Cyberethics (Ethics for the information age) Comprehensive Exam || With Questions & Solutions (Expert Rated A+)
4 keer bekeken 0 keer verkocht
Vak
Cyberethics
Instelling
Cyberethics
Cyberethics (Ethics for the information age) Comprehensive Exam || With Questions & Solutions (Expert Rated A+)
Cyberethics (Ethics for the information age) Comprehensive Exam || With Questions & Solutions (Expert Rated A+)
According to the author, why is there good reason to say we are living ...
,Cyberethics (Ethics for the information
age) Comprehensive Exam || With
Questions & Solutions (Expert Rated A+)
1. According to the author, why is there good reason to say we are living in the
Information
Age? - ANSWER - According to the author, there is good reason to say we are living
in the Information
Age because computer and communication technologies have made it easy to
collect,
store, manipulate, and distribute vast amounts of information.
4. Why did commercial mechanical calculators become practical in the nineteenth
century? - ANSWER - Commercial mechanical calculators became practical in the
late nineteenth century
because advances in machine tools and mass-production methods made it possible
to
manufacture reliable devices at a reasonable price
6. What factors helped the Burroughs Adding Machine Company to surpass a large
number
of competitors to become the most successful calculator company by the 1890s? -
ANSWER - The Burroughs Adding Machine Company surpassed its competitors by
combining an
excellent product with excellent marketing.
Describe the principal aspects of cyberethics as a field of philosophical ethics -
ANSWER - study of social impact, concerned with justification of social policies
how is Phillip Brey's "disclosive method" of computer ethics different from what Brey
calls "mainstream computer ethics" - ANSWER - discloses morally nontransparent
features, and practices
Why does Moor believe that cyber technology poses special problems for identifying
and analyzing ethical issues? - ANSWER - Believes cybertech poses special
problems because generates policy vacuums that may involve conceptual muddles
and computers are logically maleable
What is meant by a moral system? (hint 4 features of Gerts model)? - ANSWER -
public, informal rational, and impartial
What are the basic differences seperating ethicists from moralists? - ANSWER -
Moralists are know it alls and may have a moral agenda, Ethicists look at ethics in a
logical way and remain open.
Summarize each of the four different kinds of "discussion stoppers? that may often
arise in ethical discourse. - ANSWER - People disagree on solutions to moral issues
, Who am I to judge others
its a private matter
up to culture to decide
What is the essential difference between an argument that s valid and one that is
invalid? Construct an example of each. - ANSWER - valid=premises are assumed
true, conclusion must be true
invalid=premise is true but can imagine case where conclusion is false
valid- ceo=high school grad
bille gates is ceo
bill gates graduated high school
invalid- x pc has the best specs
x must be the best computer
When is a valid argument unsound? Construct an example of an unsound argument.
- ANSWER - Valid argument is unsound when one or more premises are not true in
real world.
iphone users are smarter
my roommate owns an iphone
i own a droid
my roommate is smarter
What differentiates invalid arguments that are inductive from invaliid arguments that
are fallacious? Construct an example of each. - ANSWER - assuming premises are
true inductive arguments conclusion is likely true. A fallacious argument is unlikely to
even follow premise.
inductive 99% percent of all a's are b's
x=a
conclusion x=b
fallacious-
x is authority in y
x said z
conclusion - z
Do computer/IT professionals have special moral responsibilities that ordinary
computer users do not have? - ANSWER - Yes, They have a unique ability to do
good or to cause harm. Also develop safety critical systems
How is safety critical software defined by Kevin Bowyer? - ANSWER - Safety critical
software is directly affecting life critical systems..i.e mass transit, air traffic control,
nuclear reactors, missle systems, medical treatment systems
What exactly is whistleblowing? What are the key elements in John Boatrights
definition of whistle blowing? - ANSWER - voluntary release of nonpublic info.
key elements-
nonpublic
voluntarily disclosed
presented to an appropriate audience
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper conceptialresearchers. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €11,71. Je zit daarna nergens aan vast.