Acm Sigcas Computers and Society 49 (3):19-27 (2021)

The Scandal in Academia [32] [33] [34] [35] is an extended fictional case-study intended for use as a teaching and discussion aid for educational practitioners looking to introduce elements of computer ethics into their curricula. Inspired by Epstein [17] [18] it is a full-cycle scenario involving many individuals which touches upon the complexity and interrelations of modern computer ethics. It has been trailed and evaluated as a teaching tool by the authors [36] and with multiple groups since then. However its utility as a general resource is limited without the academic context that supports deeper investigation of the material. It is to address this issue that the authors offer this commentary on the Scandal, with a focus on the ninth and tenth newspaper items presented within. Specifically these are Culture of Fear and Nepotism at University and Witch-Hunts at the University - IT Crackdown Causes Criticisms.
Keywords No keywords specified (fix it)
Categories No categories specified
(categorize this paper)
DOI 10.1145/3447913.3447926
Edit this record
Mark as duplicate
Export citation
Find it on Scholar
Request removal from index
Revision history

Download options

PhilArchive copy

Upload a copy of this paper     Check publisher's policy     Papers currently archived: 71,259
External links

Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
Through your library

References found in this work BETA

The Case of the Killer Robot.Richard G. Epstein - 1994 - Acm Sigcas Computers and Society 24 (4):12-32.
Ethics in Context.Michael James Heron & Pauline Belford - 2014 - Acm Sigcas Computers and Society 44 (2):20-51.
The Quantified University.Michael James Heron & Pauline Belford - 2016 - Acm Sigcas Computers and Society 46 (3):28-44.
Disclosure and Disavowal.Michael James Heron & Pauline Belford - 2018 - Acm Sigcas Computers and Society 47 (4):29-45.

Add more references

Citations of this work BETA

No citations found.

Add more citations

Similar books and articles

Anonymity.Kathleen A. Wallace - 1999 - Ethics and Information Technology 1 (1):21-31.
Power and Perception in the Scandal in Academia.Michael James Heron & Pauline Belford - 2015 - Acm Sigcas Computers and Society 45 (2):11-19.
Navigating the Unknown: Towards a Positive Conception of Anonymity.Julie Ponesse - 2013 - Southern Journal of Philosophy 51 (3):320-344.
Is Anonymity an Artifact in Ethnographic Research?Will C. van den Hoonaard - 2003 - Journal of Academic Ethics 1 (2):141-151.
Public Anonymity and the Connected World.Tony Doyle & Judy Veranas - 2014 - Ethics and Information Technology 16 (3):207-218.
To Be or Not to Be…Revealing Questions of Anonymity and Confidentiality.Thirusha Naidu - 2018 - In Catriona Ida Macleod, Jacqueline Marx, Phindezwa Mnyaka & Gareth J. Treharne (eds.), The Palgrave Handbook of Ethics in Critical Research. Springer Verlag. pp. 241-256.
Infinite Utility: Insisting on Strong Monotonicity.Luc Lauwers - 1997 - Australasian Journal of Philosophy 75 (2):222 – 233.
Cooperation in Anonymity.Richard M. Ebeling - 1987 - Critical Review: A Journal of Politics and Society 1 (4):50-61.
Confidentiality Revisited.Ke Yu - 2008 - Journal of Academic Ethics 6 (2):161-172.
On Teaching Computer Ethics Within a Computer Science Department.Michael J. Quinn - 2006 - Science and Engineering Ethics 12 (2):335-343.


Added to PP index

Total views
3 ( #1,362,404 of 2,518,488 )

Recent downloads (6 months)
1 ( #408,186 of 2,518,488 )

How can I increase my downloads?


My notes