CHAPTER 1: SOCIAL CONTEXT funded by the U.
S Department of
Defense resulted in the discovery of
Lesson 1: History of I.T.
ARPANET (1969) as the first large
Major technological breakthroughs in computer network, which connected
electronics took place after World War numerous US universities to each
II, leading to innovations like the other. (evolves into Internet)
programmable computer and
Transmission Control
transistor.
Protocol/Internet Protocol (TCP/IP)
By the 1970s, information technology foundation of the Internet,
became widespread, evolving in three standardized communication across
main areas: microelectronics, networks.
computers, and
The World Wide Web (WWW),
telecommunications.
created by Tim Berners-Lee at CERN
The transistor allowed binary in 1989, revolutionized internet
processing, enabling machine access.
communication.
Data Management Toward Big Data
The 4004 microprocessor by Intel in
• The first major step in data management
1971 revolutionized computing,
was the development of relational
marking the start of embedded
databases in the early 1970s.
computing.
• Relational databases were primarily used
Moore’s Law (named after Gordon
to store and manipulate structured data,
Moore) states that transistor count
such as employee records and library
doubles every two years, boosting
databases.
computing power.
• In the 1990s, data mining became
Technological advancements led to the
popular, leading to the concept of data
integration of computers in everyday
warehouses, which stored large amounts of
devices.
time-aware data.
The networking era in the 1990s
• Data warehouses are structured differently
shifted computing from mainframes to
from relational databases it allows
networked and interactive
hypothesis testing using association
computing.
rules and statistical methods.
The Big Data era emerged in the
• By the late 2000s, a third major
2010s, analyzing large datasets for
advancement in data management occurred
insights.
with the introduction of machine learning
Big Data’s 5 Vs: Volume, Velocity, algorithms and big data analytics.
Variety, Veracity, and Value.
• Machine learning techniques enable better
Lesson 2: Transition in Communication data analysis by identifying patterns and
& Network Usage (Networks toward making accurate predictions based on
Social Media) training data.
The development of • Big Data is defined by the 5 Vs:
telecommunication and
Volume – The massive amount of data
networking in the 1970s enabled
generated.
connectivity.
Velocity – The speed at which data is
The research named ARPA (Advanced
produced and processed.
Research Project Agency) which
Variety – The different types and User-friendly software such as the
formats of data collected. World Wide Web (WWW),
developed by Tim Berners-Lee in
Veracity – The reliability and accuracy
1989.
of the data.
The public’s increasing demand
Value – The usefulness and insights
for global connectivity.
that can be extracted from data.
The number of Internet users
Lesson 2: Time of Transition in
increased from 40 million in 1995 to
Communication and Network Usage
over 4.3 billion in 2019.
• A new form of society has emerged due to
Transformation of Communication
simultaneous social, technological,
economic, and cultural transformations. • Communication is a fundamental
human characteristic, and recent
• These global changes do not affect
advancements have significantly shaped
everyone equally, as many people remain
society.
excluded from digital networks that
provide knowledge, wealth, and power. • Examples of communication changes
include:
• One major transformation in the past 20
years is the radical shift in communication Text-based messaging instead of
methods. phone calls.
• Traditional top-down mass media has Emails replacing letters for formal
been replaced or augmented by horizontal communication.
digital communication, where individuals
Social media posts replacing
share information directly.
postcards for sharing updates.
• The rise of citizen journalism allows
Being connected anywhere, as
individuals to distribute both accurate
opposed to being unreachable when
information and disinformation, including
traveling.
fake news and propaganda.
• The evolution of communication methods
has impacted generations differently, shifting
from telephone trees to modern instant
messaging platforms like WhatsApp. Democratic Communication
• Several technological advancements • Governments worldwide utilize ICTs
contributed to the widespread diffusion of (Information and Communication
the Internet: Technologies) to improve citizen
engagement and services.
Regulatory changes &
privatization in the 1990s. • ICT plays a key role in three main areas:
Open-source software & protocols, 1. Access to information – Example:
making technology more accessible. Statistics South Africa (SSA) provides
census data online.
Higher bandwidth in
telecommunications and improved 2. Transaction services – Example:
switching capacity. South African Revenue Services
(SARS) offers online tax filing
The rise of personal computers through eFiling.
and local networks.
