PHI320 Ch01 PDF
PHI320 Ch01 PDF
CHAPTER 1
Introduction: Why
Computer Ethics?
Inga has worked hard all her life. Ten years ago, she started her own business
selling computer software and hardware. In any given year now, 100,000 to
ISBN: 0-558-13856-X
200,000 customers purchase things in her store. These purchases range from
a $5 item to a $10,000 item. As part of doing business, the company gathers
Computer Ethics, Third Edition, by Deborah G. Johnson. Published by Prentice Hall. Copyright © 2001 by Prentice-Hall, Inc.
John_0130836990_c01.qxd 10/17/00 8:13 AM Page 2
browsing the newsgroup and alerted university off icials. The campus police
and the Federal Bureau of Investigation were then brought in to investigate the
Computer Ethics, Third Edition, by Deborah G. Johnson. Published by Prentice Hall. Copyright © 2001 by Prentice-Hall, Inc.
John_0130836990_c01.qxd 10/17/00 8:13 AM Page 3
case. On February 9, 1995, Baker was arrested and was held in custody for 29
days. A month later, he was charged in a superceding indictment with f ive
counts of transmitting interstate communication of a threat to injure another.
The story on which the initial complaint was partially based, however, was not
mentioned in the superceding indictment, which referred only to the e-mail
exchanges between Gonda and Baker. The charges were dropped in June 1995,
on grounds that Baker expressed no true threat of carrying out the acts.
Did Jake Baker do anything wrong? Should the police have arrested him?
This case was wr itten by Marc Quek Pang based on the follow ing sources: United States v. Baker,
Cr iminal No. 95 - 80106, United States Distr ict Court for the Eastern Distr ict of Michigan, South-
ern Division, 890 F.Supp. 1375; U.S. Dist. (1995) (LEXIS 8977); 23 Media L. Rep. 2025 ( June 21,
1995) decided ( June 21, 1995) f iled; Philip Elmer-Dew itt, “Snuff Porn on the Net,” Time Magazine,
Februar y 20, 1995, p. 69; Peter H. Lew is, “An Internet Author of Sexually V iolent Fiction Faces
Charges,” New York Times, (Februar y 11, 1995), p. 7; other sources include local Michigan newspa-
per articles.
Computer Ethics, Third Edition, by Deborah G. Johnson. Published by Prentice Hall. Copyright © 2001 by Prentice-Hall, Inc.
John_0130836990_c01.qxd 10/17/00 8:13 AM Page 4
These scenarios pose a variety of types of ethical questions. The f irst raises a
question for personal decision making and is inextricably tied to the law. Is it
morally permissible for an individual to break the law by making a copy of pro-
prietary software? If so, when is law breaking justif ied? When it’s a bad law?
When the law is easy to break? The second scenario also raises a question for
individual decision making, but here the decision has to do with establishing a
policy for a company. Inga has to decide what her company should do and this
means taking into account what is good for the company—its bottom line, its
employees, as well as what her responsibilities are to her customers. The third
scenario poses an issue that could be addressed either as an individual matter
(should I censor myself when I do things on the Internet) or as a public policy
matter (should there be free expression online?). Finally, the fourth scenario
raises a question of professional ethics. What Milo should do in the situation
described is not just a matter of his individual values but has much to do with
the profession of computing. That is, computer professionals have a collective
responsibility to ensure that computing serves humanity well. Moreover, Milo’s
behavior will impact the reputation of computer professionals as well as his
own and his employer’s.
Taken together, the four scenarios illustrate the diverse character of ethi-
cal issues surrounding computer and information technology. Among other
things, the ethical issues involve property rights, privacy, free speech, and pro-
fessional ethics. The development and continuing evolution of computer and
information technology has led to an endless sequence of ethical questions: Is
personal privacy being eroded by the use of computer and information tech-
nology? Should computers be used to do anything they can? What aspects of
information technology should be owned? Who is morally responsible for er-
rors in software, especially those that have catastrophic effects? Will encryp-
tion technology make it impossible to detect criminal behavior? Will virtual
reality technology lead to a populace addicted to fantasy worlds? These ques-
tions ultimately lead to deeper moral questions about what is good for human
beings, what makes an action right and wrong, what is a just distribution of
benef its and burdens, and so on.
While the scenarios at the beginning of the chapter illustrate the diversity
of ethical issues surrounding computer and information technology, it should
be noted that there is still a puzzle about why computer and information tech-
nology give rise to ethical questions. What is it about computer and informa-
tion technology, and not bicycles, toasters, and light bulbs, that creates ethical
issues and uncertainty about right and wrong, good and bad? This question
and a set of related questions are contentious among computer ethicists. The
controversy has focused especially on whether the ethical issues surrounding
computer and information technology are unique. Are the issues so different
from other ethical issues that they require a “new ethics,” or are the ethical is-
ISBN: 0-558-13856-X
sues associated with computer and information technology simply old ethical
issues in a new guise?
Computer Ethics, Third Edition, by Deborah G. Johnson. Published by Prentice Hall. Copyright © 2001 by Prentice-Hall, Inc.
