QuestionQuestion

Week1

1. What were two unexpected uses of social networking?
2. Describe two applications of speech recognition.
3. What are two of Kant’s important ideas about ethics?
4. Give an example of a law that implements an ethical principle. Give an example of a law that enforces a particular group’s idea of how people should behave.
5. When one goes behind Rawls’ veil of ignorance, what is one ignorant of?
6. What does the term secondary use mean? Give an example.
7. Explain the difference between opt-in and opt-out policies for secondary uses of personal information.
8. Describe two tools people can use to protect their privacy on the Web.
9. Describe two methods a business or agency can use to reduce the risk of unauthorized release of personal information by employees.
10. A company in the Netherlands that makes navigation devices collects location data from the devices to provide real-time services to its customers. It also provides anonymous statistical data to government agencies to improve roads and traffic flow. Unknown to the company and its customers, the police used the data to choose sites for traffic cameras to catch speeders. Was this a privacy violation? Why or why not?


Week 2
1. Briefly explain the differences between carriers, broadcasters, and publishers with respect to freedom of speak and control of content.
2. Describe two methods parents can use to restrict access by their children to inapropriate material on the web.
3. What was one of the main reasons why courts ruled the censorship provisions of the Communications Decency Act in violation of the First Amedment?
4. Give an example of an anonymous publication from more than 100 years ago.
5. What is one way of reducing spam?
6. What are the four factors to be used in deciding whether a use of copyrighted material is a fair use?
7. Summarize the main reasons why the court in the Sony Betamax case ruled that videotaping a movie from television to watch later was not an infringement of copyright.
8. Describe two technical means of protecting copyright of intellectual property on the web.
9. What are the two main provisions of the Digital Millennium Copyright Act?
10. Give one example where a court ordered a Web site to remove links to another site.

Week3
1. What did the word hacker mean in the early days of computing?
2. Is it legal to release a computer virus that puts a funny message on people’s screens but does not damage files?
3. What is phishing?
4. Describe one method financial Web sites use to convince a consumer that the site is authentic.
5. What is one problem with using biometrics for identification?
6. What is one technique used to reduce online auction fraud?
7. For what Web-based service did the U.S. government arrest several business executives from England?

Solution PreviewSolution Preview

This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.

Week1

1. One unexpected, negative use of social networking is bullying – a behavior and phenomenon that has, unfortunately, successfully migrated to the digital incarnations of our social spaces (even if those digital social spaces have enabled the easier documentation of bullying). Another unexpected use is the constant broadcast by people of the most mundane, trivial details of their daily lives, a use possibly no one saw coming.
2. Baase mentions the use of speech recognition in language training and in AI personal assistant applications like Siri. In the speech recognition components of language training software, the program listens for pronunciation and provides correction when necessary. In AI personal assistants, speech recognition enables interaction with the software by voice instead of keyboard or point/touch-click/tap input.
3. One critical idea about ethics from Kant is the principle of universality – this is the idea that for a rule to be an ethical rule of behavior, it must be a rule applicable to and for everyone. Another of Kant’s contributions is the idea that reason determines what is good; thus, good, right behavior is rational behavior, and irrational behavior is “evil”.
4. One way of thinking about recent progress on the topic of marriage equality is in terms of the principle of universality – the “rules” of marriage are increasingly made applicable to everyone, not just according to the heterosexual-oriented mandates of traditional culture. Likewise, laws such as the Defense of Marriage Act reflect and enforce a particular group’s idea of how and whom people should marry.
5. Rawls’ veil of ignorance is a conceptual device aimed at enabling a person to think about and develop social policy from a stance where the person’s real-world differentiating characteristics are stripped away and made irrelevant to the deliberation. So, the person behind the veil of ignorance is imagined to not know his or her gender, race, age, and wealth, and to thus develop policy that is universally fair to people of all genders, races, ages, etc...
$52.50 for this solution

PayPal, G Pay, ApplePay, Amazon Pay, and all major credit cards accepted.

Find A Tutor

View available Ethics Tutors

Get College Homework Help.

Are you sure you don't want to upload any files?

Fast tutor response requires as much info as possible.

Decision:
Upload a file
Continue without uploading

SUBMIT YOUR HOMEWORK
We couldn't find that subject.
Please select the best match from the list below.

We'll send you an email right away. If it's not in your inbox, check your spam folder.

  • 1
  • 2
  • 3
Live Chats