A Gift of Fire
Social, Legal, and Ethical Issues for Computing Technology
Fifth Edition
Sara Baase
San Diego State University
Timothy M. Henry
New England Institute of Technology
330 Hudson Street, NY, NY 10013
Vice President and Editorial Director, Engineering and Computer Science: Marcia J. Horton
Editor in Chief: Julian Partridge
Executive Portfolio Manager: Tracy Johnson
Portfolio Management Assistant: Kristy Alaura
Field Marketing Manager: Demetrius Hall
Product Marketing Manager: Yvonne Vannatta
Marketing Assistant: Jon Bryant
Managing Producer: Scott Disanno
Content Producer: Erin Ault
Manager, Rights and Permissions: Ben Ferinni
Operations Specialist: Maura Zaldivar-Garcia
Cover Designer: Black Horse Designs
Cover Photo: imagedepotpro/Getty
Composition/Full-Service Project Management: iEnergizer Aptara, Ltd.
Full-Service Project Management: Deepthi Mohan, iEnergizer Aptara, Ltd.
Cover Printer: Lake Side Communications, Inc.
Printer/Binder: Lake Side Communications, Inc.
Typeface: Times LT Pro 11/13
Credits and acknowledgments for material borrowed from other sources and reproduced, with permission, in this textbook appear on the appropriate pages within the text. /Fotolia; Crossword Puzzle: OlegDoroshin/Fotolia; and Typewriter: MIGUEL GARCIA SAAVED/Fotolia.
Copyright 2018, 2013, 2008, 2003, 1997 by Pearson Education, Inc., 221 River Street, Hoboken, NJ 07030. All rights reserved. Manufactured in the United States of America. This publication is protected by copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise. For information regarding permissions, request forms, and the appropriate contacts within the Pearson Education Global Rights & Permissions department, please visit www.pearsoned.com/permissions/.
Many of the designations by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial caps or all caps.
The author and publisher of this book have used their best efforts in preparing this book. These efforts include the development, research, and testing of theories and programs to determine their effectiveness. The author and publisher make no warranty of any kind, expressed or implied, with regard to these programs or the documentation contained in this book.
Library of Congress Cataloging-in-Publication Data
Names: Baase, Sara, author. | Henry, Timothy M., author.
Title: A gift of fire : social, legal, and ethical issues for computing technology / Sara Baase, San Diego State University, Timothy M. Henry.
Description: Fifth edition. | Includes index.
Identifiers: LCCN 2016058670| ISBN 9780134615271 (alk. paper) | ISBN 0134615271 (alk. paper)
Subjects: LCSH: ComputersSocial aspects. | ComputersMoral and ethical aspects. | ComputersLegal and Constitutional aspects. | InternetSocial aspects. | InternetMoral and ethical aspects. | InternetLegal and Constitutional aspects.
Classification: LCC QA76.9.C66 B3 2018 | DDC 303.48/34dc23 LC record available at https://lccn.loc.gov/2016058670
ISBN 10: 0-13-461527-1
ISBN 13: 978-0-13-461527-1
To Keith, now and always
S. B.
To Tita, for her unconditional support
T. M. H.
Contents
Preface
This book has two intended audiences: students preparing for careers in computer science (and related fields) and students in other fields who want to learn about issues that arise from digital technology, the Internet, and other aspects of cyberspace. The book has no technical prerequisites. Instructors can use it at various levels, in both introductory and advanced courses about computing or technology.
Scope of This Book
Many universities offer courses with titles such as Ethical Issues in Computing or Computers and Society. Some focus primarily on professional ethics for computer professionals. Others address a wide range of social issues. The bulky subtitle and the table of contents of this book indicate its scope. We also include historical background to put some of todays issues in context and perspective.
Students (in computer and information technology majors and in other majors) will face a wide variety of issues in this book as members of a complex technological society, in both their professional and personal lives. We believe it is important for students to see and understand the implications and impacts of the technology.
The last chapter focuses on ethical issues for computer professionals. The basic ethical principles are not different from ethical principles in other professions or other aspects of life: honesty, responsibility, and fairness. However, within any one profession, special kinds of problems arise. Thus, we discuss professional ethical guidelines and case scenarios specific to computing professions and we include two of the main codes of ethics and professional practices for computer professionals in an Appendix. We placed the professional ethics chapter last because we believe students will find it more interesting and useful after they have as background the incidents, issues, and controversies in the earlier chapters.
Each of the chapters in this book could easily be expanded to a whole book. We had to leave out many interesting topics and examples, so we placed some of these topics in exercises and hope these will spark further reading and debate.
Changes for the Fifth Edition
For this fifth edition, we updated the whole book, removed outdated material, added many new topics and examples, and reorganized several topics. New material appears throughout. We mention here some major changes, completely new sections and topics, and some that we extensively revised.
This edition has more than 75 new exercises.
has a new section on self-driving cars (a topic that appears again in later chapters). In this chapter, we introduce the Internet of Things, another topic that reappears in later chapters.
New, expanded, or extensively revised topics in and added more Fourth Amendment issues and significant court decisions about searching cellphones and tracking people by tracking their phones.
In , we expanded the section on how companies handle objectionable content, added recent controversial examples of leaks of sensitive material, and expanded the discussion of net neutrality.
In , we expanded discussion of exemptions to the DMCA, added copyright cases in several countries related to news excerpts, added the court decision and arguments in the lawsuit against Google for copying millions of books, and updated and added several patent cases.
We extensively reorganized and updated . We added a case study (the Target breach). Other new sections cover hacking methods and why the digital world, including the Internet of Things, is so vulnerable. The new section on security includes, among other topics, what cybersecurity professionals do, responsible disclosure of vulnerabilities, the role of users in security, and the controversies over impenetrable encryption and backdoors for law enforcement. The chapter has many new examples throughout.
Next page