did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780763717674

Morality and Machines: Perspectives on Computer Ethics

by
  • ISBN13:

    9780763717674

  • ISBN10:

    0763717673

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2002-05-15
  • Publisher: Jones & Bartlett Learning

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $236.94 Save up to $59.23
  • Buy Used
    $177.71
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

This text helps students explore the wider field of computer ethics, including discussion of key topics such as privacy, software protection, artificial intelligence, workplace issues, virtual reality, and cybersex.

Author Biography

Stacey L. Edgar: State University of New York, Geneseo

Table of Contents

Preface v
Introduction 1(1)
Computer Ethics? 1(3)
Is There Really a Need for Ethics in Computing? 4(3)
Endnotes 7(1)
References and Recommended Readings 8(3)
PART ONE ETHICAL FOUNDATIONS 11(86)
Ethical Decision Making
13(20)
Making Moral Decisions
15(7)
Views on the Nature of Reason
22(4)
The Modern View of Reason
22(1)
The Ancient View of Reason
23(2)
Which View of Reason Is Correct?
25(1)
Endnotes
26(3)
Short Essay Questions
29(1)
Long Essay Questions
29(2)
References and Recommended Readings
31(2)
Is Ethics Possible?
33(22)
Some Bad Reasons for Saying Ethics Has No Basis
33(4)
Some More Thoughtful Defenses of Ethical Skepticism
37(9)
Coda
46(1)
Endnotes
46(4)
Short Essay Questions
50(1)
Long Essay Questions
51(1)
References and Recommended Readings
52(3)
The Search for a Basis for Ethics
55(42)
Ethical Egoism
56(2)
Pleasure- and Pain-Based Theories of Ethics
58(1)
Classical Utilitarianism
58(5)
Updated Utilitarianism
61(1)
Act Utilitarianism
61(1)
Rule Utilitarianism
62(1)
Cost-Benefit Analysis
62(1)
Intentions, Freedom, and Universality
63(7)
Stoicism
63(1)
The Theories of Immanuel Kant
64(2)
Imperatives
66(4)
Virtue Ethics
70(2)
The Form of the Good
72(6)
Plato and the Form of the Good
73(2)
G.E. Moore and the Indefinability of the Good
75(1)
Butchvarov and the Order of Goods
76(2)
Conclusion
78(3)
Approaching Ethical Analysis
79(2)
Endnotes
81(10)
Short Essay Questions
91(1)
Long Essay Questions
92(2)
References and Recommended Readings
94(3)
PART TWO ETHICS APPLIED TO A COMPUTERIZED WORLD 97(380)
Software Piracy, Property, and Protection
99(68)
A Brief History of Hardware
99(3)
A Brief History of Software
102(5)
Euclidean Algorithm for Greatest Common Divisor
106(1)
Software Piracy
107(10)
What Is Software Piracy?
107(10)
How Can Software Rights Be Protected?
117(37)
Arguments for Private Property
117(4)
Arguments against Private Property
121(1)
Intellectual Property
122(1)
Software Protection
123(1)
Trade Secrets
123(2)
Trademarks
125(1)
Copyrights
126(4)
Digital Millennium Copyright Act
130(1)
Licensing and Copyprotection
131(3)
Patents
134(13)
The Opposition to Legal Protection of Software
147(2)
What Is Reasonable and Fair?
149(5)
New Issues Raised by the Internet
154(2)
Endnotes
156(5)
Short Essay Questions
161(1)
Long Essay Questions
161(1)
References and Recommended Readings
162(5)
Computer Crime
167(34)
Kinds of Computer Crime
168(4)
Crimes against Computers
168(1)
Damage to Computers
168(4)
Crimes Using Computers
172(19)
Embezzlement by Computer
172(4)
Theft of Services
176(1)
Theft of Information
177(1)
Fraud
178(4)
Organized (``Mob'') Computer Crime
182(2)
Counterfeiting
184(3)
Computer Crime Victims
187(1)
Computer Criminals
188(1)
Computer Crime Stoppers
