A husband suspects an online affair (Sample Scenario from the CSTB): Rights and Responsibilities of Participants in Networked CommunitiesAnonymous
Two individuals meet online, both are married and have been caught by one of the spouses. The commercial network operator has obligations to enforce policies, including threatening material. This is one of 5 scenarios that discuss computers and internet privacy, sampled from a publication of the Computer Science and Telecommunications Board (CSTB).
This is an open-ended scenario for discussion based on a case from the NSPE Board of Ethical Review. A client believes an engineer's designs are too costly, but the engineer fears that anything less may endanger the public.
A summary of Inez Austin's current situation.
A message from Inez Austin to the general public.
Engineering and responsibility and ethics that must be followed in the work place, pertaining to lessons learned from the Morton Thiokol and the space shuttle Challenger disaster.
Link to the National Academies ReportInfusing Ethics into the Development of Engineers: Exemplary Education Activities and Programs
Link to the National Academies Report,Ensuring the Integrity, Accessibility, and Stewardship of Research Data in the Digital Age
Link to the National Academies Report, Final Report of The National Academies' Human Embryonic Stem Cell Research Advisory Committee
Memorandum of decision and order on defendant's (David LaMacchia) motion to dismiss the case against him.
An article about the governments opposition to LaMacchia's motion to dismiss the case and their explanation as to why the Dowling case doesn't apply in this situation.
An official statement from MIT News Office detailing the actions taken after the discovery that an MIT computer was at the center of the file-sharing network.
This is a compilation of articles, legal documents, and newsgroup postings pertaining to the software piracy case of David LaMacchia, an MIT student who allegedly used university hardware to distribute commercial software over the Internet, which raises important issues about the liability of system operators and the scope of computer crime and copyright laws.
An article about LaMacchia's indictment, the background of file sharing over a network and the possible ramifications on the future of the internet and intellectual property.
This case includes the point of view of Team 1, the consulting firm engineers, for the L'Acide cleanup case. This case includes handouts for 4 teams, each with hidden agendas, to be used in class discussion.
This informational article by Daniel A. Vallero serves as a starting point for group discussion of the possible misuse of emerging technologies. It is accompanied by an annotated presentation that addresses emerging technologies and ethical decision-making.
Fred Cuny's final mission, to attempt to negotiate a cease-fire in Chechnya, ended with his disappearance.
A short guide to some key resources and readings on the topic of whistleblowing.
A short guide to some key resources and readings on the topic of workplace ethics.
An annotated bibliography of resources on the ethics of human genetics research.
An annotated bibliography of resources on the ethics of research with dementia patients.
A scenario that covers ethical issues that arise when a student is not listed author on a manuscript.
Values and Policy in Interdisciplinary Environmental Science: A Dialogue-based Framework for Ethics EducationAnonymous
The "Values and Responsibility in Interdisciplinary Environmental Science" curriculum (http://eese.msu.edu/) is a modular resource designed to be implemented by environmental science instructors who have no ethics training for the purpose of guiding students through an analytic examination of the values and policy dimensions of their environmental science context. With the support of the NSF (SBE-1338614, MSU; SBE-1338626, Oregon State University) and with guidance from a national survey of environmental science instructors (Hall, Troy E., et...
A scenario about research in which a strange side effect is noticed in mice which would not affect humans.
Electronic Vandalism (Sample Scenario from the CSTB): Rights and Responsibilities of Participants in Networked CommunitiesAnonymous
One of 5 scenarios that discuss computers and Internet privacy, sampled from a publication of the Computer Science and Telecommunications Board (CSTB). A dial-in electronic bulletin board is used for legitimate and harmful activities. Who monitors the bulletin board?
Part Seven of Seven Discussions in the Concerning the Challenger Disaster.