CESHV----TOPICS
list of chapter tests designed in conjunction with the third
edition of Computer Ethics by Deborah Johnson.
|
topic
|
|
Introduction
Watch excerpts of
Lang:
Metropolis
(1926)
PBS:
The 1900 House
(2000)
TOPICS for STUDENT PROJECTS –PAPERS—QUESTIONS and ISSUES
Unsollicited E-mail
The FBI's Carnivore
Using celebrities to lure Web customers
On-line term papers
The information technology gap between developed & developing
countries
Artificial intelligence
How social class affects equity of access
Internet dating
Sale of prescription drugs on the Net
Hacking & cracking
Using computers to make & sell fake IDs
On-line college degrees
Data mining
Parental controls on the internet
Pornography and censorship on the Web
Shareware & software ownership
Posting "wanted" posters on the Web for abortion doctors
Editors’ Introduction: Ethics in the Information Age (pages 1–13)
-
Why do the editors say that the information revolution is
“fundamentally social and ethical,” rather than merely
technological?
-
Why, according to James Moor, is ICT such a powerful force for
social change?
-
What is Computing Curricula 2001 and what are the major
professional organizations that developed it?
-
What are a few of the major questions regarding the impacts of
ICT on human relationships?
-
What are some of the aspects of ICT that make such technology a
threat to privacy?
-
Explain why privacy and anonymity on the Internet can be “double
edged swords” with both good and bad consequences. Give a few
examples of good and bad consequences.
-
What are some of the important intellectual property issues
being generated by ICT?
-
Briefly describe a few of the work-related social and ethical
issues being generated or exacerbated by ICT.
-
Describe some of the “social justice” issues generated or
worsened by ICT.
-
What is “assistive technology” and what social/ethical questions
does such technology raise?
-
What are some of the “hopes and worries” about government and
democracy that ICT is generating?
-
The Editors’ Introduction (on pages 6 and 7) describes “a
primary goal of computer ethics.” Briefly discuss that goal.
-
Who was the founder of computer ethics as an academic
discipline, and what project was he working on when he created
the field?
-
Who was “the second founder of computer ethics,” and what issues
got him interested in this field?
-
What shocking experience led Joseph Weizenbaum to write his
now-classic computer ethics book Computer Power and Human Reason
(1976)?
-
In the mid to late 1970s, who made the name “computer ethics”
and the field of computer ethics widely known across America?
How did he accomplish this important ground-breaking
achievement?
|
|
Computers and Ethics
Editors’
Introduction to Part I (pages 17–20)
-
Why did computer ethics thinkers in the 1970s and 1980s have to
reinvent the subject?
-
Whose use of the term “computer ethics” made it a standard name
for the field that this textbook is about? What was his way of
defining this field?
-
What was Johnson’s definition of “computer ethics” in her 1985
textbook? How did her definition differ from Maner’s 1978
definition?
-
What ethical theories did Maner (in the 1970s) and Johnson (in
the 1980s) recommend as appropriate tools for doing computer
ethics? [See pages 71-73 in this textbook.]
-
How did Moor define the field of computer ethics in 1985 in his
influential article “What Is Computer Ethics”? [Hint: Relate his
definition to “policy vacuums” and “conceptual muddles.”]
-
According to Moor, what is it about computing technology that
makes it so powerful and, therefore, revolutionary?
-
What, according to Moor, are the two stages of the computer
revolution?
-
What was Bynum’s 1989 definition of computer ethics, and why,
according to Bynum, is computer ethics such an important field
of study?
-
In the early 1990s, Gotterbarn developed a different conception
of the field of computer ethics. What was it?
|
|
Law
Free Speech
The Twenty-seventh Amendment, to be proposed for at least
serious debate in 1991, would read simply:
"This Constitution's protections for the freedoms of speech,
press,petition, and assembly, and its protections against
unreasonable searches and seizures and the deprivation of life,
liberty, or property without due process of law, shall be
construed as fully applicable without regard to the technological
method or medium through which information content
is generated, stored, altered, transmitted, or controlled."---"The Constitution
in Cyberspace," Laurence H. Tribe
"The Constitution
in Cyberspace," Laurence H. Tribe
http://www.epic.org/free_speech/tribe.html
Censorship
Censorship and the internet
Freedom of Expression
ACLU
Readings on Computer Communications and Freedom of Expression
Banning newsgroups at CMU in 1994
The Great Cyberporn Scare of 1995
The Communications Decency Act of 1996
Communications
Decency Act CDA TEXT
http://www-swiss.ai.mit.edu/6805/articles/cda/cda-final.html
Reno v. ACLU, 1997 (CDA unconstitutional)
ACLU v. Reno III (Third Circuit, 2001)
Commission on Online Protection Act
Commission Report,
Executive Summary
James Boyle,
Foucault in Cyberspace: Surveillance, Sovereignty, and
Hardwired Censors, 66 U. Cin. L. Rev. 177 (1997) (Lexis-Nexis)
http://web.lexis-nexis.com/universe/document?_m=1f0bae6ad1a5a8c43168d5b8c33dd185&_docnum=4&wchp=dGLbVtz-zSkVA&_md5=3b0a8988b00ad71ccaeb6483a1176689
What Things Regulate Speech:CDA 2.0 vs. Filtering
Lawrence Lessig
Children's Privacy Legislation (USA).
Infowar.com and
Information Warfare
Access Denied: Information Policy and the Limits of Liberalism
by Grant Kester
Readings on Computer Communications and Freedom of Expression
First Amendment - background
Schenck v. U.S., 249 U.S. 47 (1919)
Abrams v. U.S., 250 U.S. 616 (1919)
Whitney v. California, 274 U.S. 357 (1927)
Brandenburg v. Ohio, 395 U.S. 444 (1969)
FCC v. Pacifica Foundation, 438 U.S. 726 (1978)
Sable Communications v. FCC, 492 U.S. 115 (1989)
New York Times Co. v. Sullivan, 376 U.S. 254 (1964)
Gertz v. Robert Welch, Inc., 418 U.S. 323 (1974)
UMKC E-Commerce Tax Policy Project Information about taxes on E-Commerce
both domestically and internationally
Electronic Frontier Foundation (EFF)
EFF is a donor-supported membership
organization working to protect our fundamental rights regardless
of technology; to educate the press, policy makers and the general
public about civil liberties issues related to technology; and to
act as a defender of those liberties. Among our various
activities, EFF opposes misguided legislation, initiates and
defends court cases preserving individuals' rights, launches
global public campaigns, introduces leading edge proposals and
papers, hosts frequent educational events, engages the press
regularly, and publishes a comprehensive archive of digital civil
liberties information at one of the most linked-to web sites in
the world.
Electronic Frontier Foundation.
John Perry Barlow is a retired Wyoming cattle rancher, a
former lyricist for the
Grateful Dead, and co-founder of the
Electronic Frontier Foundation. Since May of 1998, he has been
a Fellow at Harvard Law School's
Berkman Center for Internet and Society His
manifesto,
A Declaration of the Independence of
Cyberspace
has been widely distributed on the Net and
can be found on more than 20, 000 sites. Partly as a consequence
of that, he was called "the Thomas Jefferson of Cyberspace" by
Yahoo Internet Life Magazine back when such cyber-hyperbole was
fashionable.
Children's Access to the Web
CyberPatrol
Peacefire
Censorware Pages
"Keys to the Kingdom", a CyberWire Dispatch by Brock
N. Meeks (about so-called "blocking software")
Net Nanny
Peacefire (Teen
Net anti-censorship alliance)
PICS: Platform for Internet Content
Selection
SurfWatch
Safe For Kids Site of the Day
CASE
Problem that the US courts dealt with while
considering the (now rejected) “Communications Decency Act”: Why
should a child-abuse scene in a Dickens novel be legally permitted
in the form of text, while that same (or a similar) scene, which
consists of realistic computer graphics – not created from live
humans – be outlawed? Since both depict child abuse, and neither
involves real children, why should one be okay and one be
outlawed?
****************************************************************************
COURSE:
http://www-users.cs.york.ac.uk/~kimble/teaching/cis/cis6.html
"Knowledge is power" is a phrase attributed to Francis Bacon,
the British philosopher, essayist, and political figure. When
Bacon first used the phrase (in 1597) he was calling for empirical
and practical emphasis in science, however in the information age
the phrase has taken on a new resonance.
The Declaration of the Independence of
Cyberspace
contains
statements such as "We are creating a world where anyone, anywhere
may express his or her beliefs, no matter how singular, without
fear of being coerced into silence or conformity. Legal concepts
of property, expression, identity, movement, and context do not
apply to us." The authors of such documents hold the view that
"the net interprets censorship as damage and works around it" (for
examples of this see
Net Censorship Backfires). However, others hold different
views about the desirability of unfettered access to all and any
information. For a more academic discussion of the difficulty of
controlling the Internet, see David Post's essay on
Law-Making
in Cyberspace.
The issue of pornography is one that most often acts as a focus
point for these divergent views. For example, a study
Marketing
Pornography on the Information Superhighway by an
undergraduate student at Carnegie Mellon University, Marty Rimm,
lead to an article in Time Magazine on July 3, 1995 and spawned a
whole debate - see
Would-be Censors Base Arguments on Bogus Research and
More porn on
newstands than on the Internet. Subsequently, the issue of
"porn on the Internet" has led to attempts by parents in the US to
control their children's access to "inappropriate" material see
The Summary
of the Internet Family Empowerment White Paper. Debra Pahal's
page on
Internet Censorship Issues contains many further links on this
topic.
