ETHICS and TECHNOLOGY Controversies, Questions, and Strategies for Ethical Computing

Total Page:16

File Type:pdf, Size:1020Kb

ETHICS and TECHNOLOGY Controversies, Questions, and Strategies for Ethical Computing FFIRS3GXML 10/20/2012 0:58:24 Page 4 FFIRS3GXML 10/20/2012 0:58:24 Page 1 FOURTH᭢ EDITION ETHICS AND TECHNOLOGY Controversies, Questions, and Strategies for Ethical Computing HERMAN T. TAVANI Rivier University FFIRS3GXML 10/20/2012 0:58:24 Page 2 VP & Executive Publisher: Donald Fowley Executive Editor: Beth Lang Golub Editorial Assistant: Katherine Willis Marketing Manager: Chris Ruel Marketing Assistant: Marissa Carroll Associate Production Manager: Joyce Poh Production Editor: Jolene Ling Designer: Kenji Ngieng Cover Photo Credit: Bernhard Lang/Getty Images, Inc. Production Management Services: Thomson Digital This book was set in 10/12 TimesTenLTStd-Roman by Thomson Digital, and printed and bound by Edwards Brothers Malloy. The cover was printed by Edwards Brothers Malloy. This book is printed on acid free paper. Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the communities we serve and where we live and work. In 2008, we launched a Corporate Citizenship Initiative, a global effort to address the environmental, social, economic, and ethical challenges we face in our business. Among the issues we are addressing are carbon impact, paper specifications and procurement, ethical conduct within our business and among our vendors, and community and charitable support. For more information, please visit our website: www.wiley.com/go/citizenship. Copyright # 2013, 2011, 2007, 2004 John Wiley & Sons, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030- 5774, (201)748-6011, fax (201)748-6008, website http://www.wiley.com/go/permissions. Evaluation copies are provided to qualified academics and professionals for review purposes only, for use in their courses during the next academic year. These copies are licensed and may not be sold or transferred to a third party. Upon completion of the review period, please return the evaluation copy to Wiley. Return instructions and a free of charge return mailing label are available at www.wiley.com/go/returnlabel. If you have chosen to adopt this textbook for use in your course, please accept this book as your complimentary desk copy. Outside of the United States, please contact your local sales representative. Library of Congress Cataloging-in-Publication Data Tavani, Herman T. Ethics and technology : controversies, questions, and strategies for ethical computing / Herman T. Tavani, Rivier University—Fourth edition. pages cm Includes bibliographical references and index. ISBN 978-1-118-28172-7 (pbk.) 1. Computer networks—Moral and ethical aspects. I. Title. TK5105.5.T385 2013 175—dc23 2012028589 Printed in the United States of America 10987654321 FFIRS3GXML 10/20/2012 0:58:24 Page 3 In memory of my grandparents, Leon and Marian (Roberts) Hutton, and Antonio and Clelia (Giamberardino) Tavani FFIRS3GXML 10/20/2012 0:58:24 Page 4 FTOC3GXML 10/20/2012 1:3:1 Page 5 ᭢ CONTENTS AT A GLANCE PREFACE xvii ACKNOWLEDGMENTS xxvii FOREWORD xxix CHAPTER 1. INTRODUCTION TO CYBERETHICS: CONCEPTS, PERSPECTIVES, AND METHODOLOGICAL FRAMEWORKS 1 CHAPTER 2. ETHICAL CONCEPTS AND ETHICAL THEORIES: ESTABLISHING AND JUSTIFYING A MORAL SYSTEM 33 CHAPTER 3. CRITICAL REASONING SKILLS FOR EVALUATING DISPUTES IN CYBERETHICS 74 CHAPTER 4. PROFESSIONAL ETHICS, CODES OF CONDUCT, AND MORAL RESPONSIBILITY 101 CHAPTER 5. PRIVACY AND CYBERSPACE 131 CHAPTER 6. SECURITY IN CYBERSPACE 174 CHAPTER 7. CYBERCRIME AND CYBER-RELATED CRIMES 201 CHAPTER 8. INTELLECTUAL PROPERTY DISPUTES IN CYBERSPACE 230 CHAPTER 9. REGULATING COMMERCE AND SPEECH IN CYBERSPACE 269 CHAPTER 10. THE DIGITAL DIVIDE, DEMOCRACY, AND WORK 303 CHAPTER 11. ONLINE COMMUNITIES, CYBER IDENTITIES, AND SOCIAL NETWORKS 337 CHAPTER 12. ETHICAL ASPECTS OF EMERGING AND CONVERGING TECHNOLOGIES 368 GLOSSARY 411 INDEX 417 v FTOC3GXML 10/20/2012 1:3:1 Page 6 FTOC3GXML 10/20/2012 1:3:1 Page 7 ᭢ TABLE OF CONTENTS PREFACE xvii New to the Fourth Edition xviii Audience and Scope xix Organization and Structure of the Book xxi The Web Site for Ethics and Technology xxiii A Note to Students xxiv Note to Instructors: A Roadmap for Using This Book xxiv A Note to Computer Science Instructors xxv ACKNOWLEDGMENTS xxvii FOREWORD xxix c CHAPTER 1 INTRODUCTION TO CYBERETHICS: CONCEPTS, PERSPECTIVES, AND METHODOLOGICAL FRAMEWORKS 1 Scenario 1–1: A Fatal Cyberbullying Incident on MySpace 1 Scenario 1–2: Contesting the Ownership of a Twitter Account 2 Scenario 1–3: “The Washingtonienne” Blogger 2 1.1 Defining Key Terms: Cyberethics and Cybertechnology 3 1.1.1 What Is Cybertechnology? 4 1.1.2 Why the Term Cyberethics? 5 1.2 The Cyberethics Evolution: Four Developmental Phases in Cybertechnology 6 1.3 Are Cyberethics Issues Unique Ethical Issues? 9 Scenario 1–4: Developing the Code for a Computerized Weapon System 10 Scenario 1–5: Digital Piracy 11 1.3.1 Distinguishing between Unique Technological Features and Unique Ethical Issues 11 1.3.2 An Alternative Strategy for Analyzing the Debate about the Uniqueness of Cyberethics Issues 12 1.3.3 A Policy Vacuum in Duplicating Computer Software 13 1.4 Cyberethics as a Branch of Applied Ethics: Three Distinct Perspectives 14 1.4.1 Perspective #1: Cyberethics as a Field of Professional Ethics 15 1.4.2 Perspective #2: Cyberethics as a Field of Philosophical Ethics 18 1.4.3 Perspective #3: Cyberethics as a Field of Sociological/Descriptive Ethics 21 Scenario 1–6: The Impact of Technology X on the Pleasantville Community 21 1.5 A Comprehensive Cyberethics Methodology 24 1.5.1 A “Disclosive” Method for Cyberethics 25 1.5.2 An Interdisciplinary and Multilevel Method for Analyzing Cyberethics Issues 26 1.6 A Comprehensive Strategy for Approaching Cyberethics Issues 27 1.7 Chapter Summary 28 vii FTOC3GXML 10/20/2012 1:3:1 Page 8 viii c Table of Contents Review Questions 28 Discussion Questions 29 Essay/Presentation Questions 29 Scenarios for Analysis 29 Endnotes 30 References 31 Further Readings 32 Online Resources 32 c CHAPTER 2 ETHICAL CONCEPTS AND ETHICAL THEORIES: ESTABLISHING AND JUSTIFYING A MORAL SYSTEM 33 2.1 Ethics and Morality 33 Scenario 2–1: The “Runaway Trolley”: A Classic Moral Dilemma 34 2.1.1 What Is Morality? 35 2.1.2 Deriving and Justifying the Rules and Principles of a Moral System 38 2.2 Discussion Stoppers as Roadblocks to Moral Discourse 42 2.2.1 Discussion Stopper #1: People Disagree on Solutions to Moral Issues 43 2.2.2 Discussion Stopper #2: Who Am I to Judge Others? 45 2.2.3 Discussion Stopper #3: Morality Is Simply a Private Matter 47 2.2.4 Discussion Stopper #4: Morality Is Simply a Matter for Individual Cultures to Decide 48 Scenario 2–2: The Perils of Moral Relativism 49 2.3 Why Do We Need Ethical Theories? 