Download presentation
Presentation is loading. Please wait.
Published byClaud Phillips Modified over 9 years ago
1
Readings in Cyberethics Notes from book by Spinello
2
Chapter One Cybertechnology, Ethical Concepts, and Methodological Frameworks: An Introduction to Cyberethics 1
3
Contents Privacy in Cyberspace Security and Crime in Cyberspace Professional Ethics, Codes of Conduct, and Computer/Information Professionals
4
Cyberethics The field of applied ethics that examines moral, legal, and social issues in the development and use of cybertechnology.
5
Cybertechnology Cybertechnology: the broad spectrum of technologies that range from stand-alone computers to the cluster of networked computing, information, and communication technologies.
6
Pioneers in Field Terrell Bynum -- applied ethics Deborah Johnson -- “new species” theory James Moore -- logical malleability (general purpose machines) gives rise to “vacuums.”
7
Terrell Byrnum “Ethics and the Information Revolution” History of cyberethics beginning with Norbert Weiner, 1940s Unique moral issues? Powerful technologies have profound social consequences
8
Deborah Johnson “Ethics Online” Unique ethical considerations: –Global and interactive scope of the Net –Anonymity –reproducibility
9
James Moore “What is Computer Ethics?” Multipurpose machine Vacuums –Laws and social policies –Conceptual frameworks and muddles
10
James Moore 4 steps –Identify any policy vacuums –Clarify conceptual muddles –Revise policies or formulate new ones –Justify them “routine ethics” not sufficient
11
Cyberethics methodology Brey’s “disclosive computer ethics” 3-levels –Disclosive –Theoretical –application
12
Rational Ethical Theory Consequences or duty Utilitarianism -- assess consequences of a policy -- advance the greatest good for the greatest number Deontological (duty-based) -- everyone is respected as an individual.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.