John_0130836990_c01.qxd 10/17/00 8:13 AM Page 5
The uniqueness issue is intertwined with several other important and per-
sistent questions. Why or how does computer and information technology give
rise to ethical issues? Is a new f ield of study and/or separate academic courses
needed to address the ethical issues surrounding computer and information
technology? What does one “do” when one does computer ethics? That is, is
there a special methodology required? The uniqueness issue seems to be at the
core of all of these questions. Identif ication of something unique about com-
puter technology holds the promise of explaining why computer technology,
unlike other technologies, gives rise to ethical issues and why a special f ield of
study and/or a special methodology may be needed. Of course, if computer
and information technology is not unique, these issues will have to be resolved
in some other way. I begin with the question why computer and information
technology gives rise to ethical issues and proceed from there to a more de-
tailed account of the uniqueness issue.
Computer and information technology is not the f irst (nor will it be the last)
technology to raise moral concerns. Think of nuclear power and the atom
bomb. New technologies seem to pose ethical issues when they create new
possibilities for human action, both individual action and collective or insti-
tutional action. Should I donate my organs for transplantation? Should em-
ployers be allowed to use urine or blood tests to determine if employees are
using drugs? Should we build intelligent highways that record automobile li-
cense plates and document when cars enter and leave the highway and how
fast they go?
As these questions suggest, the new possibilities created by technology are
not always good. Often they have a mixed value. New technologies bring bene-
f its as well as new problems, as in the case of nuclear power and nuclear waste,
automobiles and air pollution, aerosol cans and global warming.
Because new technological possibilities are not always good or purely
good, they need to be evaluated—morally as well as in other ways (e.g., eco-
nomically, environmentally). Evaluation can and should take place at each
stage of a technology’s development, and can and should result in shaping the
technology so that its potential for good is better realized and negative effects
are eliminated or minimized. Technical possibilities are sometimes rejected
after evaluation, as in the case of biological weapons, nuclear power (no new
nuclear power plant has been built in the United States for several decades),
and various chemicals that deplete the amount of ozone in the atmosphere or
cause other environmental problems.
So it is with computer and information technology. Enormous possibilities
ISBN: 0-558-13856-X
for individual and institutional behavior have been created. We could not have
reached the moon without computers, nor could we have the kind of global
Computer Ethics, Third Edition, by Deborah G. Johnson. Published by Prentice Hall. Copyright © 2001 by Prentice-Hall, Inc.
John_0130836990_c01.qxd 10/17/00 8:13 AM Page 6
1
A cookie is a mechanism that allows a Web site to record your comings and goings, usually
ISBN: 0-558-13856-X
Computer Ethics, Third Edition, by Deborah G. Johnson. Published by Prentice Hall. Copyright © 2001 by Prentice-Hall, Inc.
John_0130836990_c01.qxd 10/17/00 8:13 AM Page 7
to electronically reproduce and alter an artistic image that was originally cre-
ated by someone else? New innovations, and the ethical questions surrounding
them, continue to arise at an awe-inspiring pace. Policy vacuums continue to
arise and are not always easy to f ill.
The fact that computer and information technology creates policy vacuums may
make the task of computer ethics seem, at f irst glance, easy. All we have to do is
develop and promulgate policies—f ill the vacuums. If only it were so simple!
When it comes to f iguring out what the policies should be, we f ind our-
selves confronted with complex issues. We f ind conceptual muddles that make
it diff icult to f igure out which way to go. And, as we begin to sort out the con-
ceptual muddles, often we f ind a moral landscape that is f luid and sometimes
politically controversial. Consider the case of free speech and the Internet. On
the one hand, it takes some conceptual work to understand what the Internet is
and it takes even more conceptual work to f igure out whether it is an appropri-
ate domain for free or controlled expression. Even if information on the Inter-
net is recognized as a form of speech (expression), we are thrust into a
complex legal and political environment in which speech is protected by the
f irst amendment but a variety of exceptions are made depending on content,
when and where the words are expressed, and so on. So, f iguring out what
norms or laws apply or should apply is not a simple matter. Can we distinguish
different types of expression and protect them in different ways? Can we pro-
tect children while not diminishing adult expression and access?
words and questions are considered impolite; certain kinds of conversations are
considered conf idential; and so on. According to the traditionalist account, we
Computer Ethics, Third Edition, by Deborah G. Johnson. Published by Prentice Hall. Copyright © 2001 by Prentice-Hall, Inc.
John_0130836990_c01.qxd 10/17/00 8:13 AM Page 8
Computer Ethics, Third Edition, by Deborah G. Johnson. Published by Prentice Hall. Copyright © 2001 by Prentice-Hall, Inc.
John_0130836990_c01.qxd 10/17/00 8:13 AM Page 9
way that will help us f ill policy vacuums. Another good illustration of this f luid
Computer Ethics, Third Edition, by Deborah G. Johnson. Published by Prentice Hall. Copyright © 2001 by Prentice-Hall, Inc.
John_0130836990_c01.qxd 10/17/00 8:13 AM Page 10
eryone, since programs could be copied without loss to the original developer.