The issues of fascism and terrorism provide a similar focus for
debate with some arguing that the Internet should not provide a
platform for fascist/racist views and/or the views of terrorists.
Terrorism is a particularly difficult topic as, to quote the
cliché, one man's terrorist is another's freedom fighter (See, for
example
Terrorism label is US media propaganda) and many differing
definitions
of terrorism can be found. The
Testimony of Jerry Berman to the Senate Judiciary Committee
Subcommittee on Terrorism, Technology and Government Information
argues that the Internet is haven for bomb-makers, militia
members, racists, and purveyors of child pornography. In contrast,
Giancarlo Livraghi, a journalist from Italy, believes that the
real motives of government and business attempts to censor
'objectionable' material is to control the Internet as a means of
communication and exchange of information.
Required Reading:
- EE - Chap 1, 8, 10 in The Electronic Eye. Lyon. D.
Polity Press, 1994.
- CE - Computer Ethics. Forrester. T. and Morrison. P. Basil
Blackwell, 1994.
- IT(1) - Information Technology: Social Issues. A Reader. Ed.
Finnegan. R, Salaman. G and Thompson. K., The Open University/Hodder
and Stoughton., 1994.
Chap 9, Surveillance, Computers and Privacy, Campbell D
and Connor. S, pp 134 - 144
- SIC - Chap 6 in Social Issues in Computing, Huff. C
and Finholt. T, McGraw Hill, 1994, pp 193 - 226
- PandC - Chap 9 in People and Chips, Rowe. C and
Thompson. J, Mcgraw Hill, 1996, pp 167 - 192.
Additional Reading.
- John Shattuck and Muriel Morisey Spence, "The Dangers of
Information Control," in Tom Forrester, ed., Computers in the
Human Context: Information, Technology, Productivity, and
People, Cambridge, 1989.
- FINLAY Marike. Powermatics: a discursive critique of new
communications technology., Routledge and Kegan Paul, 1987.
- LAW John. A sociology of monsters: essays on power,
technology and domination, Routledge, 1991.
*************************************************************************************************************
COURSE
MIT
6.805/6.806/STS085: Ethics and Law on the Electronic Frontier
Privacy and Transparency |
|
Intellectual Property
Readings on Information and Intellectual Property
Digital Millennium Copyright Act, 1998
Coming into the Country
John Perry Barlow
Magna Carta for the Knowledge Age
Proprietary Rights in Computer Software: Individual and Policy
Issues – Deborah G. Johnson
Softward
Ownership and Natural Rights Volkman, R.
The Virtues of Software Ownership – David H. Carey
A Plea for Casual Copying – Helen Nissenbaum
The Ownership of Ideas in Computing Software –
John W. Snapper
Why Software Should Be Free: A Free Software Foundation Paper
– Richard Stallman
Anarchism Triumphant: Free Software and the Death of Copyright
Eben Moglen
Open Source Initiative
The Cathedral and the Bazaar”
Raymond, E. on the open source movement
Against User Interface Copyright – The League for Programming
Freedom
Against Software Patents – The League for
Programming Freedom
Track Report: Software Ownership – David H. Carey
Brief introduction to copyright
Brad
Templeton,
Ten Copyright Myths Brad Templeton,
A Politics of Intellectual Property James Boyle,
INTELLECTUAL PROPERTY A. COPYRIGHT 3. DIGITAL MILLENNIUM COPYRIGHT
ACT a) ANTI-CIRCUMVENTION PROVISIONS: RealNetworks, Inc. v.
Streambox, Inc. & Universal City Studios, Inc. v. Reimerdes
(2001)(Lexis-Nexis) - Eddan Elizafon Katz, History of DMCA and cases decided
Intellectual Property Online: Patent, Trademark, Copyright”
Archive Electronic Frontier Foundation
Is Code Speech? Brief of Amici Curiae in MPAA v. 2600 (DVD case)
DCMA
Digital Millennium Copyright Act, 1998
DVD Copy Control Assn. v. Bunner (6th App. Dist. Ca., Nov. 1,
2001)(overturning injunction against publication based on UTSA)
Universal City Studios v. Reimerdes (2d Cir., Nov. 28,
2001)(upholding injunction against publication of DeCSS code based
on DMCA)
Gallery of CSS Descramblers
http://eon.law.harvard.edu/openlaw/eldredvashcroft/legaldocs.html
Digital Copyright Act Harms Research
Richard M. Smith, Argues that DMCA allows copyright owners to define their own level of
protection, violating fair use.
SKYLAROV CASE
Complaint against Sklyarov
http://www.eff.org/IP/DMCA/US_v_Elcomsoft/20010707_complaint.html
Jail Time in the Digital Age
by Lawrence Lessig
OTHER
Patently Absurd. James Gleick. New York Times magazine. Sunday, March
12,
The League for Programming Freedom
The Software Patent Institute
Concepts of Property and the Biotechnology Debate
Thompson,
Shelly Warwick,
Is Copyright Ethical? An Examination of the Theories, Laws and
Practices Regarding the Private Ownership of Intellectual Work in
the United States
Justifying Intellectual Property
Hettinger, (JSTOR)
Trade Secrets and the Justification of Intellectual Property: A
Comment on Hettinger,
Lynn Sharp Paine, 20 PHIL. & PUB. AFF. 247, 251-52
(1991)(JSTOR)
The Right to Read
Richard Stallings,
Intellectual Property Issues from Negativland
The Electronic Commons
Paul Starr,
Encryption, Source Code, and the First Amendment Robert Post
(distinguishes use of source code to convey ideas to an
audience vs. use of source code to run a computer; encryption as
potentially protected speech)
The Limits in Open Code: Regulatory Standards and the Future of
the Net ,
Lawrence Lessig,
The Economy of Ideas,
John Perry Barlow, , Wired, Mar. 1994.
Junger v. Daley (6th Cir. 2000) 209 F.3d 481 (DeCSS; source
code is speech)
Illegal Art
Celebrating art and ideas on the legal fringes of intellectual
property.
FAQ - Intellectual Property Law Web Server
Series of categorized overviews provided by the law firm of
Oppedahl & Larson.
www.patents.com
Intellectual Property Law Server
General information on patent, trademark, and copyright law,
including links, forums, legal services directory, and
publication of articles.
www.intelproplaw.com
Copyfight
News stories about the politics of intellectual property.
www.corante.com/copyfight
lawgirl
Interactive legal resource for those in the arts and
entertainment field. Features a legal question and answer board
and interactive copyright registration pages.
www.lawgirl.com
Intellectual Property Data Collections
Provides access to IP data collections hosted by WIPO, with
access to other sites that provide IP data.
www.ipdl.wipo.int
Intellectual Property: Copyrights, Trademarks & Patents Information and links to resources. www.brint.com/IntellP.htm
Free Trade Area for the Americas
Paper offering a consumer perspective on proposals as they
relate to rules regarding intellectual property.
www.cptech.org/pharm/belopaper.html
Intellectual Property and Technology Forum Articles, news and discussion of intellectual property issues. www.bc.edu/bc_org/avp/law/st_org/iptf
Our Culture: Our Future Report, Report on Australian indigenous cultural and intellectual
property rights.
www.icip.lawnet.com.au
Patent, Trademark, and Copyright Information
Includes definitions, links, and more. www.pw1.netcom.com/~patents2/thefirm.html
Japan IP Resources
Provides updated information on events and issues in the areas
of Japanese intellectual property including patents, trademarks,
designs, and copyrights.www.okuyama.com
Telecommunications and Intellectual Property Law
Links to communications, copyright, and trademark law.
www.blueriver.net/~wyrm/tele.html
redPatent
Offers Innobook idea protection software, and provides industry
news, sample legal agreements, and other resources.
www.redpatent.com
TheIntelli.com
Information on intellectual property which includes terminology,
laws, organizations, actual court cases, and copyright. www.theintelli.com
World Intellectual Property Organization
http://www.wipo.org
Electronic Frontier Foundation
Bibliography
Lawrence Lessig, "Intellectual property"
Lawrence Lessig, Code and Other Laws of Cyberspace
Andrew L. Shapiro, The Control Revolution How the Internet is
Putting Individuals in Charge and Changing the World We Know
Richard Stim. Intellectual Property: Patents, Trademarks, and
Copyrights. Albany, New York: Lawyers Cooperative Publishing,
1994.
John Perry Barlow, Selling Wine without
Bottles
Helen
Nissenbaum, "Should I Copy My Neighbor's Software?"
Sony v. Betamax, 464 U.S. 417 (1984)
White-Smith Music Publ’g Co. v. Apollo Co., 209 U.S. 1, 18-20
(1908) (Holmes, J., concurring).
Copyright Act of Mar. 4, 1909, ch.
320, 33 Stat. 1075
Copyright
"Wild, Wild Web,"
Mike Godwin (Cyberethics, 215-221)
"Should Computer
Programs Be Owned?" Deborah G. Johnson (Cyberethics,
222-235)
Lotus
Development Corp. v. Borland International
Patent
"Mind over
Matter," James V. DeLong (Cyberethics, 236-242)
"Protecting
Intellectual Property in Cyberspace," J.C. Davis (Cyberethics,
243-256)
Gottschalk v.
Benson
(excerpts on Beachboard)
Diamond v.
Diehr
(excerpts on Beachboard)
Editors’ Introduction to Computing and
Intellectual Property (pages 278–284)
1.