3. Citizen participation – Example:
Johannesburg Road Agency (JRA)
allows citizens to report potholes Lesson 3: Interactive Media & Mass
via a mobile app. Self-Communication
• In repressive governments, reliance on Web 2.0 (early 2000s) enabled
the Internet for dissent and activism is interactive
risky, as governments control digital communication(‘posting’ content a
infrastructure. lot easier than before), blurring
traditional and digital mass
• While social media has been used for
communication.
activism, governments counter this through
censorship, surveillance, and Example of mass media (television,
propaganda. radio, newpapers)
Worldwide Mobile Revolution Users became content creators,
shifting power from media
• From the 1990s onward, mobile phones
corporations.
have rapidly evolved, becoming the fastest-
adopted technology in history. Internet governance ensures order
in cyberspace through policies,
• Wireless phone subscriptions grew from 16
regulations, and security measures.
million in 1991 to over 5 billion by the
late 2000s. Three forms of internet governance:
• However, not everyone has equal access – o Markets: Private transactions
some people own multiple SIM cards, while and pricing mechanisms.
others share devices. (competition)
Digital Convergence o Hierarchies: State control
through policies and
• In the 2000s, digital convergence
regulations. Example law,
increased, combining Internet, wireless
binding treaty, organizational
communication, and multimedia
control of a firm(regulations)
applications.
o Networks: Voluntary
• This has led to multiple ways to access
cooperation between internet
the Internet, allowing seamless exchange
stakeholders.(collaboration)
of text, audio, video, and software.
• Reduced costs in electronics have enabled
the Internet of Things (IoT), allowing CHAPTER 2: ANALYTICAL TOOLS
devices such as fridges, stoves, and home
appliances to share data. Morality deals with manners and
habits (personal sense of right and
•In developing regions, wireless wrong).
communication has become the dominant
mode of Internet access due to the lack of Example: You find a wallet on the ground.
wired infrastructure. Before most Internet Your personal morals tell you that keeping it
connections relied on wired infrastructure, would be wrong, so you return it to the
such as telephone lines or fiber optic cables. owner.
• Take Note: Digital Convergence refers to Example: A person believes that lying is
the fact that separate communication always wrong, even if it would protect
channels for voice, video, and text are someone's feelings.
no longer needed, as all can be Ethics is the study of what is morally
transmitted through the same digital good or bad, including systematizing
networks.
and defending right and wrong fairly, regardless of personal
behavior. bias.
Example: A doctor follows medical ethics, o Schools enforce anti-bullying
which require keeping patient information policies to ensure a safe
confidential, even if they personally feel environment for all students.
they should warn someone about a
patient’s condition. Ethics in Technology & Computing:
Example: A company has a code of ethics Ethics apply to every field, including
that prevents employees from accepting computer technology.
gifts from clients, even if an employee A software developer ensures their program
personally sees no harm in it. is accessible to people with disabilities,
Application of Ethics in Society: following ethical principles of inclusivity.
Ethics help shape institutions and A cybersecurity expert refuses to hack into
ensure standards are reasonable and someone’s account, even if asked by a
well-founded. friend, because it violates ethical guidelines.
In Business The rapid changes in technology
make it hard to set fixed moral rules,
o A company follows ethical labor but ethical considerations remain vital
practices by paying fair wages in computing.
and providing a safe work
Social media platforms (Facebook, Twitter,
environment.
TikTok) are struggling to keep up with issues
o A manager avoids favoritism like misinformation, cyberbullying, and online
and ensures promotions are harassment.
based on merit, not personal
The ethical question:
relationships.
Should platforms censor harmful content, or
In Law & Government
would that violate free speech?
o Judges must follow legal ethics,
Lesson 1: Computer Ethics
ensuring fair trials even if they
personally dislike the accused. Computer ethics is about right and
wrong behaviors related to the use of
o Governments create anti-
computers, networks, and software.
corruption laws to prevent
officials from accepting bribes. Definitions of Computer Ethics
In Technology 1. James Moor – Uses the term
computer technology broadly,
o A social media platform sets
covering both hardware and software,
ethical guidelines to prevent
as well as computer networks.
misinformation and harmful
content. Example: A computer virus affects both
hardware (devices slow down) and
o Software developers ensure
networks (spreads online), making it an
their AI systems do not
ethical issue.
discriminate against certain
groups of people. 2. Deborah Johnson – Defines
computer ethics as a field that
In Education
involves:
o Teachers follow ethical
standards by grading students
Identifying ethical problems related to
computing.
Lesson 2: Ethical Theories & Concepts
Finding solutions for responsible
technology use. To develop ethical guidelines, we rely on
ethical theories that help us understand
Example: A company collects user data
right and wrong across different fields.
without permission. Should there be laws
Learning about these theories allows us to:
requiring them to ask first?