They also saw the potential for all kinds of information to be distributed
Computer Ethics, Third Edition, by Deborah G. Johnson. Published by Prentice Hall. Copyright © 2001 by Prentice-Hall, Inc.
John_0130836990_c01.qxd 10/17/00 8:13 AM Page 11
cheaply and easily in the electronic medium. This was recognized to be an in-
vention on the order of the printing press in importance but on an even
grander scale. The debate about property rights and how to interpret and
apply them to software is, in a sense, a debate about taking advantage of the
special features of software to create a system of distribution that has never
been possible before. Most recently, this debate is taking place around the dis-
tribution of music on the Internet.
To be fair to the traditionalist account, it need not be committed to adopt-
ing norms and policies that are identical to those that prevailed before com-
puter and information technology. A traditionalist could take the position that
traditional norms and principles must be modif ied when they are extended to
new situations. In modifying their position in this way, the traditionalist moves
somewhat away from recommending simply that we extend the old to the new.
In this weaker version, there is the suggestion of something new being created
in the process of extending old norms and principles.
The traditionalist account is a good starting place for understanding how
the ethical issues surrounding computer and information technology are and
should be resolved and how policy vacuums are and should be f illed, but it has
serious limitations. As a descriptive account, it does not capture all that is in-
volved. Filling policy vacuums is not only a matter of mechanically applying
traditional norms and principles. Conceptual muddles have to be cleared up,
often a synthetic process in which normative decisions are invisibly made.
Moreover, as a normative account, the traditionalist position runs the risk of
not taking advantage of the new features of, and new opportunities created by,
computer and information technology. Hence, we need to move beyond the
traditionalist account.
Clearing up the conceptual muddles and f illing policy vacuums involves under-
standing the social context in which the technology is embedded. Computer and
information technology is developed and used in a social context rich with
moral, cultural, and political ideas. The technology is used in businesses, homes,
criminal justice systems, educational institutions, medicine, science, govern-
ment, and so on. In each one of these environments, there are human purposes
and interests, institutional goals, social relationships, traditions, social conven-
tions, regulations, and so on. All of these have an inf luence on how a new tech-
nology is understood and how policy vacuums are f illed.
For example, by some measure of eff iciency, it might be best for the United
States, as a whole, to create one master database of information on individual
citizens, with private and public agencies having access to appropriate seg-
ISBN: 0-558-13856-X
ments of the database. There are, however, a variety of reasons why such an
arrangement has not yet come about and is not likely to come about in the near
Computer Ethics, Third Edition, by Deborah G. Johnson. Published by Prentice Hall. Copyright © 2001 by Prentice-Hall, Inc.
John_0130836990_c01.qxd 10/17/00 8:13 AM Page 12
future. These reasons include historically shaped social fears of powerful cen-
tralized government, beliefs about the ineff iciency of centralized control, an
already established information industry, a political environment favoring pri-
vatization, and so on.
Social context shapes the very character and direction of technological de-
velopment. This is true at the macro level when we think about the development
of computer and information technology over time. It is also true at the micro
level when we focus on how specif ic applications are adopted and used at partic-
ular sites such as small businesses, college campuses, or government agencies.
Imagine, for example, the process of automating criminal justice records in a
local police station. The specif ications of the system—who will have access to
what, the kind of information that is stored and processed, the type of security,
and so on—are likely to be determined by a wide variety of factors, including the
unit’s understanding of its mission and priorities, the existence of laws specify-
ing the legal rights of citizens who are arrested and accused, the agency’s
budget, and the relationships the unit has with other criminal justice agencies.
One of the reasons the study of ethical issues surrounding computer and in-
formation technology is so fascinating is that in order to understand these is-
sues, one has to understand the environments in which it is being used. In this
respect, the study of computer ethics turns out be the study of human beings
and society—our goals and values, our norms of behavior, the way we organize
ourselves and assign rights and responsibilities. To understand the impact of
computer and information technology in education or government, for example,
we have to learn a good deal about what goes on and is intended to go on in
these sectors. To f igure out what the rules governing electronic communication
should be in a particular environment, we have to explore the role of communi-
cation in whatever sector we are addressing. For example, because universities
are educational institutions, they tend to promote free speech much more than
would be tolerated in a business environment. And even in a university environ-
ment, attitudes toward free speech will vary from country to country.
The study of computer ethics may be seen as a window through which we
view a society—its activities and ideals, the social, political, and economic forces
at work. Perhaps the most important thing about computer and information
technology is its malleability. It can be used to do almost anything that can be
thought of in terms of a series of logical steps or operations, with input and out-
put. Because of this malleability, computer and information technology can be
used in a wide range of activities touching every aspect of human endeavor.
Computer and information technology can be used as much to keep things
the same as to cause change. Indeed, as the traditionalist account suggests, when
this technology enters a new environment, we tend, initially at least, to map the
way we had been doing things onto the new computer system. The process of
computerization often involves looking at the way people have been doing a par-
ISBN: 0-558-13856-X
Computer Ethics, Third Edition, by Deborah G. Johnson. Published by Prentice Hall. Copyright © 2001 by Prentice-Hall, Inc.