188(2)
Failure to Report Computer Crimes
190(1)
The European Cybercrime Treaty
190(1)
Observations
191(1)
Endnotes
191(5)
Short Essay Questions
196(1)
Long Essay Questions
197(1)
References and Recommended Readings
197(4)
Computer Intruders, Viruses, and All That
201(52)
More Ways to Steal Using Computers
201(6)
Thefts of Money
202(1)
Roundoff Errors
202(1)
The Salami Technique
203(1)
Rounded-Down Bank Interest
204(1)
Breaking In and Entering
204(1)
Phreaking Then and Now
204(2)
Tampering with Communication Signals
206(1)
A ``Hacker'' by Any Other Name
207(5)
The Original, ``Good'' Hackers
207(1)
The New Breed of Destructive Hackers
208(1)
Scanning
209(1)
Cracking Passwords
209(1)
Espionage
210(1)
Other Methods of Illegal Access
211(1)
Potentially Destructive Activities
212(17)
Vengeance Is the Computer's
212(1)
Trojan Horse
213(1)
The Christmas Tree Trojan Horse
213(1)
The Cookie Monster
213(1)
The ``Twelve Tricks Trojan'' Horse
214(1)
The AIDS Virus (Trojan Horse)
215(1)
The Burleson Blackmail
215(1)
Other ``Bombs''
216(1)
Worms
216(6)
More and More Worms
222(1)
Virus
223(2)
Brain Virus
225(1)
Lehigh Virus
225(1)
The Israeli Virus
225(1)
The Malta Disk Destroyer
226(1)
The Ping-Pong Virus
226(1)
The Datacrime Virus
226(1)
The Bulgarian Dark Avenger
226(1)
The Michelangelo Virus
227(1)
Macintosh Viruses
227(1)
The Health-Care Plan Virus
227(1)
Operation Moon Angel
228(1)
Kevin Mitnick
228(1)
Melissa Virus
228(1)
Chernobyl Virus
229(1)
The Love Bug
229(1)
Viruses Make It to the Big Screen
229(1)
Misuse of the (Electronic) Mail
229(3)
Is Hacking Moral, Value-Neutral, or Bad?
232(3)
Hacking as Civil Disobedience
234(1)
The Sorcerer's Apprentice
235(1)
What Is to Be Done?
236(5)
Endnotes
241(5)
Short Essay Questions
246(1)
Long Essay Questions
246(2)
References and Recommended Readings
248(5)
Privacy
253(40)
Why Is Privacy of Value?
254(2)
``I'll Be Watching You''
256(1)
Some Noteworthy Violations of Privacy Involving Computers
257(5)
A National Computerized Criminal History System?
262(2)
The FBI Wiretap Law
264(1)
The Clipper Chip Proposal
264(1)
Computerized Credit
265(2)
Caller ID
267(1)
Computer Matching
268(3)
How the Internet Complicates Privacy Considerations
271(3)
Cookies
272(1)
Communications Decency Act (CDA) and CDA II (COPA)
272(1)
Carnivore
273(1)
The Worst Scenario
274(2)
What Protections Are There for Privacy?
276(1)
Warren and Brandeis Make a Case for Privacy
277(2)
Existing Privacy Legislation
279(2)
The Importance of Privacy
281(2)
Endnotes
283(2)
Short Essay Questions
285(1)
Long Essay Questions
285(1)
References and Recommended Readings
286(7)
Errors and Reliability
293(30)
Errors
293(3)
Some Noteworthy Computer-Related Errors
296(12)
Defense
296(2)
Space Exploration
298(1)
Commercial Airlines
299(1)
Medical Risks
300(1)
Robot Errors and Robots as Threats
300(2)
Nuclear Energy Threats
302(1)
Computerized Translation
302(1)
Mistaken Identities
303(1)
Billing and Record-Keeping Errors
303(2)
Automatic Payments
305(1)
More ``Dead Souls in the Computer''
305(1)
Military Dangers
305(1)
``Surplus'' Computers Sold with Sensitive Information Still in Them
306(1)
Miscellaneous Computer-Related Errors
306(2)
Two More Software Fiascos
308(1)
Y2K Bugs
308(1)
Follow-up
308(1)
Reliability
308(6)
Program Verification
311(1)
Software Engineering
311(2)
Program Testing
313(1)
Structured Walkthroughs
313(1)
When All Is Said and Done
314(1)
Observation
314(1)
Endnotes
315(3)
Short Essay Questions
318(1)
