Course Reader – ECS 188 – Ethics in an Age of Technology

This ever-evolving course reader has been assembled by Prof. Phillip Rogaway for use in UC Davis course ECS 188, Ethics in an Age of Technology. Much of the material is password protected; see the copyright notice at the bottom of the page.

    Forward
  1. A Brief Note to the Student by Phillip Rogaway. January 2013.
  2. A Framework for Thinking Ethically by Manuel Velasquez et al., Santa Clara University. May 2009.
    Sociological Perspectives
  3. Five Things We Need to Know About Technological Change by Neil Postman. Speech given in Denver, Colorado, USA. March 27, 1998.
  4. Views of Technology (scan) by Ian Barbour. From Chapter 1 of Ethics in an Age of Technology (The Gifford Lectures, 1989–1991, Volume 2), HarperCollins, 1993.
  5. Do Machines Make History? (scan) by Robert L Heilbroner. Technology and Culture, vol. 8, pp. 335–345, July 1967.
  6. Do Artifacts have Politics? by Langdon Winner. From The Whale and the Reactor, The University of Chicago Press, 1984. Earlier version from Daedalus, Vol. 109, No. 1, Winter 1980.
  7. Do Politics have Artefacts? by Bernward Joerges. From Social Studies of Science, vol. 29, no. 3, pp. 411-431, 1999.
  8. McLuhan Interview with Marshal McLuhan. From Playboy, 1969. Some helpful vocabulary for this reading.
  9. Industrial Society and Technological Systems (scan) by Ruth Schwartz Cowan. From A Social History of American Technology, pp. 149–172, 1997.
    Engineering Perspectives
  10. Why the Future Doesn’t Need Us by Bill Joy. Appeared in Wired, issue 8.04, April 2000.
  11. Promise and Peril by Ray Kurzweil. Appeared in Interactive Week, April 23, 2000.
  12. Technology and Social Justice by Freeman Dyson. The fourth Louis Nizer Lecture on Public Policy, November 5, 1997.
    Economic Perspectives
  13. The Lexus and the Olive Tree (scan) by Thomas Friedman. A selection (13 pages) from Friedman’s book of the same title, including portions of Chapters 1, 3, and 12. Anchor Books, Random House, 1999.
  14. The Lexus and the Olive Tree Revisited (not yet OCR’d) by Ha-Joon Chang. Chapter 1 from Bad Samaritans: The Myth of Free Trade and the Secret History of Capitalism. Bloomsbury Press, 2008.
  15. A Road Map for Natural Capitalism (original) by Amory B. Lovins, L. Hunter Lovins, and Paul Hawken, Harvard Business Review, May-June, 1999.
  16. Readings from Making Globalization Work by Joseph Stiglitz: ch1 (Another World is Possible), ch4 (Patents, Profits, and People), ch6 (Saving the Planet), ch7 (The Multinational Company).
    Philosophical Perspectives
  17. Philosophical Ethics (scan) by Deborah Johnson. Chapter 2 from Computer Ethics, Prentice Hall, 2001. Current edition (2009).
  18. The Altered Nature of Human Action (scan) by Hans Jonas. Chapter 1 from The Imperative of Responsibility. University of Chicago Press, 1985. Some helpful vocabulary for this reading.
  19. The Question Concerning Technology (scan) by Martin Heidegger (1954/1977). For help, see Prof. John Zuern’s web pages on this essay.
  20. Technological Subversion by David Strong. From Crazy Mountains: Learning from Wilderness to Weigh Technology. State University of New York Press, 1995. Not yet OCR’d.
  21. War (original URL) by Brian Orend. In the Stanford Encyclopedia of Philosophy. First published Feb 4, 2000; last revised July 28, 2005.
  22. Farewell Address to the Nation by Dwight D. Eisenhower January 17, 1961. A very short reading to pair with the film “Why We Fight”
  23. The Land Ethic by Aldo Leopold. From A Sand County Almanac, 1949.
    Environmental Perspectives
  24. Oldest Living Tree Tells All by M. Cohen. Terrain.org: A Journal of the Build & Natural Environments. No. 14, Winter/Spring 2004.
  25. The Tragedy of the Commons (scan) (text) by Garrett Hardin. Science, vol. 168, pp. 1243–1248, December 13, 1968.
  26. The World as a Polder: What Does It All Mean to Us Today? by Jared Diamond. Chapter 16 from Collapse: How Societies Chose to Fail or Succeed, Viking Penguin, 2005. Not yet OCR’d
  27. This was a Crime (scan) by Mart Hersgaard. Chapter 10 Hot: Living Through the Next Fifty Years on Earth. (Replacing: We Haven’t Done a Damned Thing by Eric Pooley. Chapter 1 from The Climate Wars: True Believers, Power Brokers, and the Fight to Save the Earth. Hyperion, 2010.)
    Food
  28. Moving Beyond Fast Food Nation (video), with Peter Singer and Eric Schlosser. From a conference on "Food, Ethics & the Environment", Princeton University, November 2006.
