Ethical Computing From Meta Ethics to Data Ethics

Ethical Computing is a means to an end as well as an end to itself; a problem, and a solution to a problem. It is the application of computer ethics in striving for doing-the-right-thing effectively in cyberspace or an information-intensive and technology-driven environment. The book addresses the r...

Full description

Saved in:
Bibliographic Details
Main Author: Lee, Wanbil
Format: eBook
Language:English
Published: Bradford Ethics International Press Limited 2024
Edition:1
Subjects:
ISBN:1804415480, 9781804415481
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Praise for Ethical Computing: From Meta Ethics to Data Ethics -- Preface -- Acknowledgements -- Chapter 1 Introduction -- The Context -- The Changes -- Finance and Banking Operations -- Digital Divide -- Work-life and Employment -- Democratic Values over the Internet -- The Problem -- Responsibility -- Accountability/ Liability -- Contractual Relationship -- Negligence -- Categorical Imperative and the buying/selling relationship -- Summary -- The Demand -- The Role of the Computer Professional -- Need for Ethical Standards -- Need for New Anti-Risk Mechanisms -- Conclusion -- References -- Chapter 2 The Computer-Ethics Connection - Computer Ethics &amp -- Ethical Computing Defined -- Introduction -- The Computer-Law-Ethics Connection -- Why Computer Ethics? -- The Argument Against 'Uniqueness' -- Premise 1 -- Premise 2 -- Conclusion -- The Argument For 'Uniqueness' -- Premise 1 -- Premise 2 -- Premise 3 -- Premise 4 -- Conclusion -- The Genus-species Approach (Lee, 2006-12, 2014-21): -- Philosophical views -- Practical views -- An Alternative Definition of Computer Ethics -- The Traditional View -- Classic definition -- Classic cases -- Dual Role of Ethics (Lee, 2015, p. 2994): -- The ethics &amp -- professionalism competencies (Lee, 2006-12, 2014-21): -- An Alternative View - a New Definition of Computer Ethics -- A different type of risk -- A different kind of anti-risk mechanism -- An academic discipline -- An applicable paradigm (Ethical Computing) -- Ethical Computing Defined -- Conclusion -- References -- Chapter 3 The Computer-Philosophy Connection: The Underpinning Ethical Principles -- Introduction -- Ethical Theories -- Why Ethical Theories -- Categories of Ethical Theories -- Meta-Ethics -- Metaphysical Issues -- Objectivism -- Voluntarism -- Skepticism -- Relativism -- Psychological Issues -- Egoism (Psychological)
  • Notion of condition -- Definition 1 (Access) -- Definition 2 (Right, Condition) -- Concluding remarks -- Benefits of Privacy -- Harms of Privacy -- Rights to Privacy -- Value/Importance of Privacy -- Universal value -- Intrinsic value -- Core value -- Social value -- A Common Misuse of the Term Privacy -- Data Privacy -- What Data Privacy Is and Is Not -- Why Personal Privacy is Special in Cyberspace -- Category of Privacy -- The concept of privacy category -- Generally held categories of privacy -- Clarke's categorization of privacy -- Solove's taxonomy of privacy problems -- The seven types of privacy by Finn et al -- Protection of Data Privacy -- The problem of data privacy protection -- Data privacy protection and changes in demand and status -- Methods of protection -- Advice about personal data protection -- Cost of privacy protection -- Precautionary tips -- A pragmatic step forward -- Conclusion -- References -- Chapter 6 Current Major Issues: Intellectual Property -- Introduction -- Protection of Intellectual Property -- Concept of Intellectual Property -- Notion of Property Rights -- Privacy Rights and Property Rights -- Methods of Intellectual Property Protection -- Copyright -- Patent -- Trade secret -- Trademarks &amp -- service marks -- A Cocktail Approach -- Trade secrets vs Patent -- IP Rights -- Under the Social Contract Theory perspective -- Under the Kantian categorical imperative perspective -- Under the utilitarian perspective -- Under the consequentialist perspective -- Benefits &amp -- Limits of IP Protection -- Benefits of IP protection -- Limits to IP protection -- Software as an Intellectual Property -- Software Copyright -- Software Ownership -- Morality Of Copying Proprietary Software -- Is it wrong to copy proprietary software? -- Is copying software harmful? -- Is copying software immoral because it is illegal?
  • Hexa-Dimension Metric
