Table of Case Studies

  • Prologue
    • Tech Support
    • Ethical theories
  • Part I Opportunities
    • 1 Digital inclusion
      • Wikipedia
      • Net neutrality
      • Digital Green
      • Navigation aids for the blind and visually impaired
      • Ethics: Gender portrayal in video games
      • Assisting older adults in staying connected
    • 2 Digital media and intellectual property
      • The four major kinds of intellectual property
      • Ethics: Music downloading and sharing
      • YouTube
      • Endless Love of Bush and Blair
      • Textbook prices
      • Journal of Medical Internet Research (JMIR)
      • Apple versus Mirror Worlds
      • Linux
      • Creative Commons license
    • 3 Computers in education and learning
      • SimCity
      • PowerPoint and its critics
      • eClass
      • User modelling
      • Voices of Youth
      • The rapid growth of MOOCs
      • Ethics: Mobile phones in schools and classrooms
    • 4 Computers in medicine and health care
      • PatientsLikeMe
      • Problem-oriented medical record (POMR)
      • Adverse drug reactions and interactions
      • Ebola epidemic
      • Training medical students with patient simulators
      • The Incredible Bionic Man
      • Diagnosing diabetic retinopathy
      • Ethics: Designer babies
      • The brain training industry
      • Non-anthropomorphic robot companions
    • 5 Free speech, politics, and government
      • 1984
      • Speech on the internet
      • Internet censorship across the world
      • Ethics: Content moderation
      • Fake news in the 2016 US election campaign
      • Blacksburg Electronic Village (BEV)
      • Yes We Can!
      • Government as tweetocracy
    • 6 Law and order, war and peace
      • The Terminator
      • Police body-cams
      • The Arab Spring in Egypt
      • Surveillance, security, and privacy in Canada
      • Keeping the internet open
      • Russian interference in the 2016 US presidential election
      • GhostNet
      • Drones
      • The Handle robot
      • Ethics: Autonomous weapons
  • Part II Risks
    • 7 Security
      • Data breaches
      • Ethics: Aaron Swartz
      • WannyCry
      • Phishing
      • Mobile phone security
      • The Butterfly Ballot
      • Cyber-crime in China
    • 8 Safety
      • Computer rage
      • Amanda Todd
      • Pokémon Go
      • How many lines of code?
      • The Y2K problem
      • Therac-25
      • Three Mile Island
      • The Google Smart Car project
      • Ethics: Societal response to the opportunity of autonomous vehicles
      • Climate change models
    • 9 Privacy
      • Privacy from a psychological point of view
      • National ID numbers
      • Big data and the Digital Universe
      • HIPAA
      • Cambridge Analytica/Facebook scandal
      • Video surveillance
      • Lifelogging
      • Ethics: Edward Snowden
      • The General Data Protection Regulation
      • Privacy by Design
  • Part III Choices
    • 10 Automation, work, and jobs
      • Modern Times
      • Ethics: Automatic filtering of résumés
      • Sociometric badges
      • The disrupters
      • Ripeness sniffers and melon-picking robots
      • Are robots responsible for the decline of manufacturing jobs?
      • Retail automation
      • Automated medical diagnosis
      • What do the experts predict about job losses due to automation?
    • 11 Artificial intelligence, explanations, trust, responsibility, and justice
      • R.U.R.
      • Game-playing programs
      • Superintelligence
      • Multiple intelligences
      • The uncanny valley
      • Explainable artificial intelligence
      • Ethics: Non-explainable artificial intelligence
      • Trusting AI
      • Data analytics for child welfare
      • AI and criminal justice
      • New EU regulation on algorithmic decision-making and a right to have decisions explained
    • 12 Lifestyle
      • Social media
      • Antisocial media
      • Ethics: The internet addiction battlefield
      • Alexa
      • Augmented reality (AR)
      • Realbotix
      • Bitcoin
      • Amazon