Wallace Patrick R Assignment 1
docx
keyboard_arrow_up
School
American Military University *
*We aren’t endorsed by this school
Course
481
Subject
Philosophy
Date
Feb 20, 2024
Type
docx
Pages
6
Uploaded by Mudain137
Name:
Date: ITMG481
Week 1 Assignment (3% of Grade)
APUS/Yocam
Lesson 1 Review: Cyberethics & Ethics
The purpose of this activity is to reinforce what you have learned so far about conduct and moral responsibility. 1. What, exactly, is cyberethics? How is it different from and like computer ethics, information ethics, and Internet ethics? (Minimum word count: 60)
Cyberethics refers to a branch of ethics that studies particularly computer networks, the internet, and digital technologies. To put it simply, cyberethics covers how someone should act and what behavior should be followed when using any computer. Things like Cyber bullying and ethical hackers would fall under what is and is not acceptable behavior when using a computer. (Geeks, 2022). As technology changes and more advancements are made every day, we will have to redefine our understanding of what is and is not acceptable. As an example, think about cyber bullying someone in 1960. You cannot because technology did not exist to do it. Cyberethics focuses on ethical issues related to computer networks, the internet, and different digital technologies. On the other hand, computer ethics, information ethics, and internet ethics have much broader scopes that look at several aspects of ethical implications. (Pacific, 2023). 2. What is meant by the term cybertechnology? How is it like and different from computer technology? (Minimum word count: 60)
Cybertechnology refers to “wide range of computing and communication devices, from stand-
alone computers to connected, or networked, computing and communication technologies.” (Tavani,
2023). It includes computer systems, networks, software, and digital devices. On the other hand, computer technology deals with the hardware and software that computers use to process data and information as well as execute tasks. Both terms are similar but cybertechnology focuses on how the digital system is interdependent while computer technology is about the technology itself. 3. What is applied ethics, and how is it different from theoretical ethics? (Minimum word count: 60)
Applied ethics involves the practical use of ethical theories and principles in real life situations and problems. It involves examining, assessing, and making ethical judgments using specific context. On the other hand, theoretical ethics is the total opposite compared to applied ethics. Theoretical ethics is more concerned with developing the ethical theories and frameworks that are then used during applied ethics. While theoretical ethics aims to establish a good foundation for ethics, applied ethics takes those theories and applies them. 4. Summarize the key elements of the perspective of cyberethics as a field of sociological/descriptive ethics (Minimum word count: 60)
Cyberethics from a sociological/descriptive standpoint digs into how people really behave when it comes to using technology ethically. This perspective really looks at the social, cultural, and psychological factors that influence people’s actions. It is like taking a closer look at the things that influence how we behave. Overall, this approach aims to understand and analyze the ethical dimensions
of cyberspace, considering its unique social context and the impact of technology on our moral choices and behavior.
5. What is moral objectivism, and how is it different from moral absolutism? (Minimum word count: 60)
Moral objectivism is an ethical stance that a person who questions what is right and wrong can learn moral truths regardless of what personal options or cultural norms say they are. Moral absolutism is the opposite of moral objectivism because it is an ethical theory that states that there are certain moral principles that are universal and cannot be changed. Things like taking a life to save another under
moral absolutism that would be murder regardless of the circumstances surrounding it.
6. How is Philip Brey’s “disclosive method” of computer ethics different from what Brey calls “main-
stream computer ethics”? (Minimum word count: 60)
Philip Brey proposed a new subfield of information ethics in 2000. The disclosive method of computer ethics is different from mainstream computer ethics in a few ways. Rather than telling people how they should act or behave to be ethical with technology like done by mainstream computer ethics. Its more focused on understanding ethical and “
on analyzing ethical issues in information driven atmospheres that pertain to perceived normative environments in technology.”
(Floridi, 2012).
7. Explain what Moor means by a “conceptual muddle”? How can these muddles sometimes complicate matters when trying to resolve policy vacuums? (Minimum word count: 60)
I believe Moor meant conceptual muddle as a state of confusion caused by unfamiliar concepts. Moor suggested that these “muddles” come up when trying to define new ethical issues that have come
from new technologies. I think a good example of this would be cars with self-driving features that fail. Who is liable the owner, manufacturer, or programmer. How does a self-driving car know what is ethical
in certain circumstances? Does it place the passenger’s safety over pedestrians or other vehicles? Policy vacuums happen when the existing ethical framework and regulations don’t cover or just don’t exist for dealing with the new technological challenges. Conceptual mudding can sometimes complicate things and hinder the creation or development of new policies.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
8. Identify and briefly describe some key aspects of each of the “four phases” in the evolution of cyberethics as a field of applied ethics. (Minimum word count: 60)
The evolution of cyberethics, according to our textbook Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing, can be divided into four phases. 1. In Phase One, computers were huge mainframes that took up an entire room, which raised ethical questions about the creation of what some people considered "giant brains." 2. In Phase Two, computers became smaller and personal computers became more common, connecting computers together to create private computer networks. This raised ethical issues regarding personal privacy, intellectual property, and computer crimes. 3. During Phase Three, the World Wide Web emerged and raised ethical concerns such as free speech, people's right to anonymity, and who had jurisdiction in cases of online crime. The rise of social networking sites such as Myspace, Facebook, and Instagram increased the amount of personal data available online, leading to disputes over what should be considered public vs. private when posted online. 4. Currently, in Phase Four, we are seeing the emergence of new technologies such as computers, cellphones, and AI, which are becoming increasingly embedded in our lives. This raises ethical questions about the impact they will have on human identity and privacy.
9. What alternative strategy does James Moor use to analyze the question whether cyberethics issues are unique ethical issues? (Minimum word count: 60)
James Moor took a different approach when considering whether or not cyberethics issues are unique ethical problems. He thought that since computers have advanced so far and can manage doing so much that it could create new opportunities for people. This could also cause ethical issues when there are no clear laws or guidelines on how to behave ethically. However, because of how fast technology evolves it can sometimes cause problems when creating new laws and rules surrounding this
new technology. Moor thought that we could use existing ethical principles to try and understand and maybe address cyberethics. 10. Why is it important to distinguish between unique technological features and unique ethical issues when evaluating the question, Are cyberethics issues unique? (Minimum word count: 60)
It is important to distinguish between unique technological features and unique ethical issues when evaluating the question, Are cyberethics issues unique? The fact is that technology is always evolving and it’s often evolving faster than we can handle. New technologies might have the newest features that that haven’t been seen or even thought of, they may not translate very well to unique ethical issues. By distinguishing between technological features and ethical issues, we can look at these issues with the ethical framework, principles, and theories that we have now.
References
Floridi, L. (2012). The Cambridge Handbook of Information and Computer Ethics. Cambridge University Press. Geeks, G. F. (2022, February 24). What is Cyberethics? GeeksforGeeks. https://www.geeksforgeeks.org/what-is-cyberethics/ Pacific, S. (2023). Subject guides: Information ethics: Information ethics. Information Ethics - Subject Guides at Seattle Pacific University. https://spu.libguides.com/infoethics Tavani, H. T. (2023). Ethics and technology: Controversies, questions, and strategies for ethical computing. John Wiley & Sons, Inc.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help