- Shopping Bag ( 0 items )
Divided into five sections, the volume begins with a definition of cyberethics. There is general agreement with James H. Moor's basic definition of the field as "the formulation and justification of policies for the ethical use of computers." Next the issues of anonymity and personal identity are considered. Computers provide individuals with a unique opportunity to create personae for the virtual world that are quite distinct from their normal identities. What are the moral dimensions of creating virtual personalities?
Perhaps the most pressing ethical issue is addressed in the next section on privacy. The ability of computers to store vast amounts of information on any individual raises the harrowing specter of a Big Brother society in the not-too-distant future. How should information be used and how might it be abused? What safeguards are needed to protect privacy as information technology becomes ever more sophisticated?
In the fourth section, questions concerning ownership of intellectual property and copyright law are considered. How can the rights of authorship be protected in the context of the internet?
Finally, the fifth section explores the debate now taking place regarding the impact of computers on democracy. Do computers offer new possibilities for enhancing democracy or will this prospect turn out to be a myth?
This is a much needed anthology of thought-provoking articles on the critical moral issues facing our "brave new world."
|Pt. 1||The Moral Landscape in Cyberspace||21|
|1||What Is Computer Ethics?||23|
|2||If Aristotle Were a Computing Professional||34|
|3||Does Computer Ethics Compute?||41|
|4||Ethics and the Computer World: A New Challenge For Philosophers||44|
|6||Narrative versus Logical Reasoning in Computer Ethics||73|
|7||Computer Ethics and Moral Methodology||80|
|Pt. 2||Anonymity in Cyberspace||95|
|8||Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference and Assessing Anonymous Communication on the Internet: Policy Deliberations||97|
|9||Who Am We?||129|
|10||The Artificial Intelligensia and Virtual Worlds||142|
|Pt. 3||Privacy in Cyberspace||153|
|11||Little Brother Is Watching You||155|
|12||The Erosion of Privacy?||162|
|13||The Demise of Privacy in a Private World: From Front Porches to Chat Rooms||171|
|14||Privacy and the Computer: Why We Need Privacy in the Information Society||188|
|15||Toward a Theory of Privacy in the Information Age||200|
|Pt. 4||Property Ownership in Cyberspace||213|
|16||Wild, Wild Web||215|
|17||Should Computer Programs Be Owned?||222|
|18||Mind over Matter||236|
|19||Protecting Intellectual Property in Cyberspace||243|
|20||Intellectual Property in Synchronous and Collaborative Virtual Space||257|
|Pt. 5||Communities, Citizenship, and Democracy||283|
|21||Advanced Information Technology and Political Communication||285|
|22||Better Democracy through Technology||288|
|23||A Nation of Strangers?||295|
|24||Is the Global Information Infrastructure a Democratic Technology?||304|
|25||Cyberlibertarian Myths and the Prospects for Community||319|
|26||Liberty and Community Online||332|