Professional Documents
Culture Documents
social issues involving cybertechnology. It examines the impact that cybertechnology has for our social, legal, and moral systems. It also evaluates the social policies and laws that we frame in response to issues generated by the development and use of cybertechnology.
What Is Cybertechnology?
Cybertechnologies include:
hand-held devices (such as personal digital assistants); personal computers (desktops and laptops); large mainframe computers.
Cybertechnology (Continued)
Networked devices can be connected directly to the Internet. They also can be connected to other devices through one or more privately owned computer networks. Privately owned networks include both:
Local Area Networks (LANs), Wide Area Networks (WANs).
Cyberethics is a more accurate label than computer ethics, which can suggest the study
of ethical issues limited either to:
computing machines, computing professionals.
Cyberethics is also more accurate than Internet ethics, which is limited only to ethical
issues affecting computer networks.
Computer technology emerged in the late 1940s, when some analysts confidently predicted that no more than six computers would ever need to be built. The first phase of computing technology (1950s and 1960s) consisted mainly of huge mainframe computers that were unconnected (i.e., stand-alone machines). One ethical/social question that arose during Phase 1 dealt with the impact of computing machines as giant brains and what that meant for being human. Another question raised during this phase concerned privacy threats and the fear of Big Brother.
In Phase 2 (1970s and 1980s), computing machines and communications devices began to converge. Mainframe computers and personal computers could be linked together via privately owned networks such as LANs and WANs. Privacy concerns arose because confidential information could easily be exchanged between networked databases. Intellectual property issues emerged because personal computers could easily duplicate proprietary software programs. Computer crime was possible because people could break into the computers of large organizations.
During Phase 3 (1990-present), the availability of Internet access to the general public has increased significantly. This has been facilitated by the phenomenal growth of the World Wide Web. The proliferation of Internet- and Web-based technologies in this phase has raised ethical and social concerns affecting: free speech, anonymity, jurisdiction.
As cybertechnology evolves in Phase 4, computers will likely become more and more a part of who or what we are as human beings. James Moor (2005) notes that computing devices will soon be a part of our clothing, and even our bodies. Computers are already becoming ubiquitous, and are beginning to pervade both our work and recreational environments. Objects in these environments already exhibit what Philip Brey (2005) calls ambient intelligence, which enables smart objects to be connected to one another via wireless technology.
Associated Issues
Artificial intelligence (AI), database privacy ("Big Brother") Issues from Phase 1 plus concerns involving intellectual property and software piracy, computer crime, privacy and the exchange of records. Issues from Phases 1 and 2 plus concerns about free speech, anonymity, legal jurisdiction, virtual communities, etc. Issues from Phases 1-3 plus concerns about artificial electronic agents ("bots") with decision-making capabilities, bionic chip implants, nanocomputing research, etc.
1990s-Present
Convergence of information and communication technologies with nanotechnology research and bioinformatics research, etc.
Consider the Verizon v. RIAA and the Amy Boyer Cyberstalking cases in light of the ethical issues they raise. The Verizon case raises concerns about privacy, anonymity, surveillance, and intellectual property rights. Are any of these issues new or unique ethical issues?
Next, consider the Amy Boyer case. Is there anything new or unique about this case from an ethical point of view? Boyer was stalked in ways that were not possible before cybertechnology. But do any new or any unique ethical issues arise in this case?
There are two points of view on whether cybertechnology has generated any new or unique ethical issues:
(1) Traditionalists argue that nothing is new crime is crime, and murder is murder. (2) Uniqueness Proponents argue that cybertechnology has introduced (at least some) new and unique ethical issues that could not have existed before computers.
Both sides seem correct on some claims, and both seem to be wrong on others. Traditionalists underestimate the role that issues of scale and scope that apply because of the impact of computer technology.
For example, cyberstalkers can stalk multiple victims simultaneously (scale) and globally (because of the scope or reach of the Internet). Cyberstalkers can also operate without ever having to leave the comfort of their homes.
Uniqueness proponents tend to overstate the effect that cybertechnology has on ethics per se. Walter Maner (2004) argues that computers are uniquely fast, uniquely malleable, etc. There may indeed be some unique aspects of computer technology.
But uniqueness proponents tend to confuse unique features of technology with unique ethical issues. Their argument is based on a logical fallacy:
Cybertechnology has some unique technological features. Cybertechnology generates some ethical issues. Therefore, some of the ethical issues generated by cybertechnology must be unique.
James Moor (2000) argues that computer technology generates new possibilities for human action because computers are logically malleable. Logical malleability, in turn, introduces policy vacuums. Policy vacuums often arise because of conceptual muddles.