1. Understand why decisions are ethical
3. Wiki – Focuses on how computing
or unethical.
professionals should make ethical
decisions at work. 2. Justify ethical choices logically.
Example: A programmer finds a security 3. View ethical dilemmas from multiple
flaw in a banking app. Should they report it perspectives before deciding.
or use it to steal money?
Why is Computer Ethics Important?
Ethical theories provide a structured
Computer ethics is essential because it helps framework to understand, classify, and
society regulate the use of computers, defend moral reasoning.
ensuring they are used responsibly. It
protects individuals online from: Descriptive ethics focuses on studying and
explaining how people actually think and
Privacy violations (e.g., data theft, behave regarding morality.
hacking)
It does not judge whether moral beliefs or
Intellectual property theft (e.g., actions are right or wrong; it only observes
software piracy) and describes.
Cybercrimes (e.g., identity theft,
cyberbullying)
Ethical Theory Categories
Unlawful use of software
o Metaethics – Examines the origin and
As computing becomes deeply embedded in meaning of ethical principles
society—from military and government
to education and business—computer Example: Some people believe moral values
ethics becomes even more significant. come from religion (divine will), while others
argue they come from rational thought.
Case Analysis Essay Prompts
Example: A discussion on whether lying is
1. Case Study: A software company always wrong, or if it depends on cultural and
tracks user behavior without personal beliefs.
informing them. Is this ethical?
Discuss using ethical theories. o Normative Ethics – Practical task, arrive
at moral standards that regulate right
2. Case Study: A hacker exposes and wrong conduct. involve
government corruption by leaking articulating the good habits that we
classified documents. Should this should acquire, the duties that we
be considered ethical or illegal? should follow, or the consequences of
Justify your answer. our behavior on others.
3. Case Study: A student downloads Example 1: A person decides whether to
a pirated version of Microsoft return a lost wallet because it is their moral
Office instead of buying it legally. duty (deontology) or because it benefits
Is this an ethical decision? Why or society (utilitarianism).
why not?
Example 2: A company implements an anti- considers whether an action itself is
discrimination policy to uphold ethical work right or wrong.
standards.
Example: If stealing is wrong, it remains
o Applied Ethics – Uses ethical wrong even if it is done to feed a starving
theories to analyze specific moral family.
issues examining specific controversial issues,
Deontology two kinds of
Addresses real-world moral dilemmas
approaches:
Example 1: A government debates whether
Duty-based ethics states that people
AI surveillance violates privacy rights.
must follow moral rules no matter the
Example 2: A social media platform decides consequences. If lying is wrong, then it
how to handle fake news and misinformation. should never be done, even if telling
the truth causes harm. Duties also
exist in professional roles:
Universalism never-changing and Teachers must grade fairly.
universal set of standard for deciding
whether an action is ethical. "idea that Police officers must enforce the law.
ethical standards do not change with
Doctors must maintain patient
time or culture. What is considered
confidentiality.
right or wrong remains the same
everywhere, with no exceptions.” Rights-Based Ethics Every individual
has rights that must be respected.
Example: Lying is always wrong, no
Rights are considered:
matter the situation.
A right is something you are entitled
Consequentialism believe that an
to. In terms of ethics, it is the
action is right or wrong depending on
treatment you should be able to
the results of the action. The more
expect from other people.
positive effects an action has, the
Rights-based ethics are built upon four
more ethical it is considered.
claims:
Example: If telling a lie saves someone's Natural: Not created by governments.
life, then the lie is considered ethical Universal: The same everywhere.
because it led to a positive outcome. Equal: The same for all people.
Inalienable: Cannot be taken away.
Utilitarianism seeks the greatest
good for the greatest number. The An example of rights-based ethics is
most ethical choice is the one that the U.S. Declaration of Independence,
brings the greatest happiness or the which states that all people have the
least suffering to the greatest number right to life, liberty, and the pursuit of
of people. happiness. Deontologists argue that if
you claim a right for yourself, you
Example: If a doctor has one organ that must also grant it to others.
could save one patient or could be
divided to save five patients, Virtue ethics focuses on developing
utilitarianism would support saving the good character traits rather than just
five because it benefits more people. following rules. It asks, "What kind of
person should I be?" rather than "What
Deontology if someone acts with should I do?"
good intentions, their action is ethical,
even if it leads to negative Example: If honesty is a virtue, a
consequences. ethical theory that virtuous person will naturally avoid lying,
not just because rules say it is wrong but He identified four key concerns
because they value honesty. (PAPA):
How can I tell what is the “right” thing o Privacy – Who controls and
to do? protects personal data?
