The publisher of this book allows a portion of the content to be used offline. This title is not available in your country. Additional Book Details This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. For courses in Computer Ethics and Computers and Society. An objective study of technology ethics that inspires critical thinking and debate In Gift of Fire, A: Social, Legal, and Ethical Issues for Computing Technology , Sara Baase presents a balanced exploration of the social, legal, philosophical, ethical, political, constitutional, and economic implications of computing and the controversies they raise.
|Published (Last):||10 February 2009|
|PDF File Size:||18.50 Mb|
|ePub File Size:||5.78 Mb|
|Price:||Free* [*Free Regsitration Required]|
While Baase wrote the book to be used in her computer science course, the book is not an indigestible academic tome; rather a very topical reference. Its 9 densely packed chapters covering nearly pages provide a comprehensive locus. While legal themes are pervasive throughout the book, Baase writes that she is a computer scientist and not a lawyer and that appropriate legal counsel should be obtained before drawing any legal conclusions.
Chapter 1 opens with an overview of how change and unexpected developments effect IT projects and information technology. And that is the overall theme of the book, of how new things often have unexpected problems and results. Anyone familiar with the Risks Digestedited by Peter Neumann will be at home with these topics. The chapter details the notion of a kill switchand details some of the potential uses and risks involved, and how that more often than not, theses kill switches are improperly designed and deployed.
The chapter closes, like all of the chapters in the book with a series of review exercises, general exercises, assignments remember this is a textbook , a list of books and articles for further reading, and an extremely detailed set of endnotes.
This assignments and exercises for the class the book is used for can be downloaded here. Baase also has a web site with other supplementary information and resources. Chapter 2 details various issues around data and personal privacy. An interesting fact detailed is that Maricopa Country in Arizona was one of the first municipalities to put complete public records on the web. Little did county official know that such an action would eventually lead the county to have the highest rate of identity theft in the USA.
Chapter 7 deals with how to evaluate and control technology and is the most insightful chapter in the book. Baase writes of the inherent conflict between a democracy and open Internet, while dealing with the plethora of incorrect, foolish and biased information.
She makes note of some totalitarian regimes that prohibit anti-government use of social media. She illustrates cases where these countries China and Syria are just two of them that create bogus dissident sites, find out which people are sympathetic to the cause, and then arrests these people.
Baase details and defends against many neo-Luddite views of computers, technology and quality of life. Baase provides numerous anecdotes of environmental and other anti-technology groups that rail against technology, but use computers and the web. She writes of the editor who considers himself a neo-Luddite, a person who sees technology as inherently evil; yet disseminates his views via email, computers and laser printers.
Compare this with members of various anti-vaccination movements, who are obvious to the millions of lives saved by vaccinations. The chapter also details some of the duplicitous views of Kirkpatrick Sale, another neo-Luddite who rages against the computer machine, while simultaneously benefiting significantly from it, and using it.
Baase defends technology in writing that those who are critical of modern technology point out their weaknesses, but often ignore the weakness of the alternatives.
An example she gives is the millions of acres once needs to grow feed for horses and the hundreds of tons of horse manure dropped on the streets of cities, as recent as a century ago. Baase gives many other examples of the problems and controversial issues surrounding technology. But more importantly, notes, and celebrates the enormous benefits that computer technology and the Internet has brought us. The only significant negative of the book is its price tag. Note though the book is available on Amazon for much cheaper, in addition to used copies which are even less.
Social media, computers and other aspect of technology have brought massive changes to society. Many of these changes are highly beneficial, others not. There are myriad questions that need to be asked, and ideas that need to be understood, and the books covers and answers those in details.
For those looking for an across-the-board superb reference on social and other issues in computing, A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology is a terrific resource and an invaluable reference guide.
A Gift of Fire
She begins with an overview, looking at the ubiquity of computers, the rapid pace of change, and the recurrence of old problems in new contexts. To counter the mostly negative coverage of "issues", her introduction also offers a survey of the benefits of computing. Separate and largely independent chapters then cover privacy, encryption and interception, reliability and risks, freedom of speech, intellectual property, computer crime, work, broader social issues, and professional ethics. With exercises, assignments, class activities, and reading lists at the end of each chapter, along with extensive references, A Gift of Fire is clearly intended for use as a textbook. It should be just as usable outside the classroom, however, at least for those who prefer a formal approach that eschews the sensational. Much is omitted, understandably, but the breadth of coverage is still impressive and there is a good selection of examples.
A Gift of Fire: Social, Legal, and Ethical Issues for Computers and the Internet