Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 5

Essay Questions

Chapter 1
1.Explainthedifferencebetweendeontologicaltheoriesofethicsandutilitarian
theoriesofethics.
2.Explainthedifferencebetweennegativerightsandpositiverights.
Chapter 2
1. Explain why the United States has historically placed less value than the European
Union on the right to privacy.
2. Describe three of the Fair Information Principles.

Chapter 3
1. a. SummarizetheChildOnlineProtectionAct(COPA)andtheChildren's
InternetProtectionAct(CIPA).
b. DiscussatleastthreedifferencesbetweenCOPAandCIPA?
c. WhatimpactwouldCOPAhavehadonfreedomofspeechontheInternet?
WhywasCOPAoverturnedbythecourts?
2. TheoralargumentsbeforetheSupremeCourtconcerningtheCommunications
DecencyAct(CDA)focusedextensivelyondeterminingthemostappropriate
analogyforcyberspace.ArgumentswerepresentedthatcomparedtheInternetto
alibrary,totelevision,andtoapublicplacesuchasastreetcornerorpark.
a. Whyarethesecomparisonsimportant?Brieflyexplainthedifferences
betweenlibraries,television,andpublicplaceswithrespecttoFirst
Amendmentprotection.
b. Foreachofthesethreeanalogies(library,television,andpublicplace),
describeonesignificantwayinwhichtheInternetissimilarandone
significantwayinwhichitisdifferent.Explaintherelevanceofeachofthese
similaritiesanddifferencestotheissueofregulationoftheInternet.

3.In2002,theU.S.SupremeCourtstruckdownthebanonvirtualchild
pornography.Explaintwoargumentsinsupportofstrikingtheban.Explaintwo
argumentsagainststrikingtheban.
4.ExplainhowGoogle'sexperienceinChinarelatestotheissueofglobalcensorship.

Chapter 4
1. a. HowaretheNapsterandGrokstercopyrightcasessimilar,andhowarethey
different?
b. Brieflydescribethecourt'srulinginboththeNapsterandGrokstercases.
2. a.ExplainthetwomainprovisionsoftheDMCA(DigitalMillenniumCopyright
Act).
b.Explainhow"takedown"noticesworkandwhotheyprotectfromlawsuits.
c.Howdo"takedown"noticessometimesinfringeon"fairuse"?

Chapter 5
1. a. Brieflydefineidentitytheft.
b. Describetwotechniquescriminalscanusetogathertheinformationtheyneed
tostealanidentity.
c. Describetwowaysapersoncanprotecttheiridentity.
d. Describetwowaysabusinesscanprotectitscustomersfromidentitythieves.
2. InthecontextofInternetcontentthatsomecountriesprohibit,discusshowthe
"responsibilitytopreventaccess"differsfromthe"authoritytoprevententry".
Includeexamples.

Chapter 6
1.a.Givetwoexamplesofjobcategoriesforwhichtheincreasedproductivityof
computersystemsstronglyreducedthenumberofpeopleworkinginthose
areas.
b.Giveanexampleofanareainwhichcomputertechnologyreducesjobsfor
skilledworkers.Giveanexampleofhowcomputertechnologyenablespeople

withlessskilland/ortrainingtodojobsthatusedtorequiremore.Explainhow
computertechnologychangedtheskilllevelrequiredforthesejobs.
c.GivetwoexamplesofjobsthatdidnotexistbeforetheInternet.
2.Explaintheethicalandsocialimplicationsof"offshoring".Considertheissuefrom
theperspectiveofbothU.S.employeesandforeignemployees.Considertheissue
fromtheperspectiveofcompanieshiringforeignworkers.

Chapter 7
1.GivethreeNeoLudditecriticismsoftechnology?Provideonecounterargument
foreach.
2.a.Whatarethethreequestionsoneshouldaskwhenevaluatingacomputer
model?
b.Whatmightcauseacomputermodeltoinaccuratelyreflectarealworld
scenario?

Chapter 8
1. Somepeoplehaveproposedestablishinglegalstandardsandregulationstogovern
safetycriticalcomputerbasedsystems.
a. Giveandexplainafewofthebestargumentsforandagainstsuchaproposal
(atleasttwooneachside).Givecounterargumentsagainsttheargumentsfor
eachside.
Note:the"counterarguments"youareaskedtogiveshouldopposeoranswer
theargumentsontheothersideasdirectlyandconvincinglyaspossible.They
shouldnotbesimplyunrelatedargumentsontheoppositesideoftheissue.
b. Describetwoprovisionsthatmaybeincludedinsuchregulations.How
effectivedoyoufeeleachprovisionwouldbe?

2. a.Describetherolethemanufacturer,thehospitals/clinics,andtheprogrammer
eachplayedintheTherac25radiationoverdoseincidents.

b.Brieflydescribehowprofessionaltechniquesforincreasingreliabilityand
safetycouldhavepreventedtheproblems.
3.a. Brieflydescribethemajorfactorsthatcontributedtothefailureofeachofthe
following:theDenverAirportbaggagesystemfailure,theAriane5rocket
malfunction,andanA320Airbuscrash.
b. Brieflydescribehowprofessionaltechniquesforincreasingreliabilityand
safetycouldhavepreventedthesefailures.
Chapters 1 - 9
1. Choosetwoissues/topicscoveredthissemester.Foreachofthetwotopics:
a. Describeeachissue/topic,givingabriefhistory(nomorethanaparagraph).
b. Giveatleasttwoargumentsoneachsideoftheissue/topic(atleastfour
argumentstotal).
c. Whatsuggestionsdoyouhaveforresolvingthisissue/topic,orwhydoyou
thinktheissue/topiccannotberesolved?Explainyouranswer.
Remember to answer all three questions for each of the two issues/topics.
2. Forthefollowingscenario,identifyatleast3stakeholders.Listatleast2possible
actions.Howwouldeachpossibleactionaffecteachofthe3stakeholders(giveat
leastonepossibleconsequenceforeachstakeholderandeachpossibleactions6
total)?Whichactionwouldyoutake?Why?
You are the lead programmer on a new software product. You work for a small,
privately owned software company that has had only limited success in the past.
There is nothing else on the market similar to the new software you are
developing. The software is just entering the testing stage, which is estimated to
take approximately 10-12 months. The scheduled release date is 14 months from
now. You and the other developers have been working long hours, 60 hours a
week, and earning a relatively low salary. The entire development team will be
sharing in the profits once the new software is launched. The owner has just
returned from an industry tradeshow, and has learned about a consumer
tradeshow that would be perfect for launching the new product. The project
manager meets with you and the other developers on the team and tells you that
the owner is very excited and determined to release the product at the consumer
show, which is only 4 months away. It will take at least 2 months to prepare the

marketing and packaging for the product. You are told you have 2 months to test
and fix any problems.

You might also like