According to the editors of this book, how did information
technology bring about a crisis for intellectual property?
2.
What is “greased” property? Why is it called “greased” ?
3.
What is Napster, and what is the primary ethical issue that
Napster generated?
4.
What is ownership?
5.
Give two or more examples to illustrate that ownership is not
absolute and can justly be limited by law and by ethics.
6.
Explain the “labor theory of ownership.”
7.
Explain the “personality theory of ownership.”
8.
Explain the “utilitarian theory of ownership.”
9.
Explain the “social contract theory of ownership.”
10.
What are the basic features of copyrights? How long do copyrights
last?
11.
In what sense is a copyright a weak form of ownership?
12.
What are the basic features of patents? How long do patents last?
13.
In what sense is a patent a strong form of ownership?
14.
What are the basic features of trade secrets?
15.
Why is trade secrecy typically a poor kind of ownership for
software?
|
|
Privacy
Demonstration of
snooping by computer
The CDT Privacy
Demonstration Page.
ACLU Surveillance
Campaign How bad can it get? Almost there?
http://www.aclu.org/pizza/
Towards a Theory of Privacy in the Information Age – James H. Moor
Private Life in Cyberspace by John Perry
Barlow
"The Right to Privacy"
(1890)
Samuel Warren and Louis Brandeis,
Technology and Ethics: Privacy in the Workplace
A speech by Laura
P. Hartman
Privacy Act of 1974, 5 U.S.C. § 552a
Discussion
on Openness - Foresight Institute
Floridians Mock Cop Cams
PANOPTICON
Net Decency & Sexuality
links on Backflip
The Virtual Panopticon.
Describes a virtual panopticon
constructed in the Internet-standard Virtual Reality Mark-up
Language (VRML) and contains some background information on
Jeremy Bentham's original vision.
Escaping the Panopticon: Protecting Data Privacy in the
Information Age. A student paper from Georgia State
University College of Law.
Surveillance and the Electronic Panopticon. from the
Massachusetts Institute of Technology.
Information Technology and Public Sector Corruption.
Corruption is a major problem for many parts of the public
sector. One dominant vision of corruption restraint - the
panoptic vision - sees information technology (IT) as a key
enabler of management control.
An Examination of Surveillance Technology and the Implications
for Privacy and Related Issues. This paper takes a critical
look at the often murky intersection of law, technology and
information.
The role of information systems personnel in the provision for
privacy and data protection in organisations and within
information systems
by Richard Howley, Simon Rogerson, N Ben Fairweather,
Lawrence Pratchett
Abstract -
Full Paper
The
ETHICOMP Journal Vol. 1 No. 1, published: 2004-02-02
Privacy Journal
News on privacy
Wired - Privacy Matters
The Electronic Privacy Information Center
The Center for
Democracy and Technology
The Information Commissioner of the United Kingdom
The Office of the Federal Privacy Commissioner, Australia
Privacy International
Privacy
International (PI) is a human rights group formed in 1990 as a
watchdog on surveillance and privacy invasions by governments and
corporations
Privacy.net
Privacy.org
Privacy Foundation
Federal
Communications Commision FCC
Federal
Trade Commission FTC
Electronic Frontier Foundation
Electronic Frontier Foundation 's
Blue Ribbon Campaign
Center
for Democracy and Technology CDT
FCC:
Parents, Kids & Communications
FTC:
Kidz Privacy
Editors’ Introduction to Privacy and
Computing (pages 246–248)
1.
What are the three meanings of the term “privacy” that arose
during the nineteenth and twentieth centuries? Which of these
meanings has become the primary one in the twenty-first century?
2.
What is digitization, and how did it increase risks to privacy.
3.
What are the roles of “massive databases and high-speed retrieval”
in increasing risks to privacy?
4.
What is the role of computer networks in increasing the risks to
privacy?
5.
What is “data-matching” and how can it increase risks to privacy?
6.
What is “data-mining” and how does it increase risks to privacy?
7.
Long before computers were invented, gathering of information
about individuals, storing it, and retrieving were common. How did
the invention of computers and the rapid development of
information and communication technology transform these
activities into serious risks to privacy? (Hint: scale)
8.
Name six to eight examples of types of personal data that need
protection from privacy invasions.
9.
What major sector of the American society remained largely
unaffected by privacy-protection laws passed in the early 1970s?
10.
Europe has a very different approach to privacy protection
compared to the USA. What is a key phrase that suggests the
European approach?
|
|
Secrecy Security
Readings on Encryption and National Security-MIT
Open Source
Privacy, Security, Crypto, and Surveillance Archive.
by The Electronic
Frontier Foundation
A Plain Text on Crypto Policy John Perry Barlow
1993
Why I Wrote PGP
Pretty Good Privacy encryption program
Philip Zimmerman,
Interview with Philip Zimmerman after 9/11 attacks
Ethical, Social and Professional Issues
in the Undergraduate Currriculum CERIAS:
The Center for Education and Research in Information Assurance and
Security
This site has several useful sections: * A Framework for
Integrating Ethical and Values-Based Instruction into the ACM
Computing Curricula 2001
Learning and Teaching with Case Studies
Authoring Guidelines
Center for Education and Research in Information Assurance and
Security (CERIAS) at Purdue
University, Eugene H. Spafford, Director
Computer Security Group, Cambridge
University, UK
Computer Security Institute
Computer Security Research Center, London School of Economics
The Risks Digest: Forum On Risks To The Public In Computers And
Related Systems, ACM Committee on Computers and Public Policy,
Peter G. Neumann, Moderator
Encryption Policy Resource Page
Internet Privacy Coalition
EPIC
Contains articles, reports, and government policies relating to
encryption and privacy on the Internet.
Advanced Encryption Standard (AES) Development Effort
Developing a U.S. Federal Information Processing Standard (FIPS)
that specifies an encryption algorithm(s) capable of protecting
sensitive government information.
FIPS 46-2 - Data Encryption Standard (DES)
Description of the standard.
Click Here to become an Arms Trafficker
Now you can just click on a web page to export 3lines of text
for an encryption program and become an International Arms
Trafficker!
Encryption Special Report
An explanation of the issues underlying the debate over
encryption policy. Includes background, key stories, legislative
update and profiles of key players, from the Washington Post.
Applied Cryptography Export Case
A page on my battle to export a disk containing the verbatim
source code from the book Applied Cryptography
Editors’ Introduction to Computer Security
(pages 206–207)
1.
What are the five components of “logical security" for computing
systems and networks?
2.
Briefly define the term “computer virus.”
3.
Briefly define the term “computer worm.”
4.
Briefly define the term “computer Trojan horse.”
5.
Briefly define the term “computer logic bomb.”
6.
Briefly define the term “computer bacterium" or "computer rabbit.”
7.
Why must computer security include concern about trusted personnel
within a company or organization?
8.
Why can computer security be called “a double-edged sword”?
9.
The term “hacker” has two very different meanings. The
“old-fashioned” positive meaning refers to a person who is a
“computer whiz” – someone who can push computer technology to its
outer limits to achieve very good or very helpful results. What is
the negative meaning – and these days the most common meaning – of
“hacker” (Hint: also called a “cracker.”)
10.
Why is every successful “break in” to a computer system – even one
that changes nothing within the system – harmful? (Hint: Does
checking for harm cost anything?)
|
|
Crime
Criminal
Justice and Crimes on the Internet
Readings on Computer Crime
MIT Open Source
Crime and Puzzlement: Desperados of the DataSphere
John Perry Barlow,
Part 1 crime_and_puzzlement
Part 2 crime_and_puzzlement
"Cyberstalking: A
New Challenge for Law Enforcement and Industry," U.S. Dept. of
Justice
Parasitic computing
The Ethics
of Parasitic Computing: Fair use or Abuse of TCP/IP
Over the INTERNET? Robert N. Barger
Fraud Precautions R Barger
"Ethical Web Agents" by David Eichmann
"Ethics of WWW Site Engineering"
(by Chris MacDonald, as
appearing in the July 1995
Computer Mediated
Communication Magazine)
"The Hacker
Crackdown: Law and Disorder on the Electronic Frontier," by
Bruce Sterling
"Information Ethics: On the Philosophical Foundation of Computer
Ethics" (includes "A Short Webliography on Computer Ethics")
"Keys to the Kingdom", a CyberWire Dispatch by Brock N.
Meeks (about so-called "blocking software")
"Making
Pseudonymity Acceptable", by Peter Danielson
"Netizens: On
the History and Impact of Usenet and the Internet" by
Michael Hauben and Ronda Hauben
"Networking
on the Net: Professionalism, Ethics And Courtesy On The Net,"
by Claire Belilos
"The
Power of Google," by Christina Buu-Hoan
"Toward an
Ethics and Etiquette for Electronic Mail", by Norman Z.
Shapiro and Robert H. Anderson
Web
Spoofing: An Internet Con Game, by Edward W. Felten, Dirk
Balfanz, Drew Dean, and Dan S. Wallach
Essay on computer viruses and worms,
Dr. R. Standler,PhD
(Physics, 1977), Attorney Specializing in Computer Law
Essay that surveys computer crime:Dr.
R. Standler,
Practical hints for users on how to avoid
computer crime: Dr. R.
Standler,
Essay on how to recognize hoaxes about
computer viruses Dr.
R. Standler,
Hacking
Peter J. Denning (editor), Computers Under
Attack: Intruders, Worms, and Viruses, Reading, MA:
Addison-Wesley, 1990.