    Also: an interview with Michael Pollan by Marc Eisen from The Progressive, November 2008.
    Intellectual Property
  29. The Public Domain: Enclosing the Commons of the Mind (author’s website) by James Boyle. Yale University Press, 2008. Also available in print. Thanks to the author for making his entire book available on-line, under a CC license.
  30. The GNU Manifesto (original URL) by Richard Stallman. 1985.
  31. The Darknet and the Future of Content Distribution. By Peter Biddle, Paul England, Marcus Peinado, and Bryan Willman. Proc. of the 2002 ACM Workshop on Digital Rights Management.
  32. Microsoft Research DRM Talk by Cory Doctorow, 2004.
  33. Patents, Profits, and People by Joseph Stiglitz: From Making Globalization Work.
    Whistle Blowing, Conceptions of Self, Hidden Law
  34. How We See Ourselves and How We See Others by Emily Pronin. Science, vol 320, May 30, 2008.
  35. Some Paradoxes of Whistle Blowing by Michael Davis. Journal of Business & Professional Ethics, 1996.
  36. Law and Disorder: Why too much due process is a dangerous thing by Jonathan Rauch. The New Republic, April 30, 2001.
    Privacy
  37. Yes, you are being watched: assorted articles from The Guaradian: Verizon (2013.06.2013), FISA courts (2013.06.20), NSA data mining (2013.06.27), Bugging Europe (2013.06.30), Microsoft (2013.07.11), The fate of Internet (2013.07.28), How spy agencies defeat security mechanisms (2013.09.06), Taking back the Internet by Bruce Schneier (2013.09.05); and Videos: 1, 2. Further commentary: Information Consumerism by Evgeny Morozov (FAZ, 2013.07.24); The Secret War by James Bamford (Wired, 2013.06.12); The Paranoid State by Sarah Kendzior (Aljazeera, 2013.08.05)
  38. White-house response: Administration White Paper: Bulk Collection of Telephony Metadata under Section 215 of the USA Patriot Act. August 9, 2013.
  39. The Transparent Society by David Brin. From Wired Magazine, Issue 4.12, December 1996. See the author’s book (1998) for a fuller treatment.
  40. Against Transparency by Lawrence Lessig. New Republic, March 27, 2013.
  41. Beyond Google and Evil: How policy makers, journalists and consumers should talk differently about Google and privacy by Chris Jay Hoofnagle. First Monday, 14(4), 6 April 2009.
    Incidents
  42. Bhopal Lives by Suketu Mehta. Appeared in The Village Voice on Dec 3, 1996 and on Dec 10, 1996. CNN photos
  43. The Therac-25 Accidents by Nancy G. Leveson. Appears on the author’s website and as Appendix A of Safeware: System Safety and Computers, Addison-Wesley Professional, 1995. For a shorter version: Therac-25 Case Materials, from ComputingCases.org.
  44. The Fifty-Nine-Story Crisis (OCR-produced html) by Joe Morgenstern. The New Yorker, May 29, 1995, pp. 45–53.
    Psychological Perspectives
  45. Technology and Happiness by James Surowiecki. From Technology Review, 2005.
    For a broader discussion, see: Happiness: has social science a clue? By Richard Layard. Transcript of three lectures presented at the London School of Economics, March 3-5, 2003.
  46. Can Psychology be Taught? by Daniel Kahneman. From Thinking, Fast and Slow, Chapter 16, pp. 170-174. Farrar, Straus and Giroux, 2011.
  47. Computers, Ethics, and Collective Violence (scan) by Craig Summers and Eric Markusen. Journal of Systems and Software, vol. 17, pp. 91–103, 1992.
    Our Profession
  48. Codes of ethics:
    (a) ACM Code of Ethics and Professional Conduct, 1992
    (b) IEEE Code of Ethics, 2006
    (c) Software Engineering Code of Ethics and Professional Practices, 1997.
    Accompanying materials: some scenarios collected up from Sara Baase’s book.
  49. Unlocking the Clubhouse: Women and Computing (scan3, scan6) by Jane Margolis and Allan Fisher. The reading (14 pages) is an except from Chapters 3 and 6 of Margolis and Fisher’s book published by MIT Press, 2002. Reconsider selection/redaction.
  50. Disciplined Minds (scan) by Jeff Schmidt. The reading (17 pages) is a selection drawn from chapters 1, 2, 3, and 13 of Schmidt’s book, Disciplined Minds: A Critical Look at Salaried Professionals and the Soul-Battering System That Shapes Their Lives, Rowman & Littlefield, 2001. (Do not omit.)
  51. Higher Social Class Predicts Increased Unethical Behavior by Paul Piff, Daniel Stancato, Stephane Cote, Rodolfo Mendoza-Denton, and Dacher Keltner. PNAS, 2012.
    Concluding Remarks
  52. Some pledges
  53. Russell-Einstein Manifesto (1955), Bethe to Clinton (1985)
  54. Video clip from Jacob Bronowski’s TV mini-series The Ascent of Man (1973).

