Question

Question 22 from: Herman T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing...

Question 22 from: Herman T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing (5th Edition). Wiley, 2016.

In answering the question, interpret the text in your own words to demonstrate your degree of understanding of the concepts and the discussions of the text. You must also quote a sentence or a short passage from the textbook to support your answer. [Note: Quotes must have quotation marks [“….”]. The post should not contain grammatical and mechanical writing errors.

Q22: Think of a controversial issue or practice involving cybertechnology that has not yet been identified as an ethical issue, but which might eventually be recognized as one that has moral implications. Apply Brey’s “disclosive method” to see whether you can isolate any embedded values or biases affecting that practice. Also, be sure to separate any “morally opaque features” from those that are “morally transparent” (or nonopaque).

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer - As we saw in the above situation, a generally late practice that has created significant discussion included the way that the Recording Industry Association of America (RIAA) sought after people it associated with trading copyrighted music documents on the Internet. For instance, we saw that the RIAA observed the measure of "traffic" of unapproved music documents that was steered through the PC frameworks of clients' frameworks. All together for the RIAA to get the data it required about the clients who worked these PC frameworks, the Recording Industry mentioned that ISPs give to them the names of people that related to certain IP addresses.

Were the ISPs committed, either legitimately or ethically, to furnish the RIAA with the real names of people, which are ordinarily secured under the obscurity of IP addresses? From one viewpoint, ISPs are required to conform to law authorization experts in situations where crimes are associated with occurring in their online discussions. Then again, having P2P programming introduced on one's PC framework isn't in itself unlawful. What's more, regardless of whether having unapproved copyrighted music on one's PC framework is illicit, one could at present question whether the methods utilized by the RIAA to find associated violators fall inside the parameters with what is ethically (and even legitimately) adequate behavior.

Apply Brey's Disclosive Method depicted in Sections 1.5.2 and 1.5.3

Add a comment
Know the answer?
Add Answer to:
Question 22 from: Herman T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT