Saint Louis University
October 10, 2024
Identify the moral triggers.
Morally problematic uses and effects of ICTs in social-institutional domains and practices, those places where new cyberpractices call for moral inquiry. An ICT should trigger moral reflection not only if it creates injustice or doubts about right conduct, but also if it threatens virtuous character or flourishing. (Rehg 2017, chap 1., p. 19)
For the midterm, consider a concrete example of the CP to discuss the concerns surrounding it.
Identify the stakeholders in the case and describe the relevant consequences for each group. (Include a table like the one you built for the DCE in-class assignments.)
Fill out the stakeholder groups and values first. Then fill out the rest of the table as you work on questions 3 and 4. Question 3 will help you refine the values column. Question 4 will help you fill out the remaining columns. Use questions 3 and 4 to help explain/justify your table.
Clarify key concepts and values affected by cyberpractice. Are there any conceptual muddles? Explain them. (See Cogent Cyberethics, chap. 1, pp. 9–11.)
New cybertech creates a conceptual muddle when it changes a social practice or activity in such a way that some concept or set of concepts connected with the practice or activity becomes unclear or contentious for members of the practice.(Rehg 2017, chap 1., p. 19)
Moor’s original example deal with policies for protecting computer programs.(Moor 1985, 266–67) The muddle takes place when we try to categorize computer programs. Can you own a computer program? That is, are they like written works, a form of intellectual property covered by copyright? Or are they more like an idea or algorithm—which cannot be owned? If you can own a program, is it the expression of an idea (copyright) or is it a process (patent)?
In Moor’s example there are muddles related to the tech.
What is it?
But there are also muddles related to our values.
What does property mean in this context?
Q3: Clarify key concepts and values affected by cyberpractice. Are there any conceptual muddles? Explain them. (See Cogent Cyberethics, chap. 1, pp. 9–11.)
Look at the values you’ve identified in Q2. What needs to be explained? What about the CP complicates our understanding of the value? Finally, clarify your use of the value concept by giving a definition for the value, why it is important to the stakeholder, and how the value relates to the CP.
In the context of CP, which values have the greatest moral force? Why?
Which values have a high or overriding moral force? Consider the impact, likelihood, and level of the values you’ve listed. What stands out? How do these factors relate to or affect the moral force of the value.
Is CP morally acceptable? Use the standards of DCE and provide a cogent argument to support your judgment.
Use the material you’ve gathered in questions 1–4 to build an argument for the moral acceptability or unacceptability of the CP. Use class notes on stage IV and Rehg’s DCE outline as a reference.
Look to the news articles to help answer the last two questions. What stakeholders do they represent? What would they think of your argument? Is your disagreement based on moral considerations or non-moral facts surrounding the CP?
Use class notes on Public Merits Assessments to guide your answers.