52 2.4 Consequence-Based Ethical Theories 53 2.4.1 Act Utilitarianism 55 Scenario 2–3: A Controversial Policy in Newmerica 55 2.4.2 Rule Utilitarianism 55 2.5 Duty-Based Ethical Theories 56 2.5.1 Rule Deontology 57 Scenario 2–4: Making an Exception for Oneself 58 2.5.2 Act Deontology 59 Scenario 2–5: A Dilemma Involving Conflicting Duties 60 2.6 Contract-Based Ethical Theories 61 2.6.1 Some Criticisms of Contract-Based Theories 62 2.6.2 Rights-Based Contract Theories 63 2.7 Character-Based Ethical Theories 64 2.7.1 Being a Moral Person vs. Following Moral Rules 64 2.7.2 Acquiring the “Correct” Habits 65 2.8 Integrating Aspects of Classical Ethical Theories into a Single Comprehensive Theory 66 2.8.1 Moor’s Just-Consequentialist Theory and Its Application to Cybertechnology 67 2.8.2 Key Elements in Moor’s Just-Consequentialist Framework 69 2.9 Chapter Summary 70 Review Questions 70 Discussion Questions 71 Essay/Presentation Questions 71 Scenarios for Analysis 72 Endnotes 72 FTOC3GXML 10/20/2012 1:3:2 Page 9 Table of Contents b ix References 73 Further Readings 73 c CHAPTER 3 CRITICAL REASONING SKILLS FOR EVALUATING DISPUTES IN CYBERETHICS 74 3.1 Getting Started 74 Scenario 3–1: Reasoning About Whether to Download a File from “Sharester” 75 3.1.1 Defining Two Key Terms in Critical Reasoning: Claims and Arguments 75 3.1.2 The Role of Arguments in Defending Claims 76 3.1.3 The Basic Structure of an Argument 76 3.2 Constructing an Argument 78 3.3 Valid Arguments 80 3.4 Sound Arguments 83 3.5 Invalid Arguments 85 3.6 Inductive Arguments 86 3.7 Fallacious Arguments 87 3.8 A Seven-Step Strategy for Evaluating Arguments 89 3.9 Identifying Some Common Fallacies 91 3.9.1 Ad Hominem Argument 92 3.9.2 Slippery Slope Argument 92 3.9.3 Fallacy of Appeal to Authority 93 3.9.4 False Cause Fallacy 93 3.9.5 Begging the Question 94 3.9.6 Fallacy of Composition/Fallacy of Division 94 3.9.7 Fallacy of Ambiguity/Equivocation 95 3.9.8 Appeal to the People (Argumentum ad Populum) 95 3.9.9 The Many/Any Fallacy 96 3.9.10 The Virtuality Fallacy 97 3.10 Chapter Summary 98 Review Questions 98 Discussion
Recommended publications
  • The BG News July 19, 2000
    Bowling Green State University ScholarWorks@BGSU BG News (Student Newspaper) University Publications 7-19-2000 The BG News July 19, 2000 Bowling Green State University Follow this and additional works at: https://scholarworks.bgsu.edu/bg-news Recommended Citation Bowling Green State University, "The BG News July 19, 2000" (2000). BG News (Student Newspaper). 6663. https://scholarworks.bgsu.edu/bg-news/6663 This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License. This Article is brought to you for free and open access by the University Publications at ScholarWorks@BGSU. It has been accepted for inclusion in BG News (Student Newspaper) by an authorized administrator of ScholarWorks@BGSU. PUT A LITTLE LOVE IN YOUR HEART: Wednesdoy, July 19 - Tuesday, July 25 ROMANCE CONFERENCE AT BGSU CLOUDY HIGH: 75 LOW: 55 mem 7 VOLUME 88 ISSUE 44 A WEEKLY INDEPENDENT STUDENT PRESS BOWIINC Gum Sun Umvmirr OPINION & EDITORIAL CAMPUS NEWS ENTERTAINMENT 2 Learn from the past 4 Find out what issues minority students face 8 Review the Third Eye Blind concert Diversity plan to benefit the campus University seeks to better social relations through education and organizing APRIL KI.I.IOI I items that the University will •prilk0bg|wt.bgM> «lii "The plan is to continue to work on well into THE BG HEWS ensure that we the future. If asked what the definition This new diversity plan of diversity was, what would you don't overlook any- reemphasizes the Board of say? Everyone would have a dif- one who can enrich lercnl response. Diversity is a student experiences Trustees resolution that reaf- word that encompasses a wide firmed their previous commit- variety of ideas.