Katie Hafner and John Markoff, Cyberpunk:
Outlaws and Hackers on the Computer Frontier, New York: Simon
and Schuster, 1995.
Tsutomu Shimomura and John Markoff,
Take-Down: The Pursuit and Capture of Kevin Mitnick, New
York: Hyperion, 1996.
Clifford Stoll, The Cuckoo’s Egg
Clifford Stoll, High-Tech Heretic
United States
v. Morris
United States
v. Alkhabaz
Arizona v.
Evans
|
|
Computing and Information Technology as Professions and
Professional Codes
Professional
Ethics
C
CHARACTERISTICS OF A PROFESSION
by Robert N. Barger
Professional Responsibility
Unintentional Power in the Design of Computing Systems
– Chuck
Huff
Informatic and Professional Responsibility – Donald Gotterbarn
The Ethics of Software Development Project Management – Simon Rogerson
Professionalism in Computing: Digital
Library - Jan Lee at Virginia Tech
Contains the
Professionalism in Computing course Web, the "digital library"
portion that provides access to the special topics pertinent
to the studies of the responsibilities and expectations of a
computer scientist
The Ethics of Web Site Engineering
- Chris MacDonald A
paper on the the ethics of Web Site Engineering
Licensing of Programmers and Software Engineers
Voluntary
Professional Codes
ACM Code of Ethics and Professional Conduct
http://www.acm.org/constitution/code.html
IEEE Code of Ethics IEE an
organization of computer professionals. Founded in 1946, it is the
largest of the 39 societies of the
IEEE.
GENERAL MORAL IMPERATIVES OF THE ACM CODE
Software Engineering Code of Ethics and Professional Practice
A
joint ACM/IEEE Computer Society effort
ACM Position Papers on Software Engineering and Licensing
Codes of Ethics links on the web site of the Centre for
Computing and Social Responsibility
Commentary on Codes of Ethics or
Conduct
Commentary on “The Ten Commandments of Computer Ethics” by N.
Ben Fairweather
"Computer Ethics:
Codes, Commandments, and Quandries," Julie Van Camp
CODE OF ETHICS FOR ENGINEERS
R. Barger
Center
for the Study of
Ethics in the
Professions at
IIT
SOCIETIES and ORGANIZATION
The Association for Computing Machinery
http://www.acm.org
The Australian Computer Society
http://www.acs.org.au
The British Computer Society
http://www1.bcs.org.uk
Computer Professionals for Social Responsibility
http://www.ccsr.org
Professional Accountability Section of the Website of the Online
Ethics Center
http://onlineethics.org/topics/accountability.html
Professionalism Section of the Website of the Centre for
Computing and Social Responsibility
http://www.ccsr.cse.dmu.ac.uk/resources/professionalism
The Software Engineering Ethics Research Institute SEERI at
East Tennessee State University at Johnson City, TN, USA
http://seeri.etsu.edu
Don Gotterbarn, East Tennessee State
University Promotes the development of ethical
and professional practices that address the impacts of software
engineering and related technologies on society, through
research, education, and consultation with individuals,
organizations and governments.
Cases to Analyze:
The
London Ambulance Case
London Ambulance Service
Brian Randell
Trevor Jenkins
Forum on Risks to the Public in Computers and Related Systems
RISKS
DIGEST
Editors’ Introduction to Part II (pages
91–97)
1.
Why, according to the editors of this textbook, do computer
practitioners “have an enormous responsibility to society”?
2.
Briefly describe four criteria that generally identify someone as
a “professional.”
3.
In what ways do typical computer practitioners fail to fulfill the
criteria mentioned in question 2 above?
4.
How is one’s role in a community or group related to
responsibilities that one has within the community or group? Give
three examples.
5.
What special responsibilities are associated with the
employer-employee relationship?
6.
What special responsibilities are associated with the
professional-to-professional relationship?
7.
Loyalty is sometimes thought to be a virtuous quality of an
employee or professional colleague; but loyalty is a “two-edged
sword” that can lead to unethical behavior. Explain and illustrate
with an example.
8.
What is the “agency” model of the professional-to-client
relationship?
9.
Why is the “agency” model a poor basis for a
professional-to-client relationship?
10.
What is the “paternalistic” model of the professional-to-client
relationship?
11.
Why is the “paternalistic” model a poor basis for a
professional-to-client relationship?
12.
What is the “fiduciary” model of the professional-to-client
relationship? What is the role of trust in this relationship?
13.
What special responsibilities does a computer professional have
with regard to users of the product or service that the
professional provides? Give three examples.
14.
Why is the professional-to-society relationship so important with
regard to computer professionals and today’s society?
15.
Explain how the professional-to-society relationship can be viewed
as a contractual relationship. What are the contractual
responsibilities of each participant in the contract?
Editors’ Introduction to Part III (pages
135–141)
1.
What is the “inspiration” function of codes of professional
ethics?
2.
What is the “education” function of codes of professional ethics?
3.
What is the “guidance” function of codes of professional ethics?
4.
What is the “accountability” function of codes of professional
ethics?
5.
What is the “enforcement” function of codes of professional
ethics?
6.
Explain why it would be a mistake to consider codes of
professional ethics to be laws.
7.
Why would it be a mistake to treat a code of professional ethics
as if it were a complete ethical algorithm?
8.
Why would it be inappropriate to consider a code of professional
ethics to be an exhaustive ethical check list?
9.
The phrase “code of ethics” is used very broadly in this textbook.
Explain what this means.
10.
Describe three different ways to organize the ideas in a code of
ethics.
11.
Name five of the “fundamental values and social ideals” that
typically are expressed in codes of professional ethics.
12.
Describe five “rules to govern specific professional activities”
that typically are found in codes of professional ethics.
13.
State three examples of “principles and imperatives that address
responsibilities that come with leadership roles.”
14.
Even though codes of professional ethics are not laws, they
nevertheless have some enforcement power. Explain why.
|
|
Social Change
The Information Revolution and
Social Change
lectures
on the information society by Daniel Chandler and Ewan
Sutherland
Cyberspace and the
American Dream: a Magna Carter for the Knowledge Age-
Ms. Esther Dyson; Mr. George Gilder; Dr. George Keyworth;
and Dr. Alvin Toffler
The Promise and Peril of the Third Wave
by Carl Davidson, Ivan Handler and Jerry Harris
Beyond the Information Revolution by Peter Drucker
Information Society Links Impact of IT and IN
The Alvin Toffler Archive at Wired
War and
Anti-WarCultures in conflict with the Digital Revolution
Globalization
New Village – “Leapfrogging the Grid” on a
Micro Scale
Terrell Ward Bynum
Economics of Computing and Monopolies and Pricing and Access
Issues -Terrel Ward Bynum
The Cyber Rights Working Group, Computer Professionals for
Social Responsibility
The Global Culture of Digital Technology and Its Ethics,” an
abstract of a paper by Krystyna Gorniak-Kocikowska
The Internet Society
– an international organization for global
cooperation
UNESCO’s Info-Ethics Program, The United Nations
Technological Determinism and
Social Choice
Engagement with
media: Shaping and Being Shaped by Daniel Chandler
Technological or Media Determinism by Daniel Chandler.
Computer Based Information Systems and Managers' Work
Kimble
Determinism (Wikipedia)
Technological Determinism (Principia Cybernetica)
Technological Questions and Issues
(Trinity Church of
England School)
Social Aspects of Technology and Science
(Records of course
meetings at UC San Diego)
What is the Social Shaping of Technology? -
Robin Williams and David Edge review research that addresses
'the social shaping of technology.
Technological Determinism -
Notes by Robert O. Keel, Department of Sociology, University of
Missouri-St. Louis
Technological Determinism of Marshall McLuhan -
Slide show by Whittenburg/Shedletsky from University of Southern
Maine
Marshall McLuhan Meets William Gibson in "Cyberspace"' Michael E. Doherty in the Computer-Mediated Communication
Magazine.
Robinson: "Technological
Futures and Determinisms"
(2001
Internet and Community
I'm Glad the Net `Corrodes' My Culture Marcelo Rinesi,
Who Are We Without Our Technologies?
Muktha Jost,
Does the Internet Strengthen Community?
William A. Galston,
How About a Moratorium on Internet Surveys?
Steve Talbott,
nternet and Society: Preliminary Report
Stanford Institute for the Quantitative Study of Society,
I(February 2000)
Online Communities: Networks That Nurture Long-Distance
Relationships and Local Ties
Pew Internet and American Life Project, (October 2001) (read summary of
findings)
NetFuture: Technology and Human Responsibility
It seeks especially to address those deep levels at which
we half-consciously shape technology and are shaped by it.
***************************************************************
***************************************************************
***************************************************************
***************************************************************
Information Ethics in the Underdeveloped World:A Project of the Research Center on
Computing & Society
The Research Center on Computing & Society at Southern
Connecticut State University has launched a project to identify
and study information ethics issues in the underdeveloped world.
Our goal is to identify problems and opportunities related to ICT
(information and communication technologies) and then to help
people in underdeveloped lands to solve or prevent such problems
or take advantage of promising opportunities made possible by ICT.
