ETHICS
Chapter 17 Application  Computers
Section Three  : Cases

 

 

from Robert N. Barger

 

1. ACCESS TO INFORMATION CASE
2. ADMINISTRATOR-STUDENT CASE
3. BORROWED HARDWARE CASE
4. CAR SALES CASE
5. CHAIN LETTER CASE
6. COMPUTER AS JURY CASE
7. COMPUTER CHEATING CASE
8. CULTURE CLASH CASE
9. CYBER CITY NETWORK CASE
10. DECEASED STUDENT CASE
11. DONATION TO CHARITY CASE
12. FALSE SECURITY CASE
13. FILE TRANSFER CASE
14. FINGERING & PRIVACY CASE
15. INTERNET FRAUD CASE
16. FREE SOFTWARE CASE
17. GLASS COCKPIT CASE
18. GRAPHICS APPROPRIATION CASE
19. INCAPACITATED ADMINISTRATOR CASE
20. LIMITING SOFTWARE USE CASE
21. MEDICAL DIAGNOSIS CASE
22. SOFTWARE LICENSING CASE
23. SPAMMING? CASE
24. NUMERICALY UNSTABLE CASE
25. EDITED FILE CASE
26. CLASS PROJECT CASE
27. HIDE FROM IRS CASE
28. IGNORE PROBLEM CASE
29. BAD SOFTWARE CASE
30. MAIL INSPECTION CASE
31. FAKE SALE CASE
32. FIX BUG CASE
33. FINALS-WEEK CASE
34. SYSTEM PRIVILEGES CASE
35. ALT-DEMONS CASE
36. SOFTWARE COPYING CASE
37. PARASITE COMPUTING CASE

Individual Cases:

Case Studies

http://ethics.acusd.edu/resources/cases/HomeOverview.asp

 

 

Proceed to the next section of the chapter by clicking here>> section.

Copyright Stephen O Sullivan and Philip A. Pecorino  2002. All Rights reserved.

Return to:               Table of Contents for the Online Textbook