309 Spring 01 Please put name on

Exam 1 Back of last page

Miller

1. If we do a perfect job of developing the skills for making perfect ethical decisions and we use these skills to perfectly analyze all of the situations where ethics plays a factor to arrive at a best course of action then for this to not be another totally useless

academic exercise we need to ______

______

2. In class we discussed a number of informal guidelines for making ethical decisions. These guidelines, designated by names such as the Mom Test, the TV Test, and the Newspaper Test, all seemed to be variations on the thought that if

______

______

______

3. It can be argued that the Golden Rule, which contains the central thought that

______

______

is a fundamental moral principle because

______

4. In altruism the emphasis is placed on ______

______

5. Kant Question

6. Mary, who sort of has a date for a party, ends up talking to a fellow who when he learns she is a computer science major, offers to get her a disk full of account name/ password pairs currently active on the USM computer named ocean. He explains that he and some of his friends have control of the computer and that so far it looks like their break in has not been detected. Mary is not sure why she is being told all of this, although a couple thoughts have crossed her mind and she surely does not know for a fact that what she is being told is true. Oh, what to do? Fortunately Mary has just finished taking CSC309.

Following a utilitarian approach to ethics she (a. reports what she has heard to a faculty member who she feels will protect her identity and who will have the claim checked out, b. does not report the contents of this private communication to anyone else,)

reasoning that ______

______

After reflecting on her answer to the first part of this question and again applying a utilitarian approach to ethics she, changes her mind about what she should do and (a. reports what she has heard to a faculty member who she feels will protect her identity and who will have the claim checked out, b. does not report the contents of this private communication to anyone else,)

reasoning that______

______

Following a Kantian approach to ethics she (a. reports what she has heard to a faculty member who she feels will protect her identity and who will have the claim checked out, b. does not report the contents of this private communication to anyone else,)

reasoning that ______

______

Following an altruistic approach to ethics she (a. reports what she has heard to a faculty member who she feels will protect her identity and who will have the claim checked out, b. does not report the contents of this private communication to anyone else,)

reasoning that ______

______

7. At the Super Bowl held in January of 2001 computers were used to scan images of the people entering the game to identify them.

A benefit of this surveillance for people attending the game was ______

______

______

A penalty caused by this surveillance for people attending the game was ______

______

______

8. Question on article covered in class

9. Credit bureaus collect lots of data on each of us. On the surface, that appears to be a rather major invasion of personal privacy. But this turns out to be another of those tradeoffs we keep talking about because when we give up this privacy protection we gain what in return?

______

______

10. What was the Bhopal incident mentioned in this class?

______

______

______

11. Example of question on article covered in class. With theft of identity we usually think of someone simply running up bills on our credit cards. In the article “Stolen Identity Haunts Victim” we saw that there were worst things that could happen. Explain what happened to the victim, Bronti Kelley.

12. In 1976 Diffie and Hellman developed a completely new encryption scheme called public key cryptography. An elegant implementation of public key appeared in 1977 authored by three MIT professors (Rivest, Shamir, and Adleman). A major advantage that this approach offered was that

______

______

13. While there does seem to be considerable concern about the governments push for mandatory key escrow encryption there are good business and personal reasons for using some sort of key escrow system. In fact it can be argued that every business that uses encryption needs key escrow because

______

______

______

14. If longer encryption keys offer greater security why doesn’t everyone simply use very long keys to produce encrypted messages that would take forever to decode?

______

______

______

15. The terms computer matching and computer profiling describe two different actions.

Computer matching occurs when ______

______

Computer profiling ______

______

______

16. Why is protection of your social security number more important now than it was 30 years ago?

______

______

______

17. Extensive studies of mishaps have identified three primary

causes. (1) Mishaps are almost always caused by ______

______

(2) The failure ______is often a contributing

factor (sometimes the causal factor) of mishaps. Another thing we know from studying mishaps is that (3) they often involve problems

in subsystem ______

18. Describe a situation where

a. You should be willing to reveal your social security number.

______

b. You should not be willing to reveal your social security number.

______

19. When we discussed the interface-design-for-safety topic we discussed the design problem of providing an interface between a computer system that performs a critical process control function and the human operator who might be called upon without warning to take over control following some catastrophic event. Two of the three things we mentioned are:

a. ______

______

b. ______

______

20. In spite of our understanding of the impact of software bugs and the difficulty in identifying and correcting them, we still see a strong tendency to replace hardware with software. Give two reasons why

a. ______

b. ______

c. Uses less space and power.

21. Explain how there can still be errors with "software that matches its specifications perfectly and is used correctly by the user."

______

______

22. E-mail privacy has become a real problem and there are lots of cases being reported of employers reading employees mail. As an employee you should find out what the company policy is on the use of e-mail and regardless of what you find you should avoid (most say never) using e-mail to say anything that

______

______