The first step in this project was the writing of a “concept
paper” for distribution at the
World Energy Technologies Summit held at
UNESCO Headquarters in Paris, France in February 2004. The
paper, which is an exercise in “positive computer ethics,”
explores ways to take advantage of miniature computerized devices
to help solve health and economics problems in underdeveloped
countries. It is entitled “New Village – ‘Leapfrogging the Grid’
on a Micro Scale” and it was very well received at the Paris
summit. We include the paper here as an online article
as well as a downloadable PDF file. In the near future, we
will also publish two student commentaries on the paper by
undergraduate students at Southern Connecticut State University.
We will include them for their useful ideas, and to serve as
examples of excellent papers for other students to read.
1.
Introduction
2.
Description of “Old Village”
3.
Clean Drinking Water
4.
Educational Opportunities
5.
Improved Health Care
6.
The Need for an Information Center in Old Village
7.
“Local” Employment in the Information Age – The Birth of “New
Village”
8.
Conclusion – Cultural Considerations
************************************************
Economics of Computing and Monopolies and Pricing and Access
Issues -Terrel Ward Bynum
ttp://www.southernct.edu/organizations/rccs/textbook/economics.html
The study of computing is incomplete without some consideration
of the economic factors that influence the associated investment,
research and development, access, distribution and social impact.
In this section some useful links are provided which cover four
key areas:
-
Monopolies and their economic implications
-
Effect of skilled labor supply and demand on the quality of
computing products
-
Pricing strategies in the computing domain
-
Differences in access to computing resources and the possible
effects thereof
The links on this page will open in a new browser window. Links
marked with “PDF” are files made via Portable Document Format. You
may need to
download the latest version of Adobe Reader in order to read
these files.
The Internet Economy Indicators
www.internetindicators.com
This is the fourth report measuring the Internet
economy commissioned by Cisco Systems and covers the first half of
2000. It shows that the Internet is transforming the economy and
the way people work, to an extent that few people would have
imagined just a few years ago.
Technology and Economic Growth in the
Information Age
www.ncpa.org/bg/bg147/bg147.html
This is an interesting economic forecast published in March 1998
by the National Center for Policy Analysis in the US. It can be
used as a comparative study.
Economics of Information Technology
www.sims.berkeley.edu/~hal/Papers/mattioli/mattioli.html
This is an overview of economic phenomena that are important for
high-technology industries. Topics covered include personalization
of products and prices, versioning, bundling, switching costs,
lock-in, economies of scale, network effects, standards, and
systems effects.
Are Computers Increasing Productivity?
(PDF)
www.crito.uci.edu/itr/publications/pdf/COMPUTERS-BOOSTING-PROD.PDF
This 1999 US study focuses on the economic impacts of IT
investment in state governments. It addresses the obstacles of
realizing the potential of IT investment.
Computers, Obsolescence, and Productivity
(PDF)
www.federalreserve.gov/pubs/feds/2000/200006/200006pap.pdf
This paper, published in February 2000, shows that increased
productivity in the computer-producing sector and the effect of
investment in computers on the productivity of those who use them
together account for the acceleration in U.S. labor productivity.
The Economics of Electronic Commerce (PDF)
www.combinet.net/ecomrept/CHOGMReportR1.PDF
This report, published by the Commonwealth Secretariat in 2000,
discusses the growing importance of electronic commerce in trade
and the developmental implications of the use of cyberspace for
commercial and financial transactions.
National Center For Policy Analysis -
Economic Issues and Productivity
www.ncpa.org/iss/eco/i_productivity.html
This web site has many great articles about productivity and the
effect of technology on the economy.
Computerworld.com
www.computerworld.com/news/
This US-based computer electronic newspaper is a good source for
current news commentary.
ComputerWeekly.com
www.computerweekly.co.uk
This UK-based computer electronic newspaper is a good source for
current news commentary.
Center for Research in Electronic Commerce,
University of Texas
cism.bus.utexas.edu
This research center describes as: “CREC, at the heart of the
Silicon Hills of Austin, is today’s leading research center in
electronic commerce, digital economy and information technology,
in close collaboration with industry and business leaders.” This
site contains a range of reports and other resources.
What is a Monopoly?
www.justaskjames.com/answers/default.asp?QID=283
A basic definition
National Center for Policy Analysis –
Antitrust
www.ncpa.org/iss/ant/
This contains many articles about anti-trust issues.
The Danger of Corporate Monopolies
www.cse.stanford.edu/classes/cs201/projects-95-96/corporate-monopolies
Monopolies, by definition, strangle competition. How does one
quantify the harms of a software monopoly, whose market dominance
allows for valuable standardization, but whose power inflates the
price to consumers and prevents the birth of higher quality
competitors? This project tackles these questions and other issues
surrounding the advent of the computer corporate monopoly.
That’s Fighting Talk
www.guardian.co.uk/online/story/0,3605,970294,00.html
“ Our computer use is being threatened by a wild west-style land
grab that only the rich giants can win,” argue Richard Stallman
and Nick Hill. “Software patents will lead to job losses, higher
prices, and less choice.” The Guardian, UK, 5 June 2003
Articles About Microsoft
dmoz.org/Society/Issues/Business/Allegedly_Unethical_Firms/Microsoft/
This page from the Open Directory Project provides a broad range
of concerns about the actions of Microsoft.
Is Microsoft Bad?
www.redherring.com/mag/issue51/bad.html
This article defends the actions of Microsoft.
Government and Monopolies: A Libertarian
View
fare.tunes.org/liberty/microsoft_monopoly.html
This article takes a radical libertarian stance about Microsoft
and government, and – more generally – about monopolies. The
authors explain how the original “evil” behind Microsoft’s
monopoly is government intervention in the form of intellectual
property privileges, and how any solution should begin by ending
these privileges.
The Supply of Information Technology
Workers in the United States
www.cra.org/reports/wits/exec_summary.html
This study was published by the Computer Research Association in
2000. The purpose of the study was to improve understanding of the
supply of and demand for information technology (IT) workers in
the United States, and the surrounding contextual issues.
The E-Economy in Europe: Its Challenges for
Education and Skills (PDF)
europa.eu.int/comm/enterprise/events/e-economy/doc/skills_paper.pdf
An overview of the skills shortage in Europe in 2001.
The IT Worker Shortage
www.sireview.com/articles/itworkershortage.html
Published in 2001, Jeff Reeder explains that many recent surveys
and research suggest that the information technology worker
shortage is limiting the economic growth of not just the IT sector
but the economy in general.
Information Technology Landscape in Nations
www.american.edu/academic.depts/ksb/mogit/country.html
This site is a database of knowledge about information and
communication technologies in various nations.
Pricing Strategies for Digital Information
Goods and Online Service on the Internet
www.mba.ntu.edu.tw/~jtchiang/StrategyEC/eec/report1/report1.htm
This paper discusses a pricing model for both suppliers and
customers of firms that offer digital products over the Internet.
Pricing Strategies
www.euro-share.com/pricing.asp
An article about software pricing by Jeff Camino or North Star
Solutions published in 2000.
High Technology Industries and Market
Structure
www.sims.berkeley.edu/~hal/Papers/structure/
This is a 2001 review of various economic phenomenon that are
important in high-technology industries, such as personalization
of products and pricing, versioning, bundling, switching costs,
lock-in, economics of scale, network effects, complements and
computer-mediated contracts.
One-to-One Pricing in the New Economy
www.easton-consult.com/one-to-one_pricing_in_the_new_economy.htm
This is a brief overview of how some sellers and buyers are
beginning to use e-commerce enabled pricing to their advantage.
Self-Selection Strategies for Information
Goods
www.firstmonday.dk/issues/issue7_3/dedeke/
This 2002 paper describes the basics concepts of first-degree,
second- and third-degree price discrimination.
New Connections, Old Exclusions: Ethnic
Minorities in Ireland’s Information Society (Text)
www.lse.ac.uk/collections/EMTEL/Conference/papers/Ugba.doc
This paper, from the 2003 EMTEL conference, argues that a new
information economy and network society has emerged in Ireland and
that access to ICT is critical for the inclusion of the country’s
marginalized immigrant and ethnic minority groups in this new
society.
Bridging Cultural and Digital Divides:
Signifying Everyday Life, Cultural Diversity and Participation in
the On-line Community Video Nation (PDF)
www.lse.ac.uk/collections/EMTEL/Conference/papers/carpentier.pdf
This paper, from the 2003 EMTEL conference, considers the digital
divide from a broad scope, focusing on the abilities of ICT to
stimulate access, interaction and participation.
Digital Opportunity Channel
www.digitalopportunity.org/guides/basics/
This is a collection of links to organizations and groups active
in trying to overcome this digital divide, and their introduction
to areas and issues of ICT access that may further understanding
on the basics of this global issue.
Emerging Social Gaps
www.pbs.org/digitaldivide/
This site addresses the role computers play in widening social
gaps throughout our society, particularly among young people.
Digital Divide Solutions
www.asu.edu/DigitalDivideSolutions/
This web site is dedicated to providing useful, relevant
information about the digital divide, and how to address it, to
interested individuals and organizations.
*****************************************
KIMBLE
http://www-users.cs.york.ac.uk/~kimble/teaching/cis/cis4.html
The Information Revolution
and Social Change
The
previous section dealt with the relationship between
technology and society from a historical perspective. This section
will deal with the same relationship from the perspective of
'Futurists' such as Alvin Toffler.
Aims and objectives.
The objective of this section are you will be able to
characterize the nature of the information revolution and can
critically evaluate the view that this is the engine that drives
wider changes in society.
