COS 291: Computers, Ethics, and Social Responsibility
Spring 1996
Final Examination
Instructions
- Answer twelve out of sixteen questions.
- Each answer should be no longer than one typed double-spaced page,
for a total maximum of twelve pages.
- Please write each answer on a separate page. Be sure to include
question number and name on each sheet.
- Examinations must be delivered personally to Helen
Nissenbaum, Marx Hall 306, no later than 2:30 p.m. May 22. Please
include a signed Honor Code Pledge.
- You are permitted to consult lecture and precept notes, course
reader, and textbooks but not to collaborate with other students in
the course.
- Read questions very carefully and answer as directly as
possible. If you need clarification on any of the questions you may
ask Helen Nissenbaum (x2879) or Julian Dierkes (x4539).
- We expect the write-up of answers to take approximately three
hours in all.
Questions
- What does Gotterbarn see as the most, and least, promising
directions for "Computer Ethics?" (Would Moor or Barlow
agree?)
- Some people claim that computer technology is riskier than other
technologies. Describe four features of computing and computer systems
that various commentators have suggested make computer technology
particularly prone to failure and risk (Hint: See lecture notes,
Borning, Smith, Corbato, Petroski and Littlewood and Strigini.)
- Briefly list and explain the four barriers to accountability in a
computerized society. Using the Netscape security flaw or the
Therac-25 as an illustration, show how these barriers operate. For
whichever case you select, make one (non-technical) suggestion of how
risk or failure might have been averted.
- A classmate of yours, Bud Ingspy, has hacked into the university
system and browsed a copy of this exam. What would Spafford's moral
evaluation be? What would Stallman's be?
- "A good professional is not merely a hired gun."
Explain. Even good professionals, however, will face hard cases.
Describe an example given in readings.
- Citing Martin and Schinzinger, and Davis, describe two
justifications for professional codes of ethics. Discuss two
criticisms offered by Ladd.
- In your own words state the central tenet of Utilitarianism.
Construct two Utilitarian-style argument supporting, and two opposing,
strong property rights over software and two opposing.
- What two forms of legal property protection are most frequently
applied to software? List two or three key characteristics. In a few
sentences, explain why software poses a challenge to these traditional
forms of intellectual ownership.
- (i) Describe three frequently cited criticisms of Utilitarian
ethics. (ii) Briefly describe an issue discussed in the course in
which a deontological argument features in defense of a particular
position.
- What is computer matching? Why is it considered a violation of
privacy? How might it be defended?
- The concern for privacy that Rule et al. articulate does not
address the problem of an Orwellian Big Brother. Explain. Rule offers
several reasons for thinking that privacy is worth
protecting. Describe two.
- According to Gavison, what is privacy and why is it important,
why is it of value? (Note: you need not include every reason offered
by Gavison, Rachels, and Rule. Select 3-5 that you find most
convincing.) Briefly describe Posner's chief objection to strong
privacy protections for individuals.
- Briefly describe the case of Lotus Marketplace:
Households. Critics objected to Lotus Marketplace saying that it
violated privacy. How was it defended? What were some of the
substantive criticisms?
- What are the central tenets of the 1974 Privacy Act? Commentators
like Laudon, and Berman and Goldman, believe that in practice and in
principle it leaves some important gaps in the adequate protection of
privacy. Identify and discuss three of these.
- In what ways does the information infrastructure, as envisioned
by Gore, and Chapman and Rotenberg, embody values. What values do each
of them hope that the Net will embody? Briefly explain.
- When we hear about mythical and real despots who put to death the
bearers of bad tidings we think this is terribly unfair. Yet some
argue that bulletin board operators and internet access providers are
blameworthy for "bad" materials posted by others. Is this fair? When?
Why? If we accept a policy that blames bulletin board operators and
access providers how might this affect the Internet?
jdierkes@cs