    [Show full text]
  • Reflections on Cyberethics Education for Millennial Software Engineers
    Reflections on Cyberethics Education for Millennial Software Engineers Claudia de O. Melo Thiago C. de Sousa Faculty of Technology Urbanism and Technology Center University of Bras´ılia State University of Piau´ı Bras´ılia, Brazil Teresina, Brazil Email: [email protected] Email: [email protected] Abstract—Software is a key component of solutions for challenges to educating millennial software engineers, which 21st Century problems. These problems are often “wicked”, requires continuous innovation in educational systems and complex, and unpredictable. To provide the best possible solution, curricula delivery [2], [7]. millennial software engineers must be prepared to make ethical decisions, thinking critically, and acting systematically. This Moreover, the design of software systems comes with reality demands continuous changes in educational systems and a special set of responsibilities to society that are much curricula delivery, as misjudgment might have serious social broader than those described in existing codes of ethics for impact. This study aims to investigate and reflect on Software computing professionals [8]. While the potential return on Engineering (SE) Programs, proposing a conceptual framework investment in technology is usually high, the increasing pace for analyzing cyberethics education and a set of suggestions on how to integrate it into the SE undergraduate curriculum. of technological innovation raises ethical questions about its development and use [9]. Information and Communications Keywords-cyberethics; millennial software
    [Show full text]
  • The Society of Enhanced Legal Scholars, Seven of Nine, and Some Regulatory Challenges for Future Generations by Roger Brownsword
    The Society of Enhanced Legal Scholars, Seven of Nine, and some regulatory challenges for future generations by Roger Brownsword INTRODUCTION REGULATORY LEGITIMACY: THREE evelopments in information and communication SCHOOLS OF THOUGHT technologies have transformed the way that Where human enhancement is simply cheating by Dlawyers work. Nowadays, the electronic resources another name, we should obviously take a negative view. are so swift, comprehensive and convenient that However, if the rules permit enhancement, or if the researching the law only occasionally involves consulting situation is not competitive, is a negative view still the hard copy sources in the library. Imagine, though, that appropriate? If regulators permit (even encourage) further developments of this kind, coupled with physical and intellectual improvement, why prohibit developments in biotechnologies and nanotechnologies, as technologies for human enhancement? Does it make sense, well as in human brain/machine interfacing, reach a stage for example, to argue that regulators should permit the at which all legal source materials are on a tiny chip connected to the human brain. With such enabling application of technologies to correct impairment (such as technology, the lawyers of the future will be more than failing eyesight) but not to enhance human capacities (for advanced, they will be enhanced. Should we welcome example, to equip a person with X-ray or all-round vision)? enhancing developments of this kind? Should we try to How do we sort out the ethical wheat from the chaff? resist them or confine them? How should regulators What is the appropriate standard of regulatory legitimacy? respond? What kind of regulatory environment should be Broadly speaking, ethical argument adopts one of three set for a community of potentially enhanced citizens, basic forms: namely, goal-orientated (consequentialism), lawyers, and law-enforcers? rights-based and duty-based forms.
    [Show full text]
  • Ecological Economics and Sustainable Development, Selected Essays of Herman Daly ADVANCES in ECOLOGICAL ECONOMICS Series Editor:Jeroen C.J.M
    Ecological Economics and Sustainable Development, Selected Essays of Herman Daly ADVANCES IN ECOLOGICAL ECONOMICS Series Editor:Jeroen C.J.M. van den Bergh, ICREA Professor, Universitat Autònoma de Barcelona, Spain and Professor of Environmental and Resource Economics, Vrije Universiteit, Amsterdam, The Netherlands Founding Editor:Robert Costanza, Director, University of Maryland Institute for Ecological Economics and Professor, Center for Environmental and Estuarine Studies and Zoology Department, USA This important series makes a significant contribution to the development of the principles and practices of ecological economics, a field which has expanded dra- matically in recent years. The series provides an invaluable forum for the publica- tion of high quality work and shows how ecological economic analysis can make a contribution to understanding and resolving important problems. The main emphasis of the series is on the development and application of new original ideas in ecological economics. International in its approach, it includes some of the best theoretical and empirical work in the field with contributions to funda- mental principles, rigorous evaluations of existing concepts, historical surveys and future visions. It seeks to address some of the most important theoretical questions and gives policy solutions for the ecological problems confronting the global village as we move into the twenty-first century. Titles in the series include: Economic Growth, Material Flows and the Environment New Applications of Structural Decomposition Analysis and Physical Input–Output Tables Rutger Hoekstra Joint Production and Responsibility in Ecological Economics On the Foundations of Environmental Policy Stefan Baumgärtner, Malte Faber and Johannes Schiller Frontiers in Ecological Economic Theory and Application Edited by Jon D.