You might like to begin by looking at a set of
lectures
on the information society by Daniel Chandler and Ewan
Sutherland as a broad introduction to the features of the
"Information Revolution". A good starting point for the utopian
view of the emergent information society is
A Magna Carta for the
Electronic Age by Toffler and
Cyberspace and the
American Dream.
Toffler et al describe three waves of technologically lead
revolutions and argue that we are "... living on the edge of the
Third Wave" that will have "... profound implications for the
nature and meaning of property, of the marketplace, of community
and of individual freedom. As it emerges, it shapes new codes of
behavior that move each organism and institution -- family,
neighborhood, church group, company, government, nation --
inexorably beyond standardization and centralization, as well as
beyond the materialist's obsession with energy, money and
control."
As an alternative, you might like to read
The Promise and Peril of the Third Wave by Carl Davidson, Ivan
Handler and Jerry Harris. They argue that "The advent of the third
wave is by no means a twinkling, pain less shift into a utopian
wonderland. It is more like a hurricane, leaving disorder and
destruction in its wake." You might also look at a
critique of the
Magna Carta for the Electronic Age in
feedmag.
The material in this section is also dealt with in the section
on
The Information Revolution from the
MIS course. Finally, this section will form the basis for the
evaluation of "IT and work" and "IT and society" that form the
remainder of the course (see
course overview).
Required Reading:
-
IT(1) - Information Technology: Social Issues. A Reader. Ed.
Finnegan. R, Salaman. G and Thompson. K., The Open University/Hodder
and Stoughton., 1994.
-
IT(2) - Information Technology and Society. A Reader. Ed
Heap. N., Thomas. R., Einon. G. and MacKay. H., The Open
University/Sage, 1994.
-
What is Computer Ethics? J. H. Moor. Metaphilosophy 16(4),
October 1985, pp 266 - 275.
-
P+C - People and Chips, Rowe. C and Thompson. J, Mcgraw
Hill, 1996
-
SIT - Chaps 1 to 4 in Social Issues in Technology, Alcorn.
P. Prentice Hall, 1997. pp 3 - 85.
-
Bell. D. The Coming of the Post Industrial Society: A
Venture in Social Forecasting. Heinemann, 1974.
-
Bell. D. The Social Framework of the Information Society
in The microelectronics revolution., Ed T.
Forrester., Basil Blackwell, 1980.
-
Ellul. J. The Technological Society, Random House, 1964
-
Featherstone. M. Global Culture: Nationalism, Globalisation
and Modernity, Sage, 1994.
-
Archer. M.S. Theory, Culture and Post-Industrial Society,
pp. 97 - 120
-
Touraine. The Idea of a revolution, pp. 121 - 142
-
Hi-tech society: The story of the information technology
revolution., Forester T., Basil Blackwell, 1982.
-
Hiltz. S.R. and Turoff. M. The Network Nation: Human
Communication via Computer. Cambridge, MA: The MIT Press, 1978
and 1993.
-
Lyon. D. From Post Industrialism to Information Society: a
New social Transformation?, Sociology, 20(4), 1986, pp 577 -
588.
-
Naisbitt. J. Re-inventing the corporation: transforming your
job and your company for the new information society. Macdonald,
1986.
-
Naisbitt. J. Megatrends: ten new directions transforming our
lives. Macdonald, 1984.
-
Toffler. A. The Futurists, Random House 1972.
-
Toffler. A. The Third Wave. Pan, 1980.
-
IT(1) - Information Technology: Social Issues. A Reader. Ed.
Finnegan. R, Salaman. G and Thompson. K., The Open University/Hodder
and Stoughton., 1994.
-
Chap 1, The case for Technological Determinism, C.
Freeman, pp 5- 18.
-
Chap 4, Value conflicts and Social Choice in Electronic
Payment Systems, R. Kling, pp 38 - 57.
-
IT(2) - Information Technology and Society. A Reader. Ed
Heap. N., Thomas. R., Einon. G. and MacKay. H., The Open
University/Sage, 1994.
-
-
Part 1 - Introduction, R. Thomas. pp 11 -14.
-
The Social Shaping of Technology, D. Edge, pp. 14 - 33.
-
Theorising the IT/Society Relationship, H. MacKay, pp. 41
- 54
-
A Gendered Socio-Technical Construction: The Smart House,
Ann-Jorunn Berg, pp 74 - 90.
-
SIT - Chaps 6 to 10 in Social Issues in Technology, Alcorn.
P. Prentice Hall, 1997. pp 111 - 185.
-
Bijker. N.E., Hughes. T.P. and Pinch. T.J. (Eds), The social
construction of Technological Systems, MIT Press, 1987.
-
Hirschheim. R. and Klein. H. Four paradigms of information
system development, Communications of the ACM. Vol. 32, no 10
(1989) pp 1199 - 1216.
-
Kling. R and Iacono. S., Computing as an Occasion for Social
Control. Journal of Social Issues, 40, 3 (1984), pp 77-96.
-
Buchanan D and Boddy D, "Organisations in the Computer Age:
Technological Imperatives and Strategic Choice", 1983, Gower.
-
Child, J. (1972), Organisational Structure, Environment and
Performance: The Role of Strategic Choice, Sociology Vol 6, No
1, pp 1-22.
-
De Greene KB, Long wave cycles of sociotechnical change and
innovation: A macropsychological perspective, Journal of
Occupational Psychology, 1988, vol 61, pp. 7-23.
-
Orlikowski. W.J, The Duality of Technology: rethinking the
concept of technology in organisations. Organisation Science.
3(3), 1992. pp. 398 - 427.
-
Kling R. and Scacchi. W. The web of computing: Computer
Technology as Social Organisation. Advances in Computers, Vol
21, 1982. pp 2 - 89 .
-
*************************************************************************
KIMBLE
http://www-users.cs.york.ac.uk/~kimble/teaching/cis/cis4.html
Aims and objectives
The aim of this section of the course is to explore in greater
depth the controversy as to how far technology does, or does not,
condition social change. A useful starting point for these
discussions would be
Engagement with
media: Shaping and Being Shaped and
Technological or Media Determinism by Daniel Chandler.
For some practical examples of the 'impact' of computer based
technology on organisations, see:
Computer Based Information Systems and Managers' Work (.PDF
File). For further background to this article, click
here. Finally, some web links that
you may find useful are given below.
Overview/Summary
Early research assumed technology to be an objective, external
force that had deterministic impacts on organisational properties
such as structure. Later studies focused upon the human aspect of
technology and focused on strategic choice models and social
action. Despite years of investigative effort, definition and
measurement, there is little or no compelling evidence for the
role of technology in organisational affairs. Two aspects of
technology are identified in this topic - scope and role.
Scope
The lectures will discuss two views that reflect claims to
generalisability.
-
The first conceptualises technology as hardware, i.e. the
equipment, machines and instruments humans use in productive
(either physical or informational) processes. These have lead to
either context dependent definitions of the scope of technology,
as the range of hardware across industries and organisations
differ, or broad definitions that have little informational
value.
-
These problems lead some researchers to develop a second
view of technology as "social technologies". Tasks, technique
and knowledge are bound together in a single construct, e.g. "tecnik".
This attempt to broaden the definition of technologies to
include "social technologies" however has lead to boundary and
measurement ambiguity. It also tends to ignore or undervalue the
possibility of interaction between different elements and the
effects of human mediation in the ways in which a technology can
be used.
Role
The lectures will then discuss three theoretical frameworks
that reflect philosophical viewpoints.
The first (technological imperative model) views technology as
an objective, external force that had deterministic impacts on
organisational properties. The second (strategic choice model)
focused on the human action aspect of technology and saw
technology as a product of shared interpretations or
interventions. The third (Technology as a trigger for structural
change model) puts forward a soft deterministic viewpoint that
argues that technology is a relatively objective, external force
but that the impacts on organisational properties are moderated by
human actions and the contingencies of organisational context.
-
The technological imperative model. The technological
imperative model examines the impact of a technology upon
organisational dimensions such as structure, size, performance,
degree of centralisation as well as more individualistic
dimensions such as job satisfaction, task complexity, skill
levels, productivity, etc. It posits that technology exerts an
independent, uni-directional and causal influence over humans
and organisations similar in nature to the laws of physical
sciences. A "softer" version of the technological determinist
model allows for the influence of the technology to be mediated
by contextual variables.
-
The strategic choice model. The strategic choice model does
not view technology as an external object but as an intentional
product of human actions, design and appropriation. Three
research foci are discernible.
-
The Socio-Technical Perspective. Here the focus is on how
the technology is physically constructed thorough the choices
and decisions made by human actors. Technology is not
immutable but is a dependent variable contingent on other
forces in the organisation, most notably powerful
organisational actors. The Socio-Technical school argues that
outcome such as job satisfaction or productivity can be
manipulated by jointly optimising the fit between social and
technical factors. These analyses tend to assume that once a
technology has been designed to optimise the socio-technical
fit a "better" performance will inevitably result.
-
The social Constructionist perspective. Here the focus is
on how the shared interpretations of the meaning of a certain
technology arise and affect the development of and interaction
with that technology. While this perspective can be useful in
examining how the meaning of a technology is created and
sustained, it inevitably underplays the material and
structural aspects of the technology.
-
The Marxian Perspective. In this case the focus is on the
manner in which a technology is deployed to further the
political and economic interests of powerful groups of social
actors. The concern is with the social construction of
technology at the point of initiation rather than at the point
of use. Managers and/or designers are portrayed as having the
authority and ability to shape the technology whereas the
users and workers are portrayed as being relatively powerless.
