Social and ethical issues related to information technology are _____
unavoidable
What are Ethics?
the study of how to decide if something is morally right or wrong
What is Consequentialism/Utilitarianism?
focuses on the consequences of an act—on the whole good or bad outcomes
What points can be made that copying music is okay?
What points can be made that copying music is not okay?
What is a Dialectic
a dialogue that explores an issue from both sides to lead to greater understanding
What is the Athens Affair?
Law enforcement needed to wiretap phones belonging to suspects. In Greece, hackers wiretapped 100 major business and political leaders.
What are possible analogies that could make with respect to the Athens Affair situation
Analogy #1: Lawful Intercept (LI) is like requiring everyone to record their face-to-face conversations (VoIP)
Analogy #2: LI is like suspicious activity reporting (SAR) in banking
What are the implications with the analogy of the Lawful Intercept being similar to VoIP?
LI systems go beyond rules for private conversations
Without LI, law enforcement can still monitor as with face-to-face conversations
What are the problems with the analogy of the Lawful Intercept being compared to VoIP?
What are the similarities with the analogy that the Lawful Intercept being compared to VoIP?
What are the similarities with the analogy between Lawful Intercept (LI) and Suspicious Activity Reporting (SAR)?
What are the problems with the analogy between Lawful Intercept (LI) and Suspicious Activity Reporting (SAR)?
After analyzing the analogies between the Lawful Intercept and VoIP systems, what are possible options to consider?
Who are the stakeholders in the Athens Affair case study>
What is hacktivism?
the use of technology to promote a political agenda or a social change.
What groups or organizations are examples of hacktivists?
2. Anonymous
What is an analogy of a hacktivist breaking into a computer?
breaking into a computer is like breaking into someone’s house
What are the similarities or differences of the analogy of breaking into a computer is like breaking into someone’s house?
Similarities:
1. Intruders are there without permission
2. Owners take precautions to discourage intrusion
3. Both are against the law
Differences
1. Burglars take physical objects, depriving owner
2. Hackers, in this case, copy intellectual property
3. No threat of violence with hacking
What utilitarian argument can be made about the analogy of breaking into a computer is like breaking into someone’s house?
What deontological argument can be made about the analogy of breaking into a computer is like breaking into someone’s house?
What is Deontology?
the study of duty and obligation.
ie. Focus on intent of an action, not consequences
What is Kant’s 2nd categorical imperative?
Never treat a fellow human merely as a means to an end
What is Paramedic ethics?
know a little and know when to ask ethical questions