We will also see some or all of the following films:
  1. Dekalog (Part 1), 1989. Directed by Krzysztof Kieslowski. Time is 51.5 mins (beginning to start of credits). Following some introductory remarks, I always show this film in the first class meeting.
  2. An Inconvenient Truth (2006). Presented by Al Gore, directed by Davis Guggenheim. Custom CD omits first 34 seconds of chapter 1, and omits 10, 12, 13, and 15. Time is 79 mins to start of credits, and 84 mins including enjoyable credits.
  3. Why We Fight, 2005. Written and directed by Eugene Jarecki. Custom CD omits chapters 2 and 5. Time is 79.5 mins (start to beginning of credits) .
  4. The Corporation, 2003. Written by Joel Bakan, directed by Mark Archbar and Jennifer Abbott. Custom CD includes chapters 1–5, 8:[beg–47:29], 8:[51:33–end], 10:[beg–1:02:34], 16[1:24:56–1:26:45], 18, 19:[beg–1:50:27], 22:[2:02:40–2:17:23], 23–24. Time is 79.5 mins (beginning to start of credits).
  5. Food, Inc., 2008. By Robert Kenner. Total time is 94 mins.
  6. The Lives of Others, 2006. By Florian Henckel von Donnersmarck. 137 mins.

This reader is a living document. If you have suggestions for additions, deletions, or changes, please let me know.

Copyright Information The materials assembled here are exclusively for educational purposes in one particular class at UCD. Some of the readings are believed to be in the public domain, or have unrestrictive use permissions (eg, they are CC-licensed). Other materials fall under traditional copyright, and are included with due consideration to the four factors used in ascertaining fair use; these have placed in a password-protected subdirectory. Some readings have been OCR’d from scans, to reduce file size and improve legibility.


Last updated Sep 22, 2010