Chapter03
Chapter03
Networking
ISEC 610:
Information Systems Ethics and
Security
1-1
1-3
1-4
1-5
1-6
1-7
1-10
1-11
1-12
1-13
1-14
1-15
1-16
• It is decentralized
• Every Web object has a unique address
• It is based on the Internet
1-17
1-19
1-20
1-22
• Government monopolization
• Prepublication review
• Licensing and registration
1-23
• Many-to-many communications
• Dynamic connections
• Huge numbers of Web sites
• Extends beyond national borders, laws
• Hard to distinguish between minors and
adults
1-25
1-26
1-27
1-28
1-30
1-31
1-33
1-35
1-36
• Benefits
– Popularity of Kate’s blog increased (definitely)
– Jerry become more popular on campus (definitely)
• Harms
– Jerry’s anger at Kate (only temporary)
– Photo could discredit Jerry at some point in future
(unlikely)
• Kate did nothing wrong by posting Jerry’s photo
1-37
1-39
1-40
1-41
1-42
1-43
1-44
1-45
1-46
1-47
1-48
1-49
• Utilitarian evaluation
• Kantian evaluation
• Social contract theory evaluation
1-50
1-51
1-53
1-54
1-55
• Social factors
– Peer groups
• Situational factors
– Stress
– Lack of social support and intimacy
– Limited opportunities for productive activity
• Individual factors
– Tendency to pursue activities to excess
– Lack of achievement
– Fear of failure
1-56
• Enlightenment view
– Individuals can and should govern their lives
– People are responsible for their choices
• Jeffrey Reiman’s view
– Addict’s behavior makes sense if addict has
no hope for a better future
– Society bears responsibility for putting people
in hopeless situations
1-57