Revisiting Mason: The Last 18 Years and Onward

Revisiting Mason: The Last 18 Years and Onward

Lee A. Freeman (University of Michigan - Dearborn, USA) and A. Graham Peace (West Virginia University, USA)
Copyright: © 2005 |Pages: 18
DOI: 10.4018/978-1-59140-491-0.ch001
OnDemand PDF Download:


Richard Mason’s seminal paper describing the four ethical issues of the information age has guided the field of Information Ethics for almost 20 years. However, much has changed with regard to information technology since 1986, and perhaps Mason’s four ethical issues — Privacy, Accuracy, Property, and Accessibility — have become dated. To set the stage for the following chapters, and to provide the reader with some context, this chapter takes a retrospective look at Mason’s issues and discusses how they remain salient in today’s information-rich and technology-driven society. Additional issues that have emerged since Mason’s publication are also discussed, with a discussion of “justified” hacking as a focused and critical analysis of Mason’s four issues. While no firm conclusions are reached regarding the ethics of specific actions, the chapter reinforces the continued use of the four ethical issues in future research, and it prepares the reader for the more detailed discussions that follow in the remaining chapters.

Complete Chapter List

Search this Book:
Table of Contents
Lee Freeman, A. Graham Peace
Chapter 1
Lee A. Freeman, A. Graham Peace
Richard Mason’s seminal paper describing the four ethical issues of the information age has guided the field of Information Ethics for almost 20... Sample PDF
Revisiting Mason: The Last 18 Years and Onward
Chapter 2
Charles R. Crowell, Darcia Narvaez, Anna Gomberg
This chapter discusses the ways in which moral psychology can inform information ethics. A “Four Component Model” of moral behavior is described... Sample PDF
Moral Psychology and Information Ethics: Psychological Distance and the Components of Moral Behavior in a Digital World
Chapter 3
Kieran Mathieson
Information technology may be able to help people become better ethical decision makers. This chapter explores philosophical and psychological... Sample PDF
Designing a Moral Dilemma Support System
Chapter 4
Kai Kristian Kimppa
In the light of three major ethical theories, Lockean liberalism, consequentialism, and Kantian deontology, it seems that the intellectual property... Sample PDF
Intellectual Property Rights - or Rights to the Immaterial - in Digitally Distributable Media Gone All Wrong
Chapter 5
Bruno de Vuyst, Alea M. Fairchild
Intellectual property rights (IP) are established through the Trade Related Aspects of Intellectual Property Rights (TRIPS) Agreement (part of the... Sample PDF
Intellectual Property Rights, Resources Allocation and Ethical Usefulness
Chapter 6
Asim El-Sheikh, Abdullah Abdali Rashed, A. Graham Peace
Software piracy costs the information technology industry billions of dollars in lost sales each year. This chapter presents an overview of the... Sample PDF
Software Piracy: Possible Causes and Cures
Chapter 7
David W. Miller, Andrew Urbaczewski, Wm. David Salisburg
In the information age, various entities (e.g., citizens or business concerns) are now able to access and gather large amounts of publicly available... Sample PDF
Does 'Public Access' Imply 'Ubiquitous' or 'Immediate'? Issues Surrounding Public Documents Online
Chapter 8
Christopher M. Cassidy, Bongsug Chae, James F. Courtney
Society has focused on privacy solutions to problems related to consumer information, yet the problem has not gone away. Why is this? One answer is... Sample PDF
Ethical Management of Consumer Information: Solving the Problem of Information Externality Using the Coasian Approach
Chapter 9
Robert N. Barger, Charles R. Crowell
This chapter discusses the ethics of a proof-of-concept demonstration of “parasitic computing.” A “parasite” computer attempts to solve a complex... Sample PDF
Ethics of "Parasitic Computing": Fair Use or Abuse of TCP/IP Over the Internet
Chapter 10
Michael Freeman
This chapter addresses how new surveillance technologies and programs aimed at fighting terrorism affect privacy. Some of the new programs and... Sample PDF
Counterterrorism and Privacy: The Changing Landscape of Surveillance and Civil Liberties
Chapter 11
Kathleen S. Hartzel, Patrick E. Deegan
This chapter explores how individuals using different justice perspectives to evaluate the appropriateness of the USA PATRIOT Act will logically... Sample PDF
Balancing Individual Privacy Rights and Intelligence Needs: Procedural-Based vs. Distributive-Based Justice Perspectives on the PATRIOT Act
Chapter 12
Jimmie L.. Joseph, David P. Cook
This chapter explores the ethical implications of a reduction in information asymmetry between health care providers and their patients. In many... Sample PDF
Information Imbalance in Medical Decision Making: Upsetting the Balance
Chapter 13
Pooja Deshmukh, David Croasdell
This chapter explores privacy and security issues in health care. It describes the difference between privacy and security in the context of health... Sample PDF
HIPAA: Privacy and Security in Health Care Networks
Chapter 14
Mary Brabston, Jennifer Dahl
In this chapter, we examine three frameworks or models that could be used in developing codes of information ethics and then review two codes of... Sample PDF
Limitations of Having Diversity in Codes of Information Ethics: A Professional and Corporate Perspective
Glossary of Terms
About the Authors