    [Show full text]
  • Between Enforcement and Regulation
    Katharina Voss Between Enforcement and Regulation A Study of the System of Case Resolution Mechanisms Used by the Between Enforcement and Regulation Between European Commission in the Enforcement of Articles 101 and 102 TFEU Katharina Voss ISBN 978-91-7797-570-0 Department of Law Doctoral Thesis in European Law at Stockholm University, Sweden 2019 Between Enforcement and Regulation A Study of the System of Case Resolution Mechanisms Used by the European Commission in the Enforcement of Articles 101 and 102 TFEU Katharina Voss Academic dissertation for the Degree of Doctor of Laws in European Law at Stockholm University to be publicly defended on Friday 12 April 2019 at 10.00 in Nordenskiöldsalen, Geovetenskapens hus, Svante Arrhenius väg 12. Abstract This thesis examines the current design of the system of case resolution mechanisms used by the European Commission (the Commission) where an infringement of Articles 101 and 102 TFEU is suspected and advances some proposals regarding this design. Infringements of Articles 101 and 102 TFEU cause considerable damage to the EU economy and ultimately, to consumers. Despite intensified enforcement of Articles 101 and 102 TFEU and ever-growing fines imposed for such infringements, the Commission continues to discover new infringements, which indicates a widespread non-compliance with EU competition rules. This raises the question of whether the enforcement currently carried out by the Commission is suitable for achieving compliance with Articles 101 and 102 TFEU. The thesis is divided into four main parts: First, the objectives pursued by the system of case resolution mechanisms used by the Commission are identified.
    [Show full text]
  • The Fourth Paradigm
    ABOUT THE FOURTH PARADIGM This book presents the first broad look at the rapidly emerging field of data- THE FOUR intensive science, with the goal of influencing the worldwide scientific and com- puting research communities and inspiring the next generation of scientists. Increasingly, scientific breakthroughs will be powered by advanced computing capabilities that help researchers manipulate and explore massive datasets. The speed at which any given scientific discipline advances will depend on how well its researchers collaborate with one another, and with technologists, in areas of eScience such as databases, workflow management, visualization, and cloud- computing technologies. This collection of essays expands on the vision of pio- T neering computer scientist Jim Gray for a new, fourth paradigm of discovery based H PARADIGM on data-intensive science and offers insights into how it can be fully realized. “The impact of Jim Gray’s thinking is continuing to get people to think in a new way about how data and software are redefining what it means to do science.” —Bill GaTES “I often tell people working in eScience that they aren’t in this field because they are visionaries or super-intelligent—it’s because they care about science The and they are alive now. It is about technology changing the world, and science taking advantage of it, to do more and do better.” —RhyS FRANCIS, AUSTRALIAN eRESEARCH INFRASTRUCTURE COUNCIL F OURTH “One of the greatest challenges for 21st-century science is how we respond to this new era of data-intensive
    [Show full text]
  • OECD‘S Directorate for Science Technology and Industry
    THE ECONOMIC AND SOCIAL ROLE OF INTERNET INTERMEDIARIES APRIL 2010 2 FOREWORD FOREWORD This report is Part I of the larger project on Internet intermediaries. It develops a common definition and understanding of what Internet intermediaries are, of their economic function and economic models, of recent market developments, and discusses the economic and social uses that these actors satisfy. The overall goal of the horizontal report of the Committee for Information, Computer and Communications Policy (ICCP) is to obtain a comprehensive view of Internet intermediaries, their economic and social function, development and prospects, benefits and costs, and responsibilities. It corresponds to the item on 'Forging Partnerships for Advancing Policy Objectives for the Internet Economy' in the Committee‘s work programme. This report was prepared by Ms. Karine Perset of the OECD‘s Directorate for Science Technology and Industry. It was declassified by the ICCP Committee at its 59th Session in March 2010. It was originally issued under the code DSTI/ICCP(2009)9/FINAL. Issued under the responsibility of the Secretary-General of the OECD. The opinions expressed and arguments employed herein do not necessarily reflect the official views of the OECD member countries. ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of 30 democracies work together to address the economic, social and environmental challenges of globalisation. The OECD is also at the forefront of efforts to understand and to help governments respond to new developments and concerns, such as corporate governance, the information economy and the challenges of an ageing population.
