COS 291: Computers, Ethics, and Social Responsibility

Spring 1996

Final Examination

Instructions
Questions
  1. What does Gotterbarn see as the most, and least, promising directions for "Computer Ethics?" (Would Moor or Barlow agree?)

  2. Some people claim that computer technology is riskier than other technologies. Describe four features of computing and computer systems that various commentators have suggested make computer technology particularly prone to failure and risk (Hint: See lecture notes, Borning, Smith, Corbato, Petroski and Littlewood and Strigini.)

  3. Briefly list and explain the four barriers to accountability in a computerized society. Using the Netscape security flaw or the Therac-25 as an illustration, show how these barriers operate. For whichever case you select, make one (non-technical) suggestion of how risk or failure might have been averted.

  4. A classmate of yours, Bud Ingspy, has hacked into the university system and browsed a copy of this exam. What would Spafford's moral evaluation be? What would Stallman's be?

  5. "A good professional is not merely a hired gun." Explain. Even good professionals, however, will face hard cases. Describe an example given in readings.

  6. Citing Martin and Schinzinger, and Davis, describe two justifications for professional codes of ethics. Discuss two criticisms offered by Ladd.

  7. In your own words state the central tenet of Utilitarianism. Construct two Utilitarian-style argument supporting, and two opposing, strong property rights over software and two opposing.

  8. What two forms of legal property protection are most frequently applied to software? List two or three key characteristics. In a few sentences, explain why software poses a challenge to these traditional forms of intellectual ownership.

  9. (i) Describe three frequently cited criticisms of Utilitarian ethics. (ii) Briefly describe an issue discussed in the course in which a deontological argument features in defense of a particular position.

  10. What is computer matching? Why is it considered a violation of privacy? How might it be defended?

  11. The concern for privacy that Rule et al. articulate does not address the problem of an Orwellian Big Brother. Explain. Rule offers several reasons for thinking that privacy is worth protecting. Describe two.

  12. According to Gavison, what is privacy and why is it important, why is it of value? (Note: you need not include every reason offered by Gavison, Rachels, and Rule. Select 3-5 that you find most convincing.) Briefly describe Posner's chief objection to strong privacy protections for individuals.

  13. Briefly describe the case of Lotus Marketplace: Households. Critics objected to Lotus Marketplace saying that it violated privacy. How was it defended? What were some of the substantive criticisms?

  14. What are the central tenets of the 1974 Privacy Act? Commentators like Laudon, and Berman and Goldman, believe that in practice and in principle it leaves some important gaps in the adequate protection of privacy. Identify and discuss three of these.

  15. In what ways does the information infrastructure, as envisioned by Gore, and Chapman and Rotenberg, embody values. What values do each of them hope that the Net will embody? Briefly explain.

  16. When we hear about mythical and real despots who put to death the bearers of bad tidings we think this is terribly unfair. Yet some argue that bulletin board operators and internet access providers are blameworthy for "bad" materials posted by others. Is this fair? When? Why? If we accept a policy that blames bulletin board operators and access providers how might this affect the Internet?

GOOD LUCK!

jdierkes@cs