-
Technology as a trigger for structural change. This
perspective portrays technology as an intervention into the
relationship between human agency and organisational structure.
Technology can trigger a structural change by altering
institutionalised roles and patterns of interaction. Technology
does exert an influence on organisational structure but the
precise outcome depends on the specific historical processes in
which it is embedded. Thus technology is viewed as a social
object whose meaning, defined by the context of its use, may
change although its physical form remains fixed over time.
Building on the material in
previous topic the following areas will also be covered in the
lectures:
-
Models and frameworks
-
Technological determinist models
-
Four Social Choice models
-
Web models
-
Structuration Theory
Using material from the lectures, your reading and the web
sites your objectives should be to identify:
-
The different classes of models and frameworks that might be
used to describe/explain the "impact" of computer technology.
-
How these models/frameworks might be applied in different
circumstances.
-
The changes in the nature of society related to the growth
of IT.
-
The effect that IT might have on society.
-
The effect that society might have on the use of IT.
You should attempt to develop an understanding of the differing
perspectives covered in the lecture and your reading and how they
might be applied.
|
|
|
|
Political Change
The Information Revolution and Human Values
by Terrell Ward Bynum
Abstract -
Full Paper
The
ETHICOMP Journal Vol. 1 No. 1, published: 2004-02-02
Internet and
Impact on Life and Political Ideas
A Declaration of the Independence of Cyberspace by John Perry Barlow
A Declaration of the Independence of Cyberspace
John Perry Barlow
Coming into the Country
John Perry Barlow,
Is There a There in Cyberspace?
by John Perry Barlow
The
Virtual Community by
Howard Rheingold
Democracy and
its values: Autonomy- Privacy
the shape of politics and
democracy in the 'age of the internet'
Democracy
and Network Interconnectivity
Christopher R. Kedzie, RAND
Using Email and FaxModems as Tools for Social Change by Carl
Davidson, Networking for Democracy.
A Journal of Cybernetic Revolution, Sustainable Socialism &
Radical Democracy: Issue #1, July 1994
A Journal of Cybernetic Revolution, Sustainable Socialism &
Radical Democracy: Issue #2, March 1995
A Journal of Cybernetic Revolution, Sustainable Socialism &
Radical Democracy: Issue #3, September 1995
A Journal of Cybernetic Revolution, Sustainable Socialism and
Radical Democracy
Access Issues
Digital
Divide-economic-racial-sexual divides
Digital Divide Links -
University of Illinois Online Collection
of articles about digital divide
Falling through the Net
(summary, 2000), 4th installment of
the Dept of Commerce's
Digital Divide
reports
Bridges.org: "Spanning the International Digital Divide"
World Summit on the Information Society (WSIS)
Geneva
Declaration of Principles (especially Section B10) Declaration
of Principles: Building the Information Society: a global
challenge in the new Millennium
Issues resulting from the WSIS
Results CSPR
TUNIS COMMITMENT 2005
TUNIS AGENDA FOR THE INFORMATION SOCIETY
Internet: "Far-reaching Instrument of Development and Peace"
by Archbishop John Foley, president of the Pontifical Council for
Social Communications, at the U.N. World Summit on the Information
Society
Regulation of
the Internet
National
Commons and Code Lawrence Lessig
The Constitution in Cyberspace (Laurence Tribe, 1991)
And How Shall the Net Be Governed? David R.
Johnson and David G. Post,
International
Global Information Ethics
Institute for Global Ethics
nonsectarian, nonpartisan, global research and educational
membership organization. Promotes ethical behavior in individuals,
institutions, and nations through research, public discourse, and
practical action
Hobbes’ Internet
Timeline [Copyright © 1993–2003 by Robert H. Zakon]
This is a rich and useful timeline on the history of the Internet,
with many links to other related materials.
Nerds 2.0.1 – A
Brief History of the Internet This is a web site associated with the PBS (Public Broadcasting
Service) TV series on the history of the Internet entitled “Nerds
2.0.1 – A Brief History of the Internet.”
A Brief History
of the Internet In this history, which appears on the web site of the Internet
Society, several of the people involved in the development and
evolution of the Internet share their views of its origins and
history.
[Very, Very]
Brief History of the Internet and Related Networks This is a sketch of Internet history by Vint Cerf. It also appears
on the web site of the Internet Society.
Law:
General
The Law of the Horse: What Cyberlaw Might Teach Larry Lessig,
ANNUAL REVIEW OF LAW AND TECHNOLOGY: FOREWORD
Cathy E. Cretsinger & Peter S. Menell,
How to Govern Cyberspace: Frontier Justice or Legal Precedent?
GLOBALIZATION
The Cyber Rights Working Group, Computer Professionals for
Social Responsibility
The Global Culture of Digital Technology and Its Ethics,” an
abstract of a paper by Krystyna Gorniak-Kocikowska
The Internet Society
– an international organization for global
cooperation
UNESCO’s
Info-Ethics Program, The United NationsThe Vatican Pontifical Council for Social Communications paper
"Ethics in Internet"
http://www.vatican.va/roman_curia/pontifical_councils/pccs/documents/rc_pc_pccs_doc_20020228_ethics-internet_en.html
Publications
Some useful places to look information from the Institute for
Development Policy and Management at The University of
Manchester
Knowledge Facts, Knowledge Fiction
What happens when corporate knowledge management monoculture
meets the diverse international development sector? This paper
finds that development agencies have too readily adopted
approaches from the Northern corporate sector that are
inappropriate to development needs.
North-South inequalities
Chapter 3 of Education Now: Break the Cycle of Poverty by Oxfam
Exclusion and Poverty in Developing Countries
by Alice N. Sindzingre, Centre National de la Recherche
Scientifique (CNRS), Paris, France
Inequality in women's access to and participation in all
communications systems
This is part of a "Draft Platform for Action" drawn up by the
Fourth World Conference on Women hosted by the United Nations in
Beijing, China in September 1995.
Information Communication Technologies for women's equality:
Access and Empowerment issues - an NGO perspective
By Sarita Ranchod, Women'sNet Project Manager
Forsaken
Geographies: Cyberspace and the New World 'Other'
From poet, artist and art historian Olu Oguibe.
Technology
vs. Human Development: Brazil, 1996
From Brazilian journalist Mario Ibraim Salimon.
Public access to the Internet: American Indian and Native
Alaskan issues
A historical and sociological discussion by George Baldwin about
emerging networks used by American Indian people and tribal
organizations.
Electronic Journal for
Information Systems In Developing Countries
which emerged from IFIP
9.4 - dedicated to research and action in the social issues
of informatics in the Third World.
Internet Governanceat
CSPR Internet governance encompasses a wide range of issues and
organizations relating to the governing, financing and control
of the Internet and its protocols. CPSR has been involved in
Internet Governance issues for years, including current
participation in the World Summit on the Information Society (WSIS)
process and the Internet Corporation for Assigned Names and
Numbers (ICANN)
**********************************************
KIMBLE
http://www-users.cs.york.ac.uk/~kimble/teaching/cis/cis5.html
The North vs South debate - Issues of Access and Inequality.
Aims and objectives.
The aim of this section of the course is to explore the reality
behind the idea of the "global village" put forward by the those
who argue that the world is in the throes of an "Information
Revolution".
Below are a list of web links to the
area. You might also like to look at an unpublished
discussion paper on Component-Based Software Engineering for
Developing Countries: Promises and Possibilities by Douglas Kunda
and Laurence Brooks from the
MIS Group at York.
Overview/Summary.
This lecture will present material related to the spread of
information systems throughout society. Several views will be
discussed each of which could be analysed using the
models/frameworks described in
previous section. The focus of the lecture will be on the
issues of access to sources of information and inequality These
will initially be addressed from the viewpoint of the North vs
South (1st World vs 3rd World) debate and then widened to consider
issues of access and inequality within the so called "developed
world". The material covered in this section will include:
- Diffusion models that appear, at their most basic, to put
forward the idea that the real problem is one of access to the
technology, e.g. the work of Palvia et
al and Watson et al could be seen as
providing evidence to support this view.
- Technology transfer models that appear to suggest that the
underlying problem is on of the choices made by the
nations that develop and manufacture the technology, e.g. the
work of Bessant and
Jayaweera might be seen as supporting this viewpoint.
- Political models that put forward a rather more complex view
that suggests that the problem does not lie simply with access
to technology or in the tactics of the developed nations but in
the web of the internal politics of the countries
themselves, e.g. Oguibe and
Salimon might be seen as supporting this
view.
- Models that suggest that the North vs South (1st World vs
3rd World) division is too simplistic and that even within the
so called "developed world" there are issues of access and
inequality that need to be addressed, e.g.
Silverstone ,
MacKay and Huff and Finholt
provide material to back up this viewpoint.
- Finally, material such as that by Baldwin
approach the topic from a less deterministic viewpoint
and suggest that the way in which technology is used is can
change and evolve over time.
Using material from the lectures, your reading and the web
sites your objectives should be to identify:
- The various dimensions to access and inequality described in
the literature, e.g. 1st World vs 3rd World, rich vs poor, etc.
- How the different models/frameworks covered
earlier might be applied.
- What the implications of your findings might be for the
groups concerned.
Printed Texts:
- IT(1) - Information Technology: Social Issues. A Reader. Ed.
Finnegan. R, Salaman. G and Thompson. K., The Open University/Hodder
and Stoughton., 1994.