    [Show full text]
  • An Introduction to Cybersecurity Ethics MODULE AUTHOR: Shannon Vallor, Ph.D
    An Introduction to Cybersecurity Ethics MODULE AUTHOR: Shannon Vallor, Ph.D. William J. Rewak, S.J. Professor of Philosophy, Santa Clara University TABLE OF CONTENTS Introduction 2-6 PART ONE: What are the important ethical issues in cybersecurity? 7-12 Case Study 1 13-15 PART TWO: Common ethical challenges for cybersecurity professionals 15-21 Case Study 2 21-24 Case Study 3 24-28 PART THREE: What are cybersecurity professionals’ obligations to the public? 29-34 Case Study 4 34-38 PART FOUR: What ethical frameworks can guide cybersecurity practice? 38-47 PART FIVE: What are ethical best practices in cybersecurity? 48-56 Case Study 5 57-60 Case Study 6 60-61 APPENDIX A: Relevant Professional Ethics Codes & Guidelines (Links) 62 APPENDIX B: Bibliography/Further Reading 63-65 1 An Introduction to Cybersecurity Ethics MODULE AUTHOR: Shannon Vallor, Ph.D. William J. Rewak, S.J. Professor of Philosophy, Santa Clara University 1. What do we mean when we talk about ‘ethics’? Ethics in the broadest sense refers to the concern that humans have always had for figuring out how best to live. The philosopher Socrates is quoted as saying in 399 B.C. that “the most important thing is not life, but the good life.”1 We would all like to avoid a bad life, one that is shameful and sad, fundamentally lacking in worthy achievements, unredeemed by love, kindness, beauty, friendship, courage, honor, joy, or grace. Yet what is the best way to obtain the opposite of this – a life that is not only acceptable, but even excellent and worthy of admiration? How do we identify a good life, one worth choosing from among all the different ways of living that lay open to us? This is the question that the study of ethics attempts to answer.
    [Show full text]
  • Protecting the Crown: a Century of Resource Management in Glacier National Park
    Protecting the Crown A Century of Resource Management in Glacier National Park Rocky Mountains Cooperative Ecosystem Studies Unit (RM-CESU) RM-CESU Cooperative Agreement H2380040001 (WASO) RM-CESU Task Agreement J1434080053 Theodore Catton, Principal Investigator University of Montana Department of History Missoula, Montana 59812 Diane Krahe, Researcher University of Montana Department of History Missoula, Montana 59812 Deirdre K. Shaw NPS Key Official and Curator Glacier National Park West Glacier, Montana 59936 June 2011 Table of Contents List of Maps and Photographs v Introduction: Protecting the Crown 1 Chapter 1: A Homeland and a Frontier 5 Chapter 2: A Reservoir of Nature 23 Chapter 3: A Complete Sanctuary 57 Chapter 4: A Vignette of Primitive America 103 Chapter 5: A Sustainable Ecosystem 179 Conclusion: Preserving Different Natures 245 Bibliography 249 Index 261 List of Maps and Photographs MAPS Glacier National Park 22 Threats to Glacier National Park 168 PHOTOGRAPHS Cover - hikers going to Grinnell Glacier, 1930s, HPC 001581 Introduction – Three buses on Going-to-the-Sun Road, 1937, GNPA 11829 1 1.1 Two Cultural Legacies – McDonald family, GNPA 64 5 1.2 Indian Use and Occupancy – unidentified couple by lake, GNPA 24 7 1.3 Scientific Exploration – George B. Grinnell, Web 12 1.4 New Forms of Resource Use – group with stringer of fish, GNPA 551 14 2.1 A Foundation in Law – ranger at check station, GNPA 2874 23 2.2 An Emphasis on Law Enforcement – two park employees on hotel porch, 1915 HPC 001037 25 2.3 Stocking the Park – men with dead mountain lions, GNPA 9199 31 2.4 Balancing Preservation and Use – road-building contractors, 1924, GNPA 304 40 2.5 Forest Protection – Half Moon Fire, 1929, GNPA 11818 45 2.6 Properties on Lake McDonald – cabin in Apgar, Web 54 3.1 A Background of Construction – gas shovel, GTSR, 1937, GNPA 11647 57 3.2 Wildlife Studies in the 1930s – George M.