In the early 1980s, there were no clear laws regarding the duplication of software programs, which was made easy because of personal computers. A policy vacuum arose. Before the policy vacuum could be filled, we had to clear up a conceptual muddle: What exactly is software?
examines "practical" ethical issues. It analyzes moral issues from the vantagepoint of one or more ethical theories. Ethicists working in fields of applied ethics are more interested in applying ethical theories to the analysis of specific moral problems than in debating the ethical theories themselves.
According to this view, cyberethics is the field that identifies and analyzes issues of ethical responsibility for computer professionals. Consider a computer professional's role in designing, developing, and maintaining computer hardware and software systems.
Suppose a programmer discovers that a software product she has been working on is about to be released for sale to the public, even though it is unreliable because it contains buggy software. Should she blow the whistle?
Professional Ethics
Don Gotterbarn (1995) has suggested that computer ethics issues are professional ethics issues. Computer ethics, for Gotterbarn, is similar to medical ethics and legal ethics, which are tied to issues involving specific professions. He notes that computer ethics issues arent about technology per se.
Is Gotterbarns model for computer ethics too narrow for cyberethics? Cyberethics issues affect not only computer professionals; they effect everyone. Before the widespread use of the Internet, Gotterbarns professionalethics model may have been adequate.
Moor argues that automobile and airplane technologies did not affect our social policies and norms in the same kinds of fundamental ways that computer technology has. Automobile and airplane technologies have revolutionized transportation, resulting in our ability to travel faster and farther than was possible in previous eras. But they did not have the same impact on our legal and moral systems as cybertechnology.
Philip Brey (2004) describes the standard methodology used by philosophers in applied ethics research as having three stages:
1) Identify a particular controversial practice as a moral problem. 2) Describe and analyze the problem by clarifying concepts and examining the factual data associated with that problem. 3)Apply moral theories and principles to reach a position about the particular moral issue.
The professional and philosophical perspectives both illustrate normative inquiries into applied ethics issues. Normative inquiries or studies are contrasted with descriptive studies.
Descriptive investigations report about What is the case. Normative inquiries evaluate situations from the vantage-point of the question: What ought to be the case?.
Claims (2) And (3) are normative, (1) is descriptive; (2) is normative but nonmoral, while (3) is both normative and moral.
Normative
(Prescribe what ought to be the case)
Non-moral
Moral
Prescribe or evaluate in matters involving standards such as art and sports (e.g., criteria for a good painting or an outstanding athlete).
Prescribe or evaluate in matters having to do with fairness and Obligation (e.g., criteria for just and unjust actions and policies).
Huff & Finholt (1994) claim that when we understand the descriptive aspect of social effects of technology, the normative ethical issues become clearer. The descriptive perspective prepare us for our subsequent analysis of ethical issues that affect our system of policies and laws.
Issues Examined
Professional
Professional Responsibility System Reliability/Safety Codes of Conduct Privacy & Anonymity Intellectual Property Free Speech Impact of cybertechnology on governmental/financial/ educational institutions and socio-demographic groups
Philosophical
Descriptive
Is Cyber-technology Neutral?
Technology seems neutral, at least initially. Consider the clich: Guns dont kill people, people kill people. Corlann Gee Bush (2006) argues that gun technology, like all technologies, is biased in certain directions. She points out that certain features inherent in gun technology itself cause guns to be biased in a direction towards violence.
Bush uses an analogy from physics to illustrate the bias inherent in technology. An atom that either loses or gains electrons through the ionization process becomes charged or valenced in a certain direction. Bush notes that all technologies, including guns, are similarly valenced in that they tend to "favor" certain directions rather than others. Thus technology is biased and is not neutral.
Brey (2004) believes that because of embedded biases in cybertechnology, the standard applied-ethics methodology is not adequate for identifying cyberethics issues. We might fail to notice certain features embedded in the design of cybertechnology. Using the standard model, we might also fail to recognize that certain practices involving cybertechnology can have moral implications.
Brey notes that one weakness of the standard method of applied ethics is that it tends to focus on known moral controversies So that model fails to identify practices involving cybertechnology which have moral implications but that are not yet known. Brey refers to these practices as having morally opaque (or morally non-transparent) features, which he contrasts with "morally transparent features.
Transparent Features
Known Features Users are aware of these features but do not realize they have moral implications.
Unknown Features Users are not even aware of the technological features that have moral implications Examples might include data-mining technology and Internet cookies.
Breys scheme is also multi-level because the method for conducting computer ethics research requires three levels of analysis, i.e., a:
disclosure level, theoretical level, application level.
Disclosive
Theoretical
Application