Ethical theories provide different ways to o Accuracy – How do we ensure
determine right and wrong: information is correct?
1. Situation (Relativism) o Property – Who owns and
profits from digital content?
o Morality depends on culture and
personal beliefs. o Accessibility – Who gets
access to technology, and is it
o Example: Some cultures see
fair?
arranged marriages as ethical,
while others do not. Technology evolves rapidly,
requiring constant updates to laws
2. Results (Consequentialism)
and ethical standards.
o Judge morality based on the
Without new rules, IT can lead to
outcome.
privacy violations, inequality, and
o Example: Stealing medicine to exploitation in ways that weren’t
save a life is ethical because it possible before.
prevents harm.
Ethics vs. Morals
3. Actions (Deontology)
Ethics and morals are similar, but
o Judge morality based on the there are slight differences:
action itself, not the result. Morals focus on whether an individual
o Example: Lying is always wrong, feels "good" or "bad."
even if it helps someone. Ethics focus on whether an action is
4. Actors (Virtue Ethics) "right" or "wrong."
o Focus on the ethical character Ethics are like institutional rules based
of the person making the on shared morals, while morals are
decision. personal beliefs.
o Example: A courageous person Breaking ethical rules leads to
will stand up against injustice. consequences (like punishment),
while violating personal morals
Lesson 3: Assumptions & Values leads to guilt or shame.
Richard Mason’s (1986) Prediction – Ethical dilemmas happen when
Social Contract & IT institutional rules conflict with
personal beliefs.
Mason warned that new
information technologies would Values and Assumptions
create challenges that existing laws
and ethics couldn’t handle. Values
Society must redefine its "social Values are the foundation for
contract"—the agreed-upon rules deciding right and wrong.
that govern rights, responsibilities, and They come from deep-rooted beliefs
interactions in a digital world. (which are convictions we accept as
true without proof).
Some people’s values come from Some unethical actions are legal
religion, culture, peers, or society, (e.g., refusing to save a drowning
while others develop them through child).
reflection and experience.
Four States of Law and Ethics
Examples: honesty, equality,
perseverance, faithfulness, Legal Not Legal
conservation of the environment. Buying software legally for
Ethical
When values are shared by a business use.
community, they become morals.
Not Raising drug prices during a
Assumptions Ethical disaster.
Assumptions are automatic beliefs
we accept as true without
Computer Ethics and Policy Vacuum
questioning.
James Moor (1985): Computer
They are based on principles
ethics deals with policy vacuums
(scientific, logical, or moral truths we
(no rules exist) and conceptual
accept).
muddles (unclear understanding).
Many assumptions go unexamined,
Policy Vacuum Example: No clear
even though they may be wrong.
rules on software ownership.
Example: We might assume a person
Conceptual Vacuum Example:
is rude when they don’t greet us, but
Before banning software piracy,
they might just be shy.
we must define what a computer
Our assumptions come from early program is.
family life, social influences, and
Computers are "logically
cultural background.
malleable" → They can be
Lesson 4: Law & Moral Issues in ICT programmed for any task.
Law and Ethics New technology = New ethical,
legal, and social challenges.
Ethics = Principles guiding
behavior.
Law = Rules enforcing values Moral and Legal Issues in ICT
(e.g., life, property protection).
1. Privacy – Digital data is
Ethics require higher moral monitored, raising concerns about
behavior than the law. informed consent.
Example: Helping a stranger is 2. Digital Ownership – Copyright
ethical, but not legally required. struggles with free information
sharing online.
Conflict Between Ethics and Law
3. Data Gathering – Government and
Some laws are unethical (e.g.,
businesses collect data; ethical
Drug War, Anti-Terrorism Act of
issue: Do people have the right to
2020).
know?
People may practice civil
4. Security Liability – Security
disobedience (e.g., 1986 EDSA
increases surveillance. Ethical
People Power Revolution).
issue: How much security is too Concerns about data collection,
much? surveillance, and protection of
personal information.
5. Access Costs – Net neutrality:
Should the internet be equally Balancing public safety with individual
available or pay-for-access? privacy rights.
Ethical handling of personal data by
governments and corporations.
Law and ethics intersect in
regulating ICT use and digital rights. Cybersecurity
Policy vacuum refers to gaps in laws Ethical obligations in protecting
addressing emerging technology systems from cyber threats.
challenges.
