Computer Ethics
Monday, April 18, 2011
The more technology is updated the more of a chance our privacy is threatned. What new threats to privacy are likely to develop from new computer and Internet applications in the next five years? Include discussions on Smart-Phones, iPhone, iPad type devices, GPS-enabled vehicles etc.
›
The rapid increase of technology is also a rapid increase of threats to our privacy. As stated in the book “ Computers, the Internet...
Briefly list and explain the following (a) Right, wrong, and okay; (b) Distinguish wrong and harm; (c) Separating goals from constraints; (d) Personal preference and ethics; (e) Law and ethics.
›
Right, wrong, and okay “In situations with ethical dilemmas, there are often many options that are ethically acceptable, with no spec...
What does the term secondary use mean? Give an example.
›
Secondary use is “the use of personal information for a purpose other than the one for which it was supplied” (pg. 52). Some examples o...
Re-identification mean? Give an example.
›
As stated in the book “ Re-identification means identifying the individual from a set of anonymous data” (pg. 49). It is the process b...
Which kind of ethical theory, deontologist or consequentialist, works better for arguing that it is wrong to drive one's car on the left side of the road in a country where people normally drive on the right? Explain.
›
On one hand you have deontologists who follow the rules that are given no matter what. They are all f...
›
Home
View web version