- Chap 8, Telecommunication: Policy and Directions for the
Technology and Information Services, W. H. Melody, pp 114 -
130.
- Chap 11, Information Technology and the North South
Divide, J. Bessant, pp 163 - 181.
- Chap 13, Communications Satellites: A Third World
Perspective, N. D. Jayaweera, pp 193 - 195.
- IT(2) - Information Technology and Society. A Reader. Ed
Heap. N., Thomas. R., Einon. G. and MacKay. H., The Open
University/Sage, 1994.
- The patterns of Ownership of IT devices, H. MacKay, pp.
311 - 341.
- SIC -Chap 10 in Social Issues in Computing, Huff. C
and Finholt. T, McGraw Hill, 1994, pp 351 - 414
- Chapter 1 - P. Palvia, P Shailendra and R. Zigli, Global
Information Technology Environment: Key MIS Issues in Advanced
and Less Developed Nations in P. Palvia, P Shailendra and R.
Zigli (Eds), The Global Issues of Information Technology
Management, Idea Group Publishing, 1992.
- Chapter 6 - R. Watson and J. Brancheau, Key Issues in
Information Systems Management: An International Perspective.
in Information Systems Research, (Ed) R. Galliers, Alfred
Waller Ltd, 1992.
- R. Silverstone. Future imperfect: Media, Information and the
Millennium. PICT Policy Research Paper No. 27, PICT, 1994
-
"Advanced
Information Technology and Political Communication," David L.
Paletz (Cyberethics, 285-287)
-
"Better Democracy
through Technology," Brock N. Meeks (Cyberethics, 288-294)
-
"Is the Global
Information Infrastructure a Democratic Technology," Deborah G.
Johnson (Cyberethics, 304-318)
- "Cyberlibertarian
Myths and the Prospects for Community," Langdon Winner (Cyberethics,
319-331)
-
"Liberty and
Community Online," Barry Fagin (Cyberethics, 332-352)
- US v.
Morris OR US v.
Alkabaz OR
Arizona v. Evans.
Editors’ Introduction to Global Information
Ethics (pages 316–318)
-
What is Moor’s influential definition of the field of computer
ethics?
-
According to Krystyna Górniak, the Internet has made possible an
activity that could never have occurred before. What is this
activity and why is it important?
-
There are many thousands of laws around the globe – national
laws, state laws, local laws. Each law has a specific
jurisdiction where it applies. How has the Internet generated
juristictional “policy vacuums” that are relevant to the field
of computer ethics? Explain in general, then give a specific
example.
-
How does the Internet raise questions about offending someone?
Give an example.
-
How does “cyberbusiness” on the Internet raise questions about
whose laws to enforce? Give an example.
-
What is “new colonialism” and how might the Internet contribute
to its existence and success?
-
What is “cyber medicine” and what are some of the social and
ethical questions that cyber medicine generates?
-
What are some of the policy vacuums and global questions
generated by education activities in cyberspace?
What are some of the democracy and human rights questions raised
by “cyber education” (in the broadest sense of this
term)? |
|
Artificial Intelligence
General AI
Artificial Intelligence: A Light Approach references by
Luciano Floridi
sections on
General Resources
The Philosophy of AI
Turing and His Test
Testing and Debugging
Genetic Algorithms
Computer
Chess and Draughts/Checkers
Fuzzy Logic
Neural Networks
Connectionism
Parallel Computing
(Computational)
Complexity
Quantum Computing
Expert Systems, Knowledge Engineering and Formal Ontologies
Robotics, Cybernetics and Artificial Agents
Artificial Life
Minds and Machines Major Resource site by Peter
Suber
What is Artificial Intelligence? An essay by John McCarthy, a
founder of the field.
Cognitive Science, from the Stanford Encyclopedia of
Philosophy.
Artificial Intelligence, from Grolier Multimedia Encyclopedia,
1993.
Philosophy of Artificial Intelligence Resources
by Selmer Bringsjord
Chess Is Too Easy. An essay by Selmer Bringsjord.
Computing, Machinery, and Intelligence. Alan Turing's classic
essay.
Conscious Machines. An essay by Marvin Minsky.
Daniel
Dennett's Online Papers
The
Further Exploits of AARON, Painter. An illustrated essay by
Harold Cohen on AARON, his software painter. One of the few
attempts to harness artificial intelligence to the tasks of art.
Minds, Machines,
and Gödel. An essay by J.R. Lucas.
Philosophy and Cognitive Science. An essay by Serge Sharoff.
Technological Singularity. An essay by Vernor Vinge. Ignore
the preface by John Klett.
Thinking Computers and Virtual Persons. A new anthology of
essays on AI (and against Searle's Chinese Room argument), edited
by Eric Dietrich. The site contains a table of contents and
abstracts of the essays.
Robotics
Watch video
(recommended) or read transcript of the listed presentations
from 2000 conference, Will Spiritual Robots Replace Humanity
by 2100? http://technetcast.ddj.com/tnc_program.html?program_id=82
01.
Douglas Hofstadter
Professor of Cognitive Science at Indiana, Author, Gödel,
Escher, Bach
http://technetcast.ddj.com/tnc_play_stream.html?stream_id=256
02.
Ray Kurzweil
Author, The Age of Spiritual Machines.
http://technetcast.ddj.com/tnc_play_stream.html?stream_id=257
03.
Bill Joy Co-Founder, Chief Scientist, Sun Microsystems
http://technetcast.ddj.com/tnc_play_stream.html?stream_id=258
04.
Hans Moravec (from 7:01 to end)
Pioneer of mobile robot research, Author, Robot: Mere Machine to
Transcendent Mind.
http://technetcast.ddj.com/tnc_play_stream.html?stream_id=259
05.
John Holland
Inventor of genetic algorithms, artificial-life pioneer; Professor
of CS and Psychology at the U. of Michigan.
http://technetcast.ddj.com/tnc_play_stream.html?stream_id=266
06.
Kevin Kelly
Editor-At-Large, Wired, Author, Out of Control, a
study of bio-technological hybrids.
http://technetcast.ddj.com/tnc_play_stream.html?stream_id=267
07.
Frank Drake Chairman of the Board of Trustees, SETI Institute
http://technetcast.ddj.com/tnc_play_stream.html?stream_id=268
08.
Ralph Merkle Principal
Fellow, Zyvex, LLC, Recipient, 1998 Feynman Prize in
Nanotechnology for Theoretical Work
http://technetcast.ddj.com/tnc_play_stream.html?stream_id=269
09.
John Koza
Consulting Professor (Medical Informatics), Stanford University.
Inventor of genetic programming.
http://technetcast.ddj.com/tnc_play_stream.html?stream_id=270
10.
Panel Discussion
http://technetcast.ddj.com/tnc_play_stream.html?stream_id=271
11.
Audience Q&A
http://technetcast.ddj.com/tnc_play_stream.html?stream_id=273
Online papers on consciousness
The Structure of Cognition
Consciousness and Common Sense
SCIENCE'S LAST FRONTIERS: Consciousness, Life and Meaning
Godel's Theorems
Peter Suber, "Gödel's Proof"
Searle's Chinese Box
Peek at new book: ROBOT by Hans Moravec
Kismet: A Sociable Robot
Starlogo: Programmable modelling environment
Kismet: A Sociable Robot
KurzweilAI.Net
The Singularity
Vernor Vinge,
"Within
thirty years, we will have the technological means to create
superhuman intelligence. Shortly after, the human era will be
ended."
The Law of Accelerating Returns
Raymond
Kurzweil,
"What
Are We Thinking About?" Shirley Turkle: (2000)
Why the future doesn't need us.
Bill Joy, Wired 8.04, April 2000
-
The Future According to Ray Kurzweil Salkever:
" (2000)
-
-
Why the Future Doesn't Need Us Joy: (2000)
-
-
Look Who's Talking Rheingold 1999
Assimilation of the Machine Mumford(1934)
Posthumanization
and Cyberspace
Watch
excerpts of PBS:
Beyond Human (2001)
Nanotechnology
NANOTECHNOLOGY Resource site
There's Plenty of Room at the Bottom (1959)
Richard Feynman,
Nanotech's Dark Side Debated in the Aftershock of Sept. 11
National Nanotechnology Initiative
Sense of Self and
Cyber space and AI
Cyberspace and the world we live in.in
Body and Society -
Cybersociety: computer-mediated
communication and community.
Psychology of Cyberspace - Gender Swapping and
Psychology of Cyberspace - Psychology of Avatars from John
Suler
Computers
and the Communication of Gender by Elizabeth Lane Lawley
Technologies of the Self by Alan Aycock
Identity and Deception in the Virtual Community by Judith
Donath
Identity and the Cyborg Body Chapter Three of Elizabeth Reid's thesis Cultural
Formations in Text-Based Virtual Realities
Construction of
the Discourse of Virtual Reality, 1984-1992 Colonizing Virtual Reality -
Will the Real Body Please Stand Up? by Rosanne Stone
Searle's Chinese
Room Argument against Strong-AI
Bibliographies on
Artificial Intelligence
http://liinwww.ira.uka.de/bibliography/Ai/index.html
Societies and Organizations
OFAI Library Information System Biblio, searchable database
containing data on books, research papers, conference papers,
journal articles from many subareas of Artificial Intelligence.
American Association for Artificial Intelligence.
MIT Artificial Intelligence
Laboratory.
Artificial Intelligence Research Laboratory at Iowa State
University. |
|
|
|
|
|
Course Evaluation |
|