cmpsc 309 - Csmaster

advertisement
CMPSC 309
Study Guide for Final
Spring 2007
Your final exam is scheduled for Thursday, May 10 from 8-9:50AM. You will have all that time to devote
to it. Please make sure you arrive on time, as you will not be able to stay later than 9:50 to complete your
work. The test is mainly short essay format, with questions coming from the list of questions provided on this
hand-out. Full credit for your answers depends on your ability to address the questions with a grounding in
the material we have covered this semester. A list of the concepts that we have studied this semester is
provided below, along with related sections from your text and our additional readings.
Readings:
Quinn, Chapters 1, 2, 4, 5, 7, 9
Brey, Disclosive Computer Ethics
Foster & Jaeger, RFID Inside: The Murky Ethics of Implanted Chips
MacFarland, Urgency of Ethical Standards Intensifies in Computer Community
Martin & Schinzinger, Codes of Ethics
Moor, Just Consequentialism in Computing
Moor, Towards a Theory of Privacy in the Information Age
Nissenbaum, Should I Copy My Neighbor’s Software?
Samuelson, Computer Programs and Copyright’s Fair Use Doctrine
Shneiderman, ACM’s Computing Professionals Face New Challenges
Velazquez et al, A Framework for Moral Decision Making
Topics:
Introductory computer ethics
Ethical theories & their application
Digital Divide
Intellectual property issues
Privacy issues
Computer system reliability issues
Professional ethics for computing professionals
Introductory computer ethics
 When you implement Johnson’s definition of computer ethics issues (new species of older ethical
problems), how do you proceed? I.e., given a particular area (such as privacy, reliability or
intellectual property), how do you approach the ethical issues using Johnson’s definition?
 When you implement Moor’s definition of computer ethics issues (conceptual muddles, policy
vacuums), how do you proceed? I.e., given a particular area (such as privacy, reliability or
intellectual property), how do you approach the ethical issues using Moor’s definition?
Ethical theories & their application
 What are Gert’s four requirements for sound moral systems? Explain why each is important. Add a
fifth of your own. Justify its addition to the list.
 What role do core values play in the establishment of a moral system? Why do we say that it is
rational to protect one’s own core values, but ethical to protect others’ as well?
 Why do we say that ethical relativism is a non-viable ethical theory?
 When we begin to analyze a particular problem of ethics, why is it valuable to start with a
stakeholder analysis? How does this type of analysis inform a Kantian approach? A utilitarian
approach? A social contract theory approach?
 Explain how the two Categorical Imperatives combine to define Kantianism.
 Explain two major strengths & two major weaknesses of the Kantian theory of ethics.
 Explain how the valuing of happiness, the slogan “the greatest good for the greatest number,” and
the importance of consequences all fit together to form the utilitarian theory.
 Explain two major strengths & two major weaknesses of the utilitarian theory of ethics.









Explain the basis of social contract theory and how Rawls’ Principles of Justice improve upon the
basic theory.
Explain two major strengths & two major weaknesses of the social contract theory of ethics.
Describe a non-computer-related example in which the Kantian approach makes the most immediate
sense. Justify your answer.
Describe a non-computer-related example in which the utilitarian approach makes the most
immediate sense. Justify your answer.
Describe a non-computer-related example in which the social contract theory approach makes the
most immediate sense. Justify your answer.
How do analogies assist us in crafting ethical analyses? Within the realm of computer ethics, what
are the advantages and disadvantages of relying on analogies to particular scenarios or problems?
What are the steps involved in performing a just consequentialist analysis? Be sure to provide them
in the proper order.
What are the main points of disclosive computer ethics?
Discuss the morality of breaking the law from the perspectives of our ethical theories.
Digital Divide
 How is the digital divide a new species of an older ethical problem?
 Provide a stakeholder analysis of the digital divide.
 On what basis would each of these theories oppose the digital divide?
o Kantianism, utilitarianism, social contract theory
 Imagine that you have graduated (yes!) and are a computer professional out in the working world!
Describe what you might do to address the digital divide problem (at work, in the community etc)
Intellectual property
 How and why have intellectual property rights issues changed since the advent of digital media and
the Internet?
 Discuss the legal concept of fair use from an ethical perspective.
 Provide arguments pro and con to software copying, using Kantian, utilitarian and social contract
theories. Which do you find most compelling?
 How is the growing popularity of open source software and its accessibility changing the landscape
of the software property rights debate?
 Your boss asks you to install unlicensed software on every machine in your department (ten pc’s in
all). Outline the argument (based in ethical analysis) you will give him in opposition to this action.
 Which is more likely to enable an ethical solution to the protection of intellectual property in digital
media: stricter copyright laws or new technologies that incorporate more sophisticated anticopying features? (This question is adapted from your text.)
Privacy issues
 Why have we had to reshape our thinking about privacy ethics with the advent of widespread
computerization? Consider the methods of data collection, storage and use, as well as more current
definitions of data itself.
 Discuss Moor’s concepts of greased data and zones of privacy.
 Discuss this statement: “If you don’t have anything to hide, you shouldn’t be concerned about
electronic surveillance (workplace monitoring, cameras at intersections etc)
 An employee in the data department of a major credit card company uses a data-mining software
package on the company’s databases to explore patterns of customer behavior (purchasing habits,
payment behavior etc). She notices that certain zip codes are highly correlated with loan defaults,

and that, in fact, the company’s generated revenue in these areas is generally less than its losses. She
also notices that individuals with certain recognizable ethnic surnames typically charge over $50,000
in purchases annually, and pay these charges off in a timely manner. She presents these findings to
her boss who congratulates her and advocates marketing strategies that follow from the software’s
uncovering of these trends. Analyze this scenario from a Kantian, utilitarian and social contract
theory perspective. (adapted from Johnson, Computer Ethics)
Most website’s privacy policies have changed dramatically in recent years. Discuss how and why
they have changed.
Computer system reliability issues
 How reliable can we expect complex computer systems (hardware/software) to be?
 Why is the Y2K problem an excellent example of modern computer reliability issues?
 Using Moor’s “zones of privacy” concept as a starting point, discuss what a “levels of reliability”
concept might look like. You will need to consider different kinds of computer applications and the
consequences of their unsuccessful operation.
 Choose a position and support it: Most people do / do not trust computers.
Professional ethics for computing professionals
 What is meant by “professional ethics?”
 A few years ago, I heard a student in a computer ethics class say “Why do we have to study all this
stuff? When I’m out in the computer profession, my company will have a legal department, and
they’ll tell me what I can or cannot do.” What do you say to this student?
 Discuss the pros and cons of codes of ethics, using Martin & Schinzinger’s aricle as a guide.
 What is whistle-blowing? Discuss whistle-blowing from a Kantian perspective. From a
utilitarian perspective. From a social contract theory perspective.
Download