    [Show full text]
  • Open Dissertationdraft3.Pdf
    The Pennsylvania State University The Graduate School College of Information Sciences and Technology SUPPORTING THE USER EXPERIENCE IN FREE/LIBRE/OPEN SOURCE SOFTWARE DEVELOPMENT A Dissertation in Information Sciences and Technology by Paula M. Bach © 2009 Paula M. Bach Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy August 2009 The dissertation of Paula M. Bach was reviewed and approved* by the following: John M. Carroll Professor of Information Sciences and Technology Dissertation Advisor Chair of Committee Mary Beth Rosson Professor of Information Sciences and Technology Andrea Tapia Assistant Professor of Information Sciences and Technology Allison Carr-Chellman Professor of Instructional Systems Steven Haynes Professor of Practice of Information Sciences and Technology John Yen Professor of Information Sciences and Technology Associate Dean for Research and Graduate Programs *Signatures are on file in the Graduate School iii ABSTRACT With the increasing number and awareness of free/libre/open source software (FLOSS) projects, Internet users can download a FLOSS tool that meets just about any need. The user experience of projects, however, varies greatly and identifying FLOSS projects that offer a positive user experience (UX) is challenging. FLOSS projects center on software developer activities with little attention to user-centered design activities that could increase the user experience on the project. The purpose of this dissertation is to understand open source software ecology in order to bring support for user experience design activities on FLOSS projects. CodePlex, an open source project hosting website, serves as the open source software ecology. The research consists of two phases, a descriptive science phase and a design science phase.
    [Show full text]
  • Untitled Spreadsheet
    Founded in 2002, Light In The Attic is a leading archival reissue label, distribution company, and creative house with offices in Seattle and Los Angeles. They earned their reputation as the quintessential champion of the underdog through their grassroots success with Rodriguez and the soundtrack to the Academy Award®-winning documentary SEARCHING FOR SUGAR MAN (2012). Since then, LITA has gone on to garner nominations for multiple GRAMMY Awards, including one for Best Historical Album for Native North America (Vol. 1) (2015). Their exuberance and dedication to spreading joy through music has propelled them through the release of 200+ titles worldwide, setting the pace for reissue labels and the archival process. From D’Angelo to Donnie & Joe Emerson, Jim Sullivan to Serge Gainsbourg, Betty Davis to Karen Dalton, Lewis to Lifetones, the list goes on and on. In addition to the label’s acclaimed output, the company operates a thriving and rapidly growing distribution business and is home to nearly 150 like-minded labels including heavyweights MONDO / Death Waltz, iam8bit, Tidal Waves, and more. True to their record-loving roots, Light In The Attic also maintains a thriving physical brick and mortar record store inside the KEXP Gathering Space in Seattle. PRE-ORDER before 30th April 2020 Underlined texts been hyperlinked to it's webpage ETA are on May 2020 unless is stated otherwise For more new arrivals, pre-orders and merch, do visit www.tandangstore.com BENNY SOEBARDJA W I C The Lizard Years 2xCD STRAWBERRY RAIN RECORDS K E psych rock
    [Show full text]
  • Lessons from the Sony CD DRM Episode
    Lessons from the Sony CD DRM Episode J. Alex Halderman and Edward W. Felten Center for Information Technology Policy Department of Computer Science Princeton University Abstract system called XCP that had been installed when he in- In the fall of 2005, problems discovered in two Sony- serted a Sony-BMG music CD into his computer’s CD BMG compact disc copy protection systems, XCP and drive. MediaMax, triggered a public uproar that ultimately led News of Russinovich’s discovery circulated rapidly on to class-action litigation and the recall of millions of the Internet, and further revelations soon followed, from discs. We present an in-depth analysis of these technolo- us,1 from Russinovich, and from others. It was discov- gies, including their design, implementation, and deploy- ered that the XCP rootkit makes users’ systems more ment. The systems are surprisingly complex and suffer vulnerable to attacks, that both CD DRM schemes install from a diverse array of flaws that weaken their content risky software components without obtaining informed protection and expose users to serious security and pri- consent from users, that both systems covertly transmit vacy risks. Their complexity, and their failure, makes usage information back to the vendor or the music label, them an interesting case study of digital rights manage- and that none of the protected discs include tools for unin- ment that carries valuable lessons for content companies, stalling the software. (For these reasons, both XCP and DRM vendors, policymakers, end users, and the security MediaMax seem to meet the consensus definition of spy- community. ware.) These and other findings outraged many users.
    [Show full text]