Long Essay Questions
319(1)
References and Recommended Readings
320(3)
The Computer World of Work
323(52)
The Control Revolution
323(6)
Evolution of Systems
325(1)
Three Functions of DNA
326(1)
The Industrial Revolution Crisis of Control
327(1)
Data Processing and an Information Bureaucracy
328(1)
Information Theory and Communication
329(2)
Levels of Problems in Communication
330(1)
The Information Workplace
331(17)
Loss of Jobs, or Just Relocation?
335(3)
The End of Work?
338(1)
``Technostress''?
339(1)
``Technomalady''?
340(1)
Job Monitoring
341(2)
Women in the Computer Workplace
343(2)
Does Gender Matter in Computing?
345(2)
Increased Access for Disabled Workers
347(1)
Telecommuting
348(5)
Changing Job Panorama
352(1)
Employees and Employers
353(7)
Loyalty
353(3)
Whistle-Blowing
356(2)
Who Owns Your Ideas?
358(2)
Endnotes
360(6)
Short Essay Questions
366(1)
Long Essay Questions
367(1)
References and Recommended Readings
368(7)
Responsibility, Liability, Law, and Professional Ethics
375(24)
Responsibility
375(2)
Liability
377(3)
Computers and the Law
380(3)
Professional Ethics
383(2)
Professional Codes of Ethics
385(2)
What About Microsoft?
387(1)
Are Science and Technology Morally Neutral?
387(4)
Endnotes
391(1)
Short Essay Questions
392(1)
Long Essay Questions
392(2)
References and Recommended Readings
394(5)
Computers, the Government, and the Military
399(44)
Information and Power
399(1)
Big Government
400(10)
Record-Keeping and Surveillance
400(2)
Government Applications of Computers
402(1)
The National Security Agency
403(3)
Other Agency Restrictions on Freedoms
406(1)
Blame the Computer!
406(1)
Big Business Influences Big Government
407(2)
Environmental Impact of Computers
409(1)
Centralization Versus Decentralization of the Government
410(1)
The Information Superhighway
411(9)
Goals
411(1)
A Comparison of Concrete and Electronic Highways
412(1)
The Vision of the Government for NII
413(1)
Manufacturing and Commerce
414(1)
Health Care
414(1)
Education
414(2)
Environment
416(1)
Libraries
416(2)
Some Dissenting Voices
418(2)
Nuclear Threats
420(2)
Computers and Nuclear Power
421(1)
Computers and the Military
422(9)
Simulations
423(2)
``War Games''
425(1)
False Alarms
425(2)
``Star Wars'' by Any Other Name
427(4)
Endnotes
431(4)
Short Essay Questions
435(1)
Long Essay Questions
436(2)
References and Recommended Readings
438(5)
The Artificial Intelligensia and Virtual Worlds
443(34)
Artificial Intelligence-Some General Background
443(4)
Expert Systems
445(2)
Game-Playing
447(1)
Theorem-Proving
447(1)
The Turing Test
447(7)
The Imitation Game
449(1)
Objections
450(2)
ELIZA
452(1)
The Chinese Room
453(1)
Artificial Intelligence and Ethics
454(2)
Consciousness
456(1)
Kurzweil's ``Age of Spiritual Machines''
457(1)
Hawking's Perspective
457(1)
The Eco-Computer
457(1)
Cybersex
458(2)
Virtual Worlds
460(2)
Virtual Reality
462(2)
Endnotes
464(2)
Short Essay Questions
466(1)
Long Essay Questions
467(2)
References and Recommended Readings
469(8)
Appendix A 477(8)
Paper #1-Computer Ethics
477(1)
Computer Ethics Term Paper Topics
478(7)
Directions for Students
478(7)
Appendix B 485(10)
ACM Code of Ethics and Professional Conduct
485(1)
General Moral Imperatives
486(3)
More Specific Professional Responsibilities
489(3)
Organizational Leadership Imperatives
492(1)
Compliance with the Code
493(2)
Appendix C 495(2)
IEEE Code of Ethics
495(2)
Bibliography 497(10)
Index 507

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program