children and Inappropriate Content
- Web filters are software that prevent the display of certain websites.
- They can be installed on individual PCs or provided by internet service providers.
- Web filters use blacklists of objectionable sites or content analysis to identify inappropriate material.
Child Internet Protection Act (CIPA)
- Libraries receiving federal networking funds are required to filter pages containing obscenity or child pornography.
- The US Supreme Court upheld CIPA, ruling that it does not violate the First Amendment.
Ethical Evaluations of CIPA
- Kantianism argues that CIPA is wrong.
- Act utilitarianism suggests that CIPA's ethicality depends on the balance of benefits and harms.
- Social contract theory emphasizes the importance of freedom of conscience over censorship.
Sexting
- Sexting involves sending sexually suggestive text messages or emails with nude or nearly nude photographs.
- Around 3-7% of teens engage in sexting, with a smaller percentage sending photos of bare breasts, genitalia, or "bottoms".
- High-profile cases involving sexting have highlighted the risks associated with this activity.
Breaking Trust
- Identity theft involves misusing another person's identity.
- The most common form of identity theft is using someone's credit card or bank account fraudulently.
- In 2017, around 7% of American adults reported experiencing identity theft.
- Consumer liability for credit card losses is limited to $50, with many banks and credit card companies offering zero-liability fraud protection.
Fake Reviews
- Online reviews significantly influence buying decisions.
- A significant percentage of online reviews are fraudulent.
- Companies like Yelp dedicate resources to identifying and removing fake reviews.
Online Predators
- Child predators use instant messaging apps like Kik Messenger and Whisper to find victims.
- Police conduct "sting" operations, posing as children to catch predators.
- These operations have resulted in numerous arrests, but some critics raise ethical concerns about the methods used.
Ethical Evaluations of "Stings"
- Police aim to identify and arrest pedophiles to protect children.
- However, the use of deception and the potential encouragement of criminal behavior are ethically questionable.
- Consequentialists, who focus on results over methods, are more likely to find these operations morally acceptable.
Internet Addiction
- The internet can be addictive due to social, situational, and individual factors.
- Social factors include peer group influence.
- Situational factors include stress, lack of social support and intimacy, and limited opportunities for productive activities.
- Individual factors include a tendency towards excessive pursuit of activities, low achievement, and fear of failure.
Ethical Evaluation of Internet Addiction
- The Enlightenment view emphasizes individual autonomy and responsibility for one's choices.
- Jeffrey Reiman suggests that addicts' behaviour makes sense if they have no hope for a better future, indicating societal responsibility for creating hopeless conditions.
Summary
- The Internet has profoundly impacted communication, facilitating socialization, commerce, political organization, and exploitation.
- The web reflects both the best and worst of humanity.
- Social media plays an increasingly vital role in news dissemination and may contribute to political polarization.
- Governments grapple with how to intervene, if at all, in regulating internet information and addressing internet addiction.
The World Wide Web
- The Web is a networked hypertext system
- The Web has stimulated tremendous growth in the internet's popularity
- It is decentralized
- Each Web object has a unique address - the URL
Mobile Apps
- People are spending more time on smartphones and tablets
- Using Web browsers on mobile devices is awkward
- Mobile apps are replacing Web browsers as a way to access the internet on mobile devices
Using the Internet
- Uses include buying, selling, socializing, contributing content, learning, exploring, crowdsourcing, and visiting secret websites
Mobile Text Messaging
- M-PESA in Kenya is an example of how text messaging is transforming lives in developing countries
- It can be used to save money, pay bills, and transfer funds
- Twitter is a web-based social networking service
- Twitter has more than 300 million users
- It is used as a blogging tool and for business promotion
Political Impact of Social Media and Online Advertising
- Social media has been used to organize protests, spread misinformation, and influence elections
- Text messaging was used to organize demonstrations during the ouster of Philippine President Joseph Estrada in 2001
Macedonian Entrepreneurs
- In 2016, Macedonian entrepreneurs created more than 100 pro-Trump websites
- These websites registered with Google's AdSense program and used Facebook's share feature to drive traffic to websites
- The entrepreneurs made money when people clicked on the stories they posted
Internet Research Agency (IRA)
- The IRA was based in St. Petersburg
- They set up social media accounts using false US personas
- They posted inflammatory material to help Trump and harm Clinton
- 80,000 posts reached nearly 100 million Americans
- There is no consensus on whether the posts changed the outcome of the election
Democracy Under Threat
- There are concerns that social media can harm democracy by undermining trust, informed dialogue, and a shared sense of reality
- Facebook provides nearly half of Americans with news
- Facebook uses user preference data to feed people content they like, which can create ideological echo chambers
Identity Theft
- Identity theft occurs when people misuses another person’s identity
- The leading form of identity theft is the fraudulent use of existing credit cards or bank accounts
- In 2017, about 7% of adults in the US were victims of identity theft
Cyberbullying
- This is the use of the internet or phones to inflict psychological harm
- In 2009, 10% of teens admitted to cyberbullying, and 19% said they had been cyberbullied
Revenge Porn
- This is a form of cyberbullying where explicit images of a person are posted online without their consent
- It has been criminalized in Germany, Israel, the UK, and about half of the US states
Internet Addiction
- Internet addiction is characterized by excessive use, withdrawal symptoms, tolerance, and negative social consequences
- The American Psychiatric Association does not list it as a mental disorder
- Some countries, like South Korea and China, have laws and software designed to discourage excessive internet use, especially among children
Online Games
- Many South Koreans play online games in centers called PC bangs
- In 2005, a 28-year-old South Korean man died after playing a game practically nonstop for 50 hours
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz explores the analysis of Ann's actions using act utilitarianism, rule utilitarianism, and social contract theory. It assesses the implications of her fundraising efforts and their impact on both the Girl Scouts and her work environment. Test your understanding of these philosophical concepts and their applications in real-world scenarios.