The dilemma of offensive
Common ICT ethical and legal cybersecurity tactics and collateral
issues: damage.
o Privacy violations (e.g., data Responsible disclosure of security
breaches, unauthorized vulnerabilities.
surveillance).
Intellectual Property
o Intellectual property
Ethics of copyrights, patents, and
concerns (e.g., software piracy,
trademarks in the digital space.
copyright infringement).
Issues of software piracy and
o Cybersecurity threats (e.g.,
plagiarism.
hacking, identity theft).
Balancing innovation and fair
o Digital divide (e.g., unequal
competition in the tech industry.
access to technology).
Digital Divide
o AI ethics (e.g., bias in machine
learning, autonomous decision- Unequal access to technology across
making). socio-economic groups.
GROUP3_Computer Ethics Reviewer Ethical responsibility in bridging
technology gaps.
Lesson 1: Introduction to Computer
Ethics Ensuring digital access promotes
equality in education and
Definition: Computer ethics is the
employment.
study of ethical principles, values, and
moral dilemmas arising from the use Artificial Intelligence
of computers and technology.
Ethical concerns in AI development,
Scope: Covers privacy, cybersecurity, including bias in algorithms.
intellectual property, the digital divide,
Issues of AI autonomy in decision-
artificial intelligence, and online
making (e.g., healthcare, law
behavior.
enforcement).
Objective: Establish guidelines for
Ensuring transparency and fairness in
responsible and ethical technology
AI applications.
use.
Social Media & Online Behavior
Key Ethical Issues in Computing
Privacy
Cyberbullying, harassment, and Example: AI in healthcare should
responsible digital communication. benefit the greatest number of
patients.
Digital citizenship: Respecting privacy,
avoiding misinformation. Deontology
Ethical use of social media platforms. Emphasizes following moral rules
regardless of outcomes.
Digital Manipulation & Misinformation
Example: Hacking is unethical even if
Ethics of deepfakes and misleading
it reveals government corruption.
digital content.
Virtue Ethics
Responsibilities of media organizations
in preventing disinformation. Focuses on moral character and
ethical behavior.
Promoting critical thinking and media
literacy. Example: A cybersecurity expert
should act with integrity when
Historical Development of Computer
handling user data.
Ethics
Rights-Based Ethics
1940s-1950s: Early computing,
ethical concerns in military and Protects digital rights such as privacy
defense use. and freedom of expression.
1960s-1970s: Ethical debates on Example: Users should have control
data privacy, intellectual property. over their personal data online.
1980s: Rise of personal computing, Social Contract Theory
hacking, and security concerns.
Establishes ethical guidelines for tech
1990s: Internet expansion, online developers and users.
privacy, and digital ethics.
Example: Companies must protect
2000s-Present: AI ethics, user privacy while collecting data.
misinformation, cybersecurity, and
The Ten Commandments of Computer
social media concerns.
Ethics
Relevance of Computer Ethics
1. Do not harm others with computers.
Protects privacy and data security.
2. Do not interfere with others' computer
Prevents cyber threats and intellectual work.
property theft.
3. Do not snoop into others’ files.
Ensures ethical AI and social media
4. Do not use computers to steal.
use.
5. Do not spread false information.
Bridges the digital divide and
promotes fairness in technology 6. Do not use software without paying.
access.
7. Do not use others’ computer resources
Ethical Theories Applied to Computer without authorization.
Ethics
8. Do not take credit for others'
Utilitarianism intellectual work.
Focuses on maximizing overall 9. Consider the social impact of your
happiness. programs.
[Link] respectful in online interactions. legal requirement to return the phone, it
is still the morally right thing to do.
Under virtue ethics, a good person
Additional Case Analysis Questions values honesty and would return the lost
with Concise Paragraph Answers item. If John chooses to keep it, he may
feel guilt, which is a moral consequence
These questions are designed to match of his decision. This case highlights how
your midterm exam format and ensure ethics guide behavior even in
you can easily recall key points when situations where there are no legal
answering them. Each answer addresses consequences. The best ethical action is
morals, ethics, values, assumptions, for John to return the phone to its rightful
ethical and legal standpoints, and owner.
ethical theories.
3. Utilitarianism in Public Health:
1. Privacy vs. Security in the Mandatory Vaccination
Workplace
A government enforces mandatory
A company tracks employees’ internet vaccinations for public safety. Some
usage without informing them to ensure individuals oppose it on personal grounds.
productivity. Is this ethical? Is the policy ethical?