  • Hedonism (Psychological) -- Altruism (Psychological) -- Emotionalism -- Prescriptivism -- Rationalism -- Gender morality -- Normative Ethics -- Golden/Silver Rule -- Duty &amp -- Rights based Theories -- Deontology -- Kantianism/Categorical Imperative -- Consequentialist Normative Theories -- Consequentialism -- Ethical Egoism -- Ethical Altruism -- Utilitarianism -- Social Contract Theory -- Rawls' Theory of Justice -- Virtue Ethics -- Applied Ethics -- Characteristics of applied ethical issues -- Normative principles of applied ethics -- Summary of Common Ethical Principles -- Relativistic Ethics -- Duty and Rights Based Ethics -- Results-based Ethics -- Ethics of reciprocity -- Conclusion -- References -- Chapter 4 The Computer-Law Connection: Computer Laws Evolved -- Introduction -- Computer Security -- Computer Risks -- Inherent risks -- Application-oriented risks -- Development-oriented risks -- Software-oriented risks -- Hidden risks -- Computer Viruses -- How it works -- How it spreads? -- Who and why? -- Computer Crimes -- Category 1 crimes -- Category 2 crimes -- The roles of a computer in computer crimes -- The rise of computer crimes -- Generic examples of computer crimes -- Some Hong Kong cases -- Counter-measures -- Operations security -- Personnel security -- Computer-related Laws -- Computer-related Laws in Hong Kong -- Computer Crime Ordinance (Cap 23) -- Personal Data (Privacy) Ordinance (Cap 486) (Office of the Privacy Commissioner for Data Privacy, Hong Kong, n.d.) -- Other Laws (amended existing laws) -- Other laws also amended -- Classical Cases in Hong Kong -- Computer-related Laws in Other Countries (a select sample, Table 2) -- Conclusion -- References -- Chapter 5 Current Major Issues: Data Privacy -- Introduction -- Privacy -- Definition of Privacy -- Concept of privacy -- Notion of access -- Notion of situation
  • Type 6: Fallacy of composition/fallacy of division -- Type 7: Fallacy of appeal to authority -- Type 8: Begging the question -- Type 9: Appeal to the people -- Type 10: The "virtuality" fallacy -- Types of Argument -- Valid and invalid arguments -- Sound &amp -- unsound arguments -- Inductive &amp -- fallacious arguments -- Summary of argument types -- Constructing an Argument -- Test of Validity -- Conclusion -- References -- Chapter 9 Tools &amp -- Methods: Ethical Decision Making -- Introduction -- Ethical Decision-Making and Analysis Guidelines -- The Four Principles of Ethical Decision Making -- Harm minimization -- Deontological principle -- Consequentialist principle -- Principle of consistency and respect (Kantian categorical imperative) -- Illustration -- The Practical Approaches To Decision-Making -- Legal approach -- Formal guidelines -- Informal guidelines -- Menu-Driven Linear Checklists -- The 4-step analysis -- The 5-step of principled reasoning -- The 7-step path for making ethical decisions -- Privacy Impact Assessment -- Data processing cycle analysis -- Privacy Risk Analysis -- PIA Reporting -- Illustration -- The story of Case N - The CIO's Dilemma -- The Analysis -- Step 1 - Analyze the situation -- Step 2 - Make a defensible ethical decision -- Step 3 - describe solution steps -- Step 4 - Prepare policies and strategies to prevent recurrence -- Conclusion -- References -- Chapter 10 Tools &amp -- Methods: Ethical Analytics -- Introduction -- Ethical Matrix -- Origin of the Matrix -- Elements of the Matrix -- Column -- Row -- Cell -- The Practical Value of the Matrix -- Expected outcomes and precondition -- Efficacy -- Adaptability -- Development of the Ethical Matrix Algorithm (µemx Algorithm) -- Quantification for Ethical Evaluation -- The variables -- The procedure (called µhmc Algorithm) -- Illustration of the procedure.
  • Conclusion -- References -- Chapter 7 Current Major Issues: Others -- Introduction -- Digital Divide -- Global Divide -- Social Divide -- Issues of Current Interest -- A Real-life Case -- Anonymity -- Anonymity and security -- Trap of pseudo-anonymity -- No secret over the Internet -- The shielding - the misconstrued belief (eSafety Commission, 2021) -- Hiding email address -- Professionalism -- Profession -- Characteristics of a profession -- Is Computing a Profession? -- A comparison of ICT with Medicine/Law -- Professional -- Professional relationships -- Strongly differentiated and non-differentiated professional -- Ethics &amp -- Professionalism -- The functional areas and respective conveners -- The eighteen generic competencies -- Netiquette -- Amalgamation of Views -- Rules of Netiquette -- The ten core rules of netiquette (Cyberdefender.hk, n.d.) -- The ten netiquette rules (Einorytė, 2023) -- The 20 Internet etiquette rules (Kaspersky, 2023) -- The 10 basic netiquette rules (Hartney, 2023) -- The 10 netiquette guidelines every online student needs to know (Brook, 2019) -- My List of Dos &amp -- Don'ts -- Cyberbullying -- Conclusion -- References -- Chapter 8 Tools &amp -- Methods: Logical Analysis -- Introduction -- Critical Thinking -- What Is Critical Thinking? -- Meaning and definition -- What critical thinking is not -- Why Is It Difficult? -- How To Do It? -- How Do We Know We Are Doing It? -- Critical Thinkers and Non-critical thinkers -- Critical thinkers -- Non-critical thinkers -- How to become a critical thinker? -- Outcome of Critical Thinking -- Three Practical Tips -- Logical Argument Analysis -- Structure of Logical Argument -- Logical Fallacy -- Type 1: False cause fallacy -- Type 2: Ad hominem argument -- Type 3: Fallacy of ambiguity -- Type 4: Slippery slope argument -- Type 5: The many/any fallacy