Computer Ethics and Society
Computer Ethics and Society CS 105
Popular in Course
Popular in ComputerScienence
This 3 page Class Notes was uploaded by Leland Swift on Monday September 28, 2015. The Class Notes belongs to CS 105 at George Mason University taught by Michael Tompkins in Fall. Since its upload, it has received 7 views. For similar materials see /class/215117/cs-105-george-mason-university in ComputerScienence at George Mason University.
Reviews for Computer Ethics and Society
Report this Material
What is Karma?
Karma is the currency of StudySoup.
Date Created: 09/28/15
GEORGE MASON UNIVERSITY Department of Computer Science CS 105 Computer Ethics amp Society Spring 2006 Sections 005 amp 006 Michael W Tompkins It D I 5 9 gt1 0 D W O N D D I D 4 U UI Final Examination Review Questions What differences if any are there between regular ethics and cyberethics Between regular laws and cyberlaws What is the difference between law and ethics De ne act utilitarianism rule utilitarianism deontology and ethical relativism State an ethics dilemma and explain how an ethicist of each type listed above would resolve the dilemma What results would they achieve Would they all arrive at the same result Why or why not What is the difference between real property personal property and intellectual property Explain the reasoning behind the law s protection of property rights using the philosophies described in the assigned readings Why do we protect intellectual property What does society gain from intellectual property laws existence What do and TM mean What is the significance of the phrase pat pending on a product Mark has drawn a picture of Pam using charcoal on paper What three elements must his drawing satisfy for Mark to have copyright protection for his drawing Assuming his drawing meets the requirements when does the copyright protection begin When does it end What if Mark drew the picture because he works for a company that creates such drawings 7 who holds the copyright when does it begin and how long does it last Does it matter whether the picture is ever published Will that have any effect on the copyright Why or why not If it will what effect will it have Assuming that Mark is the copyright holder with respect to his drawing of Pam what are the ve exclusive rights that he has If Mark gives the drawing to Pam what rights does she have Who can make copies of the drawing Suppose Pam likes the drawing Mark made but wants an oil painting of the same drawing Can she hire someone else to do it Why or why not If she can hire someone else to do it is she the only one who can If she can not hire someone else to do it who can How can Pam make copies of the drawing if Mark does not give her permission What situations would allow her to do so Give an example and explain how that example meets the requirements of the statute Assume that Mark writes a new software program that works in a brandnew even revolutionary way He tells you I want to copyright this program What do you tell him Can he if so how Why or why not Pam has invented a coldfusion machine It s about the size of a standalone photocopier When you pour in three gallons of plain tap water the machine produces at zero cost 5000 kilowatthours of electricity Which form of intellectual property should Pam use to protect her invention What are the requirements of that type of protection Does her machine qualify How long will that protection last and when does it begin 00 O NNNN LAND IO N 4 NNN OOO LAD LA LA LAN gt 0 LAND ONUIlk LA 1 LAW 000 Suppose Pam decides not to share her machine with the rest of the world Pam calls her machine the Fusotron power generator She doesn t want anyone else to be able to use that name What type of intellectual property protection would help her out What does she need to do to get that protection How long will it last Instead she intends to keep the machine for herself and only sell the electricity But she wants to keep her employees from sharing the secrets of her machines with anyone else Is there a form of intellectual property protection that she can use to do so What are the requirements for maintaining that type of protection How long does it last What are the four factors that determine whether a particular instance of copying or other infringement constitutes a fair use of a copyrighted work How do they work What does it mean if your use of a work is a fair use What is the first sale doctrine What is a license in the context of intellectual property law How does it work What is a compulsory license in the context of intellectual property law How does it work What is the one area of intellectual property law in which it exists When if at all can you invade the rights of a copyright holder without permission What is a profession What is a professional Does software engineering count as a profession Why or why not If it is a profession what does that imply What moral responsibilities do software engineers and computer professional have What are the di erences between a code of ethics code of conduct and code of practice Should software engineers be required to have licenses to be able to practice their profession How would this work What went wrong with the Therac25 Be specific How can we work to prevent similar events from happening in the future The book described several computerrelated disasters we also discussed some of them in class Name one or two of them and explain what went wrong Describe steps the computer profession can take to ensure that future tragedies do not occur 7 eg processes for creating new hardware and software testing it implementing it etc that ensure we don t kill anyone else What is privacy How do we protect it How does cybertechnology affect privacy Name all of the principles or rules of practice a programmer should follow to protect users privacy when designing a database Define computer crime Explain the six categories of computer crimes Review the Virginia Computer Crimes Act What crimes does it cover and how does a Virginia court get jurisdiction over them Assume that Mark sends Pam a threat You re going to die by email from his AOL email account Pam and Mark are both Maryland residents IF his request is illegal can he be prosecuted in Virginia Yes B No Explain your answer to the previous question What is the digital divide What are its implications for the computer industry For the country For the world What discrimination issues does the computer profession face How can it help to resolve them 41 What cultural effects are we seeing from the increased computerization of society Effects on the home on the job on the workforce in general 42 SHORT ANSWER Name two exceptions that justify overriding an individual s privacy that is exceptions to the privacy right Give one example of each 43 SHORT ANSWER Mark is creating a new database to track his company s customers He needs to assign each customer an account number to tell one from another Give two reasons why Social Security numbers would be a bad choice Explain 44 ESSAY Name one justification people usually give for downloading illegal copies of music AND explain why that justi cation is wrong 45 ESSAY At Mark s request Pam his boss allows him to telecommute from home two days a week to watch over his new child Name three ways Pam can ensure that Mark is still working on those particular two days each week as opposed to say working hard on the other three days then loafing on his two telecommuting days Explain TRUEFALSE Some actions are neither ethical nor unethical TRUEFALSE The Constitutional right to privacy means that the government cannot tell private citizens what to do in their own homes ESSAY Explain your previous answer TRUEFALSE It is legal for a music professor to pass out classroom copies of a song to discuss its merits even if the professor uses the entire song 50 ESSAY Explain your previous answer Jgtlgt ION blk 000 Here are the cites to the Virginia Computer Crimes Act Va Code Ann 182152l the title ofthe Act Va Code Ann 1821522 definitions Va Code Ann 1821523 computer fraud Va Code Ann 1821523l transmission of spam Va Code Ann 1821524 computer trespass Va Code Ann 1821525 computer invasion of privacy Va Code Ann 1821525l using a computer to gather identifying information Va Code Ann 1821526 theft of computer services Va Code Ann 1821527 personal trespass by computer Va Code Ann 1821527l harassment by computer Va Code Ann 182152 12 allowing civil lawsuits against violators of the Act Va Code Ann 182152 14 use of computers in committing forgery Va Code Ann 182152 15 use of encryption technology in criminal activity Finally a note on copyright giving credit to the author does not excuse copyright infringement Neither does the fact that you didn t make any money off the infringement So be careful of thinking it s okay as long as you give credit Plagiarism presenting someone else s work as if it were your own Copyright infringement invading one of the five exclusive rights of the copyright holder during the copyright term without a license unless your use of the work is a fair use