Answer: Answer:
This situation presents an ethical This case applies utilitarian ethics,
dilemma between privacy and which focuses on the greatest good for
security. From an ethical standpoint, the greatest number. Mandatory
secretly monitoring employees violates vaccination protects public health by
their right to privacy, as they were not reducing the spread of disease, even if
informed about the surveillance. some individuals oppose it. From a legal
However, from a legal standpoint, some standpoint, public health laws justify
countries allow employee monitoring if it vaccination mandates to prevent
ensures security and productivity. Moral outbreaks. However, from an ethical
values such as trust and transparency perspective, it raises concerns about
are compromised when companies track personal freedom and bodily autonomy.
employees without consent. Under The ethical conflict lies in balancing
rights-based ethics, individuals have a individual rights vs. collective well-
right to privacy, and companies should being. Since vaccinations protect more
respect that. The best ethical decision people and prevent harm,
would be for the company to inform utilitarianism supports the mandate
employees about monitoring policies and as the most ethical choice.
ensure transparency in data collection.
4. Assumptions in Decision-Making
2. Moral Decision: Returning a Lost
Item A teacher assumes a quiet student is lazy
but later discovers they have a learning
John finds a lost phone on a park bench. disability. How does this relate to
He knows he can keep it without getting assumptions?
caught. What should he do?
Answer:
Answer: This case highlights how unexamined
John’s situation is a moral test of assumptions can lead to unfair
honesty and integrity. While there is no treatment. The teacher assumed the
student was lazy without understanding as hate speech or misinformation. Social
the real issue. Ethically, this is unfair, media companies have a legal and ethical
as assumptions should be based on facts responsibility to prevent harm, but they
rather than judgments. Under virtue must also ensure they do not unfairly
ethics, a fair and compassionate teacher restrict expression. Under
would take time to understand the utilitarianism, removing harmful content
student's situation before making benefits the majority, making it the
conclusions. Assumptions can lead to ethical choice. However, relativism
bias, which affects ethical decision- suggests that speech restrictions depend
making. This case emphasizes the on cultural values. The ethical balance is
importance of seeking understanding ensuring free expression while
before making judgments. protecting users from harm.
5. Ethics in Technology: Hacking for a 7. Ethical and Legal Standpoint:
Cause Digital Piracy
A hacker exposes government A student downloads a pirated version
corruption by leaking classified of Microsoft Office instead of paying for
documents. Is this ethical? it. Is this ethical?
Answer: Answer:
This case presents an ethical dilemma This case highlights an ethical and legal
between justice and legality. From a conflict. Legally, piracy is wrong
legal standpoint, hacking is illegal, even because it violates copyright laws and
if it is done for a good cause. Under intellectual property rights. Under
deontology, breaking the law is always deontology, stealing is always unethical,
wrong, regardless of the outcome. regardless of financial reasons. However,
However, under utilitarianism, exposing some argue that software should be
corruption may be justified if it benefits more affordable for students, making
society. Moral values such as truth and piracy a morally justified act under
accountability are key factors in deciding relativism. The ethical solution is to seek
whether the hacker’s actions were ethical. legal alternatives, such as free or
The ethical question is whether the discounted student versions, instead of
greater good justifies breaking the violating digital ownership rights.
law. While hacking violates privacy laws,
it could be seen as ethically justified if it
prevents harm to the public. 8. Security Liability and Privacy
A company collects customer data to
improve services but later sells it to
6. Rights-Based Ethics: Freedom of
advertisers without permission. Is this
Speech vs. Hate Speech
ethical?
A social media platform removes
Answer:
offensive posts, but some argue this limits
This case raises ethical and legal
free speech. Should they censor
concerns about privacy. Customers
content?
expect their personal data to be
Answer: protected, not sold for profit. Under
This case examines rights-based ethics rights-based ethics, individuals have
and freedom of speech. While free the right to control their personal
speech is a fundamental right, it has information. From a legal standpoint,
ethical limits when it causes harm, such data protection laws (such as GDPR)
require companies to obtain consent
before sharing data. Security liability
refers to the risks associated with data
misuse, including privacy violations.
Selling data without permission is
unethical and legally questionable, as
it breaches customer trust. The company
should have been transparent and
obtained consent before selling the data.
Final Takeaway
These case studies cover the key
concepts of morals, ethics, values,
assumptions, legal standpoints, and
ethical theories. Each answer follows a
structured ethical analysis, making
them easy to recall during an exam.
Would you like additional practice
questions or flashcards for quick
memorization? 😊