1. What, exactly, is cyberethics? How is it different from and similar to computer ethics, information ethics, and Internet ethics?
· Cyberethics is the philosophic study of ethics
pertaining to computers, encompassing user behavior and what computers are
programmed to do, and how this affects individuals and society.
· is the study about of ethical, lawful, and
social issues including cybertechnology, whereas it is comparative to Data Morals, because
it bargains with get to to data, Cyberethics covers
more subjects than it, and influences more bunches and innovations.
· Computer ethics moreover bargains with
computers and every so often the Web, but it may be caught on as as
it were relating to stand-alone computers or to proficient IT subjects.
2.
What is meant by the term cybertechnology? How is it similar to
and different from computer technology?
· Cybertechnology
is the complete run of computing and communication frameworks,
from stand-alone computers to secretly claimed systems and
the Web itself.
· Computer Technology comprises of
a wide run of computing and communications gadgets.
3.
Identify and briefly describe some key aspects of each of the
“four phases” in the evolution of cyberethics as a field of applied ethics.
·
Phase
1 (50's and 60's) - Questions about "big brains," (can they "think,"
etc.). AI, "big brother"
·
Phase
2 (70's and 80's) - Emerging threats of hacking and theft of Intellectual property.
Software piracy, computer crime, communications privacy.
·
Phase
3 (90's - present) - Concerns about free speech, anonymity, legal jurisdiction,
behavioral norms in virtual communities.
·
Phase
4 (present - near-future) - ubiquitous computers. "Ambient intelligence," which
enables "smart objects" to connect to the Internet.
4.
Why does Walter Maner believe that at least some cyberethics
issues are unique? What arguments does he provide to support his view?
4.1
a few ethical issues did not exist some time
recently the approach of computing
4.2
these issues might not exist on the off chance that computer innovation hadn't been designed.
· He supports this by saying computers are interestingly quick, extraordinarily complex, and extraordinarily coded.
5.
Why is it important to distinguish between unique technological
features and unique ethical issues when evaluating the question, are cyber
ethics issues unique?
· Special innovative highlights may still apply
to customary morals. The moral issues may still be related
to common morals (piracy, stealing).
6.
What alternative strategy does James Moor use to analyze the
question whether cyberethics issues are unique ethical issues?
· He looks at conceivable "policy vacuums"
caused by cybertechnology, as well as the "conceptual muddles"
that emerge when finding arrangement.
· Since cybertechnology produces so numerous unused arrangement vacuums, Field accepts that
cyberethics does in fact create one of a kind moral issues.
7.
Why does Moor believe that cybertechnology poses special problems
for identifying and analyzing ethical issues?
·
Since of the endless amounts of policy vacuums
that it can produce.
8.
Explain what Moor means by the expression “logical malleability,”
and why he believes that this technological feature of computers is
significant.
·
Logical malleability - the capacity of
computers to perform a heap of errands. This permits computers
"unused conceivable outcomes for human activity,"
which can create numerous approach vacuums.
9.
What does Moor mean by the phrase “policy vacuum,” and what role
do these vacuums play in understanding cyberethics?
· Policy vacuums - issues that emerge when we have
no express arrangement for dealing with unused choices
made conceivable by computer innovation.
10.
Explain what Moor means by a “conceptual muddle”? How can these muddles
sometimes complicate matters when trying to resolve policy vacuums?
·
A "conceptual muddle" is an issue that emerges when
we first have to be clarify the concepts utilized some time
recently choosing a specific approach for that specific
concept. For case, when PCs first got to be prevalent, a
conceptual muddle that risen was the lawfulness of sharing
program alongside questions around copyrighting or licensing the program.
11.
What is applied ethics, and how is it different from theoretical
ethics?
·
The focus of applied ethics is more practical –
it needs to reach a commonsense judgement around what should to be
wiped out situation or what is the foremost coherent ethical see to require
towards a genuine issue, such as abortion or euthanasia
·
a commonsense judgment around what ought
to be wiped out situation or what is the foremost coherent moral see to
require towards a genuine issue, such as fetus removal or willful
extermination.
·
However, the “theoretical-applied” distinction is not absolute. It
is a matter of emphasis and interest. Any serious ethical thinking will include
practical and theoretical considerations.
12.
Summarize the principal aspects of the perspective of cyberethics
as a field of professional ethics.
·
As professional morals, cyberethics ought to as
it were concern issues of proficient obligation, not the broader and more
social suggestions of that innovation.
·
Examples: framework unwavering quality, codes of
conduct, "bugs," etc.
·
An older viewpoint that pre-dates the web
13.
Describe the principal aspects of the perspective of cyberethics
as a field of philosophical ethics.
·
As philosophical ethics, cyberethics ought to bargain with
the "investigation of the nature and social effect of
computer innovation and the comparing definition and
justification of arrangements for the moral utilize of
such innovation (Moor)"
14.
summarize the key elements of the perspective of cyberethics as a
field of sociological/descriptive ethics.
·
As sociological/descriptive ethics, cyberethics bargains with truths,
not the "shoulds," or disparity questions of philosophical and
proficient ethics.
15.
Describe the kinds of criteria used to distinguish normative
ethical inquiries from those that are essentially descriptive.
·
Normative
- Should we do this? Is this fair?
·
Descriptive
- what is empirically recognized